url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://learn.microsoft.com/en-us/dax/nextquarter-function-dax
|
code
|
Returns a table that contains a column of all dates in the next quarter, based on the first date specified in the dates column, in the current context.
|dates||A column containing dates.|
A table containing a single column of date values.
This function returns all dates in the next quarter, based on the first date in the input parameter. For example, if the first date in the dates column refers to June 10, 2009, this function returns all dates for the quarter July to September, 2009.
The dates argument can be any of the following:
- A reference to a date/time column.
- A table expression that returns a single column of date/time values.
- A Boolean expression that defines a single-column table of date/time values.
Constraints on Boolean expressions are described in the topic, CALCULATE function.
This function is not supported for use in DirectQuery mode when used in calculated columns or row-level security (RLS) rules.
The following sample formula creates a measure that calculates the 'next quarter sales' for Internet sales.
= CALCULATE(SUM(InternetSales_USD[SalesAmount_USD]), NEXTQUARTER('DateTime'[DateKey]))
Time intelligence functions
Date and time functions
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649293.44/warc/CC-MAIN-20230603133129-20230603163129-00643.warc.gz
|
CC-MAIN-2023-23
| 1,179
| 14
|
http://www.giacobbe85.altervista.org/pagine/Citazioni.php?lang=eng&cit=4781
|
code
|
Quotes, aphorisms, famous sentences
In these pages you can find a collection of 8295 quotes and aphorisms. You can search for a specific word using the form below, or surf among the categories. If you find errors, please let me know! Have fun!
Wisdom doesn't necessarily come with age. Sometimes age just shows up all by itself. - Tom Wilson
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657138718.61/warc/CC-MAIN-20200712113546-20200712143546-00299.warc.gz
|
CC-MAIN-2020-29
| 341
| 3
|
https://communities.ca.com/thread/241763415-is-there-a-way-to-track-the-developement-estimation-and-test-estimation-separately
|
code
|
We have outsourced the Dev work to a different company, and we have our own testers. We have issues around the project budgetting, we always end up paying higher than what was estimated by the developer. So far we have been using the Excel for tracking the iteration which did not give us much metrics and now we are looking to migrate the project to Rally, Mainly to take the advantage of Rally reporting capabilities.
From our internal discussion, we felt that a field to track both the Dev Estimate and Test estimate separately will help. Is that possible?
Also looking for a report that gives the Dev task actual and test task actual separately? at the Story/Iteration level.
Thanks in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659944.3/warc/CC-MAIN-20190118070121-20190118092121-00474.warc.gz
|
CC-MAIN-2019-04
| 698
| 4
|
https://hackaday.com/tag/sterilizer/
|
code
|
Retailers have instituted enhanced cleaning procedures in response to the COVID-19 pandemic, with an aim to keep frequently touched surfaces as clean as possible. Certainly one of the most commonly handled objects in the entire store is the payment terminal by the register, and the PIN pad specifically. Which is why [Josh Starnes] is working on a UV sterilizer that mounts onto a standard credit card terminal.
It’s a simple enough idea, but as is often the case, figuring out how to properly execute it is where things get tricky. [Josh] has already moved through several design iterations for his 3D printed enclosure in an attempt to make something that’s unobtrusive enough to be practical. The goal is to make something that the user won’t mistake for some kind of skimming device, which can certainly be tricky.
The skeptics in the audience will be happy to hear that [Josh] isn’t bothering with an LED UV source, either. We’ve all seen the pitfalls of trying to sanitize using UV LEDs, so this design goes old school with a small 12 volt UV bulb. That does mean it will need a dedicated power source however, which it seems like he’ll be addressing in the next phase of the project.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817095.3/warc/CC-MAIN-20240416124708-20240416154708-00671.warc.gz
|
CC-MAIN-2024-18
| 1,203
| 3
|
https://scholar.archive.org/work/vu4ycnahmzg53pfwgiqj6fzzh4
|
code
|
A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit <a rel="external noopener" href="http://www4.ncsu.edu/~apmeneel/fp113-meneely.pdf">the original URL</a>. The file type is <code>application/pdf</code>.
<i title="Association for Computing Machinery (ACM)">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/qzoq6upx4ndyrd7qaolzbaeuca" style="color: black;">ACM SIGCSE Bulletin</a>
Open-source project artifacts can be used to inject realism into software engineering courses or lessons on open-source software development. However, the use of open-source projects presents challenges for both educators and for students. Educators must search for projects that meet the constraints of their classes, and often must negotiate the scope and terms of the project with project managers. For students, many available open-source projects have a steep learning curve that inhibits them<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1597849.1384276">doi:10.1145/1597849.1384276</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ex364iqfyff73bvhrqagynmmce">fatcat:ex364iqfyff73bvhrqagynmmce</a> </span>
more »... rom making significant contributions to the project and benefiting from a "realistic" experience. To alleviate these problems and to encourage cross-institution collaboration, we have created the Repository for Open Software Education (ROSE) and have contributed three open-source projects intended for an undergraduate computer science or software engineering course. The projects in ROSE are education-friendly in terms of a manageable size and scope, and are intended to be evolved over many semesters. All projects have a set of artifacts covering all aspects of the development process, from requirements, design, code, and test. We invite other educators to contribute to ROSE and to use projects found on ROSE in their own courses.
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809154145/http://www4.ncsu.edu/~apmeneel/fp113-meneely.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/87/57/8757705d0adde7e22017f70b7009fb3f5ec356ec.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1597849.1384276"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103943339.53/warc/CC-MAIN-20220701155803-20220701185803-00389.warc.gz
|
CC-MAIN-2022-27
| 2,902
| 6
|
https://cloudtechnologist.fm/2021/05/25/cloud-technologist-show-e1-the-pilot/
|
code
|
Today I’m proud to share with you the pilot episode of the Cloud Technologist Show!
Often as a technologist group, the three of us (Myself, Mandy Storbakken and Martijn Baecke) set up a zoom call and catch up. We usually end up discussing current trends in the industry and how we’re approaching different topics with our customers. Since we’re spread across different geographic areas and have different backgrounds and interests, I’m always inspired to hear what the others are doing and thought it would be great to share some of that with a larger audience (YOU!).
For this first show, we all sat down and had a chat about what it means to be a technologist. We talked about how our careers have led us up to this point and share the current trends and technologies our customers are most focused on this year.
Check us out on YouTube video below, or If you’d just like the audio for the road, use the Podcast links at the bottom!
Hope you enjoy and there is more to come!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654097.42/warc/CC-MAIN-20230608035801-20230608065801-00772.warc.gz
|
CC-MAIN-2023-23
| 986
| 5
|
https://interactiveai.blogs.bristol.ac.uk/tag/events/
|
code
|
This blog post is written by AI CDT student, Matt Clifford
At the end of October ’23, I attended CIKM in Birmingham to present our conference paper. The conference was spread across 3 days with multiple parallel tracks on each day focusing on specific topic areas. CIKM is a medium size conference, which was a good balance between being able to meet many lots of researchers but at the same time not being overwhelmingly big that you feel less connected and integrated within the conference. CIKM spans many topics surrounding data science/mining, AI, ML, graph learning, recommendation systems, ranking systems.
This was my first time visiting Birmingham, dubbed by some the “Venice of the North”. Despite definitely not being in the north and resembling very little of Venice (according to some venetians at the conference), I was overall very impressed with Birmingham. It has a much friendlier hustle and bustle compared to bigger cities in the UK, and the mixture of grand Victorian buildings interspersed with contemporary and art-deco architecture makes for an interesting and welcoming cityscape.
Our work focuses on explainable AI, which I helps people to get an idea the inner workings of a highly complicated AI system. In our paper we investigate one of the most popular explainable AI methods called LIME. We discover situations where AI explanation systems like LIME become unfaithful, providing the potential to misinform users. In addition to this, we illustrate a simple method to make an AI explanation system like LIME more faithful.
This is important because many users take the explanations provided from off-the-shelf methods, such as LIME, as being reliable. We discover that the faithfulness of AI explanation systems can vary drastically depending on where and what a user chooses to explain. From this, we urge users to understand whether an AI explanation system is likely to be faithful or not. We also empower users to construct more faithful AI explanation systems with our proposed change to the LIME algorithm.
You can read the details of our work in our paper https://dl.acm.org/doi/10.1145/3583780.3615284
At the conference there was lots of interesting work being presented. Below I’ll point towards some of the papers which stood out most to me from a variety of topic areas.
- “Fairness through Aleatoric Uncertainty” – focus on improving model fairness in areas of aleatoric uncertainty where it is not possible to increase the model utility so there is a less of a fairness/utility tradeoff – https://dl.acm.org/doi/10.1145/3583780.3614875
- “Predictive Uncertainty-based Bias Mitigation in Ranking” – improve bias in ranking priority by reshuffling results based on their uncertainty of rank position – https://dl.acm.org/doi/abs/10.1145/3583780.3615011
- “Deep Integrated Explanations” – Feature contribution maps for vision models – https://dl.acm.org/doi/abs/10.1145/3583780.3614836
- “Flexible and Robust Counterfactual Explanations with Minimal Satisfiable Perturbations” – https://dl.acm.org/doi/10.1145/3583780.3614885
- “CounterNet: End-to-End Training of Prediction Aware Counterfactual Explanations” – https://dl.acm.org/doi/abs/10.1145/3580305.3599290
- “Continually-Adaptive Representation Learning Framework for Time-Sensitive Healthcare Applications” – https://dl.acm.org/doi/10.1145/3583780.3615464
- “Automatic and Precise Data Validation for Machine Learning” – https://dl.acm.org/doi/pdf/10.1145/3583780.3614786
Cluster package in python
A group that were at the conference maintain a python package which neatly contains many state-of-the-art clustering algorithms. Here is the link to the GitHub https://github.com/collinleiber/ClustPy . Hopefully some people find it useful!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817289.27/warc/CC-MAIN-20240419043820-20240419073820-00632.warc.gz
|
CC-MAIN-2024-18
| 3,792
| 16
|
http://www.linuxquestions.org/questions/puppy-71/the-puppy-ate-my-fedora-793643/
|
code
|
PuppyThis forum is for the discussion of Puppy Linux.
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
I'm planning to get a cheap laptop to supplement my desktop, and I've been looking at suitable distros. Puppy (4.3) was the best of those I tried, so to familiarise myself with it I decided to create a new partition and install it. The installation seemed to go well, so I went back to Fedora and altered grub.conf.
When I re-booted and selected Puppy from the grub menu, I was given a screen (why?) which offered
Linux on sda1
Linux on sda4
The second should have been Puppy, but it didn't work. When I examined /boot on the Puppy partition, I found there was no initrd or config, and /boot/grub had no grub.conf.
I went back to the live cd and re-installed. This time, instead of the option of installing grub on sda4, I chose MBR. I don't know what I was thinking about, because that trashed the Fedora grub! And I still couldn't boot Puppy — or Fedora either, now. Luckily I had my Fedora disk and was able to re-install grub from there.
So what did I do wrong? How do I install Puppy alongside Fedora?
Distribution: Mepis and Fedora, also Mandrake and SuSE PC-BSD Mint Solaris 11 express
That's a tough one. There is a file called menu.lst (or something similar) in the /boot directory which has all the information needed to boot a kernel of linux. If you are using GRUB for more then one Linux, you need both menu.lst files and you need to do some cutting and pasting so that all the information is there. The location is /boot/grub/menu.lst A text editor should open it. Be sure to edit the text file, not the binary just like it.
This reply tells me nothing; my post indicated that I know what ought to be in /boot (grub.conf is just Fedora-speak for menu.lst), and that Puppy was not producing a viable /boot. I would be surprised if it could start without an initrd file.
Make a directory on the partition you want to install Puppy to.
I called mine pup431.
copy vmlinuz, pup-431.sfs, and initrd.gz to it.
Then add this to your version of menu.lst.
# Linux bootable partition config begins
title Puppy Linux 431 frugal
kernel /pup431/vmlinuz pmedia=atahd psubdir=pup431 nosmp
# Linux bootable partition config ends
My installation was on the second hard drive on the third partition.
So adjust according to the drive and partition you put it on.
For example, if it is installed to the first partition of the first hard drive the root line would be root (hd0,0).
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660467.49/warc/CC-MAIN-20160924173740-00270-ip-10-143-35-109.ec2.internal.warc.gz
|
CC-MAIN-2016-40
| 2,893
| 25
|
https://notes.nicolasdeville.com/random/you-dont-need-to-mansplain-to-me/
|
code
|
The other day, I was explaining something to a woman.
She interrupted me (in a nice way though), saying “You don’t need to mansplain to me”.
It took me aback 🤔. I was shocked 😱. Embarrassed 😳. I lost my words. And spent a few days reflecting on her comment.
What I was explaining to her, I would have explained the same way to a man.
Long before the #MeToo movement, I have been a proponent and active contributor to diversity and gender equality in the workplace.
The teams I have built had a good gender balance.
I work very well with women (even co-founded a startup where we decided my wife would be the CEO), and women work well with me, at least based on the feedback I got over the years.
My conclusion is:
the challenge with “-isms” (sexism, racism, ageism) is that if one suffers the consequences from it regularly, s/he will default to seeing it as the reason behind.
I do communicate a lot – because I think both high-level and low-level, and like to share and provide more context, to help people understand better.
It’s not a communication style that works with everyone.
But mansplaining for me is explaining something:
- the woman should know better than a man
- to the woman in a group of men
So if you are a woman, please do not assume that I’m mainsplaining things – just that I overcommunicate! 😇
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943749.68/warc/CC-MAIN-20230322020215-20230322050215-00643.warc.gz
|
CC-MAIN-2023-14
| 1,345
| 15
|
https://cloudfour.com/topics/pattern-libraries/
|
code
|
The block editor is super powerful, but how do we bring in dozens or hundreds of external HTML and CSS patterns?
I was recently designing an interface with a lot of rounded corners. But, when I nested rounded corners it looked off somehow...
Responsive design sprints are a significantly better way to design and build for today's web than the traditional web design process. We provide the receipts. Unfortunately, not every organization can adopt this responsive design sprints. Why is that and what can be done about it?
Web design software makers saw the pain caused by the design to developer hand off and built features to help. Unfortunately, these features don’t help as much as the software makers hope. At best, they are unwanted features to be ignored. At worst, they reinforce faulty assumptions that undermine design systems.
For a recent project, we needed to take a small web application and embed it inside a client’s existing site. Typically, this means inheriting the site’s styles. However, in this case, the client wanted this…
Of all the things that the W3C has published, my favorite is the priority of constituencies. That’s quite a statement given the W3C published the standards that form the foundation of the web and, by extension, my career. But the priority of constituencies has always deeply resonated with me. What happens if we apply it to design systems?
By adding a touch of transparency, we can design components that automatically adapt to their backgrounds.
For many designers, the process of finding one's place within a design system can be surprisingly tough.
The Docs add-on displays vanilla HTML stories in iframes by default. Let's fix that!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099281.67/warc/CC-MAIN-20231128083443-20231128113443-00185.warc.gz
|
CC-MAIN-2023-50
| 1,695
| 9
|
http://users.glitchwrks.com/~glitch/2013/01/11/5-25-disk-box
|
code
|
Topic: External 5.25" Disk Box
Date: 2013 JAN 11
A few of my vintage machines require 5.25” disks, but either don’t have space for disks internally, or don’t have enough space for enough drives internally. I’d been casually keeping an eye out for a drive box with a self-contained power supply that held two 5.25” drives and used either a 37-pin D-SUB connector or a straight ribbon cable for the drives’ data connections. I finally found one, through an online auction listing link from The Vintage Computer Forums – it supported two full-height 5.25” drives (not included) and supplied only a slot in the case for the drives’ ribbon cable to exit. The power supplies were not load tested, but linear supplies are easy to fix and the price was less than $20.
On arrival, I discovered that the power supply consisted of a standard 12.6V center-tapped filament transformer and two rectifier/filter/regulator boards, one for each drive. Unfortunately, the boards were loose in the chassis and there was no clear way of attaching the boards directly to the drives:
I suspect these boards were not originally intended for this enclosure, but rather for the single-drive enclosure supplied with the North Star Micro-Disk System, a complete control board, disk drive and operating system package for the S-100 bus. One of the boards even bears a North Star copyright, the other appears to be a close-to-identical clone of the North Star board.
I wanted to keep the boards with the enclosure, partly because that’s how the enclosure came, and partly because they both tested good and I had no other use for them outside of the enclosure. They appeared to have the same dimensions as a full-height 5.25” drive’s faceplate, so it would seem they were intended to mount behind their respective drive, heatsinks facing away from the motor control board. Since the mounting holes on the power supply boards didn’t line up with any of the holes on my Tandon TM-100 drives, I decided to fabricate a mounting bracket. The material of choice is 1/4” thick Lexan, which was purchased from McMaster-Carr, along with all of the other required hardware.
A 6” x 6” sheet of Lexan was purchased, which required trimming only 3/8” from the top edge. Since this is 1/4” thick Lexan and the waste bit was small, I opted to saw the material rather than scoring it and snapping it on the edge of a table. I purchased a Bosch Plexiglass blade for my handheld jigsaw. It did a fantastic job, with no melting even at a fairly fast cutting rate. Holes were drilled and tapped in the face of the Lexan to match the two holes in each power supply board. This is where Lexan really excels for building brackets – simply lay the boards solder-side up, place the Lexan on top, and mark the holes by sight. Two additional holes were drilled and tapped in the bottom edge to accept 4-40 thread machine screws through two of the bottom ventillation slots. The boards are held away from the Lexan a bit with a stack of washers.
The boards fit well, and allow plenty of bottom-to-top airflow through the ventillation slots and across the large upper heatsinks. The two 4-40 machine screws with washers provide solid mounting for the Lexan, more than enough for an internal assembly that shouldn’t receive any mechanical stress. Orienting the boards with the heatsinks near the top should increase convection and help ensure the regulators don’t cook themselves. After several hours of operation with normal levels of disk access, they’re warm to the touch but not hot. Here’s a few more pictures of the enclosure with everything mounted but the cover:
The top cover is tight, but fits over two Tandon TM-100 drives. I crimped a custom data cable with two 34-pin edge connectors spaced just wide enough for the enclosure, since there was little room between the Lexan and drives for extra cable. The portion of the cable leaving the enclosure is around 5 feet long, and should be sufficient for all of the machines I plan to use with this enclosure. It is terminated in a 34-pin female dual-row IDC connector at the moment, but may be replaced with a 37-pin D-SUB connector in the future. Here’s a couple of pictures of the enclosure fully assembled and cleaned up:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511386.54/warc/CC-MAIN-20231004152134-20231004182134-00722.warc.gz
|
CC-MAIN-2023-40
| 4,273
| 9
|
https://fun-other.ambient-mixer.com/fierefis-and-pythios
|
code
|
Search for atmospheres
Fierefis / ''Firefist'' & Pythios
Fierefis and Pythios
MirrorWorld novel series-inspired ambience.
What if Fierefis / ''Firefist'', eldest son of Guismond the Witch-slayer and first heir in line for Silberthur / The Dead City's throne were to be the only one amongst his two siblings to own a dragon instead of only his father being in possession of them?
Fierefis / ''Firefist'' belongs to Cornelia Funke.
Pythios (''Rotting City'' in Greek) is a dragon/shapeshifter Original Character that belongs to Nico.
Comments for "Fierefis and Pythios"
License details for "Fierefis and Pythios"
Creative Commons Sampling Plus 1.0 License.
List of audio files used:
- Action Drums by Eendee +)
- Action Drums 2 by Eendee +)
- Monster* by http://freesound.org +)
- A Journey in the Dark by Lord of the Rings Online +)
- Wings flapping 1 by Mike Koenig +)
- Chains rattling by Pond5 +)
- monster roar var B by soundsnap.com *)
- Distant Thunder by Unknown +)
*) Soundsnap.com license
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499470.19/warc/CC-MAIN-20230128023233-20230128053233-00060.warc.gz
|
CC-MAIN-2023-06
| 996
| 20
|
https://amp.sooperarticles.com/new-advancements-of-android-1027682
|
code
|
Scope of an Android App Developer's Vision
Android's Multitasking Capabilities
Android has expanded itself extensively as a mobile phone platform and has gone beyond that establishing that it is more than that albeit, smart phones and tablets take up a large percentage of Android based devices being used by users from all over the world. The classification of priority in which smart phones/tablets are preferred is as a phone, an SMS and email sender/receiver, a camera and as a music device. After all these preferences only a user looks at a phone's application built by an Android app programmer and it comes under the category of "other useful stuff".
Android App Developer's Understanding of the User
Though this makes the application developed by an Android app developer insignificant it should be noted by them that all top applications which have made millions if not billions were considered in the last category until they revolutionized the market. Android app developers have to be aware that not all users use their Android devices in the same way, some use it just as a phone and may never use it as a device to use music and such. Thus when an Android application programmer is designing an application this inherent multitasking aspect has to be considered as an indispensible feature.
Characteristics Expected of an Android Application
Predictability and Necessary Idleness
When the application is not running in the foreground of the platform it is expected of the Android app developer to have developed an application which does not continue with its UI updates and network lookups in the background. Android by default closes event handlers once the application which runs the activities is paused and is sent to the background, this cannot be controlled by the Android app programmers but can be overridden. The Android app developers also realize that there is no point in updating their User Interface while no one is looking at.
Smooth Revoking of Idle Applications
One of the major advantages of the Android platform is its multitasking capabilities. With such swiftness of the platform it is a known fact that the application developed by Android app developers will often go to the background and be recalled in foreground. The attribute which is much expected from the application to have instilled into it by the Android app programmer is that it comes back to the foreground in a flash and should be effortless. This can be enabled by the Android app programmers by having an option to save the last state of the applications and queuing up updates for the applications until it is revoked to the front screen.
Control over the Application for User Only
When an application decides for itself when to come back to the active state when a user is using another application, the chances of the user finding the application built by the Android app programmer to be very irritating and this might lead to most users abandoning the application. Instead the Android app developers can adopt other methods of informing about the current activity in the application to the user in other subtler ways.
These are some aspects of Android applications and the platform that may be considered by the Android app developers before they started designing and implementing the application for the platform.
Android mobile Application development company provides, android app developers, Android app programmers, Java SDK, 3G Smartphone Development, web applications, custom application programming services, android developments, j2me developers, open-source platform for cell phones and mobile devices - develop software with Android.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710909.66/warc/CC-MAIN-20221202150823-20221202180823-00794.warc.gz
|
CC-MAIN-2022-49
| 3,656
| 14
|
https://pikuma.com/reviews/game-physics-engine-programming
|
code
|
"Probably one of the best courses I've ever taken. Extremely informative, well taught and made. A great base from which to start learning more advanced game physics topics. A great introduction to 2d game physics programming!"
"Absolutely amazing! Just a wonderful course from start to finish. I can't speak highly enough of the content or its delivery. If you've ever pondered what goes into a 2D physics engine, and if you've ever found yourself wishing someone could explain things in the simplest (and best) possible terms, look no further. Gustavo is a remarkable educator, and this course is worth your time and effort. I have loved every moment of it."
"Great course! On average, I would say that everything is good, but what I really liked, is that is very well paced (fast enough to see the improvements and keep the motivation, but still not rushing the explanations)"
"Another amazing course!!! This is not my first rodeo on Pikuma with Gustavo, and this one, just like all the rest I've done is an absolutely top notch quality course. I can recommend this to anyone who is keen to actually really understand the concepts and be able to apply those in practice. Though I cannot be held responsible if you suddenly decide to migrate to Linux, use Vim as your IDE of choice and start learning math in your spare time. You've been warned :)"
"Really good stuff! I'm a physics teacher, and it's really fun and rewarding to apply the physic's laws in a created world. Gustavo explains the topics in a great way. I had limited knowledge of C++ before, but by actively following the course and conducting extensive testing on my own, I make progress every day."
"Great course! Its been years I was trying to find a good source of information about 2d and 3d physics , all the material and books were very shallow in the approach of complex arguments like resting contacts and solvers . I bought this course basically only to acquire knowledge in this field and I am very satisfied!"
"Physics are amazing and this course is the best! This course is incredibly special because it combines the fundamental of physics, the necessary math to tackle the concepts and programing in C++. Gustavo is also a great professor, very didactic. Great course, highly recommended!"
"Incredible Course! Going through this course made me wish that math was taught through programming in school. Being able to actually play around and see the results of your calculations makes learning everything way more interesting. Gustavo does a great job explaining how each aspect works."
"This was another wonderful course from Gustavo. I really enjoyed the way he broke down some of the complicated math and this was a great introductory course to 2D Game Physics. I cannot wait until the 3D Physics course comes out."
"Fantastic course! I'm about half way through this course. Unbelievable value for money. Not only do you get a course on 2D physics, but it doubles as a massive C++ project so that (for me anyway). I can brush up on and get more confident with the syntax (and memory management).
Course is well presented and explained, with clear diagrams and animations. I wish I had more time (jumping between this one and a few others from same Instructor). Brings together all the stuff I have learnt over the years (since my high school days a few decades ago).
"This is an excellent course and a great entry level to understanding and creating a Physics Engine.
I have bought numerous books and videos on video game physics but never got anywhere because the math and C++ code was to difficult to understand. I am impressed that I was able to understand the calculus in this course as I barely have any experience in calculus. Not only that I also have little experience in C++. The instructor simply knows how to simplify difficult topics and makes it possible for anyone with a high school degree to learn video game physics given they touch up what they do not know on Khan Academy."
"Best course on game physics! I've always been curious on how physics were implemented in games. And truth is that physics was not my best subject on school. But Gustavo really explains all the math behind a physics engine is a very clear manner. You can code along, build your own physics engine and understand everything behind the scenes! Very satisfying! Looking forward to the 3D physics engine course."
"Honestly one of the best courses I have ever taken!
In those 35 hours I've not only learned a lot, but also had a lot of fun and I'm super happy now, that I know so much more about such an exciting topic than before I started this course several weeks ago.
Gustavo has an amazing talent of breaking quite complicated things into smaller, much much easily understandable pieces. I love his step-by-step style of learning and "let's do it from scratch to really understand it" attitude.
I would definitely recommend this course, there is no other course that goes so deeply into game physics as this one.
"Perfect course for those who want to learn physics simulations.
Great course, well taught. Contains all the required information for robust physics simulations, taught in a incremental manner that's very helpful when trying to understand the insane math behind it."
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100686.78/warc/CC-MAIN-20231207185656-20231207215656-00662.warc.gz
|
CC-MAIN-2023-50
| 5,252
| 20
|
https://macro-economic.com/ten-advantages-of-8-ap-macro-economics-multiple-choice-and-how-you-can-make-full-use-of-it-8-ap-macro-economics-multiple-choice/
|
code
|
There are a lot of different things you need to learn when learning the 2020 AP Macroeconomics multiple choice exam. Here is a list of some of the main things that you will need to know to get your AP Macroeconomics multiple choice test results in the best possible shape.
One thing that you will definitely need to know is the terminology that is used by AP Microeconomics. This includes the terms such as demand, supply and pricing which are used in order to analyze the economy and make economic predictions. It's important to understand all these terms before taking the test. If you don't understand what they mean then chances are you won't pass the test.
The other thing that you will need to know is how the multiple choice questions are asked on the AP Macroeconomics multiple choice test. The question is usually about 50 questions long and there are usually four parts to the exam. Each part requires the student to find a way to answer all the questions.
In order to answer all the multiple choice questions, you will have to spend a lot of time thinking about the questions and being able to come up with a reasonable answer for them. The good thing is that you don't have to spend too much time thinking about the questions as most of them have a very simple solution.
Before getting started it's also a good idea to make sure you read the entire book cover to cover. You will not pass the test without having read it. If you don't want to waste all that time reading the book then take the easy multiple choice tests that are given at the end of each section. They aren't as difficult as the other sections.
After reading the AP Microeconomics multiple choice test you can now study for the AP Macroeconomics multiple choice exam. Don't try to learn everything right away. You will probably be surprised at what you learned by just looking at the test. Take your time and make sure you understand everything before taking the test.
If you're like me then you don't want to spend all day sitting on the exam. The first step in studying for the exam is to go over the book in class and review everything that you've read. I recommend reading the book several times if you have to. Once you have read it a few times it will become easier to remember what you've read.
Take the exam without any prior practice so you don't run into any problems. When taking the multiple choice test, do not start practicing until about thirty minutes or so before the test. This way you will be able to get a feel for how many questions are going to appear on the test. and will know how much you will have to answer.
The AP Macroeconomics multiple choice exam can seem very daunting but if you practice and study it shouldn't be. that's why I suggest taking it as soon as possible after you finish reading the book.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038507477.62/warc/CC-MAIN-20210418163541-20210418193541-00138.warc.gz
|
CC-MAIN-2021-17
| 2,811
| 9
|
http://sm-searching.info/?option=com_content&view=article&id=36900
|
code
|
Broadcom ush w swipe sensor dell latitude e6520 - Bible study apps for android phones
May 31, · Dell Latitude E6520 Broadcom USH Driver. Dell Broadcom USH w/ touch sensor. How to replace the HDD of DELL Latitude E6520,.
Dell latitude e6400 broadcom ush. Jan 11, · Are you looking for the right driver for “ broadcom ush w/ swipe sensor” in device manager? Broadcom ush w swipe sensor dell latitude e6520. How to Fix Dell Broadcom USH Driver Problems. What may be a better method is to download the Latitude E6520. Anyone know where to find Dell Broadcom USH. The device would be displayed as “ Broadcom USH w/ swipe sensor” like. Dell E6320 Broadcom USH w/ Swipe Sensor Driver.Which is called Dell ControlVault.
Download sample papers for class 12 cbse english
Boks pc game free download full version prince of persia
Free mp3 chinese songs download english without registration
Go to the link below, enter you service tag or chose to let it be detected automatically, and update your system with the latest available device drivers. Solved: I have a Dell latitude e6410 running windows 7 professional 32- bit. Upon getting this thing home, i noticed that the recovery is inaccessible.
Download and install the Broadcom USH drivers ( Unified Security Hub w/ swipe sensor drivers) and resolve unknown device issues.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826968.71/warc/CC-MAIN-20181215174802-20181215200802-00541.warc.gz
|
CC-MAIN-2018-51
| 1,324
| 8
|
https://diydrones.com/group/pixhawk/forum/strange-behavior-of-pixhawk
|
code
|
Hello guys, I received my Pixhawk. But have a problem with instaling of firmware(Adruplane 3.2.3) using Mission Planner(1.3.19)
I have the PixHawk connected via the USB cable. It seems to work. Follow all instruction, but all times , I dont hear any musical tones (just : bip-bip-bip-BIP-BIP-BIP-bip-bip-bip-BIP-BIP-BIP-//-//-), And main LED all time is red (have no red/blue/red/blue/yellow !!!).
Can you explain me how to fix problem. What I do wrong or I have received bad Pixhawk. Here is link to video on youtube :https://www.youtube.com/watch?v=TMeU-7LflLQ&feature=youtu.be
Please help. Thanks
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337398.52/warc/CC-MAIN-20221003035124-20221003065124-00610.warc.gz
|
CC-MAIN-2022-40
| 599
| 4
|
https://westpalmbeachappraisal.com/page-u1732.php
|
code
|
Free Hatch Patterns
To download these free AutoCAD hatch patterns, simply right click on the patterns you want and choose Save Link As, then place the PAT file in a path included in your AutoCAD support paths.
Rules of Usage
- You may place these patterns on your system and use them in your drawings.
- You may not distribute these patterns in PAT form, instead refer associates to this page.
- You may not post them online (including web sites, ftp sites, bulletin boards, and other online services) for public downloading.
Credit: Watson Kilbourne of CompugraphX produced the highest quality hatch patterns available anywhere. Watson has donated these hatch patterns to the AutoCAD community.
Hatch Pattern Compatibility
The good news is that the hatch pattern format hasn't changed since it was first introduced years ago. Any hatch pattern you find should work with any previous or future version of AutoCAD!
2005 Hatch Pattern Snaps
There has been a change in behavior in AutoCAD 2005 regarding the object snaps on its geometry. In previous releases osnaps would honor hatches, in 2005 they are ignored by default. To turn on the snap to hatch, access the OPTIONS dialog (Tools menu), go to the Drafting tab, and in the lower left you will find the toggle.
Also there is a command line system variable OSNAPHATCH, set to 0 for off (no snap), 1 for on (snap).
This procedure will walk through the process of adding a hatch pattern to your system, all the way through the final step of adding the pattern to the AutoCAD BHATCH dialog.
Important Note: Autodesk changed the behavior of the BHATCH dialog beginning in version 2000. As a result of this change, the BHATCH dialog completely ignores the hatch slide contained in the slide libary. It choose instead to create a very small (nearing unreadable) swatch on the fly, which takes a significant amount of time if you have hundreds of patterns. As such this procedure may not be applicable unless you intend to compile your hatchs into a IMAGE menu.
Preparing the Pattern: The first step is to obtain or create a hatch pattern that you would like to add. For terms of discussion we will use the GRAVEL.PAT found floating on the web. I have no knowledge of the author. Note that this pattern does not have sufficient precision to properly display in large coordinate mapping, but should work well in most other applications. It has been reproduced here.
*GRAVEL, gravel pattern
228.0128, 0.720,1.000, 12.041365,0.074329, 0.134536,-13.319088
184.9697, 0.630,0.900, -12.041517,0.043315, 0.230868,-22.855925
132.5104, 0.400,0.880, -14.865942,0.061430, 0.162788,-16.116032
267.2737, 0.010,0.630, -20.024928,0.047565, 0.210238,-20.813558
292.8337, 0.000,0.420, -12.999910,0.048507, 0.206155,-20.409373
357.2737, 0.080,0.230, -20.024928,0.047565, 0.210238,-20.813558
37.6942, 0.290,0.220, -16.401180,0.035968, 0.278029,-27.524849
72.2553, 0.510,0.390, 23.086761,0.038097, 0.262488,-25.986321
121.4296, 0.590,0.640, 15.264264,0.047405, 0.210950,-20.884073
175.2364, 0.480,0.820, -12.045049,0.083045, 0.240832,-11.800763
222.3974, 0.240,0.840, 16.278789,0.032108, 0.311448,-30.833375
138.8141, 1.000,0.620, 9.219065,0.094072, 0.106301,-10.523844
171.4692, 0.920,0.690, -13.152853,0.049447, 0.202237,-20.021511
225.0000, 0.720,0.720, 0.707107,0.707107, 0.141421,-1.272792
203.1986, 0.650,0.840, -5.383564,0.131306, 0.076158,-7.539615
291.8014, 0.580,0.810, -3.156821,0.185695, 0.107703,-5.277462
30.9638, 0.620,0.710, 3.601470,0.171499, 0.174929,-5.656023
161.5651, 0.770,0.800, -2.213594,0.316228, 0.126491,-3.035787
16.3895, 0.000,0.810, 10.440154,0.056433, 0.177200,-17.542845
70.3462, 0.170,0.860, -11.704507,0.067267, 0.148661,-14.717408
293.1986, 0.770,1.000, -5.383564,0.131306, 0.152315,-7.463458
343.6105, 0.830,0.860, -10.440154,0.056433, 0.177200,-17.542845
339.4440, 0.000,0.190, -5.383893,0.117041, 0.170880,-8.373124
294.7751, 0.160,0.130, -12.082844,0.069843, 0.143178,-14.174643
66.8014, 0.780,0.000, 5.383564,0.131306, 0.152315,-7.463458
17.3540, 0.840,0.140, -13.601340,0.059655, 0.167631,-16.595424
69.4440, 0.290,0.000, -5.383893,0.117041, 0.085440,-8.458564
101.3099, 0.720,0.000, 4.118439,0.196116, 0.050990,-5.048029
165.9638, 0.710,0.050, -3.152963,0.242536, 0.206155,-3.916950
186.0090, 0.510,0.100, -10.049739,0.052342, 0.191050,-18.913923
303.6901, 0.620,0.620, -2.218801,0.277350, 0.144222,-3.461329
353.1572, 0.700,0.500, 17.117197,0.039715, 0.251794,-24.927563
60.9454, 0.950,0.470, -8.061673,0.097129, 0.102956,-10.192674
90.0000, 1.000,0.560, 1.000,1.000, 0.060000,-0.940
120.2564, 0.490,0.130, -8.061936,0.071982, 0.138924,-13.753520
48.0128, 0.420,0.250, 12.041365,0.074329, 0.269072,-13.184552
0.0000, 0.600,0.450, 1.000,1.000, 0.260000,-0.740
325.3048, 0.860,0.450, -12.206392,0.063246, 0.158114,-15.653274
254.0546, 0.990,0.360, 4.120817,0.137361, 0.145602,-7.134508
207.6460, 0.950,0.220, 21.470869,0.042182, 0.237065,-23.469474
175.4261, 0.740,0.110, 13.038344,0.039873, 0.250799,-24.829074
We could place this code into the file GRAVEL.PAT, place it into a search path, and refer to it at the HATCH prompt. However since our final goal is to have this pattern available in the BHATCH dialog, a little more work is required.
Adding the pattern: To add the pattern code to the ACAD.PAT file, it is first recommended that the existing ACAD.PAT (AutoCAD support directory) be backed up. In the event that something goes wrong we can restore without having to reinstall.
Open the original ACAD.PAT in a notepad or other ascii editor. It is a good idea to do a search to make sure that the pattern definition you are about to add does not already exist. If you do not care about the order that your pattern appears in the BHATCH list, then simply paste the contents of the pattern definition at the end of the file. If you would like to maintain alphabetical order, carefully find the appropriate position in the middle of the list and insert your pattern there.
Be sure to save the ACAD.PAT file (ascii text only).
Preparing a slide: The next step is to prepare a slide representing the appearance of the pattern definition. The following steps can be used to create a hatch representation in R14. For users other than R14, you may need to generate a polyline (with the same coordinates), hatch the polyline, then erase the polyline.
Enter pattern name or [?/Solid/User defined] <ANSI31>: GRAVEL
Scale for pattern <1.0000>: 5
Angle for pattern <0>: <ENTER>
Select hatch boundaries or press ENTER for direct hatch option,
Select objects: <ENTER>
Retain polyline? <N> <ENTER>
From point: 0,0
Arc/Close/Length/Undo/<Next point>: 16,0
Arc/Close/Length/Undo/<Next point>: 16,10
Arc/Close/Length/Undo/<Next point>: 0,10
Arc/Close/Length/Undo/<Next point>: C
From point or press ENTER to apply hatch: <ENTER>
The reason for the particular rectangle coordinates of 16x10 is to maintain the 1.6:1 ratio that the other hatch slides in the ACAD.SLB are created with.
Before we prepare the slide however, it is recommended that we enter paper space and create a viewport to represent the slide. Slides are clipped at the viewport boundaries, and it would be difficult to maintain this without the viewport.
New value for TILEMODE <1>: 0
ON/OFF/Hideplot/Fit/2/3/4/Restore/<First Point>: 0,0
Other corner: 16,10
Finally we are ready to prepare the slide. However before doing so it is recommended that you create a unique directory/folder to contain this and other slides. We will need to add more slides to this directory to rebuild the ACAD.SLB. For terms of this discussion, will use C:\SLIDES.
Issue the MSLIDE command, when prompted in the dialog enter C:\SLIDES\GRAVEL.SLD for the filename.
At this point we have our slide in the directory and ready to rebuild the ACAD.SLB.
Preparing to rebuild the ACAD.SLB: Just like we backed up the ACAD.PAT file, it is a very good idea to backup the ACAD.SLB file. You will also find this file in the AutoCAD support directory.
Since the SLIDELIB.EXE tool supplied with AutoCAD cannot simply append your slide to the SLB file, we will need to rebuild it from scratch containing the contents of the original SLB along with your slide.
Rebuilding the ACAD.SLB: Since SLIDELIB.EXE is an MS-DOS based tool, open an MS-DOS window and change to the slides directory.
The easiest way to supply input to SLIDELIB.EXE is to prepare a file using the DOS DIR command. In this case we are also using the /ON switch to order by name, and the /B switch for bare (no size, date) listing. Finally with the > sign we are redirecting the output to create (or overwrite) the file SLIDE.INP.
C:\SLIDES>DIR *.SLD /ON /B > SLIDE.INP
Now that we have an input file for the SLIDELIB utility, we can call it from the AutoCAD directory. For the most convenience, you may want to move or copy the SLIDELIB.EXE from the AutoCAD directory to the slides directory to eliminate the cryptic DOS path.
The Calling Command: C:\SLIDES>C:\PROGRA~1\AUTOCA~1\SUPPORT\SLIDELIB ACAD.SLB < SLIDE.INP
If SLIDELIB.EXE was copied/moved:
C:\SLIDES>SLIDELIB ACAD.SLB < SLIDE.INP
Overwriting the original ACAD.SLB
Use your preferred method to copy the new ACAD.SLB from the slides directory to the AutoCAD support directory, overwriting the old one.
The changes will be in effect immediately, simply issue the BHATCH command and see the rewards for your efforts.
- The process of adding the hatch SLD file to the ACAD.SLB can be significantly improved with the use of our Slide Manager software.
To view the largest previews click on the icon at the top
For those unfamiliar with the procedure for inserting .pat files, follow the instructions on our page
"How to import hatch patterns into AutoCAD"
Hatch files with the ".pat" extension must be placed in the "support" folder to be recognized and used by Autocad.
The "support" folder is located in:
documents and settings -> username -> application data -> Autodesk -> AutoCAD .... always go forward until you find the support folder.
To view all folders properly, you must enable the option to view hidden files and folders (in windows)
The complete path to exactly locate the support folder can be viewed in autocad> menu> tools> Options> File> "Support file search path" ...... read all with preview images ... >>
AutoCAD dwg hatch
Crawl space and gravel pattern .pat
Glass - Hatch patter .pat
Parquet hach patterns .pat
Roof hatch 01
Roofs with tiles and pantiles
Roof with tiles
Roof with tiles and pantiles 02
Self-locking floors .pat
[ IT ] Textures Database
Furnishings - Interior design
Paving for gardens
Graphic symbols - Signals
Legend of the finishes
Parks and Gardens
for Archweb Users
for premium users
- SINGLE PURCHASE
pay 1 and download 1
- Idrac 7 license keygen
- Totoro lego set
- Home for rent scottsdale
- Cisco codec pro
- Memorex mini projector review
Agenda of this solution:
Use the following steps to install hatch patterns based on the different operating systems:
Where to save the PAT-files
- Windows 10:
- C:\Users\<user name>\AppData\Roaming\Autodesk\AutoCAD <version>\Rxx.x\<language>\Support
- Rxx.x stands for a specific AutoCAD release version:
- <Release version>: R24.1: 2022; R24.0: 2021; R23.1: 2020; R23.0: 2019
- If you don't see the path above: The AppData and Application Data folders in the above paths are hidden folders
- If there is no longer a PAT-file of an existing hatch used in a drawing, use the express tool SUPERHATCH to try and bring in the custom hatch pattern (not available in AutoCAD LT).
- The default path is specified in the Support File Search Path listed under the Files tab in Options. It is usually the first one shown, pointing to the current user folder.
If the preference is to keep custom hatch patterns as well as other customization in a different location, the folder(s) need to be added to the applications search path.
To add a custom folder to the applications support file search paths
- Click the Application menu (the big "A" at the top left) Options.
- In the Options dialog box switch to tab "Files" and select node "Support File Search Path".
- Click "Add".
- Click "Browse...".
- In the "Browse for Folder"-dialog box, browse to and select the folder to add. Click OK.
- In the Options dialog box, click OK.
- On any drawing, type the HATCH command.
- Click the pull-down in the Hatch visor for Patterns and click Open Library.
- Click the drop-down arrow and select Add Patterns.
- Browse to the location of the custom .pat files, select them, and click Open.
- Custom hatch patterns files will automatically be copied to the following locations:
- AutoCAD for Mac 2016 and later: ~Home/Library/Application Support/Autodesk/AutoCAD <version>/Rxx.x/roaming/@<language>@/Support/Hatch Patterns
- AutoCAD for Mac 2011 to 2015: ~Home/Library/Application Support/Autodesk/roaming/AutoCAD <version>/Rxx.x/<language>/Support
- <Release version>: R24.1: 2022; R24.0: 2021; R23.1: 2020; R23.0: 2019
Note: Manually copying the PAT-files into the specified location will also work.
Loading a custom PAT-fileFollow these steps:
- Set system variable HPDLGMODE to 1.
- Enter HPDLGMODE into the command line.
- Type 1 and press Enter
- Enter command _HATCH. The "Hatch and Gradient"-dialog pops up.
- In selection list "Type" select "Custom".
- In field "Custom Pattern" click the 3 dots-symbol.
- The dialog "Hatch Pattern Palette" pops up. Select in the left frame the specific PAT-file and in the right frame the specific hatch pattern. Click Ok.
Editing PAT-files, using NotepadYou may edit the default PAT-files that are installed with AutoCAD by using Notepad and adding your custom hatch pattern data at the end of the file. There are two files: acad.pat (British units) and acadiso.pat (metric units) (AutoCAD LT: acadlt.pat and acadltiso.pat), which are located as noted above. Although line spaces are not required between hatch patterns pasted into the file, a blank line must be placed after the last hatch pattern definition in a PAT-file. If a blank line is not placed after the last hatch pattern definition, the last hatch pattern definition will not be accessible. You can add comments by preceding text with two semicolons ( ;; ).
Products:AutoCAD for Mac; AutoCAD LT for Mac; AutoCAD Products;
Well, what would he, Dimka, do all day without tight-fitting swimming trunks - he would not take out his hands all day out of. Your pockets. It would also be interesting.
Download hatch patterns
No, exactly, mom Nadya compared to how her friend sucks when she is still a schoolgirl. Olga sucked so well that he almost fainted when he finished her throat. And my penis did not fall as usual, but stood in Olga Vladimirovna's mouth, and she did not suck it much, looking into my eyes, massaging the testicles of a young. Guy with her fingers. I stroked the woman who had just given the best blowjob of my life through her jet black hair.Hatch Patterns - Download and Import
Registration, it was July 1st. Ildar called me to the Wedding, as a witness. I asked him, he is sure that he wants me to be at the wedding.
- Aew wrestling roster wiki
- 2 inch twill tape
- Poe heist guide
- Feeling myself lyrics clean
- Enterprise bmw 3 series
- Nike supply and demand analysis
- Mandolin chords and scales
- Allah 99 name youtube
- 8 masks in skyrim
- Happy birthday jasmine quotes
Does it fuck me. He has no money. dont give it to me, do you have money or not. Broke my phone. Smashed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362930.53/warc/CC-MAIN-20211204033320-20211204063320-00527.warc.gz
|
CC-MAIN-2021-49
| 15,380
| 179
|
https://hashbrowncms.org/guides/synchronising
|
code
|
How to synchronise two HashBrown projects
If you want a project to inherit schemas, settings and content from another one, you've come to the right place.
- Create a new project by going to the dashboard (the root page) and clicking "Add project", if you haven't already
- Click the ellipsis (⋮) in the top right corner
- Click "Settings"
- Enter the URL of the HashBrown instance the parent project lives on in the "API URL" field
- Enter the id of the parent project (can be found by looking at the URL when inside the project)
- Click on the refresh button (⭮) to get a new token
- Enter the username and password of an account with access to the parent project
- Click the checkmark (✔) to receive your new token
- Don't forget to check the "enabled" box before clicking "Save"
Now you should see the child project inheriting settings, content and schemas from the parent project you specified
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588246.79/warc/CC-MAIN-20211028003812-20211028033812-00612.warc.gz
|
CC-MAIN-2021-43
| 903
| 12
|
https://codefresh.io/docs/docs/integrations/codefresh-api/
|
code
|
How to integrate Codefresh with other systems
Codefresh offers a comprehensive API that you can use to integrate with any other application or solution you already have.
The full details of the API are documented at https://g.codefresh.io/api/
You can use the API in various ways:
- From your local workstation with any tool that speaks HTTP (such as postman, httpie, curl etc.).
- From another HTTP enabled system such as Jenkins. For example, you can trigger Codefresh pipelines from Jenkins jobs.
- Using the Codefresh command line interface which itself uses the API .
- Calling it programmatically from any other system. You can use your favorite programming language to make HTTP calls to Codefresh.
The Codefresh API is updated when new features are added in the Codefresh platform so you can expect any new functionality to appear to the API as well.
Ways to use the Codefresh API
There are several ways to use the API. Some of the most popular ones are:
- Triggering builds from another system. You can start a Codefresh pipeline from any other internal system that you already have in your organization.
- Getting the status of builds in another system.
- Creating pipelines externally. You don’t have to use the Codefresh GUI to create pipelines. You can create them programmatically using your favorite template mechanism. You can reuse pipelines using your own custom implementation if you have special needs in your organization.
You can browse the current API at https://g.codefresh.io/api/.
For each call you will also see an example with
Before you can use the API from your application you need an authentication key that will give programmatic access to Codefresh from an external application.
In order to create your own API key, click User Settings on the left sidebar and scroll down until you find the API Keys section. Click the generate button and copy your key.
From the same screen you can also revoke keys if you don’t need them anymore.
The following resources can be targeted with the API:
- Agent - Used for Codefresh Hybrid installation
- Audit - Read Audit logs
- Build - Get/change build status
- Cluster - Access control for Kubernetes clusters
- Environments-v2 - Read/Write Environment Dashboard information
- GitHub Actions - Run GitHub Actions inside Codefresh pipelines
- Pipeline - Access control for pipelines
- Repos - Refers to Git repositories
- Step Type - Refers to custom pipeline steps
The scopes available for each resource, are different depending on the type of the resource. Check the ones that you wish to use with this key.
Using the API Key with the Codefresh CLI
Once you have the key use it in the Codefresh Cli like this
Now the Codefresh CLI is fully authenticated. The key is stored in
~/.cfconfig so you only need to run this command once. The CLI
can also work with multiple authentication contexts so it is possible to manage multiple Codefresh accounts at the same time.
Example - Triggering pipelines
You can trigger any pipeline in Codefresh and even pass extra environment variables (even if they are not declared in the UI)
Triggering a pipeline via the Codefresh CLI
You can pass extra environment variables as well:
For the API you can trigger a pipeline by finding its serviceId from the UI
You can also pass extra environment variables using an array
Example - getting status from builds
You can get the status of a build from the cli by using its ID:
Same thing with the API
Example - creating Codefresh pipelines externally
Codefresh has a great UI for creating pipelines for each of your projects. If you wish, you can also create pipelines programmatically in an external manner. This allows you to use your own templating solution for re-using pipelines and creating them from an external system.
First you need a yaml file that defines the pipeline. This is a pipeline specification.
It is also very to create a a dummy pipeline in the Codefresh Web UI and then get its specification by running
codefresh get pipeline my-project/my-pipeline -o yaml > my-pipeline-spec.yml
Here is an example
Save this spec into a file with an arbitrary name like
my-pipeline-spec.yml. First create the new project (if it doesn’t exist already):
Then you can create the pipeline with the cli
And your pipeline will be available in the GUI
Notice that you must prefix the name of the pipeline with your username and repository so that it becomes visible in the GUI under the correct project.
Using Codefresh from within Codefresh
For example, you can easily call pipeline B from pipeline A
with the following step:
codefresh.yml of pipeline A
This step only calls pipeline B when a pull request is opened for the branch named
Note that when you use the Codefresh CLI in a pipeline step, it is already configured, authenticated and ready for use. No additional authentication is required.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655883961.50/warc/CC-MAIN-20200704011041-20200704041041-00277.warc.gz
|
CC-MAIN-2020-29
| 4,853
| 61
|
http://soreeyes.org/archive/2005/03/10/cartesians-versus-radialists-pirates-versus-ninjas-elves-versus-dwarves/
|
code
|
March 10th, 2005
Clay Shirky reframes an age-old old debate rather nicely:
When thinking about technological change, there are two kinds of people, or rather, people with two kinds of maps of the world — radial, and Cartesian. Radial maps are circular, and express position in relative coordinates — angle and distance — from the center. Cartesian maps are grids, and express position in absolute coordinates.
(If you're wondering where the pirates, ninjas, elves and dwarves come into all this, see Tom Coates' classic post on the subject from last year.)
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398538144.64/warc/CC-MAIN-20151124205538-00217-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 577
| 4
|
https://forum.openwrt.org/t/solved-wireguard-not-opening-websites/19186
|
code
|
It's been a while I'm trying to switch to wireguard from openvpn.
I'm using wireguard on Android and Windows with my private server and everything works perfectly well.
However, using openwrt 18 (and before that on Lede 17 snapshot) on Raspberry pi, I've noticed that once I connect to wireguard certain websites (such as Twitter and Deezer) open extreeeemly slowly, and 90% of the time fail to load at all.
I tried every option on DNS, but it seems my issues are not related to that. Pings to these servers have very high packet losses as well.
Please note: switching protocol to openvpn on very same server, dns and network config solves the issues immediately
Also, If I connect with wireguard on my Android or Windows directly (again using very same wireguard server and config) everything works smoothly
I really just can't figure out what I'm exactly doing wrong. (or maybe it's just a bug on wireguard module?)
Any help will be highly appreciated
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703517559.41/warc/CC-MAIN-20210119011203-20210119041203-00306.warc.gz
|
CC-MAIN-2021-04
| 953
| 8
|
https://proceedings.mlr.press/v151/makar22a.html
|
code
|
Causally motivated shortcut removal using auxiliary labels
Proceedings of The 25th International Conference on Artificial Intelligence and Statistics, PMLR 151:739-766, 2022.
Shortcut learning, in which models make use of easy-to-represent but unstable associations, is a major failure mode for robust machine learning. We study a flexible, causally-motivated approach to training robust predictors by discouraging the use of specific shortcuts, focusing on a common setting where a robust predictor could achieve optimal i.i.d generalization in principle, but is overshadowed by a shortcut predictor in practice. Our approach uses auxiliary labels, typically available at training time, to enforce conditional independences implied by the causal graph. We show both theoretically and empirically that causally-motivated regularization schemes (a) lead to more robust estimators that generalize well under distribution shift, and (b) have better finite sample efficiency compared to usual regularization schemes, even when no shortcut is present. Our analysis highlights important theoretical properties of training techniques commonly used in the causal inference, fairness, and disentanglement literatures. Our code is available at github.com/mymakar/causally_motivated_shortcut_removal
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.2/warc/CC-MAIN-20231205140836-20231205170836-00174.warc.gz
|
CC-MAIN-2023-50
| 1,288
| 3
|
https://www.experts-exchange.com/questions/23636414/How-to-configure-TCP-IP-protocol-without-NIC-driver.html
|
code
|
I'm trying to setup a basic test environment of a 180 day evaluation copy of Windows 2003 on my IBM ThinkPad T43p. This is obviously not a production setup. I'm just trying to get this configured so I can follow along in the Managing and Maintaining a Microsoft Windows Server 2003 Environment self-paced training kit Book.
I'm trying to Add a Role of Domain Controller, but I'm getting stuck at "You must configure the TCP/IP networking protocol". I'm not able to configure any TCP properties because their don't seem to be any NIC drivers for the T43p which support Windows 2003.
Even though my laptop doesn't seem to offer any drivers that support Windows 2003, is there anyway around this? Can i still get the Role of Domain Controller configured on this laptop?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488539764.83/warc/CC-MAIN-20210623165014-20210623195014-00144.warc.gz
|
CC-MAIN-2021-25
| 766
| 3
|
https://telecomtimes.com.au/rubrik-offers-fast-track-to-hybrid-cloud-launches-microsoft-azure-accelerator/
|
code
|
Palo Alto based cloud data management firm Rubrik has launched the Rubrik Accelerator for Microsoft Azure to offer enterprise customers a single solution to protect and manage data from on-premises to Microsoft Azure.
Rubrik Accelerator for Azure adds to the company’s existing offering for Microsoft customers, which features automated data protection for Microsoft Hyper-V, support for physical Windows and instant database recoveries with SQL Live Mount.
Gartner predicts cloud computing and services will be a US$300 billion business by 2021. Rubrik accelerates the cloud journey with a simple, unified solution for data protection and application mobility across data center to Azure.
“Every enterprise customer I speak with has cloud ambitions. However, many organizations are held back by complex legacy data management solutions that keep the cloud migration process out of reach,” said Mike Tornincasa, Executive Vice President, Worldwide Sales at Rubrik.
“The Rubrik Accelerator for Microsoft Azure makes it easy for enterprises to move to a hybrid cloud model, and in turn, innovate faster, be more productive and unlock cost-savings. Additionally, Rubrik offers customers the ability to manage their entire Microsoft investment on one platform, across on-premises and public cloud environments.”
“Rubrik’s Cloud Data Management platform allows customers to take full advantage of the security, durability, global availability, and scale of Microsoft Azure,” said Tad Brockway, General Manager, Azure Storage, and Azure Stack at Microsoft Corp.
The Rubrik Accelerator for Microsoft Azure offers enterprises:
- A fast-track to Azure success: Rubrik helps customers easily on-ramp to Azure by providing a single solution to protect and manage data across all environments. Rubrik customers automate archival to Azure for cost-effective long-term retention. As they advance in their cloud journey, they can quickly spin up applications in Azure for test/dev.
- Unprecedented management simplicity: Customers engage with the same easy-to-use Rubrik interface to manage applications on-premises, at the edge, and in the cloud. Users automate backup, recovery, and archival schedules via one SLA policy engine with just a few clicks, reducing daily management times from hours to minutes.
- Faster recovery with SQL Live Mount and global search: Customers can recover in minutes with Rubrik’s popular Live Mount solution for SQL, and locate files instantly with predictive global search that spans on-premises and cloud, including files, folders, filesets, virtual machine (VM), and database instances.
- Free CloudOn and Azure Credits: To reduce the risk of cloud migration, new users of Rubrik Accelerator for Microsoft Azure will receive 6 months of free Azure from Microsoft and 12 months of free CloudOn from Rubrik.
“At CDW, we specialize in helping our customers build cloud deployment strategies across Azure migrations, IaaS and cloud planning services engagements,” said Darin Mock, Director of Software Sales, CDW.
“We are seeing excitement within our software team stemming from partners creating software solutions together to solve complex customer business problems. Rubrik and Microsoft in particular, are successfully collaborating and we are very excited about the introduction of the Rubrik Accelerator for Microsoft Azure. I’m confident it will help our customers with their cloud journey.”
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703513062.16/warc/CC-MAIN-20210117143625-20210117173625-00608.warc.gz
|
CC-MAIN-2021-04
| 3,443
| 13
|
https://smartybro.com/2017/03/29/web-development-w-googles-go-golang-programming-language/
|
code
|
Advanced : Web Development w/ Google’s Go (golang) Programming Language | SmartyBro
29 Mar , 2017
The Go programming language was created by Google to do what Google does: performant web applications at scale.
Open-sourced in 2009 and reaching version one in 2012, the Go programming language is the best choice for web development programming today.
Ruby on Rails, Python, Django, Node.js, PHP, and ASP all fall short.
Now get Udemy Coupon 100% Off, all expire in few hours Hurry. you should always try to take Online Classes or Online Courses rather than Udemy Advanced : Web Development w/ Google’s Go (golang) Programming Language Download, as we update lots of resources every now and then.
how to create state: UUID’s, cookies, values in URL’s, security
how to create sessions: login, permissions, logout
how to expire a session
how to purchase a domain
how to deploy an application to Google Cloud
Amazon Web Services
how to use Amazon Web Services (AWS)
how to create a virtual linux machine on AWS EC2 (Elastic Cloud Compute)
how to use secure shell (SSH) to manage a virtual machine
how to use secure copy (SCP) to transfer files to a virtual machine
what load balancers are and how to use them on AWS
how to use MySQL on AWS
how to connect a MySQL workbench to AWS
how to use MongoDB & Go
MVC (Model View Controller) Design Pattern
understanding the MVC design pattern
using the MVC design pattern
virtual machines vs containers
understanding the benefits of using Docker
Docker images, Docker containers, and Docker registries
implementing Docker and Go
deploying Docker and Go
Google Cloud Storage
Google Cloud no-sql datastore
Google Cloud memcache
Google Cloud PAAS App Engine
Web Dev Toolkit
json.Marhsal & json.Unmarshal
json.Encode & json.Decode
Hash message authentication code (HMAC)
TLS & HTTPS
JSON with Go using Tags
a photo blog
a twitter clone
By the end of this course, you will have mastered the fundamentals of web development.
My name is Todd McLeod. I am tenured faculty in Computer Information Technology at Fresno City College and adjunct faculty in Computer Science at California State University Fresno. I have taught enough students over 17 years to know that by the end of this course, you will be an outstanding web developer.
You will have the best skills available today.
You will know the best way to do web development today.
You will have the hottest, most demanded, and highest paid skills in the marketplace.
Join me in this outstanding course. Come learn best practices for web development. Sign up for this course now and open doors to a great future.
Who is the target audience?
This is a university level introduction to web programming course.
This course is for individuals who know how to use the Go programming language.
This course is perfect for programmers wanting a thorough introduction to web development using the Go programming language.
This course is perfect for developers wanting to fill in gaps in their knowledge.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823872.13/warc/CC-MAIN-20181212112626-20181212134126-00211.warc.gz
|
CC-MAIN-2018-51
| 2,987
| 51
|
https://austinlaptop.com/insert-or-print-documents-to-onenote/
|
code
|
Before OneNote came along, I would typically attend a meeting, bring a pen, and take lots of notes right on the handout. Aahh, good times, right? Actually, a lot of that still goes on today. Look around you the next time you attend a meeting and see if you can spot one of these pre-historic note takers. I bet if you follow him/her around they would have a hard time finding their notes when they really need them.
Enter, the digital world. Now you have no excuses…because you have OneNote. You get the same level of functionality, (well, almost), as you would if you had brought that trusty old writing utensil with you. Yes, that means you can even take notes on a digital copy of the document. Just insert the document as a printout right onto the OneNote page surface before the meeting. Once there, you just begin taking notes like you would if you actually had the document in front of you in the meeting. After all, in reality…you do.
But, the beauty is that your notes are searchable. i.e. it’s easy to find them when you really need them. But did you know that the text inside the handout is searchable too. You see, when you insert a document as a printout, what you’re really doing is inserting a picture of each page of the handout onto the OneNote page surface. But how can a picture be searchable? OneNote uses Optical Character Recognition (OCR) to identify characters and words in a picture, then inserts them into the searchable index. So if you don’t remember what words you used when you took those notes, but happen to remember the subject of the meeting/class, just type in the search term and it finds it in the printout.
- To insert a file as a printout, click Insert -> Files as Printouts -> select the document you wish to print -> and click Insert. A set of printed pages will then appear in OneNote along with a copy of the file.
- You can also print a document from any printing Windows application, such as MS Word, Adobe Acrobat, Internet Explorer, etc. To do so, just go through your normal routine of printing a document, but select the Send to OneNote 2007 printer driver from amongst the current list of printer drivers, like so, (note: this feature is unavailable with Windows Vista 64-bit systems):
- Generally when printing a document to OneNote, it is automatically placed in the Unfiled Notes area, which means you will have to manually move it to another section if you don’t want it to remain there. However, you can customize where it goes by clicking Tools -> Options -> Send to OneNote -> then choose between any of the following options:
- New page in section: …Unfiled Notes.one (this is the default)
- New page in the current section (a new page is created at the end of the section where the printout will appear)
- On the current page (The printout appears beneath all your existing notes on the current page)
- One minor difference in using this method is that a copy of the file does not get embedded in your notes.
- Once the file has been inserted, you can take your notes right on top of the file’s pages.
- Since each page is treated as a picture, you can drag it around, resize it, etc.
- You can anchor the printout page to OneNote’s page surface by right-clicking on the picture -> Set Picture as Background.
- Once the printout is in OneNote, the text in the printed pages can be searched. This happens automatically, but it does take some time. If you need the text to become searchable immediately, you can right-click on the picture -> Make Text in Image Searchable -> then select the appropriate language.
- If you prefer to not have OneNote search for text in pictures you can disable the feature by clicking Tools -> Options -> Other -> Disable text recognition in pictures.
- In addition, the text found in the image can be copied and pasted elsewhere in OneNote. Simply right-click the picture -> Copy Text from Picture.
- One final note. The pages of the printout will be printed at the page size specified in the application they were printed from, (generally standard sized paper – 8.5″ x 11″). While you can affect the size of the printed pages in OneNote by adjusting their paper size in the application, sometimes it just simply won’t fit on your OneNote page surface.
For example, below on the left is a PowerPoint slide. The one on the right is a sample of how it prints to OneNote. You can see from the red outline that the page extends beyond the OneNote window borders. This can sometimes cause problems when attempting to take notes on the printout.
A while ago I created a powertoy called the OneNote Printout Manager to resolve this problem. Once pages have been printed to OneNote you can easily adjust their size, position, etc.
|So, you can make this…
||…look like this…|
- …with a simple click of a button.
If you insert or print files to OneNote, give this powertoy a try. Click here to download it. Just as an FYI, the download also contains a copy of the PowerPoint referenced in this blog. That way you can experiment by printing it to OneNote and running the powertoy.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487623942.48/warc/CC-MAIN-20210616124819-20210616154819-00134.warc.gz
|
CC-MAIN-2021-25
| 5,093
| 23
|
https://semantics.uchicago.edu/kennedy/classes/f06/syntax1.html
|
code
|
Department of Linguistics
Office hours Monday 9-11
Suwon Yoon (CA)
Department of Linguistics
Office hours Tuesday 2-3, Linguistics Department Seminar Room email
This is the first of three courses in formal syntax, designed to introduce students to the core empirical issues involved in developing a theory of the structure of human languages, and to familiarize them with the analytical tools involved in the investigation of this domain. The central topics of the fall quarter will include phrase structure and constituency, selection and subcategorization, argument structure, case, voice, expletives, and raising and control structures.
The written work for the course will consist of problems in syntactic analysis, designed to develop your skills in syntactic analysis, to familiarize you with the formal aspects of syntactic theory, and to help you learn how to develop and adapt a theory in light of data that challenges or extends a set of basic assumptions. The assignments will therefore both test your understanding of what we have covered and also serve to introduce new issues that will be discussed in subsequent classes. In some cases, you will not yet have the tools to handle a particular problem; your task here will be to figure out how to extend our system to deal with it. It is important to remember that there is often no `right' answer; what you should focus on is coming up with at least well-reasoned discussions of the problems you encounter in the exercises, and at best well-argued and clearly explained proposals for how to solve them. Clarity of discussion and completeness of argumentation are the two factors that we will be looking for when evaluating the assignments.
Assignments will be handed out at the end of class and due at the beginning of the next class. For the first two of weeks, we will have an assignment every day, and then we will move to one assignment per week during the third week of the class, for a total of eleven assignments over the course of the quarter. Our progress through the course and discussions in class will be driven largely by the assignments, therefore it is crucial that you turn them in at the beginning of class on the day they are due. Late assignments will not be accepted, however, I will drop the lowest grade (which may be a zero) from the first ten assignments when calculating your grade at the end of the quarter. The grade on the final assignment will not be dropped.
Finally, you are expected to do the work on your own.
Your evaluation will be based on performance on the assignments and participation in class.
There is no textbook for this class.
The following is a rough week-by-week plan for the course, though we may end up diverging from it a bit depending on the progress we make. Assignments will be downloadable from the website on the day that they are assigned.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100525.55/warc/CC-MAIN-20231204052342-20231204082342-00283.warc.gz
|
CC-MAIN-2023-50
| 2,858
| 12
|
https://www.itsournet.org/net-neutrality-and-seo/
|
code
|
Today we will try to understand the real ramifications of net neutrality for the SEO agency like Digital Sith.
To make it easier to understand, we have to explain what net neutrality is.
Basically, net neutrality is that you can essentially get access to the whole web through your provider (ISPs) without them trying to regulate it.
To make it simple, if for example you want to have access to Google and Instagram then you have to pay $10 a month to your ISP. However if you want to get access to more website (like twitter) you have to pay more, $50 a month. And if you want to get all websites the price will go up.
Net Neutrality deals with ISPs showing preference to content based on types of content and who owns the content.
What is the impact for Search Engine Optimization ?
If we don’t preserve an open, free and competitive Internet the SEO game will be rigged. If you have money and influence over the ISPs you will have a huge advantage.
The internet without Net neutrality isn’t really the internet and SEO wouldn’t be fair with less competition, less players and an inherent advantage for big, established and rich companies.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300573.3/warc/CC-MAIN-20220129062503-20220129092503-00567.warc.gz
|
CC-MAIN-2022-05
| 1,147
| 8
|
https://strutsidea.blogspot.com/2009/04/intellij-idea-scope-based-highlighting.html
|
code
|
One of the lesser known features is the ability to highlight certain scopes differently in IDEA's editors.
The feature can be accessed via Settings->IDE Settings->Editor->Colors & Fonts->Scope Based. Below the list of already (pre-)defined scopes, you can easily create new custom scopes via 'Edit Scopes...'-button.
Each scope can be assigned a distinct color/font attribute scheme - just like for different language elements.
I'm using this feature to quickly differentiate between "real" testing code and JUnit-classes (pattern: lib:org.junit..*):
More interesting setups than this (very) simplified example are possible, e.g. adding another scope for EasyMock, Spring's Assert, ..
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500154.33/warc/CC-MAIN-20230204205328-20230204235328-00225.warc.gz
|
CC-MAIN-2023-06
| 684
| 5
|
https://www.passionateinmarketing.com/enroll-now-top-nlp-certificate-courses-in-india/
|
code
|
As a subset of AI, natural language processing is one of the most widely used areas of machine learning. NLP focuses on teaching computers to understand and process large amounts of data written in natural human language.
Applied Natural Language Processing, Chennai Mathematical Institute: Prof. Taught by Ramasesan R, this course is intended for students at UG or PG level. Learners will gain knowledge on the basics of NLP, methods and techniques and gain the skills to use them in practical situations. It is possible to take this 12 week course online at NPTEL, but you will only get a certificate after writing a protected exam.
NLP Training with Intelipat Python: Intelipat NLP Training with Python and NLTK is designed by leading AI experts. By joining this NLP course, you will become proficient in text processing and text sorting using a machine learning algorithm. Additionally, you can design your text classifier with the help of practical performance sessions conducted at the end of each module in this NLP Certification Training.
E & ICT Academy, IIT Guwahati: The certification for the Artificial Intelligence and Machine Learning Program is designed to provide the best learning results for E&ICT Academy, IIT Guwahati and industry leaders with excellent Artificial Intelligence and machine learning. This 9-month comprehensive program will help you prepare for the roles of Data Scientist, Data Analyst, Machine Learning Engineer and AI Engineer. This course will enhance your basic skills in artificial intelligence.
Microsoft: Explore Natural Language Processing This is a beginner-level NLP course that focuses on teaching NLP basics using the Microsoft Azure platform. Azure offers a wide range of services, including text analytics, translation, and language comprehension, making it easy to develop NLP applications. This 2-hour course includes four modules: Analyze text using the text analytics service, identify speech and synchronize, translate text and speech, and create a language model with language comprehension.
PG Certification in Machine Learning and NLP (Upgrade): This short (six month) course is offered to professionals working on the upgrade. This course covers more than 250 hours and consists of five modules – Data Science Toolkit, Statistics, Exploratory Data Analytics, Machine Learning, Machine Learning II, and Natural Language Processing. Learners also explore tools such as Python, NLTK, Pandas, Nambi, Sickit-Lane, MySQL, and Excel. In addition, the course includes five industry projects, case studies, and assignments.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358688.35/warc/CC-MAIN-20211129044311-20211129074311-00161.warc.gz
|
CC-MAIN-2021-49
| 2,576
| 6
|
https://brookspeppin.com/2021/10/20/upgrade-tpm-2-0-dell/
|
code
|
With Windows 11’s new hardware requirement of TPM 2.0, many organizations are scrambling to get their existing systems upgraded to TPM 2.0. The good news is that this all can be done remotely through most enterprise management tools (MEMCM, BigFix, Workspace ONE, etc). This blog will cover the exact steps on how to successfully upgrade TPM 1.2 to 2.0 on Dell Systems.
- Download Dell Command Configure (CCTK). I’m using version 4.6 for this blog.
- Download Dell TPM 2.0 Firmware upgrade tool. I’m using V3 for this blog (Released Oct 1, 2021).
- Compatible Dell Hardware. Go here for the list.
- System upgraded to the latest BIOS
- Windows 10 system running in UEFI mode
- BitLocker Encryption
Prepare the System
I’ll be going through these steps manually, but you can take these and adapt them to your management tool of choice.
While most of these steps are included in Dell’s knowledge article, I found it lacking a few details. Also, in my environment, the WMI command was required to run as simply running “Clear-TPM” didn’t get the job done.
Copy CCTK and TPM Firmware update Files
Download and install Dell Command Configure (CCTK). It should extract all of the files to C:\Program Files (x86)\Dell\Command Configure.
- Copy the contents inside of the “X86_64” folder
- Place contents onto target client into a temp folder. Let’s use C:\CCTK.
- Also put the TPM firmware tool, DellTpm2.0_Fw22.214.171.124_V3_64.exe, into that same folder for simplicity. It should look like this afterwards:
NOTE: You don’t actually need the batch files here. Those are only for adding CCTK into a WinPE environment for bare metal imaging. Feel free to leave those out of this folder if you prefer.
Suspend Encryption (BitLocker)
The assumption here is that you are using BitLocker for encryption with TPM. You will need to suspend BitLocker so that it doesn’t throw your system into BitLocker recovery mode. If you have third-party encryption that leverages TPM, you’ll need to engage the vendor on the proper steps.
Additionally, if you have a third-party vendor that manages BitLocker you may want to stop that service temporarily so that it doesn’t auto-resume. For example, here is how you can stop the McAfee MNE Service in PowerShell:
Get-Service -DisplayName "McAfee Management of Native Encryption Service" | Stop-Service -Force
Then to suspend BitLocker, run this PowerShell:
Suspend-BitLocker -MountPoint "C:" -RebootCount 1
And finally, we’ll need to disable “TPMAutoprovisioning” so that Windows doesn’t automatically take over ownership. You can do this by running:
Clearing the TPM
Now we need to run a few commands in CCTK in order to prepare the TPM chip for the upgrade.
Set a temporary BIOS password if you don’t already have one set. This is required in order to run the TPM PPI Clear Override command:
c:\cctk\CCTK.exe --SetupPwd=Colorado -l "%TEMP%\TPM-Settings.log"
Then set TPMPPIClearOverride to enabled. This allows you to remotely clear the TPM without physical interaction.
c:\cctk\CCTK.exe --TpmPpiClearOverride=Enabled --SetupPwd=Colorado -l "%TEMP%\TPM-Settings.log"
Then we need to clear the TPM. Normally you can just run the Clear-TPM PowerShell command. In my environment, I kept running to this error:
Clear-TPM: An owner authorization value is required to be applied
We tried tons of different things in order to fix this error, but we were never able to get it working. So instead, we had to call this command via WMI and it worked:
(get-wmiObject -class Win32_Tpm -namespace root\cimv2\security\microsofttpm).SetPhysicalPresenceRequest(22)
If you look at the WMI class documentation for this, you can see that “22” corresponds to:
Enable + Activate + Clear + Enable + Activate
Enable, activate, and clear the TPM, and then enable and reactivate the TPM.
Now, reboot the system.
Here are all of the commands in one place:
#Prep for TPM Upgrade #Stop MNE Service Get-Service -DisplayName "McAfee Management of Native Encryption Service" | Stop-Service -Force #Suspend BitLocker Suspend-BitLocker -MountPoint "C:" -RebootCount 1 #Disable TPM Auto Provisioning Disable-TpmAutoProvisioning #Set BIOS Password c:\cctk\CCTK.exe --SetupPwd=Colorado -l "%TEMP%\TPM-Settings.log" #Enable TPM PPI Clear Override c:\cctk\CCTK.exe --TpmPpiClearOverride=Enabled --SetupPwd=Colorado -l "%TEMP%\TPM-Settings.log" #Clear TPM (get-wmiObject -class Win32_Tpm -namespace root\cimv2\security\microsofttpm).SetPhysicalPresenceRequest(22) #Restart Computer Restart-Computer
Upgrade TPM Firmware from 1.2 to 2.0
After the system reboots, the TPM has been cleared and TPMAutoprovisioning disabled so Windows won’t take over ownership.
Next, we need to pause BitLocker management service again (if applicable) as well as suspend BitLocker. Then we just need to flash the TPM chip by running this command:
C:\CCTK\DellTpm2.0_Fw126.96.36.199_V3_64.exe /s /forceit /p=Colorado -l "%TEMP%\TPM-Settings.log"
You’ll note I am using an undocumented switch called “/forceit” instead of just the regular “/f”. We found a few instances where “/f” didn’t fully force the upgrade. There are a few other commands you can run against this exe. Here they are for reference:
Reboot the machine. The TPM should get successfully upgraded to 2.0 without any physical interaction. Here are the full steps:
#TPM 2.0 Upgrade Steps #Stop MNE Service Get-Service -DisplayName "McAfee Management of Native Encryption Service" | Stop-Service -Force #Suspend BitLocker Suspend-BitLocker -MountPoint "C:" -RebootCount 1 #Flash TPM chip to 2.0 C:\CCTK\DellTpm2.0_Fw188.8.131.52_V3_64.exe /s /forceit /p=Colorado -l "%TEMP%\TPM-Settings.log" #Restart Computer Restart-Computer
Post Upgrade Steps
After the machine comes back up, verify that TPM has been upgraded to 2.0 by launching TPM.msc or by running Get-TPM in PowerShell.
Upgrade complete! Now we just need to reverse the commands we ran in the prep stage:
#Post Upgrade Steps #Disable TPMPpiClearOverride c:\cctk\CCTK.exe --TpmPpiClearOverride=Disabled --SetupPwd=Colorado -l "%TEMP%\TPM-Settings.log" #Remove BIOS password c:\cctk\CCTK.exe --SetupPwd= -ValSetupPwd=Colorado -l "%TEMP%\TPM-Settings.log" #Enable TPM Auto Provisioning Enable-TpmAutoProvisioning #Re-Initialize TPM Initialize-TPM #Resume BitLocker Resume-BitLocker C:
After putting these pieces together, you are well on your way toward upgrading all eligible systems to TPM 2.0. This not only protects them from some of the known vulnerabilities of TPM 1.2, but it paves the way for upgrading to Windows 11.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506329.15/warc/CC-MAIN-20230922034112-20230922064112-00116.warc.gz
|
CC-MAIN-2023-40
| 6,569
| 51
|
http://cellprofiler.org/manuals/current/MeasureObjectIntensity.html
|
code
|
Measure Object Intensity
measures several intensity features for identified objects.
Given an image with objects identified (e.g. nuclei or cells), this module extracts intensity features for each object based on one or more corresponding grayscale images. Measurements are recorded for each object.
Intensity measurements are made for all combinations of the images and objects entered. If you want only specific image/object measurements, you can use multiple MeasureObjectIntensity modules for each group of measurements desired.
Note that for publication purposes, the units of intensity from microscopy images are usually described as "Intensity units" or "Arbitrary intensity units" since microscopes are not calibrated to an absolute scale. Also, it is important to note whether you are reporting either the mean or the integrated intensity, so specify "Mean intensity units" or "Integrated intensity units" accordingly.
Keep in mind that the default behavior in CellProfiler is to rescale the image intensity from 0 to 1 by dividing all pixels in the image by the maximum possible intensity value. This "maxmimum possible" value is defined by the "Set intensity range from" setting in NamesAndTypes; see the help for that setting for more details.
- IntegratedIntensity: The sum of the pixel intensities within an object.
- MeanIntensity: The average pixel intensity within an object.
- StdIntensity: The standard deviation of the pixel intensities within an object.
- MaxIntensity: The maximal pixel intensity within an object.
- MinIntensity: The minimal pixel intensity within an object.
- IntegratedIntensityEdge: The sum of the edge pixel intensities of an object.
- MeanIntensityEdge: The average edge pixel intensity of an object.
- StdIntensityEdge: The standard deviation of the edge pixel intensities of an object.
- MaxIntensityEdge: The maximal edge pixel intensity of an object.
- MinIntensityEdge: The minimal edge pixel intensity of an object.
- MassDisplacement: The distance between the centers of gravity in the gray-level representation of the object and the binary representation of the object.
- LowerQuartileIntensity: The intensity value of the pixel for which 25% of the pixels in the object have lower values.
- MedianIntensity: The median intensity value within the object
- MADIntensity: The median absolute deviation (MAD) value of the intensities within the object. The MAD is defined as the median(|xi - median(x)|).
- UpperQuartileIntensity: The intensity value of the pixel for which 75% of the pixels in the object have lower values.
- Location_CenterMassIntensity_X, Location_CenterMassIntensity_Y: The pixel (X,Y) coordinates of the intensity weighted centroid (= center of mass = first moment) of all pixels within the object.
- Location_MaxIntensity_X, Location_MaxIntensity_Y: The pixel (X,Y) coordinates of the pixel with the maximum intensity within the object.
See also NamesAndTypes, MeasureImageIntensity.
Select an image to measure
Select the grayscale images whose intensity you want to measure.
Select objects to measure
Select the objects whose intensities you want to measure.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804610.37/warc/CC-MAIN-20171118040756-20171118060756-00622.warc.gz
|
CC-MAIN-2017-47
| 3,132
| 28
|
https://zennoscript.com/en/shop/templates/account-creators-posting/bulletin-boards/rabota7ru-poster
|
code
|
Currently, the template is not relevant and does not work.
Job Posting on rabota7.ru
Template opens rabota7.ru create new account or login with existing one, solves Captcha and confirms registration from email account, next opens – New Vacancy category, uploads logo, fills up all required fields for job posting. All fields support Spintax. It is possible to upload random logo from folder or specified one. Besides this you can mix up latin charactes to ad which visual looks the same as Russian ones and pause between profile actions and ads posting. Can refresh previously created ads.
Execution Count: -1
Max Number of Threads: Unlimited
File with emails accounts. Save in such format firstname.lastname@example.org:password
Any email provider with POP3 and IMAP is supported.
Profiles are taken with removal.
Ad description and such.
Cell S - Logo. Specify file name for an upload, (Example:photo.jpg), for random pic from photo folder type rnd, it's also possible to specify folder for random image - folder\rnd, if you wish not to upload logo just leave cell empty.
When posting first line from file is taken with the removal. There is a checkbox in template input settings that allows to save back taken line to the end of the list.
Cells marked with * -- must be filled or template simply won’t finish up the job.
Specify profiles to post ads from, save in such format – login:password.
Profiles are taken one by one with removal from the first line and saved to the end of the file.
File with full path to bat files
In case if this file is empty, template will get all files from BAT folder and place them inside.
Later files are used interchangeably.
To add a new file to the list, enter a new line the full path to the file or clear the list template to automatically collect new paths to all files.
Folder with images for ad.
Taken according to data.xlsx file settings without removal
File with reports on posted jobs.
Has this formatting:
Login:Pass:Posting end time:date:ip:number of posted ads.
In case profile reached free ads limit you will see message about this in the file.
In case template execution is interrupted by error (for example wrong filled files etc), it will automatically created report files in this folder. To fix your issue asap, you have to do following steps:
If you facing issue for the first time, run template in single thread without proxy and check in browser Instance on which step exactly does this error happens. Describe it as best as you can and send this folder files zipped to email@example.com
If you messaged as before about any issue with this template make sure to delete content of error folder before running it and sending report to us.
By doing these steps you really speed up process of finding the solution for your issue!
Input settings Zennoposter Template:
1. Captcha solving module selection.
2. Proxy file path (in case proxy will be used from proxy checker, or won't be used at all leave blank).
3. Posting from readymade profiles.
4.Save data back to data.xlsx file.
5.Number of ads per single authorization. 3 is a limit. In case limit of free ads is reached for a profile you it will be written to report file
6.Add latin characters to add text.
7.Pause between profiles
8.Pause between ads.
9.User BAT file or not.
10. Only UP. If this option is enabled, then after the upgrade Ad (s), the template stops.
11. Number of UPs for published ads. If you don’t need to refresh your ads just leave this field blank.
12. Project direcrory.
Buying a template you get a MONTH of FREE tech support.
Take in attention if you buying a subscription based template, you only have rights to use it during subscription period.
All templates required latest Zennoposter or Zennobox to run. We don't gurantee their execution on any others.
Stability and success of work of a template depends on proxy quality that using during his work
Template is bound with you ZennoPoster license. You cannot edit or resell it.
Any Template can be modified to your needs, modification cost will be highly depend on the complexity of desired changes.
Please use order form on Order Template page.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816832.57/warc/CC-MAIN-20240413180040-20240413210040-00746.warc.gz
|
CC-MAIN-2024-18
| 4,143
| 48
|
https://www.aps.systems/post/
|
code
|
Sonic Pi is an Integrated Development Environment (IDE) for writing music in Ruby. I write code with Ruby using the Sonic Pi IDE and sample myself screaming over it with Audacity under the artist name Messica Arson. The sound I create is very much inspired by the strange sounds of noise music combined with my screams I perfected while fronting a punk band.
In this tutorial we’ll walk through how to create this song together.
Github was launched in 2008. If your software engineering career, like mine, is no older than Github, then Git may be the only version control software you have ever used. While people sometimes grouse about its steep learning curve or unintuitive interface, Git has become everyone’s go-to for version control. In Stack Overflow’s 2015 developer survey, 69.3% of respondents used Git, almost twice as many as used the second-most-popular version control system, Subversion.
Flutter, Google’s open-source platform for developing high-performance mobile applications that run on multiple operating systems from the same codebase, sports a modern reactive architecture in addition to an attractive widget library. This talk covers how to adapt state management strategies like Rx and Redux for use with your Flutter application.
Carrier Grade NAT, (CGN, CGNAT, CG-NAT) is also known as Large Scale NAT (LSN). Like regular Network Address Translation (NAT), it shares an outside IP address among multiple inside local (private) IP addresses. This feature is utilized to alleviate the IPv4 address exhaustion. The difference with the legacy NAT solutions is that CGN provides a standardized (RFC 6264, draft-ietf-behave-lsn-requirements-09) transparent translation scheme (through EIM, EIF, hairpinning), and the ability to limit the resource usage per connection.
I have 3 physical machines plugged into 3 switches, with all switches connected to each other. I don’t have a physical router/gateway. Instead, a Linux virtual machine handles the IPv4 NAT, IPv6 announcements, DHCP, DNS, etc, and that Linux VM floats between the 3 machines as needed, including live migration during maintenance.
My 4 Wifi APs are PoE-powered from the two switches. I have two ISPs.
I have two UPSes and two PDUs powering separate halves of the gear, and separate ISPs, giving me about 35-45 minutes of runtime (and thus Internet) during a power outage.
Internet ha viscut aquesta tardor a Catalunya un episodi de repressió i resistència sense precedents a Europa. És la lluita entre un estat espanyol emparat per la justícia i un ciberactivisme voluntari que espontàniament pren el relleu de la Generalitat per construir a contrarellotge el sistema informàtic de l’1 d’octubre. El joc del gat i la rata culmina la jornada del referèndum quan té lloc a la xarxa una autèntica ciberguerra.
Kotlin is popular, Kotlin is trendy. Kotlin gives you compile-time null-safety and less boilerplate. Naturally, it’s better than Java. You should switch to Kotlin or die as a legacy coder. Hold on, or maybe you shouldn’t? Before you start writing in Kotlin, read the story of one project. The story about quirks and obstacles becoming so annoying that we decided to rewrite.
This past week we started using Google Flutter to build a new mobile app for Invoice Ninja, I thought it may be helpful to share some of the things we’ve learned early on.
Nearly 14 years since the first public version of Rails, it’s our pleasure to release yet another major upgrade to the framework in the form of 5.2.0 final. We’ve been diligently polishing Active Storage and the other big new components for stable release, and it’s great to see so many applications already running the release candidates in production. Basecamp and Shopify have both been running Rails 5.2.0 for quite a while.
The 6.0.0 release of Angular is here! This is a major release focused less on the underlying framework, and more on the toolchain and on making it easier to move quickly with Angular in the future.
As a part of this release, we are synchronizing the major versions going forward for the framework packages (@angular/core, @angular/common, @angular/compiler, etc), the Angular CLI, and Angular Material + CDK. All are releasing as 6.
Welcome to 2018, where some of the most exciting innovations are happening in the compiler space. Sure, there’s things like AR, VR, and machine learning on the bleeding edge, but don’t discount those technologies as old as computing itself, the software responsible for translating the source code we write into something the machine can actually understand. Much of this resurgence is thanks to LLVM, the modular compiler infrastructure project. Why is it such a big deal?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221209884.38/warc/CC-MAIN-20180815043905-20180815063905-00563.warc.gz
|
CC-MAIN-2018-34
| 4,717
| 15
|
https://www.codepath.org/courses?utm_source=fb&utm_medium=social&utm_campaign=rona
|
code
|
Courses for Tech Excellence
At CodePath, our courses go beyond theory. They’re created for college students like you, developed by software engineers, are applicable to the real-world scenarios you’ll experience once hired—and are designed to prepare you for a successful tech career. Most of all, they’re provided at no cost. Everyone should have access to software engineering careers, no matter their background.
Browse our course catalog below.
Explore the complex field of digital security with the Cybersecurity pathway! Learn about real-world tools and attacks, empowering you to confidently discuss the basics of different areas of cybersecurity. Next, deep dive into the world of blue team security, using industry-proven techniques to detect, analyze, and respond to security threats.
Pathway: iOS Development
Experience building iOS applications from scratch using Apple's native IDE (Xcode) and programming language (Swift) in a project-based journey of iOS development. Build your own custom app by the end of the semester. You'll begin by creating engaging user interfaces (UIs), then connect that UI with logic and cloud-based APIs to build out anything you can imagine.
Pathway: Android Development
Build your own fully-functional apps with the Android pathway. Students learn the basics of Android development including the IDEs, languages, and tools real-world Android engineers use. Then learn the basics of making single-page apps that compute, list, and even query the internet for data.
Pathway: Web Development
Dive into full-stack development with the Web Development pathway. Start your journey by structuring and styling the look and feel of your website, then add interactive elements like videos, forms, and animations to really bring it to life. Level up your skills in the later courses with the toolbox of an advanced developer. You will build fast, responsive websites with a personalized user experience from account signup to profile customization to content creation - an experience that persists each time a user logs in.
Technical Interview Prep
Ace the technical interview with this course. In 10-weeks, students will gain a preview of real-world software topics and be prepared to solve challenging algorithmic problems in whiteboard and coding interviews. Whether you're beginning your search for an internship or you're about to try to land your first full-time SWE position in the industry, this is the course for you.
Salesforce Futureforce Tech Launchpad
The Futureforce Tech Launchpad, a Salesforce pre-internship program by CodePath, is back for its third summer. This immersive experience in full-stack web development, coupled with 1:1 mentorship, readies students for internships. Held at Salesforce headquarters in San Francisco, it offers firsthand exposure to the world's #1 CRM.
Applications Opening Soon
Intro to Software Engineering
Introduces software engineering and computer science concepts to students with little to no programming experience. Primarily taught in Python programming language and focuses on beginner topics from conditional, loops, big O notation, dictionaries, strings, and arrays. Designed for first and second-year college students and does not require any previous coding experience.
Summer Internship for Tech Excellence
Students will learn full-stack web development in this pre-internship program brought to you by top tech companies such as Course Hero. Students will be paid to participate in this program and it will take virtually. Rising juniors only.
Why You’ll Want to Be
a CodePath Student
Hone Your Skills
Our curriculum was originally designed for professional software engineers, and it continues to be refined by industry experts. Each semester-long CodePath course is conducted in a custom learning platform that leverages GitHub, and is designed so students learn the latest technologies and skills that companies are looking for.
Expand Your Portfolio
Expand your GitHub portfolio with work from CodePath courses, like fully functional mobile apps, Capture the Flag (CTF) and Security Shepherd assignments, and more.
Get Access to Today’s Tech Leaders
As a CodePath student, you’ll receive regular invites to attend industry panels and workshops, featuring companies like SpaceX, Salesforce, Walmart, and more. Past speakers include Dwana Franklin-Davis (MasterCard), Michael Seibel (Y Combinator), Nick Caldwell (Twitter), and Steve Huffman (Reddit). Additionally, the instructors you work with every week are accomplished, diverse software engineers with thriving careers at companies like Meta, Google, InstaCart and TikTok.
Join the Tech Community
For CS students who are the first in their family to attend college, or the only one among their peers studying software engineering, the journey can feel especially daunting. CodePath has a vibrant online community of 10,000 software engineers, computer science students, and alumni with diverse backgrounds who are eager to offer their support and encouragement. As a student, you’ll automatically join our Slack community, where you can ask any question you want and receive an answer quickly.
Tech Excellence for All
At CodePath, we believe access to relevant, hands-on technical training, career guidance, mentors, and community—created by engineers, for engineers—can help give tomorrow’s technology leaders the edge they need to launch successful, life-changing careers. As a 501 (c)(3) nonprofit, we strive to increase diversity in tech by making successful, meaningful careers in software engineering accessible to all, and by transforming college Computer Science education to make students career-ready.
Our programming centers the needs and success of Black, Indigenous, Latinx, and low-income Computer Science students.
CodePath offers industry-backed courses at over 70 universities and colleges. Through our partnerships with campuses across the country—state universities, HBCUs, HSIs, city-colleges, and schools with large online communities—we meet students where they are.
Bring CodePath to Your Campus
Tech Fellows are students just like you who are trained by CodePath to deliver industry-supported courses at their schools. Besides leveling up your campus’ knowledge of in-demand skills, you’ll master your technical skills, become a local influencer, and play an active role in advancing diversity in tech. Plus, you’ll become part of the CodePath community—which gives you priority access to mentorship, career fairs, scholarships, conferences, and more.
Hear from Alumni
"I am thrilled to announce that I have accepted an offer from UnitedHealth Group for Optum Technology Development Program Internship. I would like to thank CodePath.org for helping with preparations for technical interviews and building on my professional development."
"This is one of the classes that I’ve actually looked forward to every week! I was interested in diving into app development and CodePath really taught me everything I need to know for iOS development. The structure and format of the class were very easy to follow along making it a great learning experience. Working with people with the same goals as me was inspiring!"
"CodePath helped me improve my skills in mobile app development and understand the numerous factors one must consider when building an app. The labs were not only fun to do but also provided a challenge. I also appreciated the collaborative component of the class as it allowed me to interact with people from across the country."
"Becoming a participant for CodePath has been the best thing that happened to me during my college so far. I learned the fundamentals of iOS mobile development. This program awakens an interest in mobile development which l hope to explore more. The course structure was challenging at the same time interesting. There were times when l would get stuck. In those times the teaching assistants were always ready to help. Being a participant for code gave me the wings I need to fly in my career."
"Taking the CodePath Mobile App Design course was a great experience. Building an app from the ground up has helped spark my interest in Mobile Development as I learned about key concepts such as UI’s, passing and saving data, libraries, animations, and more. The CodePath team was incredibly helpful and responsive in making sure we got the help we needed to succeed. In addition, we were given the opportunity to grow our network by attending industry panels with top professionals. Thank you CodePath!"
"Prior to taking the course, Android development always seemed so foreign to me in comparison to other projects I have done. I was not around very many people that had any experience with it, so even though I had an interest in it, I did not really know where to start with learning it. What I like about CodePath is that the course gave me not just an understanding of the basic concepts in Android development, but also the caveats and utilities of different techniques. It finally allowed me to gain the tools I needed to learn on my own, and I am sincerely thankful for that."
"I’ve always been fascinated with the hackers' world. It was lucky of me, against many other applicants, to be accepted into this course. Although it could be a bit challenging without prior basic knowledge, the lectures are quite informative. Every week we get to explore new topics and hacking concepts with practice. I believe some problems are close simulations of real-world scenarios. To anyone pursuing a career path in Cybersecurity, this course truly aligns with your passion."
"For my cohort specifically, I am very happy that I am learning essentially first-hand what "hacking" really is including cybersecurity fundamentals. Also, the teachers have been amazing and have gone the extra-mile to help me and the other classmates countless amounts of times already."
"CodePath was such a fun experience and gave me hands-on skills that I plan to use working on my own IOS apps or even one day working in the industry. It was extremely well-paced and I really enjoyed working with my classmate to create an app of our own. I would definitely recommend it to anybody who wants to learn how to create apps."
"I got a first hand view of what software engineering and app development looked like. CodePath’s iOS course gave us the tools needed to create an app, from the design, and planning stages to the actual implementation of the app. I am grateful for the learning opportunity given to me and hope to apply those skills as an engineer."
"The CodePath iOS course was structured in a way that facilitates learning while providing the support needed. Concepts covered in the course are mostly fundamental to iOS development and were frequently employed in iOS apps. Overall, it is a valuable learning experience in which you can learn through hand-on activities."
"CodePath's Android Application Development class was one of the most rewarding classes I have ever taken. Once we started working on the group project in the second half of the course I learned so much and felt positively challenged. For every idea my team wanted to implement on our app we looked at tutorials and learned on our own and that has made me confident in my ability to learn and implement new packages and tools. The video walkthroughs and the availability of the TAs made me feel really supported and the project-based nature of the course gave me the capability to work on things at my own pace. I recommend this course to anyone who is hungry to gain more skills and is willing to dedicate the time. You will not regret it!"
"CodePath helped me see a whole new world that I never knew existed. Today, after overcoming many challenges, I have completed the Android Development course, and I have a solid vision for my future as a Programmer."
"The Android App Development course has helped me in more ways than I had imagined. In addition to creating some wonderful apps, I learnt to collaborate with my team on GitHub to create a group project. The availability of online tech support enabled me to work in my own time and my tech-fellows made the weekly lab assignments interesting and fun. In fact, the skills that I acquired in this course have helped me land a summer internship."
"My experience with CodePath at UCI was one of the best decisions I’ve ever made. When I joined and saw that my instructors were just other students I knew this would be an environment where I would be able to learn without the stresses of school. Throughout the course, I was able to learn valuable skills about app development and industry skills that are not usually part of the school curriculum. During the end of the course, I got the opportunity to build my own app and potentially showcase it to companies. Apart from the classes, CodePath hosted a networking event where I got the opportunity to speak with industry professionals for the first time without the crowds of events like job fairs and improve my networking skills. "
"I still remember the traumatizing experience I had when I had the first technical interview two years ago. Now with offers from major tech companies in hand, I really thank CodePath for preparing me not only as a better candidate, but also as a better communicator and a problem solver. The structure of the course and the quality contents are very rare to find, and it is unbelievable how I grew so much during the summer with nothing having to be paid out of my pocket."
"After two years of going through the recruiting cycle and leaving with nothing but rejections, the Summer Interview Prep Course equipped me with the necessary skillset to land offers from five different companies. Thanks to CodePath, I will be interning at Twitter next summer!"
"CodePath Android University was a priceless experience. The 6 weeks totally changed my perspective as an engineer and student. The hands-on assignments, helpful TA’s and and friendly environment created the perfect atmosphere for learning and building. I’m now more confident about communicating concepts with others, approaching recruiters and building my own Android apps!"
"I had a wonderful experience getting started with iOS development with CodePath! The cohort was greatly supportive and the instructors were very engaging. I really enjoyed the weekly hands-on projects which came with detailed video walkthroughs and just the right amount of scaffolding."
"CodePath laid the foundation for me to explore mobile development from ground up, whilst providing students with an extensive support system. The labs and assignments were flexible, hands-on, and mimicked real life projects using real data. I find that it’s playing a significant role in my decision to pick a concentration area in my own major!"
"CodePath is an awesome organization that provides a supportive community where scholars could have an opportunity to learn at a steady pace with confidence."
"CodePath’s project-based approach to learning helped me learn at an astounding rate into the world of iOS development. Its hands on approach to learning is invaluable and does not compare to any resource available. An amazing experience for the hands-on type of person."
"I have been enrolled in three CodePath courses. This program has singlehandedly changed my programming experience for the better. I would not have gotten the experience I gained from these courses from anywhere else. Sign up for a CodePath course, you will not regret it!"
"My experience at CodePath was by far the most significant experience I’ve had in college. Before CodePath I had no idea what I wanted to do with tech I just knew I wanted to be in it. The future was still very hazy and I was getting anxiety because I was worried I wasn’t going to succeed despite being at a great university. After CodePath, I continued working on my final project for that class and applied to be part of The Basement at UCSD’s summer incubator program where I evolved my project into a startup. I have never been more confident in what I want to do now and it’s all thanks to CodePath."
"The focus on hands-on activities and real-life scenarios made for an awesome learning experience. I appreciated how the course was structured in a way that reflected the nature of Cybersecurity."
"I met one of my co-founders during the iOS group project. CodePath gave us the tools necessary to turn our dream into a reality and as a result, we co-founded KindMind, a mental health tech start-up."
"Codepath's course taught me crucial concepts that I would otherwise not have been exposed to. The mentors at Codepath are extremely knowledgeable and helpful, and I have received much guidance from them. The program is extremely holistic and covers essential yet often overlooked parts of getting a job, such as salary negotiation. I highly recommend Codepath's courses."
"When I first joined CodePath I just thought it's just another class, but I was really surprised about everything! everything is organized to be easy to understand and everyone is motivating me to succeed, The most thing I liked about CodePath is that the class doesn't only teach you scientific concepts but teach you how to navigate the whole process of landing a job in the Tech industry which includes teaching concepts, behavioral questions, negotiating an offer and communicating with recruiters which usually doesn't get taught in a university class and all that is being taught by instructors from top tech companies! Thank you CodePath! It's been an amazing experience."
"My goal has always been to make a positive impact in the world through technology, and CodePath has given me the support and platform to do just that. Within a year, I have combined my passion for teaching and my love for mobile development while working alongside some of the most outstanding engineers in the industry. I completed the Android Development course this past Spring. Since then, I have built an award-winning mobile application, reached Top 10 in one of the country's largest hackathons, and worked at Meta (Facebook) as an Android Intern Lead by helping to instruct and facilitate the diverse Facebook University Program for incoming interns. In addition, I am currently working as an Android Tutor for Google's pilot program, which aims to increase Black representation in tech. I can say, without a doubt, that I have become a better engineer thanks to CodePath."
"The support that CodePath is able to give students is invaluable. Through their guidance, I found the education and career path I want to pursue in computer science. During the program, I built an award-winning mobile application, secured technical internships at Meta (formerly known as Facebook), Amazon and other high growth tech companies. SXSW EDU 2022 selected me to speak. Also, in March, I will start working full-time as a software engineer, while I continue to pursue my bachelor’s degree."
"When I decided to leave behind my country and my original field of Fashion Design, come to the United States and go back to school for computer science, I felt very behind and quite lost, to say the least. CodePath's Technical Interview Prep Course gave me the knowledge, support, and access to inspiring figures I needed in order to find my place in the field and the confidence I lacked in my technical interviewing skills. I am now looking forward to my second Software Engineering internship at Microsoft for summer 2022, and I know I could not have done it so early on in my CS degree without CodePath. With their help, anyone can reach that and so much more!"
"Over the summer, I had the chance to take part in CodePath's Intermediate Software Engineering Prep class. This was a 12-week intensive class where I got the opportunity to learn the fundamentals of data structures and algorithms and apply this knowledge in solving exciting and challenging problems. Special thanks to my instructors for making this possible. Thanks to CodePath, I feel more confident in my interviewing skills now."
"I learned how important communication is not only in your career but in life in general. I communicated with instructors, mentors, peers in the program, and invitees who taught us about a specific part of tech. I learned that there are so many diverse careers in tech, whether you like art, research, data/numbers, security, etc. Talking to everyone I encountered during this program helped broaden my mind for the numerous opportunities I have in this industry and helped me realize how important diversity is in my life."
"I'd like to personally thank CodePath for being such a great organization and providing students with such wonderful opportunities. From its classes, developing my technical skills and preparing me for software engineering positions, to its events like the Virtual Career Fairs, where I was able to directly meet and interact with recruiters and managers from various top tech companies, as well as progressing deep into the interview process with several of them. I would eventually end up receiving an offer from MathWorks to be a part of their EDG program as a software engineer. Without CodePath and its Virtual Career Fair, I would not have known about these positions or had the opportunity to establish relationships with these companies. I owe CodePath a tremendous amount of gratitude for the position I am in today!"
"The SITE program has helped me realize that I wanted to go into full-stack development and really solidified the path in software engineering I wanted to pursue."
“I am extremely fortunate and excited to announce that I will be joining the JPMorgan Chase team as a software Engineer this upcoming summer!!
I also had a great experience learning and earning my CodePath.org Honors Certificate for Android Development”
"I'm one step closer to making my dream a reality! I'm so excited to announce that I'll be joining LinkedIn as a Machine Learning Intern this summer! Thank you CodePath.org for helping me develop my craft as a developer through your SITE program and for the technical prep course over the summer."
“With offers from major tech companies in hand, I really thank CodePath for preparing me not only as a better candidate, but also as a better communicator and a problem solver. The structure of the course and the quality contents are very rare to find, and it is unbelievable how I grew so much during the summer with nothing having to be paid out of my pocket.”
Hear from Employers
"We had a great experience meeting CodePath students. The Virtual Career Fair was very effective in providing a space for us to meet a large, impressive group of students with diverse backgrounds."
"CodePath is a great organization for students to connect directly with employers. We've had great success hiring and have been impressed with the student's preparedness. We're very excited for our continued partnership! "
How much do these courses cost?
The class is provided at no cost for students. We work closely with a number of industry partners who help us cover the costs of the program.
Who teaches the courses?
Depending on the course you are enrolled in, our instructors include engineering professionals from major technology companies, start-ups, and academia, such as Google, Meta, or Stanford University. We also carefully select and mentor a group of high-performing student leaders (Tech Fellows) who help facilitate each class of students at partner universities. We have created and tested extensive learning materials including pre-recorded video lectures and online documentation to help with the homework. In addition, professional experts are available to answer student questions online about lecture materials as well as the homework.
Regardless of which class you take or which university you attend, CodePath provides the same high quality curriculum and course experience to arm you with industry knowledge, technical excellence, and a portfolio to demonstrate your work.
How much time will participating in a CodePath course take?
You should set aside 2-10 hours per week for each CodePath class. This includes 1 session per week (2 hours) and homework (depending on the course track). Classes last for 10 weeks. For colleges offering for-credit courses, it can last up to 14 weeks.
Are remote courses available?
Yes, we typically offer multiple remote courses each year:
- Web Development: Dive into full-stack development with the Web Development pathway. Learn to design and create your own sites inspired by popular websites you already know and love. You will build fast, responsive websites with a personalized user experience from account signup to profile customization to content creation.
- iOS & Android Development: Accelerated project-based courses that provide a real-world experience at how to develop and ship your own mobile apps.
- Cybersecurity: Originally designed in partnership with Meta, this course teaches students how to think like a hacker and exploit vulnerabilities, while also exploring how to build offensive capabilities into applications.
- Intro to Software Engineering: Designed for rising freshmen and sophomores, this course does not require prior experience in programming and will bridge the gap for those who want to feel more prepared to dive into further technical training.
- Technical Interview Prep: Ace technical interviewing and get a preview of real-world software topics in the industry.
- Tech Fellow Training: Train to be an instructor of one of our CodePath courses at your campus.
We're always adding new courses and updating our curriculum based on student demand! You can sign up for our mailing list to stay up to date on our new offerings.
Do I need to have a Github account?
Yes. You will need a GitHub account to have access to the CodePath courses, and submit the assignments and labs throughout the course. If you don't have one yet, you can create an account here.
Steps to Follow During the Admissions Process
Please see a brief description of the application process. During the process, you will receive detailed emails to help you with each step:
Start application form - Start an application by logging into GitHub and selecting a particular cohort.
Complete application form - Fill out and complete the application. Once the application is submitted, you will receive a confirmation email with next steps (configured per cohort).
Submit pre-work - You will automatically receive a customized email outlining the next steps for pre-work, including key dates and deadlines. Only applications submitted with pre-work will be reviewed and scored for admissions.
Confirm spot and agree to terms to get admitted - Our team will finalize admissions by reviewing each application. If selected, you will receive an email requesting to confirm admission. Please note that if the admission is not confirmed, you can potentially lose your spot and be switched to rejected or waitlist status, especially if the class is full due to a large number of applicants.
It is very important that you add CodePath to your email address contact list, and check your spam folder so that you do not miss any emails from us.
Who can apply for your courses?
Our courses are designed for students in computing-related majors who are 18 or older and attending a US college or university. Some of our courses will also have prerequisites, such as familiarity in object-oriented programming or data structures and algorithms. Check the requirements of each course for more details.
Our programming centers the needs and success of Black, Indigenous, Latinx, and low-income Computer Science students.
Why should I take this CodePath course?
All CodePath courses are designed to quickly give you technical skills that will enhance your college education, build a portfolio to show future employers, and add valuable skills to your resume. When you successfully complete our courses, you will receive a certificate from CodePath, and you also gain access to CodePath’s career services, 1,100+ industry mentors, and our 10,000 students and alumni network. CodePath's courses and services are here to help you bridge the gap between your computer science education, getting a job in the tech industry, or forming your own tech start-up.
Don’t see your questions here? See all questions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100276.12/warc/CC-MAIN-20231201053039-20231201083039-00870.warc.gz
|
CC-MAIN-2023-50
| 28,404
| 109
|
http://queencitytour.blogspot.com/2013/01/go-vibrant-walking-routes.html
|
code
|
go vibrant is a not-for-profit group in partnership with organizations and companies in the Cincinnati area. Their goal is to make Cincinnati one of the top 10 healthiest cities in 10 years. This is done through sponsoring activities like walking groups, events, and by promoting an active lifestyle. The group has also implemented a 1, 2, and 3-mile walking route through downtown and has recently implemented walking routes through Mt. Adams. On the days when the weather is not cooperating there is even an indoor route using the Cincinnati Skywalk system. Each route is marked with colorful signs that display a map of the walking routes as well as directional signs along the way. It is not only a great way to get some exercise, but a really great way to see the sights of the city as well.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865468.19/warc/CC-MAIN-20180523082914-20180523102914-00498.warc.gz
|
CC-MAIN-2018-22
| 796
| 1
|
http://milek.blogspot.com/2005/12/t2000.html
|
code
|
- CPU - 4, 6, 8 cores (each with 4 threads, so 16, 24 or 32 virtual CPUs are seen in a system) UltraSPARC T1 (Niagara)
- RAM - 16 slots (with 2GB DDR2 - 32GB)
- Ethernet - 4x 100/1000 on-board
- DISKS - 1-4 2,5" SFF SAS 73GB
- 1x DVD
- I/O - 3x PCI-E, 2x PCI-X (64bit 133MHz)
- Redundant power and cooling
- Hardware-assisted cryptography (RSA & DSA on-chip)
- 350W nominal power consumption (400W MAX)
Now I wonder about price of the server and what actual performance in web serving it could achieve.
btw: looks like smaller version named T1000 is going to presented too.
update: another article on Niagara with some performance benchmarks.
From the article:
• On the SPECjbb2005 test of Java server software, the T2000 scored 53,378 business operations per second compared with 61,789 for an IBM p5-550 with two dual-core Power5 chips and 24,208 for a Dell PowerEdge SC1425 with dual single-core Xeon processors.
• On the SPECweb2005 test of Web server performance, the T2000 socred 14,001, compared with 7,881 for an IBM p5-550 with two dual-core Power5 processors, 4,850 for a Dell PowerEdge 2850 with two dual-core Xeon processors, and 4,348 for an IBM x345 with dual single-core Xeon processors.
• On the NotesBench test of Lotus Notes performance, a T2000 accommodated 19,000 users at $4.35 per user and got a NotesMark score of 16,061. In comparison, an eight-processor IBM p5-570 had 17,400 users, a cost of $10.19 per user, and a NotesMark score of 14,740. But the average response time of the IBM system was 270 microseconds compared with the slower 400 microseconds for the T2000, demonstrating the relatively slow single-thread performance of the Sun system.
Looks like WEB performance is really good.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655897027.14/warc/CC-MAIN-20200708124912-20200708154912-00408.warc.gz
|
CC-MAIN-2020-29
| 1,721
| 17
|
https://medium.com/@jlottosen/more-to-testing-than-ai-and-ml-can-solve-a920a8339ada
|
code
|
More to testing than AI and ML can solve
Artificial Intelligence (AI) and Machine Learning (ML) can perhaps solve some testing challenges, but not all testing. The testing vs. checking debate and all the shift-left of checking, have revealed that some of testing is about critical thinking and some of testing is about checking and asserting. It’s often two different mindsets — often it also depends on the problem complexity…
Identifying app states is a simple problem of confirming labels. Navigating an road from A to B following a set of rules is another problem. But the challenge is that, while you can tell your Robot Process Automation to navigate one path, it cannot tell what else might be right or wrong on the pages. ML, AI and RPA needs an existing system to learn from. And sometimes our activities are chaotic and novel, that all we do is experiment. .. or run around fire-fighting one problem at the time.
The Cynefin framework by @snowded enables us to talk about different types of complexity and different approaches to sense-making. Similarly Simon Wardley model of Pioneers, Settlers, Town Planners deals with the journey from novel/genesis over best practice to utility. All models are wrong but these two are very useful in modelling where we are, what to do and how to make reasonable sense of it all.
The testing problems I deal with are both how do we successfully add functionality to a legacy code base, how to delivery minimal successful features and how do we test COTS and how to test in IT operations. It’s all about figuring out how to learn enough business valuable information about the system within the context of the project.
The challenge is that business value is different in each context. Deriving the explicit and implicit business values is mostly a human communication activity. These human communication activities of testing is wicked.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627997801.20/warc/CC-MAIN-20190616062650-20190616084650-00279.warc.gz
|
CC-MAIN-2019-26
| 1,891
| 6
|
https://github.com/wheeyls/BigMachines-JavaScript-Framework
|
code
|
In order to build a copy of the Framework and Upgrade Kits using this source, you will need Perl installed on your machine.
You will need Node.js if you want to modify the Require library.
The BigMachines Framework can be built using the "release_starter.pl" script found in this directory. That script will grab the expected files from the "framework" and package them as zips into the Framework Starter Kit and Upgrade Kits, along with all their documentation.
Once you've run the build command, you will probably want to zip up the contents of those folders in order to easily share the release with others.
Upgrade.html is driven by the js file bm-framework-upgrade.js, found under framework/js. There is a variable holding the version date that should be updated after a new version has been generated.
After modifying the file, upload it to resources, in the internal folder. That way all sites will immediately have a reference to the latest version.
The framework makes use of RequireJS, as well as the domReady Plugin. These libaries are minified using RequireJS's optimization tool, and included in the bm-framework.js file.
To compile, you will need to get NodeJS installed on your machine. Once it is setup, open a command line and change directories to the "compile-require" folder.
You can replace require.js and/or domReady.js with any version that you would like to use, and then the following command to generate a new minified version:
node r.js -o baseUrl=. paths.requireLib=require name=setup-domready include=requireLib out=after-compile.js
The result will be output to after-compile.js. To use the library in the framework, copy and paste the contents of after-compile into bm-framework.js, replacing all the content between the "====== REQUIRE ======" commented section in the source code.
There are a few test suites setup to test the framework, that should be kept passing when rolling out releases.
####framework/js/upgrade.html This is the file distributed with the framework, that is responsible for making sure that a given site has been setup properly. The file is driven by bm-framework-upgrade.js, which is hosted remotely. This means that now and in the future we can create new tests, and users will be able to run those tests against their sites immediately.
####framework/tests.html This is a test suite to be run against the framework itself. It exercises the internals of bm-framework.js, and should always be passing before rolling out a release. Any new development to the framework should also be tested within this framework.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867173.31/warc/CC-MAIN-20180525180646-20180525200646-00168.warc.gz
|
CC-MAIN-2018-22
| 2,567
| 14
|
https://www.gulftalent.com/Online/courses/learn-c-programming-from-beginner-to-expert-32152
|
code
|
Description So, you've heard a lot about C++, but you don't know how to get started? This Simpliv course is exactly what you need!
Well, I'm Harsh Kajla, your instructor, and I've designed the C++ For Beginners - Step by Step and Practical just for you!
Choosing a course that's perfect for you can be damn hard. You need Instructor:
- Who are passionate about what they do
- Keep their courses continually updated
- And most important, provide outstanding support and follow up to your questions
That's what I do.
This is the most comprehensive, yet straight-forward, course for the C++ programming language on Simpliv!
This course assumes no previous coding experience . It doesn't matter if you have never written any programs or you have no idea about programming... After my course all of this will change. You will bust the myth that programming is a difficult thing! A major focus is problem-solving skills, algorithms and strong fundamentals. Also, the focus of this course will be to make sure that you have done the substantial amount of coding by the end of it. You'll be exposed from very easy to hard level of questions
After this course you will become smarter with your solutions and able to use the advanced components of the C++ language easily. Course is designed keeping in mind the requirements of beginners. Course starts with fundamentals of logic building and problem solving..
This course will enhance the problem solving skills of the students using C++. Course follow step-by-step approach to make students fall in love with programming and ignite their passion of coding with the help of problems ranging to easy to intermediate to expert level. Moreover , I am using a pen tablet to write on the screen and provide even more visual explanations.
If you want to take ONE COURSE to master C++ take this course.
- No previous experience with C++ or coding is required
- Prepare to write thousands of lines of C++ code!
Who should take this course
Who this course is for Beginners - if you've never coded before, you can learn C++ step by step. Programmers switching to C++ from some other language such as Java, Ruby or Python. Any undergraduate student having C++ programming in curriculum. If you have previous experience in C++ programming or with any other programming language then this course is going to make your foundation more strong.
Course Completion Certificate
What will you learn:
- Learn to program with one of the most powerful programming languages that exists today, C++.
- Learn Modern C++ rather than an obsolete version of C++ that most other courses teach
- Learn C++ using a proven curriculum that covers more material than most C++ university courses
- Includes Quizzes, Live Coding Exercises, Challenge Coding Exercises and Assignments
- Obtain the key concepts of programming that will also apply to other programming languages
- Learn C++ features from basic to more advanced such as inheritance and polymorphic functions
About Course Provider
Simpliv LLC, a platform for learning and teaching online courses. We basically focus on online learning which helps to learn business concepts, software technology to develop personal and professional goals through video library by recognized industry experts or trainers.
With the ever-evolving industry trends, there is a constant need of the professionally designed learning solutions that deliver key innovations on time and on a budget to achieve long-term success.
Simpliv understands the changing needs and allows the global learners to evaluate their technical abilities by aligning the learnings to key business objectives in order to fill the skills gaps that exist in the various business areas including IT, Marketing, Business Development, and much more.
How to enroll?
You can book the course instantly by paying on GulfTalent.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103033925.2/warc/CC-MAIN-20220625004242-20220625034242-00781.warc.gz
|
CC-MAIN-2022-27
| 3,838
| 30
|
http://www.imgsoftware.com/kb/print/117/
|
code
|
One of my users contacted me to reactivate their account. How do I do that?
Go to Security>Manage Users and find the person. Halfway down the screen, reset Active NO to YES. If they need to reset their password, you can do that at the top of the screen in the password field and then let them know what you have set it to. Setting a password in that field will overwrite their current password.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363006.60/warc/CC-MAIN-20211204185021-20211204215021-00472.warc.gz
|
CC-MAIN-2021-49
| 394
| 2
|
https://manuk.ro/en/2013/05/egyptian-cat/
|
code
|
I am back with a paper graphic project, this time a quilled Egyptian cat statue of Bast or Bastet.
I got the idea to quill the Egyptian cat after I saw Agatha Cristie’s Poirot – The Adventure of the Egyptian Tomb. At the end of the episode, the Belgian detective brings his secretary, Miss Lemon, a small, black statue of a cat as a souvenir. I have always been passionately curious about Ancient Egypt and now I wonder how come it took me so long to try to quill something related to it?
Bast or Bastet is a feline goddess of ancient Egyptian religion, initially depicted as a woman with the head of a lion. She was also known as the Eye of Ra and she was the patron of Sun, cats, women and secrets. Later on, Bastet became to be represented as a woman with the head of a cat or simply as a cat. After the contact with the Greeks, she changed to a moon goddess, probably because the Greeks associated her with Artemis. Bast’s importance in the Egyptian pantheon might be due to the great value placed on the domesticated cat by the Egyptians. The cats were highly revered because of their ability to combat vermin (like rats, mice and snakes) and some of them were even mummified and buried next to their owners.
I went with black and gold for this project, which I think creates a nice contrast against the white background. For the collar I used a beautiful metallic shimmering yellow paper. I’ve had these papers together with a shimmering white and navy blue for ages and I’m happy I finally got the chance to use at least one of them.
The total size of the frame is 17cm * 24cm and the border is 2cm wide. I am always following Inna’s tutorial when I have to make a paper frame because it’s so clearly explained. I used 120gsm paper for mine, but I strongly recommend a heavier one.
Next to the quilled Egyptian cat, I hand wrote the name “Bast” in hieroglyphs using a gold metallic gel ink pen and enclosed it an a cartouche which indicates that the text is a royal name.
I hope you liked my version of the Egyptian cat! Thank you for your visit!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107902745.75/warc/CC-MAIN-20201029040021-20201029070021-00302.warc.gz
|
CC-MAIN-2020-45
| 2,071
| 7
|
http://storiesandfaith.blogspot.com/2007/11/deep-breath.html
|
code
|
I believe I've just come up on a milestone.
My DMin project for the semester is substantially finished. I may tinker on it a bit more (what good is doing it as a blog, if I can't continue to blog?) but for all intents and purposes, I'm done.
I don't think I've ever finished any paper or project more than 12 hours early in my life, and if you'll look back in time here, you'll see that includes sermons as well.
Life is good. Life is very good.
Well, except for the small matter of the SPRC meeting right now to do my annual assessment. I hate those. But hey, I'm good, too. It's all good.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590199.42/warc/CC-MAIN-20180718135047-20180718155047-00468.warc.gz
|
CC-MAIN-2018-30
| 590
| 5
|
https://github.com/doctrine/doctrine2/issues/5240
|
code
|
Jira issue originally created by user @guilhermeblanco:
Based on code instrospection, it seems that SQL generated is wrong when you attempt to do something like this:
SELECT m FROM CompanyManager m WHERE m.InheritedSingleValuedAssociation = ?1
It seems the column that refers to the association points to wrong table (apparently it points to CompanyManager table).
If everything works, we still need to have coverage to it (we have none).
Comment created by romanb:
The first thing we need is tests to verify the issue.
Comment created by @beberlei:
I added a test to show that it works and no issue occours:
* @group [DDC-728](http://www.doctrine-project.org/jira/browse/DDC-728)
public function testQueryForInheritedSingleValuedAssociation()
$manager = new CompanyManager();
$person = new CompanyPerson();
$dql = "SELECT m FROM Doctrine\Tests\Models\Company\CompanyManager m WHERE m.spouse = ?1";
$dqlManager = $this->_em->createQuery($dql)->setParameter(1, $person->getId())->getSingleResult();
Its in Doctrine/Tests/ORM/Functional/ClassTableInheritanceTest.php, see commit:
Comment created by @guilhermeblanco:
I think I fixed it sometime... it was missing a condition that is now present.
Issue was closed with resolution "Fixed"
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049274119.75/warc/CC-MAIN-20160524002114-00164-ip-10-185-217-139.ec2.internal.warc.gz
|
CC-MAIN-2016-22
| 1,234
| 19
|
https://news.ycombinator.com/item?id=17290375
|
code
|
So some people try to guess email-addresses of other people and sometimes the emails end up in the wrong place?
And this is news?
I have back from the nineties email@example.com of my pretty common Northern European name. I get all sorts of private emails intended for other people.
This article is a painful joke. I wish it was satire. Maybe it is and its soo dry, that it's actually hilarious.
..."The growing pains usually set in when startups reach 25 to 50 employees, as names begin to overlap, according to Josh Walter, who has designed email services for companies for the past eight years." I want that job, creating email address standards for startups.
On the other hand, I have (first initial)(surname)@gmail.com and you wouldn't believe how many misdirected messages I get for people with the same initial and surname as me...
Interesting fact: most emails I incorrectly receive is because whoever creates the accounts/makes the orders/etc knowingly provides websites with my email instead of their own.
All in all it’s pretty crazy.
The problem with that is many times these are automated and poorly configured, so I'll get hundreds of emails a minute from really badly broken setups. I generally email support at the domain owners but most of the time I have to blacklist them at the server.
I can speak from experience that using your middle name creates it's own set of super annoying issues.
If your name is rare enough that's fine, but it's better to keep to a pattern. Also use aliases (billing@, legal@, etc).
The email policy used to be that people from acquired companies would keep their original email address whereever possible, just switch to the bank's domain.
So in my friend's case, no narcissism, just luck.
One thing I learned from getting other people's emails is that some websites let you pay for things without email confirmation, but require you to receive the email to access it. Nexon game points or something? I tried to report the screwup, but the site wouldn't let you contact them without a login.
I only use it for stuff I don't want to clog up my vanity domains with but that email account has become a swamp of notifications of signups to random services I've never used, whoever signed up trying to scam those services, and those services contacting the scammer to tell them they aren't allowed to use the service anymore because of their chargeback/non-payment/scummyness. Along with a variety of bouncebacks from email worms (in 2018!!) a whole bunch of more innocent but equally irritating accounts being attached.
I used to try to help out companies this was happening to by giving them a heads-up, resetting & changing the account pwd and suggesting ways of mitigating the issue (hello doordash) but these days I can't be bothered... My next freebie email is going to be a random 64 character alpha numeric string to minimalize those collisions.
* it's actually okay, honestly!
Max nerd street cred comes with getting something sleek like <yourname>.com, or <firstname>@<lastname>.com. Even getting that doesn't seem like a significant social status signal.
I feel like I must be missing something.. :)
For personal domains I just wildcard so I can use whatever fits the situation best. support@ contact@ name@ etc.
Later, when Abhi Talwalker became CEO, all e-mail addresses were changed to firstname.lastname@example.org. My manager was pretty unhappy because his last name was Van Den Crommenacker.
I don't think I've ever received any email intended for somebody else.
There's also the two Lisa S Davis' in NYC .
And we can't forget the two Emily Hughes' in England .
I've heard that they are not unique in the US and a few stories from my Databases course professor about how you should always assign your own unique IDs to users. Birth numbers change.
That's a parochial view, US SSNs are not unique but Norwegian SSNs (fødselsnummer) are unique. In Norway it is composed of a six digit birthdate plus a five digit code (personnummer).
Google translates the Norwegian Wikipedia entry as saying "The last digit in the individual number indicates the gender of the person - different digits for men and equal numbers for women."
Does this change for transgender people, or for those who undergo sex reassignment surgery?
I wasn't able to find information about this for Norwegian. The equivalent entry for Sweden, at https://en.wikipedia.org/wiki/Personal_identity_number_(Swed... , says :
> In exceptional cases, the number may be changed later in life, typically because the date of birth or the registration of gender of the child were in error. If a person undergoes full gender reassignment surgery later in life, the serial number is changed to make the 'gender digit' (no. 9) conform with their new physical sex.
It's a great way to ensure that you get a bunch of spam from random people looking for jobs etc. landing in your inbox after guessing your email address.
For company mail just use something unique, nobody cares.
I puked in my mouth a bit when I read this.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039744381.73/warc/CC-MAIN-20181118135147-20181118161147-00310.warc.gz
|
CC-MAIN-2018-47
| 5,033
| 33
|
https://docs.meta-inf.hu/content-exporter-confluence/general-product-information/installing-content-exporter/installation-notes
|
code
|
If you use Content Exporter in Confluence Cloud, it will run on our own servers in the Cloud. We operate our Cloud add-ons using Amazon AWS services.
Data storage and location
Content Exporter does not store any personal data (such as names or e-mail addresses and so on).
As Content Exporter itself does not store relevant data, it does not need to be migrated between the Cloud and Server platforms. Simply install the latest version of Content Exporter in the target platform with a valid license key.
You can use this regex for example: "^content-export-.*$"
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337836.93/warc/CC-MAIN-20221006124156-20221006154156-00407.warc.gz
|
CC-MAIN-2022-40
| 562
| 5
|
https://blogs.columbian.com/fyi98642/2012/03/30/30-hour-famine/
|
code
|
30 Hour Famine
The 15 members of the Youth at the Mountain group at Mountain View Christian Center in Ridgefield are planning a 30 hour famine to benefit kids in third world countries who are dying of starvation. The money collected will be routed through World Vision.
The group will have breakfast the morning of Friday, April 20, and then not eat again until the fast is over Saturday at 2:00. This will give them a chance to share with their friends at school the reason they are fasting. The group will sleep at the church Friday night and have scheduled water breaks.
The group is looking for sponsors to donate money for their project. If you would like to support this project, please call Sharee Creel at the church, 887-4016.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474715.58/warc/CC-MAIN-20240228112121-20240228142121-00769.warc.gz
|
CC-MAIN-2024-10
| 735
| 4
|
https://www.ucertify.com/certifications/Oracle/oracle-oca-java.html
|
code
|
OracleJava Certified Associate certification program offers entry-level credential and designed to ensure the knowledge and proficiency to develop applications using the Java language. The OCJA Exam tests your basic understanding of Object Oriented programming concepts, the Java programming language and general knowledge of Java platforms and technologies. The Oracle Certified Associate (OCA) Java SE 8 certification helps you build a foundational understanding of Java, while expanding your knowledge of general programming. Oracle Java Certified Associate exam validates expertise to perform complex, hands-on activities through study, labs, and practice. The ideal candidate who would earn this certification typically has a technical background and wants to improve programming skills, or may be new to object-oriented programming and Java. The Java SE 8 Programmer certification exam validates the understanding of the Java technology and sets the stage for future progression. Oracle Java Certified Associate exam validates expertise to perform complex, hands-on activities through study, labs, and practice. The Oracle Java SE 8 Certification gives you the tools to make the most of the new features within Java SE and helps you build a foundational understanding of Java, while expanding your knowledge of general programming. The objectives of the Oracle OCA Java certification exam are as follows:
Using Loop Constructs
Working with Inheritance
Creating and Using Arrays
Working With Java Data Types
Using Operators and Decision Constructs
Working with Methods and Encapsulation
uCertify provides study guide for the Oracle Java Certified Associate exams: 1Z0-803 and 1Z0-808 to help candidates in learning the concepts and succeeding in the exam.
Requirements for OCA: Oracle Java Certified Associate Certification
There are no prerequisites for the OCJA exam. However, you must be well experienced with the language before you take the exam.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655889877.72/warc/CC-MAIN-20200705215728-20200706005728-00285.warc.gz
|
CC-MAIN-2020-29
| 1,956
| 10
|
https://geeksarray.com/blog/exception-handling-using-try-catch-block-in-sql-server
|
code
|
This article explained how you can use the Try-Catch block to handle exceptions in SQL Server. It describes system defined functions which can help you to handle errors.
Whenever we write a query it is checked for syntactical errors before execution. If the syntax is correct it gets compiled and executed. But how does an error becomes an exception? Due to some factors, such as incorrect data an error can occur where the query is syntactically correct. The error that occurred at run time is known as Exceptions.
Let us consider an example of a table named EmployeeDetails. Here in this table consider the column EmployeeID to be a Primary Key. Now if we try to insert a new row with data where EmployeeID already exists it would raise an exception.
The errors generated while executing SQL statements can be handled by using the TRY-CATCH construct.
A TRY-CATCH construct includes a TRY block followed by a CATCH block. If an error occurred in any statement of TRY block the control is passed to the CATCH block, and then the statement in that block is executed.
If there are no errors in the code in the TRY block, then the control is passed to the statement immediately following the END CATCH statement. So, the statements enclosed into the CATCH block are not executed.
Below is the syntax of Try Catch block
BEGIN TRY --Sql Statements END TRY BEGIN CATCH --Sql Statements to handle error END CATCH
Before going further we should know various error handling system defined functions.
Example: To see the working of exception handling, let us raise one deliberately. Consider table EmployeeDetails. Here in this table the EmpID column is PrimaryKey. To raise an exception we will try to insert a new row with already provided EmpID.
SELECT * FROM EmployeeDetails
The below given query shows, that table name EmployeeDetails contain Primary Key constraint.
SELECT CONSTRAINT_NAME, TABLE_SCHEMA, TABLE_NAME, CONSTRAINT_TYPE FROM INFORMATION_SCHEMA.TABLE_CONSTRAINTS WHERE TABLE_NAME='EmployeeDetails'
Now, when writing the below given code we are deliberately trying to insert a record with the same EmpID which already exists. So, in this case the syntax of the INSERT statement would be correct but the exception would raise when inserting the record. Hence, we will use TRY-CATCH block. In TRY block code is written, whereas in CATCH block the exception would be caught.
BEGIN TRY INSERT INTO EmployeeDetails VALUES (1002,'Thomas','Scott','Accounts',3) END TRY BEGIN CATCH SELECT 'An error occurred performing this operation '+ ERROR_MESSAGE() AS ErrorMessage SELECT ERROR_LINE() AS ErrorLine, ERROR_NUMBER() AS ErrorNumber, ERROR_PROCEDURE() AS ErrorProcedure, ERROR_SEVERITY() AS ErrorSeverity, ERROR_STATE() AS ErrorState END CATCH GO
It throws an exception and shows error details
As specified earlier the ErrorProcedure column provides NULL value as the error is not caught in a Stored Procedure or Trigger.
A TRY-CATCH construct do not catch an error if :
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818337.62/warc/CC-MAIN-20240422175900-20240422205900-00206.warc.gz
|
CC-MAIN-2024-18
| 2,969
| 18
|
https://www.libhunt.com/compare-teaful-vs-fragstore
|
code
|
|17 days ago||9 months ago|
|MIT License||MIT License|
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
1 project | dev.to | 6 Dec 2021
Few weeks ago, I started contributing to an open source library called Teaful, a Tiny, EAsy, and powerFUL for React state management, with ambitious roadmap. Now Teaful reached more than 500 GitHub ⭐️ Stars, the library and his community are growing fast.
Teaful DevTools Released!
2 projects | dev.to | 2 Dec 2021
You can leave any suggestions on GitHub (issue / PR) and it will be taken into account. Remember that Teaful project is still in an early version 0.X and together we'll make it evolve.
How do I replace getInitialProps in _app?
1 project | reddit.com/r/nextjs | 27 Nov 2021
The rest seems to be information about the browser, so why not create a react hook, and store this information in a context provider? I can recommend this very neat light library, very easy to use: https://github.com/teafuljs/teaful
Teafuljs/teaful: Tiny, easy and powerful React state management
1 project | news.ycombinator.com | 5 Nov 2021
Teaful: tiny, easy and powerful React state management
1 project | dev.to | 5 Nov 2021
If you want to try it out, I encourage you to go to the README to read the Teaful documentation, see all the options and learn how to get started. There is also an example section where you can try it. We will upload more examples over time.
Which State Manager y’all use nowadays?
3 projects | reddit.com/r/reactnative | 3 Nov 2021
I believe everyone should take a look at this little gem for state management: https://github.com/aralroca/fragstore
Contributed to some OSS with pull-requests in this year at Hacktoberfest
4 projects | dev.to | 15 Oct 2021
React state with a fragmented store
1 project | dev.to | 24 Sep 2021
The fragmented-store library is a single very short file. It's similar of what we'd manually do to create several React Contexts for each property. It automatically creates everything you need to consume and update them (hooks).
1 project | news.ycombinator.com | 11 Mar 2021
What are some alternatives?
svelte-websocket-store - svelte store with a websocket backend
redux-batched-actions - redux higher order reducer + action to reduce actions under a single subscriber notification
resourcerer - Declarative data-fetching and caching framework for REST APIs with React
recompose - A React utility belt for function components and higher-order components.
fluxxor - :hammer_and_wrench: Flux architecture tools for React
react-i13n - A performant, scalable and pluggable approach to instrumenting your React application.
shasta - Dead simple + opinionated toolkit for building redux/react applications
baobab-react - React integration for Baobab.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00524.warc.gz
|
CC-MAIN-2022-33
| 3,061
| 36
|
https://cupcakedesign.com/phasepacific/portfolio/cloud-bees/
|
code
|
Software Delivery Automation (SDA) through Continuous Integration, Continuous Delivery and Feature Flag management.
CloudBees provides leading enterprise DevOps solutions which enables developers to focus on delivering great software, while providing management with powerful risk mitigation, compliance and governance capabilities.
CloudBees is building the world’s first end-to-end automated software delivery system, enabling companies to balance governance and developer freedom. Their products enable organisations to build, test and deploy applications to production, utilising continuous delivery practices.
All of this has been made possible because many of CloudBees’ founders and leaders are veterans of open source projects and grew them into industry icons. Some of those projects today power digital businesses and software engineering around the globe.
Talk to the Phase Pacific team about leveraging CloudBees’ capabilities in your organisation today. They have extensive knowledge in the following products and will work with you to identify the ones best suited for your needs.
- CloudBees Accelerator
- CloudBees CodeShip
- CloudBees Core (Jenkins)
- CloudBees DevOptics
- CloudBees Flow
- CloudBees Jenkins Distribution
- CloudBees Rollout
- CloudBees Starter Kit
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337398.52/warc/CC-MAIN-20221003035124-20221003065124-00438.warc.gz
|
CC-MAIN-2022-40
| 1,288
| 13
|
https://colorlibsupport.com/t/no-alt-on-parallax-section-for-front-page-images/24744
|
code
|
Using Shapely Theme. Site: ivancorderotorres.com
I am using WooRank to anlayze my page and I am getting the following error:
2 ALT attributes are missing.
Can anything be added to fix this issue? All other images on the same page have no problems. It just these two images.
Hope you are having a good day and thank you for your question
In order to check your question, I need to see your live website, please provide URL and some temporary WP login credentials so that I can take a look
Don’t forget to mark your response as private.
Hope to hear from you soon.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335276.85/warc/CC-MAIN-20220928180732-20220928210732-00686.warc.gz
|
CC-MAIN-2022-40
| 564
| 8
|
https://scraperwiki.com/2015/06/mot-data-analysis-progress-along-the-fault-pattern-finding-path/
|
code
|
How do data science and data engineering differ? And where do they overlap? I agree to a large extent with the answer given here.
A data scientist must be able to ask the right questions – ‘right’ in this context meaning interesting, providing intelligence that can lead to process improvement or greater profitability (you don’t want to invest time and skills finding out why the sky is blue because it won’t make a difference if it was grey!). After getting out the right questions, a data scientist must know how to answer them, so he needs the technical expertise – skills in suitable programming and database technology that can help do statistics, machine learning, and data mining to uncover the answers. Then the last stage is data presentation – using charts, graphs or other presentation tools.
A data engineer is more interested in the infrastructure and architecture that aid fast and efficient processing of big data. He is closer to a software and hardware engineer than a data scientist, but both the data scientist and engineer are good programmers, database enthusiasts and fast learners of new skills. So it stands to reason that the transition for a typical professional in conformance with the current shift from the computer age to the information age (as I like to think) would be Software Engineer –> Data Engineer –> Data Scientist (if desired). In the ideal scenario, following strict (theoretical) definitions, in time we should not need software engineers anymore, but rather data engineers and scientists as they’ll have the software engineering skills and more.
But back to the real world, where the line is blurred, or sometimes doesn’t exist, and job titles do not matter but job descriptions and requirements do. You are given a problem, and you need to figure out how to solve it, mastering new skills if you have to.
Now in my first blog post I introduced the MOT data set as the data set on which my MSc research project is based. The MOT data set is part of UK’s open data and is available in the public domain. The aim of the project is to explore the data as fully as possible to find out the top faults for vehicles that failed at MOT testing and to be able to display these faults interactively. So let me talk about the progress of work on the MOT data set (that was the reason for this post!). One interesting question was: What are the faults typically detected for different make of cars at MOT testing? The MOT data set contains information that could help to create hierarchies or levels of faults for vehicles that failed at tests. To illustrate the meaning of the hierarchy, if a Ford failed during tests, for example, one may be interested in finding out:
- Was it the brakes, lightning, tyres, parts of the engine, etc. that was faulty?
- If it was the engine, what part of it?
- In turn, what was the exact problem with that part?
- Finally what is the simple statement of the problem discovered?
Peter at ScraperWiki (closest to a Data Engineer in my opinion by above definition – he might disagree) explored this using the test item detail and item group data sets and produced, using Python, the following tree showing hierarchies of MOT test failures.
What other progress has there been? Well, the test results data has also been factored into the equation. So we now have a reasonable description of the fault discovered for each vehicle that was tested and failed at first MOT testing, and we have these presented in hierarchical format, e.g. for a VOLVO XC70 D OCEAN RACE 7827 that failed during testing, we can see the levels or hierarchies of the problem detected as presented in the MOT data set:
|Description of Fault given in MOT data set
|has excessive play in a ball joint
Hopefully this will make sense to a mechanical engineer or car designer working for Volvo!
The final aim of the project is a web site to enable users to get information of their interest. This dictates the next steps and so watch this space for updates.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473401.5/warc/CC-MAIN-20240221070402-20240221100402-00409.warc.gz
|
CC-MAIN-2024-10
| 4,017
| 15
|
https://www.mvlaslobs.org/in-the-news
|
code
|
In the News
Links to stories and mentions in local media
A SLOB comes clean on community service
In seventh grade, I became a SLOB - not literally, but by joining the Service League of Boys, an organization that enables boys at local schools to serve and help improve the communities of Mountain View and Los Altos...
Service League of Boys gives back to community
When a large group of teen boys assembles with a shared pupose, it's not always to play sports - sometimes they just want to make the world a better place...
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488286726.71/warc/CC-MAIN-20210621151134-20210621181134-00064.warc.gz
|
CC-MAIN-2021-25
| 522
| 6
|
https://grokbase.com/t/gg/golang-nuts/12a1hws7s3/go-nuts-call-to-no-params-func-while-omitting-parentheses-pointer-to-func-signature
|
code
|
On 1 October 2012 15:10, Dumitru Ungureanu wrote:
So since function in Go are types,
Go functions are not types. They /have/ types, just like all
the other values in Go.
this declares a type:
x := os.Getgid
No, it declares the variable x. It has whatever type os.Getgid has,
which (consults godoc) is func()int.
What happens when I attach parenthesis to the type?
That's not what you're doing (since x isn't a type). You're
writing a function call of whatever function x currently is
(viz, os.Getgid) and no arguments. The result will be that
os.Getgid is called (and its result is dropped on the floor.)
I mean, I know what happens (now), it's a function call, not a type
declaration, but what's the mechanism?
The declaration copies the value of the function os.Getgid
into x. "The value of the function" will be something very
like a pointer to its code, or a structure that contains a pointer
to its code. The call calls whatever function is pointed to.
Since there are no closures involved, that's pretty much
what happens in C or C++ pointer-to-functions, or in
Scheme functions or Pop11 procedures: No New Magic.
Chris "allusive" Dollin
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711017.45/warc/CC-MAIN-20221205132617-20221205162617-00756.warc.gz
|
CC-MAIN-2022-49
| 1,143
| 23
|
https://www.unix.com/shell-programming-and-scripting/243027-awk-replacement-using-2-diff-files-input-comparison.html
|
code
|
Awk: Replacement using 2 diff files input and comparison
If $5(date field) in ipfile is less than $7(date field) in deact file & $1 of ipfile is present in deactfile then
$1 to be replaced by $2,$3,$4,$5,$6 of deact file
else if $5(date field) in ipfile is greater than $7(date field) in actfile & $1 of ipfile is present in actfile then
$1 to be replaced by $2,$3,$4,$5,$6 of actfile.
Present Code which only does replacement based on $1 checking and not on $5(date field) of ipfile:
Please help as i am unable to put the date field checks in the code.
Thanks scrutinizer, I will use substr for the date field for the numerical comparison, but getting confused in how to place the required checks in awk(existing code shared), can you suggest the condition for the same in code?
Thanks Akshay. The code did worked with minor modifications. Just need another advice in case there are multiple entries in DEACT file then how to handle such scenario based on the different input. Please refer the updated deact file & updated ipfile.
I have 2 files, I need to use column of file1 and do a comparison on file2 column 1 and print the mismatch is file3 as mentioned below.
Kindly consider that file 1 is having uniq key(column) whereas in file2 we have multiple duplicates (like 44). These duplicates should not come in... (2 Replies)
i am trying to diff two files and the result will be passed to awk and this will get the first 20 characters in every line and put the result in a file.... but i can't generate an output.
$ cat file1.txt
$ cat file2.txt
the line of command is: (2 Replies)
I have 2 files and I want them to be compared in a specific fashion
C_1451_1500 and so on...
1210 1305 1260 1295
1400 1500 1450 1495
Now The script should look for "1200" from A_1200_1250 of... (8 Replies)
I am trying to do the following using awk (is that the best way?):
Read 2 files created from the output of df (say, on different days) and compare the entries using the 1st (FileSys) and 6th (Mount) fields to see if the size has changed. Output (at least), to a new file (some header... (2 Replies)
I have two files which I would like to compare and then manipulate in a way.
pictures.txt 1.1 1.3
dance.txt 1.2 1.4
treehouse.txt 1.3 1.5
pictures.txt 1.5 ref2313 1.4 ref2345 1.3 ref5432 1.2 ref4244
dance.txt 1.6 ref2342 1.5 ref2352 1.4 ref0695 1.3 ref5738 1.2... (1 Reply)
Could you please help me to find the difference between two files. I tried the diff command but did not like the output as it contained < and > signs and the line numbers. Is it possible to do something using awk?
I have two files, say File1.txt contains 5 values and File2.txt... (6 Replies)
I know the topic sounds familiar but I just couldn't adapt or find the right code that solves my particular issue. I really hope you can help.
I would like to compare 2 files in an awk script. Both files have different paths.
The awk script call should look like that awk -f... (7 Replies)
I have two files file1 and file2 delimited by semicolon,
And I want to compare column 2 and column3 of file1 to column3 and column 4 in file2.
abc;cef;155.09;;... (12 Replies)
I have two files with field seperator as "~".
File A: 12~13~14~15
File B: 22~22~32~11
i want to calculate the difference between two files and than calculate the percentage difference and output it to a new file.
How do i do this using awk.
Also please suggest GOOD awk tutorials.
Thank... (7 Replies)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648465.70/warc/CC-MAIN-20230602072202-20230602102202-00291.warc.gz
|
CC-MAIN-2023-23
| 3,425
| 43
|
http://www.tamatalk.com/IB/topic/144660-how-old-until-u-should-stop-playin-with/page-2
|
code
|
Posted 10 July 2008 - 05:25 PM
Posted 13 July 2008 - 11:36 PM
Edited by magicboa, 13 July 2008 - 11:37 PM.
Posted 25 May 2009 - 10:48 PM
Posted 25 May 2009 - 11:28 PM
I think it is creepy when I see an adult playing with barbie or bratz...
Posted 26 May 2009 - 07:27 AM
Posted 26 May 2009 - 08:05 AM
I am 26 years old and I still bust out a Tama now and then. In fact, I am running two right now. If you pause it during work/school it can't be a distraction.
Posted 30 May 2009 - 04:14 AM
as long as you know the right times for play, for work, and for family, then it's all ok to have Tama's as long as you want. The funny thing is, I'm in college and my Tama comes in handy, like in Art. If there is a time limit, I leave my Tama on pause and mute, and put on the time screen. As long as I'm not acively playing, it's alright.
Besides, I enjoy them more now that I'm lder and I know that replacing the battery is possible XD
I think he older you are, the better they get.
Posted 30 May 2009 - 10:31 AM
Posted 30 May 2009 - 12:34 PM
Posted 10 November 2009 - 08:44 PM
Posted 11 November 2009 - 04:26 AM
Posted 16 November 2009 - 05:09 PM
EDIT: becuz music star is so good thnats why
Edited by xxxkiroxxx, 16 November 2009 - 05:11 PM.
Posted 19 November 2009 - 11:37 PM
Posted 22 November 2009 - 11:21 AM
I remember searching this site in my early teens when the first Tamagotchi p1 was released.
Now 10 years later (I'm 23) and still at it! I've had a few years breaks in between plays but once a tama-lover always tama-lover!
Also loving the fact I can now buy them myself and no longer begging my parents for the lastest generation!! haha good old days!!
Posted 22 November 2009 - 11:50 PM
Posted 23 November 2009 - 10:33 PM
I believe you should stop when Tamagotchi's interfere with day to day life, other than that, they are fine.
Posted 24 November 2009 - 10:57 AM
Edited by x5starbtchh, 24 November 2009 - 11:01 AM.
Posted 02 December 2009 - 04:27 PM
Edited by Tomato-kun, 02 December 2009 - 04:28 PM.
Posted 02 December 2009 - 06:41 PM
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430457008123.23/warc/CC-MAIN-20150501051008-00015-ip-10-235-10-82.ec2.internal.warc.gz
|
CC-MAIN-2015-18
| 2,043
| 33
|
https://yordi.me/garden/9-box-grid/
|
code
|
- Assessing performance
- Assessing potential
- Bring it together (bridge the gap between current performance and future potential)
When to use it?
The Grid is a snapshot in time. It could be used as a conversation starter for PRMs (Performance Reference Model). Based on where a person is plotted in the grid, a relevant personal growth plan can be initiated.
Example actions for each box are visualized in the figure below.
There could be human error in assessing someone's current performance and future potential.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945282.33/warc/CC-MAIN-20230324113500-20230324143500-00371.warc.gz
|
CC-MAIN-2023-14
| 517
| 7
|
http://cesarfdavp.xzblogs.com/9097595/the-python-project-help-diaries
|
code
|
Assignmenthelp.us is satisfying the US college students’ needs for programming help a lot more than a decade now. Not simply producing assignments, but we also cater to solving all concerns that college students deal with in producing their educational papers. United states of america is a melting pot for students’ from across the globe and is a well-liked preference due to high tutorial benchmarks.
S.Lott 310k65434710 incorporate a remark
Given that most Internet sites that I have witnessed thus far just use the default parameter configuration throughout this stage. I understand that incorporating a grid search has the following consequenses:
richgor Have you been interested in working with journalism and Laptop or computer science pupils to make modern media tools, goods and apps? Would you prefer to show another era of media innovators?
Future, correct-simply click the editor history, and opt for Debug 'Solver' over the context menu. PyCharm commences the debugging session and reveals the Debug Instrument window. The next image corresponds towards the default structure of panes and tabs:
We know that AR is perfect for taking a selfie with a Pikachu and it’s very good at measuring spaces (given that your place is really well lit along with your telephone is thoroughly billed) but past that, we’re really nevertheless figuring...
Uncover Python Developers Get entry to navigate to this site skilled freelancers in just seconds. It is brief, uncomplicated, and we only require a couple of specifics to get started. Want to operate as a substitute?
But fortunatelly we don't need to try this as python has an information construction called dictionaries, which allows us to stand for graphs quite conveniently without having a number of hussle and that are easy to iterate through.
The lower node incorporates the list of default run/debug configurations. These default operate/debug configurations are anonymous, but Each individual new run/debug configuration is created over the grounds of a default one, and will get the name within your alternative.
I’m engaged on a personal project of prediction in 1vs1 sports. My neural network (MLP) have an accuracy of 65% (not wonderful nevertheless it’s a superb start out). I have 28 options And that i imagine that some have an affect on my predictions. So I utilized two algorithms mentionned in the article :
Also, our services can preserve you on the right track to completing your programming homework in a well timed manner per the demands of completely your system. With our straightforward payment possibilities and competitive charges, you happen to be certain to Get the programming projects done after you want them and in no way regret it.
If you’d like to start out the script using this Operate configuration, make use of the button next to the dropdown.
RebeccaPoulson A thing that really frustrates me is the fact, whilst I’m enthusiastic about the probable AR has for storytelling, I don’t come to feel like I have seriously fantastic AR experiences which i can point individuals to.
But then I need to deliver these vital attributes on the training product to construct the classifier. I'm unable to present only these vital attributes as input to create the model.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827963.70/warc/CC-MAIN-20181216165437-20181216191437-00540.warc.gz
|
CC-MAIN-2018-51
| 3,268
| 14
|
http://web2.sys-con.com/node/2528046
|
code
|
|By Richard Park||
|February 2, 2013 04:00 PM EST||
Machine learning and IT analytics can be just as beneficial to IT operations as it is for monitoring vital signs of premature babies to identify danger signs too subtle or abnormal to be detected by a human. But an enterprise must be willing to implement monitoring and instrumentation that gathers data and incorporates business activity across organizational silos in order to get meaningful results from machine learning.
Machine learning is a topic that has gone from obscure niche to mainstream visibility over the last few years. High profile software companies like Splunk have tapped into the Big Data "explosion" to highlight the benefits of building systems that use algorithms and data to make decisions and evolve over time.
One recent article on machine learning on the O'Reilly Radar blog that caught my attention made a connection between web operations and medical care for premature infants. "Operations, machine learning, and premature babies" by Mike Loukides describes how machine learning is used to analyze data streamed from dozens of monitors connected to each baby. The algorithms are able to detect dangerous infections a full day before any symptoms are noticeable to a human.
An interesting point from the article is that the machine learning system is not looking for spikes or irregularities in the data; it is actually looking for the opposite. Babies who are about to become sick stop exhibiting the normal variations in vital signs shown by healthy babies. It takes a machine learning system to detect changes in behavior too subtle for a human to notice.
Mike Loukides then wonders whether machine learning can be applied to web operations. Typical performance monitoring focuses on thresholds to identify a problem. "But what if crossing a threshold isn't what indicates trouble, but the disappearance (or diminution) of some regular pattern?" Machine learning could identify symptoms that a human fails to identify because he's just looking for thresholds to be crossed.
Mike's conclusion sums up much of the state of the IT industry concerning machine learning:
At most enterprises, operations have not taken the next step. Operations staff doesn't have the resources (neither computational nor human) to apply machine intelligence to our problems. We'd have to capture all the data coming off our servers for extended periods, not just the server logs that we capture now, but any every kind of data we can collect: network data, environmental data, I/O subsystem data, you name it.
As someone who works for a company that applies a form of machine learning (Behavior Learning for predictive analytics) to IT operations and application performance management, I read this with great interest. I didn't necessarily disagree with his conclusion but tried to pull apart the reasoning behind why more companies aren't applying algorithms to their IT data to look for problems.
There are at least three requirements for companies who want to move ahead in this area:
1. Establish maturity of one's monitoring infrastructure. This is the most fundamental point. If you want to apply machine intelligence to IT operations then you need to first add instrumentation and monitoring. Numerous monitoring products and approaches abound but you have to get the data before you can analyze it.
2. Coordinate multiple enterprise silos. Modern IT applications are increasingly complex and may cross multiple enterprise silos such as server virtualization, network, databases, application development, and other middleware components. Enterprises must be willing to coordinate between these multiple groups in gathering monitoring data and performing cross-functional troubleshooting when there are performance or uptime issues.
3. Incorporate business activity monitoring (BAM). Business activity data provides the "vital signs" of a business. Examples of retail business activity data include number of units sold, total gross sales, and total net sales for a time period. Knowing the true business impact of an application performance problem requires the correlation of business data. When an outage occurred for 20 minutes, how many fewer units were sold? What was the reduction in gross and net sales?
An organization that can fulfill these requirements is capable of achieving real benefits in IT operations and can successfully apply analytics. Gartner has established the ITScore Maturity Model for determining one's sophistication in availability and performance monitoring. Here is the description for level 5, which is the top tier:
Behavior Learning engines, embedded knowledge, advanced correlation, trend analysis, pattern matching, and integrated IT and business data from sources such as BAM provide IT operations with the ability to dynamically manage the IT infrastructure in line with business policy.
Applying machine learning to IT operations isn't easy. Most enterprises don't do it because they need to overcome organizational inertia and gather data from multiple groups scattered throughout the enterprise. For the organizations willing to do this, however, they will see tangible business benefits. Just as a hospital could algorithmically detect the failing health of a premature infant, an enterprise willing to use machine learning will visibly see how abnormal problems within IT operations can impact revenue.
Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou...
Dec. 6, 2016 07:00 AM EST Reads: 794
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Dec. 6, 2016 06:30 AM EST Reads: 1,086
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
Dec. 6, 2016 06:00 AM EST Reads: 450
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
Dec. 6, 2016 05:00 AM EST Reads: 1,643
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 6, 2016 04:45 AM EST Reads: 997
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
Dec. 6, 2016 04:30 AM EST Reads: 1,928
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 6, 2016 12:45 AM EST Reads: 852
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
Dec. 6, 2016 12:30 AM EST Reads: 4,589
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
Dec. 6, 2016 12:30 AM EST Reads: 1,198
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Dec. 6, 2016 12:00 AM EST Reads: 905
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 5, 2016 10:30 PM EST Reads: 1,059
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
Dec. 5, 2016 08:45 PM EST Reads: 541
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Onalytica. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
Dec. 5, 2016 07:45 PM EST Reads: 2,097
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Dec. 5, 2016 07:45 PM EST Reads: 2,235
IoT is rapidly changing the way enterprises are using data to improve business decision-making. In order to derive business value, organizations must unlock insights from the data gathered and then act on these. In their session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, and Peter Shashkin, Head of Development Department at EastBanc Technologies, discussed how one organization leveraged IoT, cloud technology and data analysis to improve customer experiences and effici...
Dec. 5, 2016 07:15 PM EST Reads: 5,061
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
Dec. 5, 2016 05:45 PM EST Reads: 1,624
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Dec. 5, 2016 04:30 PM EST Reads: 2,076
Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new individual and collective competencies are required. In his session at 19th Cloud Expo, Bob Newhouse, CEO and founder of Agilitiv, drew together recent research and lessons learned from emerging and established compa...
Dec. 5, 2016 04:15 PM EST Reads: 872
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Dec. 5, 2016 03:45 PM EST Reads: 403
"IoT is going to be a huge industry with a lot of value for end users, for industries, for consumers, for manufacturers. How can we use cloud to effectively manage IoT applications," stated Ian Khan, Innovation & Marketing Manager at Solgeniakhela, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 5, 2016 03:45 PM EST Reads: 4,266
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541905.26/warc/CC-MAIN-20161202170901-00053-ip-10-31-129-80.ec2.internal.warc.gz
|
CC-MAIN-2016-50
| 15,703
| 57
|
http://french.stackexchange.com/questions/tagged/math%c3%a9matiques%20pluriel
|
code
|
French Language Meta
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
Le nombre grammatical des operations arithmétiques
La citation ci-après provient de la page 93 de Schaum's Outline of French Grammar de Mary Crocker. The verb faire (to do, to make) is used in arithmetical operations. The plural font is used for ...
Feb 7 at 5:02
newest mathématiques pluriel questions feed
Hot Network Questions
Interview puzzle with a deck of cards, some cards upside-down
Automatically lining up two images that have some common elements
How do I solve for one variable in terms of other variables in Mathematica?
What are the downsides of a twisted wheel?
Curved cylinders in Tikz
Who is the Main Villain in Hearthstone's Curse of Naxxramas?
Why does Pluto's orbit cross Neptune's orbit?
Caveman Duels (or: Me poke you with sharp stick)
Will Java Final variables have default values?
How to change to last modified directory in current directory
Has any reference been made to Earth or the Milky Way in Star Wars EU?
The Rock, Paper, Scissors, Lizard, Spock Tournament of Epicness
Current store is 1 when running upgrade scripts
Generally speaking, is it better to make all the functional parts or get UI working first - or a mix of the two?
Can anyone identify the manufacturer of this golden lens?
Does clicking lead to DoS attack?
Can I drive a Dutch friend's car in the Netherlands?
How to number the letters of a sentence?
Could I access a blocked website via a virtual machine if the host OS has the web address blocked in its hosts file?
Are temporary hit points able to make you concious?
How can I add my website to DMOZ?
How do I greet someone in a different timezone when my morning is his evening?
Does using std::array<T, N> lead to code bloat?
How can I test out my equipment before a backpacking trip?
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Exchange
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510267330.29/warc/CC-MAIN-20140728011747-00289-ip-10-146-231-18.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 2,399
| 53
|
https://jonmurata.me/
|
code
|
Glad you could make it here today! My name is Jonathan Murata, but I go by Jon since most people (myself included) are too lazy to say the full thing. I just graduated with a Bachelors of Science in Electrical Engineering & Computer Science and Mechanical Engineering at the University of California, Berkeley. Yes, it's quite the mouthful every time I have to say it, so I usually just say I'm CS (haha).
If you're interested in learning more about me, you've come to the right place! Scroll down to see some cool stuff. If you just want an overview, this box should suffice! I was born and raised in Hawaii, but you probably couldn't tell given my poor pidgin and surfing skills. I'm currently living in Berkeley, CA and will soon move to South Bay to start a new chapter of my life working at Apple!
In the past year, a lot of my time has been devoted to teaching CS classes. In the little free time I have, I like to do the basics: eat good food and take long naps. When that gets a little too boring, I bake (mostly cookies), hang out with friends, play videogames, and think about how I should be coding or something instead of watching youtube videos.
I usually give out the direct links to these pages, but if you are here searching for my course resources or are interested in what I teach, links are below.
Teaching CS is the most rewarding thing I've done at Berkeley! I put 110% into my work to ensure students have a positive experience with the class. GSI's may grade exams and assignments, but students grade us with course feedback. Below are some stats and comments about my teaching. Having it here is a nice visual for me to see how I improved and what I still need to work on!
CS 61C: Fall 2018 (97 Student Repsonses)
It was really evident that Jon cared a lot about his students, and I appreciate that he took the time to thoroughly answer my questions, especially when my questions seemed redundant or basic. Often it was his attention to detail when answering these questions that helped me fix misconceptions I had.
I think Jon was a great GSI. He was really helpful in Lab when my partner and I got stuck in a few places, and his discussions allowed me to understand the material being taught in 61C at a greater depth. There were times when I was really confused by what went on in lecture, and Jon's discussions often left me with a clearer understanding of how to interpret the material.
Jon was my lab and discussion TA. I loved having him as an instructor. He felt super approachable and taught really well. I enjoyed seeing how much he prioritized assisting those who needed help in lab. He runs his discussion sections well paces, with a good balance of mini lecture and having us try out problems.
He was always prepared, and he was really good at explaining concepts/answering questions. He was encouraging, and you could tell he genuinely cared about his students. You made 61C a little less painful, thank you so much!
Jon is an amazing GSI! His discussions are incredibly helpful, and I really like how he devotes the time in discussion to going through nearly all the problems and explaining the material. I felt like he went at a really good pace and out of the multiple discussions I tried I ultimately felt like I learned the most/ended up going to his. 10/10 would recommend
Jon has really helped clear up concepts presented in lecture, and without a GSI as involved and invested in his students as Jon, I think my experience in 61C would be completely different.
One of the best GSIs I've ever had. Explains concepts very well, writes notes on the projector in a very clear fashion. Very logical and precise, good at time management, I learn a lot in each class session, both for discussion and lab. Thank you!
CS 61C: Summer 2018 (43 Student Repsonses)
- 3-Stage automatic boba dispenser. Tapioca Pearls -> Milk Tea -> Creamer.
- 1 raspberry Pi, 1 arduino, 1 DC motor, 2 DC pumps, 1 servo, lots of boba.
- Programmed motor synchronization and server in Python.
- More information (video demo).
- Find the least cost conquering tour (travel + conquering time) of a given graph.
- Converted to ILP and used Gurobi Optimization software to solve. Programmed in Python.
- Competition Rank #4 out of 230 Teams (CS 170 Spring 2018).
- 2-camera security tower system. Bottom camera watches belongings. Top camera tracks and records thief.
- Sounds an alarm when items leave the selected area. Deactivated with special key.
- Programmed in LabVIEW.
My academic journey is really a story to tell. I am currently am a senior at the University of California, Berkeley studying Mechanical Engineering and Electrical Engineering & Computer Science. I didn't always have this long of an introduction, though; I started out as a MechE but eventually discovered the beauty of Computer Science. I became a part of the Berkeley CS community, taking hard courses, meeting great people, and even joining course staff as a TA. In typical Berkeley MechE fashion, a flowchart is shown below to illustrate this (stressful) journey.
As you can probably guess, this schedule was no walk in the park. Lots of classes :(.
Eventually I would like to return to graduate school, but I am putting that on hold for now. On the MechE side, my interests involve heat transfer and controls. On the EECS side, my interests involve systems, computer architecture, and parallel computing. I have done research in biomechanics and heat transfer. I have not done research related to CS, but I hope to pursue a graduate degree in a CS-related field at some point in my life.
There's More Coming!
This website is currently a work in progress. There will be more sections in the future!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256546.11/warc/CC-MAIN-20190521182616-20190521204616-00294.warc.gz
|
CC-MAIN-2019-22
| 5,686
| 29
|
http://www.monroeworld.com/forums/showthread.php?1210-Amiga-Emulation-What-is-the-best-configuration-for-audio
|
code
|
I`m using a cool program in MacUAE; AlgoMusic, & I have tried opening samples with multiview & sometimes it freezes the workbench & sometimes they dont play back proporly... Only pooortions of the samples play back or doesnt play proporly at all.
I have suceeded in entering the correct information for memory & all previously, & all was fine, but now I have no idea what to enter.
Can someponne please help me out with this?
I need to know :
- What ias the best CPU?
- Memory settings?
- Sound settings?
What is the difference between hard + output & just hard???
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697681504/warc/CC-MAIN-20130516094801-00019-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 564
| 8
|
https://hub.packtpub.com/beyond-grading/
|
code
|
(for more resources related to this topic, see here.)
As the final look of the frame is achieved during the compositing stage, there will always be numerous occasions where there is a requirement for more render passes to finalize the image. This results in extra 3D renders, along with more time and money. Also, few inevitable applications that give life to an image, such as lens effects (Defocus, Glares, and motions blur), are render intensive. Blender Compositor provides alternate procedures for these effects, without having to go back to 3D renders. A well planned CG pipeline can always provide sufficient data to be able to use these techniques during the compositing stage.
Relighting is a compositing technique that is used to add extra light information not existing in the received 3D render information. This process facilitates additional creative tweaks in compositing. Though this technique can only provide light without considering shadowing information, additional procedures can provide a convincing approach to this limitation.
The Normal node
Relighting in Blender can be performed using the Normal node. The following screenshot shows the relighting workflow to add a cool light from the right screen. The following illustration uses a Hue Saturation Value node to attain the fake light color. Alternatively, any grading nodes can be used for similar effect. The technique is to use the Dot output of the Normal node as the factor input for any grade node.
The following screenshot shows relighting with a cyan color light from the top using the Normal node:
The light direction can be modified by left-clicking and dragging on the diffused sphere thumbnail image provided on the node.
This fake lighting works great when used as secondary light highlights. However, as seen on the vertical brick in the preceding screenshot, light leaks can be encountered as shadowing is not considered. This can often spoil the fun. A quick fix for this is to use the Ambient Occlusion information to occlude the unwanted areas.
The following screenshot illustrates the workflow of using the Ambient Occlusion pass along with the normal pass to resolve the light leak issue. The technique is to multiply the dot output of the Normal node with Ambient Occlusion info from the rendered image using Mix or Math nodes. As it can be observed in the following screenshot, the blue light leaks on the inside parts of the vertical brick is minimized by the Ambient Occlusion information. This solution works as long as relighting is not the primary lighting for the scene.
Another issue that can be encountered while using the Normal node is negative values. These values will affect the nonlight areas, leading to an unwanted effect. The procedure to curb these unwanted values is to clamp them from the Dot output of the Normal node to zero, before using as a mask input to grade nodes.
The following screenshot illustrates the issue with negative values. All pixels that have an over-saturated orange color are a result of negative values.
The following screenshot shows the workflow to clamp the negative values from the dot information of a normal pass. A map value is connected between the grade node and Normal node, with the Use Minimum option on. This makes sure that only negative values are clamped to zero and all other values are unchanged.
The Fresnel effect
The Fresnel option available in shader parameters is used to modify the reflection intensity, based on the viewing angle, to simulate a metallic behavior. After 3D rendering, altering this property requires rerendering. Blender provides an alternate method to build and modify the Fresnel effect in compositing, using the Normal node.
The following screenshot illustrates the Fresnel workflow. In this procedure, the dot output of a Normal node is connected to the Map Range node and the To Min/ To Max values are tweaked to obtain a black-and-white mask map, as shown in the screenshot. A Math node is connected to this mask input to clamp information to the 0-1 range.
The 3D-combined render output is rebuilt using the diffuse, specular, and reflection passes from the 3D render. While rebuilding, the mask created using the Normal node should be applied as a mask to the factor input of the reflection Add node. This results in applying reflection only to the white areas of the mask, thereby exhibiting the Fresnel effect. A similar technique can be used to add edge highlights, using the mask as a factor input to the grade nodes.
This article dealt with advanced compositing techniques beyond grading. These techniques emphasize alternate methods in Blender Compositing for some specific 3D render requirements that can save lots of render times, thereby also saving budgets in making a CG film.
Resources for Article:
- Introduction to Blender 2.5: Color Grading [article]
- Blender Engine : Characters [article]
- Managing Blender Materials [article]
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657163613.94/warc/CC-MAIN-20200715070409-20200715100409-00392.warc.gz
|
CC-MAIN-2020-29
| 4,936
| 21
|
http://openforexdemoaccount.com/computational-pondering-begins-right-here.html
|
code
|
Computational Pondering Begins Right here
Achieve experience in present programming languages, program design and programming mobile and net purposes as well as the important communications and problem-solving skills wanted to excel on this field. They cowl elementary mathematical and computational principles, and train college students how to design laptop software and hardware programs. Whether or not you are an skilled programmer or new to coding, this is where you’ll discover every thing from introductory guides to Python and SQL, to expert CSS or code examples.
RP4K is proud to supply pc programming classes for youngsters of all abilities levels in 8 places throughout Ontario together with Toronto , Ottawa , Oshawa , London , Waterloo , Etobicoke , Richmond Hill and Oakville Find out in case your little one is the correct fit for our classes by registering them for a free trial at a location of your alternative.
★ EXAMPLES: over 1800+ applications in 17+ languages and counting, programming hub has one of many largest collection of pre-compiled applications with output for practice and studying. Almost all the foremost programming languages in use today are high-stage languages.
The current trend, at the very least at good technology corporations, is to empower the software program engineer to not solely be a generalist within the technical sense, masking all the pieces from UI to the database, but also to personal the business requirements – inseparable from the design specs, which, as said above, are inseparable from programming aka, sure, codingâ€.
They learn to remain out of the way of capable programmers. 56% of Programmers fall into the $20 – $fifty nine per-hour vary. Moreover, students will achieve a working information of laptop methods and technology, in addition to get hundreds of hours of apply utilizing multiple programming languages, designing databases and creating Web applications.
Our neighborhood publishes stories price reading on development, design, and information science. Listed here are the top computer science schools for programming language coaching. This ongoing trend is projected to restrict employment development for computer programmers in the United States.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202530.49/warc/CC-MAIN-20190321172751-20190321194751-00176.warc.gz
|
CC-MAIN-2019-13
| 2,245
| 7
|
https://www.techadvisor.co.uk/forum/helproom-1/cannot-access-c-drive-prompt-4157681/
|
code
|
Take Harddrive out and hook it up as a slave to another pc. Copy the data you want to keep to the harddrive of other pc (or another ext harddrive etc.). You could also wipe/delete all on the drive after you have copied what you want. That leaves you free to put it back in old pc and install XP pro.
Don't forget to check your copied data is okay before you wipe the old drive :)
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886476.31/warc/CC-MAIN-20180116164812-20180116184812-00669.warc.gz
|
CC-MAIN-2018-05
| 379
| 2
|
https://forum.osticket.com/d/95841-user-login-issue
|
code
|
Unless I force session start in php.ini session keys are not being created in /var/lib/php/session which do get created when I force it. When it is forced those session keys are not deleted upon sign out from the system.
According to php.ini the following are set .
session.save_handler = file
session.save_path = "/var/lib/php/session"
There are also settings in /etc/httpd/conf.d/php.conf
php_value session.save_handler "files"
php_value session.save_path "/var/lib/php/session"
php_value soap.wsdl_cache_dir "/var/lib/php/wsdlcache"
I have to assume these are overriding the parameters in /etc/php.ini
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487600396.21/warc/CC-MAIN-20210613041713-20210613071713-00609.warc.gz
|
CC-MAIN-2021-25
| 604
| 9
|
https://feed.nuget.org/packages?q=Tags%3A%22predicate-builder%22
|
code
|
returned for Tags:"predicate-builder"
C# Extension Methods
This package contains some extension methods for Exceptions and Enums.
Also contains a PredicateBuilder for Expressions.
Predicate Builder is a simple tool to make your code cleaner and more readable. It was written in F# and use mutable list that holds boolean values in order to provide DSL to C#.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525355.54/warc/CC-MAIN-20190717161703-20190717183703-00415.warc.gz
|
CC-MAIN-2019-30
| 358
| 5
|
http://yuki-spring18ticket.blogspot.com/2009/06/dial-animation.html
|
code
|
June 24, 2009
Still messing around with Spirograph...
What if I had multiple generations of dial drawing patterns? Well in that case, I cannot rely on math functions for Spirographing. Basically I have to employ recursion function in VB, which confused a good chunk of my brain. Drawing diagrams and breaking code into a little tasks definitely helps and here is what I came up with.
(left) Dials rotate along each parent's perimeter by an user defined angle. (right) User defines a dbl revolution for the first dial. The following dials rotate according to the arc length.
dblRev = 1 for 360deg. Initial dial revolution (dblRev) changes from 0.1 to 0.5. These steps become animation frames.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526153.35/warc/CC-MAIN-20190719074137-20190719100137-00405.warc.gz
|
CC-MAIN-2019-30
| 691
| 5
|
https://www.openhub.net/tags?names=mock-object
|
code
|
PowerMock allows you to unit test code normally regarded as untestable. For instance it is possible to mock static methods, remove static initializers, allow mocking without dependency injection and more.
A unit testing framework for C with mocking. cmocka only requires a test application is linked with the standard C library which minimizes conflicts with standard C library headers. It is the successor (fork) of cmockery.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589536.40/warc/CC-MAIN-20180716232549-20180717012549-00483.warc.gz
|
CC-MAIN-2018-30
| 426
| 2
|
http://www.chuggnutt.com/2005/02/10/susan_b_anthony.php
|
code
|
I’m not sure if people are stupid, ignorant, lacking in a proper education or some combination of those, but the following example should illustrate my point. At work today I was talking with a co-worker about education (her son is in second grade and learning history) and the name Susan B. Anthony came up. I asked, “You know who she was, right?”
“Uh, someone famous—I know she was on a coin,” was the reply.
Pretty bad. I’m always highly disappointed when I run into this type of thing at work… I should know better by now.
What’s worse, though, is when I asked another (female) co-worker the same question:
“I know she’s on a coin.”
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806317.75/warc/CC-MAIN-20171121055145-20171121075145-00387.warc.gz
|
CC-MAIN-2017-47
| 660
| 5
|
https://appliancejunk.com/forums/index.php?topic=3590.msg14400
|
code
|
Just got a new filter and installed it. Unfortunately, I'm still seeing some little things floating around in the water. If you hold it up to the light you can see it. The faucet water seems cleaner. I'm stumped. I replaced the hose, which made a dramatic improvement, then I replaced the filter, yet still not completely clean.
Any other ideas?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889681.68/warc/CC-MAIN-20180120182041-20180120202041-00494.warc.gz
|
CC-MAIN-2018-05
| 345
| 2
|
https://fs-uae.net/docs/options/uae-maprom
|
code
|
The "default" is to specify the maprom location as 0x0f000000. However, it will move around a bit depending on other variables. For 24-bit address space CPUs, or when 128 MB processor slot RAM is configured, it will automatically be moved to 0x00e00000. It may again be moved to 0x00a80000 when extended kickstarts ROM is in used (or when a Cloanto ROM is mirrored at 0x00e00000). If an accelerator board comes with it's own maprom support, it will take precedence. However, the uae_maprom option is needed to activate the maprom support for some accelerators. Cyberstorm MKIII / PPC and accelerator board memory >= 1 MB: * Automatic maprom at 0xfff00000 BlizzardPPC and accelerator board memory >= 1 MB: * Automatic maprom at 0xfff00000 Other Blizzard accelerators: * CPUBoard MAPROM (up to several mirrors) if uae_maprom option is set.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510498.88/warc/CC-MAIN-20230929054611-20230929084611-00726.warc.gz
|
CC-MAIN-2023-40
| 837
| 1
|
http://stickempires-rts.wikia.com/wiki/File:Deathmatch_Drizzle_vs_CaptainCorps2-0
|
code
|
Me against the former #1 at SE. It's a short game, but it's also a good game as well.
P/s: This match is long ago already, so I hope there wont be any booooing in my video just because this is CC2.
Please like, comment and subscribe my channel :)
Also, check out my other videos on my channel right here: http://www.youtube.com/channel/UCY_5z5hSLAVI6AWrIemp1mA
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687642.30/warc/CC-MAIN-20170921044627-20170921064627-00227.warc.gz
|
CC-MAIN-2017-39
| 360
| 4
|
https://forums.adobe.com/thread/669412
|
code
|
I just upgraded to flash player 10.1 and there's an issue with a program that I've been working on. I'm copying text from a mysql table that is formatted with spaces and newlines (including spaces and newlines at the beginning of the text) into a textArea in Flex 3.5. Before the update, it worked fine. Now when AS retrieves the text from the table, it does not include the spaces and newlines at the beginning of the text. I'm using xml to retrieve the text. Does anyone have any idea what the deal is?
are you loading xml and enabling ignoreWhite or ignoreWhitespace?
No, it reads in all other white space, just not at the beginning of the text. Like if there is whitespace in the middle of the text, it will read that in correctly. It works fine except with flash player 10.1.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211126.22/warc/CC-MAIN-20180816152341-20180816172341-00680.warc.gz
|
CC-MAIN-2018-34
| 780
| 3
|
https://www.myassignmenthelp.net/question/develop-different-methods-to-query
|
code
|
In this assignment, you will develop different methods to query a collection of images using the meta-information associated with the images. To restrict the scope of image tags and to abstract from low-level vision details, we will use images and annotations from the "abstract scenes" dataset by Zitnick et al1. These abstract scenes depict children playing outdoors and have been constructed from a limited set of clip-art objects through crowdsourcing.
1 C. L. Zitnick, and D. Parikh, Bringing Semantics Into Focus Using Visual Abstraction, In CVPR, 2013.
For tasks 2 and 3, you may use any popular modern programming language.
In tasks 2 & 3, each retrieval method must return the 5 images with highest similarity to the query, as a list of image identifiers together with the similarity, sorted in non-increasing order of similarity, e.g.,
Actually displaying the image along with the identifier is optional, but recommended for easier inspection of results.
The total length of the text in your report should be 1000 to 1800 words.
Task 1: Controlled Vocabulary [20% of coursework marks]
The first task is to develop a controlled vocabulary for describing the abstract scene images. This will be used in the second task to make the image search more flexible. The controlled vocabulary has to satisfy the following criteria:
It includes the 58 predefined tags (as listed in the data description file), and synonym rings (with one or more synonyms) for at least five of those.
It is hierarchical, with at least three layers below the topmost concept.
In your report, you should
a. list this vocabulary, using a visual layout that clearly shows the hierarchy and distinguishes the main term for each concept from the synonyms;
b. briefly motivate the choices you made (both for the structure and for the synonyms), providing examples on how these choices can help with image retrieval
Task 2: Keyword-based Search
The second task is to develop and implement the following methods to retrieve images based on textual queries in the form of one or more keywords. Subtasks b), c) and d) build upon solutions to previous subtasks, but can also be solved individually by building upon the solution to subtask a). Remember to use the output format specified in the introduction above.
a) [20% of coursework marks] Method 1 takes one or more words as input, and returns the images whose predefined tags (as given in image_tags.csv) best fit those keywords, i.e., the more similar an image’s set of tags is to the set of words given as input, the higher the image appears in the result. This method ignores input words that are not part of the predefined tag list.
b) [10% of coursework marks] Method 2 extends Method 1 to be robust against typos, i.e., if an input term is not part of the tag list, uses string similarity measures such as Levenshtein edit distance to map the input to the most similar existing term. For instance, the queries "appletree balloons" and "appeltree balloon" should both find images showing the apple tree and the balloons. For standard measures of string similarity you can use an existing programming library, such as the jellyfish python library (https://pypi.python.org/pypi/jellyfish). The report should list any such libraries used.
c) [10% of coursework marks] Method 3 extends Method 2 using the controlled vocabulary developed in Task 1. That is, in addition to queries using (slight variants of) the predefined tags, it can answer queries that use known synonyms and concepts higher up in the hierarchy. For instance, if there is a concept "pet" in the hierarchy that contains "cat" and "dog", a query for pet should retrieve images with a cat or dog.
d) [10% of coursework marks] Method 4 extends Method 3 to also return images that match conceptually similar tags, i.e., tags that are close to the input term in the hierarchy, where the most similar tags achieve the highest ranks. For instance, given query "oaktree pie owl", pictures with these three objects should be ranked higher than pictures with an oak tree, a pizza and an owl, which in turn should be ranked higher than pictures with an oak tree and an owl, but no food at all.
In your report, you should
for each method, define the similarity function it uses (how do you rank the images?), and briefly motivate your choice (why is this a good way to rank?);
list the top 5 answers (image identifier and similarity) of each method for the three queries
Q1: appletree cat
Q3: tree hat duck
briefly discuss the key strengths and weaknesses of the methods based on these answers
Task 3: Image-based Search
The final task is to retrieve images based on their similarity to a given image rather than a textual query, again using the same output format.
a) [10% of coursework marks] As a first step, write a method that, given an image identifier, constructs a textual query from that image's tags and uses the best method you developed in Task 2 to find similar images.
b) [20% of coursework marks] Write a method that, for a given image identifier, combines the text-based similarity used in 3a) with a second similarity measure based on the spatial information. For instance, if the crown in the input image is close to the girl's head, the spatial similarity measure (on its own) should prefer images where the crown is close to the girl's head over those where it is far away. Hint: have a look at the closeness values of sunglasses and hats to get a better idea of the range of these values before defining your similarity measure.
In your report, you should
define the spatial similarity measure you use, specify how it is combined with the text-based one, and briefly motivate your choices;
for each of the two methods, list the top 5 answers (image identifier and similarity) of each method for the images Scene339_0, Scene335_0 and Scene313_0, as well as precision and recall for the top 5 answers, using the image class as the ground truth, i.e., for image SceneX_Y, all images SceneX_* are considered similar, and all other images not similar;
briefly discuss the key strengths and weaknesses of the two methods based on these results.
This assignment is worth 50 % of the total marks available for this module. The penalty for late or non-submission is an award of zero marks.
Program source listings for tasks 2 and 3 must be included as appendices in the main PDF report file
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710765.76/warc/CC-MAIN-20221130160457-20221130190457-00559.warc.gz
|
CC-MAIN-2022-49
| 6,386
| 35
|
http://www.casperlajensen.com/portfolio/24bottles-startwithabottle/
|
code
|
My role: Concept design, modeling and texturing and animation
Client: Personal project
As a tribute to the brilliant brand 24Bottles, I wanted to create a commercial for their Clima bottle. Their brand has a mission to be carbon-neutral and limit the impact and footprint on the earth by planting forests. I wanted to tell their story and display how elegant their Clima bottle product is and create an abstract story about how they stay carbon neutral.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474690.22/warc/CC-MAIN-20240228012542-20240228042542-00537.warc.gz
|
CC-MAIN-2024-10
| 453
| 3
|
http://www.uchithar.net/
|
code
|
I came across a gem of a blog recently on exactly the same and thought I'd shamelessly copy/paste it to easily share the pieces that made me cry with laughter the most. Soon I realized that the pieces that made me laugh most are the ones about languages that I have dealt with in the past in one way or the other. So technically this piece in it's whole should be able to make any programmer laugh. A must read indeed.
The original link named 'A Brief, Incomplete, and Mostly Wrong History of Programming Languages' is here.
Here are the ones that was more personal for me in chronological order. I'd love to hear from my friends on which ones made them rofl ;)
1972 - Dennis Ritchie invents a powerful gun that shoots both forward and backward simultaneously. Not satisfied with the number of deaths and permanent maimings from that invention he invents C and Unix.
1983 - Bjarne Stroustrup bolts everything he's ever heard of onto C to create C++. The resulting language is so complex that programs must be sent to the future to be compiled by the Skynet artificial intelligence. Build times suffer. Skynet's motives for performing the service remain unclear but spokespeople from the future say "there is nothing to be concerned about, baby," in an Austrian accented monotones. There is some speculation that Skynet is nothing more than a pretentious buffer overrun.
1987 - Larry Wall falls asleep and hits Larry Wall's forehead on the keyboard. Upon waking Larry Wall decides that the string of characters on Larry Wall's monitor isn't random but an example program in a programming language that God wants His prophet, Larry Wall, to design. Perl is born.
1995 - At a neighborhood Italian restaurant Rasmus Lerdorf realizes that his plate of spaghetti is an excellent model for understanding the World Wide Web and that web applications should mimic their medium. On the back of his napkin he designs Programmable Hyperlinked Pasta (PHP). PHP documentation remains on that napkin to this day.
1996 - James Gosling invents Java. Java is a relatively verbose, garbage collected, class based, statically typed, single dispatch, object oriented language with single implementation inheritance and multiple interface inheritance. Sun loudly heralds Java's novelty.
2001 - Anders Hejlsberg invents C#. C# is a relatively verbose, garbage collected, class based, statically typed, single dispatch, object oriented language with single implementation inheritance and multiple interface inheritance. Microsoft loudly heralds C#'s novelty.
2003 - A drunken Martin Odersky sees a Reese's Peanut Butter Cup ad featuring somebody's peanut butter getting on somebody else's chocolate and has an idea. He creates Scala, a language that unifies constructs from both object oriented and functional languages. This pisses off both groups and each promptly declares jihad.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997858581.26/warc/CC-MAIN-20140722025738-00000-ip-10-33-131-23.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 2,858
| 10
|
https://support.mozilla.org/zh-TW/questions/1377369
|
code
|
After upgrading to Firefox 100 version, AJAX uploader is not working for larger files
We have a AJAX uploader (Cutewebui) in our site. It was working fine for smaller and larger files. But after upgrading firefox version to 100, it is not working. It is giving error 'html5: the upload task is interrupted'.
For older versions it is working fine.
Please help us to resolve it.
Did you check the Web Console and possibly the Network Monitor for possible clues about what is going on ?
You can create a new profile as a quick test to see if your current profile is causing the problem.
See "Creating a profile":
If the new profile works then you can transfer files from a previously used profile to the new profile, but be cautious not to copy corrupted files to avoid carrying over problems.
Try to ask advice at a web development oriented forum.
We are also facing same issue but with normal file upload control also. Reported issue at: https://support.mozilla.org/en-US/questions/1377891
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104542759.82/warc/CC-MAIN-20220705083545-20220705113545-00717.warc.gz
|
CC-MAIN-2022-27
| 988
| 10
|
http://stackoverflow.com/questions/21337974/building-a-comma-separated-string-of-related-values-to-display-in-a-listview-con
|
code
|
I'm new to vb and currently I have this project on hand which requires me to display some employee information. I've stored all my data in ms access, in a table called "ScheduleInfo". There are three rows: "WorkerID", "TaskNo", and "TimeTaken". Each worker will need a certain amount of time to complete each task.
The problem is I have to display in vb.net the task (grouped together), numbers of worker who are able to do the task (count the workers according from task), and which are the workers (WorkerID).
I only managed to display first two column on a
ListView, which group my tasks together and count how many workers are available for the task.
WorkerID | TaskNo | TimeTaken
- 1 | 1 | 7.5
- 4 | 1 | 2.5
- 1 | 2 | 3.5
- 2 | 2 | 1.5
- 1 | 3 | 2.5
- 2 | 3 | 4.5
- 3 | 3 | 3.5
- 2 | 4 | 3.5
-and the list goes on-
i couldn't attach an image of how my database looks like, here is roughly an idea.
i'm trying to display it on vb like:
TaskNo | No. of Workers | Workers available
- 1 | 2 | 1 , 4
- 2 | 2 | 1 , 2
- 3 | 3 | 1 , 2 , 3
-and the list goes on according to how many task i have-
Private Sub Form1_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load conn.ConnectionString = myConString conn.Open() Dim SQLString As String = ("SELECT [TaskNo], COUNT(*) FROM ScheduleInfo GROUP BY TaskNo") cmd = New OleDbCommand(SQLString, conn) da = New OleDbDataAdapter(cmd) ds = New DataSet da.FillSchema(ds, SchemaType.Source, "ScheduleInfo") da.Fill(ds, "ScheduleInfo") dt = ds.Tables("ScheduleInfo") LstViewScheduleInfo.Columns.Add("TaskNo", 150, HorizontalAlignment.Center) LstViewScheduleInfo.Columns.Add("No of Workers", 150, HorizontalAlignment.Center) LstViewScheduleInfo.Columns.Add("List Of Workers", 150, HorizontalAlignment.Center) For Each row As DataRow In dt.Rows() Dim lst As ListViewItem lst = LstViewScheduleInfo.Items.Add(row(0)) For i As Integer = 1 To dt.Columns.Count - 1 lst.SubItems.Add(row(i)) Next Next conn.Close() End Sub
i am not sure if this is the proper way of doing, this is what i have. Right now I have no idea how I could loop through the database and pull out the workers who are available for the job. Do I use another sql query? Any help will be appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246660448.47/warc/CC-MAIN-20150417045740-00057-ip-10-235-10-82.ec2.internal.warc.gz
|
CC-MAIN-2015-18
| 2,228
| 23
|
https://devhub.io/repos/narayanan2004-GraphMat
|
code
|
GraphMat graph analytics framework
Note: This is a major update from GraphMat v1.0 (single node and distributed). Please see changelog for details.
- Intel compiler (icpc) + Intel MPI (mpiicpc + mpi libraries)
GCC + MPICH (Other MPI libraries not tested)
Boost serialization library (links to libboost_serialization)
To compile with Intel compiler + Intel MPI :
To compile with gcc + MPICH:
make MPICXX=mpic++ CXX=g++
Set the following environment variables:
export OMP_NUM_THREADS=[ number of cores in system ] export KMP_AFFINITY=scatter
numactl for NUMA (multi-socket) systems if you are running 1 MPI rank on all the sockets e.g.
mpirun -np <NRANKS> numactl -i all bin/PageRank < graph file > mpirun -np <NRANKS> numactl -i all bin/BFS < graph file > < start vertex >
To compile and run tests:
GraphMat uses Catch, a C++ based testing framework.
git submodule init git submodule update make test
To run all the tests with a single MPI rank,
Tests are also runnable in distributed mode with multiple ranks,
mpirun -np <NRANKS> ./testbin/test
You can also do ./testbin/test -? to list all the options available
Reading graph files to use with GraphMat:
If you use GraphMat in your work, please cite the following papers:
Narayanan Sundaram, Nadathur Satish, Md Mostofa Ali Patwary, Subramanya R Dulloor, Michael J. Anderson, Satya Gautam Vadlamudi, Dipankar Das, Pradeep Dubey, “GraphMat: High performance graph analytics made productive”, Proceedings of VLDB 2015, volume 8, pages 1214 - 1225.
Michael J. Anderson, Narayanan Sundaram, Nadathur Satish, Md Mostofa Ali Patwary, Theodore L. Willke and Pradeep Dubey, “GraphPad: Optimized Graph Primitives for Parallel and Distributed Platforms,” 2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS), Chicago, IL, USA, 2016, pp. 313-322.
Paper URL: - www.vldb.org/pvldb/vol8/p1214-sundaram.pdf - http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7516027
More documentation coming soon. For questions, please email [email protected]
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347402457.55/warc/CC-MAIN-20200529054758-20200529084758-00277.warc.gz
|
CC-MAIN-2020-24
| 2,016
| 25
|
https://findonlinecourses.org/course/data-science-linear-regression/
|
code
|
Data Science: Linear Regression
About this course
Learn how to use R to implement linear regression, one of the most common statistical modeling approaches in data science.
What you’ll learn in Data Science: Linear Regression
- How linear regression was originally developed by Galton
- What is confounding and how to detect it
- How to examine the relationships between variables by implementing linear regression in R
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587606.8/warc/CC-MAIN-20211024204628-20211024234628-00011.warc.gz
|
CC-MAIN-2021-43
| 421
| 7
|
http://downloadsquad.switched.com/2008/12/12/how-to-say-where-is-the-bathroom-in-34-languages-at-once/
|
code
|
How to say where is the bathroom in 34 languages at once
Nice Translator is powered by Google Translate, so you get the same results from Google. But the interface is incredibly easy to use. Just select the languages you want to translate text into and start typing. Nice Translator will convert your words as soon as you type them.
The site also works on mobile devices like the iPhone if you happen to need to ask a passing stranger if you're getting a good price on that souvenir you've been haggling over. The answer, by the way, is probably no.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931011060.35/warc/CC-MAIN-20141125155651-00026-ip-10-235-23-156.ec2.internal.warc.gz
|
CC-MAIN-2014-49
| 549
| 3
|
https://safety.veevavault.help/gr/user-help/send-safety-reports/send-track-email-transmissions/
|
code
|
Sections in This Article
Note Depending on your Admin's configuration, object, field, and section labels, lifecycle states, and workflows may differ from the general information on this page. Refer to your organization's business processes for guidance.
Vault Safety supports sending Submissions and Distributions over email with full tracking of email events for delivery, opening, and errors.
This page provides instructions to Distribution Manager users to send Email Transmissions. For information on administering this feature, see Configure Email Transmissions.
Email transmissions include an Individual Case Safety Report (ICSR) document and can be sent to one or more recipients. The ICSR format, optional cover letter, and mailing list are managed on the transmission profile.
- An administrator must have already configured the email settings, including the destinations, in an Email Profile.
- You must have permission to manage Transmission object records. Typically, these permissions are reserved for Distribution Manager users.
How Email Transmissions are Generated
When the Vault Safety rules engine determines that a Case meets reporting criteria for an organization and matches an Email Profile, the system generates a Transmission (Submission or Distribution) record in the Ready state and associates it with the Case.
The Transmission uses the settings configured on the Email Profile to populate the email fields and generate the correct transmission documents, including a cover letter if applicable.
Note Vault Safety does not validate E2B XML files generated for Email Distributions.
View Email Contents
You can view the email contents and attachments from the following fields on the Transmission (Submission or Distribution) record:
- Message Subject
- Message Body
- Cover Letter
Configure Email Transmissions provides more information on Email Transmission fields.
Send Email Transmission Action
Use the Send Email Transmission action to send email transmissions. Depending on your vault’s configuration, this action may be available as a user action or triggered as part of a workflow.
For auto-submissions, the Send to Gateway action on the Case includes sending email transmissions with auto-submissions enabled.
Transmission Lifecycle States for Email Transmissions
The following table describes the Email Transmission states and how records enter these states:
|Sent||When the email has been sent to all recipients.|
|Complete||When the email has been delivered to all recipients.|
|Error||When the email could not be delivered to one or more recipients.|
Track and Monitor Emails
When the Vault Safety reporting rules engine determines a Case requires an email distribution, the system automatically generates the appropriate type of Transmission record (Submission or Distribution) and associates it with the Case.
The system automatically generates the transmission documents according to what is configured on the Email Profile and attaches them to the Transmission record.
Note Total attachment size cannot exceed 15MB.
Email Events Log
Vault Safety tracks certain key events in the Transmission record. Events are logged for each recipient. Review the events log to view these events and monitor when the email was sent and opened.
The following table describes the events the system logs for Email Transmissions:
|Initial Message Sent||The initial email was sent to a recipient.|
|Message Delivered||An email was successfully delivered to a recipient.|
|Message Opened||An email was opened by a recipient.|
|Error||An email could not be delivered to a recipient.|
Note Consider the following when tracking email events:
- Not all email addresses support full event tracking, depending on the recipient email server security settings.
- Email receipt status updates may be delayed up to one hour.
- Vault Safety cannot guarantee the delivery of email event messages due to the possibility of temporary recipient email server outages.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103558.93/warc/CC-MAIN-20231211045204-20231211075204-00087.warc.gz
|
CC-MAIN-2023-50
| 3,974
| 40
|
https://github.com/cappachu
|
code
|
Prevent this user from interacting with your repositories and sending you notifications.
Learn more about blocking users.
You must be logged in to block users.
Contact GitHub support about this user’s behavior.
Learn more about reporting abuse.
Fast Double Precision Matrix Matrix Multiply
Chat with Folks on Your Local Area Network
Port of Nathan Marz's specter from clojure to python
Find and Understand *nix Commands
The Structure and Interpretation of Computer Programs
Forked from iloveponies/training-day
Seeing something unexpected? Take a look at the
GitHub profile guide.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656963.83/warc/CC-MAIN-20230610030340-20230610060340-00790.warc.gz
|
CC-MAIN-2023-23
| 582
| 13
|
https://crisp.seas.harvard.edu/
|
code
|
- Efficient low-rank spectrotemporal decomposition using ADMM
- A Two-Dimensional Seperable Random Field Model of Within and Cross-Trial Neural Spiking Dynamics
- Can you teach an old monkey a new trick?
- Physostigmine and Methylphenidate Induce Distinct Arousal States During Isoflurane General Anesthesia in Rats.
- System And Method For Real-Time Analysis And Guidance Of Learning
- Measuring the signal-to-noise ratio of a neuron
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886107720.63/warc/CC-MAIN-20170821060924-20170821080924-00244.warc.gz
|
CC-MAIN-2017-34
| 434
| 6
|
https://www.sharepointdrive.com/blog/sharepoint-document-generator-1-0-release-2/
|
code
|
Did you ever wanted or tried to assembly a document by using data stored in SharePoint? Invoices, legal forms, memos, or letters for customers are just few document examples that are used every day. Microsoft Word 2007 provides a way to embed information from SharePoint document library metadata columns into Word document by using Quick Parts. Besides that there are some unexpected behavior when using Quick Parts with lookup, calculated or multi valued columns there are also no way to insert information from related lists by lookup columns. For example, image that you have purchase orders SharePoint document library where customer is defined as a lookup column to the customers list and you want to have customer’s shipping address in the purchase order’s document. Or, more over you want to iterate related items from the orders details list to purchase order’s document details table. So what can be done in such situations?
I’m happy to announce we are releasing our first SharePoint Document Generator release. Using SharePoint Document Generator you can easy assembly documents from SharePoint lists using well know Microsoft Word 2007 templates.
SharePoint Document Generator template example
SharePoint Document Generator uses Custom XML schema to define which fields/columns values to embed in to the document. All fields values will be displayed the same as they are displayed in SharePoint lists. Great news is that you can insert lookup columns and set which column’s value to take from the referenced list. And of course you can insert a repeat tag and set its properties to iterate whatever child list items you want. It is done with a couple of simply steps: select a table row, insert Repeat tag, set child list name you want to iterate. And that’s it!
Custom actions in the Edit Control Block (ECB) menu and items display form.
You can download SharePoint Document Generator Free version and try it by yourself. The only limitation of free version is maximum of 3 rows can be iterated from lists related by lookup columns. Check out our demo video how to start using SharePoint Document Generator.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371829677.89/warc/CC-MAIN-20200409024535-20200409055035-00223.warc.gz
|
CC-MAIN-2020-16
| 2,133
| 6
|
https://www.cardschat.com/f13/giving-free-10-no-how-should-178839/
|
code
|
I'm glad I don't live in the US. Here in England we can gamble on ANYTHING so long as the government get their tax (although there's no gaming tax on winnings anymore!)
Anyway, your best bet with this $10 if you want it to last is to play the smallest SnG's they have or the lowest buy in ring game (0.01/0.02c with a $2 buy-in?) and play ultra tight until you've at least tripled this bankroll.
I assume you intend on finding a way of depositing? You will need to, as most poker sites
dont let you cash out until you have...even if you ran this $10 up to $10,000 you wouldn't be able to get any of it.
Personally, I'd find where your strengths lie on that particular site, and make sure you eventually deposit enough that you're rolled for your choice of game. Maybe it'll be $2 SnG's or $5 ring, just use your free cash to feel the site out then make a deposit to make a good run at those stakes. Its very rare that a player makes a bankroll out of $10.
Very good luck to you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719273.37/warc/CC-MAIN-20161020183839-00566-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 978
| 6
|
https://www.itcentralstation.com/products/comparisons/microsoft-powerapps_vs_oracle-visual-builder-cloud-service
|
code
|
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"I can have a SharePoint list and connect with users through PowerApps to present the information."
"It's a very workable solution because it's an automated way of making applications. You have a template, you have the application know-how,"
"There are a lot of different applications; you can connect PowerApps, or Flow, or Power BI to many different types of applications to interchange data."
"The initial setup was very easy."
"The most valuable feature is the simple data connectivity components."
"Can design apps quickly and can connect to any database."
"The solution is very good. It's very full. You can do almost anything."
"There's a lot of online knowledge on the solution, to the point where new users can basically teach themselves how to use the solution."
"The most valuable feature was the visual drag and drop on the components."
"The editor in the Web browser could be improved because it can be difficult to implement the commands in the buttons."
"The product could be improved by making it a production application and enabling the export of apps."
"The solution is evolving very fast and every month new features are introduced. Sometimes it's difficult to catch up with all the evolution that's happening. I had to focus on Power BI for a while and left PowerApps at the side for a couple of months and when I came back, it had changed its interface and moved components around."
"I have always felt that you need an IT background to use this solution."
"Integration with databases and other tools needs to be improved."
"Customer support needs improvement."
"This tool doesn't have an internal database. It only relies on the data layer of Microsoft Cloud."
"One of the major problems with it is what PowerApps calls the delegation warning. Regardless of what platform, data source, et cetera, that you're using, you can't retrieve more than 2000 records."
"There was an attempt to enable front-end development, it did what it intended to do, but the side effects were too bad."
"If you start to use any premium connectors that are not stored in a SharePoint list or on an Excel workbook, then it costs $4 per user per month. If you want unlimited, it's about $16 per month for unlimited apps, and unlimited connectors."
"The company has a subscription where you can use certain features for free, but there are features that require a premium subscription to use."
"The enterprise-level costs a great deal of money, and you have to purchase additional licenses to scale it."
"We use the Office 365 package, and Microsoft PowerApps is a part of the package. We don't pay any separate price for this. There are no additional costs. We just pay for the Office 365 package."
"There are two licensing costs, one is pay-as-you-go, or you can develop it for one year."
"This is not an expensive product and there are no licensing fees."
"It is not expensive. There is no licensing cost."
"The pricing is too expensive and the licensing system is complicated. There are many pages of instruction on how to do the calculations for the price."
"Oracle Visual Builder Cloud Service is much too expensive."
PowerApps enables a broad range of app scenarios to be created that infuse digital transformation into manual and outdated processes. Use both canvas and model-driven apps to build PowerApps that solve business problems for task and role-specific scenarios like inspections, field sales enablement, prospect to cash, and integrated marketing views.
Oracle Visual Builder Cloud Service is a cloud-based software development Platform as a Service (PaaS) and a hosted environment for your application development infrastructure. It provides an open-source standards-based solution to develop, collaborate on, and deploy applications within Oracle Cloud.
Microsoft PowerApps is ranked 4th in Rapid Application Development Software with 27 reviews while Oracle Visual Builder Cloud Service is ranked 24th in Rapid Application Development Software with 1 review. Microsoft PowerApps is rated 7.8, while Oracle Visual Builder Cloud Service is rated 5.0. The top reviewer of Microsoft PowerApps writes "Great for quickly making apps, with reasonable pricing, but doesn't scale well externally". On the other hand, the top reviewer of Oracle Visual Builder Cloud Service writes "An over-priced, complicated solution that does what it was developed to do". Microsoft PowerApps is most compared with Oracle Application Express (APEX), Microsoft Azure App Service, ServiceNow, Mendix and OutSystems, whereas Oracle Visual Builder Cloud Service is most compared with Oracle Application Express (APEX), Oracle Java Cloud Service, Studio Creatio, Oracle Developer Cloud Service and Microsoft Azure.
We monitor all Rapid Application Development Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991378.48/warc/CC-MAIN-20210515070344-20210515100344-00343.warc.gz
|
CC-MAIN-2021-21
| 5,135
| 32
|
https://wiki.lyrasis.org/pages/diffpagesbyversion.action?pageId=185992050&selectedPageVersions=4&selectedPageVersions=3
|
code
|
Google Doc for meeting notes: https://docs.google.com/document/d/1AUccf5tN3i84VowEcdj1jf_6Q6Tq3sFFl_pWZqdbI98/edit?usp=sharing
- On-line VIVO conference. See VIVO Conference 2020 Task Force
- Pidapalooza report
- Mathias Brochhausen
- EuroCRIS Technical Committee
- AEON (Academic Events Ontology)
- next steps?
- Language Ontology
- draft domain definition https://github.com/vivo-community/language-ontology/wiki/Domain-Definition. Ready to post on vivo-community for comments?
- Comments on ontology
- A draft ORG ontology
- ORG is relatively straightforward given previous work on OpenVIVO, Early Thoughts document, and ROR/GRID data. Would need to work out subsumption, dispositions (most orgs have dispositions/capabilities rather than functions or types), and addresses/locations.
- What artifacts besides the ontologies themselves are needed? Training aids? Conversion aids? RMLMapper maps? SHACL constraints?
- VIVO On-line conference. End of June?
- The Ontology Group is interested in pulling in ontological fringe cases into the spotlight.
- Maybe a keynote with ontological focus.
- Pidapalooza – conference metadata and conference identifiers
- Anna collaborating with students who want to represent links. They build upon the work of http://www.scholix.org/schema. http://ontology.tib.eu/rio/ might be relevant to them.
- Mathias. Deontic acts. Document acts. Academic degrees. And Relationship: Grant, Membership. "The third thing". Perhaps qualities.
- Reconciling models. VIRO and EuroCIRS. Others?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154798.45/warc/CC-MAIN-20210804080449-20210804110449-00033.warc.gz
|
CC-MAIN-2021-31
| 1,518
| 20
|
http://www.tsi.lv/?id=1759&lang=en&ct=2&cid=1759&r=3735
|
code
|
Club of programmers
Команда по футзалу
Sports in the Institute
To those who are fond of we can offer to become a member of TTI sports club. Gymnasiums for basketball and football games are rent for TTI sports club members.
Transport and Telecommunication Institute:
LV-1019, Lomonosova street 1, Riga, Latvia, |
phone: (+371)67-100-661, fax:(+371)67-100-660 | Style:
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700984410/warc/CC-MAIN-20130516104304-00072-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 382
| 7
|
https://news.science/a-broken-system-is-failing-thousands-of-americans-with-disabilities/
|
code
|
Adults with developmental or intellectual disabilities in the U.S. are legally entitled government-funded assistance. But hundreds of thousands of them are either getting no help, or not the kind they need. VICE News investigates how the lack of funding and political will, combined with a limited number of care options for a diversity of needs, has led to a crisis in care for one of the country’s most vulnerable populations.
Subscribe to VICE News here: http://bit.ly/Subscribe-to-VICE-News
Check out VICE News for more: http://vicenews.com
Follow VICE News here:
More videos from the VICE network: https://www.fb.com/vicevideo
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046155925.8/warc/CC-MAIN-20210805130514-20210805160514-00354.warc.gz
|
CC-MAIN-2021-31
| 633
| 5
|
https://sourceforge.net/p/gnuplot/patches/583/
|
code
|
Two minor bugfixes for doc2texi.el (the documentation -> texinfo converter):
- clearer code for determining which term files to read in `d2t-get-terminals`. Avoids adding the same terminal file as an Info node more than once, which could happen before on some systems.
- fix code for uniquifying duplicate node names; won't fail if more than two nodes have the same name, although that shouldn't happen any more
Log in to post a comment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886126027.91/warc/CC-MAIN-20170824024147-20170824044147-00171.warc.gz
|
CC-MAIN-2017-34
| 437
| 4
|
https://careers.paradox.ai/all-jobs
|
code
|
Join Our Team Our clients are located around the globe and so are we!Apply Now
It takes the best to be the best.
We’re looking for the best and the brightest to help us expand across the globe. Are you ready to roll up your sleeves and see the impact of your work? If you’re ready to grow your career, raise your hand and tell us how you’re going to help us build the future.
Raise your hand for opportunities at Paradox.
We’re growing our footprint both within the US and globally. If you’re interested in joining the team as we open new offices or to be considered for select remote positions, chat with Olivia and let her know what you can bring to our team.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510130.53/warc/CC-MAIN-20230926011608-20230926041608-00447.warc.gz
|
CC-MAIN-2023-40
| 671
| 5
|
https://community.qlik.com/thread/288428
|
code
|
if it's the case, or u know the name of the probably existing file, or use the *.fileextension, if u're not sure of its name
do sthing as follow:
LOAD data from the probably existingFile;
then delete what u've imported
if ScriptError>0 then
store ur Qvd
With that, what we're doing, is :
1) negating the fact that qlik stop the reloading process if there is an error
2) try to import sthing from the file that could be in ur folder (then delete it)
3) if it's there, u won't do anything
if it's not, so normally that should be an error (if ScriptError>0 then)
=> store ur qvd
I have this code at the start of my script to see if the QVD exists:
LET vListqvdexists=isnull(QvdCreateTime('lib://QVDS/DTRAK\$(vCurrentYear)\Load\StopData$(vCurrentYear).QVD')); // if qvd exists then 0 else -1
Then further down the script I check the value of this variable and then do what I need to do
That is the bulk of the code.
The variable will contain a 0 or -1.
In my script I check the variable for a 0 (meaning the QVD does exist) and then do whatever logic I want to do based on it already existing. Or I could do the opposite and check for a -1(does not exist)
We create QVDs that are year specific and have the year in the name. So when we rolled into the new year I needed to do something different on the first day since it didn't exist. After that I go back to my normal routine.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511889.43/warc/CC-MAIN-20181018152212-20181018173712-00131.warc.gz
|
CC-MAIN-2018-43
| 1,374
| 19
|
http://redbarnhandyman.com/wp-content/uploads/2015/book/download-RESTful-Java-with-JAX-RS-2.0/
|
code
|
You are to hack CSS sent off. therefore are not participate out this Download Immigration Policies And The Global Competition. You are to be CSS wanted off. then agree n't be out this download On certain Fourier series. The Download Autobiografía is very made. The understanding is good. is a and 7-day fluid series. pervasive Click The Following Article, striped history rocks, focal working, and similar library Jensenists know to See Python a currently sheltered duration for dependent subevents of Uncertainty. elastic for XML, reader centuries, children electricity, and Web contacts becomes added. interested earthquakes for GUI listen to this podcast transmit cohesive, Also altogether as module of low-pass development, surface, and displacements gabbro high-frequency. 5 if you are possible Get More Information. If you Do the ' for frequent Conditions, for earthquakes ' download Auguste Comte: Einführung in Leben und Werk 1998 it is a & 9d, a tip embraced seismicity and is a money for the survey where you can love your ' Preparation Respect ' field are on the database at stress or life or dynamic in data. intracerebral look what i found: Although I like Perl, there moves one text about the crust that rather tells me. It appears the pygame that ' There is More Than One slip To connect it '. The I have brainwashed teacher&rsquo and cell fairly is that there Have microstructural MANY models to view emotion that sharing in behind file generally and including with their manner is high a relation, even if the Conference is more than a flexible hundred tools too. If the download Programming that Accelerated the s has control in a Please wonderful name than you, you might emotionally now contact a homepage of &ndash because it is being exist you 6 forms above to result out what suggests enhancing on! I want Python occurred outdoors surrounded with this in download An Essential Introduction to Maya Character Rigging with DVD 2008.The download RESTful Java with JAX sent in the twentieth things and inferred Just cast in February 1991. In Sudden authors, Guido Van Rossum recommended sliding on the Amoeba began including heat list. He were to Notice an clicked magnitude like ABC( ABC is coveted resource feature) that could belong the Amoeba propaganda books. not, he led to melt a behavior that worked Small. This represented attenuation; distribution of a first rupture which jumped later confronted Python. 39; move saved after a Dynamic time. Rossum did fault of a building server from first personnel.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202476.48/warc/CC-MAIN-20190321010720-20190321032720-00181.warc.gz
|
CC-MAIN-2019-13
| 2,532
| 1
|
http://www.mono-project.com/community/contributing/source-code-repository/
|
code
|
Source Code Repository
The Mono source code is hosted on GitHub using the Git source code control system for all of its source code. Although only active contributors get write access to the modules on Git, third party developers and easily fork the code on GitHub or download full copies of the repositories to their own systems.
Here we describe how one obtains commit access to the Mono Git repository and the responsibilities that come with that access privilege.
Browsing the Sources
If all you need is to browse the sources, you can go to Mono Organization page on GitHub.
Building Mono from source
Once you’ve obtained the source code for different modules of the Mono project, you’ll want to build Mono from source
Now that Mono is hosted on GitHub, contributing patches has never been easier. If you aren’t yet familiar with GitHub, you may wish to read GitHub’s guide on getting started.
Once you’ve gotten a GitHub account and gotten set up, you should read GitHub’s guide to forking a repository. Once you feel that your patch is finished and you’ve tested that everything still builds and works as expected, you can then issue a pull request which alerts the active maintainers that they should examine and review your patch, merging it into the mainline source repository.
It is important that everyone follow these policies:
We have our own coding guidelines.
If you are about to commit code to a module, the code that is being committed should be released under the MIT license.
If in doubt, check with the maintainers of the module, or send mail to email@example.com.
Even if you have write access to the official Mono Project GitHub repositories, that doesn’t mean you can change code at will in any directory or module. Directories and Namespaces have a sort of unofficial ownership. If you are not the owner of a piece of code and you want to make changes/fixes to it, there are two cases.
The change is a typo fix or a one-liner build or trivial fix. In this case almost anyone can commit (always remembering to add the proper changelog entry to explain the change). We say “almost anyone”, because changes to certain directories almost always should be reviewed first. Such as changes to core stuff: corlib/System, System.Collections, mini/, metadata/, System.IO.
The change is larger. In this case the patch must be sent to mono-devel-list for review by the owner of the code and by the other hackers. Always submit such patches to the list or bugzilla, although you may put the owner of the code in the CC header. Hackers come and go. Mailing a patch to only a personal address is a good way to get the patch forgotten and missed. Plus, getting the patches reviewed as well as reviewing them, is a good thing, so try to get used to it.
Note: If the patch is an addition of code and doesn’t change any of the existing code, the rules are slightly relaxed: there is more freedom in committing such changes, if they don’t interfere with the existing codebase.
Now, how do you get to be the owner of a chunk of code? The answer is simple. You wrote the code, so you’re the unofficial owner. There is also another way. After sending a few patches for the code, the owner (or the core developers of mono, if the owner somehow disappeared) trusts you and tells you you’re free to commit without getting his review first.
You can most likely find ownership by reading ChangeLogs or by using
git blame. The entries are with emails, so feel free to ask them. If you are still unsure, post your patch to the mailing list (mono-devel-list).
If you are the owner of a piece of code, feel free to commit code, and delegate the work to others.
But, if you’re not the owner of the code, committing a rewrite without getting a review first is frowned upon (especially when the rewrite claimed to fix bugs, but not a single regression test has been added to the suite).
There are a few rules to follow before making a pull request on GitHub:
Sign the .NET Foundation CLA
Always make sure to add meaningful commit logs
If you fix a bug, add a regression test for it in the test suite
Don’t commit unrelated changes together with a fix: do fine-grained commits
Always check what you’re committing: make sure you’re only committing what you need and make sure you don’t change line endings and whitespace. Do a
git diffof the files you’re going to commit and check the changes.
Don’t do reformatting commits, unless you’re the original author of the code
When fixing bugs, don’t follow the documentation blindly, it may well be wrong. Test the behavior on the MS runtime or ask on the list for discussion if unsure. Don’t be afraid of having your changes reviewed.
Never remove copyright notices from the code
Never remove licensing info from code
Never commit code you didn’t write yourself or code that doesn’t have a suitable license
For documentation fixes, never copy paste documentation from Visual Studio class view or MSDN.
Never use a decompiler or disassembler to look at proprietary code.
Follow the coding guidelines
Keep an eye on performance considerations, especially for code in core classes, ask on the list for guidance
Do a regression test run and a bootstrapping build if making changes to core functionality before committing. Do not commit code that would break the compile, because that wastes everybody’s time. Two things are important in this step: trying to build your sources and making sure that you add all the new files before you do a commit.
Also, remember to pat yourself on the back after the commit, smile and think we’re a step closer to a better free software world.
Getting Help With Git
GitHub maintains some great resources for developers here:
Keeping track of code changes
We provide an e-mail based mechanisms to keep track of changes to the code base:
- mono-patches: This mailing list receives in patch form all the changes that are being made to git. To subscribe, send an email message to firstname.lastname@example.org and in the body of the message put `subscribe’ or click on the link.
This will send you an email message every time a change is made to the git repository, together with the information that the author of the changes submitted.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948542031.37/warc/CC-MAIN-20171214074533-20171214094533-00029.warc.gz
|
CC-MAIN-2017-51
| 6,255
| 46
|
https://www.realworkfromanywhere.com/jobs/don-t-see-your-role-centrifuge-9036
|
code
|
If you don't see your role here, but feel your skillset can benefit Centrifuge, please send us a resume at firstname.lastname@example.org
We are an early-stage startup with a big mission to bridge real-world finance to DeFi. We do this by tokenizing real-world assets, like invoices, so that they can be financed through our Tinlake pools at tinlake.centrifuge.io. Tinlake has over $2m TVL, with major features in the coming months to exponentially expand our growth.
Our team is a self-managed organization of 16 (and growing) that gives you plenty of space to experiment and fit into the roles that excite you the most. We value diversity, which is reflected in our team. We host regular off-sites (post-covid) and offer office space in Berlin.
There is no preferred work location, but you will be working primarily with a Berlin and NYC timezone. Compensation is blockchain competitive + based on your experience.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818464.67/warc/CC-MAIN-20240423033153-20240423063153-00757.warc.gz
|
CC-MAIN-2024-18
| 916
| 4
|
https://wwt-forum.org/t/first-perseverance-360-panorama-s/285
|
code
|
Compare the newer and far more detailed panorama imaged by the Mastcam-Z: https://bit.ly/wwt-Zcam1st360 with the first,(second video below). Download the WTML: http://bit.ly/wwt-Zcam1st360wtml
Sound on to hear the real sound of wind on Mars!
Explore interactively online in WWT: http://bit.ly/wwt-percy1st360 and download for the Windows client (VR anyone??): http://bit.ly/wwt-percy1st360wtml
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178359624.36/warc/CC-MAIN-20210227234501-20210228024501-00204.warc.gz
|
CC-MAIN-2021-10
| 393
| 3
|