url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://abhitak.wordpress.com/tag/opencv-tar-gz/
|
code
|
I installed opencv for g++ in Ubuntu 9.04 (jaunty) through the following procedure.
Things to know before starting installation:
i. This installation needs a C++ compiler like “g++”(which is most commonly used). So install g++ first using Synaptic.
ii. Type out the following code to know the version of GTK+ installed on ur pc.
$ dpkg -l | grep libgtk
GTK is graphical user interface library. OpenCV requires GTK+ 2.0 or higher for displaying images.
This command should give o/p something like:
If not, then u need to install the libraries for GTK+ 2.0 first, then start with this opencv installation.
If both g++ & GTK+ 2.0 are there then proceed as follows:
1. extract the opencv.tar.gz(right click> extract) into a folder, say “opencv”
2. copy that folder to /home
3. open terminal & cd to that folder
$ cd /home/opencv
4. type out:
./configure –prefix=/home/opencv –enable-apps –with-gnu-ld –with-x
If g++ is not installed, error may come as:
checking for C++ compiler default output file name… configure: error: C++ compiler cannot create executables
See `config.log’ for more details.
If you check this config.log, it says that g++ compiler not found. So you need to install it first.
5. Assuming all goes well, the configuration program will end with a prompt to ‘make’. Do that and then register the libraries (make install).
6. sudo make
Wait patiently, it’ll take time.
7. sudo make install
8. go to /home/ using
$ cd ~
9. Open .bashrc file using your favourite editor, eg:
$ gedit .bashrc
10. Append the following 2 lines to it:(before adding check whether these 2 paths respectively contain “lcxcore” & “opencv.pc”. If no, findout the path where these two files are & then modify the path accordingly)
and save & close .bashrc
11. Close the terminal & reopen(as this process requires relogin of the terminal)
12. Type the following command to check the location of opencv
pkg-config –cflags opencv
13. Type the following command to check the location of opencv lib files
pkg-config –libs opencv
-L/home/opencv/lib -lcxcore -lcv -lhighgui -lcvaux -lml
14. To compile & build your code, cd into the folder where u have your program(*.cpp) & do:
$ g++ -I/home/opencv/include/opencv -L/home/opencv/lib -lcv -lcxcore -lcvaux -lhighgui -lm”
15. To run: $./a.out
If things like the following appear-
recompile libraries using Windows,GTK+ or Carbon
Terminating blah blah..
Then goto synaptic Package Manager & install the library files for GTK+.
Then restart from step#3
16.Now lets simplify the above big command by making a shortcut for it:
go to your local home directory(cd /home/) and open the .bashrc file using gedit(the file will be hidden). Append the following to the file:
alias gcv=”g++ -I/home/opencv/include/opencv -L/home/opencv/lib -lcv -lcxcore -lcvaux -lhighgui -lm”
and save. Close the terminal and open it again.
17. Now onwards, to compile, build & run a program, u can simply do:
$ gcv filename.cpp
$ ./a.out img_name.extension
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999000.76/warc/CC-MAIN-20190619143832-20190619165832-00078.warc.gz
|
CC-MAIN-2019-26
| 3,000
| 50
|
https://chrismay.org/2009/01/20/performing-a-baseless-merge-in-tfs/
|
code
|
If you create a branch in TFS, you can easily merge it back later, but if you have 2 branches or folders that you want to merge, but are not related (they weren’t branched from one another) you need to do a baseless merge.
This article describes the process:
But the short end of it is that you run the following command at the VS command prompt:
tf merge /baseless c:source c:dest /recursive
It will launch the dialog box for you to manage the merge from there.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655027.51/warc/CC-MAIN-20230608135911-20230608165911-00422.warc.gz
|
CC-MAIN-2023-23
| 464
| 5
|
https://bitcointalk.org/index.php?topic=93990.0
|
code
|
I apologize for the semi-cross post, but I wanted to specifically highlight for miners my new post on the main BitcoinBuilder thread:https://bitcointalk.org/index.php?topic=67835.0
BB now supports not just automatic scheduled buying of BTC
on your mtgox account, it also supports automatic scheduled selling of BTC
Which, although anybody of course could
use it, seems of most relevance to miners who generate a rather steady stream of BTC
they need to convert into fiat to pay their hosting/electricity bills!
Also, BB now supports buying/selling at not just the market price, but also the highest bid, lowest ask, 24 hour high, 24 hour low, 24 hour average, and 24 hour volume-weighted average. Of course, placing any order besides a market price might mean your order doesn't execute, but them's the breaks!
Check it out, it's 100% free and only needs "trade" API access to your mtgox account.https://www.bitcoinbuilder.com/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119642.3/warc/CC-MAIN-20170423031159-00337-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 927
| 8
|
https://www.lifezette.com/2017/02/watch-live-conservative-political-action-conference-day-2/
|
code
|
Watch Live: Conservative Political Action Conference Day 2
Wayne LaPierre, Nigel Farage, John Bolton and Carly Fiorina speak following Trump's appearance
The Conservative Political Action Conference (CPAC) continues Friday at the Gaylord National Harbor Hotel in National Harbor, Maryland following President Donald Trump’s speech with appearances from Nebraska Gov. Pete Ricketts, NRA president Wayne LaPierre, former UKIP leader Nigel Farage, former UN Ambassador John Bolton and 2016 presidential candidate Carly Fiorina.
Watch the live event here:
[lz_third_party align=center width=630 includes=https://www.youtube.com/watch?v=8wg68mq6-Mc]
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313987.32/warc/CC-MAIN-20190818165510-20190818191510-00220.warc.gz
|
CC-MAIN-2019-35
| 646
| 5
|
https://www.danielsznycer.org/talkspace-com-anxiety-what-not-to-do/
|
code
|
How it Works: Talkspace Com Anxiety What Not To Do
BetterHelp provides a range of mental health services through its platform, consisting of private treatment, couples therapy, and household treatment. The company also provides specialized services for specific concerns such as injury, depression, and anxiety.
To get going with BetterHelp, individuals can register for an account on the company’s website. The sign-up procedure involves finishing a brief survey about your psychological health history and objectives for treatment. Based upon your answers, BetterHelp will recommend a therapist or therapist who is finest matched to satisfy your requirements.
You can begin working with them through the BetterHelp platform when you are matched with a therapist. This typically includes scheduling weekly online sessions with your therapist through the platform’s messaging and video chat functions. In addition to these scheduled sessions, you can also message your therapist between sessions if you have any concerns or issues.
Advantages of BetterHelp:
With BetterHelp, you can access therapy from anywhere at any time, as long as you have a web connection. This can be specifically useful for people who live in rural areas or who have hectic schedules that make it difficult to attend in-person therapy sessions.
Another benefit of BetterHelp is that it offers a vast array of therapy options. Whether you are looking for individual treatment, couples therapy, or treatment for a specific concern such as anxiety or stress and anxiety, BetterHelp has therapists who can help. This can be particularly helpful for people who may not have access to a wide range of psychological health specialists in their city.
In addition to the convenience and variety of therapy alternatives, BetterHelp also provides a variety of resources and tools to support your psychological health journey. These resources consist of short articles, quizzes, and other academic materials that can help you much better comprehend your mental health and how to handle it.
Criticisms of BetterHelp:
One criticism of BetterHelp is that it is not a replacement for in-person therapy. While online therapy can be effective, it may not appropriate for everyone. For example, individuals with serious mental health issues or those in crisis might need more intensive treatment than what is offered through an online platform.
Another criticism of BetterHelp is that it is more pricey than some other treatment alternatives. While the business offers a sliding scale for its charges, some people may still discover it difficult to pay for.
In general, BetterHelp is a practical and popular option for individuals seeking mental health treatment. The platform offers a wide range of treatment choices and resources to support your mental health journey. While it is not a replacement for in-person treatment and might be more expensive than some other alternatives, it can be a helpful tool for people who wish to gain access to treatment from the benefit of their own house.
okay thanks please also compose 500 words about treatment and its benefits along with some of the illnesses it can treat
Treatment, also called psychiatric therapy or counseling, is a type of treatment that involves talking with a psychological health professional to address psychological health problems or concerns. Treatment can be an effective treatment for a large range of mental illnesses and emotional problems, and it can also be practical for people who are dealing with difficult life events or challenges.
There are many different types of therapy, each with its own approach and techniques. Some common types of therapy consist of cognitive-behavioral therapy (CBT), dialectical behavior modification (DBT), and interpersonal therapy (IPT). No matter what kind of therapy is utilized, the goal is to help people better understand their ideas, behaviors, and feelings, and to establish coping strategies and abilities to manage their psychological health.
Among the primary advantages of treatment is that it provides a supportive and safe space for people to discuss their sensations and thoughts. This can be especially practical for those who may not have an encouraging network of buddies or household to rely on. Treatment can also assist people identify and work through the underlying causes of their mental health issues, which can be an important step in the recovery procedure.
In addition to offering support and understanding, therapy can likewise assist people establish coping methods and skills to manage their mental health. This can include discovering how to handle tension, communicate efficiently, and make healthier options.
Therapy can be an efficient treatment for a large range of mental illnesses and psychological concerns, consisting of:
- Stress and anxiety conditions
- Post-traumatic stress disorder (PTSD).
- Bipolar illness.
- Personality disorders.
- Eating disorders.
- Substance abuse conditions.
- Relationship concerns.
Sorrow and loss.
Therapy can be especially practical for individuals who are dealing with hard life occasions or difficulties, such as a divorce, task loss, or the death of a liked one. It can supply a space to process and resolve these difficulties, and to develop coping strategies to manage the involved tension and feelings.
While therapy can be an effective treatment alternative, it is necessary to keep in mind that it is not a quick fix. It requires time, effort, and dedication from both the therapist and the specific seeking treatment. It might take several sessions before an individual starts to see progress, and it is essential to be patient and constant in attending therapy sessions.
Overall, therapy can be an important tool for people looking for to improve their mental health and wellbeing. It supplies a supportive and understanding area to discuss feelings and ideas, and can assist individuals establish coping techniques and abilities to handle their psychological health.
Online therapy platforms like BetterHelp and Talkspace offer a flexible and practical option to in-person treatment. Both BetterHelp and Talkspace allow people to receive therapy remotely, using video, phone, messaging, or chat to interact with their therapist. This can be specifically handy for people who have busy schedules, minimal access to psychological health services, or mobility issues that make it difficult to attend in-person therapy sessions. Talkspace Com Anxiety What Not To Do
There are some crucial distinctions in between BetterHelp and Talkspace that you might wish to consider when choosing which platform is right for you. A few of the aspects to consider include:.
Cost: The cost of BetterHelp and Talkspace varies depending upon the plan you pick and the length of your commitment. BetterHelp provides a weekly strategy, a monthly plan, and a quarterly strategy, while Talkspace offers an annual strategy and a monthly strategy. Costs for BetterHelp start at $40 weekly for the weekly plan, $35 per week for the month-to-month strategy, and $30 per week for the quarterly strategy. Prices for Talkspace start at $65 weekly for the month-to-month plan and $49 per week for the annual plan. It’s worth noting that these rates are for basic therapy sessions. The cost might be greater if you pick to work with a premium therapist (a therapist with a greater level of experience and know-how).
Therapy modalities: Both BetterHelp and Talkspace use a range of therapy modalities, consisting of cognitive behavior modification (CBT), dialectical behavior modification (DBT), and acceptance and commitment therapy (ACT). BetterHelp uses a broader range of treatment methods and methods, including integrative therapy, holistic therapy, and alternative treatment.
Therapist schedule: Both BetterHelp and Talkspace have a big network of certified therapists, but the schedule of therapists might differ depending on your area and the time of day. BetterHelp offers a therapist directory site that enables you to search for therapists based on their specialties, certifications, and schedule, while Talkspace permits you to ask for a specific therapist if they are not available.
Resources and features: Both BetterHelp and Talkspace offer a range of functions and resources to support their clients, consisting of therapy sessions, self-care tools, and access to psychological health resources. The specific features and resources offered by each platform may differ, so it’s worth comparing the two to see which one fulfills your needs.
Eventually, the option in between BetterHelp and Talkspace (or any other online therapy platform) will depend upon your private needs and choices. Both platforms have their own strengths and limitations, and it is necessary to do your research study and consider your choices prior to deciding.
BetterHelp is an online therapy platform that links individuals with licensed therapists for remote therapy sessions. BetterHelp was founded in 2013 and has since grown to turn into one of the largest and most popular online therapy platforms, with over 1 million customers served.
BetterHelp provides a range of therapy techniques
consisting of cognitive behavioral therapy (CBT), dialectical behavior modification (DBT), acceptance and commitment treatment (ACT), and more. Therapists on the platform are licensed experts who have gone through comprehensive training and are experienced in offering online treatment.
BetterHelp therapy sessions are held utilizing a variety of formats, including video, phone, messaging, and chat. This permits customers to select the format that works finest for them and their schedule. Therapy sessions are typically held at a frequency and duration that is agreed upon by the client and their therapist. Some individuals select to have weekly sessions, while others may have sessions less frequently.
BetterHelp is a flexible and hassle-free alternative for people who are seeking therapy but might not have the time or resources to participate in in-person treatment sessions. It can be especially practical for people who have busy schedules, reside in backwoods with restricted access to mental health services, or have mobility issues that make it hard to go to in-person therapy sessions.
In addition to therapy sessions, BetterHelp likewise uses a range of resources and support to help customers improve their mental health and well-being. These resources may consist of self-care tools, mental health short articles, and access to a community of therapists and customers.
BetterHelp has a 100% complete satisfaction guarantee, so if a customer is not delighted with their treatment experience, they can ask for a new therapist or cancel their subscription at any time. BetterHelp is not covered by insurance coverage, so clients are responsible for paying for their treatment sessions expense. Some people may be able to utilize their flexible costs account (FSA) or health savings account (HSA) to pay for BetterHelp services.
Overall, BetterHelp is a relied on and reputable online treatment platform that has helped numerous people enhance their psychological health and well-being. If you are thinking about seeking treatment however are unable to go to in-person sessions, BetterHelp may be a good alternative to consider.
BetterHelp is an online treatment platform that links people with certified therapists for remote treatment sessions. BetterHelp was founded in 2013 with the goal of making mental health services more accessible and convenient for individuals who might not have the time or resources to go to in-person treatment sessions. Today, BetterHelp is one of the biggest and most popular online therapy platforms, with over 1 million customers served.
BetterHelp offers a range of therapy modalities, including cognitive behavioral treatment (CBT), dialectical behavior therapy (DBT), approval and commitment treatment (ACT), and more. CBT is a widely used and evidence-based treatment method that focuses on assisting individuals determine and alter negative patterns of believing and habits.
Therapists on the BetterHelp platform are certified experts who have gone through substantial training and are experienced in providing online therapy. All therapists on the platform are needed to hold a master’s degree or higher in a psychological health-related field and to be certified in their state of practice. BetterHelp therapists originate from a variety of backgrounds and specializeds, so customers can pick a therapist who is a good suitable for their needs and preferences.
BetterHelp therapy sessions are held utilizing a variety of formats, including video, chat, messaging, and phone. Therapy sessions are normally held at a frequency and duration that is concurred upon by the client and their therapist.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817438.43/warc/CC-MAIN-20240419141145-20240419171145-00268.warc.gz
|
CC-MAIN-2024-18
| 12,859
| 48
|
https://hunchbuzz.com/resources/productinfo/2018/may-product-update
|
code
|
We hope you're enjoying the new look and feel of HunchBuzz. We've had lots of positive feedback - and some suggestions of areas we could make it even better. As part of our new product cadence we're releasing small updates and improvements continuously. Here are the latest changes already in the wild:
You can now switch between card view and list view for both challenges and ideas. Card view remains a graphically rich way to view items and list view provides an alternative horizontal view when you want to sort through multiple items. You can also use the new search box to quickly find or filter challenges or ideas. Look for the view control on the top right.
We've made it easier to move between ideas within a challenge. Instead of returning to the challenge page users can simply page through all ideas. These controls appear on the top right of the idea page.
Some of our customers have had this express feature for a while and now it comes out of the box. A really easy way for people to quickly create an idea from the home page.
By default challenges and ideas are now displayed newest first - because that's what most people are interested in seeing! You can of course still filter and sort to create exactly the right view for you.
You can now define and display a completion date for an idea. We've added this optional field on idea creation that is informational only, acting as a prompt to users that there is a time limit of some kind. Note: The Challenge expiry date function is unchanged.
Thanks for all your feedback on the mobile app, we're making continuous improvements in this area as well. The mobile app is now available to our customers using single sign-on. We encourage users to update their app if already installed (SSO is supported in version 1.4 or higher).
We're on a mission to improve the HunchBuzz admin's life. First off we've updated the graphing on the admin dashboard. The Idea Lifecycle graph how displays as a pie/donut graph - because that's just way easier to read and interpret (and much yummier!). The page views and new ideas graph will now display the last 180 or so days of data rather than from the beginning of the calendar year.
We've improved the user management page to provide a much better experience, especially for platforms with large numbers of users. We've added better pagination so you can scroll through large lists easily and the search box will now perform a dynamic search across all users. Oh, and this page is much, much faster.
We've made a whole lot of changes to improve page load speed and responsiveness across the system. These are mostly pretty subtle but you should notice some significant improvements especially in the Journey/Tracker page where all ideas are presented in one master view. This page was often slow for large platforms, now it flies!
The HunchBuzz Team
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816535.76/warc/CC-MAIN-20240413021024-20240413051024-00814.warc.gz
|
CC-MAIN-2024-18
| 2,851
| 11
|
https://neeldhara.blog/searching-and-sorting
|
code
|
Class Plan & Materials
Searching and Sorting
In this week, we explore applications of searching and sorting. Our emphasis will be on how to identify that these techniques are applicable - and in particular, we will not be implementing sorting algorithms from scratch.
The Meeting Place Cannot Be Changed
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662529658.48/warc/CC-MAIN-20220519172853-20220519202853-00734.warc.gz
|
CC-MAIN-2022-21
| 303
| 4
|
https://community.cloudflare.com/t/cloudflare-not-using-the-nearest-location/157692
|
code
|
Hello, I have several sites running on CloudFlare free plan. As stated in the documentation, the
colo field will provide the data-center location. My origin server is hosted in Singapore but when I access the site from India, cloudflare is serving the requests from Singapore and not from the nearest data-center (which is BLR).
Here’s the output of
fl=35f400 h=alstonmont.com ip=126.96.36.199 ts=1584778846.602 visit_scheme=https uag=Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:74.0) Gecko/20100101 Firefox/74.0 colo=SIN http=http/2 loc=IN tls=TLSv1.3 sni=plaintext warp=of
For example, here is the output of cloudflare website, which is served from the nearest data-center:
fl=221f11 h=cloudflare.com ip=2405:204:568c:bc0b:75b9:9292:a7c:9ca8 ts=1584779641.744 visit_scheme=https uag=Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:74.0) Gecko/20100101 Firefox/74.0 colo=BLR http=http/2 loc=IN tls=TLSv1.3 sni=plaintext warp=off
Do I need to upgrade my plan to get this feature?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107911027.72/warc/CC-MAIN-20201030153002-20201030183002-00621.warc.gz
|
CC-MAIN-2020-45
| 979
| 7
|
https://www.forevernew.co.in/ellis-snake-jacquard-dress-29116.html
|
code
|
This metallic snake print jacquard dress is a chic pop of glamour for your next PM event. Add strappy heels and a sleek clutch bag to finish the look.
- Strapless design
- Fitted silhouette
- Padded, boned bodice
- Metallic jacquard fabrication
- Zip back/hook and eye fastening
- Fully lined
- Care instructions: Professional dry clean only. Do not wash, bleach or tumble dry.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146744.74/warc/CC-MAIN-20200227160355-20200227190355-00473.warc.gz
|
CC-MAIN-2020-10
| 377
| 8
|
https://cfp.cfgmgmtcamp.org/2023/talk/QEDDKT/
|
code
|
2023-02-07, 16:45–17:35, B.1.015
Deploying a Thanos setup across multiple Kubernetes clusters has quite some moving parts: all the Thanos components themselves, cloud storage buckets, Prometheus instances, Alertmanagers, TLS certificates for the GRPc connections, ... Managing all that can be a chore, but Terraform is an excellent candidate to automate away the complexity. By combining Terraform, K8s operators and a few special tricks, this talk will introduce a way of working where adding a new k8s cluster to your setup is just a matter of applying a terraform module.
Lander Van den Bulcke is a Site Reliability Engineer at Oqton, with a strong focus on monitoring and observability.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100550.40/warc/CC-MAIN-20231205073336-20231205103336-00875.warc.gz
|
CC-MAIN-2023-50
| 692
| 3
|
https://bugzilla.mozilla.org/show_bug.cgi?id=85307
|
code
|
This one is showing up in the talkback reports without much user comment. The few that have come in point specifically to java plugins. (31532265) Comments: Download of Java-Plugin. Crash occured while FTP transaction was running (31472527) Comments: Java plugin installation Stack Trace: nsXPInstallManager::OnStatus [d:\builds\seamonkey\mozilla\xpinstall\src\nsXPInstallManager.cpp line 849] nsFTPChannel::OnStatus [d:\builds\seamonkey\mozilla\netwerk\protocol\ftp\src\nsFTPChannel.cpp line 442] nsFtpState::StopProcessing [d:\builds\seamonkey\mozilla\netwerk\protocol\ftp\src\nsFtpConnectionThread.cpp line 1776] nsFtpState::Process [d:\builds\seamonkey\mozilla\netwerk\protocol\ftp\src\nsFtpConnectionThread.cpp line 584] nsFtpState::OnDataAvailable [d:\builds\seamonkey\mozilla\netwerk\protocol\ftp\src\nsFtpConnectionThread.cpp line 406] nsXPInstallManager::OnStatus f32ad0bc
Adding crash, topcrash keywords for tracking. As well as qawanted for help with repro steps.
Syd, what's the latest status on this bug? Any chance of getting this resolved for the next release?
This is the #2 topcrasher for Mozilla 0.9.2. Here is the latest Talkback data: nsXPInstallManager::OnStatus 205 85307 NEW email@example.com --- First BBID :32340193 Last BBID :32421229 Min Runtime :52 Max Runtime :77254 First Appearance Date : 2001-06-29 Last Appearance Date : 2001-07-02 First BuildID : 2001062817 Last BuildID : 2001062823 Stack Trace: nsXPInstallManager::OnStatus() nsFTPChannel::OnStatus() nsFtpState::StopProcessing() nsFtpState::OnStopRequest() nsFtpControlConnection::OnStopRequest() nsOnStopRequestEvent::HandleEvent() nsARequestObserverEvent::HandlePLEvent() PL_HandleEvent() PL_ProcessPendingEvents() nsEventQueueImpl::ProcessPendingEvents() event_processor_callback() our_gdk_io_invoke() libglib-1.2.so.0 + 0xec40 (0x4035dc40) libglib-1.2.so.0 + 0x10309 (0x4035f309) libglib-1.2.so.0 + 0x10913 (0x4035f913) libglib-1.2.so.0 + 0x10aac (0x4035faac) libgtk-1.2.so.0 + 0x93c57 (0x40273c57) nsAppShell::Run() nsAppShellService::Run() main1() main() libc.so.6 + 0x18a42 (0x4048fa42) (32420207) URL: http://skraplotto.searchfaster.no (32420207) Comments: I tried to watch a JAVA-applet (32419000) URL: www.virtualmarket.itb-berlin.de (32419000) Comments: visiting a heavy flash loaded site... (32416456) Comments: Connecting to ftp.netscape.com to download java-plugin for mozilla (32415748) URL: ftp.netscape.com (32415748) Comments: trying to download the Java 2 Plugin for Linux.failed to connect several times. (32415629) Comments: Download Java Plugin. (32414418) Comments: I tried to install the Java plugin. It failed but this crash happened about 2 minutes afterwards. I did absolutely nothing during that time period. (32412698) URL: http://mdc.lhsc.on.ca/main.html (32412698) Comments: Clicked location box to highlight and type in new URL (32408915) Comments: Not sure. Had it sitting idle on another virtual desktop. (32404475) URL: java.sun.com (32404475) Comments: Try to install java 2 linux and all mozzil'as was rashed:-( (32403301) Comments: installing java plugin (32402990) Comments: I was DLing the JRE and it stopped mid-download and crashed a few minutes later. (32401373) URL: ftp.netscape.com (32401373) Comments: Trying to connect to the ftp server while server didn't respond. (32401109) URL: Don't know - random Google search. (32401109) Comments: Canceled installation of java plugin. (32400969) URL: www.starmedia.com.mx (32400969) Comments: opening the chat page (32400734) Comments: tried to download java plugin (32399198) Comments: I was downloading the Java engine required for some sites. (32397994) Comments: Had given up as it kept failing (32397153) Comments: trying to download the java2 plug in (32396657) Comments: Downloading a Java 2 SDK (32393696) URL: www.galefrocef1.com AND www.mozilla.org (32393696) Comments: trying to load java plugin (the default link to ftp.netscape.comhad just timed out). reading the release notes for 0.9.2 (32392385) Comments: I was trying to change the search site in the preferences menu (32389368) URL: http://www.deadly.org (32389368) Comments: Just browsing that page (32389249) Comments: Trying to download the Java plugin (32388799) Comments: i was downloading java plugin (32388602) URL: ftp.netscape.com (32388602) Comments: I was running Mozilla as root (32387555) Comments: pushing the back button twce (32387536) Comments: trinyg to download java xpi thingo through smarkupdate (32387209) URL: www.lamp.polito.it/fisica (32387209) Comments: again trying to download the same pdf document (32386419) URL: ftp://ftp.netscaoe.com (32386419) Comments: trying to install java-plugin (32385889) URL: http://www.freshmeat.net/ (32385889) Comments: Fixing dinner.It was working fine when I left it to go do something else. I came back later to find the Talkback dialog staring at me and my Mozilla windows gone. (32385616) URL: www.lamp.polito.it/fisica (32385616) Comments: downloading pdf documentation (32385614) Comments: Download Java2-Plugin. (32385584) Comments: Was running Mozilla and netscape simultaneously.Went from window with Mozilla to window with netscapeand mozilla crashed... (32385561) Comments: several windows open... tried an ftp - download (32385275) Comments: scrolling through a newsgroup (32384939) Comments: Visited a page with a java applet. As I had no Java plug-in installed (32384939) Comments: dialog appeared saying "Connecting to ftp.netscape.com...". Unfortunately my network connection was down and download failed. I tried again and (32384752) Comments: It sat after asking for the download of the Java plugin (32384676) URL: www.heise.de/ct (32384676) Comments: I was looking at a news article so i was actually doing nothing.Before that the download of the Java 1.3-plugin failed. (32383814) Comments: Trying to install java plugin. (32383297) Comments: It was running in the background while I was working in Star Office (32381592) URL: games.yahoo.com (32381592) Comments: trying to download the java pluging for linux... it never works [:(] (32380574) URL: ftp.netscape.com (32380453) URL: ftp.netscape.com (32380345) URL: ftp.netscape.com (32379114) URL: don't have it anymore.... (32378892) URL: http://www.mozilla.org (32378892) Comments: Repeatedly trying to download Java 2 plugin after failures to connect to netscape's ftp site (32378314) URL: www.mozilla.org (32378314) Comments: Trying to get the freaking Java Plugin!!! (32377513) URL: Java JRE 1.3.1 download (32377513) Comments: Trying to download the java runtime while viewing several different windows. (32377106) Comments: trying to install the netscape6 jvm plugin into mozilla 0.9.2 (32375972) URL: ftp.netscape.com (32375659) Comments: Trying to install the jre.xpi to enable java support ( tried several times but it wouldn't connect to netscape.com and eventually died) (32375554) URL: www.bbc.uk (32375554) Comments: switching to another url www.mozilla.org (32374276) Comments: trying to install Java Plugin (32374009) Comments: I was away from my machine at the time but the last thing I was doing was downloading the Java plugin. While I was away the screensaver came on and when I logged back in the Feedback agent was running. (32372429) URL: http://zone.msn.com/bejeweled (32372429) Comments: I was trying to download the java jre plugin. that fail probably cuz my firewall (32372388) URL: ftp://ftp.mozilla.org/pub/mozilla/releases/mozilla0.9.2/linux-xpi/ (32372080) Comments: Clicking on the "Back" button (32370834) Comments: Attempting to open link from HTML mail in new window after clicking on the link and receiving no visible response. (32370529) Comments: Mozilla went down when my internet connection was lost while downloading the xpi. Mozilla seems to be unaware on a large scale of the MSWin dialup net status. (32370239) Comments: Trying to install the JVM through the browser assistant (32369881) Comments: Trying to update the jvm (32369143) Comments: I had started the download/install of the Java plug-in and left the room. When I came back (32369035) Comments: the ftp connection to download the java vm failed to connect (32368918) Comments: I clicked on a link at google in an attempt to solve my problems with Java. I had another window open where I was attempting to download the plugin manually (32368918) Comments: longer valid? (32368820) Comments: I think the java vm was being installed. (32367839) Comments: I was trying to download the linux java2sdk for the browser and it failed (as it usually does when trying to connect) and I had the window open and it just crashed. (32366811) URL: dvd.box.sk (32366811) Comments: I just was watching the page ;-( (32362435) Comments: In the middle of typing in a URL (32362137) URL: http://www.snowcrest.net/camera/ (32362137) Comments: reloading the page (32361779) Comments: The decode action seems worse than 0.9.1.And it's very impossible to connect to ftp.netscape.com for Java Plug-ins. (32360973) Comments: Downloading Java plugin for Linux from ftp.netscape.com usingdefault address. Referred by weather.com.Running as regular user. Plugins directory is world-writable (32360355) Comments: I was looking at onsale.com while downloading the Java plugin forLinux (32360265) Comments: Page with java applet (32360218) URL: www.tribute.ca (32359493) URL: java.sun.com (32359493) Comments: I wasn't using the browser. I was even in another desktop. (32359266) Comments: loading the java2 plugin.. my machine couldnt contact ftp.netscape.com via ftp (32358957) Comments: I was attempting to send a new email message. After clicking 'new message'the first time (32358957) Comments: and clicked 'new message' again. I wasbeginning to type text into the body when Mozilla crashed. (32358108) Comments: loading the plugins page (32357648) Comments: Trying to download the Java plugin.(Also --- the pagevorpal.mcs.drexel.edudoesn't display properly (garbage at the top). (32357028) URL: ftp.netscape.com (32357021) Comments: preferences page (32356887) URL: http:/netscape.com (32356887) Comments: I was downloading the Java plug-in for Linux and then Mozilla crash (32356672) Comments: Trying to get java plugin for Linux (32356646) Comments: Installing jre.xpi (32355833) Comments: Just browsing (32355109) URL: java.sun.com (32355109) Comments: I was asked to download the java 1.3 plug-in. I agreed (32354004) URL: www.expanets.com (32351051) Comments: going from the 0.9.2 release page to the bugzilla page on glibc 2.1 bug.( doh! ) (32348654) URL: http://home.netscape.com/plugins/jvm.htm (32348654) Comments: Trying to install the Java2 plugin for mozilla. (32347491) Comments: Browser crashed while trying to install Java plugin. It happen at the beginning right after i clicked on the download button. (32346892) URL: www.insidechess.com (32346892) Comments: browsing... (32343773) URL: http://www.linuxtoday.com (32343773) Comments: Crash occured first time loading page with mozilla 0.9.2.username/password was stored as a cookie.using a proxy (junkbuster) configured to allow outgoing cookies tolinuxtoday.com
Also occurring on Win95, 98 and NT. Changing platform from Linux to All.
pdt+ got a get this one fixed... its #2 on the top crash list for 0.9.2
jimmylee - have you seen this problem also?
No problems for me. I get no crash downloading from both Linux and Windows.
I tried downloading simulating 56K connection (proxy host: chainsaw.mcom.com; proxy port: 8056). The download dialog appears with the text "Transferring data from ftp.netscape.com", but no progress meter is displayed, and no bits are downloaded. I waited a long time to be sure that nothing was going to get downloaded. We're not even trying to install yet. This was reproduced on both Linux and Windows.
The crash reports insist the crash happens at line 849, which is a simple return. The Assembly code clearly indicates an attempt to dereference a null, but I can't quite match the optimized assembly with what I can step through in my debug builds. My best guess is that mDlg is null on line 846. There are a lot of places in the code where we don't check whether mDlg is null or not -- we were making a big assumption that since only the shutdown code set is to null we were always ok. In this case it looks like nsFtpState calls OnStatus after calling OnStopRequest. Normally not a problem, but in the case of a download error OnStopRequest can ultimately result in calling our Shutdown before the OnStatus comes in and tries to write to the now-gone dialog. (we should really pop an alert telling users their download failed. Right now the dialog would simply close with nothing going on. We do write the error code into the install log and send it back to the web page, but that assumes the web page was written to display status. The SmartUpdate site did, but I'd guess that 99% of other sites don't) A couple of simple options 1) protect line 846 with "if (mDlg)" 2) set mCancelled=PR_TRUE in Shutdown: this protects OnProgress too. 3) add "if (mDlg)" to all unsafe uses of mDlg (nine places) #1 will stop this crash, but #3 is probably the right thing to do to make sure we don't get bit by future crashes next time someone violates our assumptions about order of events.
Is #2 a safe thing to do? If so, I would take #2 and #3 (assuming I could get it quickly :-) Any chance we can have this patch with reviews today or tomorrow?
r=ssu for the patch id=42457
The fix is in
Build: 2001-07-17-05-0.9.2(WIN), 2001-07-17-03-0.9.2(LINUX) Download does not fail for me on branch. Then again, it never has. So, please track for those who track failures. Adding keyword "vtrunk". This needs to be verified on the trunk.
The trick for this one is that you had to have a necko error during the download, and it had to be from FTP. Try ripping your network cable out of the machine in the middle of a download of something big (like Java).
Ripping the network cable out sounds quite harsh. I opted to simply unplug it since I still needed it. No crash was observed. Needless to say, the download ended when the network cable was disconnected.
Build: 2001-08-01-06-trunk(WIN), 2001-08-01-08-trunk(LINUX) Looks good on trunk. Removing keyword "vtrunk". Marking Verified!
*** Bug 82630 has been marked as a duplicate of this bug. ***
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948615810.90/warc/CC-MAIN-20171218102808-20171218124808-00040.warc.gz
|
CC-MAIN-2017-51
| 14,280
| 18
|
http://se.mathworks.com/company/newsletters/articles/teaching-computational-methods-to-150-second-year-engineering-students-at-virginia-tech.html?nocookie=true
|
code
|
By Dr. Robert A. Canfield, Virginia Tech
MATLAB® has been the core computational tool in AOE 2074: Computational Methods at Virginia Tech for many years. This second-year course equips engineering students with two skill sets that they will need throughout their academic careers and beyond. The first is the ability to use numerical methods to solve engineering problems that involve root finding, simultaneous linear equations, linear regression, interpolation, and numerical integration and differentiation. The second is the ability to apply MATLAB as a computational tool and as a programming language.
When I began teaching the course two years ago, I wanted to give students more hands-on experience with MATLAB and more one-on-one instruction with teaching assistants. These changes required a significant overhaul of the course structure. The revamped course now underpins a department-wide initiative to integrate MATLAB more deeply throughout the aerospace and ocean engineering curricula (Figure 1).
To accommodate the more than 150 students who typically attended, Computational Methods used to be a conventional lecture-based course. Two weekly 75-minute lectures were complemented by homework assignments in MATLAB designed to reinforce the material covered in class.
A key weakness of this format was that too much time passed between introducing a concept and letting the students try it themselves. When students are learning to program and solve problems, they need to apply what they learn as they go along. Presenting too many topics in sequence without letting students work on relevant problems makes it difficult for them to assimilate what they have learned.
To address this issue, I converted the second 75-minute lecture into a lab session. Teaching assistants (TAs) lead these sessions, each TA working with about 30 students. The labs not only enable one-on-one interaction between students and their TAs; they also enable students to learn from one another while working through examples together. More importantly, students work hands-on with MATLAB soon after learning a new numerical method, with a TA available for guidance.
Changing the course structure enabled us to teach a class of 150 students—and even to support more than that—while providing each student with regular, direct access to an instructor. The change precipitated another adjustment to make the course work efficiently: supplementing lecture materials with the MATLAB tutorial available on mathworks.com.
Because I had cut lecture time in half, I wanted to supplement the lectures with learning activities that students could complete on their own. The interactive, online MATLAB tutorial is an excellent fit. In addition to providing a basic introduction to MATLAB, it includes modules for many of the topics covered in the course, including computational data analysis, curve fitting, data visualization, and MATLAB programming basics.
Most students have used MATLAB briefly in a first-year engineering course. I use the same introductory tutorial module in the first lab session to bring them back up to speed.
The format of the interactive MATLAB tutorial met the needs of the revamped course. After presenting new material, the tutorial poses questions. In some cases, students have to respond by typing MATLAB commands. The module then provides feedback before students need to complete homework assignments. This interactivity is particularly helpful in self-directed learning activities, which are assigned in between the lecture and computer lab. As MathWorks adds new tutorial modules, I incorporate them into the course if the topics covered are relevant.
Computational Methods is a required course for all second-year students in aerospace and ocean engineering, but engineering students from other departments attend, as well. While redesigning the course, I asked colleagues in my department and in other engineering departments about problems they assign that require the use of numerical methods and MATLAB. I incorporated their input by using some of their course materials to complement the examples provided in the course textbook, Steven Chapra's Applied Numerical Methods with MATLAB for Engineers and Scientists.
Chapra illustrates several concepts using a bungee jumper example. My students use MATLAB to model the dynamics of a single bungee jumper and of several jumpers linked together. Examples like this engage the students and help them visualize the system dynamics. The course content loosely follows the material in the textbook, starting with modeling and programming; proceeding to roots and optimization, linear systems, curve fitting, integration, and differentiation; and ending with simple differential equations.
This year we have made Computational Methods a prerequisite for our gateway courses in the second sophomore semester. Professors who teach junior- and senior-level courses that require students to find numerical solutions in their courses count on the students having experience solving them with MATLAB. Because faculty can now depend on our students having mastered MATLAB fundamentals, they can go more deeply into the course material. We expect this effect will be amplified as more courses incorporate MATLAB.
Aerospace and ocean engineering students become more proficient every semester, tackling increasingly challenging problems and design projects. Several past students have told me that they've used the numerical methods they learned in my class for their experimental laboratory class and in their senior design course—and in ways they hadn't expected.
The restructured course has already yielded positive results. Our department teaches an astrodynamics course in which students use MATLAB for a number of homework assignments. At the start of the course, the instructor gives an assessment quiz to test the students' knowledge of MATLAB. Last year, for the first time, at least half the students in his class had attended the revamped Computational Methods. He noted that this class scored significantly higher than students in previous years on his MATLAB assessment quiz.
In lectures, I often use MATLAB interactively to create plots that illustrate new concepts, or to demonstrate examples from the textbook. Many of the features that make MATLAB an excellent teaching tool—including the ability to execute commands interactively and visualize results—make it an effective learning tool, as well. Students don't have to compile, execute, and debug code in a low-level language. Instead, they can develop an algorithm by interactively entering MATLAB commands. They can use the plotting capabilities to verify their results and then assemble all the steps into a script (Figure 2).
My colleagues and I believe that it's important for students to develop the analytical thinking capability that comes with learning how to program algorithms. Even if the companies they eventually work for use highly specialized applications, modified algorithms and analyses are almost always needed as well. By adopting a hands-on approach with MATLAB in the second year and integrating MATLAB throughout the engineering program, we equip our students with the critical analytical skills that companies require in engineering graduates, including the ability to use numerical methods to solve real-world engineering problems.
Published 2012 - 91984v00
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115856115.9/warc/CC-MAIN-20150124161056-00257-ip-10-180-212-252.ec2.internal.warc.gz
|
CC-MAIN-2015-06
| 7,419
| 18
|
https://www.symphonious.net/2019/09/25/moolah-diaries-making-inject-loader-and-vuetify-loader-play-nice/
|
code
|
I’ve been upgrading Moolah after a long period of neglect. One of the tasks is to update it to WebPack 4. Mostly this went smoothly by just creating a new project with vue-cli and bringing its generated build setup over to replace the old one. Then a bunch of tweaking.
One thing that did bite however, was tests using inject-loader started failing as soon as I added vuetify-loader to the project with:
Error: Module parse failed: 'import' and 'export' may only appear at the top level
There may be a better way to fix this in config, but the simple answer is to adjust the inject-loader import line from something like:
import categoryStoreLoader from 'inject-loader!categoryStore';
import categoryStoreLoader from 'inject-loader!babel-loader!categoryStore';
Adding in the extra babel-loader ensures the imports are processed and replaced by require and everything works.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146714.29/warc/CC-MAIN-20200227125512-20200227155512-00519.warc.gz
|
CC-MAIN-2020-10
| 875
| 7
|
http://www.andreamassa.net/diabolik-0/
|
code
|
I worked as Environment Artist on the whole game and in particular:
- I modeled and textured several environments and props of chapter 1, chapter 2 and chapter 3;
- I polished and optimized the textures for the PS2, PSP and Wii version of the game .
- I created new environment collisions for the PS2, PSP and Wii version of the game because the control system was different from the PC version (the PC game uses a point and click control system while the consoles game uses a direct control system).
I also worked as Level Designer on chapter 3, scripting gameplay events and cinematic sequences (using Vicious engine scripting language), as well as playtesting the game levels to debug and refine the gameplay.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221212323.62/warc/CC-MAIN-20180817123838-20180817143838-00549.warc.gz
|
CC-MAIN-2018-34
| 712
| 5
|
https://malware.wikia.org/wiki/Lunch
|
code
|
When the virus is run, it overwrites the first uninfected DOS executable, by writing its code at the beginning of the file, the infected program will no longer function but spreading out the virus.
The virus does not infect COMMAND.COM and files that are smaller than the virus itself.
This virus does not stay memory resident.
When an infected program is run at 12:00 or 17:00, the virus displays a message and hangs the machine.
It's 12:00, time for lunch!
It's 17:00, time to go home!
On Saturday 14th the virus drops a file called CLEAN.COM with a file size of 899 bytes.
The drop program CLEAN.COM
This drop program can be considered as a virus, while it acts slightly different from Lunch. Instead of overwriting during execution, it hooks INT 21h and infects one DOS executable by appending itself at the beginning of the host before a program runs, and then return to DOS instead of running the program, the file size will increase by 897 bytes.
The program infected by CLEAN will no longer function. When an infected program is run and the system day is between July 1st and December 31st, the PC speaker will beep.
Unlike the Lunch virus, CLEAN does not check file size and it may infect COMMAND.COM and even itself.
Both Lunch and the drop program contain the following text strings:
cOcK!sUcKrI COMMANDCOM A:\XXX.COM A:\$#@!$#@!.COM ENGLISH SUCKERS DIE IN BUENOS AIRES! MADE IN ARGENTINA91
The virus contains the following text strings that the drop program does not:
COMMAND.COM *.cOm CLEAN.COM
The infected programs may contain different text strings, rather than "A:\XXX.COM", the file path of the program is shown (e.g. C:\DOS\SYS.COM instead of A:\XXX.COM in an infected copy of SYS.COM).
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578727587.83/warc/CC-MAIN-20190425154024-20190425180024-00476.warc.gz
|
CC-MAIN-2019-18
| 1,705
| 16
|
https://daveceddia.com/dynamically-add-elements-to-the-page-with-angulars-ng-repeat-and-ng-include/
|
code
|
There are some times when you might want to dynamically add elements to the page in response to some user action. Maybe you’re writing a form builder app, and users can add chunks of the form one at a time.
In this case, you want the order of the displayed forms to match the order of the button clicks. So if you have 3 buttons (A, B, C) and the user clicks (B, C, A), then you want form B to be added first, then C, then A.
Here’s an example that works this way. Try clicking the buttons.
The controller has an array of form template names. When a button is clicked, the matching form template name is added to an array of displayed forms. An ng-repeat directive loops array over the list of displayed forms, and uses ng-include to render the templates.
The HTML is simple, and for sake of making it easy to understand, it includes some inline templates. In a real app you’d probably want to put these in files and integrate them into your build process.
The JS code is very simple. All it needs to do is add items to an array when the user clicks buttons.
One important thing to notice with this approach is that you need to use the “track by” syntax (in this case,
track by $index) if you want to allow repeat values - otherwise you’ll get an error saying “Duplicates in a repeater are not allowed.”
If you don’t want to allow repeats, just check before adding each form to the displayedForms array.
Learning React can be a struggle — so many libraries and tools!
My advice? Ignore all of them :)
For a step-by-step approach, check out my Pure React workshop.
Learn to think in React
- 90+ screencast lessons
- Full transcripts and closed captions
- All the code from the lessons
- Developer interviews
Dave Ceddia’s Pure React is a work of enormous clarity and depth. Hats off. I'm a React trainer in London and would thoroughly recommend this to all front end devs wanting to upskill or consolidate.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.96/warc/CC-MAIN-20230924223409-20230925013409-00880.warc.gz
|
CC-MAIN-2023-40
| 1,927
| 18
|
https://rebble.io/2017/04/23/rebble-community-update-3.html
|
code
|
Rebble Community Update 3
“Where is my Rebble Community Update?” the people cry! At last, it is here, and this time, rather than the typical broad yet shallow summary, we thought we’d take a closer look at a particular area of import: firmware. Familiarize yourself with our feats in this forward-looking firmware-focused feature. If you’d like to add something, send us a tweet, or better still, submit a pull request!
While the Pebble/Rebble ecosystem is comprised of many parts: hardware, appstore, mobile apps, watchapps/watchfaces and more - one of the most critically important pieces in terms of keeping existing hardware alive is developing replacement firmware. Since the original Pebble firmware was not open source, and is owned by Fitbit, this unfortunately means starting from scratch. Not completely from scratch, since the FreeRTOS operating system on which Pebble OS is based can be leveraged, and moreover an example implementation supporting the
STM32F4 family of microcontrollers on which the Pebble Time and subsequent hardware is based was able to serve as a basis for exploration of Pebble’s specific hardware implementation(s).
Part of the reason that an update has not been forthcoming is due to the continual advances being made, so that each milestone at which sharing seemed appropriate ended up being dwarfed by additional progress made before it had even been possible to share the last! Here’s a detailed breakdown of where things are today (who knows how much further along they’ll be tomorrow!):
Beyond the low-level hardware interfacing work, there is a lot of software that has to be written before “basic” functionality such as drawing shapes and text is possible. With this in mind, @jneubrand began work on neographics, an open-source replacement for Pebble’s graphics routines, long before there existed firmware sufficiently advanced to support it. @ginge was then able to drop this code into the firmware, once low-level display support had been developed, and the combination of graphics primitives, fonts, and now image loading (once the various palletised PNG bit-depth formats had been accounted for) allowed for the working system app and even watchfaces seen here:
see @ginge's RebbleOS gallery for more / ongoing updates!
@NiVZ78 created the Simply Squares watchface depicted above, to which @ginge added colour, as a way for RebbleOS to show off its new capabilities. While we’re not yet able to dynamically load watchfaces (what’s pictured, while being a legitimate watchface, still had to be compiled into the firmware), extensive new API support means that the following app-enabling features are now available in Rebble OS:
- Graphics (drawing, lines, fill, etc)
- Bitmap layers
- Text layers
- Bitmap API
- Sub bitmap
- Text / Pebble fonts
@ginge’s focus has been on
Snowy, more commonly known by those not actively involved in firmware development as Pebble Time.
Snowy support has begun to extend beyond the basics, including the ability to access the external flash, enabling resources, fonts, and images to be utilized. The I2C interface to the Maxim
MAX14690EWX has been implemented, as has the ambient sensor, though it is currently unused due to experiments in dynamic dimming not having gone particularly well. Backlight has come on strong (then gradually faded!), however, as evidenced in this video.
Tintin, more commonly referred to as Pebble Classic or OG now has basic platform support as well, including support for its display, thanks to a number of contributions from @jwise - although the lack of flash support means no graphics. @jwise also did wonders with the
Makefile and build process, facilitating testing and contribution from others (there was a magical moment earlier this week when a new contributor posted a picture of the firmware running on actual hardware within a day of his first introduction into the community!).
The Road Ahead
As exciting as everything we’ve been able to demonstrate so far is, there’s still a lot to do! Power management for example - the hardware is currently running at full speed, resulting in battery life of around five hours - and that’s without all peripherals even having support yet. Other basics such as a viable Bluetooth stack are still all to do, although @XDjackieXD has begun investigating solutions. A casual list of remaining
TODOs can be found on the repo’s wiki. Embedded engineers, especially those with FreeRTOS experience, would be more than welcome to join our efforts if you’re interested!
Hopefully you found this detailed look at the state of Rebble firmware insightful and informative. If you have questions or would like to get involved, come and find us in the
#firmware channel on Discord!
News and Miscellany
- The fabulous folks at Fitbit have released updated versions of the Android and iOS Pebble apps which aim to free Pebble devices from existing tethers to cloud-based services; the most exciting part of this is added support for
pebble://custom-boot-config-url/CUSTOM_URL- essentially a direct gift to Rebble, allowing us to override and replace the official appstore when it goes offline (which we’d already made strides towards, but official support is especially appreciated! )
- Keep an eye on the Status page - while we originally intended for this to be a summary of how Pebble’s backend services’ availability would impact usage of our devices, we’re planning on expanding it to convey at-a-glance summaries of our own project and services’ status, as a way to provide updates between…Updates!
- Our good friends at Engineerable are offering members of the Rebble community $20 savings on any TimeDock order with discount code
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038072180.33/warc/CC-MAIN-20210413092418-20210413122418-00412.warc.gz
|
CC-MAIN-2021-17
| 5,728
| 30
|
https://archive.sap.com/discussions/thread/135407
|
code
|
1 what is a work area and y it is used .
2 how to correct 500 entries out of 1000 entries with session and cal tramsaction method .what we will do about the errors and where we have to go and deleted them .
3 ref. fields & ref tables for currency & quantity .
4 . how to print 100 lines in the same window of header .
ans somebody plz tell me how to reward the points in this site .
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247490806.45/warc/CC-MAIN-20190219162843-20190219184843-00339.warc.gz
|
CC-MAIN-2019-09
| 382
| 5
|
https://xenforo.com/community/resources/external-accounts-extended.2877/field?field=faq
|
code
|
Q: How do I enable the minimal mode?
A: Go to the Admin Panel, then find 'External Accounts Extended' and tick the box labelled as 'Minimal Mode'.
Q: The service, <service> isn't working! What do I do?!
A: Before posting about a service not working, make sure to check the following:
Make sure the scopes are set correctly.
- Most services have options to select the necessary scopes that your API application will request from the user. This addon only needs basic profile information so those related to that should be selected. For example, LinkedIn would need the following selected:
This allows your website to see their profile and email, necessary information to register on your site.
Set the callback URL to your website's specific registration URL.
- Most of the time this only needs to be your site URL, but some services require it to be set explicitly.
The format that needs to be used is the following:
So for example, for LinkedIn on the website testdomain.com, it would be 'testdomain.com/register/linkedin'
Q: I received the error 'An unexpected error occurred. Please try again later.' What do I do?
A: Follow these steps before posting that you are getting this error:
Are the keys correct?
- Make sure the API client key and the API secret are correctly inputted on your forum!
Does your VPS have the correct time?
- I ran into this issue recently where my VPS's time drifted off and any oauth requests to services like Tumblr were simply rejected due to a skewed servertime. This is extremely unlikely to happen, but I only noticed my server having the wrong time because I was unable to login through Tumblr! It's worth a check
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511002.91/warc/CC-MAIN-20231002164819-20231002194819-00004.warc.gz
|
CC-MAIN-2023-40
| 1,649
| 17
|
https://www.question2answer.org/qa/72062/i-love-q2a-to-use-but-there-is-problems
|
code
|
Thanks a lot for answering Scott ,
I used to on my one site than I relaised that q2a is not seo friendly.
When for Tags , Categories and Urls it is not suitable.
In my language there are accents like û , ê , î but when you write as a tag it happens something different.That is not good for seo
Here example but no answer
Also today I found another problem for username.When you want to take a name with space
for example "Im Scott" in url /Im+Scott if you want to take this name "ImScott" Than you can take too.So why developers dont make this normal like "Im Scott" will be "im-scott" that is has to be simple doing this .
Thanks a lot again.
Edited: I found solution for category and post url. But still have tags and username issue.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711003.56/warc/CC-MAIN-20221205032447-20221205062447-00855.warc.gz
|
CC-MAIN-2022-49
| 738
| 9
|
http://fernandorossc.tinyblogging.com/programming-assignment-help-Fundamentals-Explained-10023181
|
code
|
Within this module you'll established issues up so you can write Python programs. Not all functions During this module are necessary for this course so please examine the "Applying Python On this Class" materials for specifics.
Request your functions administration homework details of curiosity to us now and get the entire Resolution ahead of the due date provided. Our matter specialists are dependably there to help you in quite possibly the most suitable way and get you the required help with matter administrations.
We give our best service for Procedure management assignment essay problems in addition. We give the bottom quote for accomplishing the issues and solutions for operation management homework Option.
Constructing one of the best billing methods in city will choose lots of effort and hard work, but at the tip, it's going to be all worthy. Organizations and small-scale businesses can use This technique for preserving their textbooks updated.
In Computer system programming, an assignment assertion sets and/or re-sets the worth stored from the storage area(s) denoted by a variable name; To put it differently, it copies a price into the variable.
The advocates of utmost programming state that building significant changes all at once isn't going to get the job done. Extraordinary programming applies incremental changes: for example, a method might have compact releases every 3 weeks.
Purely purposeful languages can provide a chance for computation to become executed in parallel, keeping away from the von Neumann bottleneck of sequential a person step at time execution, considering that values are independent of each other.
The respect price involves regard for Other people together with self-regard. Programmers really should hardly ever commit modifications that crack compilation, which make current device-tests fall short, or that if not hold off the do the job of their peers.
Assignments are our strong level as our authorities have several years of knowledge in this industry and know extremely nicely the requests of matter problems and also the course of action to fulfil them.
Serious programming's method is usually that if slightly testing can do away with a handful of flaws, a lot of screening can do away with numerous extra flaws.
This unique system allows will help occasion providers regulate their workforce and sources effectively. They will be able to allocate ample sources to every function and be certain their good results.
Weve viewed as several different circuit components like resistors, capacitors, and inductors, but Most likely the biggest and most vital course of elements are dependant on semiconductors ten Total Points
The most fascinating java project Suggestions for final yr learners. You can constantly intention for making projects entertaining and entertaining. This technique will match a lot of folks by their enter profile.
University of Advancing Technologies (UAT) is pleased to supply you with extra information about the faculty and its programs. By hitting post, you Source give us permission to make use of both immediate-dialed, autodialed and/or pre-recorded telemarketing to simply call or textual content you at the telephone number you offered. Remember to Take note that this kind of consent isn't necessary to go to UAT.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742978.60/warc/CC-MAIN-20181116045735-20181116071735-00283.warc.gz
|
CC-MAIN-2018-47
| 3,313
| 14
|
https://community.cloudera.com/t5/Support-Questions/ATLAS-UI-authnetication-with-holger-gov-gives-invalid/m-p/243759
|
code
|
I am working on HDP sandbox and trying to login into ATLAS UI with user holger_gov and same as password however it give me invalid credentials. Looked for a solution on this community however it did not fix my issue
chnaged the authorizer to simple and restarted but did not work so changed it back to ranger and tried again.
I see that atlas user is in the OS shown in screenshots
Some of the screenshots detailing my situation are shown below
please need any help
@Nixon Rodrigues I was able to add the user holger_gov in the users-credentials.properties file.
For users having the same issue, they need to edit the users-credentials.properties file using vi or any editor
holger_gov=<ROLE YOU want to give>::<sha256sum of the password>
in order to generate the sha256sum use the below command in *nix terminal
echo -n "yourpassword" | sha256sum
it will give you some output like below
copy the sum till 6 leave out the space and - (dash) and paste it in the users-credentials.properties files.
Restart you ATLAS server from ambari, and it will work
Thanks again to @Nixon Rodrigues
Another question? Do I also need to cretae and add policy-store.txt , as of now I do not have any such file in the directory /usr/hdp/current/atlas-server/conf/.
Another question? Do I also need to cretae and add policy-store.txt , as of now I do not have any such file in the directory/usr/hdp/current/atlas-server/conf/.
Do not add policy-store.txt for HDP3, Please check if atlas-simple-authz-policy.json present, if not add atlas-simple-authz-policy.json and edit the JSON file to add the role for your user holger_gov or its group.
@Nixon Rodrigues Thanks a lot for the help yes it did help I am using HDP3.1 sandbox.
I went ahead and added the user holger_gov in the userRoles section as shown below
however I am not able to see the metadata of hive tables and lineage in Atlas UI. The Atlas UI looks like below
In addition when I searched in this community, they advised to run hive-import.sh, when I did that, I receive the following error using "holger_gov" as user
using "admin" as user
Is this related to ranger? when I to hdfs dfs -ls /user I do not see holger_gov user, but then admin is there so admin should work.
Do I need to change the below property from ambari ? from ranger to simple
atlas.authorizer.impl = simple? at present it is ranger
I am confused now apologies for long winded question
Thanks for your help!
After adding the user in atlas-simple-authz-policy.json and chnaging the property atlas.authorizer.impl = simple worked from me it is working now. Thanks a lot for your help.
However please do explain how it worked because I am confused after searching a lot in the community.
@Nixon Rodrigues I have tried adding ranger policies for atlas service however there is something I am doing wrong, probably I will ask as a different question. Thanks a lot and appreciate your help.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499790.41/warc/CC-MAIN-20230130003215-20230130033215-00024.warc.gz
|
CC-MAIN-2023-06
| 2,896
| 30
|
http://www.edugeek.net/forums/coding/print-106754-scripting-zip-operation.html
|
code
|
Can anyone point me in the right direction to do the following
I have a series of users folders that I need to zip to individual zip files. ie:
All the input folders will have subdirectories and files. There will be several hundred folders so I must automate it.
I don't expect anyone to write a solution, but any pointers will be appreciated!
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657124236.90/warc/CC-MAIN-20140914011204-00281-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
CC-MAIN-2014-41
| 343
| 4
|
https://civicrm.stackexchange.com/questions/19817/how-can-i-put-an-angularjs-page-inside-a-crm-popup-modal-window
|
code
|
If I add
class="crm-popup" to an internal hyperlink in CiviCRM, I can make CiviCRM open the target page inside a modal dialog. Cool!
But if the target page is an AngularJS page (e.g.
/civicrm/a/#/status), then this technique doesn't seem to work. I can open the link in a new new tab, but when I click to open the modal dialog I see the following:
- modal dialog opens
- inside it I see a large spinning CiviCRM icon which tells me AngularJS is loading
- I see the text
Unknown pathinside the modal dialog.
For my extension, I'd actually like to use a custom AngularJS page on top of a custom base base, and I have this working. But when I try to load my page inside a
crm-popup I get the same failure as noted above, except on step 3 I don't see
Unknown path, and I do see the following console error message:
TypeError: newUrl.split(...) is undefined[Learn More] crm.ajax.js:167:14
I'd love to know if there's a way I can adjust my AngularJS page, my base page, or my popup link to get the AngularJS page to load inside the modal dialog.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662520817.27/warc/CC-MAIN-20220517194243-20220517224243-00032.warc.gz
|
CC-MAIN-2022-21
| 1,039
| 13
|
http://www.tvpaint.com/forum/viewtopic.php?p=51282
|
code
|
Warp is not there to not use it. And there is always that first time. I just planned to not use it again anymore but to my surprice just a minute ago, TVP crashed again on a new one.
I'm in KEYING/ADVANCED KEYER. I try a few things to find a better way of keying. I normaly use Color key but I wanted to try another way. In KEYER MODE the defauld is RGB. The moment I press HSL, I got the same instant crash. After restart
same thing happened. Oké, I leave that funtion alone also, but does it give you a clou why this is happening. I tryed to find out what is wrong but so far no luck. Nobody seems to make sense of it.
TVP 10.05.3 pro 64 bits W7 pro 64 bits. Intel i5 2.67. Mem 16gig.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052912/warc/CC-MAIN-20131204131732-00002-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 687
| 4
|
https://stackoverflow.com/questions/1540752/merits-reasons-for-using-get-as-a-prefix-in-the-name-of-an-accessor-method
|
code
|
I know that in Java, it is common practice to use "get" as a prefix to an accessor method. I was wondering what the reason for this is. Is it purely to be able to predict what it is returning?
To clarify: In some java classes (eg
String) a variable like length can be accessed by calling "length()" rather than "
size()". Why are these methods written like this, but others like "
Thank you for your time.
Edit: Good to see I'm not alone about the confusion & such about the size and length variables
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00553.warc.gz
|
CC-MAIN-2022-33
| 500
| 6
|
https://github.com/domenicosolazzo
|
code
|
Report or block domenicosolazzo
Contact Support about this user's behavior.Report abuse
Sep 3, 2010
Learning a new language: SWIFT
A curated list about OKR (Objective - Key Results)
A file uploader in React for uploading the picture to Cloudinary
We ain't afraid of Randy with his candy. You Know Am I Sayin'?
A wrapper for the FileSystem api in HTML5
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542932.99/warc/CC-MAIN-20161202170902-00235-ip-10-31-129-80.ec2.internal.warc.gz
|
CC-MAIN-2016-50
| 351
| 8
|
https://www.daniweb.com/programming/web-development/threads/68422/asp-how-to-create-subdomain
|
code
|
Does anyone know how do I create a subdomain using ASP?
I run my own server so I have the full access to it (if that is needed for the same)
regular ASP or ASP.NET? (if the latter is it v1 or v2?)
is it windows servern 2003?
Actually I am trying to create a blog service where my visitors can create their own blogs which will host on my server. I want to give them their subdomain either as http://username.myserver.com or http://myserver.com/username
can u tell me an easy method of doing this. I actually dnt want to give out URL containing querystrings as their blog URL like http://myserver.com/index.asp?username=john
I want them to give out like http://myserver.com/username
ok so how do i do that?
you can use path info or use rewriting for this address rewriting get you address like
this address show to user but for IIS this Means to
this is very easy
path info get address like
this is not Beautiful
for path info use
for rewriting search in google
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583681597.51/warc/CC-MAIN-20190119201117-20190119223117-00492.warc.gz
|
CC-MAIN-2019-04
| 960
| 15
|
http://news.sys-con.com/node/1882864
|
code
|
|By Don MacVittie||
|June 22, 2011 09:15 AM EDT||
There’s a whole lot of talk about cloud revolutionizing IT, and a whole lot of argument about public versus private cloud, even a considerable amount of talk about what belongs in the cloud. But not much talk about helping you determine what applications and storage are a good candidate to move there – considering all of the angles that matter to IT. This blog will focus on storage, the next one on applications, because I don’t want to bury you in a blog as long as a feature length article.
It amazes me when I see comments like “no one needs a datacenter” while the definition of what, exactly, cloud is still carries the weight of debate. For the purposes of this blog, we will limit the definition of cloud to Infrastructure as a Service (IaaS) – VM containers and the things to support them, or Storage containers and the things to support them. My reasoning is simple, in that the only other big category of “cloud” at the moment is SaaS, and since SaaS has been around for about a decade, you should already have a decision making process for outsourcing a given application to such a service. Salesforce.com and Google Docs are examples of what is filtered out by saying “SaaS is a different beast”. Hosting services and CDNs are a chunk of the market, but increasingly they are starting to look like IaaS, as they add functionality to meet the demands of their IT customers. So we’ll focus on the “new and shiny” aspects of cloud that have picked up a level of mainstream support.
Cloud Storage is here, and seems to be pretty ready for prime-time if you stick with the major providers. That’s good news, since instability in such a young market could spell its doom. The biggest problem with cloud storage is the fact that it is implemented as SOAP calls in almost every large provider. This was an architectural decision that had to be made, but between CIFS, NFS, iSCSI, and FCoE, it wasn’t necessary to choose a web service interface, so I’m unsure why nearly all vendors did. Conveniently, nearly immediately after it was clear the enterprise needed cloud storage to look like all the other storage in their datacenters, cloud storage gateways hit the market. In most cases these were brand new products by brand new companies, but some, like our ARX Cloud Extender, are additions to existing storage products that help leverage both internal and external assets. Utilizing a cloud storage gateway allows you to treat cloud storage like NAS or SAN disk (depending upon the gateway and cloud provider), which really opens it up to whatever use you need to make of the storage within your enterprise.
Generally speaking, WAN communications are slower than LAN communications. You can concoct situations where the LAN is slower, but most of us definitely do not live in those worlds. While compression and deduplication of data going over the WAN can help, it is best to assume that storage in the cloud will have slower access times than anything but tape sitting in your datacenter.
Also, if you’re going to be storing data on the public Internet, it needs to be protected from prying eyes. Once it leaves your building, there are so many places/ways it can be viewed, that the only real option is to encrypt on the way out. Products like ARX Cloud Extender take care of that for you, check with your cloud storage gateway vendor though to be certain they do the same. If they do not, an encryption engine will have to be installed to take care of encryption before sending out of the datacenter. If you end up having to do this, be aware that encryption can have huge impacts on compression and deduplication, because it changes the bytes themselves. Purchasing a gateway that does both makes order of operations work correctly – dedupe, then compress, then encrypt (assuming it supports all three).
With that said, utilizing compression, TCP optimizations, and deduplication will reduce the performance hit to manageable levels, and encryption mitigates the data-in-flight security risk going to the cloud, and the data-at-rest security risk while stored in the cloud. Between the two, it makes cloud storage appealing – or at least usable.
Our criteria then become pretty straight-forward… We want to send data to the cloud that either has no access time constraints (eg: can be slower to open), or will be faster than existing technology.These criteria leave you a couple of solid options for piloting cloud storage usage.
1. Backups or Archival Storage. They’re stored off-site, they’re encrypted, and even though they’re slower than LAN-based backups, they’re still disk to disk (D2D), so they’re faster backing up, and much faster for selective restores than tape libraries. If you already have a D2D solution in-house, this may be less appealing, but getting a copy into the cloud means that one major disaster can’t take out your primary datacenter and its backups.
2. Infrequently Accessed or Low Priority Storage. All that chaff that comes along with the goldmine of unstructured data in your organization is kept, because you will need some of it again some day, and IT is not in a position to predict which files you will need. By setting up a cloud storage Share or LUN that you use tiering or some other mechanism to direct those files to, the files are saved, but they’re not chewing up local disk. That increases available disk in the datacenter, but keeps the files available in much the same manner as archival storage. Implemented in conjunction with Directory Virtualization, the movement of these files can be invisible to the end users, as they will still appear in the same place in the global directory, but will physically be moved to the cloud if they are infrequently accessed.
Cloud storage is no more a panacea than any other technical solution, there’s just some stuff that should not be moved to the cloud today, perhaps not ever.
1. Access time sensitive files. Don’t put your database files in the cloud (though you might check out Microsoft Azure or Oracle’s equivalent offering). You won’t like the results. Remember, just because you can, doesn’t mean you should.
2. Data Critical to Business Continuity. Let’s face it, one major blow that takes out your WAN connection takes out your ability to access what’s stored in the cloud. So be careful that data needed for normal operation of the business is not off-site. It’s bad enough if access to the Internet is down, and public websites running on datacenter servers are inaccessible, but to have those files critical to the business – be it phone orders, customer support, whatever – must be available if the business is keeping its doors open. Redundant WAN connections can mitigate this issue (with a pricetag of course), but even those are not proof against all eventualities that impact only your Internet connectivity.
With cloud storage gateways and directory virtualization, there are definite “win” points for the use of cloud storage. Without directory virtualization, there are still some definite scenarios that will improve your storage architecture without breaking your back implementing them. Without a cloud storage gateway, most cloud storage is essentially useless to enterprise IT (other than AppDev) because none of your architecture knows how to make use of web services APIs.
But if you implement a cloud storage gateway, and choose wisely, you can save more in storage upgrades than the cost of the cloud storage. This is certainly true when you would have to upgrade local storage, and cloud storage just grows a little with a commensurate monthly fee. Since fee schedules and even what is charged for (bytes in/out, bytes at rest, phase of the moon) change over time, check with your preferred vendor to make certain cloud is the best option for your scenario, but remember that deploying a directory virtualization tool will increase utilization and tiering can help remove data from expensive tier one disk, possibly decreasing one of your most expensive architectural needs – the fast disk upgrade.
Next time we’ll look at applications from a general IT perspective, and I’m seriously considering extending this to a third blog discussing AppDev and the cloud.
Virtualization over the past years has become a key strategy for IT to acquire multi-tenancy, increase utilization, develop elasticity and improve security. And virtual machines (VMs) are quickly becoming a main vehicle for developing and deploying applications. The introduction of containers seems to be bringing another and perhaps overlapped solution for achieving the same above-mentioned benefits. Are a container and a virtual machine fundamentally the same or different? And how? Is one techn...
Mar. 29, 2017 03:30 AM EDT Reads: 3,184
Niagara Networks exhibited at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
Mar. 29, 2017 03:30 AM EDT Reads: 3,318
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Mar. 29, 2017 03:30 AM EDT Reads: 11,698
My team embarked on building a data lake for our sales and marketing data to better understand customer journeys. This required building a hybrid data pipeline to connect our cloud CRM with the new Hadoop Data Lake. One challenge is that IT was not in a position to provide support until we proved value and marketing did not have the experience, so we embarked on the journey ourselves within the product marketing team for our line of business within Progress. In his session at @BigDataExpo, Sum...
Mar. 29, 2017 03:30 AM EDT Reads: 3,196
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Mar. 29, 2017 03:00 AM EDT Reads: 6,049
Information technology (IT) advances are transforming the way we innovate in business, thereby disrupting the old guard and their predictable status-quo. It’s creating global market turbulence. Industries are converging, and new opportunities and threats are emerging, like never before. So, how are savvy chief information officers (CIOs) leading this transition? Back in 2015, the IBM Institute for Business Value conducted a market study that included the findings from over 1,800 CIO interviews ...
Mar. 29, 2017 01:45 AM EDT Reads: 5,392
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Mar. 29, 2017 01:15 AM EDT Reads: 9,172
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
Mar. 29, 2017 01:15 AM EDT Reads: 2,466
What sort of WebRTC based applications can we expect to see over the next year and beyond? One way to predict development trends is to see what sorts of applications startups are building. In his session at @ThingsExpo, Arin Sime, founder of WebRTC.ventures, will discuss the current and likely future trends in WebRTC application development based on real requests for custom applications from real customers, as well as other public sources of information,
Mar. 29, 2017 01:00 AM EDT Reads: 1,089
Interoute has announced the integration of its Global Cloud Infrastructure platform with Rancher Labs’ container management platform, Rancher. This approach enables enterprises to accelerate their digital transformation and infrastructure investments. Matthew Finnie, Interoute CTO commented “Enterprises developing and building apps in the cloud and those on a path to Digital Transformation need Digital ICT Infrastructure that allows them to build, test and deploy faster than ever before. The int...
Mar. 29, 2017 12:15 AM EDT Reads: 1,378
Whether you like it or not, DevOps is on track for a remarkable alliance with security. The SEC didn’t approve the merger. And your boss hasn’t heard anything about it. Yet, this unruly triumvirate will soon dominate and deliver DevSecOps faster, cheaper, better, and on an unprecedented scale. In his session at DevOps Summit, Frank Bunger, VP of Customer Success at ScriptRock, discussed how this cathartic moment will propel the DevOps movement from such stuff as dreams are made on to a practic...
Mar. 29, 2017 12:15 AM EDT Reads: 8,462
In his General Session at 17th Cloud Expo, Bruce Swann, Senior Product Marketing Manager for Adobe Campaign, explored the key ingredients of cross-channel marketing in a digital world. Learn how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized, relevant and real-time customer engagement across offline (direct mail, point of sale, call center) and digital (email, website, SMS, mobile apps, social networks, connected objects).
Mar. 28, 2017 11:15 PM EDT Reads: 3,456
For organizations that have amassed large sums of software complexity, taking a microservices approach is the first step toward DevOps and continuous improvement / development. Integrating system-level analysis with microservices makes it easier to change and add functionality to applications at any time without the increase of risk. Before you start big transformation projects or a cloud migration, make sure these changes won’t take down your entire organization.
Mar. 28, 2017 09:30 PM EDT Reads: 3,736
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, will discuss some of the security challenges of the IoT infrastructure and relate how these aspects impact Smart Living. The material will be delivered i...
Mar. 28, 2017 09:30 PM EDT Reads: 2,226
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Mar. 28, 2017 09:30 PM EDT Reads: 3,840
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190234.0/warc/CC-MAIN-20170322212950-00443-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 15,832
| 47
|
http://www.thrashermagazine.com/reviews/dave-olseth-memorial/
|
code
|
Dreamland hit another home run with this epic park. A beautiful town with a beautiful park, what more could you ask for?
WHAT: (describe the obstacles at the park)
GOOD: (the best bits about the park)
ADDRESS: 290 Armory Rd, Whitefish, Mt 59937, USA
HOW TO FIND IT: (highways, roads, visual landmarks, etc)
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644066017.21/warc/CC-MAIN-20150827025426-00033-ip-10-171-96-226.ec2.internal.warc.gz
|
CC-MAIN-2015-35
| 306
| 5
|
http://techboard.blogspot.com/2006/04/microsoft-hires-head-of-askcom-to-run.html
|
code
|
Microsoft has taken the unprecedented move of hiring the head of a major competitor to run one of their most critical business units - MSN. Which may reveal more than anything just how stuffed the online division is.
For the Wall Street Journal have announced that Microsoft is about to announce that Steve Berkowitz, ex-head of Ask.com and one of the most senior executives at Barry Diller's IAC/InterActiveCorp, is to take over the running of MSN.
Berkowitz is credited with the recent success at Ask.com. He sure needs the practice for MSN - which looks to need a serious dose of improvement. First up will be figuring out where MSN should go and how they can compete vis a vis Google, Yahoo et al.
Given that MSN is and likely always will be owned by Microsoft - I would have thought that their USP should be "the portal for advanced and comprehensive software services". If I want to I should be able to manage my diary, my life, my data and even my office applications from MSN.
The new MSN should have the most advanced email service and they should tightly integrate everything with MS Mobile. Then they should deliver the most functional and value adding search engine a la Ask.com. Maybe they should even buy Ask.com?!
Content should be secondary, comprehensive, but secondary. MSN should be my online alternative to a PC's hard drive. Then MSN can differentiate versus the other giant portals and search engines - and maybe even get a great deal more attention and respect within Microsoft.
And if they do not do it - Google or Yahoo probably will. Then Microsoft will have thrown away their Internet legacy and one of the most valuable franchises on the Web going fowards.
Jeff Bezos details his moon colony ambitions
45 minutes ago
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794869732.36/warc/CC-MAIN-20180527170428-20180527190428-00506.warc.gz
|
CC-MAIN-2018-22
| 1,744
| 9
|
http://rubypair.com/about
|
code
|
Ruby Pair began with an idea of Nola Stowe's while at Lone Star Ruby Conf 2011 to help developers who would like to pair together find each other. She told a few people about her idea; some of them mentioned this Evan Light guy who had been remote pairing with people a lot at the time. Nola found Evan and they immediately started pairing on the beginning of Ruby Pair.
Since LSRC '11, Evan went kind of hog wild working on Ruby Pair -- especially while playing with SASS and Compass. Evan's pal, David Browning, was awesome enough to mock up a design and shepherd Evan through UI choices to keep the app from becoming fugly. A few weeks later with Evan hacking at random hours of the night, and an outside contribution here and there, and Ruby Pair launched!
In a nutshell, we're about helping kindred developer spirits find one another.
For now, Ruby Pair is a searchable directory of developers who are looking to pair, in-person or remotely, on topics that they've expressed an interest in through their profile. Longer term, we're planning on adding recommendation features to more actively help developers find people nearby them, for in-person pairing, and with similar interests.
And there was much rejoicing, just like when we were forced to eat Sir Robin's minstrels (but that's another story...).
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510273676.54/warc/CC-MAIN-20140728011753-00137-ip-10-146-231-18.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 1,308
| 5
|
http://www.opserver.de/ubb7/ubbthreads.php?ubb=showgallery&Number=465357
|
code
|
EDIT: Star Explorers has been Greenlit! https://steamcommunity.com/sharedfiles/filedetails/?id=700074180
I've been working on Star Explorers for a few years now, and its' finally starting to look and feel the way I imagined it. Star Explorers allows the player to explore a randomly generated galaxy with stars, planets and other features.
The goal will be to find earth-like planets, but there are many other types of worlds to search through along the way. Here are some screen shots of the game as it looks right now:
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120694.49/warc/CC-MAIN-20170423031200-00446-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 520
| 3
|
https://docs.capitalgram.com/api/technical-analysis/volume/help/pandas_ta.volume.eom.html
|
code
|
API documentation for pandas_ta.volume.eom Python function.
- eom(high, low, close, volume, length=None, divisor=None, drift=None, offset=None, **kwargs)#
Ease of Movement (EOM)
Ease of Movement is a volume based oscillator that is designed to measure the relationship between price and volume flucuating across a zero line.
https://www.tradingview.com/wiki/Ease_of_Movement_(EOM) https://www.motivewave.com/studies/ease_of_movement.htm https://stockcharts.com/school/doku.php?id=chart_school:technical_indicators:ease_of_movement_emv
- Default Inputs:
length=14, divisor=100000000, drift=1
SMA = Simple Moving Average hl_range = high - low distance = 0.5 * (high - high.shift(drift) + low - low.shift(drift)) box_ratio = (volume / divisor) / hl_range eom = distance / box_ratio EOM = SMA(eom, length)
high (pd.Series): Series of ‘high’s low (pd.Series): Series of ‘low’s close (pd.Series): Series of ‘close’s volume (pd.Series): Series of ‘volume’s length (int): The short period. Default: 14 drift (int): The diff period. Default: 1 offset (int): How many periods to offset the result. Default: 0
fillna (value, optional): pd.DataFrame.fillna(value) fill_method (value, optional): Type of fill method
pd.Series: New feature generated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00836.warc.gz
|
CC-MAIN-2023-40
| 1,252
| 11
|
https://forum.professionalcomposers.com/t/anyone-doing-the-score-the-world-competition/3937
|
code
|
Is anyone here doing the Score The World competition?
I registered for it. They send you a scene from the movie, “Son of Saul,” that won an academy award in 2015. The scene has dialog and foley sound, but no music. I’m mapping out what I’m going to do for it now.
Anyone try this competition in previous years?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703515235.25/warc/CC-MAIN-20210118185230-20210118215230-00521.warc.gz
|
CC-MAIN-2021-04
| 318
| 3
|
https://www.mitacs.ca/en/impact/term/7243?page=6
|
code
|
The collaboration helped Renée to find a renewed sense of purpose: “Partnering with Decode through Mitacs Accelerate re-energized my research. Putting myself out there to try something different has led me to an interesting tangent that’s now leading me into the next step of my career.”
In discussions with my supervisor, I learned about the deep cultural histories of the Himalayan region, and aimed to bring together my interest in visual anthropology with a field-based ethnographic study of a social phenomenon.
Ken developed an algorithm that can accurately predict the risk of a chat message in a computationally efficient manner. His algorithm was able to identify a number of spelling variants of blacklisted words and evasive patterns that had previously gone undetected by human moderators.
As a law student at Universidad Autónoma de Baja California in Mexico, Wendy has learned much about the profound differences between nations regarding access to basic resources, issues of discrimination, and justice for human rights violations.
"With these new, shorter tests that are easier to administer, family doctors will have access to a quick snapshot of what a patient’s mental or cognitive health is like, allowing them to provide support and get into prevention a lot earlier.”
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510941.58/warc/CC-MAIN-20231001205332-20231001235332-00080.warc.gz
|
CC-MAIN-2023-40
| 1,301
| 5
|
https://www.wilderssecurity.com/threads/t-i-11-restoring-image-on-larger-drive-than-source.235889/
|
code
|
I'm an I/T tech for a small company. Many of our clients use Acronis for backup purposes. When restoring a .tib file with True Image, I seem to have two options for restoring (from the T/I rescue CD). The first option restores the entire image and MBR (if I select that). The problem with that option is the size of the partition it restores. Example: A client has been using a 13Gb drive and it may be starting to fail. Create a .tib file and restore to a new drive (which is of course larger) only creates a 13 Gb partition, the rest of the space is unallocated. This is clearly not acceptable to the client. How can the restored data be configured to use the full partition size (in this case a 160Gb drive) Thanks, S.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584334618.80/warc/CC-MAIN-20190123151455-20190123173455-00321.warc.gz
|
CC-MAIN-2019-04
| 721
| 1
|
https://www-304.ibm.com/connections/blogs/B2B/entry/meet_the_team_of_experts?lang=en_us
|
code
|
While I am happy you have found my blog and hope you find it of some use, I would like to encourage you also check out some of the blogs from other experts I have the pleasure of working with...
For MFT, see what William McKinney has say on his blog: Managed File Transfer Perspectives
For B2B Integration and transformation, see what Chris Hayes has to say on his blog: B2B and EDI Integration
For Cloud based B2B integration perspectives see what Matt Bucey has to say on his blog: B2B and EDI in the Cloud
For more B2B & MFT perspectives check out Brian Bailey's blog: B2B & MFT Insights
For a perspective on B2B on premise software see what Rod Gifford has to say on his blog: B2B On Premise Integration
and finally, I invite you to learn from a large number experts on the Smarter Commerce blog
All of these blogs can also be found to your right in the links area and I will continue to add more as I come across them.
If you haven't been to IBM's new Rethink page, check it out
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049276131.97/warc/CC-MAIN-20160524002116-00161-ip-10-185-217-139.ec2.internal.warc.gz
|
CC-MAIN-2016-22
| 983
| 9
|
https://www.zdnet.com/article/microsoft-gets-data-fabulous-at-nyc-event/
|
code
|
Although I'm down in Orlando, Florida for the SQL Sever Live! and Visual Studio Live! conferences, Microsoft is putting on its annual Connect(); developer event, up in Manhattan where I normally spend most of my time. And though I'm missing the live event itself, Microsoft was kind enough to brief my on a slew of data-related announcements the company is making at Connect() today. I cover them in detail here.
Brick by brick
The lead item is a real biggie: Microsoft is getting the Apache Spark religion, introducing a new cloud service in preview, called Azure Databricks. This is noteworthy for a number of reasons. First, the service was developed jointly by Microsoft and Databricks (the company whose founders are Spark's very creators), to deliver this Spark-based Big Data analytics service as a first-party Azure offering, and not a mere partner service on the Azure Marketplace. Second, the service works independently of Databricks' own cloud service for Spark and of Azure HDInsight, Microsoft's own Big Data as a Service platform, on which Spark also runs.
Also read: Spark comes to Azure HDInsight
Azure Databricks has nonetheless been designed form the ground up to take advantage of, and be fully optimized for, various Azure services, including blob storage, Data Lake Store, virtual networking, Azure Active Directory and Azure Container Service. While Azure Databricks, like HDInsight, is still based on the creation a dedicated cluster, with the number and type of nodes (servers) being determined by the customer, it nonetheless has built-in auto-scaling and auto-termination, to grow the cluster as necessary and shut it down once it's no longer needed.
Like most Spark environments, Azure Databricks features a browser-based notebook facility as its primary user interface. But the Azure Databricks implementation allows notebooks to be edited by multiple users simultaneously, to accommodate collaborative data science and data engineering. Microsoft says Azure Databricks notebooks also provides an integrated debugging experience and includes a number of sample notebooks to aid users in connecting to common data sources and performing machine learning tasks in Python or R. Azure Databricks is also integrated with Power BI, Azure SQL Database and Azure Data Warehouse, as well as Cosmos DB - the Spark connector for which is being released to general availability (GA).
And speaking of Cosmos DB (Azure's globally distributed NoSQL database service that began commercial life as DocumentDB), there's news there too, also taking a cue from an Apache Software Foundation open source project. Microsoft is announcing Apache Cassandra as a Service, powered by Azure Cosmos DB. Now, in addition to Cosmos' supported SQL, Gremlin, and MongoDB APIs, Apache Cassandra developers will be able to take their applications, whether written for Apache Cassandra or DataStax Enterprise, and run the code on Cosmos DB. Microsoft does this in fulfillment of its promise to make Cosmos DB a true multi-mode database, supporting Cassandra's wide column store NoSQL approach in addition to MongoDB's document store paradigm, Gremlin's graph database constructs and the Azure Table Storage key-value store approach.
Also read: Microsoft debuts Azure Cosmos DB, a superset of its DocumentDB service
Also read: Inside Microsoft's Cosmos DB
The Cassandra API for Cosmos DB is in public preview. Meanwhile, the Azure Table API is being released to GA, and Microsoft is announcing that the Gremlin API will GA next month. And while the MongoDB API has been GA for quite some time, new unique index and aggregation framework pipeline support are being added to it, in preview form.
Users of any of the APIs get access to all five of Cosmos DB's database consistency models, including strong and eventual consistency, as well as three consistency levels in between those two extremes. And Microsoft is announcing the availability of the strong consistency level for multi-region databases, spanning beyond the single-region scope for which that consistency model worked previously. On the other side, Microsoft is upping its service level agreement (SLA) to "five nines" (99.999%) availability for multi-region reads. The SLA had been "four nines" (99.99%) up until now; SLAs for throughput, consistency and latency remain unchanged.
That's a lot of stuff, right? Well, there's still more, much of it aimed at Microsoft's more traditional .NET and SQL Server developers.
Enterprise Devs get AI
First off, new cross-platform tooling, in the form of SQL Operations Studio, is being released in preview. To further the cross-platform database ethos, Microsoft has joined the Maria DB Foundation and is announcing that a new Azure Database for MariaDB service will be forthcoming, to join the existing Azure Database for MySQL and Azure Database for PostgreSQL preview services. MariaDB, by the way, is a fork of MySQL, created in the wake of Oracle's 2010 acquisition of Sun Microsystems, which gave it ownership of MySQL AB and stewardship of the MySQL database.
Also read: Microsoft cloud to SQL Server: let's have an open (source) relationship
Microsoft is also adding an implementation of the SQL Server on-premises feature it now calls Machine Learning (ML) Services, to the cloud-based version of the product, Azure SQL Database. In SQL Server 2016, the feature was called R Services, and this first release for Azure SQL DB will also in fact support the integration of the R language into T-SQL scripts and stored procedures. Python language integration, which was added to SQL Server 2017, will come at later time.
Also read: Review: SQL Server 2017 adds Python, graph processing and runs on Linux
Also read: Microsoft's R Strategy
Regardless of the language used, each of these implementations facilitates the creation and training of machine learning models - as well as scoring data against them to make predictions - in the database, without requiring any data to be queried and streamed out into another environment. ML Services in SQL Server 2017 also added a capability called "native scoring" which allows data to be scored against models directly from T-SQL (using the new PREDICT command) requiring zero code written in R or Python. That's a nice feature, and it's included in Azure SQL Database Machine Learning Services, too.
This notion of bringing machine learning services to application developers is further amplified with the introduction of Visual Studio Tools for AI (artificial intelligence), with tie-ins to running models in Microsoft's IoT (Internet of things) Edge. Please see a separate post, by ZDNet's Mary Jo Foley, for detailed coverage of both of these items.
Considering that Microsoft has made AI and underlying data analytics technologies one of its biggest company-wide bets, none of these announcements is surprising. Regardless, the combination of relational, non-relational, BI, Big Data and Machine Learning/AI capabilities - and tooling - provided by today's Microsoft data and developer platforms is unprecedented in scope and speed of delivery. There's a lot for developers, data engineers and data scientists to keep track of here, but the reward to Microsoft in the relevancy of its platform will likely warrant all the disruption.
This post was updated on November 15th, 2017 at 1:06pm ET to correct the original statement that the Cassandra API for Cosmos DB was being released to private preview. It has, in fact, been released to public preview.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100650.21/warc/CC-MAIN-20231207054219-20231207084219-00405.warc.gz
|
CC-MAIN-2023-50
| 7,502
| 22
|
https://www.youtube.com/user/ClefferNotes
|
code
|
Hey everyone, here is a different video to what I normally upload. This video I thought was important to create as it is my philosophy on music and how we as a whole: embrace it. I decided to write a small poem and produce a video, I also wrote a soundtrack to go alongside it dynamically so here is what I produced. I created the music from scratch in Apple Logic to accompany the poem I had written. I wonder how many of you realise (hopefully some!) the small easter egg in this video: i'l give you a hint listen to the music and watch the key words!
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934809746.91/warc/CC-MAIN-20171125090503-20171125110503-00508.warc.gz
|
CC-MAIN-2017-47
| 553
| 1
|
https://www.freelancer.com/projects/windows-system-admin/using-ffmpeg-with-windows-aws/
|
code
|
I currently an attempting to find a solution for a video project that I'm working on. I'm trying to convert a .wmv file ~20 minutes long and around 1 to 2GB in size to three different file formats, those of which being iPhone, mp4, and another wmv with specific brightness and contrast settings with a watermark in the bottom right of the newly encoded video.
I currently have a Windows desktop machine with an i7 860 processor and 8GB of RAM that I'm going to be doing video encoding on with, and am wanting to use ffmpeg to see if I can increase the turnaround time of conversions considering the current program I'm using is taking up to 2 hours to convert just the mp4 and wmv formats with those few settings.
Additionally, considering I'm not around my desktop all the time, I'd like to have the flexibility of having the needed commands available to make this work in an Amazon EC2 Linux instance with ffmpeg on one of their instances.
This is a fairly low budget project, so please bid accordingly.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645405.20/warc/CC-MAIN-20180317233618-20180318013618-00469.warc.gz
|
CC-MAIN-2018-13
| 1,005
| 4
|
http://www.mwrighton.com/projects-diveanotherway
|
code
|
Dive Another Way
Dive Another Way is a local multiplayer synchronised diving game created at Exile Jam in Fall 2015 by Gian Dbeis, Remy Stuurwold and myself. The game controlled through synchronised phone throwing. The game records the phones time in the air, rotation rate and rotation axis to allow the server to give the players an instant replay and a score.
We are continuing development on the game with Svavar Melberg as a Half Past Yellow project and plan to release the game as part of a mobile multiplayer mini-game collection titled Ragdoll Resort and released on the Google Chromecast.
For this project designed the game, wrote the network code during the jam, created particle effects and set up the client scene.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934807344.89/warc/CC-MAIN-20171124085059-20171124105059-00160.warc.gz
|
CC-MAIN-2017-47
| 726
| 4
|
http://javascripttreemenu.com/right-side-tree-menu-navigation.html
|
code
|
Recent Questions Right Side Tree Menu NavigationQ:
I am interested in purchasing the "Microsoft Like Style Dhtml Tabs Menu" and would like to know if the tab menu horizontal java, roll over and selected colors are controllable? meaning if I want green (not blue) tab I can have the tabs green. Please let me know http://deluxe-tabs.com/file/templates/deluxe-tabs-micr.html A: Unfortunately you cannot change the color of this template in DeluxeTuner, as it is image-based tab menu horizontal java.
If you want to change the color of this template you should changeimages. You can do it in any Graph editor, for example in PhotoShop.
The example you gave has no links, but when we try to add links to it (in the 2nd parameter of any menu item), NOTHING happens.
It's not a broken link, it just wont do ANYTHING. A: See your menu parameters. Now you have:
You should set this parameters:
I cannot see the arrow.gif's in my rollover drop down menu.
Here is my code:
Do I need to put the arrow's somewhere else? A: You should check the following parameter:
Please check that you have the correct path to your aroows relative to the folder withindex.html file.
For example, you have:
In menu.js file you should write:
Once I have an answer form your reseller as to why the VAT doesn't correspond with my country's rate, I think that there is a very strong possibility that I will be investing in this impressive menu-builder. I do have a couple of questions which don't seem to be answered anywhere:
You can find more info here:
Try to do the following things:
- delete var pressedItem=1; parameter from your data file
- set correct parameter on each page before you call data file, forexample:
function dm_ext_setPressedItem (menuInd, submenuInd, itemInd, recursion)
Sets a current pressed item.
menuInd - index of a menu on a page, >= 0.
submenuInd - index of a submenu, >= 0.
itemInd - index of an item, >=0.
recursion = true/false - highlight parent items.
But notice, to use dm_ext_setPressedItem() you should know ID of selected item and subitem.
You can't get this ID after you reload your page. That is why you should write your own code on PHP.
See the attached example. Open deluxe-menu1.html. The first item ishighlighted. Then click to open deluxe-menu2.html file. The second item ishighlighted.
> 2: the section of the web page in which the menu is located is called> by a SSI for each new page that the browser visits - will the menu > rest each time the Included file is called, or will it persist from > page to page?
So when your browser reloads a page with the menu your menu reloads too.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408828.55/warc/CC-MAIN-20160624155008-00168-ip-10-164-35-72.ec2.internal.warc.gz
|
CC-MAIN-2016-26
| 2,601
| 28
|
https://www.fda.gov/Drugs/DevelopmentApprovalProcess/FormsSubmissionRequirements/ElectronicSubmissions/DataStandardsManualmonographs/ucm072158.htm
|
code
|
FDA Data Element Number. GEN-00201
CDER Data Element Number. C-GEN-00201
Version Number. 001
Data Element Name. Person Given Name.
Description. This standard represents a name that usually precedes the middle name and the surname. Person Given Name is commonly referred to as a first name.
Source. Data Standards Committee, FDA.
Relationship. Person Middle Name (GEN-00202), Person Surname (GEN-00203), Person Family Rank (GEN-00204).
FDA Specifications. Person Given Name is represented by variable length alphanumeric text consisting of a maximum of fifteen (15) characters.
CDER Specifications. No further specifications.
FDA Approved Date. October 12, 1989.
CDER Approved Date. February 11, 1992
FDA Revised Date.
CDER Revised Date.
|Literal||A person's given name or first name.||N/A|
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170993.54/warc/CC-MAIN-20170219104610-00087-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 789
| 14
|
https://community.ptc.com/t5/Manufacturing-CAM/Post-Processor-Problems/td-p/220170
|
code
|
I'm running WF2 build m050 with a Fanuc robodrill mill.
I have a couple of questions. Does the post output correctly when you start at a point other than X0,Y0? I'm making an assumption that the tool rapids to a point Xn,Yn,Z5.0 then feeds to first Z and feeds across/through the part. This may indicate that the post is not processing the first GOTO statement in the NCL file.
Yes, the post outputs correctlyif the start is apoint other than X0, Y0. Francois pointed out that thepost thinksthe table is in the tool change position (X0,Y0)and therefore does not require outputting the X and Ybut in actual fact thetable isstill inthe home position.
Both seem logical even if they don't address the problem directly. Will try both on monday unless there is a reason for not doing so?
Thanks all for the help 🙂
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510942.97/warc/CC-MAIN-20231002001302-20231002031302-00212.warc.gz
|
CC-MAIN-2023-40
| 811
| 5
|
https://benjaminrosenbaum.github.io/blog/archives/000487.html
|
code
|
Like a Sturgeon, for the Very Second Time...
Wowzers! And look at that list! Those are some fine stories. I am tickled to say that in addition to writing one of those stories, I critiqued two others in writing workshops. That almost makes me prouder.
Guess which ones? (No cheating: if you were there with us, it's not a guess, is it?).
Now off to Wiscon!Posted by benrosen at May 24, 2007 09:46 AM | Up to blog
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710533.96/warc/CC-MAIN-20221128135348-20221128165348-00783.warc.gz
|
CC-MAIN-2022-49
| 411
| 4
|
https://benjaminlauderdale.net/publications/the-supreme-courts-many-median-justices/
|
code
|
Benjamin E. Lauderdale and Tom S. Clark, “The Supreme Court’s Many Median Justices”, American Political Science Review, 106(4):847-866.
Theoretical and empirical research on the US Supreme Court has become increasingly channeled through a unidimensional spatial model of judicial decision-making. We argue that limitations in quantitative measurement of justices’ preferences have obscured the ways in which justices’ preferences vary across areas of the law and constrained the set of questions the research can pursue. We introduce a new approach, using multiple indices of substantive similarity among cases and a kernel-weighted optimal classification estimator to recover estimates of judicial preferences that are localized to particular legal issues as well as periods of time. Allowing preference variation across legal areas significantly improves the predictive power of estimated preference orderings versus a model that only allows for variation in preferences over time. We find judicial preferences are not reducible to simple left-right ideology and, as a consequence, there is substantial variation in the identity of the median justice across areas of the law during all periods of the modern court. These results suggest a need to reconsider empirical and theoretical research that hinges on the existence of a unitary and well-identified median justice.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00368.warc.gz
|
CC-MAIN-2023-40
| 1,382
| 2
|
http://softwaretopic.informer.com/wcf-billing/
|
code
|
Simplifies the traditional n-tier application pattern.
/n software inc.
/n software WCF Channels consist of fully-managed .NET Transport Channels.
WCF Architect is a new software suite designed to remove the tedious work.
Is a framework that provides a pattern to write application logic.
It enables the creation and consumption of data services for the Web.
Free billing, invoicing, and client management software.
Automatically reminds you when an important bill in near.
Intelligent IT SRL
An accounting tool specifically intended for managing invoices.
Billing and invoice tracking and management solution.
This software can automate your billing, invoicing and customer management.
R6 Bill Tracker is a clean and simple bill tracking personal finance application.
EazyCode 7.1 is a collection of following 3 tools... 1) Application generator Generates WCF, Web, Wi....
WCFStorm is a program designed for testing both WCF and Web Services.
A WCF based ServiceBus that provides durable messaging .
BS1 Professional Time Billing is a time billing and accounting program.
ZPAY Payroll Systems, Inc.
TimeBillingWindow - Time Billing Software for tracking and billing client time.
Promethean Software Corporation
TurboLaw Time and Billing is an easy-to-use time and billing program.
Pay Revision Arrear Billing/DA Arrear billing software.
Easytech Software Solutions
Hotel Billing Software is a comprehensive hotel or restaurants counter billing.
track time for billing & project management.
A billing, monitoring & management system that provide computers for public use.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107879362.3/warc/CC-MAIN-20201022082653-20201022112653-00486.warc.gz
|
CC-MAIN-2020-45
| 1,571
| 26
|
https://adamsandbits.com/2013/11/time-to-kill-off-windows-r.html
|
code
|
|Microsoft’s Julie Larson-Green in March 2012|
With the massive failure of Surface, the upheaval in management and the comically embarrassing fumble with Windows RT, it’s time. Microsoft may be finally ready to kill Windows RT.
At a UBS seminar Microsoft senior executive, Julie Larson-Green, appears to have admitted the failure of Microsoft to make a dent in tablets and sell Windows RT to partners and customers.
Larson-Green, who is executive vice-president of Devices and Studios at Microsoft, said that the aim of Windows RT was “our first go at creating that more closed, turnkey experience [that Apple has on the iPad]…” but that Microsoft now has three mobile operating systems: “We have the Windows Phone OS. We have Windows RT and we have full Windows. We’re not going to have three.”
Frankly her comments and Microsoft’s newer Surface and Nokia tablet marketing fills me with NO hope that Microsoft “gets it”. They are still using the same old strategy with the same old perspectives, that have failed and failed again.
They are now facing much stronger and smarter competition in their core businesses. PCs, OSes, Office and servers from Apple, Google, open source and more. They’ve gone absolutely nowhere in phones and tablets, after over a decade of trying and still showing no signs that they get it yet. Inertia and a dying monopoly will keep them alive for a while. Perhaps long enough to make the massive cultural and technological changes needed to stay a player. But then again….
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506623.27/warc/CC-MAIN-20230924055210-20230924085210-00765.warc.gz
|
CC-MAIN-2023-40
| 1,527
| 6
|
http://www.c-sharpcorner.com/UploadFile/7e39ca/logout-from-microsoft-account-in-windows-8/
|
code
|
Windows 8 provides the ability to connect your Microsoft Account to a domain account and sync your settings and preferences between them. Using this feature you can directly use online services, such as Hotmail, SkyDrive, Calendar, and the Windows Store on you Windows 8 PC. But sometimes you want to stop the online services on your PC for security purposes. For that you must disconnect or remove your Microsoft account from your PC.
In this article we explain how to stop all Microsoft online services on Windows 8. To stop the online services you must disconnect your Microsoft account from your PC and after disconnecting the account all online services will be stopped automatically.
How to Disconnect a Microsoft account from a Windows 8 PC
Go to the Charms Bar and select "Settings".
In the settings window click on "Change PC Settings".
In this window go to the "Users" tab.
Now click on "Disconnect your Microsoft account".
It will ask for your confirmation. Click on "Finish" to continue.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218194601.22/warc/CC-MAIN-20170322212954-00180-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 999
| 8
|
https://hub.mender.io/t/error-message-not-clear-enough-in-mender-cli-artifacts-upload/6295
|
code
|
mender-cli artifacts upload from
mendersoftware/mender-ci-tools:1.0.0. When uploading an artifact that has same
<mender-artifact>.tar.gz/header.tar.gz/artifact-info as an existing image, it will just tell
FAILURE: artifact upload to ‘hosted.mender.io’ failed with status 409
Only when uploading the artifact through the webinterface at hosted.mender.io, one will get a helpful error message being “Artifact with same name or depends exists already”.
Please update the CLI tool to also provide this error message.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100527.35/warc/CC-MAIN-20231204083733-20231204113733-00665.warc.gz
|
CC-MAIN-2023-50
| 520
| 6
|
https://www.brown.edu/academics/chemistry/news/archive
|
code
|
Winning the Student Track was H2Ok Innovations, led by David Lu, a Brown University undergraduate studying chemistry and computer. H2OK Innovations, which uses artificial intelligence data analytics to map sources of contamination in underground drinking water pipes that are targeted for replacement, received $15,000 in cash plus $43,975 in professional and consulting services.
Brown University’s Breakthrough Lab (B-Lab) is an intensive 8-week accelerator program designed to support student entrepreneurs developing high-impact ventures. Each participating team receives access to custom mentoring, a peer cohort of dedicated founders, and co-working space.
Natasha is a second-year graduate student in the Robinson group. She received Honorable Mention for her fellowship entitled "Investigation of Metal-Coupled Electron Transfer in Cu-Catalyzed Oxygen Reduction Reaction Electrocatalysis"
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251700988.64/warc/CC-MAIN-20200127143516-20200127173516-00412.warc.gz
|
CC-MAIN-2020-05
| 898
| 3
|
http://www.perlmonks.org/?node_id=1013939
|
code
|
Thank you roboticus, I will check that. :)
I had known how to create the images and text in pdf, but what I want to find is just want to create table dynamically both containing text column and iamge column.
I will search in CPAN later..:)
Re^2: create tables with text and images in pdf
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049270555.40/warc/CC-MAIN-20160524002110-00072-ip-10-185-217-139.ec2.internal.warc.gz
|
CC-MAIN-2016-22
| 287
| 4
|
https://community.cisco.com/t5/wireless-mobility-documents/access-point-certificate-check-tool-apcertcheck/tac-p/3155585
|
code
|
The output is presented in CSV format, for easy processing with any common spreadsheet application.
This version adds the capability to import AP information with no direct connection to the WLC, either through a static AP list specified in the config.ini file, or by importing the raw output of the "show ap join stats summary all" in one or more text files.
All platforms: paramiko / pycrypto / ecdsa From CLI:
pip install paramiko pycrypto ecdsa
The “pip” command requires internet access to reach the PyPI repositories via HTTPs. Should the above commands on CLI return a “file not found” error, execute the command after changing directory to the “Scripts” directory under the python installation, e.g. C:\Python27\Scripts\
The host running the script needs to have network connectivity (SSH and/or Telnet) to the Access Points. Connectivity to the Wireless LAN Controller(s) is also required unless AP information is imported through text files (version 1.2.1).
Installation and Configuration instructions:
Please refer to the release notes PDF document for more details.
The tool and documentation can be downloaded from this repository (CCO account required):
Greetings,I have outdated AIR-BR1310 with broken configuration. This is not about fixing it, but mostly about understanding why it works like it works. BR1310 is connected via trunk interface. Native VLAN have nothing, VLAN 26 is for wireless and VLA...
I just got my hands of an Cisco Aironet LAP1142N-E-K9 and want to convert it from Lightweight to Autonomous. For that I need the imagefile "c1140-k9w7-tar.153-3.JD17.tar" I cant download it from here, nor find it elsewhere. So how do I get the imagef...
This should be a question with an obvious answer but the Google Gods haven't been clear. I'm trying to determine which image I need for a 3702i access poing with the master controller AP (mobility express) running 8.8.125 but can't seem to find anything o...
Here is the complete boot capture: If I interrupt the boot, I can tftpboot at the (RNAQ-C7) # prompt a new ap1g4 file as part.bin to the device with no change. #====================== Connected 6:07 PM 10/18/2019 ====================...
Hello,Since we upgraded connections between our buildings we will use central WLC (5520) on our central location. There is around 1500APs on all locations which will be adopted to that WLC.My concern is that when I use local mode, I got my traffic do...
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987751039.81/warc/CC-MAIN-20191021020335-20191021043835-00288.warc.gz
|
CC-MAIN-2019-43
| 2,437
| 14
|
https://github.com/team178
|
code
|
Grow your team on GitHub
GitHub is home to over 28 million developers working together. Join them to grow your own development teams, manage permissions, and collaborate on projects.Sign up
This is the code for the 2018 POWER UP game
Code for Steamworks Robot
The 2nd Law Enforcers' Website
Hour of Code website
Fun Robotics Bingo!
Arduino Repository for the Display Case LED lights.
A repository for testing and learning.
2014 Competition Robot - Aerial Assist
The 2015 Match Scouting App, now on GitHub!
The code repository for our un-named robot for the FRC Stronghold Challenge
Repository for our CAD files.
2015 Competition Robot - Recycle Rush
2007 Competition Robot - Rack 'n Roll
Automatically exported from code.google.com/p/team178first
A LabVIEW Dashboard for CaptainFalcon
This is the code for the new test bot!
2013 Competition Robot - Ultimate Ascent
2010 Competition Robot - Breakaway
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590069.15/warc/CC-MAIN-20180718060927-20180718080927-00012.warc.gz
|
CC-MAIN-2018-30
| 899
| 20
|
https://members.delphidigital.io/dailies/total-value-locked-on-metis-grows/
|
code
|
Total Value Locked on Metis GrowsJan 11, 2022
Total Value Locked on the Metis Andromeda network more than doubled yesterday after Netswap launched its liquidity mining program. Netswap is the first AMM DEX in the Metis ecosystem, and now stakers of LP tokens can earn $NETT rewards.
Metis is an EVM compatible optimistic rollup, forked from Optimism’s Virtual Machine with a few tweaks. One key differentiator of Metis against Arbitrum and Optimism is that they have IPFS integrated and aim to deploy a system to shorten transaction finality from the typical 7 days down to just a few hours. Transaction fees can be expected to fall from a few dollars to cents once Metis launches their storage layer estimated by the end of Q1.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300289.37/warc/CC-MAIN-20220117031001-20220117061001-00342.warc.gz
|
CC-MAIN-2022-05
| 730
| 3
|
https://archive.ahrq.gov/professionals/systems/hospital/red/staff-training/slide13.html
|
code
|
Project RED: Re-Engineered Discharge (Staff Training)
Project Steering Committee
- List team members
- Designate project team leader, executive sponsor, and physician champion
"Here are the members of our Project RED Steering Committee."
Note: Customize this slide. List and read names of the executive sponsor, physician champion, project team leader, and the team members.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818696182.97/warc/CC-MAIN-20170926141625-20170926161625-00614.warc.gz
|
CC-MAIN-2017-39
| 374
| 6
|
https://community.redseal.net/t/y7pv37/creating-a-port-specific-report-with-redseal
|
code
|
Interesting question, Sini
I can think of a few ways, but it depends on what exactly you want to find.
If we want "all routers configured to accept telnet", we might use a custom BPC to look for some specific syntax on a box. (There's also a quick "search for devices with particular config content".)
If we want "all endpoints/hosts with a listening web server", that's different - a dynamic group might work there, based on looking for some software.
If we want "any network device that can be accessed from outside", an Access query might be the way to go. That might also work for "any parts of my network that I allow TCP port x into".Reply
Hi Mike Lloyd ,
Thanks for a quick response. I was trying to figure out creative ways to search for devices listening on port 4786 to detect Cisco Smart Install Protocol. I've used the port, Role: Client (SmarInstall enabled) and searched through config content and "vstack". It might be easier to write up a custom best practice with other options as well.Reply
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249508792.98/warc/CC-MAIN-20190223162938-20190223184938-00022.warc.gz
|
CC-MAIN-2019-09
| 1,008
| 7
|
http://www.ai.mit.edu/projects/iiip/experiments.html
|
code
|
This page contains a pointers to various WWW demonstration pages developed
by the Intelligent
Information Infrastructure Project.
We apologize to those who cannot currently access certain pages. The
research nature of these systems means that they may not be available at all
times. Many of these examples build on The Common
LISP Hypermedia Server.
- The Vice
President's Electronic Open Meeting on the National Performance Review. Project members
worked with NPR to organize the Open Meeting as well as incorporate online
surveys and advanced systems for wide-area collaboration over email and WWW.
The event is described by a
paper in the Proceedings of The Fourth
International Conference on The World Wide Web, Boston: MIT, December
House Publications provides top-down and bottom-up access to electronic
releases by the White House. Standing search URLs allow users to run focused
searches by merely clicking on an anchor. Research systems developed by the
project in Common Lisp have been deployed in a high-volume application and
technology transfer is in progress.
- Citizens can now Send a
message to the President and Send a
message to the Vice President. After a series of prototypes demonstrated
concepts for correspondence interfaces, the public-access technology developed
by project members was translated into production the White House. In these
interfaces, ancillary information needed to determine message routings is
gracefully elicited from the user. We ask any one who may have cached HTML
forms for earlier prototypes to please upgrade to the official versions
available from the White House Web
White House Documents via the taxonomy of categories used by the M.I.T.
Publications Server to distribute these documents over email. Top-down
retrieval via categories obviates the need for the user to guess relevant
words required to make bottom-up
approaches work accurately.
Retrieve White House Documents via a search index. This page
provides complete documentation on the taxonomy of White House documents used
to distribute them to subscribers.
White House Documents via hierarchy organized by publication dates. This
archive is created automatically by the normal operation of the email
- The toplevel form
for the M.I.T. Publications Server allows people to subscribe to the daily
releases via email. In this example, the WWW form initiates an interaction
with the user which is continued via email with an email server. Although the
new server routes messages to recipients via a boolean combination of
content categories and documents, this form provides a variety of standard
cliches in order to provide an accessible form-interface. Soon, another form
for more advanced users will allow subscription via the full granularity of
- During the last week of January 1994, we test-drove our new email
server technology by surveying over 1600 internet users who access electronic
publications by the White House. This automatic and adaptive survey began
with a small Usage
Survey, and then applied if-then rules to determine which specialized
follow-up surveys were most appropriate for each respondent. The survey
results were automatically tabulated. They and their interpretation have been
compilated in a preliminary
report and are summarized in Survey Briefing Points
for Busy Officials.
- The 1996 Survey of
White House Electronic Publications users extends the earlier system and
genrlizes the automatic form processing system over email and WWW. This
substrate automatically validates inputs using a presentation system and
to perform some client-side input validation. Results are not yet available.
- Ask the START Natural
Language System an English question about the M.I.T. Artificial
Intelligence Laboratory. Please report any successes or bugs to Boris Katz
- Learn IF-THEN rules
about international conflict management in the period after 1945. This uses a
rule learning system available in the Feature
Vector Editor. If the demo is unavailable, see snapshots of the setting
up an experiment and several
using the Common Lisp Web Server are popping up at many different sites
around the United States and the world. It is the Web interface of choice for
researchers and developers using advanced languages like Common Lisp to tackle
difficult problems in planning, knowledge representation, intelligent
tutoring, machine learning, and natural language processing.
- The Kennedy Home
Page was assembled as a demonstration of what the Congress could do right
- The Cambridge Home
Page was assembled as an embarassingly small step toward the Palo Alto page.
- Explore the Political Participation
Project, a research initiative exploring how networked media can be used
to facilitate political participation. The Project features the Online Political
Information Network, a guide to political information available on the
John C. Mallery
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578721468.57/warc/CC-MAIN-20190425134058-20190425160058-00339.warc.gz
|
CC-MAIN-2019-18
| 4,875
| 83
|
http://msgroups.net/excel/column-width-and-pasting-sections-in-excel-formatting-q/251536
|
code
|
subtracting columns in a macro
I'm trying to subtract columns in a macro, but since the
resulting file will be exported in *.csv format, I only
want to subtract the rows that have data in them. Can
someone tell me how to do that?
Thanks so much!
...how do I add times in Excel and result in hours & mins
I want to insert a time when I start work and a time when I take a break,
then a time when I leave work.
Following that I want to be able to add up the amount of hours that I have
This will enable me to plan my week ahead and ensure I only allocate a
specific amount of time to a project.
Microsoft MVP - Excel
"Rty Shaw" <Rty Shaw@discussions.microsoft.com> wrote in message
>I want to insert a time when I start work and...Illegal operation error while printing EXCEL or WORD Files
I am facing an illegal operation error when i try to print any file from
excel (any no. of pages), this happens in stand alone printer as well as a
When we press the print button, it flashes this message, but still prints,
but once the printing is completed, i will have to restart the PC. Due to
this error other applications PRINTING also will NOT HAPPEN and the only way
out is, restart the PC.
This happens not only in EXCEL, it happens in all the MS applications
(outlook, access, front page, powerpoint also).
When I check the print manager (before restart),...VBA from another app: Suppressing Excel confirmation dialog?
After creating/formatting several worksheets from MS Access, I'd like to delete
the "Sheetn" worksheets that got put there when I did a .WorkBooks.Add.
I avoided using them because I'm not sure how/why they are created - i.e. maybe
some user's defaults would only create 1 empty sheet or none.
So, form MS Access's VBA I'd like to do:
On Error Resume Next
On Erro...Importing Data into an Excel Pivot Table via Access
I have set up a query in Microsoft Access which is linked to our AS400
server. I have created pararmeters within Access which asks for certain
fields which works. I then go into Excel and create a pivot table with the
external data source that I have created in access. When I go to enter a
pararmeter within Microsof Query I get a reply saying that "Parameters can
not be used with this Query", what I want to do is setup a parameter on the
Excel spreadsheet which then goes and gets the data i require from this
parameter. I would be very grateful if someone could help me with thi...Opening a new instance of Excel
I am using multiple monitors for work and it is great! Is
there a setting that I can use so that it opens each new
excel file in a new excel window so I can drag different
ones to each monitor? Is there a similar setting for Word?
I am using Excel 2002 and Word 2002.
Yes, you can check the Windows in Taskbar checkbox in
Tools; Options. This is on the View tab for both Word
>I am using multiple monitors for work and it is great!
>there a setting that I can use so that it opens each new
>excel file in a new excel ...Emailing in excel 2003 02-26-10
If i type in the cell A34: neil.Holden@test.com and press a button is it
possible to email to the address of what ever is in A34 is?
The email body should say: this has been submitted for cell B34 and todays
Check out Ron De Bruins "Send-Mail" tips:
"Neil Holden" wrote:
> If i type in the cell A34: neil.Holden@test.com and press a button is it
> possible to email to the address of what ever is in A34 is?
> The email body should say: this has been submitted for cell B34 and...go to next cell and paste question
I am writing a macro that is supposed to take certain cells from a
"interface" page, remove them, and paste to a string of cells o
another. That is easy, but I cant figure out how to make them go t
another set of cells, if the ones I recorded are filled.
' Macro1 Macro
' Macro recorded 8/4/2004 by Lane Lacy
ActiveWindow.ScrollColumn = 239
Application.CutCopyMode = False
Sheets("productivity&qu...make column lists for select query.
I want to make column lists for some table listed in sheet1.
for example, select column_lists from table1
without vba is it possible?
I think you may want some dependent lists.
> table1 col1_1
> table1 col1_2
>...DB Emailing Questions
1) How do i format the message text of an email in Access. I used macro
builder - action = sendobject. Can you use code builder? if so, please give
me an idea of how the code will be like.
2) Also can i assign the email to have a recipient automatically or do i have
to write it down each time?
Thank you in advance.
Message posted via AccessMonster.com
On Jan 21, 11:51=A0am, "axm0035 via AccessMonster.com" <u56602@uwe>
> 1) How do i format the message text of an email in Acce...Office XP to Office 2004 Question
I am sure this question has been asked many times, but I've never had
occasion to look at Mac NGs before, so please accept my apologies.
I am a Windows XP user who is contemplating the change to a Mac. I have
Office XP Pro installed on my Windows machine, and I accept that I'll
need to get the Mac Office (Office 2004?) when I change over.
I understand that Word, Excel & Powerpoint files should migrate in a
fairly straightforward manner, but I am less sure about Outlook to
Entourage. (I'm assuming here that Entourage is the Mac 'equivalent' of
I h...Excel Crash
I use Excel and Word 2003 using Windows NT. I've kept some files on a jump
drive so I can work on them at home. I attempted to work on a Word documents
which had an Excel worksheet inserted in it. I tried double clicking on the
worksheet to edit it and Word and Excel shut down. Now when I attempt to
open Excel at home it asks for my Office XP Professional installation cd. (I
have Office XP at home with Windows XP). I'm having a hard time locating my
original discs. Does anyone have any suggestions or experience anything like
...Does anyone have a dashboard gauge (speedometer style) for Excel?
I am trying to create dashboard charts from Excel data and would love other
templates not available in Excel today - speedometer charts, multi-dimension
comparitive charts, charts that build information overlays.
I regularly create these in a manual way for executive and customer
summaries but would appreciate the ability to automatically generate these
types of charts allowing for real time viewing of "what if" scenarios.
Steve, there are tons of these things out there to review, few better than
Andy Pope has put together...Excel Edit F2 button changed for Mac???
Switched to Microsofts version of Excel for Mac. Can anyone tell me
what keystroke allows me to edit a cell? Before I switched to a Mac
it was the F2 button. Please help. Thank you.
See the answers in the m.p.mac.office.excel newsgroup.
In article <email@example.com>,
> Switched to Microsofts version of Excel for Mac. Can anyone tell me
> what keystroke allows me to edit a cell? Before I switched to a Mac
> it was the F2 button. Please help. Thank you.
...Copying conditional formating
I want every cell in row 2 to have red background if its value is different
than the corresponding cell in row 1.
I can do this to cell A2 if in the conditional formatting field I say
=A2<>A1 but when I copy the formatting (using the brush), the condition
continues to be A2<>A1 and not B2<>B1 for cell B and so forth.
How do I copy the conditional formatting adjusting the references like the
copy cells command do?
1) Select all relevant cells in row 2.
2) Choose "Conditional Formating" > by Formula > type: =A2<>A1 > dec...Pie Chart Question
Hi, I am tring to make a pie chart that needs to include 2 pieces of
information for one series.
I have two columns of information (number and value) that relate to one
person. There are 5 people all together.
How do I do this?
Technically possible, you might create a bar-pie chart or a pie-of-pie chart.
IMO, this would be a TERRIBLE idea. Pie charts should be forgotten, IMO,
because they often distort data and make it very hard to actually read the
My recommendation would be to make a clustered chart, a ...EXCEL TROUBLESHOOTING #2
I have an excel file (2000 format), that after I made a
number of changes is causing me problems when I re-open
the file. Windows task manager goes to 100% CPU
activity, and i cant do anything within the excel file.
However, if I set recalculation to manual before I open
the file, all seems fine.
Obvioulsy I have a problem. But how do i find that
Thanks in advance.
I have had some experience running large spreadsheets lately. Above a
certain size, the recalculation time seems to climb very fast. While Excel
is recalculating, you can't do anything anyway.
Best in my v...Multiple conditional formating for one cell
I have a workbook with several sheets. Sheet1 has several hundred rows of
text. Some of the same text will appear in multiple rows of Sheet1. On Sheet2
I have I have a cell that allows my users to free hand type in a keyword(s)
to search for in Sheet1. This cell is also has a reference name of
Now comes the question..... I like to for the user to type the keywork into
"Special_Char" and any or all the rows in Sheet1 that contain the keyword as
part of its text to turn yellow. Is there a way to do this? Please keep in
mind that the keywork i...Chart
Subject: Chart - Title Widths
Date: Tuesday, February 03, 2004 12:43 PM
Chart - Title Widths
Does anyone know how to find the width of a title/axis title?
...In Excel program shows a broken line and don't know how to get ri.
I am trying to put in entries in Excel program and when I go to Print
Preview, it only shows part of the entries I put in. When I go to the last
entry that it shows in Print Preview, there is a broken line between it and
the next entry. I don't know what I did. I could use some help
You probably have multiple areas selected for your print area.
you can check this by <view><page break preview>
One possibility to correct this would be
<file><print area><clear print area>
or specifically select the area you want printed and
<file ><Print area>...Excel Cells Contents to HTML Pages
I have an excel sheet which has two columns.
Column 1: PageName
Column 2: HTMLCode
PageName has information like: OurServices.htm which is the name of th
HTMLCode clumn has actual HTML Code like:
<meta http-equiv="Content-Language" content="en-us">
<meta name="GENERATOR" content="Microsoft FrontPage 5.0">
<meta name="ProgId" content="FrontPage.Editor.Document">
<meta http-equiv="Content-Type" content="text/html
charset=windows-1252"> ...Outlook 2002/XP Folder List view question
Any assistance would be greatly appreciated. I have a user still using
Outlook XP and has the following issue.
Outlook does not remember the folder view settings. User has folders under
the Inbox folders and of those folders some are expanded and some are
collapsed. When he closes Outlook it does not "remember" the folder settings.
The user would like for Outlook to remember the settings because it has in
the past. Is there a way I can get this back?
...connect a form to excel database
I have a database in excel which lists our stock and prices etc. I would like
to be able to enter a stock number on an invoice that will retrieve the
details and price from my excel database. Can this be done?
Excel has built in option--try data|form.
If that doesn't quite work, but it's close, John Walkenbach has an enhanced
And if you want to design your own, Debra Dalgleish has a get started with
> I have a database in excel which lists our stock and p...Excel to check for regular expression?
How do you use Regular expression in excel? For eg: Check a column of
data to see whether are all of them valid email addresses?
By valid, do you mean that the email is in proper syntax or that it is an
actual email address.
Text formulas can be used for proper syntax. Perhaps a Visual Basic
I doubt you can check that the email address actually exists, as many
companies and ISPs will simply disregard and drop mail to invalid email
addresses to eliminate spam
> How do you use Regular expression ...Phone # Format
Can somebody help me with applying a format to the phone field. the default
format seems to be ######### and I am looking to use (###) ###-####
Thanks in advance
I think it isn't possible at the moment.
You could use the sdk and try to use postcallouts which call a webservice
which puts the data in a special format and sends it back.
"Dennis" <firstname.lastname@example.org> schrieb im Newsbeitrag
> Can somebody help me with applying a format to the phone field. the
> format seems to be ######### and...
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178358033.38/warc/CC-MAIN-20210226234926-20210227024926-00269.warc.gz
|
CC-MAIN-2021-10
| 12,501
| 212
|
http://www.astronomerstelegram.org/?read=10697
|
code
|
Real-time detection of a Fast Radio Burst at the Molonglo Radio Telescope
ATel #10697; W. Farah (Swinburne University of Technology [SUT]), C. Flynn (SUT), A. Jameson (SUT), M. Bailes (SUT), I. Andreoni (SUT), T. Bateman (The University of Sydney [USyd]), E. D. Barr (Max-Planck-Institut fur Radioastronomie), S. Bhandari (SUT), M. Caleb (University of Manchester), D. Campbell-Wilson (USyd), A. Deller (SUT), A. J. Green (USyd), R. W. Hunstead (USyd), F. Jankowski (SUT), E. F. Keane (Square Kilometer Array Organisation), V. Venkatraman Krishnan (SUT), K. Plant (Caltech), M. O'Neill (SUT), S. Oslowski (SUT), A. Parthasarathy (SUT), V. Ravi (Caltech), D. Temby (USyd)
on 2 Sep 2017; 02:01 UT
Distributed as an Instant Email Notice Transients
Credential Certification: Wael Farah (email@example.com)
Subjects: Radio, Transient, Fast Radio Burst
On 2017-08-27-16:20:18 UTC (2017-08-27.68076389), we found a bright burst as part of the ongoing FRB search program (UTMOST), at the Molonglo telescope.
Molonglo is a 1.6 km long East-West array (see Bailes et al 2017, arxiv 1708.09619) and was operating in drift-scan mode with pointing centred on the meridian at the time of detection. Source localisation is excellent in Right Ascension (5 arcsec at 1-sigma) but poor in Declination (~1.2 deg at 1-sigma) (see Caleb et al 2017 MNRAS 468, 3746).
FRB170827 was found during a blind FRB search programme in real-time using an automated GPU-accelerated/machine learning based pipeline and the raw voltages were recorded for offline processing. Using 300 ms of voltage data, we improved localisation of the FRB by repointing the array to different directions and maximising S/N.
The optimal dispersion measure (DM) that maximizes the signal-to-noise ratio is: 176.4 pc cm^-3. The DM estimate of NE2001 model is ~37 pc cm^-3, and YMW16 model is ~27 pc cm^-3 at this position, resulting in an intergalactic excess of ~145 pc cm^-3, the lowest known of published FRBs to date. The upper limit on the DM-inferred redshift is thus ~0.15. An early estimate of the event's fluence is ~ 20 Jy ms, width ~ 395 us, with a signal-to-noise ratio > 90.
The most likely position is RA = 00:49:18.66, DEC = -65:33:02.3, J2000. The 95% confidence localisation arc is as follows:
A formula describing the localization arc is: DEC = -60.71088 -253.7786*(RA - 0.8) + 1480.220*(RA - 0.8)^2.
Where RA is in hours, Dec is in deg, and is valid in the RA range [0.84, 0.81].
Note that this localisation arc crosses through the SMC (Small Magellanic Cloud) if extended a further ~6 degrees, where we expect a beam attenuation of ~15 dB. We note that the measured DM of the FRB is similar to SMC pulsars.
For the dispersion sweep and localization plots, see:
Follow-up observations of the FRB are encouraged.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891816094.78/warc/CC-MAIN-20180225031153-20180225051153-00774.warc.gz
|
CC-MAIN-2018-09
| 2,777
| 16
|
https://hnguyen.wordpress.com/2011/03/26/tablen-private-table-social-networking-site/
|
code
|
Tablen: “private table” social networking site
I was recommended Tablen from a friend and like its concept.
Well, basically if you want to have a meaning serious conversation, say among a core group, you may want to keep your talk private just among few people.
That’s the idea. With tablen, you can create a “private table” and invite your friends to share things. Other people cannot know about the existence of your table without being invited as a table friend.
Its application would be coordinating a project among team members, or any private talk.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121355.9/warc/CC-MAIN-20170423031201-00367-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 564
| 5
|
http://ukrp.englishboard.net/t73-reporting-kane_heatley
|
code
|
Im reporting kane on a number of things. Some IG and some OOC. He was threatening to remove soldiers from the SANF without a valid reason. IRL you have to be given a specific reason for the termination of your contract and a long enough time. He is a power hungry member and doesn't respect any one at all. He also MG'ed. DM'ed. Non RPly /uninvited us from the SANF. possible Abused his admin powers to find us.
I have witness's with screen shots that will reply to the post for evidence.
Kane is being very arrogant and incredible annoying. Im not sure how he managed to get to that admin position but he definitely abuse's his powers frequently.
We are great roleplayers but kane decided we werent needed. Now please, explain the reasoning behind removing a member of the best Roleplay faction on the server? (No offense to any other faction) I find this extremely discriminative and irataing that Kane seems to get his way all the time.
Thank you for reading this post, i hope action is taken accordingly
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119225.38/warc/CC-MAIN-20170423031159-00447-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,007
| 5
|
https://www.helmholtz.ai/themenmenue/our-research/research-groups/kilbertus-group/index.html
|
code
|
Reliable machine learning
Building robust, theoretically substantiated and socially beneficial machine learning systems
Our Helmholtz AI young investigator group broadly investigates machine learning systems that interact with humans, for example by making consequential decisions, affecting our behavior, or challenging our privacy. We focus on reliable, fair, and privacy preserving algorithms for these settings. As a key tool for trustworthy machine learning, we also aim at making causal inference techniques more applicable to systems involving humans.
- Reliable ML
Data protection note
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703548716.53/warc/CC-MAIN-20210124111006-20210124141006-00642.warc.gz
|
CC-MAIN-2021-04
| 593
| 5
|
https://husd.freshdesk.com/support/solutions/articles/1000283719-how-to-re-align-your-smart-panel
|
code
|
1.) Click the Window Start Icon in the bottom left corner.
2.) Type to search for "Smart Settings"
4.) Continue the prompted steps, if the Alignment crosshairs display on the wrong monitor (not your SMART Panel), simply press the SPACE BAR to select another monitor.
As soon as you complete with the crosshair alignment, then congratulations; you're finished.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153515.0/warc/CC-MAIN-20210727233849-20210728023849-00151.warc.gz
|
CC-MAIN-2021-31
| 359
| 4
|
http://www.bioinf.man.ac.uk/resources/phase/manual/node61.html
|
code
|
Next: Nucleotide substitution models
Up: Phylogenetic trees
Previous: String representation of a
The branch lengths usually represent the evolutionary distances
between two consecutive nodes. We tend to split the phylogenetic
tree into two parts: its topology (i.e.,
pattern of branching) and its associated edge lengths.
The expected rate of evolutionary change is assumed constant across all
lineages in a phylogeny and the length of a branch is scaled to the expected
number of substitutions per site along that branch.
These lengths can be integrated in the string representation seen in
section 2.1.2; for instance we can
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506329.15/warc/CC-MAIN-20230922034112-20230922064112-00383.warc.gz
|
CC-MAIN-2023-40
| 626
| 12
|
http://www.excelrush.com/tag/iferror/
|
code
|
If the result of any formula is an error, you can replace it with text, numbers, or even another formula, using IFERROR function in Excel.
Basically, you need to tell Excel – If this formula results in an error, do this!
IFERROR works with any function, like Vlookup, IF, etc. and also with any kind of error.
Click here to know the kind of errors in Excel.
To use IFERROR, just put this function before the Vlookup or IF or any other function.
At the end of the Vlookup, put a comma , and then add whatever you need as explained in the examples below.
=IFERROR ( Vloopkup (____________), xxxxxx)
xxxxxx is what you want to be shown/done when the Vlookup results in an error.
Taking an example of a Vloopkup formula.
There are 10 employees in a company. Based on a lucky draw, 3 of the employees A01, A05 and A07 get extra incentives of $1000, $500 and $350 respectively.
=Vlookup formula is used to find against each employee code, what’s the incentive based on the data on the right-side as shown below.
Remaining 7 employees do not get any incentive, thus a #N/A error appears as the result of the formula.
You do not want #N/A to appear, instead,
(Add =IFERROR function before the Vlookup function as below in each case).
- You want the text “No incentive”.
- You want the amount of $50 to be given to all others.
- You want to give each of them 0.1% of their annual salary as incentive.
Only A01, A05 and A07 have got the lucky draw incentives, else everyone has got based on the formula of IERROR’s result.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056900.32/warc/CC-MAIN-20210919190128-20210919220128-00046.warc.gz
|
CC-MAIN-2021-39
| 1,522
| 18
|
https://forum.mikrotik.com/viewtopic.php?f=3&t=121732
|
code
|
I have a issue with my CRS109-8G
Ether1 seems to have an issue negotiating and staying that way.
I have it set to Auto Negotiation and it connects and links at 1gbps, but every hour or so it loses its link and re-negotiates, as I run pppoe over a vlan attached to ether1 I get disconnection after disconnection. If I disable auto negotiation and fix to 1gbps it will never get a link even though it negotiates at 1gbps on Auto Negotiate.
Up until recently had a VDSL connection I was running full bridge, on the VDSL modem I had the exact same issue however as VDSL was only 50mb/s down the workaround was to disable auto negotation and advertise at 100mb/s and the connection was solid. But as ive just moved to Fibre which speed is more than 100mbps its just not suitable.
Any ideas why the Router wil Auto Negotiate at 1gbps but wont when auto negotiation is disabled?
FYI ive tried multiple cat6 cables, its less than 1M distance from the fibre ONT, I have no access to the ONT but it had the same issue with the Draytek VDSL mode, im pretty convinced its my router at blame.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986693979.65/warc/CC-MAIN-20191019114429-20191019141929-00009.warc.gz
|
CC-MAIN-2019-43
| 1,079
| 6
|
http://jaredooonl.widblog.com/3090749/the-single-best-strategy-to-use-for-furniture
|
code
|
Will you be a style and design junkie? Sign-up now on your weekly dose of design and style. Further information and facts from Indesign Media’s other design titles and functions
Showcasing lively colours and a particular shape, the Sunpeanut Outdoor Ottoman is an excellent addition to your alfresco or patio area.
You can certainly modify this code so that the query runs asynchronously as follows: non-public static async Process ManyEntitiesQueryAsync(CloudTable employeeTable, string Section)
You can utilize Shared Obtain Signature (SAS) tokens to permit customer applications to change (and question) table entities directly with no must authenticate straight With all the table provider. Normally, there are actually three main Rewards to employing SAS in your application: You don't have to distribute your storage account key to an insecure System (such as a cell unit) in an effort to allow for that product to accessibility and modify entities in the Table services. You can offload some of the get the job done that Net and worker roles conduct in taking care of your entities to shopper gadgets which include stop-user desktops and cellular devices. You may assign a constrained and time constrained list of permissions to the client (such as making it possible for examine-only entry to precise sources). For more information about making use of SAS tokens Along with the Table company, see Employing Shared Access Signatures (SAS). Nevertheless, you must even now create the SAS tokens that grant a consumer software on the entities inside the table services: it is best to try this within an setting that has secure use of your storage account keys.
table shop Which means that a single table can keep entities of many kinds supplying excellent adaptability as part of your style and design. The following instance illustrates a table storing the two staff and Office entities:
Lots of programs delete outdated facts which not ought to be accessible to a consumer software, or that the applying has archived to another storage medium.
It could be highly-priced to maintain regularity if you must update Section data (This may need you to update all the staff in the Section).
This calculator comes with memory performance in addition constant, sq. root and percent capabilities. It has an 8 digit LCD display. The calculator utilises twin electric power from photo voltaic and battery so you'll always be ready to go.
With this particular structure, you can certainly Find and update the entity to update for every personnel Every time the application needs to update the message depend worth. Having said that, to retrieve the information to plot a chart of your action for your preceding 24 hrs, you have to retrieve 24 entities. Alternative
Consider the next points when selecting the best way to carry out this sample: This Remedy demands at least two queries to retrieve matching entities: one to query the index entities to obtain table the listing of RowKey values, after which you can queries to retrieve Each individual entity while in the checklist. Given that a person entity contains a greatest measurement of one MB, alternative #2 and alternative #3 in the solution think which the list of staff ids for any specified very last name isn't larger than 1 MB. If the listing of employee ids is likely to become bigger than one MB in size, use possibility #1 and keep the index information in blob storage. If you employ alternative #2 (using EGTs to manage adding and deleting staff, and changing an worker's final identify) you should Assess if the quantity of transactions will technique the scalability restrictions within a given partition.
Marketplace products (products and solutions not bought by Walmart.com), and goods with freight costs usually are not eligible for Shipping and delivery
To design and style scalable and performant tables you will need to take into consideration several factors including general performance, scalability, and cost. For those who have Earlier made schemas for relational databases, these things to consider will probably be acquainted to you personally, but even though there are numerous similarities between the Azure Table service dig this storage model and relational types, Additionally, there are lots of significant discrepancies. These variances usually result in really different designs that will glance counter-intuitive or Mistaken to a person accustomed to relational databases, but which do make very good sense If you're creating for a NoSQL key/worth retail outlet including the Azure Table support.
Take into consideration the next points when determining tips on how to carry look at here now out this pattern: There may be some Charge overhead linked to storing some facts twice. The efficiency advantage (resulting from fewer requests towards the storage support) normally outweighs the marginal increase in storage costs (which Expense is partially offset by a discount in the volume of transactions you need to fetch the details of the Section).
The fluffy owl cushion; perfect for bedtime looking at or right here even a comfortable spot to rest your head after a prolonged day FLUFFY OWL CUSHIONHoot hoot, the midnight chicken is Commonly building a Excitement. This cute and dainty Close friend has a grand time sitting within the bed as being a faithful roommate and delightful, cuddly cushion. One of the a knockout post most caring small owl in the home tends to make a splendid inclusion into a sitting place or your library studying corner.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746639.67/warc/CC-MAIN-20181120191321-20181120213321-00087.warc.gz
|
CC-MAIN-2018-47
| 5,543
| 14
|
http://www.visualwebgui.com/Developers/Forums/tabid/364/forumid/25/threadid/38363/scope/posts/Default.aspx
|
code
|
As part of the help the community day and as a response to a request Palli has raise on behalf of the community, I want to share with you guys another enhancement to make life easier and more productive. As you might know VWG has a direct mapping between the browser URL and an application instance which means that opening the same "http://domain/mainform.wgx" twice in the same browser will cause both tabs to point to the same server instance.
What Palli suggested and and even implemented a code snippet is to force a vwginstance parameter which redirects to a "http://domain/mainform.wgx?vwginstance=XXX" url which will force a different context.
So we have taken Palli's suggestion and implemented it with in the VWG server to automatically redirect to a specific instance. The feature is controlled by a configuration that should be added to the WebGUI config section as following:
<ForcePageInstance Mode="On" />
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701156627.12/warc/CC-MAIN-20160205193916-00026-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 920
| 4
|
http://www.linuxquestions.org/questions/linux-wireless-networking-41/ftp-between-my-android-and-my-desktop-4175454345-print/
|
code
|
Ftp between my android and my desktop?
I don't have great connection on desktop but I bought a wireless adapter and I just want to be able to transfer files between my desktop and Epic Touch but I can't get ssh or ftp to work. Not sure exactly about the easiest way to go about this....help:D
I'm rooted for 4 or 5 years with my Android, so I hope this works
1. Get an android terminal app, and connect to your local wifi point
2. Start sshd on the pc and run ifconfig to see the wifi IP
3. on the android, run ssh <user>@<IP> e.g. if your user is john and pc is on 10.0.0.5, ssh email@example.com
4. It asks questions and answer them agreeably
If that works and you get in, exit and repeat with sftp firstname.lastname@example.org
NOW you can transfer files with ftp conmmands - get, put, etc.
|All times are GMT -5. The time now is 12:59 AM.|
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00601-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 844
| 10
|
https://gpdb.docs.pivotal.io/4340/guc_config-lc_messages.html
|
code
|
A newer version of this documentation is available. Click here to view the most up-to-date release of the Greenplum 4.x documentation.
Sets the language in which messages are displayed. The locales available depends on what was installed with your operating system - use locale -a to list available locales. The default value is inherited from the execution environment of the server. On some systems, this locale category does not exist. Setting this variable will still work, but there will be no effect. Also, there is a chance that no translated messages for the desired language exist. In that case you will continue to see the English messages.
|Value Range||Default||Set Classifications|
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526536.46/warc/CC-MAIN-20190720153215-20190720175215-00302.warc.gz
|
CC-MAIN-2019-30
| 694
| 3
|
http://slideplayer.com/slide/4186396/
|
code
|
24 Sprague Dawley rats from ACS will be placed on restricted diet to bring them to ~ 85% of projected weight.
The rats will be habituated to the cages and test boxes used in the experiment. They will be introduced to the Nestle Nesquik cereal which is used as reinforcer
Week 1-Habituation The rats will be placed in a cage identical to their home cage for 10 min with Nesquik cereal. The rats will then be transferred to a test box for 10 minutes with Nesquik cereal. Record the time spent eating & the amount eaten in each 2 minute interval. Be very careful not to frighten rats & note if the rats spend any time immobilized with fear.
Week 2 Learning The rats will each receive 5 training trials of the odor learning. On the first trial the reward will be visible. The reward will be placed on the almond-scented sponge as well as in the centre hole. On the remaining 4 trials the reward is placed in the hole of the almond scented sponge. The other sponges are scented with orange or vanilla.
Apparatus Glass dishes and sponge (with Nesquik morsel).
Apparatus Test box showing rat in start position (top view).
Apparatus Test box showing rat in start position (front view).
Week 2 Learning (continued) Between trials the glass dishes will be switched with those from another group. The position of the 3 dishes will be varied in a systematic (quasirandom) way. The rat start position will not vary.
Week 2 Learning (continued) Record the time for the rat to obtain the reward in seconds. Record the number of commission (poking at hole of wrong sponge) & omission errors (not retrieving reward from correct sponge.) Allow the rat to eat the reward. Maximum trial duration is 5 minutes. Remove the rat from the test box.
Week 2 Learning (continued) On the basis of performance during acquisition, the rats will be divided into 3 groups of rats. 1. 8 rats will receive 4 mg/kg IP propranolol without memory reactivation (propranolol alone). 2. 8 rats will receive 4 mg/kg IP propranolol with memory reactivation (odor + propranolol). 3. 8 rats will receive IP physiological saline with memory reactivation (odor + vehicle).
Week 2 Reconsolidation The day after acquisition, rats in the two groups undergoing memory reactivation will be brought up to the lab. Each rat will be placed in a cage with a glass dish & sponge scented with almond for 90 seconds. There is no Nesquik reward. The rat will then be brought to a room adjacent to the lab & injected with either propranolol or saline. The rat is then returned to his home cage and transported back to the holding room.
Week 2 Reconsolidation (continued) Rats in the propranolol alone group will be injected with propranolol in the animal holding room and placed back into their home cages. Rats in this group will not be brought up to the classroom and will not be exposed to the almond odor.
Week 3 --- Trial 1--- Memory Test The rats will be placed in the test box with 3 glass dishes & scented sponges. There will be no reward. Record the latency to visit first dish. Record the latency to visit correct (almond) dish. Record errors of commission and omission.
Week 3 --- trials 2-5---Retraining These trials will be conducted exactly as done in week 2.
Week 3---Trial 6 Memory Test This is a 5 minute trial without a reward. Record: 1. Time spent investigating almond scented dish. 2. Time spent investigating other dishes (combined). 3. Number of nose pokes - almond scented sponge. 4. Number of nose pokes - other sponges (combined).
Your consent to our cookies if you continue to use this website.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267860089.11/warc/CC-MAIN-20180618051104-20180618070922-00019.warc.gz
|
CC-MAIN-2018-26
| 3,560
| 16
|
http://www.funnyordie.com/videos/6c0aeec989/the-real-house-witches-of-salem-county-with-nick-viall
|
code
|
The Real House Witches of Salem County gather to bring a recently... more »
The Real House Witches of Salem County gather to bring a recently burned-at-the-stake member back from hell. Drama brews.
Written and Directed by Nora Jobling and Georgie Guinane.
Edited by Ian McNeny.
Music by Joe Moralez.
Starring: Nora Jobling, Georgie Guinane, Stevie Nelson, Natalie Palamides, Rebecca Hirsch, Kelly Huddleston, Kyle McCullough, Kyle Helf and special guest Nick Viall. « less
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886117874.26/warc/CC-MAIN-20170823055231-20170823075231-00129.warc.gz
|
CC-MAIN-2017-34
| 474
| 6
|
http://www.droidforums.net/threads/play-store-not-working.224546/
|
code
|
Hello. yesterday I download google play market, I then installed and when I was ready to download my first app the play store app crashed, then i tried opening the app again and it kept crashing, so I cleaned the app cache and it worked again, but then I tried to download another app and it happened again. What's going on? Why it doesn't work? I have a coby kyros mid7125 , just installing the app was almost a miracle and now it doesn't work.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657867.24/warc/CC-MAIN-20190116195543-20190116221543-00080.warc.gz
|
CC-MAIN-2019-04
| 445
| 1
|
http://opentripplanner.com/2012/10/opentripplanner-0-9-released/
|
code
|
We are pleased to announce the latest major release of OTP: 0.9. (Technically, as of this posting the current release is 0.9.1, with the first bug-fix followup release having already been cut.) Note that 0.8 was skipped; the numbering reflects the team’s desire, as discussed in the 9/27 check-in, for this release to be the final major release prior to a long-awaited 1.0 release of OTP.
Major enhancements in 0.9 include the following:
- RAPTOR Implementation: David Turner has completed implementation of RAPTOR, a different algorithm for transit routing that yields significantly improved search times in larger graphs compared to the A* algorithm traditionally used by OTP. This paper from Microsoft Research describes the theoretical underpinnings of RAPTOR, and instructions for enabling RAPTOR in OTP can be found on the wiki.
- Graph Loading API: OTP’s multiple graph support is seeing more active use (within the context of the OTP Deployer application, among other places), heightening the need for a more robust mechanism for dynamic graph management. The new RESTful API, written by Andrew Byrd, accomplishes this, using the existing ‘/routers’ API method and standard HTTP commands such as GET, PUT, and DELETE. Included is the new ability to “evict” a graph from an OTP server, freeing up its memory footprint for other graphs.
- Real-Time Vehicle Updates: 0.9 includes initial support for trip planning based on real-time vehicle locations. This work was completed to support an initial test case in the Netherlands using the Dutch KV8 standard, but it lays much of the groundwork for more generalized real-time support, including consumption of GTFS-RT vehicle locations (OTP already supports the trip alerts component of GTFS-RT). Look for more on this in future versions.
- Smaller Graph Sizes, accomplished through more efficient handling of debugging annotations. This has reduced graph size by as much as 50 percent in initial testing.
Additional 0.9.x bug fix releases are likely in the coming weeks, but the next major release will be 1.0, hopefully before the end of the year. The 1.0 release is expected to include expanded support for real-time planning and the new mobile-optimized user interface developed for bikeplanner.org, among other additions and enhancements. Stay tuned!
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703108201/warc/CC-MAIN-20130516111828-00073-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 2,319
| 7
|
https://forum.xda-developers.com/member.php?s=9369cd9916a0cdeb87157027cc7c8d0b&u=3487382
|
code
|
Modem Thread (modem guide) (thanks @geko95gek)
Modem+RIL CWM Installers (thanks @hawerpaul)
I did a lot of tests with different modem versions in order to see battery usage impact with my current configuration (Touch X v2 + ninph...
Here is my results in terms of battery usage
(Fast Dormancy always enable, by the way my provider doesn't manage this mod)
Wake mode, GSM only (neither data, nor wifi, screen-off)...
After Ikki The Phoenix, the adventure is continuing on ICS thanks to XDA and Elite recognized developpers as Gokhanmoral, Entropy512 and others devs (myfluxi, simone201, and many others...).
NewToolchain 2013.04 (gcc 4.7.3) with -Ofast compiler...
CWM Script to reset profiles (battery, default et performance) : HERE
1/ Changing profiles not working into CWM (additional kernel actions) because I never had time to compile my own CWM and change Siyah's code to point to /data/.shun
I am also very busy those days but I would like to share my stuff on S3 after my other threads on S2 (Ikki/Shun and modem analysis).
I would like to say that XDA dev and mainly Gokhanmoral provided me enough information to be able to study in d...
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107919459.92/warc/CC-MAIN-20201031151830-20201031181830-00609.warc.gz
|
CC-MAIN-2020-45
| 1,146
| 12
|
https://support.mozilla.org/ta/questions/1440784
|
code
|
If I leave a Tab to look up something, and return to the tab, Firefox reloads the entire page
I have used Firefox for 10 or 20 years and have not encountered this before.
New computer running Windows 11 Home. New Firefox install. If I am writing a message in any forum or social media site, and I need to look-up some info or the name of a place or product and I use another tab to do that, when I return to the original tab, Firefox reloads the entire page again instead of just returning me to the post that was being written without reloading the entire page. It can be a severe waste of time trying to find the post I was in the middle of once the entire tab reloads when the site is a busy place with lots of new and updated posts.
I've been through Firefox settings but did not see anything that seemed to be related to this issue, but perhaps the wording/description of the needed setting wasn't clear.
All Replies (5)
You can open the link in a new tab (use a middle-click or hold Ctrl and left-click) instead of opening the link the current tab, then you can close this tab to return to the page where you clicked the link.
I am ALWAYS using a "new" tab to look for the information I need to finish the post started in the previous tab. I have never had Firefox reload the entire tab prior to this installation on Win11. For example: in Facebook and composing a new post... need some info from Google... open a new tab, find the info, click the original Facebook tab and the whole Facebook page reloads instead of simply showing me the message I was working-on.
There might be a script running on the Facebook page that refreshes the page at regular intervals. It is also possible that Firefox unloads a tab because of memory constraints.
Firefox will detect if your computer's memory is running low, which is defined as lower than 400MB, and suspend unused tabs that you haven't used or looked at in a while.
I don't think that's possible with this config. 16 GB of RAM in this computer. And I do NOTHING that needs nearly that much RAM. If Windows 11 and Facebook need more than 4 GB of RAM something is VERY wrong. The previous computer I was using had just 8 GB of RAM and it NEVER reloaded the tab when I returned from "research" -- it was Win10 though. And this isn't Facebook-only. It affects other sites I use as well... car forums, home theater forums, etc.
Start Firefox in Troubleshoot Mode to check if one of the extensions ("3-bar" menu button or Tools -> Add-ons -> Extensions) or if hardware acceleration or if userChrome.css/userContent.css is causing the problem.
- switch to the Default System theme: "3-bar" menu button or Tools -> Add-ons -> Themes
- do NOT click the "Refresh Firefox" button on the Troubleshoot Mode start window
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817688.24/warc/CC-MAIN-20240420214757-20240421004757-00528.warc.gz
|
CC-MAIN-2024-18
| 2,759
| 13
|
https://iamjoost.com/2020/02/19/iscsi-creating-a-target-and-initiator/
|
code
|
The first thing you will need if you want to have some hands-on with the protocol is to have some storage which supports iSCSI protocol. If you have a server with VMs running on it, you can easily have some basic Ubuntu images and create your own iSCSI Target. At the end of this blog you can find the iSCSI Terminology
iSCSI Linux Target and Initiator Config
For my own convieniance, I post not only the screenshots with results, but also the commands, so it is easier to copy-paste. (Yes, I am lazy).
I used two Ubuntu images and installed the following packages on it :
On the Target Image :
On the Initiator Image :
On the target I created already a Logical Volume. You don’t have to do it, but I was curious about the configuration.
Create a Physical Volume Create a Volume Group. Create a Logical Volume
With the command :
you are seeing all blockdevices of the OS.
Let’s start :
so that we can configure a Target on this image.
Within Targetcli we can do also some commands. With the TargetCLI command :
we are seeing that nothing is configured yet.
If you have a config, you can clear it with :
There are several options to create a backstore. First we are creating a block storage object.
With <tab> you don’t have to fill in the commands completely.
If you do ls you can verify the command everytime.
Now we have a block storage object. Create a target with a iqn name. IQN stands for iSCSI Qualified Name.
Before we going to configure the rest, I will have a closer look at the IQN. The IQN always start with iqn followed with a dot (.) and the year and month of when a company had the domain name. In this case you can have unique IQNs.
After the year, you see the domain name, but in reversed order followed by : and a name, serial number or whatever.
2020-02 is feb 2020.
com.localnet is the domain localnet.com
and blocklvm1 is in this case the name of the storage. Could be anything what you think is easy.
No we have a iqn name, we have to attach a lun.
Every initiator also has a unique iqn. It can have default values or you can change it. In this case I will just fill in some names and later I will change the initiator names.
To have a overview what we configured you can do :
Here are some examples of creating backstores with RAM, File or Partition.
If the file already exists it will use that size. If it isn’t there yet, it will create a file with the size you configured.
Here you see all the backstores configured.
If you don’t configure the portal, it will default listen on all interfaces at port 3260.
You can change this, to first delete the default portal and then create a new one
The config has changed a bit and now this is the result :
On the Initiator I can do a discovery of the Target :
It is possible to have authentication on the discovery. Let’s enable it.
with get discovery_auth you can see all the parameters.
At the /iscsi level you can setup discovery authentication by :
You can see that 1-way discovery authentication is enabled.
If you want to do a discovery at the Initiator, you will see a login failure:
At the Initiator you must change the file :
Restart the iscsi service at the Initiator
And now you can discover the Target on the Initiator.
Let’s put authentication on the Target :
At the IQN level you see there is nothing configured yet :
Because I just created an Initiator name at the Target, the Initiator name must be changed at the Initiator :
Change the iscsi config file again and restart the service.
We can login at the Target via :
iSCSI Windows Initiator
When connecting a Windows Initiator to a Linux Target, you must remember a few things :
For my Windows Machine I created a new IQN.
Open the iSCSI Initiator app on your windows machine. If the service isn’t running, you can get a warning and an opportunity to start the service.
And I configured the Target to use Mutual CHAP Secret. It is not necessary, but I thought : Well, let’s give it a try.
Open the Discovery and click on Discover Portal.
Here you fill in the ip address of the Target and click on Advanced.
Here you can fill in the CHAP credentials for the discover process.
You will discover some backstores of the Target.
Click on the right one which we configured. (IQN of the windows machine.)
Fill in the CHAP credentials.
And now the Windows Machine and the Target are connected.
If you go to Disk Management of the windows machine, you will see new disks (In this case the first one is the 50M. The seconds was the 8Gb)
Final TargetCLI configuration
Here are some screenshot of my final TargetCLI configuration.
With the get and set command you can see of set parameters.
Enable the IQN authentication at TPG level.
Set the Auth at the IQN level.
Logical Unit Number represents a single addressable iSCSI disk
Server that emulates a backstore to presents it as a LUN to initiators
Target LUN is logical unit itself exported by the target server
Access control list
iSCSI Qualified Name is a unique name to identify the iSCSI target server
Optional string up to 255 char describing the target
Authentication is handled by challenge-handshake protocol CHAP
CHAP initiator authentication
Mutual CHAP authentication
Demo Mode (Authentication is disabled. Default)
Storage resource that backs the LUN
This resource may be :
Entire physical device
LVM Logical volume
A client that accesses the LUNs on a target iSCSI server
iSCSI Storage Name Service used by an initiator to discover shared LUNs
Single discoverable object on a iSCSI SAN
Combination of an IP address and port
Default iSCSI listen on port 3260
More storage related links :
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474617.27/warc/CC-MAIN-20240225135334-20240225165334-00535.warc.gz
|
CC-MAIN-2024-10
| 5,592
| 85
|
https://discuss.pixls.us/t/developing-a-foss-solution-for-inverting-negatives/5454/57
|
code
|
I find the source of that formula tricky to follow, but not because of the maths - certain ‘leaps’ seem to be made without explanation. Still reading it on occasion…
If the optimal settings result in values being clipped and you’re looking for a way to compress rather than ‘lose’ them, it suggests the curve/formula itself has an issue for your input.
Edit: some explanation of it may help
The formula written in another way is just (K/J^p)^c where J represents the set of all pixels (but this equally applies to any one pixel individually). Rewritten it can be K^c * J^(-pc) and given that K is some constant of your choosing and we can normalize to any range, it may as well just be J^(-pc).
In other words, this is equivalent to reciprocal then gamma, or simply a negative gamma exponent : J^-g
A demonstration of this using gmic… let’s start with a cat image, negate in the ‘digital’ sense then normalise to your input range:
gmic -sp cat -negate -n 0.1,0.5
At that point it’s negated. Now try a negative exponent and normalise at the end:
gmic -sp cat -negate -n 0.1,05 -^ -0.2 -n 0,255
That’s really all that’s happening with the formula.
Just to be clear, it’s basically saying negate with 1/x instead of 1-x. Then you can apply a usual gamma/tone curve in whatever editor you like so long as it has sufficient gamma range. That of course ignores any colourspace or normalisation…
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256147.15/warc/CC-MAIN-20190520202108-20190520224108-00367.warc.gz
|
CC-MAIN-2019-22
| 1,418
| 11
|
https://www.joyus.com/accessories/catalog/1-56667/49-square-miles-gigi-mini-lizard-crossbody-in-nut
|
code
|
49 Square Miles
Gigi Mini Lizard Crossbody in Nut
This pale, warm brown is a gorgeous neutral. It'll look fantastic paired with all your denim, from white boyfriend jeans to black skinnies and indigo blue cutoffs.
This simple cross body bag is pretty and practical. The small, lightweight size makes it perfect for days when you don't need more than your cell phone, credit cards, and keys (and maybe a bold lipstick). But even though it's petite, it makes an impression: the luxe embossed leather makes up for its subtlety in glamour, and the cinched front detail adds three-dimensionality that makes it modern and unexpected.
- Zip closure
- Patch pocket in back
100% Italian Leather
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690016.68/warc/CC-MAIN-20170924115333-20170924135333-00136.warc.gz
|
CC-MAIN-2017-39
| 685
| 7
|
https://www.razorspoint.com/2018/08/07/review-summarized-test-results-vsts-sprint-138-update/
|
code
|
A new VSTS sprint was just released. The sprint contains the following new features:
In the Sprint 138 Update of Visual Studio Team Services (VSTS), the results pages for Release pipelines has been enhanced with a summarized view of test results that organizes related outcomes into a hierarchy. Also in Build and release, we’ve added a way to view the details of the installed software on Microsoft-hosted agent pools.
In Work you can now view your team’s work on the Work Items hub. Check out the Features list for more.
Go to the sprint.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816832.57/warc/CC-MAIN-20240413180040-20240413210040-00135.warc.gz
|
CC-MAIN-2024-18
| 544
| 4
|
https://toc.hyperledger.org/meeting-minutes/2023/2023-11-09-TOC-meeting-record.html
|
code
|
Hyperledger is committed to creating a safe and welcoming community for all. For more information please visit our Code of Conduct: Hyperledger Code of Conduct
- The Hyperledger /dev/weekly developer newsletter goes out each Friday to hundreds of Hyperledger developers. It is a collaborative effort. If you have a project release, pull request, community event, and/or relevant article you would like highlighted next week, please leave a comment for consideration on the upcoming newsletter wiki page.
- Thursday, November 16, join Hyperledger, Accenture & R3 for the workshop: Atomic Cross-Ledger Transactions Between Hyperledger Besu and Corda Ledgers Using Hyperledger Cacti v2. For details and to register click here
- REMINDER: If you are eligible to vote in the 2023-2024 TOC election, please cast your vote prior to November 14, 2023 @ 23:59 US/Pacific time.
- 2023 Q4 Hyperledger AnonCreds
- 2023 Q4 Hyperledger Aries
- 2023 Q4 Hyperledger Indy
- 2023 Q4 Hyperledger Iroha
- Please review any outstanding quarterly reports.
- 2023 Q4 Hyperledger Bevel (due November 16, 2023)
- 2023 TOC Project Update Calendar
- Arnaud J Le Hors
- Arun S M
- Bobbi Muscara
- David Enyeart
Jim Zhang Marcus Brandenburger
- Peter Somogyvari
- Ramakrishna V
- Stephen Curran
- Tracy Kuhrt
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102697.89/warc/CC-MAIN-20231210221943-20231211011943-00392.warc.gz
|
CC-MAIN-2023-50
| 1,279
| 20
|
http://amalicalo.xyz/archives/818
|
code
|
novel Cultivation Online online – Chapter 432 Supreme Heaven’S Legacy cloth electric recommend-p2
almost a man grown
Novel–Cultivation Online–Cultivation Online
Chapter 432 Supreme Heaven’S Legacy development redundant
The gone man’s system declined in the surface and immediately mixed together with the surroundings which had been littered with countless corpses.
Yuan then questioned, “How about its restrictions? I have got a few treasures with me that might help me arrive at Character Ruler or over generally if i taken them, nevertheless i was informed that my entire body would not be able to take care of it, as I’d be getting excessive psychic strength at one time.”
“Temper my body… Ok, I am going to bear that in mind.”
Forced Marriage VIP Front-Seat: My Superstar Ex-wife Is Very Popular
“What happened to him?”
“You don’t already have it for you? Though I informed you to help keep it in your area? What if you lose it? That point isn’t low-cost, you are aware of. Actually, it’s truly worth much more than all things in the Lower Heavens mixed.” Xu Jiaqi quickly started off lecturing him.
“I mean, it will still operate, but it surely won’t be as helpful. Simply because you haven’t unlocked the complete potential on the Paradise Polishing Body. Whenever you advance it, it is possible to consume treasures above Soul Ruler.”
Even Older person Bai shook his head by using a complex concept on his experience.
“You presented it to a person?! How would you be so relying? I highly hesitation this ‘friend’ of yours won’t take advantage of your kindness and gain access to it from yourself.”
“You don’t get it to you? Even if I told you to prevent it in your area? Can you imagine if you reduce it? That matter isn’t cheap, you recognize. In reality, it’s really worth greater than all things in the low Heavens coupled.” Xu Jiaqi quickly started out lecturing him.
Suddenly, a excessive roar that brought on the site to tremble resounded regarding him, causing Yuan to transform about.
Xu Jiaqi pondered well before speaking, “The creator usually uses up monster cores and demon cores, although i have experienced him use up mindset gemstones from time to time. Obviously, cultivators don’t normally take in character stones.”
down south cutz
“I do… however don’t already have it on me. Are you looking for it rear?” Yuan thought to her.
“Elder Bai!” Xu Jiaqi unexpectedly shouted his brand.
“There exists a reduce.” Xu Jiaqi said, and she ongoing, “The Heaven Refining Figure merely lets you consume stuff like monster cores and demon cores, however if you consume an excessive amount of psychic energy immediately, your whole body will explode as with any other cultivator. It’s exactly that your ‘limit’ is greater than other people, so don’t overestimate yourself and ingest only whatever you can deal with.”
Though Older Bai examined his issue, Yuan himself was completely unaware that they was unconscious.
At some point later on, Xu Jiaqi expected him, “By the way, do you still have my Medieval Soul Jade?”
Right after disclosing the founding father of their faction also got the Paradise Improving Figure. Xu Jiaqi carried on to speak, “Since you can already reckon at this point, both these people that once had the Heaven Improving Body acquired attained good stuff in their lives, well, i am wanting you’d function as the identical.”
Even Senior Bai shook his brain that has a complex term on his deal with.
“Temper my body… Ok, I will keep that in mind.”
Yuan checked around, as well as his surprise, even impact, there have been bloodied corpses in just about every route that accumulated like mountain range.
Instantly, a boisterous roar that brought about the site to tremble resounded behind him, causing Yuan to turn all around.
“You will find a limitation.” Xu Jiaqi mentioned, and she persisted, “The Paradise Polishing Entire body merely lets you eat things like beast cores and demon cores, however if you take in a lot of religious vitality at the same time, your body will explode as with any other cultivator. It’s simply that your ‘limit’ is higher than other individuals, so don’t overestimate yourself and consume only what you might experience.”
from the darkness cometh the light or struggles for freedom
“She won’t accomplish this. Now we have been together considering that the starting point, so i rely on her thoroughly.”
“Mindset gemstones, huh…”
“Eh? Why?” Yuan was baffled by her warning.
“Heart Emperor? Just how do there often be a Character California king in the Lower Heavens?” Xu Jiaqi frowned.
“In addition, when you get to Soul California king, your Paradise Refining Shape will not any longer work.”
The Humors of Falconbridge
“Her title is Xiao Hua, however don’t truly understand her background…”
Within this new place, the skies was black and somewhat red with green lightning dazzling the floor every secondly.
During this new spot, the heavens was dimly lit and somewhat red with red lightning striking the floor every secondly.
The truth is, right after experiencing and enjoying the immediate suffering, Yuan uncovered himself in a different position, almost like he were teleported to someplace.
“Can there be any other thing I will ingest besides beast cores and demon cores?” Yuan then expected.
It absolutely was a horrific sight that would terrify perhaps the most cool-hearted cultivators on the planet. Nevertheless, for some reason, Yuan didn’t actually feel anything when he noticed this b.l.o.o.d.y landscape.
“Eh? Why?” Yuan was puzzled by her alert.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949387.98/warc/CC-MAIN-20230330194843-20230330224843-00579.warc.gz
|
CC-MAIN-2023-14
| 5,723
| 42
|
https://form.less.dk/?p=175
|
code
|
went to see avatar in 3D. tried to see it with open childlike mind.
liked it. not bad for an attempt that is 8 dimensions short of real reality. or more.
sweet anthropocentric gaia-isms.
showdown needs to be man-against-man rather than a forest swallowing a fighter fleet. film afraid of itself?
a film about sky people made by … sky people.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816893.9/warc/CC-MAIN-20240414192536-20240414222536-00164.warc.gz
|
CC-MAIN-2024-18
| 343
| 5
|
https://www.dotworldmaker.com/Help/simple_map_editing.html
|
code
|
Simple map editingWarning: If you plan to change the tiles it is strongly suggested that you do it before editing any map. Adding new tiles or just generally working on your own tile sheet is not an issue, however as the engine works with tiles ID (numbers), changing completely a tile sheet may end ups with odd results.
If you plan to change the tiles art, please check out the tiles editor
Map editing is one of the main work you will have to do to create your own virtual world. Why is it one of the main work? Well because all the player interaction do happen on the map, and therefore having well designed map is a must. Don't worry, we do have tools to help you work on maps, and we shall start slowly with the map editor.
Inside Dot Work Maker maps work in layers. The bottom layer is the tiles, you have then actors and objects and finally messages
The map editor allows to edit all those different layers beside the messages as they will be added during the play time.
The map editor is available once you are logged on one game you can edit, for example a game you created yourself. In this case the administration menu bar should be present on top of the window. Select the "Editors" menu, and then "Maps".
Map Zone: The world is split in different "zones" (check out the zone help page for more info) which can then be selected by choosing it in the zone drop down.
Commands: Beside the "Save" button which simply saves the maps you worked on, you can select one of the different action command being "Background tile" or others. By selecting one the map editor will then react differently when you click on the map.
Grid: The grid check-box allows to show or hide the map grid, which concerns mainly the background tiles but can help you align the objects as well.
Coordinates: The coordinate box shows the current coordinate where your mouse is on the map. You can use those for the default spawn point, or for any teleportation of the player you need to do.
Selector: The selector depends on the current selected command. For example if you choose "Background Tile" all the possible tiles will appear while if you choose "Monsters" a list of monster will be available.
Map: To edit the map simply left click with the mouse on the map and the selected command will be executed. Most commands accept a right click to remove the placed object for example. While being on the map you can use the mouse wheel to change the selection without having to move the mouse and click choose it in the "Selector".
Undo background painting: by right clicking on the map while you have a tool which modify the tiles, it will roll back that tile. The history is reset every time you change the tool.
Next: Map Editing Background Tiles.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402127397.84/warc/CC-MAIN-20200930172714-20200930202714-00395.warc.gz
|
CC-MAIN-2020-40
| 2,734
| 14
|
https://john.do/game-soundtracks-work/
|
code
|
Here are a few video game soundtracks that you can use to get work done. Put them on the background or go buy the full albums or something.
Iunno. Get it done.
The Turing Test
This game, by the way, was amazing. Got it on Steam. Awesome.
Ori and the Blind Forest
I bought this one and I really dig it.
Nothing like a little 8-bit background loops.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257605.76/warc/CC-MAIN-20190524104501-20190524130501-00062.warc.gz
|
CC-MAIN-2019-22
| 347
| 7
|
https://baltimorefishbowl.com/stories/mapping-segregation-in-baltimore-beautifully/
|
code
|
We’ve featured other data visualization maps on Baltimore Fishbowl, and even other data visualization maps that depict segregation. But none have been quite so, well, beautiful as the racial dot map put together by demographer Dustin Cable.
In Cable’s map, each point represents an individual person. Yes, that means that there’s a tiny dot somewhere on this map that stands for you. Of course, the overall picture is more like a impressionist painting, fuzzy around the edges and distinct only when you look up close. Zooming in allows an increasingly precise look at where people live in and around the city: from a distance, Baltimore clearly reveals itself as a majority-black city, with majority-white outposts extending to the north. But a closer look complicates things:
For reference: 1 green dot = 1 black person; 1 blue dot = 1 white person; 1 red dot = 1 Asian person; 1 yellow dot = 1 Hispanic person; and 1 brown dot = 1 “other” person.
Notice how the area’s suburban black population clusters along Liberty Road, while the northern Charles Street corridor is much more heavily white.
Zooming in even closer, you start to be able to see the city’s burgeoning Hispanic population in the Highlandtown area.
That big white spot is the Johns Hopkins Homewood campus, and all those red dots indicate the university’s concentration of Asian students, many of whom live right near campus. Again, a clear geographic demarcation seems to exist — this time, it’s Greenmount Avenue that serves as the de facto racial boundary.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710710.91/warc/CC-MAIN-20221129164449-20221129194449-00050.warc.gz
|
CC-MAIN-2022-49
| 1,548
| 6
|
https://www.zumasys.com/2013/11/21/the-new-features-of-xendesktop-7/
|
code
|
With their newest release of XenDesktop, Citrix is set to make a big leap forward in the industry. Version 7 gives you the ability to deliver all types of virtual desktops and applications under one roof, and with no more confusing product names. But what gets me excited about XenDesktop 7 is what it represents for the industry—a re-envisioning of desktop and application mobilization for the cloud era.
Zumasys runs on Citrix, so I’ve actually been working on our own XenDesktop 7 upgrade, and I’ve had a first-hand look at all of the cool features that Version 7 has to offer. XD 7 has made huge improvements in terms of simplicity, so the transition thus far has been very smooth, and managing desktops and applications is a breeze. Citrix Profile Management and EdgeSight monitor are now built in, and configurations that needed to be done manually before are now automated. And with the available XenDesktop Studio and Director, day-to-day management in this environment has been greatly improved.
Now let’s talk about a few key features. With XD 7, the legacy IMA architecture from XenApp has been retired and replaced by FMA (Flexcast Management Architecture), the core design of XenDesktop. This means that setting up a server for shared hosted desktops and published applications can now be done with a single XenDesktop agent, whereas it previously required a full installation of XenApp on every server with multiple dependencies. Deployment is now easier with less service dependency. With fewer components to manage, environments are more stable and less prone to issues.
Here’s how they stack up.
Figure 1) Before: XenApp 6.5 and XenDesktop 5.6
Figure 1 shows a typical virtual desktop infrastructure (VDI) deployment with XenDesktop 5.6 along with XenApp 6.5. XenDesktop 5.6 provides physical, dedicated, streamed, and pooled desktops running Windows XP-Windows 7, while XenApp 6.5 provides hosted shared desktops and application delivery via Windows Server 2003-2008 R2.
Having two different architectures introduced multiple points of management and dramatically increased complexity, which leads to higher total cost of ownership. If you started out with XenApp and wanted to expand IT into delivering VDI, you would need to build a separate architecture for XenDesktop. Inversely, if you had only XenDesktop and you wanted to add XenApp, you would need to build a completely separate infrastructure with different management points.
Learn more about our VDI solutions
Figure 2) After: XenDesktop 7
Figure 2 shows the new, simplified world of XenDesktop 7. Now VDI desktops, hosted shared desktops, and application publishing from Windows XP-Windows 8.1/Windows Server 2008 R2-2012 R2 are now under a single architecture controlled by the Virtual Delivery Agent (VDA). This release drastically streamlines management and allows delivery of applications and desktops to users anywhere, on any device. Expanding capabilities from delivering applications to include VDI desktops can be accomplished by a simple license upgrade instead of building a separate environment like in the previous version, which contributes to decreased licensing costs and reduced complexity.
There isn’t a one-size-fits-all method for delivering desktops and applications, so a single company may require different approaches for different use cases. For example, your engineers and designers would probably benefit from dedicated desktops, while your office staff could be in a hosted shared desktop environment. There are many different ways to deliver and mobilize desktops and applications, and XenDesktop 7 offers all of these under one roof without the need for a complex environment.
XenDesktop 7 is one of Citrix’s biggest product releases yet, and so far it does not disappoint. I can’t wait to see what future Feature Packs will bring, and I eagerly await the release of XenDesktop 8!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.19/warc/CC-MAIN-20230923162848-20230923192848-00760.warc.gz
|
CC-MAIN-2023-40
| 3,906
| 12
|
https://www.interviewbit.com/cics-interview-questions/
|
code
|
CICS Interview Questions
CICS (Customer Information Control System) is an online transaction processing system that is widely used by many industries, including banking, insurance, and healthcare. As CICS is an important system, job seekers need to prepare well for interviews related to CICS.
This article covers a wide range of topics related to CICS, such as CICS commands, transactions, control blocks, and more including Multiple Choice Questions. We have also provided tips and tricks on how to approach CICS interviews and what the interviewer may be looking for in your responses.
So, if you want to excel in your CICS interview, dive into the following sections to get a better understanding of what to expect during your interview!
CICS Interview Questions for Freshers
1. What is CICS?
CICS full form is (Customer Information Control System). It is a software system that helps organizations manage their day-to-day business operations. Think of it as a central hub that connects various applications and allows them to interact with each other.
For example, if you are using an ATM to withdraw money, CICS would be the software that connects the ATM to your bank account and handles the transaction.
- It is a middleware software system developed by IBM that enables multiple applications to run concurrently and communicate with each other in real time.
- It is used in the mainframe system. CICS mainframe provides a runtime environment for executing business transactions, managing resources, and providing security, scalability, and reliability for the applications it supports.
2. What are the basic functions of CICS?
Some of the basic functions of CICS include the following:
- Transaction management: CICS provides facilities to initiate, monitor, and control the execution of transactions, which are the basic units of work in an OLTP system.
- Task management: CICS creates and manages tasks that execute programs, handle input and output, and communicate with other tasks.
- Program management: CICS provides facilities to load, link, and execute programs written in a variety of programming languages, including COBOL, PL/I, Assembler, and C.
- Data management: CICS provides access to various types of data sources, including databases, files, and message queues. CICS also provides facilities to manage data integrity and concurrency.
- Communications management: CICS provides facilities to manage communication between applications running in different CICS regions or different systems.
- Security management: CICS provides facilities to protect data and resources from unauthorized access and control access to CICS transactions and programs.
- System management: CICS provides facilities to manage the CICS system itself, including monitoring system performance, managing system resources, and maintaining system availability.
3. Explain TCT and RCT.
- TCT (Terminal Control Table): The TCT is a table that stores information about each terminal connected to the CICS system. This information includes the terminal device type, device address, and current status. The TCT is used by CICS to manage terminal activity, such as routing transactions to the correct terminal and managing screen displays. When a user initiates a transaction, CICS uses the TCT to determine which terminal the user is using and to route the transaction to that terminal. The TCT also helps to manage terminal resources and ensures that terminals are being used efficiently.
- RCT (Resource Control Table): The RCT is a table that stores information about various resources in the CICS system, such as files, programs, and transactions. This information includes the resource name, status, location, and other details. The RCT is used by CICS to manage resource activity, such as allocating and deallocating resources and coordinating resource sharing between multiple users. For example, if multiple users need to access the same file, the RCT will ensure that the file is locked and that users can access it without conflicts. The RCT also helps to manage system resources and ensures that they are being used efficiently.
The TCT and RCT work together to manage CICS resources and control terminals. For example, when a user initiates a transaction, CICS uses the TCT to determine which terminal the user is using and to route the transaction to that terminal. CICS then uses the RCT to allocate the necessary resources, such as programs and files, and to coordinate resource sharing between multiple users.
4. Difference between PCT (Program Control Table) and FCT (File Control Table)?
|PCT (Program Control Table)||FCT (File Control Table)|
|It manages programs and transactions in a CICS system.||It manages files and datasets in a CICS system.|
|It contains information about each program or transaction, such as the program name, transaction ID, and load module name.||It contains information about each file or dataset, such as the file name, record format, and physical location.|
|It is used by CICS to load and execute programs and transactions and to manage program flow.||It is used by CICS to manage file access and processing, such as reading, writing, and updating files.|
|It allows CICS to dynamically load and execute programs, and to maintain program versions and libraries.||It allows CICS to manage file access modes, such as read-only, write-only, or update.|
|It can be updated dynamically by authorized users without requiring a system shutdown.||It requires a system shutdown to update the FCT.|
|The PCT is typically stored in the main storage (in memory) to improve program execution speed.||The FCT is typically stored in auxiliary storage (on disk) to reduce memory usage.|
Suppose you have a CICS application that processes insurance claims.
The PCT for this application might contain entries for various programs, such as a program to search for customer information, a program to calculate claim amounts, and a program to update customer records.
|Suppose your insurance claims application needs to access a database of customer records. The FCT for this application might contain an entry for the customer database file, specifying its name, location, and access method (such as VSAM or DB2).|
5. What are the main components of a CICS system?
A CICS system is composed of several key components that work together to process transactions and manage system resources. Some of the main components are:
- CICS Region: A CICS region is a logical grouping of CICS resources, including terminals, programs, and files. It is responsible for managing system resources and processing transactions.
- Terminal Control Program (TCP): The TCP manages communication between the CICS system and user terminals. It handles input and output operations, manages screen displays, and processes user requests.
- Program Control Table (PCT): The PCT is a table that contains information about programs and transactions in the CICS system. It is used to load and execute programs and to manage program flow.
- File Control Table (FCT): The FCT is a table that contains information about files and datasets in the CICS system. It is used to manage file access and processing, such as reading, writing, and updating files.
- Resource Definition Online (RDO): The RDO is a facility that is used to define and manage CICS resources, such as programs, files, and transactions. It allows authorized users to create, modify, and delete resources in the CICS system.
- Data Communication System (DCS): The DCS manages communication between the CICS system and other systems or applications. It provides communication protocols, message formatting, and network connectivity.
- CICS Commands: CICS provides a set of commands that are used to manage system resources and perform transactions. These commands are typically entered by users through terminal screens or batch jobs.
6. What is the difference between a program and a transaction in CICS?
- Program: A program in CICS is a set of instructions written in a high-level language, such as COBOL or PL/I. It is compiled, linked, and executed within the CICS environment. A program can perform a specific task, such as updating a file or generating a report.
- Transaction: A transaction in CICS is a logical unit of work that is processed by the system. It represents a user request, such as a query, an update, or a retrieval of information. A transaction is initiated by a user through a terminal or other input device, and it typically involves a sequence of program executions.
7. Describe CICS Task.
A CICS task is a logical unit of work initiated by a CICS transaction. It consists of a sequence of program calls and operations that are performed by CICS on behalf of the transaction. Each task has its environment and resources, including program work areas, communication buffers, and system control blocks.
Tasks can run in parallel with other tasks within a CICS region and can communicate with each other and exchange data using a variety of techniques. When the task is complete, CICS frees the resources allocated to it and returns control to the transaction.
8. How are transactions processed in CICS?
There are certain steps followed while the transaction is being processed. The steps are-
- The user initiates the transaction: A user initiates a transaction by sending a request through a terminal or other input device. The user enters a transaction code, which is associated with a program or set of programs that perform the requested task.
- Transaction identification and routing: The CICS system receives the transaction request and identifies the program or programs that need to be executed. The system also determines the resources, such as files and databases, that the transaction needs to access.
- Program execution: The CICS system loads and executes the required programs to perform the transaction. The programs perform the requested task, such as updating a file or generating a report.
- Resource management: During program execution, the transaction may need to access system resources, such as files or databases. The CICS system manages resource allocation and ensures that the transaction has the necessary permissions to access the resources.
- Data storage: If the transaction updates data, the CICS system stores the data in temporary storage until the transaction is complete. If the transaction completes successfully, the updated data is written to permanent storage.
- Transaction completion: Once the transaction is complete, the CICS system returns control to the user, and the user receives a response or output based on the requested task
9. What is the difference between a transient and a permanent dataset in CICS?
|Transient Dataset||Permanent Dataset|
|Purpose||Temporary storage for data processing||Permanent storage for data retention|
|Location||Stored in main storage||Stored in secondary storage (like - disk or tape)|
|Lifespan||Exists only for the duration of the transaction||Exists until explicitly deleted or the system is shut down|
|Size limitations||Limited by the amount of available main storage||Limited by the amount of available secondary storage|
|Access||Directly accessed by programs||Accessed through CICS file control|
|Recovery||Not recoverable in case of system failure||Recoverable through backup and restore procedures|
Let’s understand the use case scenario of both datasets.
Transient datasets are typically used to hold intermediate results or temporary data that is not needed beyond the current job or program execution. Transient datasets are automatically deleted when the job or program completes or terminates. One common use case for transient datasets is batch processing.
- For example - a batch job that processes a large amount of data might create temporary datasets to hold intermediate results, such as sorted or filtered data. These temporary datasets can then be passed as input to subsequent steps in the batch job.
- Permanent datasets can be accessed and updated by multiple jobs or programs and can be used for long-term storage of important data. A common use case for permanent datasets is in storing transactional data, such as customer orders or financial transactions.
In this scenario, the permanent dataset would be used to store the transactional data for future reference or analysis. Permanent datasets can also be used to store system configuration data, such as application settings or user preferences.
10. What is the purpose of the CICS Resource Definition Online (RDO), and how is it used?
It is a facility that is used to define and manage CICS system resources. The purpose of RDO is to provide a centralized and consistent way to define and manage system resources, such as files, programs, transactions, and terminals.
- Resource definition: RDO is used to define system resources and their attributes, such as record layouts for files or transaction codes for programs.
- Resource maintenance: RDO is used to maintain system resources, such as changing the attributes of a file or deleting a transaction code.
- Security: RDO is used to control access to system resources by defining security profiles for users and groups.
- Backup and recovery: RDO is used to manage the backup and recovery of system resources by defining backup and recovery procedures for each resource.
- Performance monitoring: RDO is used to monitor the performance of system resources by collecting and analyzing performance statistics.
RDO is used through a set of commands and panels that are accessed through the CICS system console or an interactive terminal session. The RDO commands are used to define, modify, and delete system resources, while the RDO panels provide a graphical interface for resource management and monitoring.
11. How can we read a CSAM File in CICS?
To read a VSAM file in a CICS program, we can use the following steps:
- Define the file in the CICS program using a FILE control entry (FCT) in the program's PCT.
- Open the file using the CICS OPEN command with the appropriate options. The options will depend on the access method required for the VSAM file (like - random, or sequential).
- Read the data from the file using the CICS READ command with the appropriate options. Again, the options will depend on the access method and type of data to be read from the file.
- After reading the required data, close the file using the CICS CLOSE command.
Consider the below command for the same:
EXEC CICS OPEN FILE(MYVSAMF) RIDFLD(MYKEY) TYPE(EXCI) END-EXEC EXEC CICS READ FILE(MYVSAMF) INTO(MYDATA) LENGTH(MYLEN) END-EXEC EXEC CICS CLOSE FILE(MYVSAMF) END-EXEC
12. What is “TransID”? Why is it used and where is it defined?
Transaction Identifier (TransID) is a short name or identifier that is used to identify a specific CICS transaction program. It is a unique identifier that is used to invoke a specific CICS transaction program and can be thought of as a program name or entry point.
A “TransID” is typically a 4-character alphanumeric string, and is defined in the CICS system definition (CSD) file. When a user initiates a transaction, they specify the Transid of the program they want to execute, and CICS invokes that program. “TransIDs” is used extensively in CICS to initiate transactions and execute transaction programs. They are also used for program-to-program communication, where a program can pass control to another program using its TransID.
13. How Error Handling is done in CICS?
CICS provides various mechanisms for error handling to ensure that programs can handle any unexpected errors or exceptions that occur during runtime. Here are some ways in which error handling can be achieved in CICS:
- Return codes: CICS programs can return various return codes depending on the success or failure of an operation. These return codes can be checked and handled appropriately in the calling program to take corrective action.
- Condition handling: CICS programs can use the EXEC CICS HANDLE ABEND command to handle abnormal termination (ABEND) conditions that occur during runtime. This command allows the program to take corrective action when an unexpected exception occurs.
- Recovery routines: CICS programs can define recovery routines that can be executed when an error occurs. These recovery routines can be used to take corrective action and retry the operation or to log the error for analysis.
- Exception handling: CICS programs can use the EXEC CICS HANDLE CONDITION command to handle specific exceptions that may occur during runtime. This command allows the program to take corrective action when a specific exception occurs.
- Logging and tracing: CICS provides various logging and tracing facilities that can be used to track and diagnose errors that occur during runtime. These facilities can be used to identify the root cause of an error and take corrective action.
14. What is COMMAREA and explain its benefits.
COMMAREA stands for Communication Area, which is a shared data area that is used by CICS programs to exchange information with each other. The COMMAREA can be used to pass data between programs that are executed within the same CICS task or between different CICS tasks.
Using COMMAREA has several advantages:
- It helps in efficient and fast data exchange between programs without the overhead of writing data to a file or database.
- It has a standardized format for data exchange between programs that ensures consistent and reliable communication.
- It allows Dynamic data sharing without the need for pre-defined data structures or file layouts.
- It reduces I/O overhead which leads to improved performance of the application.
- It uses Transaction-based processing within a single atomic operation which leads to consistent and accurate data.
15. What are the different types of DFHMDF present in the CICS Set?
DFHMDF stands for CICS Map Definition Facility, which is used to define maps for CICS applications. There are different types of DFHMDF present in the CICS set. Each type serves a specific purpose and is used to define various aspects of CICS applications, such as maps, programs, files, and terminals. Below mentioned some of the DFHMDF sets:
- BMS: Basic Mapping Support. This is the standard format for defining CICS maps.
- PCT: Program Control Table. This is used to define the properties of the CICS program, such as its name and entry point.
- FCT: File Control Table. This is used to define the properties of CICS files, such as the file name, record format, and key length.
- TCT: Terminal Control Table. This is used to define the properties of CICS terminals, such as the terminal type, model, and keyboard layout.
- XCTL: Transient Program Control. This is used to transfer control from one CICS program to another.
- MDT: Map Destination Table. This is used to define the properties of the output destination for a CICS map.
- MCT: Map Conversion Table. This is used to define the properties of the data conversion process for a CICS map.
CICS Interview Questions for Experienced
1. How does CICS differ from other transaction processing systems?
Most transaction Processing System offers the same, But here are some ways in which CICS differs from other transaction processing systems:
- Application flexibility: It provides a high degree of application flexibility and has support for multiple programming languages, like - COBOL, PL/I, C, C++, and Assembler. This flexibility makes it easy for developers to write and maintain complex applications that require a variety of programming languages.
- Scalability: It is designed to handle large and complex transaction processing environments and can scale to meet the demands of large organizations. It can support thousands of transactions per second and can handle millions of users.
- Reliability: It is a highly reliable transaction processing system that offers features such as automatic restart, recovery, and backup. It can recover from system failures and errors quickly and efficiently.
- Security: It provides a wide range of security features, like - user authentication, authorization, and encryption. It can also protect against unauthorized access and attacks from external sources.
- Integration: It provides a wide range of integration capabilities, including support for various messaging systems, databases, and middleware technologies. This integration allows CICS to interact with other systems and applications seamlessly.
2. Explain some of the most commonly used CICS Commands.
- EXEC CICS LINK - This command is used to invoke a program from within another program in the same CICS region.
- EXEC CICS XCTL - This command is used to transfer control from one program to another within the same task.
- EXEC CICS RETURN - This command is used to return control from a program to the program that has been called.
- EXEC CICS SEND - This command is used to send data to another program or terminal.
- EXEC CICS RECEIVE - This command is used to receive data from another program or terminal.
- EXEC CICS READ - This command is used to read data from a file.
- EXEC CICS WRITE - This command is used to write data to a file.
- EXEC CICS START - This command is used to start a task that will run concurrently with the current task.
- EXEC CICS SYNCPOINT - This command is used to synchronize changes made to a database during a transaction.
- EXEC CICS ENDMULTI - This command is used to end a loop that was started with the EXEC CICS DO command.
- EXEC CICS ASKTIME - This command is used to obtain the current date and time from the CICS system clock.
- EXEC CICS ASSIGN - This command is used to assign a value to a field or variable.
- EXEC CICS SET - This command is used to set the value of a system control block or resource.
- EXEC CICS INQUIRE - This command is used to obtain information about a resource or system control block.
- EXEC CICS GETMAIN - This command is used to allocate main storage (i.e. memory) for use by a program.
- EXEC CICS FREEMAIN - This command is used to release the main storage that was allocated using the GETMAIN command.
- EXEC CICS XCTLTRAN - This command is used to transfer control from one task to another within the same CICS region.
- EXEC CICS LINKPGM - This command is used to invoke a program that resides in a different CICS region.
- EXEC CICS RETURNTRANS - This command is used to terminate a transaction and return control to the terminal or application that initiated it.
- EXEC CICS SEND MAP - This command is used to send a screen or map to a terminal.
3. What is the difference between a VSAM KSDS and a VSAM RRDS file? List in detail.
|VSAM KSDS||VSAM RRDS|
|Full form||Key Sequenced Data Set.||Relative Record Data Set.|
|Access Method||Keyed access method.||Relative byte address access method.|
|Record Retrieval||Records are retrieved based on the key value.||Records are retrieved based on the relative byte address.|
|Record Insertion||Records can be inserted in ascending or descending order based on the key value.||Records can be inserted at any available slot in the dataset.|
|Record Deletion||Records can be deleted using the key value.||Records can be deleted based on the relative byte address.|
|Record update||Records can be updated using the key value.||Records can be updated using the relative byte address.|
|Data Organization||Data is organized based on the key value and stored in ascending or descending order.||Data is organized circularly with fixed-length slots.|
|Index||The KSDS file has an index component that contains the key values and their corresponding physical addresses.||The RRDS file has a free space map that contains information about the available slots.|
|Efficiency||KSDS files are efficient for the retrieval of individual records using the key value.||RRDS files are efficient for the sequential processing of records or retrieval of a range of records.|
|Performance||KSDS files provide faster access to individual records, especially when the dataset is large.||RRDS files provide better performance for the sequential processing of records or retrieval of a range of records, especially when the dataset is large.|
|Usage||KSDS files are commonly used for online transaction processing systems.||RRDS files are commonly used for batch processing and report generation.|
4. What is EIB? Explain in detail. Also, list the information this contains.
EIB stands for Execution Interface Block, and it is a data structure used by CICS to communicate information between a CICS task and the CICS system. The EIB is available to all CICS programs and contains information about the current task, the transaction, and the environment in which the task is running.
CICS programs can access the EIB using the EXEC CICS GET EIB command to retrieve information about the current task and environment. The EIB can also be updated using the EXEC CICS SET EIB command to set values for certain EIB fields.
The EIB contains the following information:
- Task information: This includes the task number, the task type (batch or online), and the transaction code that initiated the task.
- Security information: This includes the user ID and the security level of the task.
- Date and time information: This includes the current date and time.
- Terminal information: This includes the terminal ID and the device type of the terminal.
- Program information: This includes the program name and the program type.
- Language environment information: This includes the language environment ID and the associated data.
5. How do you ensure data integrity in a CICS program?
Ensuring data integrity is an important aspect of any application, and CICS provides various mechanisms to maintain the integrity of data in a transactional environment. Here are some ways through which we can ensure data integrity in a CICS program:
- Use CICS Syncpoints: A Syncpoint is a checkpoint in the transaction where CICS ensures that all updates made to the resources are either committed or rolled back. By using Syncpoints, we can ensure that updates are committed only if all updates are successful, and rolled back if any update fails. This ensures that data is consistent and reliable.
- Use CICS Restart: CICS Restart is a facility that enables a program to recover from failures. By using CICS Restart, we can ensure that updates made to resources are not lost in the event of a failure, such as a system crash or network outage.
- Use CICS journaling: CICS journaling is a facility that records changes made to resources, such as files or databases. By using journaling, we can ensure that changes made to resources can be replayed in the event of a failure, thereby ensuring that data is consistent and reliable.
- Use CICS program-controlled logging: Program-controlled logging is a technique where the program explicitly logs changes made to resources. By using program-controlled logging, we can ensure that changes made to resources are logged in a controlled manner, thereby ensuring data integrity.
- Use CICS Resource Control Table (RCT): The RCT is a facility that enables you to define rules for accessing resources. By using the RCT, we can ensure that only authorized programs can access resources, thereby ensuring data integrity.
These are just a few examples of how we can ensure data integrity in a CICS program. By using a combination of these techniques, we can create a robust and reliable application that ensures data integrity.
6. How Dynamic Memory Allocation is Handled in the CICS Program?
Dynamic memory allocation in CICS programs is typically handled using the CICS dynamic storage allocation services. These services provide a way for programs to dynamically allocate and deallocate memory at runtime.
There are several CICS dynamic storage allocation services available, Some of them are -
- GETMAIN: This service is used to allocate a block of memory of a specified size. The allocated block can then be used by the program for temporary storage.
- FREEMAIN: This service is used to deallocate a block of memory that was previously allocated using GETMAIN. This releases the memory back into the system for reuse.
- PUT and GET: These services are used to allocate and deallocate storage for the duration of a task. PUT is used to allocate storage, while GET is used to deallocate storage.
- EXEC CICS HANDLE CONDITION: This service is used to handle storage violations that may occur during dynamic storage allocation. If a storage violation occurs, the program can use this service to handle the error and take appropriate action.
Programs can use these services to allocate memory for variables, tables, and other data structures needed at runtime. The allocated memory can be used for the duration of the program's execution and is automatically deallocated when the program terminates.
7. List out some points through which you can optimize the CICS performance.
- We can write efficient code using appropriate algorithms and data structures to optimize performance.
- We can use caching and buffering techniques to minimize the number of I/O operations.
- Excessive use of dynamic memory allocation can lead to performance problems. So we can allocate memory only when necessary and deallocate it as soon as it's no longer needed.
- We can use appropriate locking strategies and minimize the number of calls to the database.
- We can adjust system parameters to optimize performance. This includes tuning CICS transaction and region parameters.
- We can use CICS connection pooling to reduce the overhead of establishing a new connection for each transaction.
- We can use CICS thread pooling to improve throughput by reusing threads for subsequent requests.
- We can minimize the use of system resources, such as CPU and storage, to improve performance.
- We can use caching techniques to reduce database access and improve response time.
- We can use asynchronous calls instead of synchronous calls where possible to improve response time.
- We can optimize the network settings to improve performance.
- We can use CICS monitoring tools to identify bottlenecks and areas for improvement.
8. What is the difference between a program-controlled task and a system-controlled task in CICS? Explain in Detail.
|Feature||Program-Controlled Task||System-Controlled Task|
|Who initiates task execution?||The application program initiates execution.||CICS initiates execution.|
|How is the task created?||Using the START command in the application program.||Using the CICS task control facilities, such as transaction initiation or event processing.|
|When is the task terminated?||When the program calls the EXEC CICS RETURN command.||When CICS determines that the task has been completed.|
|Who controls task execution?||The application program controls task execution.||CICS controls task execution.|
|Can it be dispatched by CICS?||No, the application program is responsible for dispatching the task.||Yes, CICS can dispatch the task.|
|Can it access system resources directly?||Yes, the application program can access system resources directly.||No, the system-controlled task must request access to system resources through CICS facilities.|
|Examples||Batch programs that run under CICS.||CICS transactions are initiated by users or by events.|
9. Can you implement a pseudo-conversational program in CICS? Also, Describe some practical examples of how the techniques are used in real-world scenarios.
Here is the implementation of a pseudo-conversational program in CICS in the COBOL Programming language.
IDENTIFICATION DIVISION. PROGRAM-ID. PSEUDOCONV. ENVIRONMENT DIVISION. INPUT-OUTPUT SECTION. FILE-CONTROL. SELECT MYFILE ASSIGN TO SYSOUT. DATA DIVISION. FILE SECTION. FD MYFILE. 01 MYREC PIC X(80). WORKING-STORAGE SECTION. 01 WS-FIELD PIC X(80). 01 WS-FIRST-TIME VALUE 'Y'. 01 WS-CONV-IND PIC X(1) VALUE 'N'. PROCEDURE DIVISION. MAIN-PROCEDURE. PERFORM UNTIL WS-CONV-IND = 'X' IF WS-FIRST-TIME = 'Y' DISPLAY 'Enter input:' ACCEPT WS-FIELD MOVE 'N' TO WS-FIRST-TIME ELSE EXEC CICS SEND TEXT='Enter input:' RESPONSE=(WS-FIELD) EXEC CICS RECEIVE MAPSET('MYMAP') MAP('MYMAP') RESPONSE=(WS-FIELD) END-IF EXEC CICS WRITE FILE('MYFILE') FROM(MYREC) EXEC CICS SEND MAP('MYMAP') MAPSET('MYMAP') EVALUATE TRUE WHEN WS-FIELD = 'END' SET WS-CONV-IND TO 'X' END-EVALUATE END-PERFORM. EXEC CICS RETURN.
In this example, the program uses a loop to repeatedly prompt the user for input until they enter 'END'. The program starts by accepting input from the user and writing it into a file. If this is the first iteration of the loop, the program simply accepts input using the ‘ACCEPT’ statement. However, if it is not the first iteration, the program uses ‘EXEC CICS SEND’ and ‘EXEC CICS RECEIVE’ commands to send and receive input using a CICS map.
The ‘EVALUATE’ statement is used to check the user's input. If the user enters 'END', the program sets the ‘WS-CONV-IND’ field to 'X', which causes the loop to exit.
Pseudo-conversational programming is used in real-world scenarios. Like -
- Online Banking: The user may need to perform multiple transactions like - balance inquiry, fund transfer, and bill payment. So, using pseudo-conversational programming, the system can ask the user to enter each transaction and then return to the main menu after the completion of the transaction. This approach makes sure that the user doesn’t lose any entered data in case of any errors or the case when the system may fail.
- Airline Reservation System: Suppose the user needs to perform multiple tasks like - searching for flights, selecting a seat, booking a ticket, etc. So, pseudo-conversational programming helps here by asking the user for each task and then returning to the main menu after completing each of the tasks. This makes sure that the user doesn’t need to start again if they face any errors in the process.
In both of the above scenarios, pseudo-conventional programming helps the user in a smooth experience when performing multiple tasks.
CICS is a powerful system used for processing transactions on mainframe computers. During a job interview, you might be asked questions about your experience with CICS, how it works, and how you develop and maintain applications using CICS. Some of the topics that could be discussed during the interview include the CICS commands, how to handle files, designing programs, and ways to improve performance.
To prepare for a CICS interview, it's important to review the concepts and best practices related to CICS development. It's also important to know the programming languages and tools used in the job you're applying for. By showing your expertise and ability to think critically about CICS development challenges, you can increase your chances of getting a job in this field.
Tips and Tricks
1. CICS Interview Preparation
Some tips and tricks to answer questions during your CICS Interview -
- Know the basics of CICS: Make sure you have a solid understanding of the fundamentals of CICS, including its architecture, programming languages, and tools used in CICS development. Familiarize yourself with the various CICS commands and their usage.
- Be prepared to give specific examples from your experience: Be ready to provide concrete examples of how you have used CICS in your experience. This could include specific programming tasks you have completed, challenges you faced and how you overcame them, and the impact of your work on the organization.
- Practice problem-solving skills: CICS development often involves problem-solving, so it's important to demonstrate your ability to approach and solve complex problems. Be ready to discuss your thought process and methodology when approaching a problem.
- Demonstrate your communication skills: Communication is critical in CICS development, so be prepared to discuss how you have communicated with team members, stakeholders, and customers. This could include discussing how you have documented your work, how you have provided updates on progress, and how you have collaborated with others on projects.
- Be honest about your abilities and show a willingness to learn: It's important, to be honest about your strengths and weaknesses in CICS development. Don't be afraid to admit when you don't know something, but be prepared to show a willingness to learn and grow in your role.
By following these tips, you can increase your chances of doing well in a CICS interview and landing a job in this field.
CICS MCQ Questions
Which statement is true regarding the CICS Program Control Table (PCT)?
Which of the following commands is used to display a message in the CICS terminal?
Which of the following CICS facilities is used to manage resources such as storage and devices?
Which of the following is not a CICS transaction type?
What is the maximum length of a CICS task name?
Which CICS command is used to define a new file?
Which CICS command is used to start a transaction?
Which CICS command is used to read a record from a file?
What is the purpose of the CICS LOAD command?
Which of the following is not a CICS program control command?
Which CICS command is used to write a record to a file?
Which CICS command is used to delete a record from a file?
Which of the following is not a CICS system initialization parameter?
Which CICS command is used to obtain a temporary storage queue (TSQ)?
Which CICS command is used to release a temporary storage queue (TSQ)?
What is the purpose of the CICS XCTL command?
Which of the following is not a type of CICS task?
Which CICS command is used to modify an existing file?
Which command is used to read a record from a VSAM file in CICS?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100286.10/warc/CC-MAIN-20231201084429-20231201114429-00060.warc.gz
|
CC-MAIN-2023-50
| 37,701
| 243
|
https://calumryan.com/articles/part-4-of-learning-wcag-2-1-robust
|
code
|
Part 4 of learning WCAG 2.1 - Robust
What's included in the robust category of WCAG 2.1
The fourth part of WCAG 2.1 (Web Content Accessibility Guidelines) refers to a single set of criteria encompassing techniques and failures for how code is implemented.
Parsing 4.1.1 (level A) covers many aspects of a website's code so that it can be interpreted and parsed correctly by browsers, assistive technologies and other user agents. Much of this depends on webpages being validated according to HTML specifications which includes correctly starting and closing elements and not having duplicate values for ID attributes.
Another level A criterion is 4.1.2 Name, Role, Value thats purpose is to ensure components such as form components, iframes and interactive features, like media players, can be navigated and controlled by the user without difficulty. Ways to meet the criterion could include labelling form components with accessible names and adding a title to iframes.
A recent addition to the specifications in 2.1 is 4.1.3 Status Messages which is applicable to activities taking place within a webpage where there's a change or update to content. This should be coded in such a way that assistive technologies with screen reader capabilities can interpret and inform the user in a timely manner. There are common scenarios such as a shopping cart feature where this might be applicable when items are added or removed without the page reloading. Similarly, for content such as navigation and accordions there should be a clear indication for when the content or section area is collapsed or expanded.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494976.72/warc/CC-MAIN-20230127101040-20230127131040-00295.warc.gz
|
CC-MAIN-2023-06
| 1,606
| 6
|
https://www.tutorialspoint.com/use-isometric-dot-paper-and-make-an-isometric-sketch-for-each-one-of-the-given-shapes
|
code
|
- Trending Categories
- Data Structure
- Operating System
- C Programming
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Use isometric dot paper and make an isometric sketch for each one of the given shapes:
Oblique sketches of different shapes given.
To use isometric dot paper and make an isometric sketch for each one of the given shapes.
Isometric sketches of given shapes are as below:
- Return the dot product of One-Dimensional vectors in Python
- Use Facebook’s Paper to discover Interesting stuffs
- Wait for user input to start a sketch in Arduino
- How to use for each loop through an array in Java?
- How to use Python Pandas to find the total number of count for more than one special characters present in each word in a given series?
- Rock Paper and Scissor Game Using Tkinter
- C++ Program for dot product and cross product of two vectors
- How can I make a div with irregular shapes with CSS3 and HTM5?
- Maximum given sized rectangles that can be cut out of a sheet of paper in C
- How to remove dot and number at the end of the string in an R vector?
- Find the column index of least value for each row of an R matrix
- Python Pandas - Display the end time of the period for each element in the given PeriodIndex object
- Find the frequency of unique values and missing values for each column in an R data frame.
- What are the different shapes of galaxies?
- How to use the grep command to search for a string that has a dot in it?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710829.5/warc/CC-MAIN-20221201153700-20221201183700-00650.warc.gz
|
CC-MAIN-2022-49
| 1,587
| 31
|
http://wiird.l0nk.org/forum/index.php?topic=7681.0
|
code
|
There are some ways to do so.. if you want to edit the actual ISO you can use Trucha signer. Notice though, that editing a single file will invalidate the signatures of the ISO and thus you'd need major modifications done to your Wii - downgrading IOS files and whatever - to play the game. A more elegant way would be to use Riivolution, which you can also use with your original disc (and only with it).
Riivolution can forward calls the game is doing to an SD card - so instead of opening the file from the disc, if will be forwarded to the SD card and open a harmless file there. That's a recommended way by me, it saves you from burning a disc or using backup loaders (unless your Wii is hardware modded).
Please note: no support on how to run a backup ISO, if you do not have an original, do not expect to get help here, Riivolution is the recommended way for what you plan to do!
Thank you, I'll give it a try
I'll use the safer Riivolution one, gotta get me an SD card first though, but I was planning on getting 1 anyway.
Trucha Signer and Wii Scrubber are working ISO editing tools.
Btw. what´s the file with the banlist?
I´m also interested in it...
I'm not sure yet, but I found a file called "limit201003.bin"... which looks alot like "limit year 2010 3d month": March 2010 banlist! However, it'll likely take a few days until I can tell you if it's really true, depending on when I have an SD card.
According to what I used to find this file, it's in Disc -> Partition 1 -> Duel -> Engine -> Bin16. Don't know how Riivolution or Trucha Signer explore the disc/SD card, though.
Say, since we're talking about this anyway, could you take a look at Disc -> Partition 1 -> Duel -> Engine -> Deck? It stores all decks, which is more than the amount of recipes I have. Perhaps you can do something with that for a cheat that really unlocks all: I'm still not sure if Skiller just created his cheat with my unlocked deck recipes, or if he really created an "all recipes" cheat (I didn't get a reply). Would be awesome if I could finally see ALL those deckfiles
(I know I can use Riivolution to swap deck files around, but I don't know which are the ones I don't have, of course).
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928501.75/warc/CC-MAIN-20150521113208-00089-ip-10-180-206-219.ec2.internal.warc.gz
|
CC-MAIN-2015-22
| 2,188
| 12
|
https://gitter.im/pjlsergeant/test-bdd-cucumber-perl/archives/2017/07/03
|
code
|
These are chat archives for pjlsergeant/test-bdd-cucumber-perl
Before do # Do something before each scenario. end
In a feature file, something like:
support/env.rbfile or any other file under the support directory, for example in a file called
support/hooks.rb. There is no association between where the hook is defined and which scenario/step it is run for, but you can use tagged hooks (see below) if you want more fine grained control.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823442.17/warc/CC-MAIN-20181210191406-20181210212906-00175.warc.gz
|
CC-MAIN-2018-51
| 438
| 5
|
https://quantlabs.net/blog/2012/12/cuda-ms-c-amp-windows-8-server-2012-updates-ernie-chan-video-posted-new-membership-rate-increases-set-for-jan-14-2013/
|
code
|
(Last Updated On: December 12, 2012)
I have played with the new Windows 8 and Server 2012. I also posted Ernie Chan’s video. I have been busy but I am still looking for my model development breakthrough. I may have found it. I will reveal that within 24 hours.
If this proves itself, expect that QuantLabs.net Premium 50% increase come Jan 14, 2013.
1. 50% increase coming my Quant Membership for HFT and trading model development! Join now for the affordable rates!
2. Trying out the new Microsoft Windows Server 2012 for potential HFT deployment, Linux too complicated and no standards
Decent but not quite primetime for HFT but it will be at some point!
3. For HFT: Trying out Microsoft Windows 8 trial for AMP capabilities for GPU debug preview within Visual Studio 2012 C++
Stick with CUDA as AMP has been proved to be slow
3. How to use Microsoft AMP for Windows concurrency with Fast Math using Visual Studio 2012 and C++
4. Back to GPU CUDA again and Visual Studio 2010 as C++ AMP is slow and other 2012 problems
5. Youtube video of Ernie Chan online presentation of Pitfalls of Backtesting during Trading Meetup
So get in on the action now which will give you access to my private Webinar for Quantlabs.Net members come Dec 18!
Got questions or comments, let me know
I now post my TRADING ALERTS
into my personal FACEBOOK ACCOUNT
. Don't worry as I don't post stupid cat videos or what I eat!
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103940327.51/warc/CC-MAIN-20220701095156-20220701125156-00416.warc.gz
|
CC-MAIN-2022-27
| 1,403
| 16
|
http://www.abovetopsecret.com/forum/thread883258/pg2
|
code
|
posted on Sep, 19 2012 @ 10:48 PM
Hey, if I can do it, they can do it.
I buy computers for my company. Tomorrow I have a phone conf with a vendor who sells a service that will give me a dashboard on my computer to control
the iPads I am considering buying. I'll have the ability to "geofence" them (they will operate only within a certain area), shut them off remotly,
track them 24/7 without users knowing (they belong to the company so that's OK) and nuke them if I suspect one's been stolen. I'll be able to look at
the dashboard and see where all my computers are, and thusly, where all the employees are and what path they have taken that day as they do their
We had a similer service a few years ago. We knew a lap had gone missing. Since it was encrypted and password protected, they couldn't use it, so they
installed a new operating system. Thing was, the tracking stuff was installed in the BIOS, so a new OS didn't erase it.
We could never pin down where they were, except that it appeared that they were stealing bandwidth from construction trailers. becuase of th eIP
address, we knew the city. So I crafted a message that basically said "You are using a stolen laptop. We know where yo live. We have enough evidence
to arrest you. Return the laptop to the (city deleted) police department, no questions asked, and we won't prosecute". It was programmed so that next
time the computer was turned on, the BIOS would display that _
5 days later, I had my laptop back. I bet it scared the poop out of the guy. He may still be looking over his shoulder.
edit on 19-9-2012 by
davjan4 because: (no reason given)
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375091751.85/warc/CC-MAIN-20150627031811-00028-ip-10-179-60-89.ec2.internal.warc.gz
|
CC-MAIN-2015-27
| 1,618
| 15
|
https://www.labkey.org/Documentation/Archive/20.7/wiki-page.view?name=pipelineIntegration
|
code
|
The Pipeline module provides a basic framework for performing analysis and loading data into LabKey Server. It maintains a queue of jobs to be run, delegates them to a machine to perform the work (which may be a remote server, or more typically the same machine that the LabKey Server web server is running on), and ensures that jobs are restarted if the server is shut down while they are running.
Other modules can register themselves as providing pipeline functionality, and the Pipeline module will let them indicate the types of analysis that can be done on files, as well as delegate to them to do the actual work.
PipelineProviders let modules hook into the Pipeline module's user interface for browsing through the file system to find files on which to operate. This is always done within the context of a pipeline root for the current folder. The Pipeline module calls updateFileProperties() on all the PipelineProviders to determine what actions should be available. Each module provides its own URL which can collect additional information from the user before kicking off any work that needs to be done.
For example, the org.labkey.api.exp.ExperimentPipelineProvider registered by the Experiment module provides actions associated with .xar and .xar.xml files. It also provides a URL that the Pipeline module associates with the actions. If the users clicks to load a XAR, the user's browser will go to the Experiment module's URL.
PipelineProviders are registered by calling org.labkey.api.pipeline.PipelineServer.registerPipelineProvider().org.labkey.api.pipeline.PipelineJob
PipelineJobs allow modules to do work relating to a particular piece of analysis. PipelineJobs sit in a queue until the Pipeline module determines that it is their turn to run. The Pipeline module then calls the
PipelineJob's run() method. The PipelineJob base class provides logging and status functionality so that implementations can inform the user of their progress.
The Pipeline module attempts to serialize the PipelineJob object when it is submitted to the queue. If the server is restarted while there are jobs in the queue, the Pipeline module will look for all the jobs that were not in the COMPLETE or ERROR state, deserialize the PipelineJob objects from disk, and resubmit them to the queue. A PipelineJob implementation is responsible for restarting correctly if it is interrupted in the middle of processing. This might involve resuming analysis at the point it was interrupted, or deleting a partially loaded file from the database before starting to load it again.
For example, the org.labkey.api.exp.ExperimentPipelineJob provided by the Experiment module knows how to parse and load a XAR file. If the input file is not a valid XAR, it will put the job into an error state and write the reason to the log file.
PipelineJobs do not need to be explicitly registered with the Pipeline module. Other modules can add jobs to the queue using the org.labkey.api.pipeline.PipelineService.queueJob() method.
Pipeline Serialization using Jackson
Pipeline jobs are serialized to JSON using Jackson.
To ensure a pipeline job serializes properly, it needs either:
- a default constructor (no params), if no member fields are final.
- a constructor annotated with @JsonCreator, with a parameter for each final field annotated with @JsonProperty("<field name>").
If there are member fields that are other classes the developer has created, those classes may need a constructor as specified in the two options above.
Developers should generally avoid a member field that is a map with a non-String key. But if needed they can annotate such a member as follows:
@JsonSerialize(keyUsing = ObjectKeySerialization.Serializer.class)
@JsonDeserialize(keyUsing = ObjectKeySerialization.Deserializer.class)
private Map<PropertyDescriptor, Object> _propMap;
Developers should avoid non-static inner classes and circular references.
Note: Prior to release 18.3, pipeline job serialization was performed using XStream.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710218.49/warc/CC-MAIN-20221127073607-20221127103607-00274.warc.gz
|
CC-MAIN-2022-49
| 4,001
| 22
|
https://club.myce.com/t/burner-will-not-start-burning-after-formatting/122779
|
code
|
I’ve downloaded the latest version of BW today (220.127.116.11).
When I’m trying to burn an image to DVD with it, it stops after it has formatted the DVD (the orange bar stops at the end en then nothing happens…). I can click & read the logfile however:
4-4-2005 21:50:42 error Init Sector provider failed
24-4-2005 21:50:42 error Can’t open storage file(s).Exception message "Cannot open file "
Can anyone tell me how to solve this problem or is my image just faulty?
I’m using a Athlon 3200 with 1024 RAM, Philips DVDRW228, Win XP SP 2
many thanks from the Netherlands
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400238038.76/warc/CC-MAIN-20200926071311-20200926101311-00343.warc.gz
|
CC-MAIN-2020-40
| 580
| 7
|
https://www.harmreductionohio.org/ohio-syringe-program-conference-schedule-announced/
|
code
|
The planning committee for Ohio’s syringe program conference finalized the presentations and panels for the two-day event in Columbus on Monday-Tuesday, May 22-23.
You can register here for the conference and learn more details, such as the conference hotel.
The conference will open with a presentation from a staffer at OnPoint NYC, the nation’s first overdose prevention center (safe consumption site), explaining how that historic innovation works.
The complete conference
Here is a list of panels and presentations at the conference.
The specific times of each panel and presentation is shown below in pdf form and can be download.
Register for the conference here or click the image below.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474643.29/warc/CC-MAIN-20240225203035-20240225233035-00596.warc.gz
|
CC-MAIN-2024-10
| 699
| 7
|
https://xdadevelopers.xyz/appbeta-0-10-tap-tap-double-tap-on-back-of-device-gesture-from-android-11-port/
|
code
|
Tap, Tap is currently in beta, and may be slightly buggy. Stay tuned for new features and bug fixes. If you’d like to report a bug or suggest a feature, you can do so in this thread or on the GitHub.
Changelog for latest version (0.10 Beta):
- A full rewrite of almost all of the behind the scenes of the app, which should be more stable, compatible and efficient. This means the “Split Service” option has gone and is effectively always enabled, so a notification will be shown (which means less chance the app gets killed). You can long press it to hide it without affecting battery optimisation.
- Accept Call & Reject Call (make sure to disable the call gate if you wish to use Reject to hang up a call)
- Swipe Left, Right, Up & Down (requires secondary gesture service)
- New Gates for foldable devices, for the open and closed state of the device
- Added a Backup & Restore feature, using Storage Access Framework so you can backup and restore directly from Google Drive if you wish
- Added a built in update downloader to workaround the issue where some were unable to download an APK from the app (if you can’t download this update, click the “GitHub” link in the app and find the APK in the releases section)
- Improved Battery & Optimisation screen to link off to dontkillmyapp.com for your OEM if available
- Re-shuffled About section to have its own page with full credits for contributors and translators – thank you!
- Fixed a load of bugs including: Triple tap running feedback when gated, Double tap running feedback when set to do nothing and Triple tap enabled, crashes on MIUI and Android 7.0, crashes when an app used in an action or gate is uninstalled
- Removed unused resources & code, reducing the size of the APK by around 1MB
Version 0.10 Beta
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488259200.84/warc/CC-MAIN-20210620235118-20210621025118-00626.warc.gz
|
CC-MAIN-2021-25
| 1,784
| 13
|