url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
http://superuser.com/questions/100656/linux-unzip-command-option-to-force-overwrite?answertab=votes
code
I am writing a shell script that unzips a ZIP file into an existing hierarchy of files, potentially overwriting some of the files. The problem is that the unzip command asks for confirmation: replace jsp/extension/add-aspect.jsp? [y]es, [n]o, [A]ll, [N]one, [r]ename: y This is unacceptable for a script. I need an option to force unzip to overwrite the files. I did not find in the man page nor with Google.
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010742343/warc/CC-MAIN-20140305091222-00015-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
408
6
https://crypto.stackexchange.com/questions/27466/is-aes-gcm-parallelizable?noredirect=1
code
I recentely faced the issue of random access decryption while AES-GCM was being used. I said this person that the underlying CTR should allow parallelization but I have no idea how authentication comes into play. Now I know that one of the cool features of CTR is that you can decrypt any block without needing to involve any other blocks. I also know that CTR is part of the basis for GCM. Now my question(s) are: - Can one somehow parallelize encryption of data in GCM mode (only CTR part? Parts of the MAC as well?) - Is it possible to get random access to decrypted ciphertexts (+ fast verification?) or is at least somehow possible to parallelize decryption and authentication (do either of both in parallel or internally parallelize?)?
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819971.86/warc/CC-MAIN-20240424205851-20240424235851-00713.warc.gz
CC-MAIN-2024-18
741
5
http://retirement.federaltimes.com/2013/03/31/furloughs-vs-buyouts/
code
Q. Can someone explain why furloughing workers would be the first step to save money? I would think buyouts would be first. There are thousands of CSRS employees just waiting for a buyout; why aren’t they being offered? A. You’re wrong. It’s far less expensive to the government to furlough employees than to pay them to leave. First, you don’t have to shell out any money. Second, you can furlough far more employees than you can get to take a buyout. Third, some of those who are furloughed will decide to retire at little additional expense to the government. Finally, needed employees will go back to work when the furlough is over.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710829.5/warc/CC-MAIN-20221201153700-20221201183700-00629.warc.gz
CC-MAIN-2022-49
644
2
https://forum.step.esa.int/t/manually-download-dems/34219
code
As I am working behing a strict company proxy, from time to time I face large problems to make SNAP work. For this reason, I have implemented a manual download of S1 orbits, in which the proxy settings are properly considered. In the same line, I would like to download the DEMs manually for processes such as Terrain-Correction. My question is, where can I get these files?. At least the tipical DEMs used for Sentinel-1 - SRTM 3 sec, 1 sec, etc. There are other use cases that would benefit from a simple process to download data files: people working on ships or remote field sites but also need to do some work with SNAP, and air-gapped systems. Maybe an “offline” mode could replace the download attempt with a recorder to generate a list of URL’s to be downloaded along with their target locations. There may be a way outside SNAP to record the URL’s, but currently SNAP experiences timeout timeout delays and processing failures. Most URLs for the DEMs can be found in the snap.auxdata.properties file. It is in the etc folder of the SNAP installation directory I may be mistaken, but I assume that many auxiliary file downloads are for specific times or areas, so only a few files from a DEM repository with global coverage are actually downloaded. These DEM URL’s are helpful, but a user would need to figure out which files cover their region-of-interest. dem_autoload looks very useful, but not easily discoverable. It might be good to have a document for “offline use cases” to collect offline upgrading and offline DEM downloads and extra detail (not everyone is familiar with
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710924.83/warc/CC-MAIN-20221203043643-20221203073643-00423.warc.gz
CC-MAIN-2022-49
1,603
8
https://phabricator.wikimedia.org/D596
code
Okay, doing just unit testing is fine. However, for the URL validation, it would be good to also have the old validation, at least for some of the protocols. Could you have it do the big regex validation for URLs that start with http, https, ftp or ftps? (I know the current regex has a different list of protocols, but that one is kind of strange.) This regex expression works fine for URL validation. Should i submit a patch having URL validation using this regex and only for http, https, ftp and fttps ? Well, the validation should also check that it starts with one of the allowed protocols. And doing something like "(ht|f)tps?" is clever, but maybe "too clever": it would be hard to add additional protocols to that set. By the way, this doesn't have to be one regex line - however you can get it working is good, as long as it's easily modifiable. - Updated regex expression You are right that trick won't be a feasible solution. I have changed the code with regex expression having option to add additional protocols. Please have a look. You mean to say that we should check via both ways that is via regex as well as wgUrlProtocols ? Okay, this way we will be able to check for common URLs as we are not sure whether wgURLProtocols is working correct. Is it fine, or you wanted something else because what I got from your earlier comment was that we will use regex for checking formatting and wgUrlProtocols for checking protocols? And sir I submitted the autoedit.php patch earlier, you haven't merged that? Was there any problem in that? @Kamsuri5 - I thought it over, and I regret to inform you that I won't take you for this GSoC project. There are five students vying for this project, so my standards have to be very high, and unfortunately you made too many errors during the creation of this patch. (Though the PF_Autoedit.php part is correct.) I'm trying to narrow it down as quickly as possible so that the students who aren't selected will have a chance to find another project this summer - I hope you look for something else and can find another project, whether with Wikimedia or another organization. Good luck. Alright tha's your call but actually the errors in the second patch occurred because I was not able to get from your comment that what exactly you are saying. I have contributed a lot of time to this project in past few days to have an in-depth knowledge of the same. This is my first time I am contributing to open source so maybe i was not able to understand a few things. But even after making errors I was the one who stood there to correct then. It is not that I lack in knowledge of coding. I can only request you to reconsider my work and would like to thank you for all your help and time.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400202007.15/warc/CC-MAIN-20200921175057-20200921205057-00520.warc.gz
CC-MAIN-2020-40
2,734
11
http://letsgokings.com/f15/free_virus_protection-78913-2.html
code
June 2nd, 2008, 11:06 PM #11 June 2nd, 2008, 11:44 PM #12 Is norton really that bad? I have Norton 360 (that I got for free from a buddy). Should I get rid of it and just use AVG? June 3rd, 2008, 06:10 AM #13 June 28th, 2008, 10:47 PM #14 Beerman, It was McGafee and thanks to you, I uninstalled and got good ole AVG back. Originally Posted by BeerMan June 29th, 2008, 12:59 AM #15 AVG is great. 8.0 hasn't given me any problems. June 29th, 2008, 01:18 AM #16 AVG is bogging both my laptop and my wifes laptop...im not really happy with it right now... June 29th, 2008, 02:50 AM #17 AVG 8.0 is not letting me print anything from IE 7. Must be a bug in one of the updates. Firefox is fine but even still I switched to Avast 4.8. July 15th, 2008, 06:01 PM #18 If you installed it with all of the defaults, it may be the Link Scanner is slowing down your browsing. Originally Posted by Bubbadel2 To turn it off, go to TOOLS | ADVANCED SETTINGS, choose LINK SCANNER in the left pane, and disable it from the right pane. If it was on, and you disable it, AVG won't be happy about it, and you will see a red exclamation mark over the AVG system tray icon. You can always uninstall/reinstall with the custom option, which allows you to not install the Link Scanner options, and you avoid the unhappy AVG icon. July 27th, 2008, 03:53 PM #19 I just bout a new Dell with Vista. Will Windows Defender for Firewall and AVG 8 or Avast! 4.8 be sufficient to cover all the threats out there or is there something else that I'm not thinking of? What do I need to load onto my new desktop to keep it safe? July 27th, 2008, 04:32 PM #20 i use norton on my pcs and have never had a problem with it, but then again im constantly running cleanups and adware scans id recomend getting ccleaner & adaware and running both those at least once a month, i run them once a week.
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206120.9/warc/CC-MAIN-20140423032006-00631-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
1,851
25
https://promotion.insideadog.com.au/firefighter-readathon/
code
So after seeing Inky’s post about ‘Authors for Fireys’ I had an idea. There are so many passionate reviewers on this site, and I felt like if everyone came together, we could really make something happen. So here’s my idea! A readathon! Like a fun run, but for books. I could create a blog, and add contributors, and family or friends can pledge to sponsor each reader a certain amount for every book they read and review (or write/draw something inspired on it) in set time frame. For example, my mum give will give $5 for every review I write (something along the lines of that) Then all the money raised will be donated to help fight the bushfires. I have no idea how to deal with money or promoting this (except for this post), but I thought it would be a great initiative to make concrete change with our posts. If this is already happening, or someone else has already suggested it, I’m so sorry I did not mean to plagiarise. Also, if this does end up getting enough attention, I’d love to have a wing-person to help, because I’m a little new to IAD. Edit: I’ve created the blog @ https://burningthroughbooks.insideadog.com.au/ if you want to participate, just comment with something like ‘I want to contribute’ or email inky at firstname.lastname@example.org with your username and the amount you are being sponsored per book. If you don’t know what I’m talking about, go check out the welcome page of the blog. I am pretty much tone deaf to implied meaning, 🙂 so if you say something like ‘cool idea’ and want to participate, I’ll just think you’re supporting my idea but don’t want to contribute (sorry to any of those people).
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251689924.62/warc/CC-MAIN-20200126135207-20200126165207-00073.warc.gz
CC-MAIN-2020-05
1,673
5
https://sengopal.medium.com/building-an-api-token-system-from-scratch-99e224db533b?source=user_profile---------2----------------------------
code
With the recent trend in microservices and service based architecture, APIs have taken a front seat for attacks of different kinds. OWASP has even created a list of top security threats to APIs and it is quintessential to create a best in class API security system which is constantly updated to protect itself from such threats. Token based authentication is one of the many steps that API security systems utilize to safeguard their resource APIs and this article describes some of the fundamental steps to consider while building your own api token system. So what is an API? There is an excellent article which explains what an API is and its responsibilities. API is simply an interface which is setup to communicate with applications instead of end-users. This definition itself poses an interesting problem on how to distinguish between good applications and bad applications and more importantly how to prevent bad applications from accessing your sensitive resources (APIs). What is an API? In English, please. Before I learned software development, API sounded like a kind of beer. What is OAuth 2.0? From the time of SOAP and XML based services, there were multiple authentication paradigms and specifications which help formulate a path to define and secure APIs. One such standard is OAuth 2.0 which is a framework in comparison to its older counterpart OAuth 1.0 which is a specification. Being a specification and due to its nature of secure artifacts usage and data exchange, OAuth 1.0 was cumbersome for implementation on mobile devices and other API consumers. OAuth 2.0 provides a more robust framework around which Identity providers, Resource owners and applications can communicate between each other without the need for the resource owner to share credentials to the application which is one of the biggest anti-patterns observed in an API-Application interaction. The Beginner’s Guide to OAuth Dancing Let’s start with the basics: OAuth stands for Open Authorization. It’s a process through which an application or… API Security Pipeline A typical API security pipeline has multiple filters and levels of security built on top of each other. Some of the commonly found pipeline elements are Authorization, Rate limiting, Resource Caching etc., However, all these security measures depend on “Authentication” to be performed accurately and with non-repudiation. For example in spring security, the API endpoint authorizations are configured using hasPermission method which depends on the authentication pipeline to identify the correct user and inject the appropriate and associated roles. So it is extremely important to design a token system architecture which can support extensibility and facilitate other API security needs. So what is a token? A token is a piece of data which only a specific authentication server could possibly have created & contains enough information to identify a particular entity or entities and are created using various techniques from the field of cryptography. Particular Entity — A token should always be carrying two type of entities within their identity subjects — an User and an Application. A token cannot/should always be tied to an Application entity and a token should alway carry the identity of the Resource owner who authenticate and accepted the permissions to share information and access to the resources. Cryptography — All security systems uses Cryptography techniques in one form or the other. Either when it comes to sharing an application secret with application developer, verifying the integrity of the resource data and so on. However, one of the key techniques that are used in token generation and validation for API access is called Private-Public Keypair which is utilized to enforce integrity checks of the token and ensure that the tokens have been indeed issued by the intended authentication server. The authentication server is the key system in place which is responsible for generating the tokens and validating them when presented to the resource APIs. Application Lifecycle Management Since the token system functions with an Application entity, it is essential that the lifecycle of the applications are embedded within the authentication server. For example, when a new application is registered, it is in a “Registered” state and when tokens are being generated, the application moves into an “Active” state. Sometimes the application might be “Blocked” due to erratic and risky behavior, calls beyond permitted bandwidth and so on. Token Lifecycle Management Similarly a token too goes through different stages in its lifecycle. For example, when a user consents to an application to access the APIs on their behalf, the token are generated as the result of the consent. However, the “access tokens” might expire soon and need to be refreshed using the “refresh tokens” and if the user revokes the consent, the tokens are revoked of their access to the APIs as well. It is crucial for the authentication server to manage this lifecycle within its system for token generation, refresh, validation and revocation cycles. What is the difference between a Refresh and an Access token? An “Access Token” as its name implies provides access to an API. This is the token that is sent to the resource server to obtain information or perform an action on behalf of the user. These access tokens are usually short lived to ensure that any MITM (Man-In-The-Middle) attacks does not expose long lived access. A “Refresh Token” on the other hand represents the consent provided by the user and is utilized to obtain a new “access token” when the current access token expires. The refresh tokens cannot be used to access any resource API and can be utilized only to generate a new access token. The second component of the authentication server is creating the token itself ie., building/constructing the token in a well-thought out and planned manner. Some of the commonly used identity providers and their sample token representations are given below. AgAAAA**AQAAAA**aAAAAA**E6+EWg**nY+sHZ2PrBmdj6wVnY+sEZ2PrA2dj6wMkIGkCJCGoA2dj6x9nY+seQ+/5wK1dskM5/3EOEY7BDg7VHK/CmDimCvVPbtJankHhzJUF8rU876Qzjs # Google ya29.GltiBRICgroWhf0XJ-e4nYpzc9UG0Fn_Ghq06_yg3BDZ4EHM_X8rIirEnFUJVb9uawqW2tE9yqfT0KwcaEXLKp7VFpde5v # Facebook How does a JWT token look like? Json Web Tokens (JWT) are one of the most commonly used standards for token representation. A typical JWT has three parts separated by a period ‘.’ symbol — Header, Payload and Signature. The header represents the algorithm used to sign the token payload while the payload contains the claim or subject information that the token represents. The signature is either generated using a shared secret (symmetric key) or using a private key secured within the authentication server and the token’s authenticity can be verified by the equivalent public key exposed by the authentication server. What goes in the claim? A good analogy for determining token contents is to that of web session cookies. A web session cookie contains every bit of information (either on the client side or on the server side) about the user access, authentication information which is utilized on every web call to the server to validate the veracity of the invocation and if the web interaction truly belongs to the authenticated user. Tokens should carry the same tenacity in its claim structure to capture every unique identifier possible to help establish trust on the API server side during invocation of the API resource. It is crucial to capture and evaluate both incidental (user and app entities) information and associative data (ip-address, time of access etc.,) during API access and cross-reference to identify risky patterns, similar to web access to prevent fraudulent activities. But then why does the tokens issued by identity providers such as Google, Facebook or eBay does not look like a JWT or SAML token. To find out, please continue reading the Part 2 of this series.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510481.79/warc/CC-MAIN-20230929022639-20230929052639-00073.warc.gz
CC-MAIN-2023-40
8,058
38
https://www.simscale.com/forum/t/pwc-does-the-wind-directional-results-account-for-the-probability-of-incoming-wind-from-that-direction-as-per-the-wind-rose/97283
code
Whenever you run a pedestrian wind comfort simulation you always get access to both the statistical average solution (wind comfort plot) and the wind directional results (shown below). Regarding the question of this post, there is a distinction that should be made clear between those two. The results per directions are purely based on CFD and are not weighted by probabilities coming from the wind rose. Essentially, for each wind direction, the Atmospheric Boundary Layer (ABL) profile associated with each wind direction is simulated as incoming wind. We use 10 m/s at 10 m height and the aerodynamic roughness from the wind exposure category associated with each wind direction, as parameters for the ABL generation. However, the statistical averaging (the one where you can visualize the comfort map) is where the wind speed probability based on the windrose is taken into account. In this step the probability of a wind speed at a particular point (which is obtained from the directional results) exceeding a threshold (based on wind comfort standard) is calculated. This [documentation ] (section 6) explains how the probability of wind coming from a certain wind direction is incorporated into the wind comfort map calculation.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816893.19/warc/CC-MAIN-20240414161724-20240414191724-00647.warc.gz
CC-MAIN-2024-18
1,236
8
http://enthuware.com/index.php/advanced-features/111-how-to-increase-font-size
code
The font size of ETS Viewer is too small. How can I increase it?Screen resolutions vary quite a lot and so it is possible that on some machines the default font size may look too small or too big. To alter the font size, you may either use Tools -> Font Size menu for small changes or you may run ETS Viewer with a command line option that allows you to alter the font size like this: java -DfontSizeIncrement=10 -jar etsviewer.jar You can specify however large increment you want in the font size.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190754.6/warc/CC-MAIN-20170322212950-00507-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
498
3
https://aisel.aisnet.org/amcis1998/58/
code
A neural fuzzy system was developed to estimate sovereign debt service capacity. This system performed at the comparable level as Probit, a common statistical method. Its performance compared favorably with a system developed using neural networks alone. Hwang, Mark; Liu, Weiping; and Lin, Jerry, "Assessing Sovereign Debt Service Capacity: A Neural Fuzzy System Approach" (1998). AMCIS 1998 Proceedings. 58.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103940327.51/warc/CC-MAIN-20220701095156-20220701125156-00618.warc.gz
CC-MAIN-2022-27
409
2
http://www.nwatson.nz
code
Hi there! I'm Nathaniel Watson, currently a Computer Science undergraduate at The University of Waikato in New Zealand. I'm a geek for anything that's powered by ones and zeros, a creator and explorer in the digital world and a lover of great design. I'm currently focused on furthering my skills in web and app development, while dabbling in my other passions - design, film, visual effects and photography on the side. GovHack 2016 - Locatio Enhance online property listings with census data Augment Humble Bundles with useful information New Zealand Flag Graph Interactive visualisation of the NZ flag referendum Components for the Pencil prototyping tool AKA "E2D2" - Bringing Expeditee to Android Desktop app for Awesomenauts players Expeditee Web Browsing Bringing web browsing features to Expeditee An Android shoot 'em up game Automatic camera focusing with a Kinect Agora Linux Design Design work for a fictional operating system A small website for a tutoring business. Matchmoving VFX work for a short film. A short film RT @thomaslebas: Using the STV Guide @Nathanielnw and I put together, we’ve visualised the results of @WgtnCC’s 2016 Mayoral Race: https://…@nathanielnw on Twitter Trying to use eye tracking to see where people look in video games has quickly turned into trying to play games wit… https://t.co/BHLHs2sBG7@nathanielnw on Twitter I edited the code for Gl█t̗͗ch𝕙e̊̽dCode Snippets on CodePen I've been reading A Knight of the Seven Kingdoms (The Tales of Dunk and Egg, #1-3)Reading history on GoodReads I've been working on nathanielw/pvsio-webCode on Github I've been listening to The 1975, Ellie Goulding and DaughterListening history on Last.fm If you have any questions, are interested in working together or just want to say hi, feel free to drop me an email at nathaniel (AT) nwatson (DOT) nz or send a tweet my way @nathanielnw.
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988725470.56/warc/CC-MAIN-20161020183845-00038-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
1,880
26
https://www.perlmonks.org/?parent=129920;node_id=3333
code
|XP is just a number| No. No. NO. NO. NO! A language has a certain syntax. Knowing that syntax is the responsability of the person who says "I know language XXX". It is not my responsability to make sure that I dumb down my code for your inability or unwillingness to keep your end of the bargain! I'm currently in a shop where use of $_, map, and grep is nominally discouraged. Why? Because others might not understand the code later down the line. (Yet, this place uses the most complex regexes I've ever seen, making me go to my book over and over.) If I was in C, would you discourage bit-masking? What about pointer arithmetic? Yes, they can cause problems, but they're a feature, not an 'oops'! Let me take another tack. Let's say you told me "I can read English". So, I write you a letter in English. No problems, right? Well, you start complaining about my use of the words with more than 6 letters. They're too difficult. You've never seen them. You don't like them. (And, yes, I've received this complaint before!) Should I not use a standard part of the language you have said you speak solely because you don't want to make good your assertion?!? I didn't think so. Don't go borrowing trouble. For programmers, this means Worry only about what you need to implement.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585196.73/warc/CC-MAIN-20211018031901-20211018061901-00626.warc.gz
CC-MAIN-2021-43
1,278
8
http://beta.slashdot.org/submission/2195203
code
christurkel writes "CDE, the Common Desktop Project, has been open sourced by the Open Group. You can find the source here: https://sourceforge.net/projects/cdesktopenv/ It has been tested on Debian Squeeze and Ubuntu. Testers are encouraged to join the project. Motif will follow in a few months once some legal issues are sorted out." Link to Original Source
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510272680.42/warc/CC-MAIN-20140728011752-00267-ip-10-146-231-18.ec2.internal.warc.gz
CC-MAIN-2014-23
360
4
https://www.spiedigitallibrary.org/profile/Thorsten.Koelzow-32570?SSO=1
code
In this paper, we present a novel approach for multiple-feature, multiple-sensor classification and localization of three-dimensional objects in two-dimensional images. We use a hypothesize-and-test-approach where we fit three-dimensional geometric models to image data. A hypothesis consists of an object's class and its six degrees of freedom. Our models consist of the objects' geometric data which is attributed with several local features, e.g. hotspots, edges and textures, and their respective rule of applicability (e.g. visibility). The model-fitting process is divided into three parts: using the hypothesis we first project the object onto the image plane while evaluating the rules of applicability for its local features. Hence, we get a two-dimensional representation of the objects which - in a second step - is aligned to the image data. In the last step, we perform a pose estimation to calculate the object's six degrees of freedom and to update the hypothesis out of the alignment results. The paper describes the major components of our system. This includes the management and generation of the hypotheses, the matching process, the pose estimation, and model-based prediction of the object's pose in six degrees of freedom. At the end, we show the performance, robustness and accuracy of the system in two applications (optical inspection for quality control and airport ground-traffic surveillance). This paper presents three novel matching algorithms, where a hypothesis of a 3D object is matched into a 2D image. The three algorithms are compared with respect to speed and precision on some examples. A hypothesis consists of the object model and its six degrees of freedom. The hypothesis is projected into the image plane using a pinhole camera model. The model of the used object is a feature-attributed 3D geometric model. It contains various local features and their rules of visibility. After the projection into the image plane the local environment of the projected features is searched for the best match value of the various features. There exists a trade-off between the rigidity of the object and the best-match position of the local features in the image. After the matching a 2D-3D pose estimation is run to get an updated pose from the matching. Three novel algorithms for matching the local features under the consideration of their geometric formation are decribed in this paper. The first algorithm combines the local features into a graph. The graph is viewed as a network of springs, where the spring forces constraint the object's rigidity. The quality of the local best matches is represented by additional forces introduced into the nodes of the graph. The second matching algorithm decouples the local features from each other for moving them independently. This does not impose constraints on the rigidity of the object and does not consider the feature quality. The third matching method takes into account the feature quality by using it within the pose estimation. One trend in modern object recognition from images is the use of multiple features and sensors which are combined for the object recognition task. To get better classification results the features used for the classification of the objects should be physically 'orthogonal'. To be independent of the kind of features and of their combination method, it is necessary to represent each feature in a unified measure. This measure should define the quality of the feature in the examined image. The measure must be unified, because only such a measure can be combined to a meaningful global result. This paper presents a method which normalizes different kinds of local features. A probabilistic approach is used which provides the unified measure. To map the feature information to a probabilistic interpretation, a generalized function model is used. It is largely independent of the type of application. Two examples of the presented method are shown. The first example uses the Chamfer-Distance to measure edge-features, the second one uses a gray-value correlation coefficient. This work presents a method for detection, localization, classification and pose estimation of objects in SAR-image sequences. Such methods have to deal with strong noise in SAR-images and have the challenge that shadows, which may occur, should not affect the recognition process. The disturbing effect of noise is significantly reduced in the presented method by temporal integration of the SAR-images, using a motion-model of the sensor. Thus it is possible to perform a segmentation on the integrated images with quantile-thresholds and a region growing algorithm using an edge image created by a Canny-edge detector. To be independent of the number of objects in the image and the brightness of the image, a multi-threshold approach is used. By accumulating the segmented images, following an analysis of the homogeneity of the accumulated segments, it is possible to identify stable segments as possible objects. An optimization process is used to fit a generic model of a house into the stable segments. As initial values for the optimization process the results of a connected-pixel algorithm are used. An application example is presented, in which house-objects can be separated from shadows in a village formation and their pose can be determined correctly.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583515564.94/warc/CC-MAIN-20181023002817-20181023024317-00076.warc.gz
CC-MAIN-2018-43
5,364
8
https://stellar.stackexchange.com/questions/286/what-is-the-safest-way-for-users-to-sign-transactions-over-the-web
code
I'd like to build a web wallet that let's people make transactions. I'm best at python so right now I ask for the secret key in a form with the other transaction information, send it to my server, build the transaction, sign it, and send it to the Stellar network. I am not a security expert, but I am fairly confident that sending the secret key to my server is a potential attack area. Is there a good way to deal with this? My two thoughts are: Build the entire transaction on the server but somehow send it to the client to be signed and sent to the stellar network. Build a downloadable exe file that has all of the code to build the transaction that the user can download, sign and hit run. Both of these options would require a significant amount of work I'd rather avoid, but I'll do what's necessary to protect my future users. Any advice is appreciated. Thanks!
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948235171.95/warc/CC-MAIN-20240305124045-20240305154045-00100.warc.gz
CC-MAIN-2024-10
871
6
https://forum.snapcraft.io/t/how-to-remove-proxy/30383
code
I’m kinda new to linux so this is probably a very dumb question, and I probably did a very dumb thing but please bear with me. I tried installing pycharm but it couldn’t connect to the snap store. So I saw this answer and set system proxy using this commad sudo snap set system proxy.http=“http://<proxy_addr>:<proxy_port>” sudo snap set system proxy.https=“http://<proxy_addr>:<proxy_port>” After I did that I am getting the following error: error: cannot install “pycharm-community”: Post “http://<proxy_addr>:<proxy_port>”: invalid port “:<proxy_port>” after How do I revert this? I did manage to install pycharm from the official package but I want to reverse this to install other things from the snap store. I am using Arch linux.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104244535.68/warc/CC-MAIN-20220703134535-20220703164535-00333.warc.gz
CC-MAIN-2022-27
760
10
http://www.pixiepalace.com/2006/04/09/two-championships/
code
April 9th, 2006 at 12:34 pm (Outside News) This year is a milestone for the University of Wisconsin Hockey department – both the womens and mens teams won NCAA championships! Congratulations Badger Hockey! Powered by Wordpress Design by Beccary and Weblogs.us
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281202.94/warc/CC-MAIN-20170116095121-00379-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
261
4
https://forums.freddyshouse.com/threads/proposed-new-forum-layout.245052/page-3
code
Seriously, if you cannot be arsed to go look at the testforums then to be perfectly honest I will disregard your opinion. how do i log into the test forum Secretly I hope you were being sarcastic. In your subtle way.I think he means too many categories, which was sorta what I was getting at the other day. I'm never subtle mate, it just leads to being misinterpretedIn your subtle way. So you think the DAoC, Rift et al should be sub-forumed? I'm not sure Eve will support a forum but I thought I'd give it the benefit of the doubt at first. -[Global category title] --Announcements --The Sofa [or whatever Wazz suggestion beats this] --Techie Discussion --PC Games ---DAoC ---Rift ---Eve --Console Games --Feedback -BarrysWorld --A --B --etc
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710421.14/warc/CC-MAIN-20221210074242-20221210104242-00749.warc.gz
CC-MAIN-2022-49
743
7
http://stackoverflow.com/questions/12539126/how-to-include-jar-files-in-my-eclipse-project/12539204
code
I'm new to android and java. I downloaded the GSON library for use in my android project which exists in Eclipse. I lookup instructions on how to use the jar file in my project and it says... Quote... You can use a third party JAR in your application by adding it to your Eclipse project as follows: In the Package Explorer panel, right-click on your project and select Properties. Select Java Build Path, then the tab Libraries. Press the Add External JARs... button and select the JAR file. Alternatively, if you want to include third party JARs with your package, create a new directory for them within your project and select Add Library... instead. It is not necessary to put external JARs in the assets folder ...UnQuote I'm afraid that I don't know the difference between "using a 3rd party jar in my project" and "include third party jars with my package." I want to be able to use the GSON methods in my Android phone application and, of course, have the capability deployed in my .apk. So, Which do I want to do? Thanks, Gary
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448399455473.15/warc/CC-MAIN-20151124211055-00107-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
1,035
6
https://discourse.jupyter.org/t/curvenote-scientific-writing-platform-that-connects-to-jupyter/7987
code
I am working with @stevejpurves and @lheagy on Curvenote, which is a scientific writing platform that integrates to Jupyter. Our goal is to make it really easy to share, and remix interactive content from Jupyter into reports/papers, as well as make that content a bit more accessible to contribution from non-Jupyter/git/code/md people. Right now we have a Jupyter extension that adds some version control and commenting to Jupyter, and then allows you to remix outputs/figures/etc. into articles that you write in Curvenote. When you comment on/update something in one place that comment shows up wherever the cell/output is used - including directly in Jupyter. That works for content as well, and the default we have chosen in MyST. Bit of a screenshot here: I have been following along on some of the RTC work and really excited about it. We recently open-sourced our scientific editor as well as some of our commenting components – which @choldgraf almost got us to call “floaters” – alas. I am always inspired by the tutorials that I see in Jupyter, and want to help make that sort of content easier to write/edit and collaborate on. Looking forward to working more with this community! And would love to answer and questions about curvenote/our-plans/overlaps!
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103355949.26/warc/CC-MAIN-20220628050721-20220628080721-00394.warc.gz
CC-MAIN-2022-27
1,276
6
https://www.telerik.com/forums/accessing-shapes
code
Is there a way to access multiple shapes on the mouse over event? Using the demo below, I'd like to highlight Alaska and the continental US when hovering over one of them. 2 Answers, 1 is accepted answered on 10 Jul 2014, 07:03 AM The existing shapes are accessible through the shape layer drawing surface (e.g. map.layers.surface). I'll provide an alternative for the moment, as this part of the API is still unofficial and subject to change. It will be made public for the next release. My suggestion is to store a reference to the desired shapes in the shapeCreated event. Those are live objects that will respond to changes in fill, stroke, etc. Does this make sense? Join us on our journey to create the world's most complete HTML 5 UI Framework - download Kendo UI now!
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474808.39/warc/CC-MAIN-20240229103115-20240229133115-00377.warc.gz
CC-MAIN-2024-10
775
8
http://programmers.stackexchange.com/questions/tagged/rad?sort=active&pagesize=15
code
What is the recommended strategy to deal with a frequently changing database model during development A lot of projects have a to be determined database model during early development. This could mean that a lot of SQL will have to be rewritten frequently. What is the recommended strategy to deal with ... Does RAD allow you changes or modification after the cutover phase without the need to redo the system? [closed] Like other agile models, that is a close loop where changes after the system development can still be implemented without the need to redo the whole system, is this possible for the RAD model as well? ... I am trying to use RAD for our school project and i was searching for a model diagram to follow but i found 2 1st is the ladder type found here: 2nd is this one found here: so i'm really ... A bit of a background here - we are a small team (of 5) of RAD developers responsible for internal software development in a big non-software company. "Internal software" varies from a desktop .NET ... I do not know if this would be the right stack exchange site to ask this question but I have been researching on RAD (Rapid Application Development) and Agile methodologies and was trying to find ... Wikipedia says that Agile is a type of "RAD" which I guess is incorrect. From what I know, Agile was developed becasue RAD itself was not that sucessfull in 90'S (too rigid for changes). Or am I wrong?... Over last one year or so, I have driven my team towards the release-early-release-often mode of development (AKA: Rapid Application Development, not Agile). For more information about the manner in ... I have two questions: Question #1: Is there any well known project to VBify C? VBify here means to make it as easy as in VB.NET and to make C well supported in IDE just like VB.NET, i.e. with ... I have used RAD tools for windows and web development for many years (primarily Infragistics). I invariably find myself in some situation where I have a very difficult time figuring out what is going ... What is the main difference between a Rapid Application Development tool like MonoDev and Visual Studio, is an RAD more focused on one thing? I'm looking to make a web application, are there ...
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257823387.9/warc/CC-MAIN-20160723071023-00077-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
2,219
12
https://uhra.herts.ac.uk/handle/2299/7428
code
Comparisons of images derived from independent Zeeman Doppler imaging codes Hussain, G A J Donati, J F Collier Cameron, A Barnes, J R We compare surface brightness and magnetic field surface maps for the K0 dwarf AB Doradus, obtained using two independently developed Zeeman Doppler imaging codes. We find that even the fine structure in the two sets of images shows excellent agreement. Magnetic field maps appear to be less sensitive to line-modelling effects than brightness maps. We argue that these results point to the consistency and reliability of Doppler imaging techniques even when using poorly sampled data sets, provided that the spectra used are of sufficiently high signal-to-noise ratio.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100651.34/warc/CC-MAIN-20231207090036-20231207120036-00818.warc.gz
CC-MAIN-2023-50
703
6
https://github.com/prasincs/vim-config
code
I got tired of replicating the same vim settings for all the computers I use. Hence this project. If you want to use it for your own projects, you're welcome to do so. This project has been used in various versions of Linux, BSD and OS X (on MacVim) After cloning the repository at a location, say, $HOME/vim-config, you want to make symbolic links of vim to $HOME/.vim and vimrc to and then run git submodule update --init --recursive Or, you can just clone using git clone firstname.lastname@example.org:prasincs/vim-config --recursive You'd want to symlink $HOME/.gvimrc. Additionally, I use $HOME/.vimrc_local to store things specific to my machines, or when I'm debugging scripts. They're all included using Pathogen from the vim/bundles directory. - Powerline -- I know I should use the Python version but it's way too much yak shaving - Fireplace (for Clojure) - Surround -- I rarely use it but it's handy to have around - Go support Basically.. the dependences for getting the whole thing to work are Vim - compiled with python support. You'd want this for the Python support and eventually the updated python version of Powerline Node.js -- with npm -g doctorjs I'll be adding a more serious features list that'd be updated as I add/remove things, tweak features but currently there are too few users to bother really. Although it could help me remember what I'm doing better.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499768.15/warc/CC-MAIN-20230129211612-20230130001612-00226.warc.gz
CC-MAIN-2023-06
1,385
20
http://glossynews.com/mpf/tutorial.htm
code
Tutorial Overview for Glossy Writers | Copy Edit This isn't everything you need to know, it's a good start... read all pages relevant to you and your level of involvement. If you want the really detailed everything-there-is-to-know about the software, go to Interactive Tools website and read their Product Documentation. It's far better than my tutorial, but just like this page, no one friggen' reads it. The automated system was implemented to save all of us a bunch of time and energy, and it needs to do that. It also should save the editors a lot of headache. Nothing more exasperating than going back through and re-doing someone else's shoddy, half-assed work. - Login by clicking here. Remember to put your author name and contact info on the article or we won't know who sent it. - Date - Don't worry about this unless you are a "trusted writer" or "editor" - Title - Put your catchy headline here. - Category - Not everything is a Top Story. Sports, horoscopes and KidsZone? All pretty straightforward. Everything else? Kind of muddy. Really look at the list to find something that applies. Don't use Randomizers or Letters to the Editor though, those are special categories. - Filename - Feel free to specify something here. If you don't, it will be assigned as something like article_715.shtml. Type in something pertinent to your story plus a long-form of the date. For example, if your headline is "Scientists Determine Wombats Rather Sexy", you could type in wombats-sexy-05122004 and the new filename will be wombats-sexy-05122004.shtml. (The number is critical in making Google News list the article.) - Article Type - Very important! All of these MUST be left as "Full Article". - Author - Um, like put your name here. - Comments to Editorial Staff - This is where you might say, "Kind of rough at the end, maybe clean up for me?" or perhaps "This is very timely, try to get this out by tomorrow", or "I was thinking midgets for the picture, with a caption something like, "Mark and Brian tag-teamed these midgets from Charlotte to Bankok."... you get the idea. - Summary - Put the first paragraph of the article in here. Just like that, done. Not five words, not 200 words, just about a paragraph. Two or three sentences. Done. - Content - Put everything INCLUDING the first paragraph here. Don't use paragraph codes like <P>, you don't need them. This box reads a space as a space and two line breaks as two line breaks. - Preview Without Publishing - This will open your creation in a new window. None of the links will function, it's just about seeing what you've made. If this button doesn't work you probably have a popup blocker installed and will need to disable it. MAKE SURE you preview the article before submitting. Look for ugly mistakes that will take editorial time to fix. The cleaner it is, the quicker it'll be published. - Upload images - If you wanna go that route, go here instead. So there you have it, that's the whole gross overview. If you have no images, and your copy-edit is flawless, this screen is all you'll need. If you need more of that other stuff, click on my friends, click on.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585837.82/warc/CC-MAIN-20211024015104-20211024045104-00006.warc.gz
CC-MAIN-2021-43
3,132
18
https://emba.gnu.org/emacs/emacs/-/commit/f561e49a25cace5e6d3cf3b222d87fa483226f76
code
Allow specifying local ELPA mirrors in package-archives. * emacs-lisp/package.el (package-archives): Accept either ordinary directory names, in addition to HTTP URLs. (package--with-work-buffer): New macro. Handle normal directories. (package-handle-response): Don't display the failing buffer. (package-download-single, package-download-tar) (package--download-one-archive): Use package--with-work-buffer. (package-archive-base): Rename from package-archive-url. Showing with 77 additions and 57 deletions
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499654.54/warc/CC-MAIN-20230128184907-20230128214907-00407.warc.gz
CC-MAIN-2023-06
506
3
https://physics.stackexchange.com/questions/217789/theoretically-how-does-quantum-decoherence-induce-noise/217796#217796
code
The decoherence process has allowed us to explain various (classical and decoherence) sources of measurement noise in quantum systems. I intuitively understand this physical concept of decoherence-inducing-noise. I am trying to understand this concept from an information theoretic perspective. We know that the environment-induced-decoherence takes away state information from a system. That would imply reduction in entropy of the system. Now analyzing the modeling process, the measurement process of a (environment induced) decohering system can be modeled by adding "noise" terms. That would imply addition of entropy to the system. Which is contradicting. So my question is, from an information perspective, how can the (environment-induced-)decoherence process consistently (theoretically) describe the occurrence of (non-classical) noise? Or, what is the nature of such a noise? Edit This is an explanation on why I think that decoherence might lead to reduction in entropy. I am using an information theoretic interpretation on entropy for this purpose, which can be interpreted as the amount of information that you lack about the exact physical state of the system (see https://physics.stackexchange.com/q/119515). The measurement problem has 3 parts (Schlosshauer book on Decoherence). For this discussion only first 2 are relevant: 1) the problem of preferred basis and 2) the problem of non observability of interference. Consider an unknown system that is initially isolated. Now I (or the environment) make measurements on this system and that makes the system vulnerable to decoherence. So it happens that through einselection I can find a set of robust states that are least prone to decoherence (pointer states) Let's call them $|\Psi_1\rangle$ and $|\Psi_2\rangle$. So this process allowed me to gain more information about the system, then I had before. Hence, the reduction in entropy! Now of course, initially the system was in a pure superposition of these states say $|\Psi\rangle = \alpha |\Psi_1\rangle + \beta |\Psi_2\rangle$, with a definite $\alpha$, $\beta$, therefore zero entropy. But as an observer with no initial knowledge of the system (an alien observer on system earth!) I model my belief on the system as an arbitrary superposition, say $|\Phi\rangle = a|\Phi_1\rangle + b|\Phi_2\rangle$ with unknown $a$, $b$, therefore a positive entropy. Now ofcourse, through the measurement process (and thanks to the physical process of einselection) I can find relationships between $(\alpha, \beta, \Psi_1, \Psi_2)$ and $(a,b,\Phi_1,\Phi_2)$. Hence, this entire process of measurement has 2 competing entropy elements, 1) First entropy element that is reduced by gaining knowledge on the pointer states, hence the basis and coefficients, 2) second entropy element that increases due to the maping of pure states to mixed states.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571911.5/warc/CC-MAIN-20220813081639-20220813111639-00479.warc.gz
CC-MAIN-2022-33
2,859
6
https://www.tasteless.eu/post/2014/10/asis-ctf-finals-2014-sattelite-ppc-200/
code
ASIS CTF Finals 2014 - Sattelite (PPC 200) This task revealed to be pretty easy despite the 200 points. We basically need to connect to a remote service and solve SAT for some boolean formulas. The input format is binary, where a bit at position i represents the value of x_i_ (e.g.: 011 means x1=False, x2=True, x3=True). Here’s an example: hi all, You must send a string for each level that would make the literal True send "Sattelite" Sattelite (¬x3 ∨ ¬x5) ∧ (x3 ∨ ¬x3) ∧ (¬x5 ∨ ¬x4) ∧ (¬x2 ∨ x5) ∧ (x5 ∨ x4) 00001 OK The only difficulty we encountered was caused by a bug on the challenge: the length of the binary string passed as input needs to be equal to the number of boolean formulas concatenated with AND, so we need to pad our input with zeroes sometimes (e.g.: (¬x1 ∨ x2) ∧ (x2 ∨ x1) ∧ (x1 ∨ x1) requres a solution like 110 and not 11).
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991693.14/warc/CC-MAIN-20210512004850-20210512034850-00573.warc.gz
CC-MAIN-2021-21
886
4
http://sourceforge.net/p/mantisbt/mailman/mantisbt-dev/thread/1075391574.7427.56.camel@athlonxp.bradney.info/
code
(repost from the mantis-help list) Firstly, I have to say thanks to the Mantis team. Excellent job on a great system. We have been using it for the Scribus Linux DTP project (www.scribus.net) for a couple of months now. Having read the few emails come through on the list re configuration options, and scanned the documents I have the following question. Is it possible to tell Mantis to put certain fields on the bug list by config settings? That is, I would like the version field to be displayed. Perhaps I have to customise the php/html? Whats the best place to do so, if so? I would prefer to avoid customisation as much as possible in terms of the code (as opposed to the config files) as the spare time I do have goes towards Scribus.
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375099361.57/warc/CC-MAIN-20150627031819-00158-ip-10-179-60-89.ec2.internal.warc.gz
CC-MAIN-2015-27
741
13
http://stackoverflow.com/questions/13287021/python-copying-an-entire-workbook-with-xlrd-xlwt-and-xlutils
code
I simply want to copy an entire workbook. There is information to be added later which I am having no trouble finding how to add the information to single cells etc... Yet I have not found a way to copy an entire sheet. Perhaps I'm overcomplicating this but any input is appreciated. Thanks!
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737934788.65/warc/CC-MAIN-20151001221854-00253-ip-10-137-6-227.ec2.internal.warc.gz
CC-MAIN-2015-40
291
1
https://fedoraproject.org/w/index.php?title=Ask_fedora&direction=next&oldid=260384
code
Ask Fedora is a community knowledge base and support forum and designed to be the primary place for community support in Fedora. It is powered by Askbot, Django based web application. Rahul Sundaram has explained the history of the project here. If you have any feedback on Ask Fedora, you can directly post a comment or question to the site and tag it as "meta". You can also join us at #askbot IRC channel in irc.freenode.net or post to Fedora infrastructure mailing list. Do read the standard operating procedure if you want to help with infrastructure of Ask Fedora. You can participate by asking questions or answering them in http://ask.fedoraproject.org, testing the staging instance, designing a logo or a mascot or developing features for Askbot. Askbot is a Django based web application and if you are a Django/Python programmer, we would love to have your participation. Rahul Sundaram initiated a earlier effort for editors to interface with developers and directly answer user questions as part of the Fedora Weekly News. This effort didn't scale and is now defunct.
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669795.59/warc/CC-MAIN-20191118131311-20191118155311-00517.warc.gz
CC-MAIN-2019-47
1,079
4
https://phabricator.wikimedia.org/T20231
code
Usually, any XML-based markup follows this pattern: <tag attribute="Attribute">Text</tag> However, the ref element confuses attribute and text: <ref>Attribute</ref>. This makes it impossible to know, which sentence or paragraph of the text is addessed by the ref element: Example 1 (current ref element): *This is the first sentence. This is the second sentence.<ref>Somewhere</ref> Obviously, nobody knows in example 1, if the source references the first and the last or only the last sentence. Example 2 (suggestion): *This is the first sentence. <ref source="Somewhere">This is the second sentence.</ref> Here, it is quite obvious, that the source references the second sentence. This is, because this example follows correct XML markup. Everyone knows know, where to find the source for any remark in a text. This problem has already been discussed in the German Wikipedia and has been deemed to be necessary to fix it: http://de.wikipedia.org/wiki/Wikipedia:Verbesserungsvorschl%C3%A4ge/Feature-Requests#Verbesserung_des_ref-Elements_f.C3.BCr_Quellenangaben
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656833.99/warc/CC-MAIN-20230609201549-20230609231549-00472.warc.gz
CC-MAIN-2023-23
1,062
9
https://llamalab.com/automate/community/flows/23924
code
by Andrew McAuley Version 4 (September 11, 2018) Download (183 downloads) Ever find logs useful? Don't want to delete it but still find yourself scrolling through endless pages of greyed out INFO entries? I may just have the tool for you. Rather than clear the entire log, this tool reads each line of the log checks if it's a discardable INFO log, and keeps the rest. ▪️Permission to read and modify SD card (purely just for the logs) How To Use ▪️Download the flow ▪️...and whenever you need easier logs to read ▪️Pour yourself a cuppa tea and watch the progress in your notifications ▪️...and if that's not enough, you can even geek out to saved space stats in the log - phewee. ▪️2018-08-29: Added a delay before each file read/write as per Cook IT's suggestion. It shouldn't cause a substantial slowdown, but will hopefully that will resolve any "hang" time. ▪️2018-08-30: After testing, added a more robust fix for "hang" time. Now hands control back to Automate every 50 lines or so to ensure no freezing occurs. ▪️2018-08-30: Now uses 2-3 times less memory, should be much snappier ▪️2018-09-11: Now shows its progress as cleans your logs as a notification. Rate and review within the app in the Community section.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645595.10/warc/CC-MAIN-20230530095645-20230530125645-00515.warc.gz
CC-MAIN-2023-23
1,258
16
https://discuss.elastic.co/t/apm-kibana-redis-not-shown-as-a-dependency/310800
code
Kibana version: 7.17 Elasticsearch version: 7.17 APM Server version: 7.17 APM Agent language and version: Ruby 2.5.3 (Rails 4.2) Browser version: Chrome 103.0.5060.134 Original install method (e.g. download page, yum, deb, from source, etc.) and version: RubyGems Fresh install or upgraded from other version? Fresh Install Is there anything special in your setup? For example, are you using the Logstash or Kafka outputs? Are you using a load balancer in front of the APM Servers? Have you changed index pattern, generated custom templates, changed agent configuration etc. Description of the problem including expected versus actual behavior. Please include screenshots (if relevant): I'm working on moving from NewRelic to Elastic APM for our Ruby on Rails app. One issue I noticed is that Redis is not showing as a dependency in Kibana. Other dependencies are appearing without issues (mysql, external api calls). I can see there are transaction Traces with references to Redis. We have two Redis instances (Azure Cache for Redis) that we connect to: - The first is for caching (Rails.cache) - The second is for queuing/background job processing (Resque) I'm able to see both of these Redis dependencies in NewRelic, but not with Kibana/Elastic APM. I would expect to see both Redis instances as dependencies. Provide logs and/or server output (if relevant): Let me know what information is relevant for this. Any Help is greatly appreciated!
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335469.40/warc/CC-MAIN-20220930113830-20220930143830-00722.warc.gz
CC-MAIN-2022-40
1,446
18
https://sourceforge.net/directory/natlanguage%3Afrench/os%3Alinux/license%3Aosi/?page=8
code
PHP-Fusion, a lightweight open source content management system (CMS). PHP-Fusion is written in PHP and MySQL and includes a simple, comprehensive administration system. Low-latency, high quality voice chat for gamers Mumble is an open source, low-latency, high quality voice chat software primarily intended for use while gaming. It includes game linking, so voice from other players comes from the direction of their characters, and has echo cancellation so the sound from your loudspeakers won't be audible to other players. phpFreeChat is a free, simple to install, fast and customizable chat that uses by default files for message and nickname storage. It uses AJAX to smoothly refresh and display the chat zone and the nickname zone. Create your LiveUSB MultiBoot simply. - English (Thanks Steve for translation this text) Create your MultiBoot LiveUSB simply with MultiSystem. Just Drag & Drop your .iso on a window and that's it! MultiSystem enables a LiveUSB to do everything, ideal for exploring different Linux distributions without installing them on your PC, easily ! - Français Avec MultiSystem Créez votre LiveUSB MultiBoot simplement. Vous avez juste à Glisser/Déposer vos fichiers .iso sur une fenêtre et c'est tout ! MultiSystem permet de réaliser un LiveUSB à tout faire, idéal pour découvrir différentes distributions linux sans les installer sur votre PC, et ce de manière fluide. Matroska is an open standard audio/video container format. Visit our homepage at http://www.matroska.org GPX viewer and analyzer GPXSee is a GPS log file viewer and analyzer that supports GPX, TCX, KML, FIT, IGC and NMEA files. Collabtive is web based project management software. Simple and easy. Collabtive is web based collaboration software. It is an Open Source alternative for proprietary tools like Active Collab or Basecamp. Features include: Projects, Instant Messenger, Tasks, Files, Timetracking, Multilanguage, Basecamp import Bluefish is a powerful editor for experienced web designers and programmers. Bluefish supports many programming and markup languages, but it focuses on editing dynamic and interactive websites. A GUI to ease the process of producing a multipage PDF from a scan. gscan2pdf should work on almost any Linux/BSD machine. Virtual Pipe Organ Software GrandOrgue is a sample based pipe organ simulator. When connected to MIDI keyboards and an audio system, it can accurately simulate the sound of a real pipe organ. This application has builds for Linux, Windows and OS X. Enterprise project management and alternative to Project Server ]project-open[ is Web based enterprise project management application with a focus on finance and collaboration. It’s main purpose is to coordinate the work of project managers, project members and stake holders across multiple projects. Target organizations are companies or corporate departments that need to track finances, tasks, and resources for a large number of concurrently running projects. ]project-open[ consists of about 200 modules for resource management, time sheet management, HR, CRM, ITSM, collaboration and financials. ]po[ is built on top of OpenACS.org, an open-source Web platform featuring role-base permissions, workflows, dynamically extensible objects and full-text search. deletes junk files to free disk space and improve privacy BleachBit frees disk space and maintains privacy. Cleans cache, Internet history, temporary files, logs, cookies, Firefox, Google Chrome, Flash, Windows, Linux, and more. Downloads are at www.bleachbit.org and source code is at GitHub. AMX Mod X is a Metamod plugin which allows you to write modifications for Half-Life with Small scripting language. It provides in-game administration tools, game statistics, server management and gameplay modificators. It is based on the original AMX Mod StepMania is a music/rhythm game. The player presses different buttons in time to the music and to note patterns that scroll across the screen. Features 3D graphics, visualizations, support for gamepads/dance pads, a step recording mode, and more! WE HAVE MOVED TO GITHUB. for Adium, Pidgin, Miranda and Telepathy IM Framework Please make sure to read this page: http://sourceforge.net/p/sipe/wiki/Frequently%20Asked%20Questions/ A third-party Pidgin/Adium/Miranda/Telepathy plugin for the extended version of SIP/SIMPLE used by various products: * Skype for Business * Microsoft Office 365 * Microsoft Business Productivity Online Suite (BPOS) * Microsoft Lync Server * Microsoft Office Communications Server (OCS 2007/2007 R2) * Microsoft Live Communications Server (LCS 2003/2005) Framework for Rapid Development of Java Web applications Framework for Rapid Development of Java Web applications. Allows to define applications just with POJO , JPA and Java annotations. Mibew Messenger is an open-source live support application allowing visitors of your site to chat with your operators. Torrent Search is a cross-platform application, allowing to search for torrent files on different websites. Supported websites are integrated through plugins, which allows to easily extend the number of websites supported. Formerly AjaXplorer, file sharing platform for the enterprise **** TO DOWNLOAD PYDIO 7 GO TO PYDIO.COM **** Pydio is the mature open source alternative to dropbox and box, for the enterprise. Why building your own box? You need to access your documents across multiple devices, and regularly share documents (weblinks) and folders with your contacts and teams. Still, using a consumer SaaS box or drive service is neither practical nor safe. And enterprise SaaS box or drive services are expensive and come with Disk Storage that you already have on your servers or private cloud. How to build your own box with Pydio? Easily install Pydio on your servers or cloud of choice, Simply share documents and folders with your teams, Administrate your box with an Entreprise grade console (rights, groups, plug ins), Access documents with a Web Gui, Smartphones and tablet apps (iOS, Android), Sync folders on your computer (PC, Mac, Linux,Web,Tablets). An automated, Web based IP address management (IPAM) software. It features powerful search and filter functions for both networks and host, as well as many tools (e.g. a subnet calculator) helping Administrators to plan and handle complex IP networks NOTE: FontForge has moved to fontforge.github.io, newer binaries and sources are available at github.com/fontforge. FontForge allows you to edit outline and bitmap fonts. You may create new ones or modify old ones. It is also a format converter and can interconvert between PostScript (ascii & binary Type1, some Type3, some Type0), TrueType, OpenType (Type2), CID, SVG Your linux deployment tool! m23 is a free software distribution system (license: GPL), that installs (via network, starting with partitioning and formatting) and administrates (updates, adds / removes software, adds / removes scripts) clients with Debian, (X/K)Ubuntu, LinuxMint, openSUSE, Fedora and CentOS. It is used for deployment of Linux clients in schools, institutions and enterprises. The m23 server is controlled via a web interface. A new m23 client can be installed easily in only three steps. Group functions and mass installation tools make managing a vast number of clients comfortable. The integration of existing clients (with .deb-based distributions) into the system is possible, too. Client backup and server backup are included to avoid data loss. With the integrated virtualisation software, m23 can create and manage virtual m23 clients, that run on real m23 clients or the m23 server. Scripts and software packages (for installation on clients) can be created directly from the m23 web interface. A cross platform GUI for several code formatter, beautifier and indenter like AStyle, GNU Indent, GreatCode, HTML Tidy, Uncrustify and many more. Main feature is a live preview to directly see how the selected formatting option affects the source code. A Jump and Run game like Super Mario World with an advanced Editor and highly detailed Graphics based on SDL with a OpenGL accelerated Graphics Renderer developed in C++. Runs under Linux, Windows and Mac and can be easily ported to other platforms. This is one of the most popular Doom source ports. It is available for DOS, Windows, Linux and Mac OS X, and should build on any POSIX platform which supports SDL. It enhances Doom with things like TCP/IP networking, OpenGL renderer, Heretic support and much more.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257646875.28/warc/CC-MAIN-20180319101207-20180319121207-00472.warc.gz
CC-MAIN-2018-13
8,505
36
http://www.engii.org/ws2016/Home.aspx?ID=717
code
The 8th Int'l Conference on Computational Intelligence and Software Engineering (CiSE 2016) will be held from May 29 to 31, 2016 in Nanjing, China. This Conference will cover issues on Computational Intelligence and Software Engineering. It dedicates to creating a stage for exchanging the latest research results and sharing the advanced research methods. CiSE 2016 will be co-located with the following conferences: The 2nd Conference on New Advances in Big Data (NABD 2016) The 2nd Conference on Semantic Web and Natural Language Processing (SW-NLP 2016) The 2nd Conference on Cloud and Web Services (CCWS 2016) The 3rd Conference on Sensors and Networks (CSN 2016) The 2nd Conference on Internet of Things and Smart City (IoTSC 2016) The 3rd Conference on Information Security (CIS 2016) CiSE 2016 is devoted to the advancement of Computational Intelligence and Software Engineering. Computational intelligence (CI) is a set of nature-inspired computational methodologies and approaches to address complex real-world problems to which traditional approaches, i.e., first principles modeling or explicit statistical modeling, are ineffective or infeasible. Software engineering is the study and an application of engineering to the design, development, and maintenance of software. The scope of CiSE 2016 is including, but not limited to the following topical subheadings: artificial intelligence, data mining, parallel and distributed computing, and software engineering. CiSE 2016 will be a valuable and important platform for inspiring international and interdisciplinary exchange at the forefront of Computational Intelligence and Software Engineering. The Conference will bring together academicians, scientists, engineers, and technicians from all over the world, and we hope that you will take this opportunity to join us for academic exchange and visit the city of Nanjing. We look forward to seeing you in Nanjing in May 2016. Publication and Presentation All the accepted papers will be published by "Journal of Computer and Communications" (ISSN:2327-5219), a peer-reviewed open access journal that can ensure the widest dissemination of your published work. For more information, please visit: http://www.scirp.org/journal/jcc/ You’re welcome to submit abstracts for presentation. The abstracts are only used for an oral presentation and will not be published in the conference journal.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190754.6/warc/CC-MAIN-20170322212950-00075-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
2,403
15
https://forums.wincustomize.com/316930/is-it-possible-in-cursor-fx
code
I need help, I want to know as I can extract the images (.png) of a file (.cursor FX Theme). With the program cursor xp, was easy to do it with winzip, but with this new program I can not, if somebody knows, how can I see the png images from a finished cursor?, please say me. Because I need to extract (.png) images or frames of the cursors that already I did. I need those images to send them to a friend. and is complicated to do everything again, to the form in which I make the animations.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587659.72/warc/CC-MAIN-20211025092203-20211025122203-00374.warc.gz
CC-MAIN-2021-43
494
2
https://upskillstutor.com.ng/tutors/piano-playing/abuja/
code
I am currently a Master's student at Nigerian Defence Academy Kaduna. On my thesis at the moment. I hope to graduate by September with distinction. I teach using English. My mode of tutoring is quite friendly. I study every student demeanor and apply suitable methods to enable clear and perfect assimilation.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027314641.41/warc/CC-MAIN-20190819032136-20190819054136-00487.warc.gz
CC-MAIN-2019-35
309
4
https://careers.superiorjobs.in/jobdetails.asp?jo_num=16922&apply=yes
code
Engineering degree with overall 8 plus years of experience in software application development & 3 - 4years of experience in iOS / Android application development using ReactNative. Experience in building world class mobile application in ReactNative. Good understanding of JSON, REST, and offline storage. Experience in XCode & Android studio. Good understanding mobile development landscape, architectures, trends and emerging technologies. Experience in automated testing suites, like Jest/ Mocha/ Expresso. Experience in Agile Development mythology. Candidate should have strong communication skills & should be able to provide technical guidance junior members.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655896932.38/warc/CC-MAIN-20200708093606-20200708123606-00339.warc.gz
CC-MAIN-2020-29
666
8
http://www.codeadventurer.com/2014/01/03/56-days-until-takeoff
code
56 days from now, 26 students from gSchool will be closing their laptops, saying their goodbyes, and getting ready to start their careers as software developers. Some of them will be staying in Denver, some will be joining past graduates of the program built by Jumpstart Lab, and others will be spreading out across the country, working at startups, consultancies, and corporations. Regardless of where they end up, the six months they spent together will never be forgotten. The shared wins and frustrations, the walking taco days and lunchtime dip parties, and plenty of post-project-deadline happy hours have built solid friendships that are sure to last the test of time. Before that day comes, I still have work to do. As I’m reading Sandi Metz’s book, Practical Object Oriented Design in Ruby, I see that I can improve on the way I think about and execute the design of applications. I’m excited to work through the book, and apply the lessons in my projects. I’m also attending CodeMash this upcoming week and will begin looking for companies where I would make a good fit. I’m planning on returning to Ohio after graduation, and would like to see what sort of opportunities are available. Thanks to my instructors, I already have a few connections to meet with next week to discuss the job climate in the Cleveland area. I’m excited to talk to them and get to know other Rubyists in Ohio. While I’m at CodeMash, I’ll be missing work time on our current project, FeedEngine, which is all about APIs. I’ll be doing my best to communicate with my group, and contribute where I can without interfering with the overall progress. It will be interesting to see if I can integrate lessons from the conference into the project as well. I’m also excited for our upcoming project focused on Service-Oriented Architecture, and finally our Mastery project. I received some fun hardware for Christmas and hope to use it in my final project to integrate my passion for technology with my passion for agriculture. On a final note, my mentor, Matt Rogers, has been a tremendous resource. His help and understanding has really helped me grow as a developer. I applaud his ability to find relevant open-source work to help explain new concepts, or reinforce the ones I did not understand well. He has been diligent in following along the curriculum, asking me about the projects I am working on, and helping me understand where improvements can be made. I am very grateful for his time and his passion for mentoring. Without his help, I wouldn’t have made as much learning progress in the last project as I had. Thank you, Matt!
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057083.64/warc/CC-MAIN-20210920161518-20210920191518-00696.warc.gz
CC-MAIN-2021-39
2,641
6
https://www.meetup.com/TechinmotionBoston/events/236643911/
code
Tech in Motion Boston is excited to host our first "Player 1/Player 2" Game Night! This event will be a twist on our typical networking mixer, featuring over 50 consoles, 100’s of board games, VR technology, and 35,000 individual titles. P1/P2 is hosted at Laugh Boston (http://laughboston.com/event.cfm?id=445212), one of the city’s greatest events spaces. There are only 150 guaranteed entries available to Tech in Motion members (out of 400 total). Once those 150 slots are filled, attendees will be allowed in as space becomes available. Lastly, Laugh Boston requires a full first and last name for entry, so please be sure to RSVP accordingly! - - - If you are interested in a new role that will take your career in technology to the next level apply here (http://www.techinmotionevents.com/jobs). Interested in partnering with us at one of our events? Email Courtney at [masked] Want to learn more about Tech in Motion? • Visit TechinMotionEvents.com (http://bit.ly/1qDwKMK) • "Like (http://on.fb.me/1gjxei9)" us on Facebook! • Join the conversation on Twitter! Share and follow along with @Tech_in_Motion (http://bit.ly/1d2mMvB) • Read insightful content from our speakers across the country on our blog (http://bit.ly/1iKIK9M) • Want to sign up for our email list? Click Here! (http://bit.ly/1i8Gh7w) • Interested in sponsoring a Tech in Motion event? Click Here (http://bit.ly/1nq8Kxr)! *We currently have two staffing firms dedicated to offering career counseling services to our members, so we ask that recruiters not join this group. Any outside recruiter will be removed, thank you for understanding!
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256948.48/warc/CC-MAIN-20190522183240-20190522205240-00142.warc.gz
CC-MAIN-2019-22
1,629
13
https://portableapps.com/node/26827
code
New: Blender LTS (Nov 14, 2023), Platform 27 Beta 1 (Nov 26, 2023) 450+ real apps (49GB), 1.1 billion downloads, Please donate. Now Accepting Wire Transfers, Testing Ad Placements i cant find this portable in any other site if this was in here you guys are the BEST!!!! read the comments in this thread explaining why there is no Bittorrent Portable its owned by the bittorrent company. explain why a closed source program is better?
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100227.61/warc/CC-MAIN-20231130130218-20231130160218-00523.warc.gz
CC-MAIN-2023-50
433
6
https://irt.org/feedback/571.htm
code
irt.org FAQ Knowledge Base Q160 John Ferguson on November 06, 1999 at 10:31:27: Very worth reading I think this technique does not work with IE4. A workaround would be to use the # as a delimiter instead. location.hash will give you the info needed. If you find this valid, and use it, please don't use my name.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662647086.91/warc/CC-MAIN-20220527112418-20220527142418-00566.warc.gz
CC-MAIN-2022-21
311
4
https://pando.com/2012/02/21/your-heirs-wont-care-about-your-crappy-mp3-collection/
code
Your Heirs Won't Care About Your Crappy MP3 Collection Yesterday evening, a geekier chunk of the Internet hivemind started buzzing about this article over at Which?. The author raises a few rather interesting questions: what happens to the digital downloads you've purchased when you die? Why are we not allowed to pass them on to our loved ones? By the end, I was ready to grab my pitchfork (read: my pen [sub-read: my PandoDaily login]) and rally the industry for some sort of digital goods will, or an overhaul in licensing terms that would let me bequeath my premium 1's and 0's as I saw fit. But then it hit me: it doesn't really matter. Once you die, the only person who truly cares about your digital downloads is gone. Passing your iTunes collection down to your kids isn't the modern day equivalent to your dad passing his vinyl collection down to you. Once you take away the physical element*, there is no sense of nostalgia inherent to that file itself. While there may be many a memory associated with a specific album or song, any copy-of-a-copy-of-a-copy that you hand down holds no more sentimental value than a copy of that same song sitting on YouTube. You're not giving them something of yours, but a distant manifestation of something you paid for. Once you take away the scarcity, you take away any real value. There's a perceived value from what you paid for it, but its worth is in no way intrinsic to the digital file itself and isn't something that rides along with it. It's a sacrifice we've willingly made in the move to digital: intangible goods are soulless. You wouldn't be giving them something to remember you by, nor something that may one day send your kid's kids through college — you'd essentially just be saying "Here, now you don't have to pay for this stuff." That, in turn, raises a question: who will want that stuff? Let's say you have kids and a few decades later, as we tend to eventually do, die. Think of the advances that will have come in that time. Will your kids even want that (now relatively low-fi) copy of "Sorry For Party Rocking", when they'll probably be able to get a raw and uncompressed copy beamed straight into their head (or something like that) in the blink of an eye? All your movies: after a few decades of codec evolution and lost legacy formats, will they even play? Now, don't get me wrong: we should be able to do whatever we damned well please with the content we buy. We should be able to give the ebooks we've finished reading (or the movies we've watched, or the music we no longer listen to) away, just as we could their physical equivalent — but to bring in sentimental arguments like this overcomplicates an already incredible complex issue. Let's finish battling for what we can do with our digital goods when we're alive before we worry about what happens to them when we die.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487630518.38/warc/CC-MAIN-20210617162149-20210617192149-00048.warc.gz
CC-MAIN-2021-25
2,858
10
http://infocult.typepad.com/infocult/2011/11/death-by-craigslist-creepiness-via-facebook.html
code
Anothers Craigslist-linked crime story adds more fear to that social tool's reputation. Murderers apparently used Craigslist to lure victims to their Ohio killing ground, according to CNN. Another social media service also looks dark in the story, as reporters solemnly repeat one of the victims' last Facebook update. Craigslist looks like Svengali here: In contrast with the negative Craigslist is the story's moving note about a blog post written by one of the victims' children. Blogging isn't criminal, but affective; moving, not horrific. Unrelated: one of the suspects has a terrific mug shot. Infocult: all over Craigslist. (thanks to Ladi)
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383218/warc/CC-MAIN-20130516092623-00030-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
648
7
https://www.meetup.com/silicon-dojo-free-technology-education/
code
What we're about We will be teaching classes on technology topics to empower students to solve their, or their companies problems. Classes will range from Networking, to Programming, IoT, and many other subjects. Generally students can be of any proficiency level. Classes are "free to the end user". You don't pay to attend. This project is funded through the generosity of crowd funding.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335362.18/warc/CC-MAIN-20220929163117-20220929193117-00499.warc.gz
CC-MAIN-2022-40
389
3
https://shreyarajani.com/portfolio/hhp
code
As a frequent user of HHP website, it is important to design the application in such a way that it caters to a large number of users and it is easy for them to process and understand data for their use while showing minimal graphics so that it doesn’t hinder the usage in the places where there is slow or throttled internet connection. To work on this, we will design a simple and easily understandable website whose features are divided and shown to the user in a way that is not making it complicated for them to follow the flow with correct representation of data with minimal graphics. Human Health Project (HHP), is a NGO and a charity organization that believe people have a right to accurate and unbiased information about all types of medicines. We are charting a new course for evidence-based grading of treatments, one that requires a completely new way of thinking and new way of analyzing treatment outcomes. Role: UX Designer, Visual Designer - Team Project Duration: 8 months Toolkit: Whiteboard, Sketch, Balsamiq Skills: Surveys, user interviews, personas, scenarios, storyboards, sketching, paper prototyping, usability testing, interactive digital prototyping I spent a lot of time doing competitor analysis for the current research and trends in UI, user flows, design and possible pain points of top competitors to HHP. After the user interviews, when participants were given a task to complete during a contextual inquiry, some persisted beyond their typical threshold of frustration because they viewed finding the items as a challenge. It made it important as the moderator to ask if they would “typically” keep searching. After exploring the existing site, I hypothesized that there were three main areas opportunities for improvement: there were some key navigational elements missing such as a search bar the information architecture of the site wasn't clearly defined the overall visuals of the site were misaligned with the brand and the products being sold Through contextual inquiries, I was able to validate all three of these assumptions and then worked to improve them through card sorting, paper prototyping, and additional user testing before creating a high fidelity, clickable prototype redesign. As a part of next steps, we are building hi-fidelity prototype and interaction for the developers to start working on the development part.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027314752.21/warc/CC-MAIN-20190819134354-20190819160354-00190.warc.gz
CC-MAIN-2019-35
2,379
14
https://community.filemaker.com/thread/128642
code
This usually is commonly seen when you have the PDF open for preview. If its not open, then try closing Adobe first before you run your script again. Thanks for the reply, I tried all that, but to no avail ... what i tested now however is to write and export the PDF to a local folder (instead of to a server-folder before) and it seems to work fine ... for those who understand a bit more about Mac/Microsoft-combinations: i think it has to do with a file-(un)locking in the Microsoft-environment that isn't recognised by Mac (or vica versa) ... i am still interested in the solution here (but i'm already happy that it works for me now ;o) ) Thanks for the efforts!
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102663.36/warc/CC-MAIN-20170816212248-20170816232248-00553.warc.gz
CC-MAIN-2017-34
667
4
https://github.com/tzinfo/tzinfo/pull/5
code
Join GitHub today GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.Sign up Updated to tzdata version 2013g (http://mm.icann.org/pipermail/tz-announ... #5 Thank you for the pull request. This all looks correct. For the sake of consistency though, I generated the update again on my usual development environment: bb4179f This update to tzdata v2013g has now been released as version 0.3.38. I'll try and keep the old 0.3.x branch updated with significant tzdata changes at least until the Rails/ActiveSupport dependency is updated to use TZInfo ~> 1.0.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593586.54/warc/CC-MAIN-20180722194125-20180722214125-00308.warc.gz
CC-MAIN-2018-30
634
6
https://stewarts.org.uk/post/linuxmd/
code
Linux has a software raid subsystem and it called md. It is generally quite well documented. However the md status file in the proc pseudo filesystem is not documented at all. So this is one of those cases where you have to read the source to understand what’s going on. I’ll jump right in, this is what my mdstat looks like:- $ cat /proc/mdstat Personalities : [raid1] md1 : active raid1 hde2 hdg2 224187008 blocks [2/2] [UU] md0 : active raid1 hde1 hdg1 20008832 blocks [2/2] [UU] unused devices: < none > $ - The first line is just a list of personalities that the kernel supports, and by personalities it means what raid methods are available. If md is compiled into the kernel this list will be static, but if md is compiled as modules the list can change as you insert the various modules. The available personalities in Linux are linear, raid0, raid1, raid5 and raid6. - The file then consists of a number of stanzas, where each one represents each md device. The above the example show md0 and md1. - The array can then be either “active” or “inactive”. For instance if its raid1 it can be active with one block device, where as if its raid0 and the array consists of two devices it will be inactive if only one is added. It can also have a “read-only” attribute - In md0 section in this example the “raid1” signifies what personality the array is - Next is the complete list of block devices that make up the array, in square brackets is the device number in the arrays superblock. There can also be an optional (F) next to the device, this signifies the device has failed either due to a read failure or manually failed with an mdadm command. - The first thing on the next line if the arrays size in blocks. - The rest of the line is personality dependant, for linear and raid0 it just shows the rounding in k and the chunk_size in k respectfully. When using raid1 you get more useful information. First is a set of square brackets with 2 numbers in. The first number is the number of devices in the mirror and the second number is the number of working devices. Next is another set of square brackets, this time each character represents a block device. If the character is a “U” then the devices is up to date, however if the character is a “_” the devices is not up to date. Raid5 and raid6 are similar but I can’t test that. - If the array has an available device that needs to sync, then more lines are shown, if not then the stanza finishes. Linux is clever about syncing devices, it does not interrupt normal operation or impact on performance. If arrays are on the same device it will only sync them one at a time. And for this reason “resync=DELAYED” appears when the array is queued for a sync. If the device happens to be re-syncing there is a little progress bar, the eta and a speed current speed. As a side note if you reboot before the sync is done, it is just started form scratch again on the next boot. A little scary, but this is what a mdstat look like when there are failed devices:- $ cat /proc/mdstat Personalities : [raid1] md2 : active raid1 hde1 hdi1 244195904 blocks [2/2] [UU] md1 : active raid1 hda2 2168704 blocks [2/1] [U_] md0 : active raid1 hda1 7823552 blocks [2/1] [U_] unused devices: < none > $ This is less scary, this is sample output when an array is syncing Personalities : [raid1] md1 : active raid1 sdb3 sda3 214178496 blocks [2/1] [U_] resync=DELAYED md0 : active raid1 sdb2 sda2 20008832 blocks [2/1] [U_] [==>..................] recovery = 13.6% (2728704/20008832) finish=9.5min speed=30003K/sec unused devices: this is what’s logged to syslog Feb 17 19:13:49 localhost kernel: md: trying to hot-add unknown-block(22,1) to md0 ... Feb 17 19:13:49 localhost kernel: md: bind Feb 17 19:13:49 localhost kernel: RAID1 conf printout: Feb 17 19:13:49 localhost kernel: --- wd:1 rd:2 Feb 17 19:13:49 localhost kernel: disk 0, wo:0, o:1, dev:hda1 Feb 17 19:13:49 localhost kernel: disk 1, wo:1, o:1, dev:hdc1 Feb 17 19:13:49 localhost kernel: md: syncing RAID array md0 Feb 17 19:13:49 localhost kernel: md: minimum _guaranteed_ reconstruction speed: 1000 KB/sec/disc. Feb 17 19:13:49 localhost kernel: md: using maximum available idle IO bandwith (but not more than 200000 KB/sec) for reconstruction. Feb 17 19:13:49 localhost kernel: md: using 128k window, over a total of 15007488 blocks. Feb 17 19:26:15 localhost kernel: md: md0: sync done. Feb 17 19:26:15 localhost kernel: RAID1 conf printout: Feb 17 19:26:15 localhost kernel: --- wd:2 rd:2 Feb 17 19:26:15 localhost kernel: disk 0, wo:0, o:1, dev:hda1 Feb 17 19:26:15 localhost kernel: disk 1, wo:0, o:1, dev:hdc1 Here is large raid5 which uses aoe components. Personalities : [raid6] [raid5] [raid4] md0 : active raid5 etherd/e1.1p1 sdb1 sda1 etherd/e1.3p1 etherd/e1.2p1 sdd1 4883799680 blocks level 5, 64k chunk, algorithm 2 [6/6] [UUUUUU] bitmap: 2/233 pages [8KB], 2048KB chunk unused devices: <none>
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991659.54/warc/CC-MAIN-20210516013713-20210516043713-00287.warc.gz
CC-MAIN-2021-21
4,947
18
https://mailman.nanog.org/pipermail/nanog/2014-June/067499.html
code
mysidia at gmail.com Mon Jun 2 23:42:36 UTC 2014 On Mon, Jun 2, 2014 at 8:21 AM, shawn wilson <ag4ve.us at gmail.com> wrote: [snip] > So, kinda the same idea - just put IPMI on another network and use ssh > forwards to it. You can have multiple boxes connected in this fashion > but the point is to keep it simple and as secure as possible (and IPMI > security doesn't really count here :) ). About that "as secure as possible" bit. If just one server gets compromised that happens to have its IPMI port plugged into this private network; the attacker may be able to pivot into the IPMI network and start unloading IPMI exploits. So caution is definitely advised, about security boundaries: in case a shared IPMI network is used, and this is a case where a Private VLAN (PVLAN-Isolated) could be considered, to ensure devices on the IPMI LAN cannot communicate with one another --- and only devices on a separate dedicated IPMI Management station subnet can interact with the IPMI LAN. More information about the NANOG
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711552.8/warc/CC-MAIN-20221209213503-20221210003503-00420.warc.gz
CC-MAIN-2022-49
1,018
18
https://latebloomerblog.com/hostgator-baby-login/
code
Hostgator Baby Login In 2002, HostGator was founded by Brent Oxley in his dorm room at Florida Atlantic College. The firm has actually grown tremendously ever since and also continues to do so, year after year. Their logo is “We consume the competition.”Hostgator Baby Login Today, HostGator has headquarters in both Austin and Houston, Texas, after outgrowing numerous other sites. In 2007, their Brazil office was opened. HostGator has actually won great deals of awards for support as well as holding services. An EIG Owned Environment-friendly Host In June 2012 HostGator was gotten by the Stamina International Team (a company that additionally has numerous various other organizing suppliers besides HostGator). Nevertheless, it remains to trade under the HostGator name. HostGator is an environment-friendly energy firm. The firm acquires Green-e licensed Renewable Energy Credit scores (RECs) from a wind farm in Texas. 130% eco-friendly power cools and also powers all shared and also reseller servers. We might earn a commission– at no additional price to you– if you decide to acquire any one of the items, software program or solutions we describe and promote on our internet site. The viewpoints revealed are of our own independent reviewers & writing team, appointed to give helpful reviews & their impartial viewpoint. You should assume that every external web link that you click on our site is an affiliate link that results in us being paid by a partner of ours. Summary of HostGator’s Top Functions Whenever there’s a discussion about host, the name HostGator is bound ahead up, as well as with great reason. Hostgator Baby Login Having been around for more than a years, HostGator can be stated to be among one of the most trusted as well as identified host. It masters several locations including client support, hosting flexibility, uptime, shared holding, plus so much extra. This quality in several facets of host combined with the company’s experience, range of functions, and performance makes HostGator a wise selection for any website proprietor. What Perks Do You Get? HostGator provides a variety of strategies. If you’re battling to decide on which plan to select, take into consideration these functions, which we’ll go over below: - You handle your account using cPanel, the industry-standard interface - To maintain your account safe and secure, you obtain a free Secure Sockets Layer (SSL) certification - If you intend to increase safety and security as well as malware scanning, you will have to get SiteLock - Also the entry-level common organizing strategy comes with assistance for unrestricted email accounts - Month-to-month invoicing choices are available - One-click installs, also from the fundamental planHostgator Baby Login - Access to the website builder– at an expense - A Web Content Delivery Network (CDN) keeps your website quick - Multiple assistance options including online chat With all the various other host carriers that are available, why choose HostGator? Well, the reality is that no solitary webhosting is ideal. So, whether you’re an amateur webmaster or are looking to alter webhosting, below’s a glance at the great and the bad of HostGator to aid you make the best decision. HostGator’s Hosting Bundles One of the very best features of HostGator is the reality that the business offers versatile packages that leave individuals (both large as well as little businesses/blogs) with a lot of room to expand. One of the most basic of the bundles, the “Hatchling Plan,” features assistance for one domain, endless data transfer, disk space, databases, shared SSL certification, lots of e-mail addresses, as well as support for third-party applications like content monitoring systems. Other shared organizing plans build on this Hatchling package by adding extra features such as unlimited domain names, private SSL certification, and also a toll-free contact number (simply among others.). VPS and Devoted Organizing Plans. Alternatively, if you need even more power, or have specific requirements that shared servers can not fulfill, there’s the choice of more advanced bundles such as VPS and also Committed server plans. The highest rate VPS plan provides 8GB RAM, 240GB storage, and monthly information transfers topped at 3TB. Committed web server plans, on the other hand, can be tailored with as much as 16GB of RAM, 25TB of month-to-month data transfers, and an excellent 1TB of storage. HostGator likewise provides Cloud and WordPress organizing, which we dig into below. You can always visit HostGator’s official web page to discover one of the most upgraded organizing plans on offer along with their specifics. The business additionally provides WordPress hosting with the most affordable bundle enabling one site with up to 100,000 site visitors each month. The least expensive WordPress strategy likewise consists of 1GB back-ups. Higher-end plans allow for approximately 3 websites and as much as 500,000 site visitors every month. Meanwhile, the top WordPress hosting strategy additionally allows for approximately 3GB in back-ups.Hostgator Baby Login Loads Ahead of The Competition All WordPress organizing strategies consist of enhanced cloud design, low-density servers, CDN, and also multiple caching layers which suggest that websites load up to an alleged 2.5 times faster than competitors. HostGator experts are likewise available to give a totally free migration solution and also top-notch assistance in case anything breaks. What Regarding Performance as well as Uptime? HostGator guarantees a 99.9% uptime as well as has the sources to back it up. Powered by Countless International Servers. Among the biggest and most preferred web hosts, HostGator has thousands of servers under its administration. HostGator servers are kept an eye on 24/7 by on-site technical personnel. Shielded Infrastructure for Connection of Service. In addition to being tactically located throughout the globe, these web servers use top qualityserver equipment and also are housed in advanced data centers that take all the necessary actions (UPS battery backup devices, top-tier A/C systems, consistent facilities monitoring, fire protection systems, etc.) to guarantee performance stays perfect and also continuous. Thanks to these world-class information facilities as well as their tactical places, HostGator supplies reputable, top quality performance that never ever dissatisfies. Uptime and Speed HostGator has an over 90% client satisfaction (from a June 2008 consumer contentment survey). HostGator keeps approximately 99.9% uptime. And also in addition to the trustworthy uptime, HostGator additionally provides satisfactory tons times with speeds varying from 22 to 940ms depending upon the web browser’s location. Just How Good is HostGator’s Client Assistance? When it comes to customer support, very few webhosting can take on HostGator’s customer care. The business also has honors to confirm this fact. For general inquiries and concerns, you can utilize HostGator’s email assistance, which is always available, social media sites support on Facebook, Twitter, Google+. When you register for a HostGator strategy, you can ask for a cost-free site transfer. Or look for responses from the firm’s extensive knowledgebase, which has lots of FAQs, useful articles, as well as video tutorials that walk you with some of the controls. HostGator also offers a discussion forum where you can ask concerns as well as address those presented by other individuals of the webhosting. Alternatively, if you need a little bit extra prompt aid, or are experiencing a problem that requires unique focus, HostGator has customer support agents on standby 24/7/365 ready to assist you with whatever inquiries you may have. These reps can be reached by phone or live conversation.Hostgator Baby Login Exists a Money-Back Guarantee? No locked-in contracts and a 45-day money-back guarantee. Meaning if you choose to cancel within the initial 45 days of joining, you obtain a full refund, no doubt asked. Further making HostGator an excellent catch is the fact that the web host throws in a few added features with their different hosting plans. As an example, each holding plan includes several freebies. You obtain a totally free web site builder and internet site structure tools, unrestricted data transfer and disk room, over 4,000 web site layouts, totally free domain name transfers, and unlimited MySQL databases. Various other additionals that you can anticipate with HostGator consist of:. - $ 150 well worth of Google Adwords or Bing/Yahoo marketing credits. - Free website transfers when you intend to move your web site from an additional host to HostGator. And also the very best component is that your site can be upgraded during the transfer at no charge. Nevertheless, the claimed migration needs to be done within thirty days from the day you subscribe. - A totally free domain for the very first term when you move and also establish a new account. - 1-click mounts available for all significant open-source jobs such as WordPress, Magento, as well as Joomla. - A 45-day money-back assurance for all HostGator organizing plans. The majority of web hosting companies just give you a 30-day home window to cancel your account as well as get your cash back. - A getting-started e-mail with web links to every one of the sources you will certainly need to develop your web site and get it up and running. What are the Advantages and disadvantages of HostGator? So, is HostGator the best webhosting for you? Well, given the fact that HostGator provides you an easy method to construct and manage your website, supplies you with all the resources you’ll require to provide high-level solutions on your site, uses a number of feature-packed holding packages, as well as brings a lots of experience to the table, it can be a perfect webhosting for anybody with a web site. A Lot Of Pros HostGator uses several benefits including:. - Reputable uptime and quick feedback times. - Affordable hosting strategies. - A lot of space for development. - The option of cloud organizing. - Versatile e-mail administration. - Free shared or exclusive SSL certification on all hosting packages. - Generous 45-day money-back assurance that gives clients satisfaction. - Extensive Knowledgebase. - No constraint on data transfer, disk space, and also e-mails. - Well-founded security. - Free Weebly site builder. - An excellent control board with a ton of attributes ranging from a web-based file manager to advanced features such as cron work, picture supervisor, error logs, and apache handlers. In addition, HostGator has a big data base with solution to virtually any type of concern you could have varying from the most basic to one of the most innovative. So, when the customer support team takes as well long to address, you can look for the remedy to your trouble from this knowledgebase. What Are the Cons? When it comes to the downsides of the company, you’ll just have to manage the problem of regular backups, slow-moving client response times (according to a few of the host’s individuals), an advanced cPanel that calls for some obtaining used to, and also no one-stop WordPress import.Hostgator Baby Login Try With No Dedication Considered that HostGator has a great deal to such as and also extremely couple of things to do not like, you should most definitely attempt the business if you have a site or strategy to build one. If the web host does not make an excellent suitable for your web site, the 45-day money-back assurance on offer will enable you to leave without losing cash.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363510.40/warc/CC-MAIN-20211208114112-20211208144112-00485.warc.gz
CC-MAIN-2021-49
11,709
84
https://portal.gitnation.org/tags/nextjs/talks
code
Next.js has grown in popularity over the past couple of years with features like server-side rendering, incremental static regeneration, image optimization, and more. Next.js is known as the production ready framework for React. In contrast, GraphQL is known for not just returning data for what you need with good schema design practices but also a good dev experience. In this talk, I’ll talk about how one can build an app that not just scales but also has high performance with Next.js, GraphQL and Tailwind. And Lastly, the future of CSS and Frontend development is building utilities, so CSS does not feel like an afterthought. At the end of this talk, you will learn how to go from making a sample app to a highly performant production-ready application.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817699.6/warc/CC-MAIN-20240421005612-20240421035612-00436.warc.gz
CC-MAIN-2024-18
763
1
https://ecommercetricks.com/blog/2021/06/09/facebook-ad-error-can-anyone-help-please/
code
I'm getting the following whenever I try to advertise a product or post on facebook to get website purchases: "No Conversion Events Available For This PixelThis pixel is on a website domain that has already reached its conversion event limit, so there are no available conversion events being sent through this pixel. Select a different pixel or edit your domain settings in Events Manager.Go to Events Manager" I have no idea what it means or what events are. I can't ever actually remember setting up 'pixel' either. I just have a woocommerce store and linked it to my facebook page with a plugin. I used to be able to advertise things, but now I can't. It's quite frustrating. Any clues appreciated, thanks
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500641.25/warc/CC-MAIN-20230207201702-20230207231702-00713.warc.gz
CC-MAIN-2023-06
709
4
https://discuss.panzerdragoonlegacy.com/t/looking-at-buying-a-copy-of-windows/2803
code
I’m considering buying a copy of Windows to use for gaming and a bit of development work. From a gaming perspective, is there any significant difference between Windows 7 and 8? I’m not interested in the Metro interface in Windows 8, just the regular desktop environment. I see the prices for each are roughly the same. I don’t know about gaming, so I’ll leave that to those that do. However, I do believe these is no start menu in Windows 8 at all, forcing you to use the metro interface to launch apps. Again, I’m not positive, but I wanted to bring this up so that you’re aware of it (if I’m right). Looking forward to people’s clarifications, I don’t know a lot about W8 aside from a brief play and a few Youtube vids. If you have plans on using a touch screen, it might be worth it. If you are a traditional desktop user, stick with Windows 7. The new interface is horrid with a mouse/keyboard. It isn’t even about getting used to something new. I work with Ubuntu and Win 7(and some XP systems). Not really sure what goal MS was aiming for with Windows 8. If they would have just left the traditional interface with the option of the new one for tablets, that would have been best. They also have an annoying habit of pushing you toward the Windows Marketplace with Win 8. The cost of Win 8 is too high for what amounts to added advertisements. Forcing the new interface on users is likely an attempt to coherse users them using the Windows app store. In a sense, they’re less open than even Apple. At least on OSX, using the Mac App Store is an option for developers and users, but it basically stays out of way if you don’t want to use it. You’re still free to release an app that doesn’t meet the App Store’s requirements by a providing a standard dmg file as a download from your website. It appears to be possible to distribute Metro apps without using the Windows app store, but it doesn’t look particularly easy. If Microsoft takes away the traditional desktop in a later version of Windows, I think it will be game over for Windows as an open platform. I really am excited regarding the Steam beta for Linux. The only think keeping me on Windows personally at home is gaming. If enough of my games pop up on Linux, I can make that my primary OS and only boot into Windows 7 for the occasional non-compatible game.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.2/warc/CC-MAIN-20231205140836-20231205170836-00888.warc.gz
CC-MAIN-2023-50
2,359
8
https://cloudways.uservoice.com/forums/203824-service-improvement/suggestions/45319825-support-an-option-to-disable-staging-live-syncing
code
support an option to disable Staging/Live syncing options from the UI I would like to have a way to disable the PULL or PUSH process between staging and live. For example, when using Staging as a "test" environment, I do not want to let anyone to get the DB content from Staging and send it to Live. Vice-versa as well when, for example, I want to use Staging as a "pre-live" environment, where I want to enforce a single-way data flow. So, I would like options to enable/disable sync code + database from one to another, so only a single flow can be enforced.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500041.18/warc/CC-MAIN-20230202200542-20230202230542-00131.warc.gz
CC-MAIN-2023-06
560
5
https://scifi.stackexchange.com/questions/179003/translation-of-the-writing-around-gondors-banner
code
The symbol of Gondor at times comes with writing around it and I couldn't find a definitive answer about what exactly it means and whether it's "canon" or just something fans do. It's the Ring Verse. This is almost certainly a fan image as MPF points out in the comments below. The Gondorians had no reason to display the Ring Verse on a banner, and almost certainly were unaware of its existence in the end of the Third Age, with only Gandalf having read it while hunting for evidence of the One Ring. Ash nazg durbatulûk, ash nazg gimbatul, ash nazg thrakatulûk, agh burzum-ishi krimpatul One Ring to rule them all, One Ring to find them, One Ring to bring them all, and in the darkness bind them. This is clear from the bottom right "quarter", bottom left "quarter" and top left "quarter" all beginning with the same words, "ash nazg". It can be a bit difficult to read because the bottom half is actually upside down. I've attempted to provide a visual guide below: You can compare the above with the Ring Verse from the books, you'll notice that stylistically they are identical. For interested parties, I used this resource to reverse transliterate the Tengwar characters into English, and this resource to check that my conversion was accurate by transliterating it from English back into Tengwar. Thankfully I did "Ash nazg" first and the rest fell into place rather easily.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046151641.83/warc/CC-MAIN-20210725080735-20210725110735-00266.warc.gz
CC-MAIN-2021-31
1,384
9
https://www.tripadvisor.com/Restaurant_Review-g188613-d2523926-Reviews-De_Saffraan-Amersfoort.html
code
We had marvelous lunch at De Saffraan, the food was beautifully presented and delicious. We sat outside and appreciated the view and the boats passing by. The service was perfect, the waitress explained carefully about the ingredients used to prepare each dish. It's worth every euro that we've paid for it! We'll be back!
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257828286.80/warc/CC-MAIN-20160723071028-00162-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
322
1
http://h41379.www4.hpe.com/doc/731final/6663/6663pro_001.html
code
HP OpenVMS Systems Documentation HP DECwindows Motif Displays all named properties and their values related to the current display device. Obtains the authorization data for the display device and writes that data to SYS$OUTPUT. The authorization data is obtained from the current X authority file and is in the format expected by the X Authority utility. Note that when using an LBX proxy server, the extracted authentication information references the address of the proxy server and not the X display server. Do not use the /EXTRACT qualifier with any other SHOW DISPLAY qualifier. Displays the current name count and data space quota values for the display device. This display includes the set limit and the amount of space currently available for use. Defines one or more global DCL symbols for each property displayed by the SHOW DISPLAY command. You can then use these property symbols in DCL command procedures. Each global symbol name follows the form: The following are the symbols for predefined properties: Note that symbols for user-defined properties have a double underscore in the name. For example, the user-defined symbol for the value DISK$USER:[JONES] would be defined as follows: $ SHOW SYMBOL DECW$DISPLAY* DECW$DISPLAY_NODE == "220.127.116.11" DECW$DISPLAY_SCREEN == "0" DECW$DISPLAY_SERVER == "0" DECW$DISPLAY_TRANSPORT == "TCPIP" DECW$DISPLAY_XAUTH == "DISK$USER:[SMITH]SERVER1.DECW$XAUTH" DECW$DISPLAY__JONES == "DISK$USER:[JONES]" If a symbol name or value exceeds or violates any DCL limits or naming conventions, the symbol is not set and an error message is displayed. If the display device uses a proxy server, the symbols DECW$DISPLAY_NODE, DECW$DISPLAY_TRANSPORT, and DECW$DISPLAY_SERVER reflect values associated with the proxy server and not the X display server. Displays the value for the specified property. If the value consists of one or more items, they are displayed as a comma-delimited list. 1.1.3 Command Examples $ SET DISPLAY/CREATE/GENERATE=TRUSTED/XAUTHORITY=XAUTHORITY_TEMP/NODE=ZEPHYR $ PIPE SHOW DISPLAY/EXTRACT | RSH FLOPSY "XAUTH NMERGE SYS$INPUT" $ SET HOST FLOPSY $ SET DISPLAY/NODE=ZEPHYR $ RUN SYS$SYSTEM:DECW$CLOCK $ SET DISPLAY/CREATE/VALUE=(NAME=DECW$SESSION_MANAGER,SET="tcpip/zephyr:9510") $ SHOW DISPLAY/SYMBOLS/ALL Device: WSA23: [super] Node: 0 Transport: DECNET Server: 0 Screen: 0 User-defined values: "DECW$SESSION_MANAGER" = "tcpip/zephyr:9510" $ SHOW SYMBOL DECW$DISPLAY__DECW$SESSION_MANAGER DECW$DISPLAY__DECW$SESSION_MANAGER == "tcpip/zephyr:9510" $ SET DISPLAY UNTRUSTED/CREATE/XAUTHORITY=TEMP/GENERATE- _$ /VALUE=(NAME=DECW$SESSION_MANAGER,-) _$ SET="'DECW$DISPLAY__DECW$SESSION_MANAGER'") $ SET DISPLAY/CREATE/PROXY=GATEWY/NODE=hubbub.company.com- _$ /PMTRANSPORT=DECNET/NOLBXAUTHENTICATE/TRANSPORT=TCPIP $ SHOW DISPLAY Device: WSA23: [super] Node: HUBBUB.COMPANY.COM Transport: TCPIP Server: 0 Screen: 0 Connection will use: LBX proxy on node: gatewy.company.com Transport to proxy: TCPIP Server number: 63 $ RUN SYS$SYSTEM:DECW$CLOCK To take advantage of the capabilities offered by the X Keyboard (XKB) extension and the enhanced X server security and authorization available with HP DECwindows Motif for HP OpenVMS Alpha Version 1.3, the following utilities have been introduced to the DECwindows Motif environment. 1.2.1 AccessX Keyboard Utility (accessx) The AccessX Keyboard utility (accessx) is a client application that enables you to set one or more AccessX keyboard enhancements available with the X Keyboard extension (XKB). These enhancements make it easier for users with disabilities to interact with workstation input devices (keyboard and mouse). The settings for these capabilities are stored as X resource specifications available from an AccessX configuration file. This utility reads the appropriate file (either for the client or server) and adjusts the resource settings depending upon the changes you make. See Section 18.104.22.168 and Section 22.214.171.124 to learn more about the configuration file and its default values. The accessx utility replaces the sample application formerly available with the AccessX extension. Starting with HP DECwindows Motif for HP OpenVMS Alpha Version 1.3, the capability provided by the AccessX extension is offered as part of XKB. For more information on enabling and using XKB and X Keyboard keymaps, see Section 2.5. For information regarding the AccessX extension, see the HP DECwindows Motif for HP OpenVMS Alpha Release Notes. To run this utility, define accessx as a foreign command, and copy the UID file to DECW$USER_DEFAULTS: $ accessx :== "$DECW$EXAMPLES:ACCESSX.EXE" $ COPY DECW$EXAMPLES:ACCESSX.UID DECW$USER_DEFAULTS:ACCESSX.UID The command format for accessx is as follows: $ accessx [-options...] You can run accessx by entering the command at the DCL prompt, with or without options. The options, described in Table 1-2, allow you to specify which configuration file to load and choose whether to display the status of the editing session. If no options are specified, the client configuration file is loaded by default. |-client||Instructs accessx to load and use the custom settings in the client configuration file. This is the default option.| |-server||Instructs accessx to load and use the default, system-wide settings maintained in the server configuration file.| |-status||Displays the status window when accessx is started.| |-vmods||Uses the names for virtual modifiers in the status window. For example, with the -vmods option, accessx displays NumLock instead of Mod5.| Once invoked, the accessx dialog box is displayed, which lets you select the AccessX features that you want to enable. It also provides a test area that allows you to preview your settings before applying them to a DECwindows Motif session. For detailed information on the controls and menu options in the dialog box, see the online help available from the Help menu option. 126.96.36.199 The AccessX Configuration File The AccessX configuration file is an X resource file used to store and load specific AccessX settings for the client. The default client configuration file is located in SYS$LOGIN:ACCESSX.DAT and is created the first time you choose Save Settings. You can choose to edit the file directly or use the accessx utility (with the -client or -server option) to modify the settings. Note that any comments inserted in this file are deleted when you perform a save settings action. The format for entries in this file follow the standard X resource specification format, which is: Since an application can consist of a combination of input widgets (such as, push buttons and a scroll bar), you can use the widget class and name identifiers to create additional resource specifications to control these widgets. 188.8.131.52 Default Resource Settings Table 1-3 lists the AccessX resources and their default values. These are default settings maintained by the server and also represent the initial settings in the client configuration file, prior to modification. The X Authority utility (xauth) enables you to manage the contents of one or more X authority files. The X authority file contains information used to authorize client connections to the X server. This utility is typically used to extract authorization records from one system and combine them with the records on another system, such as when granting access to additional users or enabling remote logins. The actual record entries vary depending on the authentication scheme currently in use. In contrast to other X Window System utilities that are available with DECwindows Motif, xauth is included as a part of OpenVMS Alpha operating system. The xauth commands are case-insensitive and available directly from the DCL command line, xauth command line, or from a batch file. The command format for xauth is as follows: $ xauth [-f authfile] [-options...] [command] Table 1-4 defines the available options. |-f authfile||Specifies the name of the authority file. By default, xauth will use the file specified by the DECW$XAUTHORITY logical or SYS$LOGIN:DECW$XAUTHORITY.DECW$XAUTH if not defined.| |-q||Specifies that xauth operate in quiet mode. Status messages are not displayed. This is the default setting if the output from xauth is not directed to a terminal.| |-v||Specifies that xauth operate in verbose mode. Status message are printed. This is the default setting if the output from xauth is directed to a terminal.| |-i||Specifies that xauth ignore file locks. Normally, xauth will refuse to read or edit any files that have been locked by another program (such as, by another instance of xauth) and not timed out.| |-b||Specifies that xauth break file locks before proceeding. Use this option only to clean up stale locks.| Table 1-5 defines the available commands. |add||Adds or replaces the specified entries.| |extract||Extracts and writes the specified entries to a new X authority file.| |exit||Saves and closes the file and exits the xauth utility. (Available from the xauth command line only.)| |remove||Deletes the specified entries.| |merge||Appends entries from another X authority file.| |nextract||Extracts the specified entries in numerical format.| |nmerge||Merges the specified entries presented in numerical format.| |list||Displays a listing of entries in the X authority file.| |nlist||Displays a listing of entries in numerical format.| |generate||Used to generate a new authorization key. Requires that the SECURITY and XC-APPGROUP extensions be enabled.| |help, ?||Displays information about the parameters and options for this utility.| |info||Provides a brief overview of the X authority file.| |quit||Closes the xauth utility without applying any changes. (Available from the xauth command line only.)| |source||Runs xauth commands from a command file.|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689661.35/warc/CC-MAIN-20170923123156-20170923143156-00309.warc.gz
CC-MAIN-2017-39
9,806
76
https://archerpoint.com/replicating-data-microsoft-dynamics-nav-premises-dynamics-business-central-saas/
code
Replicating Data from Microsoft Dynamics NAV On Premises to Dynamics Business Central SaaS To replicate a database from Microsoft Dynamics NAV on premises to Dynamics Business Central SaaS, follow these steps: NOTE: In this example, a Microsoft Dynamics NAV (on premises) Name Database has been restored as BC SaaS Testing. - Copy the company “Cronus USA” using the Copy function, Create a New Company, and name it BCSaasTesting. - Open the Business Central Tenant and login with the user name provided.Figure 1 – Microsoft Dynamics Business Central login - Create the Sandbox environment. - Search – Sandxxxxxxxxxxxxxxxxxx - Click “Sandbox Environment (Preview)” Figure 2- Creating a sandbox environment in Microsoft Dynamics Business Central The Sandbox Environment (Preview) window will open. Figure 3 – The sandbox environment Preview in Microsoft Dynamics Business Central - Click “Create” (to create the sandbox). You are now in the Sandbox environment. Figure 4 – The sandbox environment in Microsoft Dynamics Business Central - Click “Assisted Setup.” - Click “Set up Intelligent Cloud.” - Accept the INTELLIGENT CLOUD SETUP and click “Next.” - Select the Product: Click on the 3 dots to get a list of Products. - Select “Dynamics 365 Business Central” and click “OK;” then click “Next.” - Select the SQL Configuration from the drop down and select “SQL Server. - Enter the SQL Connection String. There are 2 ways to do this: - or Data Source= WinSrv1SQL2008;Initial Catalog=myDataBase;User Id=myUsername;Password=myPassword; This example uses the first option: Server=bcdev01NAVDEMO;Database= BC Saas Testing; UID=sa;PWD=xxx; - Paste this string in SQL Connection String and click “Next”. - ”Click “Download the Self Hosted Integration Runtime (SHIR).” - Copy the Authentication Key and put it in your notepad. - Self-Hosted Integration Runtime (SHIR) is downloaded. Run and Install the Setup. Figure 5 – Self-hosted Integration Runtime Setup Wizard in Microsoft Dynamics Business Central - When the Setup is installed, click “Finish.” - Paste the Authentication key you copied into your notepad and click “Register.” - Click “Finish.” Integration Runtime has been successfully registered. - Click “Launch Configuration Manager.” Microsoft Integration Runtime Configuration Manager window will open to Test Connection. - Click “Test.” - Click “Next.” The system will ask you which company you want to replicate. - Select the company you want to replicate and click “Next.” - Activate automatic schedule to replicate the Data by toggling the button. Click “Next.” - Click “Finish” to replicate the company. - Type in the first few letters of “Intelligent Cloud Management and click on it when it appears. - Initialization of the company is completed. The company is replicated, but as now it’s blank. - To set the system manually to replicate the data, click “Action,” then click “Run Replication Now.” - Note the time you started the data replication. Time on Virtual Machine: 2:35 PM. - The system will ask “Are you sure you want to trigger replication?” Click “Yes.” - A box with the message, “Replication has been successfully triggered; you can track the status on the Management page” will appear. Click “OK.” - On the Intelligent Cloud Management page, you can check the completion of the Data replication status. Figure 6 – Intelligent Cloud Management page in Microsoft Dynamics Business Central - Refresh the page in between to check the status. Figure 7 – Refreshing the status of the Intelligent Cloud Management page in Microsoft Dynamics Business Central The process ends @ 2:42 PM. The data is replicated. - Click the tile “482 Tables Successful” on the right side of the page to find which table data was replicated. Figure 8 – Table data successfully replicated in Microsoft Dynamics Business Central - Click tile “12 Tables Failed” to find out which table data was not replicated. Figure 9 – Table data NOT successfully replicated in Microsoft Dynamics Business Central Why did the data in these 12 tables fail to replicate in this example? This example is an on-premises version of Business Central, so either a CU has been applied to the on-premises system before the update made it to the cloud tenant, or the cloud tenant has an update for which the corresponding CU has not been applied on premises. If you have any questions about this process, contact ArcherPoint. Read more “How To” blogs from ArcherPoint for practical advice on using Microsoft Dynamics Business Central or NAV. If you are interested in NAV/Business Central development, check out our collection of NAV Development Blogs.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510671.0/warc/CC-MAIN-20230930082033-20230930112033-00355.warc.gz
CC-MAIN-2023-40
4,765
59
https://robinart.com/2012/12/06/exlibris-joins-w3c-schema-bib-extend-community-group-schema-org/
code
So very cool! Exactly – library bib data has a very viable place in the larger semantic web – ESPECIALLY, our controlled vocabularies (subject headings) and authority (series and names) data. Ex Libris joins W3C Schema Bib Extend Community Group, part of the Schema.org linked data initiative http://http://www.librarytechnology.org/ltg-displaytext.pl?RC=17470 :“Our customer community is very keen to take advantage of linked data methodology,” remarked Oren Beit-Arie, chief strategy officer at Ex Libris. “At our recent international user meeting, a special interest working group on linked open data was established and members wrote a manifesto in support of linked open data. We have already begun discussing with the working group various ways in which we can use linked data in our solutions.” Schema.org is platform where the Web community can come together and share structured schemas that improve the ability for search engines to understand the content of Web pages. Launched just over a year ago, the Schema.org initiative, backed by Google, Yahoo, Microsoft, Yandex, and others, has been very successful in encouraging the sharing of structured data on the Web. Within a year, search engines were already seeing more than 7% of pages crawled containing Schema.org markup. For more information, see the schema.org blog at http://blog.schema.org/.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057861.0/warc/CC-MAIN-20210926114012-20210926144012-00619.warc.gz
CC-MAIN-2021-39
1,372
6
https://giremuvafela.benjaminpohle.com/master-thesis-database-uva-health-50175gw.html
code
Here I have collected links to some of my favorite and interesting historical and free art books, artist handbooks and artist's reference works. Vivek Singh Posted on: Corp Sunnyvale JingChi Silicon Valley team is looking for a Camera Perception engineer to implement the next generation automotive vision and machine learning algorithms. Participate in cutting edge research in computer vision. Develop novel real-time 3D scene reconstruction techniques and delivering accurate visual odometry systems. Apply machine learning to computer vision problems. Research and prototype techniques and algorithms for object detection and recognition. Develop robust software for integrating multiple source of sensors and tracking systems. Prototype hardware and software solutions for tracking, detection and modeling. Perform research that enables modeling and tracking the human body Human body modeling, actively recognition, tracking More info Contact: Yingmei Yang Posted on: It is one of the very few AI startups who earn profit in all calendar years. We are well funded, tech driven company and looking for outstanding researchers to empower our fast growing AI business. Xiaoyu Wang Posted on: To improve the delivery capacity, we will explore the robotic technologies to develop autonomous delivery vehicles. We are hiring for talents in the area of robotics, slam, navigation and deep learning. Master degree or above in computer science, robotics, automation or equivalent, PhD degree is highly preferred 2. Experience with algorithms such as SLAM, geometry localization, deep learning, planning and multi-sensor fusion. Have strong passion in autonomous vehicle development and application More info Contact: Hao Shen Posted on: This is a 12 months position. The position is extendable. The position involves designing and implementing computer vision and machine learning algorithms for face analysis. Fluency in Python and Matlab is required. Knowledge of machine learning, including deep learning, image processing, pattern recognition and computer vision is a must. Independent research experience and experience in developing and deploying algorithms are essential. Knowledge of face image processing and image segmentation is a plus. Please send your CV to adamskong ieee. Kong Wai-Kin Adams Posted on: The position involves designing and implementing real time object detection methods for autonomous vehicle. Good knowledge in computer vision, machine learning and deep leaning, in particular those related to real-time object detection. If you only master degree and have related background, we will also consider your applications as a research associate. We are looking for candidates with: Yi Ding Posted on: Our small tight knit team has been working together for years on the merging of AI and 3D sensors. Role Research, development and implementation of production quality computer vision and machine learning algorithms. Skills and qualifications - B. Carlo Dal Mutto Posted on: Role - Research, development and implementation of production quality computer vision algorithms - Project scoping and development definition - Mentoring of less experienced developers Skills and qualifications - B. Our technology is based on computer vision, video analytics, machine learning, predictive modelling, and the safe systems philosophy. We help traffic engineers apply surrogate safety methods for proactive decision making. As a member of the MicroTraffic software team you will help design and implement the next generation of our software to extract object trajectories from traffic video. The ideal candidate will be an expert software developer with a specialization in applying computer vision algorithms to tracking problems. Loren Dueck Posted on: You will have ownership of a broad mandate of novel 3D deep learning techniques, with applications in semantic segmentation, 3D object classification, pose estimation, geometry prediction, and more. Responsibilities - Implementing novel algorithms in standard research-oriented frameworks of your choosing PyTorch, MXNet, etc - Developing new approaches to solve the problem of deep learning on fundamentally 3-dimensional inputs More info Contact:Dear Twitpic Community - thank you for all the wonderful photos you have taken over the years. We have now placed Twitpic in an archived state. JOB BOARD Several funded PhD positions at ETS Montreal: Deep Learning for Medical Image Analysis ETS Montreal | Montreal. Applications are invited for several fully funded PhD positions at the ETS, Montreal, Canada. The Color of Art: Free Art Books Page, has a large collection of FREE artists reference works on oil painting, watercolor painting and other artist's techniques. Not all ebooks listed here are public domain, some are links to the their authors sites for . The ethnic composition of Harvard undergraduates certainly follows a highly intriguing pattern. Harvard had always had a significant Asian-American enrollment, generally running around 5 percent when I had attended in the early s. University of California-Berkeley Online Master of Information and Data Science (MIDS) School: School of Information Location: Berkeley, CA Full-Time Program: months Part-Time Program: Yes Online Option: Yes UC Berkeley’s Master of Information and Data Science is a new degree intended for professionals who want to learn how to . Please see our Sample APA Paper resource to see an example of an APA paper. You may also visit our Additional Resources page for more examples of APA papers.. How to Cite the Purdue OWL in APA. Individual Resources. The page template for the new OWL site does not include contributors' names or the page's last edited date.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251681625.83/warc/CC-MAIN-20200125222506-20200126012506-00089.warc.gz
CC-MAIN-2020-05
5,720
22
https://www.powersync.com/blog/powersync-update-february-2024
code
Our Flutter Web support and ORM support are top of the bill this month. We’re also welcoming two new team members joining us on our mission to make local-first the easiest architecture for app development — welcome Mugi K and Christiaan L! We saw a record number of new users sign up for PowerSync in February, in line with growing interest in local-first software development. Carl K wrote about how the local-first DX benefits from simpler state management while Simon Grimm says that local-first is the future; check out his video below: Flutter Web Support: Open Alpha Release Thanks to Giorgio G and Ben C for spurring us on and providing valuable feedback on our first release. ORM Integrations: Drift and Kysely Thanks to Simon B, Rody D, Josh S and Steven B for their help, thoughts and guidance. Dashboard Update: Granular Deploy Statuses This small but mighty UX update brings more granular deploy statuses to the deploy logs in your PowerSync dashboard. Logs now show one of four explicit statuses: - “No replication errors” - “Processing sync rules” - “Warning: No connection configured” - “Warning: No sync rules deployed” Temporary Development Tokens Support for temporary developer tokens allows you to get up and running with PowerSync quickly, without implementing a full auth solution. This is particularly relevant for non-Supabase projects. Thanks to Carl K for helping us think through this. February Community Call We held our first community call of 2024, with Dom B demoing the new PowerSync CLI, Conrad walking us through a CRDT implementation on PowerSync, and Husain B and Matt W showing off Jetpack Travel, a cross-platform travel management app built with PowerSync. We also covered our current roadmap priorities.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818474.95/warc/CC-MAIN-20240423095619-20240423125619-00570.warc.gz
CC-MAIN-2024-18
1,763
17
http://wiki.severcart.org/doku.php/en/installation_of_severcart_on_ms_windows_7_64_bit
code
As basic OS for this example of installation it is selected by the Microsoft Windows 7 64 bit. Also other versions, for example, of the Microsoft Windows 2012 Server or the Microsoft Windows 2008 Server are also possible. For functioning of a software product, it is necessary to download the following software products: PostgreSQL 9.4 a choice of digit capacity depends on your operating system. Installation files can be downloaded here: Be sure that you have installed the Visual C++ 2010 SP1 Redistributable Package: Win64 vcredist_x64.exe, Win32 vcredist_x86.exe Python 3.4 compiled in the Visual Studio 10 Apache 2.4 which is brought together in the compiler VC10 The mod_wsgi 4.4.12 module for Apache 2.4 compiled in the compiler VC10 https://github.com/GrahamDumpleton/mod_wsgi/releases?after=4.4.13 in archive there will be several modules, for different versions of Apache and compilers. Selection terms will be described further. The freshest version of the program is recommended to installation. Attention! In order that installation process took place successfully, it is necessary to launch the program of an installer from the user name having admin privileges and also the user login on behalf of which the program is launched shall be surely collected by Latin characters. We wait for installation process completion process We launch the psql program through Start - All Programs - PostgreSQL 9.5 - SQL Shell (psql) Also we enter the text into windows shell postgres=# CREATE USER scuser WITH password '123456'; This instruction creates the user of scuser. Further we create the database postgres=# CREATE DATABASE severcart WITH ENCODING='UTF8' OWNER=scuser CONNECTION LIMIT=-1 TEMPLATE template0; On it preparation of DB is complete. After downloading of archive with the program, we unpack it in the directory C:\Apache24\. We launch command line of Windows cmd with the rights of the superuser, further we pass into the directory We collect in command line C:\Apache24\bin>httpd.exe -k install -n "Apache2.4" This instruction will transfer operation of web the Apache server to the mode of service. Let's launch service C:\Apache24\bin>net start Apache2.4 After the service successfully starts, we check that the program listens to the 80th port. For example, it can be checked in the Google Chrome program having transferred to the address 127.0.0.1. If you see the text of “It works!” the server means it is successfully installed. We activate the «Add python.exe to Path» point for adding of a way of the program to the list of the Path variable We click «Yes» for reset of the PC. Attention! Installation of mod_wsgi only after Python installation, differently the Apache server will collapse with an error. The downloaded archive of mod_wsgi-Windows-4.4.12.tar.gz contains the directories Apache22-win32-VC9, Apache24-win32-VC10, Apache24-win32-VC9, Apache24-win64-VC10 which contain the compiled mod_wsgi modules for different processor architecture and compilers. Since we have the 64th bit architecture and Apache compiled in MS VC10, select Apache24-win64-VC10. If you have the 32nd architecture, then select Apache24-win32-VC10. The file of the module with extension of so is selected proceeding from the set Python version. In this case it will be the mod_wsgi-py34-VC10.so file. We copy the unpacked mod_wsgi-py34-VC10.so file in the directory C:\Apache24\modules. Further we rename the mod_wsgi-py34-VC10.so file on mod_wsgi.so We connect the new module to the Apache 2.4 program. We add a line to the principal configuration C:\Apache24\conf\httpd.conf file LoadModule wsgi_module modules/mod_wsgi.so We reboot service Apache C:\>net stop apache2.4 C:\>net start apache2.4 If the service successfully started, everything means it is made truly and it is possible to pass to the following step. In command line of cmd it is executed C:\>pip install virtualenv We create the virtual envirement C:\> virtualenv c:\venv\ We launch the C:/venv/severcart/tkinstaller/install.py file for installation of necessary dependences. This program itself will download and will set necessary dependences for functioning of a software product of Severcart. In installation process the name of the new user who will perform functions of the system administrator will also be requested. We enter admin. Further the password is requested, we enter the password. We confirm password entry. We add the following contents to the end of the C:\Apache24\conf\httpd.conf file Alias /static "C:/venv/severcart/static" <Directory "C:/venv/severcart/static"> # for Apache 2.4 Options Indexes FollowSymLinks AllowOverride None Require all granted </Directory> WSGIScriptAlias / "C:/venv/severcart/conf/wsgi_prod.py" WSGIPythonPath "C:/venv/Scripts/" <Directory "C:/venv/severcart/conf/"> <Files wsgi_prod.py> Require all granted </Files> </Directory> Here ways by default to the program are selected. We reboot service Apaches in order that changes in the configuration file were applied. net stop apache2.4 net start apache2.4 Further in the browser we open the http://127.0.0.1/ page. If you see the following installation means took place successfully. On it is installation is complete!
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886116921.70/warc/CC-MAIN-20170823000718-20170823020718-00437.warc.gz
CC-MAIN-2017-34
5,207
49
https://forums.developer.nvidia.com/t/jetson-nano-multimedia-api-example-01-encoder-with-gdr/160423
code
I’ve tried to run an encoder from Multimedia API samples/01_video_encode with the following command line: ./video_encode input.yuv 1920 1080 H265 output.h265 --egdr -gdrf params.conf --input-metadata while param.conf includes text with numbers “first_frame first_frame-1” lets say “11 10” The gdr made wrong number of slices (2 or 3 each frame) and always put the “I” slice at the same position (second). Do you have any idea what I’ve done wrong? Maybe do you know some example I can learn from? Thanks for future help :)
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703506832.21/warc/CC-MAIN-20210116165621-20210116195621-00181.warc.gz
CC-MAIN-2021-04
538
7
https://coursepear.com/icsi-311-calling-functions-in-the-interpreter/
code
这是一门ICSI 311的编程代写网课代上,介绍编程语言的设计和实现,包括语言特性、范式和设计决策。 简要介绍功能和逻辑编程范式并强化面向对象的概念。 讨论解释器、编译器、transpires 和虚拟机,包括词法分析、解析、语义分析、优化、代码生成。 自动机和状态机简介。 先决条件:ICSI/ICEN 210 和 I CSI/I CEN 213 要求 C 级或更高。 CoursePearit作业代写 @2009。 This assignment is extremely important – (nearly) every assignment after this one uses this one! If you have bugs or missing features in this, you will need to fix them before you can continue on to new assignments. This is very typical in software development outside of school. You must submit .java files. Any other file type will be ignored. Especially “.class” files. You must not zip or otherwise compress your assignment. Blackboard will allow you to submit multiple files. You must submit buildable .java files for credit. Calling functions is a tricky business. There are several steps to take to make sure that everything is handled correctly. define add (a,b : integer; var c:integer) Now consider some different ways that we could call this code. add 1, 2, var c add a, 2, var a And some things that shouldn’t happen (and should be an error!): add 2.3 7.4 var a Another “gotcha” to think about – what if we change the value of a variable that is not marked as var. What should happen? We could throw an error. That would require us to look at every assignment statement and judge if the assigned variable is changeable. But we would also have to look at every function call, to see if the passed variable is marked as var! define changer(var a : integer) add a,1,var a And what if I call changer with: One approach to this is to forbid it. If you try to call a function without matching “var”, it should fail. This is a legitimate way to handle this situation, but we are doing something else – something that will let us deal with constants, too. When a function is called: - Locate the function definition; this could be a built-in (like read or write) or it could be user-defined. - Make sure that the number of parameters matches OR that the function definition is variadic and built-in. - Make a collection of values (InterpreterDataType): For every parameter in invocation: - Add the constant value or the current value of the variable in the invocation - Now we call the function (either the interpreter or the “execute” of the built-in function), passing it our collection. - Finally, we loop over that set of values – the called function might have changed some! - For each value, if the called function is variadic or the called function is marked as VAR and the invocation is marked as VAR then - Update the working variable value with the values “passed back” from the function. Work on the interpreter Create a static InterpretFunction in the interpreter – it should take a FunctionNode (i.e. the function to interpret) and a collection of InterpreterDataType – the parameters to the function. To interpret a function, we will make a hashmap of string->InterpreterDataType – this will hold our variables. Add all of our parameters to the hashmap using the names that our function expects. Next add all of the local variables to the hashmap. Remember that we stored the constants in the “Local Variable” section, so we need to set the initial values of these variables as appropriate. Finally, we will call a function called “InterpretBlock” – this function will process all of the code between “begin” and “end”; we will use it later for conditionals and loops. InterpretBlock should take the collection of statements and a hashmap of variables. We will loop over the collection of statements. For now, the only statement type that we will handle is function calls. If the statement is a function call, implement the process described in the background section, otherwise we will ignore the statement (for now). In “main” we are using the parser to parse functions. Create a hashmap in the interpreter that maps names (strings) to CallableNodes. In main, every time we encounter a function, add it to that hashmap. Also add the built-in functions that we created previously to the hashmap. We now have a complete data structure of all of our code. Finally, in main, call InterpretFunction on the function named “start”; it is an error for that function not to exist. You should now be able to run programs so long as they only call functions. You can use read and write to get data in and write data out. You can test random numbers and data conversions, too! |Comments||None/Excessive (0)||“What” not “Why”, few (5)||Some “what” comments or missing some (7)||Anything not obvious has reasoning (10)| |Variable/Function naming||Single letters everywhere (0)||Lots of abbreviations (5)||Full words most of the time (8)||Full words, descriptive (10)| |InterpretFunction||None (0)||One of: creates variables from the parameters, local variables and calls interpretBlock (5)||Two of: creates variables from the parameters, local variables and calls interpretBlock (10)||Creates variables from the parameters, local variables and calls interpretBlock (15)| |Main||None (0)||One of: Creates hashmap of functions, adds built-in functions, calls start (5)||Two of: Creates hashmap of functions, adds built-in functions, calls start (10)||Creates hashmap of functions, adds built-in functions, calls start (15)| |InterpretBlock – Create parameters||None(0)||One of: Checks parameter counts, creates values from constant values, creates values from variables (7)||Two of: Checks parameter counts, creates values from constant values, creates values from variables (13)||Checks parameter counts, creates values from constant values, creates values from variables (20)| |InterpretBlock – call the function||None(0)||Calls either built-in functions OR interpretFunction (5)||Calls both built-in functions and interpretFunction (10)| |InterpretBock – update variables||None(0)||Updates all variables (10)||Updates VAR variables correctly (20)|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500303.56/warc/CC-MAIN-20230206015710-20230206045710-00482.warc.gz
CC-MAIN-2023-06
6,207
41
https://www.herpcenter.com/threads/first-kingsnake-advice.55697/
code
Hi, I'm not entirely new to snakes, I've handled them many times and taken care of them for a friend for a fairly long period of time. I've also owned leopard geckos, so I have a general idea of how reptile terrariums are set up. Recently, I've been looking into buying a kingsnake (Mexican black kingsnake, to be specific). Could someone give me some tips on what to buy as soon as I get him? First order of business is the terrarium/vivarium/cage/tank/whatever you want to call it. I've heard people say that snakes need about a square foot of space per foot of snake, and I'd rather get a large terrarium for my snake even as a juvenile than have to buy a new one in a few years. Since Mexican black kingsnakes get 3-4 ft long, that would be a 3-4 sq. ft terrarium. Approximately how many gallons is that? Also, substrate--is sand good for kings, or should I use aspen? It doesn't really matter to me, but what's more comfortable for the snake? Secondly, how often would I need to feed it (I know kingsnakes tend to be more ravenous than most other snakes)? I'll be feeding it frozen-thawed mice of the appropriate size and occasionally a live mouse or something else (maybe a feeder anole?), I hope that's okay. Also, are kingsnakes more prone to biting people than corn snakes? The snakes I mentioned earlier were corns, and I could hold them without the slightest fear of being bitten by them. Even if my king does bite me, I don't really mind colubrid teeth, but I want to let my younger cousins and family members be able to handle my snake occasionally and I don't want it to bite them. I've heard that juveniles bite more, which is understandable, and that once they learn that you aren't a threat they rarely bite at all. Okay, sorry for the long post, but I want my kingsnake to be happy and comfortable. Thanks in advance for any advice!
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313803.9/warc/CC-MAIN-20190818104019-20190818130019-00053.warc.gz
CC-MAIN-2019-35
1,850
1
https://www.ourworldthegame.com/single-post/first-production-ready-release-of-web4-oasis-api-more
code
First Production Ready Release of WEB4 OASIS API! & More! :) It gives us great pleasure to announce that the first production ready release of the WEB4 OASIS API was made on the 5th May (v2.1). The first ALTHA release was made on Oct 10th 2010 and since then it has come a long way with many improvements. The latest improvements include: - Error handling. - Improved documentation. - Improved error reporting. - Additional overloads/endpoints. - Re-written and improved Avatar API. - New AvatarDetail API - SQLLiteOASIS Provider. - Neo4jOASIS Provider. - EthereumOASIS Provider. - EOSOASIS Provider. - So much more! Check it out here: https://api.oasisplatform.world Time to start building on The OASIS... ;-) Lot's more exciting news & features coming soon including: - Auto-Load Balancing. - Moving Auto-Replication to background thread/service to further improve performance. - Quantum Encryption. - GraphQL Endpoint. - Grpc Endpoint. New Key & Wallet API Preview (v2.2) We are also about to release v2.2 which will include a new Key & Wallet API for managing and aggregating all your wallets/keys into one fully integrated simple to use OASISWallet linked to your Avatar. So basically the private keys are stored locally on your machine as people suggested so the wallets minus the private keys are stored and replicated on all providers such as blockchains, cloud, dbs, web 2, web3, ipfs etc but only the full wallet with private keys are stored locally. The cool bonus and side effect of being built on the OASIS API is the private keys will be auto replicated and backed up to all your local devices and local providers running on them so it will be double backed up, an issue with storing your keys only on your device is they are not backed up and people lose their keys and access to their wallets and money/crypto but with the OASIS it will be auto backed up securely to your local devices and to multiple places and storage providers per device automatically so could be holochain, encrypted file, local dB, even hardware wallet across multiple local devices either connected through Internet or LAN or even Bluetooth. So you never lose your keys again. Also because its built on top of the OASIS architecture it will have auto fail over so if one local storage provider or device goes down it will automatically use the next fastest one. Plus if you get a new device your wallets/keys will automatically sync across to them along with your avatar & all your data. It can also work offline and across Bluetooth, LAN, etc. And they are super secure and stored offline. Plus they will have 3 level encryption including quantum encryption. So the safest most secure and easiest way to store your keys and wallets. Plus they are all linked to your one avatar SSO so you only need to have your 1 login to manage them all in one place. Plus it automatically manages your wallets and keys across the local storage providers and non local storage providers so its much more simple than everything else. Plus it aggregates all your wallets, money and crypto into one OASIS wallet linked to your avatar so you can see all the transactions and balance for them all as if they are just one wallet, it automatically converts between the different tokens and even to fiat because it also links your bank accounts too. Oh plus your wallet will be super fast because its also automatically load balanced and has auto fail over so it will also be 100% reliable and no down time so no more waiting etc (another bonus of being built on the OASIS). We are only just beginning... 😉 This is a slight taste of the kind of thing that the OASIS makes possible... Now with this architecture in place all kinds of unique solutions and use cases can be realised that were not possible... I'm sure others can find lots more powerful use cases we have not considered yet... It's the power of unity consciousness and it's auto replication is based on nature how cells auto replicate etc What is WEB4 & WEB5 Really? We noticed Jack Dorsey has announced his version of WEB4, which is really just a re-brand of WEB3 (it is a web platform built on Bitcoin). So we thought we would remind people what WEB4 and WEB5 REALLY is... ;-) We actually first used the terms publicly last December on one of our Telegram updates: As many of our fans will know, we have been working on the OASIS API since 2017 and Our World since 2011 (the first world within the WEB5 STAR OASIS Omniverse) WEB 4 OASIS API is a fully distributed decentralised fault tolerant load balanced integrated API that runs across the full Internet acting as an abstraction layer over everything and serves as a network of networks. One of the core design goals of the OASIS is maximum interoperability (to remove all silos and walled gardens) to the point everything merges into one (the singularity) and also to be super powerful but super easy and intuitive to use. It also harnesses the best of each provider so the OASIS uses the strengths of each provider to the maximum and removes all weaknesses, it automatically uses the most appropriate provider or providers for any given use case. The first ALTHA release was made on 10th October 2010, read more here: https://www.ourworldthegame.com/single-post/oasis-api-v0-0-1-altha-live The first full production release was made on 5th May 2020 as announced at the beginning of this post. Check it out here: https://api.oasisplatform.world WEB 5 OASIS STAR OMNIVERSE is built on top of the OASIS API and aggregates all the worlds data and expresses it within a cyberspace ontology using a cutting edge custom built ORM (Object Relational Mapper) called COSMIC. The STAR Omniverse is both a simulation & game of life and aggregates all metaverses into one fully integrated unified platform. Read more about STAR here: WEB5 STAR Omniverse ALTHA will be coming later this year... watch this space! ;-) Both WEB 4 & WEB 5 use machine learning AI to analyse all of the worlds data to generate useful insights, predictions & so much more! To summarize, WEB4 OASIS API aggregates all of the worlds data into a fully unified API to allow better sense making to made, which then feeds into WEB5 STAR, which expresses it in a cyberspace ontology and connects the worlds data to the rest of the COSMOS and Galaxy... ;-) Here are some scribbles our founder & CTO Visionary David Ellams made at 4am over the past few months, we plan to write these up and publish them very soon once we get the demos of WEB4 OASIS API going... :) The long awaited OASIS API Demos & Hackalongs begin June 21st! We are very happy to announce we will finally kick off the OASIS API Hackalongs and Demos on June 21st with a different module/theme being demoed/explored each week: June 21st - Avatar/Karma SSO API. June 28th - Data API. July 5th - Provider API. July 12th - Key/Wallet API. July 19th - Tech DeepDive. July 26th - OASIS Web UI/Portal. Aug 2nd - General Q&A (AMA). More to come soon... The above is subject to change depending on circumstances etc. These will be held at 1pm EST and will last around an hour, but may run a little longer depending on questions, etc. We will demo each new module and then take questions at the end. Please check the main telegram group: https://t.me/ourworldthegamechat for latest updates as well as a link to the zoom call to join. Thank you. We originally was going to demo everything in one session but the OASIS has grown so large it would take a very long time so we thought it best to break it into modules/sessions to make it more manageable! ;-) Please reach out to us on the above group and this one: https://t.me/oasisapihackalong to let us know if you will be attending and for what sessions, thank you. In Love, Light & Hope, The Our World Tribe. Open Source Code NextGen Developer Training Programmes
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510575.93/warc/CC-MAIN-20230930014147-20230930044147-00424.warc.gz
CC-MAIN-2023-40
7,818
73
http://sourceforge.net/mailarchive/forum.php?forum_name=webware-discuss&max_rows=25&style=nested&viewmonth=200303&viewday=28
code
I have to write a survey web application. I think, this is boring and I don't want to do it. But my boss wants me to, so I don't have a At least I'm free in selecting my tools, and thus I will do it in Webware. Now my question is: did anyone already write a survey in Webware, that is freely available? Or does anyone know of a python survey cgi, that I could adapt to Webware, like I adapted the pikie pikie wiki? I already looked at Parnassus, but didn't find anything This survey will not be a simple poll, but a real survey with lots of questions and some way of prohibiting people to answer twice. Grateful for any help or pointerstwice. Grateful for any help or pointers,, Frank Barknecht _ ______footils.org__
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163791972/warc/CC-MAIN-20131204132951-00096-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
716
12
http://www.rgops.com/group-theory-examples.html
code
The central hypothesis of social identity theory is that group members of an in-group will seek to find negative aspects of an out-group, thus enhancing their self-image. Given a group G, then asks what representations of G exist. The degeneracy is lifted when the potential has a different radial dependence in more complex atoms, although the spherical symmetry is still there. Different cryptosystems use different groups, such as the group of and the group of. Most Plus articles go far beyond the explicit maths taught at school, while still being accessible to someone doing A level maths. Groups share a fundamental kinship with the notion of. How about Galois theorem that a prime degree equation is solvable if and only if all the roots are rational functions in two of the roots. After this the warden will ask each of the prisoners to say which box contains their name. For instance, in the symmetric group on four elements, consider the two-element subgroups: and: The map sending to is an isomorphism between these subgroups, but does not come from any symmetry of the underlying set. Group theory can determine these states in advance, so that the splitting is given by a simple diagonal matrix element. The book by Kane will give you an idea, if you don't have one already. By the above, it plays a pivotal role in special relativity and, by implication, for. What you find are the irreducible representations of the rotation group in three dimensions, O 3, and the rules for combining them. The influence is not unidirectional, though. This representation is almost always reducible, and the component irreducible representations can be found by character analysis. Edinburgh: Oliver and Boyd, 1957. Any suggestions for, say, a 25 minute presentation? The change of perspective from concrete to abstract groups makes it natural to consider properties of groups that are independent of a particular realization, or in modern language, invariant under , as well as the classes of group with a given such property: , , , , and so on. For instance, modulo 2, there are exactly two equivalence classes of numbers: the even numbers and odd numbers. I always give this example in my undergraduate Algebra course because it also gives me the occasion to show that in maths there are still questions which are unanswered but can be easily understood by a beginner obviously, I'm referring to Artin's conjecture in this context. The kernel of this map is called the subgroup of relations, generated by some subset D. The presence of the group operation yields additional information which makes these varieties particularly accessible. If more than one state ψ corresponds to the same energy E, this energy level is said to be degenerate not the states, since there is nothing degenerate about the states involved--they simply have the same energy. We have already seen some of them above. The inverse b can be found by using and the fact that the gcd a, p equals 1. Hence, inverse property also holds. In addition to the above question there is the issue of how many different kinds of patterns one can have on a strip frieze patterns. Associativity and identity element axioms follow from the properties of integers. Thus, an isomorphism of groups, by identifying the rules of multiplication in two groups, tells us that, from the viewpoint of group theory, the two groups behave in the same way. There are certain combinations of symmetry operations which can occur together. Main articles: and and likewise uses group theory in many ways. It is often useful to express H as the sum of H 0, an approximate Hamiltonian that is simple and corresponds to most of the energy, and a perturbation Hamiltonian H' that includes finer details. If we can assign people to a category then that tells us things about those people, and as we saw with the bus driver example, we couldn't function in a normal manner without using these categories; i. Tiling the Hyperbolic Plane with Congruent Equilateral Triangles, 7 at a Vertex Tiling the Hyperbolic Plane with Congruent Equilateral Triangles, 8 at a Vertex What makes it possible to tile H 2 by regular polygons in more possible ways than R 2 is the different structure of the group of rigid motions distance-preserving transformations in H 2 compared to R 2. Draw a diagram like the one for C 3v. The concept of a group arose from the study of , starting with in the 1830s. The identity element can also be written as id. Spectroscopic classifications are essentially identifications of the irreducible representation to which the state belongs. The result of modular addition is the of that division. Also, considered as group vectors with 6 components, the characters are orthogonal to each other. The second historical source for groups stems from situations. However, not using Group Theory is like not using a map--you never see the big picture and may go down many blind paths. In the rightmost example below, an element of order 7 of the acts on the tiling by permuting the highlighted warped triangles and the other ones, too. For this to be possible, the subgroup has to be. Let us now generate some representations of the group. If you have studied quantum mechanics, you have certainly studied angular momentum. Don't say it's not 'cute'! Further references may be found in these works. Hence, it is not a total ordered set. Now comes the group theory: the 4 element group of configurations is the Klein viergruppe, not a cyclic group. The group, as a whole, tends to take irrational actions or overestimate their positions or moral rightness. In 1847, made early attempts to prove by developing into. These take place in a particular order. For O 3, we could use the two angles specifying the orientation of the axis of rotation, and the angle of rotation about this axis. For instance, we can have two subgroups of a group that are isomorphic as groups, but behave very differently when viewed as subgroups of. In many cases, the structure of a permutation group can be studied using the properties of its action on the corresponding set. An example with pictures, There are also associated group-like structures, Suppose one has a rectangle and a rhombus neither of which are squares. The structure of groups can also be understood by breaking them into pieces called subgroups and quotient groups. Many chemists are mathematically challenged, so this book had to be written with them in mind. For example, can be interpreted as the characters of , the group of of 1, acting on the -space of periodic functions.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256980.46/warc/CC-MAIN-20190522223411-20190523005411-00157.warc.gz
CC-MAIN-2019-22
6,576
10
https://www.tradepoint360.com/support/articles/Common_Questions_and_Answers
code
Common Questions and Answers Relationship Management & Tradepoint Web Module have a specific list of categories we need within a CRM package. Does Tradepoint allow for different we do allow for categories. You can have literally hundreds of categories and within each category you can have multiple statuses assigned within a drop down list to each category if necessary. Tradeoint allow for multiple databases (i.e. Such as purchased e-mail lists that do not come with contact information)? the "Unsubscribe" functionality come with Tradepoint’s merge and de-dup of multiple users included in the merge with Outlook however, it is designed to replace it using POP3 setting provided by your ISP provider. the website come with this product? complete website does not come with the software. The web module provides a full e-commerce web site module that can be customized with your graphics. We have a one time implementation fee if we implement your graphics within the framework for you, or if you have an asp.net programmer or someone familiar with asp.net then you can have them do it within our framework. We also have graphic designers that we work with that can quote you if you require graphic design work for your web it comes with the product, are there some templates and is set-up included with allow you to manage a website from the Windows application. There are templates that can be adjusted easily to your specification included in the software. The setup of your graphics within the framework can be done for you by a programmer familiar with CRM software is lacking in a secure portal that can be accessed by clients at a different location. Would the web/member services serve as this portal and can clients then view their own relevant information and any forms The Member services area directly supports clients accessing (with your security settings controlling what they can and cannot see and what they can and cannot update the following: Information (contact information, login rights under your company, subscriptions to news letters etc.) documents (any document that you've stored under the customer record that they have web security to be able to access) that they are assigned to including adding notes, tracking progress, and documents (see below) that have been scheduled with them (including confirmations, and declining the appointment which will notify the person that created the appointment and will ask the client on the web site for 3 alternative dates that they might be under Projects, Tasks, and Appointments with uploading of revisions, and full indexing and key-wording. tracking for support including status, updated details, documents we need to purchase Tradpeoint for Windows for each desktop if we had Tradpeoint ECommerce? you fax forms to customers from the software and can they fax forms into the software? To be able to pull up a form from a customer account and then fax it from the software is a huge timesaver. you use Microsoft Infopath, yes. We are also working on our own form generation tool at this time, but for now we use Infopath, and our template technology under documents to work with forms and all forms can be viewed, edited and printed and are stored directly under the contact with full indexing information so that they can be quickly looked up based on responses it possible to have real time help through the web with clients in filling out forms, so we can actually help them fill them out while they are filling out can easily customize the forms that are built by Infopath on the web with detailed help in whatever way you wish to have them show up. Your only limitations are HTML and even then you could use videos, and Flash animations if you wished at any given point. much of the web product is cleartext source code and how much is precompiled/obfuscated? I'm primarily interested in using this product as a framework to build my own future development efforts atop and so am hoping that most of the source is cleartext? vast majority is in ASP.NET 2.0 easily editable classes and pages, built with MasterPages functionality and XHTML compliance in mind. Some of the functionality like the URL re-writing functions and some of our search engine optimization tricks are in a compiled DLL, only because ASP.NET requires them to multiple forms and templates be accessed by individual customers through the web? Can these forms and templates also be filled out and then faxed or emailed from the same Member Services login? can build whatever forms you would like using our web technology. You can easily create views of those forms that are printable. eiki.com does something similar for it's lens calculator. You simply input the information about your projector and it will present you with a printable form that has all of the information about the lens type that can work with your projector and your requirements. Once it's printable, then it's faxable and it's also emailable. You can extend our database system very easily to store custom information in those forms, or you can simply use the Custom Data fields the way dynotrack.com does when filling out their forms. you can use Microsoft Infopath, integrated with Tradepoint to create forms, and store their information in the document management system, which will automatically keyword and index the XML based Infopath documents. Using the rich editing tools in Infopath, it is easy to create very complex forms, and using the Infopath publishing system to the web they can be available to the web. You can also then process those forms online and fax them etc. Depending on the complexity of the forms (i.e. are they multi-step, deterministic forms?) this may be your best bet. a document be scanned and then uploaded into the web from another electronic document can be uploaded into the web from anywhere via the secure member services area. The scanning has to happen on the client's machine, so the client scans it, and then uploads the resulting file. So the process is a two step process and the ease of scanning a document into a single file will be determined by the software that came with the using Exchange/Outlook right now - would we still need Outlook, Exchange or some other mail server (or none of these) in addition to this? work with any POP3/IMAP or Exchange server to send and receive email. You don't need Exchange for collaboration or anything else. If you've paid for it though, you might as well install the POP3 connector and just use it like a mail server unless you want to outsource your email. currently collect quite a bit of custom information from our customers during the order process. How expandable/customizable are the fields for the CRM package? We'd want to add tons of new data fields for each Custom data functionality which is throughout the software on almost every window allows you to enter any data you want, and categorize it and order it however you want. Further, it allows you to define data types so that you can enforce date formats for example, or that the possible answers are from a list, or a number or percent or just about anything else. of customizing, could you send me a guide on your API, or any whitepaper you might have? Most of my questions revolve how I can adjust and extend API generates it's own documentation as it's a .NET .dll library. (self-describing with detailed documentation on every method and function). We'd be happy to show it to you to give you a better idea of it's power and get right into that, but we don't release our API outside of our signed customers (and their contractors) because of the power of what it can do against our software. (and hence why all extensions created have to be digitally signed by many dotcoms can we set up and support with a license of this? It's a server product that we buy, host, extend, etc so we can use it for as many dotcoms as we like, correct? Would these all run and be managed as separate instances/DBs? We have dozens of small, few-page dotcoms we would like to support but only 1-2 "bigger" sites so it's important to us that it's a one-time, purchased license. Speaking of which, since this is a server product it would cost us no more to support 8 employees than it does to support 200, right? is actually a full windows application with deep hooks into the web. Microsoft calls our type of application a "smart client" which I think is an appropriate term. However, even in the case of web applications such as salesforce.com etc. there is a per user fee, and Tradepoint is no different. Tradepoint sets itself apart from a purely web application in that it can work online and offline. You can be anywhere with or without an Internet connection and it will establish a 3x512 bit encrypted connection and synchronize data as soon as there is an internet connection. That combined with the very rich user interface that we provide sets Tradepoint apart from a purely web based application. web site with a unique URL requires a separate web site license, although you can manage that site and all of the others from one database if you we schedule and see PROJECTS in a Calendar view? the schedule shows in a collaborative form so you can see who is working on the project, what hours they are available and you can track the time that has been spent on the project through the punch clock built into Tradepoint. Billing can also be done based on hours that have been scheduled as multiple schedules be created on ONE PROJECT? you mean for multiple individuals or in your case multiple sub-projects within a project(for example installing an electrical system as well as plumbing in a house?). If so, then yes because the system is fully integrated with the collaborative scheduling system and thus every team member can have their own schedule laid out, and all appointments within the detailed plan of the project will also show within their schedules. we upload and assign pictures and docs to a documents and pictures can be uploaded in any document type from Microsoft Office, PDF, and numerous picture formats. A link can also be established between high resolution pictures and other documents such as blueprints allowing instant access to these documents that would otherwise take up a great deal of long does it take? can vary depending on how quickly we have the information we need from you. Your channel partner will perform a systems analysis on your current network and need general information on each machine you would like Tradpeoint installed on(processor speed, available memory, type of anti-virus and spyware software used, etc.) In addition if you would like any data files from current applications you are using uploaded they would need that as well. What is included to begin and on an ongoing basis? are two types of training, User based and Administrator. The Administrator training encompasses security permission and the related customizations as well as establishing what type of users have access to which information and related functionality of the software. The user based training covers the remaining functionality of the software for those who will be using it on a daily basis(CRM, email, scheduler, Project Management, documents, this included in set-up? speaking as part of the set up and installation, no. We do cover customization in training. Tradepoint is customizable throughout the software giving you control over your business process. We recommend the client do their own customization because as your business evolves you will know how to adjust Tradpeoint to meet changing needs in the future. We will show you how to setup custom fields within the system and discuss all of the places that you can add custom fields to during training.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107900200.97/warc/CC-MAIN-20201028162226-20201028192226-00439.warc.gz
CC-MAIN-2020-45
11,767
172
http://sunbeltblog.eckelberry.com/get-out-the-popcorn-its-movie-time/
code
The Antispyware Coalition public workshop in DC was a great experience, and they have just released videos of many of the panels. You can view the whole list here. They use the dreaded Realplayer, but some of these videos are worth looking at if you’re interested in this field. Eric Howes, our director of malware research, is on the panel on “Industry Self-Regulation” (video) (and I ask a question at about 48:00 and Ben Edelman follows me with some good remarks. I also ask a question at about 50:00, to the panel “Overview of Solutions”.) But if you watch one video, watch Walt Mossberg of the Wall Street Journal. He presented a wild, outspoken take on spyware and cookies, followed by an exchange with DoubleClick. You can see it here, just forward to about 23:00. While I don’t necessarily agree with everything he says, it’s quite entertaining.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511424.48/warc/CC-MAIN-20231004220037-20231005010037-00146.warc.gz
CC-MAIN-2023-40
867
4
https://www.cakeresume.com/search?q=Image%20Processing&refinementList%5Buser.desired_position%5D%5B0%5D=Software%20engineer
code
- Browse all search results - Unlimited access to start new conversations - resumes accessible for only paid companies - View users’ email address & phone numbers Algorithm Genetic Algorithm Ant Colony Algorithm Particle Swarm Optimization Language English: TOEIC 890 (Fluent in oral and writing) Japanese medium Work Experience AprMar 2020 Industry-academia C... Android location-based shopping experience Design an auto-generated process to transform pictures into video through Ubuntu Kdenlive Familiar with MVC architecture, Git, full stack, team-coop and s... Inc. 威盛電子 Machine Learning Software Engineer Intern (2019//1) Delta Electronics 台達電子 Big Data Analyst Intern (2019//8) GoTrust ID Inc. 動信科技 QA & UX Intern (2015//2) Awards TSMC x Microsoft CareerHa... The Most Lightweight and Effective Recruiting Plan Search resumes and take the initiative to contact job applicants for higher recruiting efficiency. The Choice of Hundreds of Companies. Search Hundreds of Thousands of Resumes Resume Management via Folders Only public resumes are available with the free plan. Build Your Professional Network Click icon on the company page or under talent search engine to start the conversation.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154042.23/warc/CC-MAIN-20210731011529-20210731041529-00624.warc.gz
CC-MAIN-2021-31
1,222
14
http://raintemplates.com/product/pythia-free-responsive-blogger-blogspot-template/
code
►►►►►►►HUGE SAVING ! CYBER $1.9 ( $5) SALE ◄◄◄◄◄◄◄◄ Pythia with simple & elegant layout is blogger blog template for Fashion fields. Using website like a perfect online tool to connect customers, friends, fashionistas, worldwide is indispensable and Pythia is simple way to help you do it. Pythia based on Blogger platform but enough for you to show your work. Pythia is designed with black & white colors, suit with Fashion model. - Responsive Layout : Pythia theme can view perfectly on almost devices (Smartphone, Tablets, PCs, Laptops) and browsers. - Auto Read more with Thumbnail and number Pager. - Powerful Admin Panel : Layout is explained clearly in the documentation (help file). - Auto Thumnails Resize: You often see thumbnail images on homepage are distorted but let see on Slider of demo theme – There are no distorted images. - Font Awesome – retina ready icon set: never worry about icons will be lost because all icons are using FontAwesome which made by text. - Help files which help you install/customize template. - Slider: Showing top slide is so easy with shortcode. No touching code. - Menu fixed while scrolling. - SEO Optimized. - Instagram widgets. - Related Posts - And More. This template is instant download via Raintemplates’s digital downloads service. After your payment has been processed (usually within a few minutes), Raintemplates will let you know that your order is ready to download. You will be able to download the .zip folder containing your theme. Just unzip the file and follow the instructions! Template will be resold. It is not a one-of-a-kind design. No physical product will be delivered. This template is made for the Blogger platform and will not work on any other platform. We love hearing from people, whether it be feedback or even just to say hello. So feel free to drop us a line!
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303385.49/warc/CC-MAIN-20220121131830-20220121161830-00287.warc.gz
CC-MAIN-2022-05
1,874
19
http://www.reddit.com/r/lisp/comments/1jc2jn/the_popularity_of_four_lisp_dialects_on_github/
code
use the following search parameters to narrow your results: e.g. subreddit:aww site:imgur.com dog subreddit:aww site:imgur.com dog see the search faq for details. advanced search: by author, subreddit... ~9 users here now A subreddit for the Lisp family of programming languages. Other Lisp related subreddits: Common Lisp Language References Useful Lisp resources: Free Lisp Books / Papers Common Lisp implementations (Open Source) Common Lisp implementations (Commercial) The Popularity of Four Lisp Dialects on Github (wenshanren.org) submitted 12 months ago by agumonkey [–]59Nadir 2 points3 points4 points 12 months ago The author is notified that Racket is the 25th most popular language on Github, but uses this information to say that Scheme might be more popular than Clojure... Why not just consider it a separate language and modify the article? Racket isn't Scheme. REDDIT and the ALIEN Logo are registered trademarks of reddit inc. all it takes is a username and password is it really that easy? only one way to find out... already have an account and just want to login? π Rendered by PID 10343 on app-264 at 2014-07-29 09:58:11.332216+00:00 running 6b32762 country code: US.
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510266894.52/warc/CC-MAIN-20140728011746-00110-ip-10-146-231-18.ec2.internal.warc.gz
CC-MAIN-2014-23
1,192
23
https://www.experts-exchange.com/questions/28266776/deploy-Hyper-v-on-virtual-windows-server-2008-R2.html
code
Hi, in a test lab I'm attempting to add the role of Hyper-v to a 2008 R2 server but i get the error message: Please see attachment Hyper error 1. When I select the virtual machine and click on settings and then the CPU i get the following displayed: Hyper error 2 attachment. As you can see the options for virtual technology support are greyed out. I have a Qaud core i7 chip and i have gone into the BIOS and checked 2 settings: Intel Virtualization Tech and Intel HT Technology . I have set them both to enabled and booted the PC. I have also booted the virtual server ( i also tried deploying the role to a 2008 R2 AD server but got same result) but i am still getting the same error. Any ideas much appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156724.6/warc/CC-MAIN-20180921013907-20180921034307-00507.warc.gz
CC-MAIN-2018-39
716
7
http://serverfault.com/questions/tagged/network-filesystem
code
I need a network file system that can be accessed from multiple machines as the same time and that it will still be able to keep like 100.000 subdirectories of a single directory. In case someone is ... We have a cluster of web servers that currently stores temporary files (that have been uploaded by users) on a central shared filesystem. The limitation being that anytime the server containing the ... Are there are any performance considerations / drawbacks of storing Solr index files on a NFS mount? Our PHP application consists of a single web server that will receive files from clients and perform a CPU-intensive analysis on them. Right now, analysis of a single user upload can take 3sec to ... Is it possible to import file system owned by a single user and export as multiple virtual volumes, owned by multiple users? Is it possible to import a file system owned by a single user, (e.g. mounted via NFS) and export it again as multiple virtual volumes, owned by multiple users, where each volume is a folder on the ... NFSv3 is widespread, but the default security model is... quaint. CIFS can use Kerberos authentication, but without POSIX semantics it's a non-starter. AFS never did encrypt traffic on the wire and ... I'm trying to reference a file in the command line, but I keep getting the 'No such file or directory' error. The system uses SSH for the protocol. Examples (that cause error): grep regex ... I'd like to replace FTP access with systems that are more secure. Sending passwords in plain text with no encryption is unacceptable and with single-sign-on growing, becoming less acceptable daily. ...
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207925696.30/warc/CC-MAIN-20150521113205-00343-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
1,627
9
https://support.covidence.org/help/export
code
To export your data extraction or consensus data, go to the export page in your review. You can also export your data directly from the extraction page: In the Data Extraction section you will be able to export a CSV with the following options: You can select to export consensus only data or consensus and individual data. The system will warn you when selecting an export with individual data as it contains unblinded data. - Individual reviewer data - Data export of pre-consensus data for each study that has saved or completed data for data extraction or quality assessment. - Data extraction Consensus data - The data extraction consensus data for each completed study. - Quality assessment consensus - The quality assessment consensus data for each completed study. Your export file should be organised into rows and columns that are easy to read. If the data displays poorly in the Export file, it could be because your software is configured for a language (e.g. French, Dutch) that uses commas in numbers where English uses decimal points. Where precisely this setting is changed will depend on your operating system, but generally is it within the advanced regional and language settings. If you have exported csv data containing Chinese characters that do not display correctly in e.g. Excel, we recommend the following: - Create a new file. - Import the csv data and select Unicode (UTF-8) as the file origin.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474650.85/warc/CC-MAIN-20240226030734-20240226060734-00402.warc.gz
CC-MAIN-2024-10
1,422
11
https://www.ansible.com/blog/inside-ansible-automation-platforms-automation-services-catalog
code
Red Hat Ansible Automation Platform 2.2 introduces a technical preview of automation services catalog. Automation services catalog was first developed in the cloud at console.redhat.com, with capabilities for fast, agile development and feature release. Over time, Red Hat continually adapted features to meet customer requirements and incorporate their feedback. As customers became more familiar with the benefits, they’ve since requested the ability to access these catalog components within their firewalled infrastructure with direct access to the Ansible clusters and their corporate identity services. We continue to listen and are providing a private version of automation services catalog, installed by the platform installer alongside automation controller and private automation hub. Products, Portfolios and Platforms As far as catalogs go, there is a fairly standard pattern to follow. Here is the first glimpse of the user interface. This image shows what are known as “products”. Products reside within “portfolios,” which allow the administrator to group products into sharable, access controlled folders. Products are simply references to a job template or workflow. What I really like about having this new level of abstraction is that I can reference the same job template in a product multiple times. A good example of this is where I have created a job template that provisions a virtual machine. The job template takes inputs for CPUs, memory and storage as you would expect. As we extend automation to end users in the automation services catalog, it makes sense to control what the users can choose, otherwise every virtual machine requested on this job template is likely to have 20 CPUs and 20 GB of memory. The product abstraction allows the administrator to create three separate product instances: small, medium, and large. The administrator can then set default read-only values for the CPUs, memory and storage for each product instance. So the small is 1 CPU and 1 GB of memory, the medium is 2 CPU and 2 GB of memory and so on (see Illustration 1). The survey editor within automation services catalog allows for setting default values, hiding survey questions, or setting questions as visible but read-only. Hiding questions that exist in the job template is useful when presenting the job template as a product to less Ansible savvy users. Illustration 1 - Mapping Products to Job templates Other catalogs tend to throw in infinite code possibilities to this feature, but automation services catalog provides codeless, multi-level approval. As an approval administrator, you can create multiple levels of approvals pointing to groups coming from your corporate authentication directory. As an example, the small, medium and large product instances shown earlier can be arranged so that the large product offering requires approval by your datacenter administrators and finance team for budgetary control. The medium may only require approval by the project administrator and the small requires no approval at all. The large product offering, when ordered by an end user, will initiate an approval request for the datacenter administrators, which will then be issued to finance to approve the order. If anyone in the datacenter group denies the request, finance will never receive the notification to review the order. Illustration 2 shows how approvals look for individual products as well as an entire portfolio. Approvers in automation services catalog get notifications either in the application itself, or via their registered email address in the corporate identity provider. Approvers can enter the automation services catalog UI and either approve, deny, or comment on a request. Commenting allows for interaction with other approvers in the same chain, whether checking on other requirements, confirming the scope of the requestor reviewing the full transcript history. Automation services catalog also includes some easy administrative functions, such as copying a product or an entire portfolio. This is beneficial when you are creating multiple portfolios of the same or similar product content. You can create it once, beautify all the products and then copy the portfolio many times, making small edits each time rather than recreating the entire portfolio. Beautification is all about making the products look attractive for end users. The job templates and workflows in automation controller have limited meta data, so you can extend the name, description and add a product icon with automation services catalog. The following screenshot shows the order queue for a user, and how the products have their own icons and names. In addition to beautification, automation services catalog has limited rebranding possibilities in technical preview so you can change the login splash screens and the automation services product images and text. This means you can brand the automation services catalog with your company logos, which is great for service providers. If you wish to reduce friction in your Ansible team, expand automation to a broader user base or enable developers to self-serve. Automation services catalog extends your automation to the end user safely by providing out of the box, codeless, and multi level approval and portfolio sharing. Automation services catalog is in technical preview for Ansible Automation Platform 2.2.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334855.91/warc/CC-MAIN-20220926082131-20220926112131-00385.warc.gz
CC-MAIN-2022-40
5,398
15
https://community.sendbird.com/t/how-to-mock-sbdgroupchannel/1526
code
I’m trying to mock a SBDGroupChannel, but the initializer is not public. So, I cant create a mock to it. Is there a way of doing it? I’ve found this method, but what kind of data should I pass in order to return a channel? SBDGroupChannel.build(fromSerializedData: _) -> SBDGroupChannel?
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154219.62/warc/CC-MAIN-20210801190212-20210801220212-00509.warc.gz
CC-MAIN-2021-31
291
3
https://unix.stackexchange.com/questions/273313/bash-catch-input-for-a-substituted-command-stored-in-variable
code
How would I be able to catch the input for a substituted command stored in a variable? How would I be able to catch the input for the following command? bar_foo=$(openssl passwd -1 -salt "foobar") The approach you're showing above would catch the output from the subcommand, ie. $(...) into your variable, $bar_foo. When using openssl you can provide the password using either the -in or the $ myvar=$(openssl passwd -1 -salt "foobar" -stdin <<< "blah") $ echo $myvar $1$foobar$1ips4/cyJvjUjCj8w4exx0 It's generally advisable to put the password in a file and then call openssl, since that'll keep it out of your history and shield it from being exposed too openly. The OP ended up using this method to prompt the user for their password using read and then storing it in a variable, $ read -p "Password: " -s pass1 This variable could then be used as input to the $ myvar=$(openssl passwd -1 -salt "foobar" -stdin <<< "$pass1") $ echo $myvar $1$foobar$1ips4/cyJvjUjCj8w4exx0
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540488870.33/warc/CC-MAIN-20191206145958-20191206173958-00302.warc.gz
CC-MAIN-2019-51
975
16
https://developers.suitecommerce.com/subsect1549398862
code
When using two or more images for one product, you can designate one of the images as the default image. The default image displays on the product list page and first on the product details page. To designate an image as the default, add .default to the end of the file name. In the following example, sku12345_toyslide-blueAltB.png is renamed to become the default image: sku12345_toySlide-blueAltB.default.png. After you have set a default image, go to the next step in setting up image-product mapping for the website.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738950.31/warc/CC-MAIN-20200812225607-20200813015607-00456.warc.gz
CC-MAIN-2020-34
521
4
http://aml-expert.com/study-notes/Structuring_or_Smurfing
code
a transaction in such as way as to avoid triggering a reporting or record-keeping threshold. It is one of the most well known money laundering methods, and is a crime in many countries. The people who perform this activity are known as runners or smurfs, employed by the launderers. They deposit small amounts of cash under the reporting threshold, or purchase monetary instruments (cashiers cheques) in amounts under the reporting threshold.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202484.31/warc/CC-MAIN-20190321030925-20190321052925-00538.warc.gz
CC-MAIN-2019-13
442
7
https://www.warriorforum.com/email-marketing/1011306-one-damn-good-way-get-people-unsubscribe-your-list.html
code
This is a must in Email Marketing. For instance, do not start off in your Intro. Email telling your Subs how much you hate SEO ....and then 2 weeks later start Promoting a Product to those same Subs on back linking and getting ranked in Google Bad move !! Or if you talk to your Subs and emphasize the importance of a stable long term healthy lifestyle with no quick fixes. And then the following month you promote a Program that details how to lose 20 lbs in 10 days following a liquid diet You really think none of them will call you out on this ?? Personally, I have Unsubscribed to Lists in the past in very similar cases. So keep it congruent ,which really should not be hard at all if you are Trustworthy to begin with - Robert Andrew
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989874.84/warc/CC-MAIN-20210518222121-20210519012121-00123.warc.gz
CC-MAIN-2021-21
740
8
https://video.stripxpertease.com/module-3-lap-dance-beginners/videos/1601-05-recliner-1
code
Live stream preview Module 3: Lap Dance, Beginners • 2m 19s This moves lets your partner get up close and personal with a GREAT view. Up Next in Module 3: Lap Dance, Beginners Reverse Body Slide Slink and slide all the way down while maintaining eye contact in this oozy lap dance move. Gorgeous! You will need to watch Recliner first. Lap Dance Prep How to get your space ready for lap dance.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949694.55/warc/CC-MAIN-20230401001704-20230401031704-00649.warc.gz
CC-MAIN-2023-14
395
8
https://searchdomino.techtarget.com/answer/How-can-I-use-LotusScript-to-remove-all-attachments-and-save-them-in-a-specified-location
code
I am trying to use LotusScript behind a button to remove all attachments and save them in a specified location. How can I do this? I was able to locate code on another site that provided code to remove an attachment, but they're deleted when I need to save them. I would like to use this to: - run against a mailbox file and strip off and save the attachments and - run against the Notes directory and remove and save ID files to a specified location. Can you help? What you will need to do is to grab the attachment as an embedded object from your document using the NotesDocument class. This is done by using the method Set notesEmbeddedObject = notesDocument.GetAttachment(fileName ) from your NotesDocument. You will then have the actual attachment stored in the notesEmbeddedObject object. This class contains the methods "ExtractFile" and "Remove." With the first one, you can save the attachment to a specified location, and then once that has been successful, use the remove option to remove the attachment from the document. Don't forget to call the Save method from the NotesDocument class to save the document without the attachment.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488253106.51/warc/CC-MAIN-20210620175043-20210620205043-00526.warc.gz
CC-MAIN-2021-25
1,144
6
http://3pd.peculate.us/channel/UC_nVbQfDDyUjkQlbnHB4TyQ
code
Pre-Order MIKA's forthcoming album 'The Origin Of Love', featuring new single 'Celebrate' here http://bit.ly/MSOUNDS Order the album on ITunes here: http://smarturl.it/Origin_Love_DELUXE for all the little internet boys out there this is NOT targeted at anyone i was too lazy to make lots of pictures here's the epic art i made: no fr, don't get mad at me pls ¬_¬...
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156224.9/warc/CC-MAIN-20180919122227-20180919142227-00136.warc.gz
CC-MAIN-2018-39
368
7
https://www.securityweek.com/exploring-concept-disaggregated-security-functions/
code
Network security products are disaggregated into smaller elementary security functions. Compared to a typical network security product, each function is more basic, more stable, simpler to operate and control, more resource efficient, and can be provisioned pervasively, anywhere and per need throughout the network. Imagine too that there is one security control entity that can select and orchestrate all these disaggregated security functions. This entity can compose new sets of functions, constructing logical information and decision flows between them and thus forming a new security solution – All this without asking or waiting for the security vendor to develop a new feature to protect against a new threat that the product cannot handle right now – a process which can obviously take “forever” until completed (usually the threat ceases to exist long before the solution becomes available). In order to fight against a new threat or a more violent variant of an existing one (e.g., that has bypassed the current security solution), the security control entity can disaggregate the existing solution and compose the security functions again in a new way, e.g., with new information and work flow rules, to fight against the threat effectively. The above may seem like a dream, but when we observe the great shifts that the networking arena is going through, we can envision this scenario becoming a reality. What are the shifts? Obviously virtualization and cloud architectures are significant ones. However the market is undergoing additional disruptive changes with the advent of Network Function Virtualization (NFV), the disaggregation of the network functions and Software Defined Networking (SDN). Basically, the SDN concept suggests a centralist control approach that decouples the data-forwarding from the control in network elements, and the NFV suggest how to virtualize and “isolate” basic networking functions, wrapping each function with a set of API’s that would allow easier orchestration of large network environments. In short, virtualization technologies in general, with the help of SDN and NFV are changing the nature of networks in the sense that networks can become truly dynamic. The main benefits of this are: • Provisioning of new network application and resources where and when needed. • Dynamic and “surgical” redirection of traffic flows through network applications per business needs. • More standard API that wrap the basic network functions, which allow building more vendor agnostic network architectures. This obviously helps to mix & match the best network function for each need, i.e., minimizing “vendor-lock” as much as possible. • In general, a network that can rapidly adapt its behavior to business needs while reducing its overall cost. So, how does all this fit into the cyber security arena and to the scenario I described earlier? I believe that in order to reap the greatest benefit from virtualization, SDN and NFV concepts, the control and data-plane functions of network security devices need to be decoupled. Once this decoupling is done effectively, the data-plane security device can be disaggregated into a software defined set of discrete functions; pretty much the same way it is done with more basic networking elements. These disaggregated security functions will become, by nature, more pervasive and flexible throughout the network and will be managed by a centralized security control that will enable scenario described in the beginning of the article. Let’s take a look at the following abstract illustrations which can shed some more light on this concept. Below is a two-step process illustration: first the decoupling of the control layer from the data-plane layer of each security device. Second, the disaggregation of each security device into discrete security functions: Figure-1: Decoupling the Security Devices As shown, the control layer was decoupled from each security device and has been positioned in a centralized security control entity. Its worth mentioning at this stage that in today’s market, each security device has become an “all- in-one” device in a sense that over many years the security vendors have been aggregating a large numbers of security control and data-plane functions into the same network devices with pretty complicated internal flows. This has resulted in products that are complex and resource inefficient. Take for example the next generation firewall devices (NGFW). Over the years firewalls and their NG versions have been aggregating many security functions such as URL filtering, anti-virus and anti-spam features, intrusion detection features, network behavior analysis and anomaly detection features, application visibility and application access control, anti-DoS protections, , vulnerability scanning, encryption (VPN) and decryption functions ,NAT and more. This trend of aggregating functions might have seemed like a good idea at the time that the compute and networks were static and non-virtualized, but now with the aforementioned technological and architectural shifts, it’s probably not a good way to go. Let’s see why not: The idea of the security device disaggregation is illustrated below: Figure-2: Disaggregated Security Devices Figure- 3: Orchestrating Disaggregated Security Functions The color of the functions in the Figure above represents a set of security functions that belong to the same security product category, e.g., IPS functions, firewall functions etc. Each security function has its control and data-plane level. The control part is centralized while the data-plan security functions are disaggregated and can be placed, more economically, anywhere in the network per need and per the required resources for the specific “job” they need to perform. As we imagined at the start, the security controller can orchestrate, e.g., create new compositions of disaggregated security functions together with modified or new logical connections between them – all in order to react quickly against new and evolving security threats. The above concept represents a new way of approaching large security frameworks, enabling them to be designed, built and managed, and respond much more effectively than they are today. The concept is pretty abstract but I hope these illustrations speak for themselves and can communicate the tremendous value this approach could potentially bring to the security arena. To summarize the values of the concept: • Agility & Modularity – disaggregation and composition of a new set of functions becomes a reality and can accelerate the way security systems will reply to evolving threats, fast. • Quality discrete functions – the aggregation of security functions under the hood of the same product and security vendor has resulted in a compromise on the quality of at least some of the functions. Disaggregation solves this. • Mix & match – replacing and mixing different data-plane security functions per need will become something that can really happen. This represents a more “democratized” security framework with less vendor lock. • None or fewer blind spots – security functions can be more easily and economically distributed, pervasively, throughout the entire network, allowing much better visibility and control. • Stability – each function is more basic and hence more stable. This entire concept has a very long way to go until it becomes available to the security community, however it seems worth exploring as it can change the balance between the attacker and defender, more in favor of the defenders…
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944452.74/warc/CC-MAIN-20230322180852-20230322210852-00612.warc.gz
CC-MAIN-2023-14
7,666
34
https://xenforo.com/community/threads/extremely-annoying-member.214618/page-3
code
What do you use to block datacenters? I help admin a forum and over 95 percent of new members is from that. I do this as well, how I do it is you grab the ASN, and look it up here: https://mxtoolbox.com/asn.aspx It reveals all the IP sets. Then, I open an existing XML file that I previously converted the IP sets into. You can do this by banning a few IPs temporarily, and exporting it, you'll get the XML file and formatting it uses. It's a bit of work, but I can do it fairly fast now. Using it with Excel to mass replicate the data, search & replace with Notepad++, I'm able to generate a new XML with the IPs to ban, then I just import it to the Xenforo's IP Ban. Your way of IP banning is wrong. IP Banning VPNs, data centers, etc is fine, but legitimate IP ranges? We have tons of users that are in the same IP range because they use the same Internet & Mobile services. The way you're banning, you're likely blocking legitimate users from even being able to register.Ignore list doesn't work well on this software as the person you're ignoring can still comment on your posts. Banning and deleting is more effective. But you know, you do it your way, and you only have 3 members. Everyone else has tens of thousands, so we'll stick to our way. The Ignore List works.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510941.58/warc/CC-MAIN-20231001205332-20231001235332-00709.warc.gz
CC-MAIN-2023-40
1,274
8
https://www.geeksforgeeks.org/format-string-vulnerability-and-prevention-with-example/
code
A format string is an ASCII string that contains text and format parameters. // A statement with format string printf("my name is : %s\n", "Akash"); // My name is : Akash There are several format strings that specify output in C and many other programming languages but our focus is on C. Format string vulnerabilities are a class of bug that take advantage of an easily avoidable programmer error. If the programmer passes an attacker-controlled buffer as an argument to a printf (or any of the related functions, including sprintf, fprintf, etc), the attacker can perform writes to arbitrary memory addresses. The following program contains such an error: (buffer, argv, 100); Since printf has a variable number of arguments, it must use the format string to determine the number of arguments. In the case above, the attacker can pass the string “%p %p %p %p %p %p %p %p %p %p %p %p %p %p %p” and fool the printf into thinking it has 15 arguments. It will naively print the next 15 addresses on the stack, thinking they are its arguments: $ ./a.out "%p %p %p %p %p %p %p %p %p %p %p %p %p %p %p" 0xffffdddd 0x64 0xf7ec1289 0xffffdbdf 0xffffdbde (nil) 0xffffdcc4 0xffffdc64 (nil) 0x25207025 0x70252070 0x20702520 0x25207025 0x70252070 0x20702520 At about 10 arguments up the stack, we can see a repeating pattern of 0x252070 – those are our %ps on the stack! We start our string with AAAA to see this more explicitly: $ ./a.out "AAAA%p %p %p %p %p %p %p %p %p %p" AAAA0xffffdde8 0x64 0xf7ec1289 0xffffdbef 0xffffdbee (nil) 0xffffdcd4 0xffffdc74 (nil) 0x41414141 The 0x41414141 is the hex representation of AAAA. We now have a way to pass an arbitrary value (in this case, we’re passing 0x41414141) as an argument to printf. At this point we will take advantage of another format string feature: in a format specifier, we can also select a specific argument. For example, printf(“%2$x”, 1, 2, 3) will print 2. In general, we can do printf(“%$x”) to select an arbitrary argument to printf. In our case, we see that 0x41414141 is the 10th argument to printf, so we can simplify our string1: $ ./a.out 'AAAA%10$p' Preventing Format String Vulnerabilities - Always specify a format string as part of program, not as an input. Most format string vulnerabilities are solved by specifying “%s” as format string and not using the data string as format string - If possible, make the format string a constant. Extract all the variable parts as other arguments to the call. Difficult to do with some internationalization libraries - If the above two practices are not possible, use defenses such as Format_Guard . Rare at design time. Perhaps a way to keep using a legacy application and keep costs down.Increase trust that a third-party application will be safe If you like GeeksforGeeks and would like to contribute, you can also write an article using write.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks. Please write comments if you find anything incorrect, or you want to share more information about the topic discussed above. Whether you're preparing for your first job interview or aiming to upskill in this ever-evolving tech landscape, GeeksforGeeks Courses are your key to success. We provide top-quality content at affordable prices, all geared towards accelerating your growth in a time-bound manner. Join the millions we've already empowered, and we're here to do the same for you. Don't miss out - check it out now!
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100452.79/warc/CC-MAIN-20231202203800-20231202233800-00659.warc.gz
CC-MAIN-2023-50
3,534
23
https://tensorflow.google.cn/probability/oryx/api_docs/python/oryx/core/serialize
code
|View source on GitHub| Contains logic for serializing and deserializing PytreeTypes. deserialize(...): Deserializes an object using pickle. serialize(...): Serializes an object using pickle. Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates. Last updated 2021-07-27 UTC.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511170.92/warc/CC-MAIN-20231003160453-20231003190453-00864.warc.gz
CC-MAIN-2023-40
514
6
https://www.vn.freelancer.com/projects/php-website-design/untitled-information-connecting-site/
code
I'm working on a new web project and i need a site developper bid for creating a medium sized website. The site will be relatively simple and should include; users with blogging capabilities, Blog linking to each other, Mobile app, Geocoding and location tracking (or tracking for web), be visually appealing, and have capabilities for web advertising. Ideally i'm looking for a partner willing to do the programming in exchange for significant equity in the project (more detail will be provided for those interested in this option) For Bids, my finances are limited therefore this project will be done a few hours a month (up to a budget) until complete, i will need the total amount it will cost (approximately) plus if it is acceptable to do it a little bit at a time until complete (getting paid on a monthly basis). 13 freelancer đang chào giá trung bình $2142 cho công việc này I am ready to assign a team of 3 dedicated PHP developers and designers for your Blogging website project. Kindly open PMB to discuss your project further and move ahead. Thanks, Sushil Hello Sir/Mam We can do this project for you. Our bid is tentative right now, we will finalize bid amount once specifications are discussed and finalized. We can do this for you. Professional quality is our prime concern. For more description and measure our efficiency please have a look of PMB. Regards
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947693.49/warc/CC-MAIN-20180425041916-20180425061916-00637.warc.gz
CC-MAIN-2018-17
1,383
7
https://premium.wpmudev.org/forums/topic/autoblog-works-on-some-templates-but-not-others
code
The AutoBlog plugin works great on some templates, but not as well on others. One template will show the full article, photos and everything. The recent post summary will show the full text on my website. But I tried using another template, and it only shows the title and summary then links to the external blog site. How can I make this show up like it did with the first template?
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256546.11/warc/CC-MAIN-20190521182616-20190521204616-00430.warc.gz
CC-MAIN-2019-22
383
2
https://microsoft.firstdistribution.com/microsoft_csp_perpetual_licenses/
code
Perpetual licenses are now available in the CSP program – powered by First Distribution. Providing resellers with the opportunity to support their customers to continue to purchase perpetual software licenses as well adding a new range of software licenses available for Microsoft CSP partners to sell to customers. All other subscriptions (Office 365, Microsoft 365 etc.), solutions (Microsoft Teams, Windows Virtual Desktop) and others (Windows Server, Dynamics 365, Azure Reserved Instances etc.) are already available via CSP. The perpetual software licenses in CSP include popular desktop tools such as Visio, Project and the Office Suites as well as the Office components – e.g. Word, Excel and PowerPoint. Also included are infrastructure servers such as Windows Server, SQL Server, and Biztalk Server. Productivity servers include Exchange, SharePoint, Skype for Business and Project Server. By ending the Open License program and introducing perpetual licenses via the CSP program; Microsoft has created new opportunities for CSP partners. Perpetual software licenses are Microsoft products for on-premises use by the customer. Partners participating in the CSP program will have the opportunities to reach a broader and potentially new customers, those who are exclusively still deploying on premises, or using a mix of on premises and cloud, ultimately paving the way for customers move to the cloud. Customers will benefit from a simplified approach and greater flexibility in the way that they purchase software licenses. This makes it easier to understand, and directly improves licensing asset management, at predictable costs. Terms and Conditions • New license-only (L-only) without Software Assurance • Perpetual requires a one-time upfront purchase. • No upgrade rights to a later version • Downgrade rights are applicable to any prior version
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154304.34/warc/CC-MAIN-20210802043814-20210802073814-00052.warc.gz
CC-MAIN-2021-31
1,874
8
http://superuser.com/questions/tagged/tree-view+windows-vista
code
Meta Super User to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site Vista tree view: disabling fade-out of tree nodes When using a tree view (e.g. the folders list in Explorer), there are little triangles next to each node which contains sub-nodes. Unfortunately, they fade out as soon as one leaves the tree view with ... Jul 20 '09 at 18:08 newest tree-view windows-vista questions feed Geek on Sound (or.. does anyone really need a sound card these days?) Hot Network Questions How do I output an entry author's data How would you rate this logo-concept for a Fiber optic internet company and how can I improve it? Draw with your CPU See when packages were installed / updated using pip Simple high school inequality question Using an Apex Repeat in a VisualForce template, do not include particular data from that field How can molecule of a few angstroms absorb visible light of a few hundred nanometers? How can i record intensive action on minecraft Connecting 4 ESCs in parallel A word for one who loves only one girl throughout his life Vector bundles, Higgs bundles and the Langlands program Dispatch not behaving like a normal expression in Mathematica 10 What's waking up my PC? What is the best way to describe "fixed, routine gag" by comedians? Possible reasons for CME not loading Typeset bibliography as part of a cls file Why so many definitions associated with each word? Is Facebook a necessary tool for a student? Should I get an antivirus for Ubuntu? How to typeset Triforce? Why do companies not want to hire over qualified people? Not able to copy paste multiple component and pages in Tridion 2013 SP1 Assigning to multilevel wildcards Best way to store game-wide variables more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776442757.56/warc/CC-MAIN-20140707234042-00038-ip-10-180-212-248.ec2.internal.warc.gz
CC-MAIN-2014-23
2,283
54
http://keszthelyiplebania.hu/journal/aggljkp.php?7de930=battle-cats-save-editor
code
After few weeks, we many consider to make a step by step guide regarding this. You should just check if it will get you what you need. We use optional third-party analytics cookies to understand how you use GitHub.com so we can build better products. We are still running several tests on ones that perform well with it. Chronos freeze all enemies except metal and is long range, Aphrodite deals massive damage against aliens, and is long range, And the elemental pixies are very good alien slayers, https://www.youtube.com/watch?v=LNXTU096hO4, If u have Ururun will be more Easiear. yeah the now top comment in this post has the new link to the editor. R = featuring Reinforcements. More posts from the BattleCatsCheats community, * This subreddit shows cheats for the mobile game The Battle Cats. NC = not featuring Grandon Corps. Open your Battle Cats. It might look similar like our own. This is the reason we had to build this. Castaway cat is very good to freeze aliens. It will help you to gain resources that will be used to unlock stuffs in the game. We use essential cookies to perform essential website functions, e.g. • The Battle Cats game save file • 99999999 XP • 999999 Cat Food • All Characters Unlocked and Fully Upgraded • You can update the game after applied this cheat • Only work for rooted devices • Must be extracted using ES Explorer TESTED AND WORKS ON • The Battle Cats v3.0.0 You can of course tell everyone that you will post levels later. The most up-to-date file is v 2.1.1 and can be found in the corresponding folder most_recent_save. (October 1st to November 1st), - Sports Night (October 16th to November 1st), - Halloween Carnival (October 19th to November 1st), - Merc Storia (October 16th to October 30th), - Merc Storia Collaboration Gacha (October 16th to October 30th), - Halloween Capsules (G) (October 19th to November 1st), - Cyber Academy Galaxy Gals (G) (October 26th to October 28th). - Legend Quest (October 26th to November 9th), - Halloween Capsules (October 26th to November 4th), - The Almighties The Majestic Zeus (G) (November 1st to November 4th). But, it is best to use the device which you installed battle cats on. If it does, then it works for your device. Someone says that you have to turn off the wifi, someone says that it is not safe at all... someone says that if u respext the limit's you can't be banned. This feature was later removed with the Invite Friends to get Moneko feature. You don’t even need to run a patch on your phone in order to complete its operation. If nothing happens, download the GitHub extension for Visual Studio and try again. Many thanks and will make a tip in kofi, I’m sorry for asking but when I open it it says unsupported file type is there a way to fix this, I need help installing this, I couldn’t find a post explaining how to install this or how it works. If nothing happens, download GitHub Desktop and try again. u need ubers so farm rare tickets at stages. Sorry, this link has been automatically turned off for now. Compilation of PONOS The Battle Cats save files. We have already included an instruction on the page where you will generate all items. N = Neneko & Friends unit available. Take your favorite fandoms with you and never miss a beat. In case verification shows while carrying out those procedures, complete it. But i think that if I modify battle cats codes (even if i respect the limits) there will still be a chance of being banned from the game. They spawn indefinitely, and each becomes twice as strong after the 10-minute mark, and four times as strong as the original after 25 minutes. In order to use a save file, copy the entire Documents folder into your own iOS directory. Currently, few devices are supported for it. If another project comes up, you may not see any. Your enemies are so formidable opponents that you must laugh. In the parentheses after the Gacha Event; G = Guaranteed Uber-rare cat for 11 gacha rolls. Link: https://drive.google.com/open?id=1eA25qY9favFpD5rNir3dbcvDy2asayGS. Hi I have downloaded this and got the lethal icon editor but after I enter both transfer and confirmation code it keeps telling me confirmation code is wrong. You can always update your selection by clicking Cookie Preferences at the bottom of the page. Please be aware this is not at all necessary; hearing in the comments, pms and in the discord server about how much you've liked my work is amazing as it is. I use the editor from the google drive link in the post here, its seemingly safe, ran it through an av and it says its safe, so yea, but ¯_(ツ)_/¯, Size: 6.3MB MD5: 3f954a647df14fc600ea8479123533a1 EditorEN.exe, Size: 6.2MB MD5: 39ffaf40410334b60176d62cf5e48d94 BattleCatsSaveEditorEN.exe, Size: 6.3MB MD5: 5c30b59945db499954e59b3a609fe5f7 BackupManagerEN.exe. Added a function to set a name for the starting slot. Battle Cats Wiki is a FANDOM Games Community. In order to use a save file, copy the entire Documents folder into your own iOS directory. https://battle-cats.fandom.com/wiki/Battle_Cats_Wiki?oldid=480027. If you think about becoming a pro with it, it is possible. Many are embedded with files that will alter the functionality of your smart-phone. Shibalien (100%), Ginger Snache (50%), and Gabriel (100%) spawn every 5 seconds from the start of the battle, the first of each spawning at 3, 4, and 6 seconds respectively. They can cause boot loop and may lead you to format your gadget. Doge Cannon or non-animated base ) and Enemy Base Health, Description of the level ( Enemy spawning pattern/ when enemies spawn ). Due to so many messages our readers sent us, we had to build this. They will be posted once they are completed. Edit 4: Fixed a bug in the BackupManagerEN, please download the new one.. Edit 3: Added BackupManagerEN, included within the new EditorEN link. Ensure that your device time settings are set to Auto, that you are in an area with a strong network connection, and please don't make any further changes to your time settings. Please download the zip and extract all files to a folder. Take your favorite fandoms with you and never miss a beat. download the GitHub extension for Visual Studio. HGT errors may occur if your phone/tablet clock has been manually changed, if you travelled to a different time zone, or if your network connection was particularly unstable during daily update. If u dont have ubers use shaman cat, and any cat to freeze floating or alien. It is specifically designed for anyone that wants to obtain many amounts. If you don't know where to find your savefiles, refer to this forum post. Players are always looking for a source for battle cats cheats. Many experts are used it to gain so many for themselves. Now you can go back to where you save whenever you want by importing the emulator file. Cookies help us deliver our Services. Learn more. There is an on-going debate on the online world. You unlock her in The Great Escaper, Metal Doge (100%) Unlimited ( 1/ every 3 sec), At the start 5 capies spawn with a J.K. Bun Bun, after 100 seconds, dark emporer spawns with another j.k. Bun bun and a hackey,after 20 seconds, the peons will emerge, after this, everything will spawn except capy(delay every 20 seconds), 2 rare ticket (5% chance) (100% chance when beaten first time), One platinum ticket (1% chance) (50% chance when first time beaten), 5 of every cat fruit seed (1% chance of getting the fruits and. - EditorJP, as well as BackupManagerJP are still being reworked. If you are interested in having lots of items for yourself, you should stop looking for cheat installer. You can check this wiki for details regarding the game specification. How to look for your seed: Go to this site. S = Step Up Gacha. If nothing happens, download Xcode and try again. Due to rampant strategies featuring Ubers, those specific strategies may be reviewed, transferred to a sub-page and be non-highlighted. In the parentheses after the Gacha Event: G = Guaranteed Uber-rare cat for 11 gacha rolls. Compilation of PONOS The Battle Cats save files. Below, they are listed. Learn more, We use analytics cookies to understand how you use our websites so we can make them better, e.g. Post 'emEdit: Note that if anyone starts a new SoL chapter but can't finish all the levels ( 5-8 ), others can post their own levels which will be present in that chapter. Learn more. Plus, higher difficulties added to existing maps, Added the Cat Shrine to the Gamatoto Menu, After clearing ITF Chapter 3, may appear at random times, Naming feature added to Battle Formations, Tap the Slot Name button on a slot to change to your desired name. Ms. sign spawns at 9 minutes and 24 minutes. Few weeks ago, we released the updated version of this. It is quite amazing and doesn’t lag on any device. We're not saying it is bad, but think of other Battle Cats players who need help without those hard-to-get units. Serial Codes were special codes that could be input in the game for various rewards. Yeah Norton says it’s a trojan, but it’s definitely not, I assure you. If you also wonder why there is no video that shows how this is done, relax. You know, so many sites have failed you. If the latter, please contact a wiki administrator. Any player might be worried why this is not written at the beginning of this post. I uninstalled the .exe program when Lethal brought it offline because of that guy a couple of months ago. Cause I don't want another Rysen problem to occur again and Lethal having to pull the plug on the editor again. You can do this using iTools (see more on how to splice in files via my other GitHub README's). Please DO NOT post cheats you find, furthermore dont ask about seed tracking here~, Press J to jump to the feed. Once you reach the next page, enter your gaming id. The latest battle cats hack tool that actually works is now available. It makes every item unlimited and standby. Why not test this? So, if that is what you need, just click the button displayed above. Learn more. All we know is that these cats are cute – even the … Open the Save Editor 2. Without wasting anymore of your time, do this. You won’t click on so many tabs before you can pass through annoying steps. I still have the .ZIP on my PC after uninstalling the .exe program. Can you advise me where did I do wrong? The debate is whether we actually have a working battle Cats hack. 1. You can speedily access it using any kind of web browser. For more information, see our Privacy Statement. The Battle Cats is their flagship game – a tower defense where you get to play as the alien Battle Cats. They are sometimes cheap and expensive depending on the amount you need. If you want to include new enemies, you can post their descriptions here or you can link them to an enemy maker thread. It is generally known that you cannot buy virtual items in battle cats without resources. People with non-rooted phones can use it too without any form of hassle. Make sure you tell buddies around you to do exact as it is shown below. Press question mark to learn the rest of the keyboard shortcuts.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178359082.48/warc/CC-MAIN-20210227174711-20210227204711-00571.warc.gz
CC-MAIN-2021-10
11,115
20
https://community.tableau.com/message/644395
code
This is just awesome. Thanks a lot for your reply. But is there any way if I can embed the PDF which is not hosted online. I mean, I have a copy of PDF on my local machine and I want to embed it in my dashboard without publishing it on any site. Is there any way to do this? If yes, it would be really helpful or else I'll mark your previous reply as 'Correct Answer'. If you want alternatives, you should google 'embed pdf in webpage' or 'embed pdf in iframe'. Something like this - HTML embedded PDF iframe - Stack Overflow You'd need to develop a HTML page and host that somewhere on your PC or network. Basically you will see from doing a bit of reading the limitation isn't Tableau. I guess I'll go with PDF viewer option.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526153.35/warc/CC-MAIN-20190719074137-20190719100137-00528.warc.gz
CC-MAIN-2019-30
727
6
http://meta.spanish.stackexchange.com/users/1169/artefacto
code
I started programming while still unborn, consequently being a great programmer. When PHP is not an adequate tool, I turn to Java. E-mail: cataphract php net Top Network Posts - 319Difference between array_map, array_walk and array_filter - 151Writing a new line to file in PHP - 105How to insert element into arrays at specific position? - 95What's the difference between :: (double colon) and -> (arrow) in PHP? - 79Get the sum of digits in PHP - 75How do I recursively delete a directory and its entire contents (files + sub dirs) in PHP? - 75htmlentities() vs. htmlspecialchars() - View more network posts → Keeping a low profile. This user hasn't posted... yet.
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408828.55/warc/CC-MAIN-20160624155008-00041-ip-10-164-35-72.ec2.internal.warc.gz
CC-MAIN-2016-26
668
14
http://louisvillediscgolf.com/forum/archive/index.php/t-2545.html?s=869969baecfc1fd410920ff2883547da
code
View Full Version : Trip to BG or possibly Lebanon? 05-05-2008, 11:59 PM I'm kinda jonsing for a trip to BG or Lebanon (never been there). Don't know when yet, but want to gague interest first. My car can hold 4 + equipment. (Trying to take people so gas isn't such a downer...) If you're interested either PM me or just reply. Thanks! 05-06-2008, 06:38 AM When do you plan on going? 05-06-2008, 07:18 AM I'm down with a trip anywhere after 12 on Sat (have to teach 8-12). Played Leb once with Jason, nice course. Never played in Bowling green. 05-06-2008, 07:23 AM I'm not too sure yet as to when. What's best for you guys? BTW Jason, I've been looking for you at leagues to pay you for the Wizards! :bang: :doh: 05-06-2008, 07:53 AM I won't be there Wednesday either. I have a class Wednesday night that I have to attend. We'll catch up sometime. 05-06-2008, 09:33 AM If you want, I can pay via paypal. I want to make sure and get you the $$ if you need it... 05-06-2008, 10:10 AM I'm ok. $13 isn't going to hurt me. Thank you, but no need to pay paypal fees if you don't have to. Powered by vBulletin® Version 4.2.0 Copyright © 2015 vBulletin Solutions, Inc. All rights reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207926736.56/warc/CC-MAIN-20150521113206-00256-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
1,184
17