url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://digitalcommons.cwu.edu/compsci/68/
code
Relationships Between Probability and Possibility Theories Department or Administrative Unit The goal of a new area of Computing with Words (CWW) is solving computationally tasks formulated in a natural language (NL). The extreme uncertainty of NL is the major challenge to meet this ambitious goal requiring computational approaches to handle NL uncertainties. Attempts to solve various CWW tasks lead to the methodological questions about rigorous and heuristic formulations and solutions of the CWW tasks. These attempts immediately reincarnated the long-time discussion about different methodologies to model uncertainty, namely: Probability Theory, Multi-valued logic, Fuzzy Sets, Fuzzy Logic, and the Possibility theory. The main forum of the recent discussion was an on-line Berkeley Initiative on Soft Computing group in 2014. Zadeh claims that some computing with words tasks are in the province of the fuzzy logic and possibility theory, and probabilistic solutions are not appropriate for these tasks. In this work we propose a useful constructive probabilistic approach for CWW based on sets of specialized K-Measure (Kolmogorov’s measure) probability spaces that differs from the random sets. This work clarifies the relationships between probability and possibility theories in the context of CWW. Kovalerchuk, B. (2017). Relationships Between Probability and Possibility Theories. In V. Kreinovich (Ed.), Uncertainty Modeling (pp. 97–122). Springer. https://doi.org/10.1007/978-3-319-51052-1_7 © Springer International Publishing AG 2017
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506676.95/warc/CC-MAIN-20230925015430-20230925045430-00540.warc.gz
CC-MAIN-2023-40
1,557
5
http://ebooks.cambridge.org/chapter.jsf?bid=CBO9780511896316&cid=CBO9780511896316A026
code
Edited by Federica Busa Edited by Pierrette Bouillon Publisher: Cambridge University Press Print Publication Year: 2001 Online Publication Date:October 2011 Chapter DOI: http://dx.doi.org/10.1017/CBO9780511896316.017 Subjects: Semantics and pragmatics In this paper, we offer a novel analysis of metaphor, which attempts to capture both their conventional constraints on their meaning, and the ways in which information in the discourse context contributes to their interpretation in context. We make use of lexical rules in a constraint-based grammar to do the former task, and a formal semantics of discourse, where coherence constraints are defined in terms of discourse structure, to do the latter task. The two frameworks are linked together, to produce an analysis of metaphor that both defines what's linguistically possible and accounts for the ways in which pragmatic clues from domain knowledge and rhetorical structure influence the meaning of metaphor in context. This paper focuses on metaphor and the interpretation of metaphor in a discourse setting. We propose constraints on their interpretation in terms of linguistic structures. Specifically, the constraints are based on a particular conception of the lexicon, where lexical entries have rich internal structure, and derivational processes or productivity between word senses are captured in a formal, systematic way (e.g., Copestake and Briscoe, 1995; Pustejovsky, 1995). By constraining metaphor in terms of these linguistic structures, we show that their interpretation is not purely a psychological association problem (cf. Lakoff and Johnson, 1980), or purely subjective (e.g., Davidson, 1984). Recent accounts of metaphor within philosophy have not given systematic accounts of this sort (e.g., Black, 1962; Hesse, 1966; Searle, 1979). We leave open the question of whether their insights are compatible with the theory proposed here.
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447549662.85/warc/CC-MAIN-20141224185909-00060-ip-10-231-17-201.ec2.internal.warc.gz
CC-MAIN-2014-52
1,910
9
https://emopulse.com/how-to/software/error-in-file-rt/
code
Debugging is an integral part of a programmer’s job since it’s nearly impossible to write code that is flawless without testing it first. Therefore errors like “error in file(file, “rt “): cannot open the connection” come up, and programmers need to be aware of how to take care of them. Notorious for being hard to learn, R is a programming language and computing environment used for reporting, graphic representation, and statistical analysis. The R Development Core Team developed R at the University of Auckland in New Zealand after Ross Ihaka, and Robert Gentleman founded it. The kind fellas over at Bell Labs have made R publicly accessible under the GNU General Public License, and binary versions that have already been pre-compiled for other operating systems, including Linux, Windows, and Mac, are also available. This programming language’s name, R, is partially a play on the Bell Labs Language S and is based on the initial letter of the first names of the two R authors, Robert Gentleman and Ross Ihaka. What is the error in file(file, “rt”) This error will prevent you from running your programmes, which will drastically slow down your advancement. If this specific error code is still present, you will not be able to proceed. This common R file access problem occurs when you attempt to open a data file, but R cannot locate it. The “error in file(file, “rt”)” in the error message denotes a problem with opening a particular excel file or R code file, and a low-level function used to open it. The file cannot be opened since R cannot locate a file with the required extension in the location you specified for the folder. This causes the error to appear, and the file cannot be opened as a result. This is the error you’ll see: Once you know where the working directory configuration is pointing, the fix is simple. On a Windows system, this can be a little complicated because the working directory for the script or output file may not match the working directory for the R environment. What Causes The Error The reason as to why this error code might be happening can vary on the version of R that you are using. The variety of commands that you may use can cause the error. Therefore it is difficult to pinpoint the root. It’s probable that the default option in your local environment is an outdated one. You might use the setwd() command to correct it for the current session. Another way to do this is after properly setting the working directory; you can directly specify the precise file name in your code. As a language, R has a tendency to mess around with excel and .csv files. The two do not go together that well, something that you’ll see time and time again if you’re an avid user of the language. You should also check your package settings since R can mess around with your excel files and become incompatible. Additionally, data file suffixes can be a huge mess to deal with, causing error in file(file, “rt”) : cannot open the connection. You should see the exact file text handles using Windows. It’s probable that the way that the directory is being accessed is the underlying issue here. To determine what the R programme considers to be the current working directory, use the getwd() function. It’s possible that relative file references to folders above and below the current working directory are causing your problems. To access files in the parent directory, always use the prefix “../”. All these reasons can cause an error in file(file, “rt”) : cannot open the connection pretty easily. How to fix error in file(file, “rt”) Now that we’ve established the reasons as to why one might encounter this error, here’s a list of ways on how you can lay this issue to rest: - Using setwd() - Using read.csv All of these techniques are rather easy to use. Therefore, we advise that it will be easy enough if you follow these instructions step by step. Let’s get started without further ado. We need to move to the directory that the never.csv file is placed in. You can do this using the setwd() function: Now we’re able to read the never.csv file now Instead of going to that directory, what you can do is give the complete path of the file. Here’s how to do that: Most likely, there is no header issue with this. This is a file system problem that takes place before readlines() can actually work on the file. That is to say, and it wouldn’t be connected to problems like incorrect character variable definitions, array or vector logic, or numerous instances of byte-level encoding problems. To keep in mind while debugging Now you might be wondering, “My code’s lengthy, and I don’t know where to start from. It’s all so overwhelming; what do I do?” Well, here are some things to keep in mind while debugging your code: 1. Verify that the issue is actually the working document’s wrong placement in your R file. 2. Make that the file is compatible with Windows and examine all pertinent data file suffixes. 3. Verify the correct location for your files as well as all of the pertinent R file references in your documents. 4. If you plan to download from a remote server drive, make sure that the download itself works. 5. BEWARE! Syntax errors will oftentimes sneak up on you. Check for them. 6. R may occasionally have problems with Excel documents, so make sure the package settings are correct. It’s integral to keep these steps in mind as it’s the most efficient way to debug your code. Frequently Asked Questions What is read.csv? read.csv() is a wrapper function for read. table() that takes the first line of the input file as a header to specify the table's column names and requires a comma as the separator. It is a perfect contender to read CSV files because of this. What is setwd()? A built-in function in R called setwd makes the current directory the working directory. An argument for the setwd() method is a new working directory. Use the setwd() function in R to alter the current working directory. The data directory is typically navigated using the setwd() method. What is code debugging? In computer programming and engineering, debugging is a multi-step process that entails locating a problem, tracking down the source of the problem, and either fixing the problem directly or finding a workaround. Testing the fix or workaround to make sure it functions is the last stage in the debugging process. When a developer is able to find and reproduce a code error in a computer programme, the debugging process in software development gets started. The software testing process, as well as the full software development lifecycle, includes debugging. What's the R foundation? A nonprofit organisation serving the public good, The R Foundation. The R Core Team established it to support the R project and other statistical computing advances, provide a resource for people, organisations, or businesses looking to assist or engage with the R development community, and hold and manage the copyright of R software and documentation. What functionalities does R offer? R, which is primarily an interpreted programming language, supports branching, looping, and modular programming via functions. R was used to construct the vast bulk of its user-visible functionality. For increased effectiveness, the user can interact with methods written in C, C++, or FORTRAN. Numerous statistical methods are supported by the R distribution. There are several of them, including time series analysis, linear and modified linear models, nonlinear regression models, smoothing, grouping, and traditional parametric and non-parametric testing. Additionally, a sizable number of elements offer a flexible graphical framework for designing different data displays. Is R Free? The programming libraries for R are all open-source, but Revolution Analytics derives its revenue from its service packages that give customers access to the libraries the company creates in-house. This means that the language itself is completely free to use. R is overall a very complex language; however, this particular issue is not that difficult to tackle. The working directory configuration tends to declare itself quickly and is easy to modify once you know where it is pointing. Because the working directory for the script or output file could not coincide with the working directory for the R environment on a Windows system, things might become a little difficult. There is little likelihood that your analysis or insights will be corrupted, in contrast to the majority of data frame flaws. Hopefully, this gave you a better understanding of what the Error In File(file, “rt”) : Cannot Open The Connection is and why it happens. Chances are, if you’re here, you’re a fellow R programmer too. Here’s another article on the annoying ‘\u’ Used Without Hex Digits In Character String Starting” c:\u”. Click here to take a look! Good job! Please give your positive feedback How could we improve this post? Please Help us.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654606.93/warc/CC-MAIN-20230608071820-20230608101820-00564.warc.gz
CC-MAIN-2023-23
9,051
53
https://andrewjprokop.wordpress.com/2014/03/17/refer-revisited/
code
A few months ago I wrote about my favorite SIP message in Refer Madness. I won’t repeat all that I said, but the slimmed down version is that REFER enables you to move an active session from one endpoint to another. In other words, REFER is used to implement call transfer. For example: - Andrew is talking to McKenzie. - Andrew decides to transfer McKenzie to Marsha. - Andrew sends a REFER to McKenzie instructing her to call Marsha. - McKenzie informs Andrew of the progress of her call to Marsha. - When Marsha answers, McKenzie releases the call with Andrew Pretty straightforward, isn’t it? I thought so at the time of the article, but I have since been asked a number of questions that have prompted me to revisit the subject of REFER. I now feel the need to flesh out my English description with some SIP specifics. Let’s imagine the Andrew, McKenzie, and Marsha example again at the point where Andrew decides to transfer McKenzie to Marsha. This results in the following call flow. Everything kicks off with the REFER message. Within the REFER is a Refer-to header. In our example, Refer-to designates that Marsha will be the transfer target. Upon receiving the REFER, McKenzie returns a 202 Accepted response to Andrew. This informs Andrew that McKenzie is willing to carry out the transfer, but Andrew needs to stick around until Marsha answers the call. Not shown in the call flow is McKenzie putting the call to Andrew on hold. This might be done with a re-INVITE to Andrew. I have also seen some soft-phones simply stop sending media during the transfer process. Personally, I prefer the re-INVITE method. REFER creates a quasi-subscription between Andrew and McKenzie. I say quasi because Andrew did not send a SIP SUBSCRIBE message. However, for the duration of the transfer, McKenzie will act as if such a subscription exists. McKenzie sends an INVITE to Marsha and Marsha processes the INVITE as a normal, incoming call. This means that she will send the typical provisional response messages back to McKenzie – 100 Trying and 180 Ringing. This is where the quasi-subscription comes in. Just as if she had received a SUBSCRIBE from Andrew, McKenzie responds back with NOTIFY messages. The bodies of those NOTIFY messages contain the status of the call from McKenzie to Marsha. The formatting of this status is referred to as SIPFrag. A SIPFrag, or SIP Fragment, is a piece of a SIP response message. In our example, NOTIFY/SIPFrag messages are sent for the 100 Trying, 180 Ringing, and eventually the 200 OK. Andrew acknowledges the receipt of each NOTIFY with a 200 Ok. These 200 Ok responses should not be confused with the one generated for the INVITE when Marsha answers the call. A NOTIFY message for the 100 Trying might look similar to the following: NOTIFY sip:firstname.lastname@example.org SIP/2.0 Via: SIP/2.0/UDP 10.10.21.11;branch=z9hG4bK9922ef992-25 CSeq: 192 NOTIFY SIP/2.0 100 Trying I’ve highlighted in bold the important aspects of the NOTIFY. An Event type of “refer” indicates that the NOTIFY is part of a REFER call flow. Content-Type tells Andrew that the message body will be formatted as a SIPFrag. Finally, you will see a SIPFrag for the 100 Trying response. Similar NOTIFY messages will be sent for 180 Ringing and 200 Ok responses. Once Marsha answers the call, McKenzie can drop the existing, held call to Andrew. If Marsha did not answer (e.g., McKenzie receives a 404 User Not Found), McKenzie would notify Andrew and the held call would be reconnected. Andrew could then complete the call with McKenzie or attempt a different transfer. REFER is used for more than station to station transfers. Are you familiar with take back and transfer? REFER is used to instruct a SIP carrier to move a trunk call to an off-PBX destination. Without REFER, inbound and outbound trunks would be tied up for the duration of the call even after the transfer was completed. There you have it – a deeper dive into REFER than perhaps you’ve ever taken or ever wanted to go. Thanks to the folks who requested more information. I am always happy to get SIP geeky with you and it’s especially gratifying when someone actually requests it. Thanks, that’s a really good primer on REFER messages! You’re welcome. Thank you for reading and commenting on my article! Thank you very much Andrew for clarifying the missing points.. You’re welcome! Happy to be of service. Thanks for sharing this blog. this is the very informative blog for those person who wants to gain information about Virtual Receptionist and Call Transfers. Thanks, Jack. I am happy that you find my blog educational. Good article.can you please also let us know how to transfer call using re-invite and also which method is preferred over another and why?Thanks! It’s funny that you mention that. I am planning on putting out an article on transfer next Tuesday. Let’s talk again after you read that one. Nice article it was really useful to me. Really thanks for your article…Every thing becomes easy and simple after your explanation..=) Thanks. That was my goal. thank you very much for your post, its really good post. Andrew, after completion, do you know if there is a mechanizime such as notify-controller on TBCT (NI-2 PRI) to advise the controller of the end of the call transfered? I do not. Sorry. If we didnt get 202 accept for first REFER, UAC will try to retransmit again? I expect that it would. Hey Andrew, I have a scenario where a user in one environment (Skype for business) is trying a SIP REFER to a user on Session Manager 6.3. Session manager is declining the call with a response of “Refer-To” user is null. Any thoughts on where to start? Is the Refer-To actually Null? I am not familiar with how to setup Skype. Is there a configuration item for Refer? Skype for Business (S4B) Refer is bugged or not complete implementation. Refer has two types: 1- Simple (should have a ‘number’ in its Refer-To header) 2- Replaces (should have at least Call-ID and From/To Tages in its Refer-To header) S4B uses Replaces type. In this mode, we have two established SIP calls. A-B (A called B OR B called A .. where B is S4B) B-C (B must have called C) Here, B refers with replacing itself (in the call B-C) to A, so A will be connected to C, via two ReINVITEs from B. One to A (containing C-SDP), and one to C (containing A-SDP), then both A & C will be connected. At this point B can drop its two sessions by sending BYE to A & C. In the actual S4B environment, it sends REFER with Replaces but the Call-ID, From-Tag and To-Tag is undefined and do not exist (simply S4B didn’t establish another call in the frist place!). That’s why S4B REFER gets always rejected with 4xx or 5xx, since there is no info about the call it is sending its context .. Orange Business Services Thank you for the article was really helpful. Could you please advise me how to use in jain sip api.. in java ? does anyone have any idea Hi Andrew, thank you very much for your article! I need to initiate a call for a different client registered to the same user. So can i send a REFER command to “myself” and see if another client answers? Would that be possible? Calls are not initiated with a REFER. Thanks for your answer. I found out how to solve my problem. My first idea was to send a INVITE request for another UAC. But for this i need to know all the other registered UACs. And i did not find a way to get this information from the registrar. So what i do now is sending a INVITE to my own number. And as soon as another registered UAC picks up the call i send a REFER to the number i would like to call. Best regards Markus Thank you Andrew.This blog is very helpful Thanks for your blog… But what is purpose of sending ‘call-id, from tag, to tag’ in Refer-to header in REFER message?
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949533.16/warc/CC-MAIN-20230331020535-20230331050535-00619.warc.gz
CC-MAIN-2023-14
7,828
66
https://www.phdstudent.com/tag/graduate-school/page/6/
code
My dissertation advisor talks excessively and rarely lets me speak during our individual meetings. He also gets distracted and the conversation goes off topic, often talking about my assistantship/lab work and not my individual paper or research project. I am looking to have more structured and organized meetings with my advisor. How can I take control of the meetings with him being OK with it? What works and does not work? What are PhD students allowed to do (and what would be considered unfair if my advisor said No)? –Not-So-Distracted Dear Not-So-Distracted, I can definitely see where your frustration is coming from.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363510.40/warc/CC-MAIN-20211208114112-20211208144112-00453.warc.gz
CC-MAIN-2021-49
629
1
https://www.real.discount/offer/complete-machine-learning-data-science-with-python-a-z-7430/
code
Join our Social media channels to get the latest discounts Use Scikit, learn NumPy, Pandas, Matplotlib, Seaborn and dive into machine learning A-Z with Python and Data Science. Machine learning isn’t just useful for predictive texting or smartphone voice recognition. Machine learning is constantly being applied to new industries and new problems. Whether you’re a marketer, video game designer, or programmer, my course on Udemy here to help you apply machine learning to your work. Welcome to the “Complete Machine Learning & Data Science with Python | A-Z” course. Do you know data science needs will create 11.5 million job openings by 2026? Do you know the average salary is $100.000 for data science careers! Data Science Careers Are Shaping The Future Data science experts are needed in almost every field, from government security to dating apps. Millions of businesses and government departments rely on big data to succeed and better serve their customers. So data science careers are in high demand. If you want to learn one of the employer’s most request skills? If you are curious about Data Science and looking to start your self-learning journey into the world of data with Python? If you are an experienced developer and looking for a landing in Data Science! In all cases, you are at the right place! We've designed for you “Complete Machine Learning & Data Science with Python | A-Z” a straightforward course for Python Programming Language and Machine Learning. In the course, you will have down-to-earth way explanations with projects. With this course, you will learn machine learning step-by-step. I made it simple and easy with exercises, challenges, and lots of real-life examples. We will open the door of the Data Science and Machine Learning a-z world and will move deeper. You will learn the fundamentals of Machine Learning A-Z and its beautiful libraries such as Scikit Learn. Throughout the course, we will teach you how to use Python to analyze data, create beautiful visualizations, and use powerful machine learning python algorithms. This Machine Learning course is for everyone! My "Machine Learning with Hands-On Examples in Data Science" is for everyone! If you don’t have any previous experience, not a problem! This course is expertly designed to teach everyone from complete beginners, right through to professionals ( as a refresher). Why we use a Python programming language in Machine learning? Python is a general-purpose, high-level, and multi-purpose programming language. The best thing about Python is, it supports a lot of today’s technology including vast libraries for Twitter, data mining, scientific calculations, designing, back-end server for websites, engineering simulations, artificial learning, augmented reality and what not! Also, it supports all kinds of App development. What you will learn? In this course, we will start from the very beginning and go all the way to the end of "Machine Learning" with examples. Before each lesson, there will be a theory part. After learning the theory parts, we will reinforce the subject with practical examples. During the course you will learn the following topics: What is Machine Learning? More About Machine Learning Machine Learning Terminology What is Classification vs Regression? Evaluating Performance-Classification Error Metrics Evaluating Performance-Regression Error Metrics Machine Learning with Python Cross-Validation and Bias Variance Trade-Off Use Matplotlib and seaborn for data visualizations Machine Learning with SciKit Learn Linear Regression Theory Logistic Regression Theory Logistic Regression with Python K Nearest Neighbors Algorithm Theory K Nearest Neighbors Algorithm With Python K Nearest Neighbors Algorithm Project Overview K Nearest Neighbors Algorithm Project Solutions Decision Trees And Random Forest Algorithm Theory Decision Trees And Random Forest Algorithm With Python Decision Trees And Random Forest Algorithm Project Overview Decision Trees And Random Forest Algorithm Project Solutions Support Vector Machines Algorithm Theory Support Vector Machines Algorithm With Python Support Vector Machines Algorithm Project Overview Support Vector Machines Algorithm Project Solutions Unsupervised Learning Overview K Means Clustering Algorithm Theory K Means Clustering Algorithm With Python K Means Clustering Algorithm Project Overview K Means Clustering Algorithm Project Solutions Hierarchical Clustering Algorithm Theory Hierarchical Clustering Algorithm With Python Principal Component Analysis (PCA) Theory Principal Component Analysis (PCA) With Python Recommender System Algorithm Theory Recommender System Algorithm With Python With my up-to-date course, you will have a chance to keep yourself up-to-date and equip yourself with a range of Python programming skills. I am also happy to tell you that I will be constantly available to support your learning and answer questions. Why would you want to take this course? Our answer is simple: The quality of teaching. OAK Academy based in London is an online education company. OAK Academy gives education in the field of IT, Software, Design, development in English, Portuguese, Spanish, Turkish, and a lot of different languages on the Udemy platform where it has over 1000 hours of video education lessons. OAK Academy both increases its education series number by publishing new courses, and it makes students aware of all the innovations of already published courses by upgrading. When you enroll, you will feel the OAK Academy`s seasoned developers' expertise. Questions sent by students to our instructors are answered by our instructors within 48 hours at the latest. Video and Audio Production Quality All our videos are created/produced as high-quality video and audio to provide you the best learning experience. You will be, Moving through the course without distractions You'll also get: Lifetime Access to The Course Fast & Friendly Support in the Q&A section Udemy Certificate of Completion Ready for Download We offer full support, answering any questions. If you are ready to learn the “Complete Machine Learning & Data Science with Python | A-Z” course. Dive in now! See you in the course!
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945317.85/warc/CC-MAIN-20230325064253-20230325094253-00493.warc.gz
CC-MAIN-2023-14
6,228
76
https://lists.samba.org/archive/samba/1997-November/005118.html
code
ACLs by remote NT server *group*?? Luke Kenneth Casson Leighton lkcl at switchboard.net Wed Nov 26 17:00:57 GMT 1997 On Thu, 27 Nov 1997, Chris Shenton wrote: > We've got a document repository on a Samba system, v 1.9.17alpha3, > Solaris 2.5.1. Or clients authenticate to an NT domain so we do auth > on Samba using the construct: > security = server > password server = HQBDC1 > What we'd like to do is allow one of our departments to get access to > the docs but prevent all the other departments. I'd like to use the NT > *group* in which the users belong to do access control but I can't > figure a way to tell Samba to do this. I really don't want to have to > clone a password file in UNIX or enumerate usernames because they > change so often -- I'd rather let the NT server boyz worry about that > stuff. :-) ok, thinks. right. 1) create a group on the NT box with all the people that are allowed access to those document. call it "Document Users" 2) use right-mouse-click, go to properties, on the documents directory. click on the "permissions" tab. you will see that permission is granted "Full" to "Everyone". you want: - "Full" to "Domain Users" - "Read-only" to "Document Users" > Is there a way to do ACLs based on NT groups? we haven't worked out ACLs yet :-) it's on the hit-list. unfortunately, we'd need to work out a unix->ACL mapping-system, first :-( > Or perhaps I'm so clueless on NT domains and NT-style authentication > to understand whether this is doable. But let me know one way or the > (I just pulled down 1.9.18alpha11 and am looking into DOMAIN.txt, > NTDOMAIN.txt, etc, but my NT domain ignorance is preventing me from > understanding all of it; pointers to good books welcome; I've already > read the FAQs and docs on samba.anu.edu.au...) ok, well feel free to ask me all kinds of questions: it will help me when it comes to actually writing up the NT domain docs. <a href="mailto:lkcl at switchboard.net" > Luke Kenneth Casson Leighton </a> <a href="http://mailhost.cb1.com/~lkcl"> Samba Consultancy and Support </a> More information about the samba
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964359093.97/warc/CC-MAIN-20211201052655-20211201082655-00638.warc.gz
CC-MAIN-2021-49
2,085
39
https://cloudacademy.com/blog/cloud-academy-roadmap-2017/
code
In addition to all of the new services and technologies coming to cloud computing, one of the most important factors influencing cloud computing is the fact that companies are embracing multiple cloud technologies. As a result, bridging the skills gap is even more important than ever both for professionals who want to stay competitive and for companies who want to be able to innovate even faster. As we wrote earlier this year, continuous training and retraining are becoming the biggest challenges for businesses of all sizes, especially as AWS, Azure, and other vendors keep creating new products and releases. These are just some of the factors shaping the content that we’ll be creating over the next year. So, as you start thinking about the skills that you’d like to acquire or the areas where you’d like your team to level up their training, we’d like to share some of the highlights of what we’ll be working on this quarter. From AWS, Azure, and GCP to DevOps, supporting technologies, and cloud computing for business and career development, we’ve got something for everyone. Amazon Web Services AWS Certified Networking – Specialty AWS Certified Security – Specialty AWS Certified Big Data – Specialty AWS has three new Specialty certifications in Beta that will be released in May. Our learning paths are designed for those looking to pass the advanced certification exams, but all of the courses, quizzes, and labs will be valuable to anyone working with networking, security, or big data in AWS. Check all our Amazon Web Services Certifications Migrating to AWS This learning path will be relevant for any business looking to migrate from on-premise to AWS, whether you’re planning to operate with hybrid infrastructure, or fully in the cloud. AWS Services for an Architect AWS Services for a SysAdmin We will be releasing a series of learning paths with courses, quizzes, and labs relevant to individuals based on their preferred platform and role. Look for AWS Services for Architects, and for SysAdmins in Q2. Check our AWS Learning Paths 70-533: Implementing Microsoft Azure Infrastructure Solutions 70-532: Developing Microsoft Azure Solutions While these learning paths are designed for those looking to pass Azure’s updated certification exams, all of the courses, quizzes, and labs will be valuable to anyone looking to develop or implement solutions on Microsoft Azure. This learning path is designed for users who have experience with Azure but are looking to expand their knowledge across Azure’s domains. Getting Started with Azure If you want or need to specialize in Azure, and are ready to dive in and start getting your hands dirty, this learning path is for you. Courses, quizzes, and hands-on labs give you the experience you need to get started working in Microsoft Azure. Azure IoT for Developers We will be releasing a series of learning paths with courses, quizzes, and labs relevant to individuals based on their preferred platform and role. Look for Azure Services for Developers in Q2. Check all our Azure resources here Google Cloud Platform Google Certified Pro Architect Google Certified Pro Data Engineer These learning paths are designed for those looking to pass Google’s updated certification exams, but all of the courses, quizzes, and labs will be valuable to anyone looking to architect or engineer data on Google Cloud Platform. Check all our Google Cloud resources here Introduction to Container Services If you’re looking to understand what containers are, how to use them, and which ones are relevant for your needs, this is the learning path for you. Getting Started with Docker This learning path contains everything you need to know to get started with Docker, updated with the most relevant information for this fast-moving technology. Check all our DevOps resources here Introduction to Serverless Computing Learn what serverless computing is, when you should think about using these services, and how it works with the cloud computing platform you are on. Considering a Cloud Computing Career You’ve heard what a hot job market this is, but don’t know what role you want to take on, which platform to specialize in, or how to begin learning what you need to know to launch your new career. This is the place to start your path forward. Cloud Computing for Business Managers The cloud impacts organizations at every level, from hiring, to infrastructure planning, to cost management. This learning path is designed for managers who understand that they need to be savvy about the impact of the cloud on their businesses. Check all our Cloud Computing resources here Our full roadmap is always available on our website, and in case you missed them, you can also check out our newly released courses, labs, and learning paths, also available in Cloud Academy Content Library
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818072.58/warc/CC-MAIN-20240422020223-20240422050223-00885.warc.gz
CC-MAIN-2024-18
4,864
42
https://forum.qt.io/topic/72708/subdirs-project-installs/1
code
Important: Please read the Qt Code of Conduct - https://forum.qt.io/topic/113070/qt-code-of-conduct Subdirs project INSTALLS I use TEMPLATE = subdirs base project that has INSTALLS section. Subprojects of base project also have INSTALLS section and I noticed that INSTALLS from base project are invoked before INSTALLS from subprojects. I don't know if it is rule or coincidence. Is it possible to always execute INSTALLS of base project after all INSTALLS of all subprojects have been executed? I need it this way because INSTALLS of base depends on files installed via INSTALLS of subprojects. I use jom.exe for build. Have you tried setting a dependency? Something along the lines of: SUBDIRS = project1 project2 # ... TARGET.depends = prohject1 project2 VRonin last edited by alternatively move the installs on another GeneralInstall.pro file and make add it to the current subdir project setting the depends @kshegunov Unfortunately, this doesn't have any effect. I still see installs of subdir projects to come later than install of my base project if TARGET.depends of my base project contains all my subdir projects. Then follow @VRonin's suggestion and add it as a subtarget, I have nothing better. @VRonin This works! Thanks.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046155268.80/warc/CC-MAIN-20210805000836-20210805030836-00411.warc.gz
CC-MAIN-2021-31
1,235
12
http://stackoverflow.com/questions/5025591/rails-how-would-you-set-up-this-habtm-relationship
code
I have a situation where Project can have many Tags (and vice versa), so I have set up a has_and_belongs_to_many relationship between the two. My question is this: I need a project to have the ability to carry a single current tag. Can I add a tag_id to my Project table? How do I set up the relationship correctly, given there is already a `projects_tags' model? I'd imagine it isn't effective to have the projects_tags model carry a boolean current field, because it would require additional queries in practice for me to find the right relationship. I just throw it out there as an alternative I've considered.
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824146.3/warc/CC-MAIN-20160723071024-00229-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
613
9
https://mrinvasion.com/2020/05/23/joe-biden-strolls-back-cavalier-remarks-about-the-black-neighborhoods-assistance-for-his-project/
code
( ATLANTA) —– Joe Biden stated he “& ldquo; must not have actually been so cavalier & rdquo; on Friday when he informed a popular black radio host that African Americans who back President Donald Trump “& ldquo; ain & rsquo; t black . & rdquo; The presumptive Democratic governmental candidate rapidly transferred to deal with the fallout from his remark. In a call with the U.S. Black Chamber of Commerce, contributed to his preliminary public schedule, Biden stated he would never ever “& ldquo; take the African American neighborhood for approved.”& rdquo (** )That was a recognition of the stinging criticism he got in action to his remarks, which he made on “& ldquo; The Breakfast” Club, & rdquo; a radio program that is popular in the black neighborhood The rebukes covered from allies of Trump ’ s reelection project —– distressed to go on offense after weeks of safeguarding the president ’ s action to the coronavirus pandemic —– to some black activists, who alerted that Biden still should to court black votes, even if African Americans do extremely oppose the president. Read more: ‘ A Battle for the Soul of the Internet. ’ Joe Biden Tries to Adapt to a Digital Campaign “& ldquo; None people can manage for the celebration or for this project to mess this election up, and remarks like these are the kinds that honestly either make black citizens seem like we’& rsquo; re not actually valued and individuals wear’& rsquo; t care if we appear or not,” & rdquo; stated Alicia Garza, a Black Lives Matter co-founder and principal of Black Futures Lab. Near completion of Biden ’ s look on the radio program, host Charlamagne Tha God, pushed him on reports that he is thinking about Minnesota Sen. Amy Klobuchar, who is white, to be his vice governmental running mate. The host informed Biden black citizens “& ldquo; conserved your political life in the primaries” & rdquo; and & ldquo; have things they desire from you.”& rdquo Biden stated that &#(******** ); I ensure you there are several black ladies being thought about. Numerous.”& rdquo A Biden assistant then looked for to end the interview, triggering the host to state, “& ldquo; You can & rsquo; t do that to black media. & rdquo;(*** ). Biden “reacted, & ldquo; I do that to black media” and white media & rdquo; and stated his partner required to utilize the tv studio. He then included: “& ldquo; If you & rsquo; ve got an issue finding out whether you’& rsquo; re for me or for Trump, then you ain’& rsquo; t black . & rdquo; (** )The remarks came at a crucial point in the governmental project as Biden attempts to restore the mulitgenerational and mutliracial union that two times chose Barack Obama, whom he acted as vice president. He has actually currently dedicated to selecting a female as his running mate and is thinking about a number of African American competitors who might stimulate black citizens. With black citizens currently opposed to Trump, Biden is likewise thinking about prospects such as Klobuchar. Trump ’ s project and his allies, on defense for weeks over Trump and the pandemic, right away took on Biden ’ s remarks. South Carolina Sen. Tim Scott, a Trump fan and the Senate ’ s sole black Republican, stated he was “& ldquo; shocked and surprised” & rdquo; by Biden ’ s remarks.(*** ). (** )& ldquo; I believed to myself, as an African American, been black for(***************** )years, I was struck by the condescension and the conceit in his remarks, ” Scott stated in a teleconference rapidly organized by the Trump project. “ I might not think my ears that he would stoop so low to inform folks what they must do, how they must believe, and what it implies to be black.”& rdquo Read more: &# 8216; I Want My President to Have Suffered. ’ Joe Biden ’ s Supporters Say They Want a President Who Knows How They Feel Symone Sanders, a Biden senior advisor who is likewise black, stated his remark in Friday’& rsquo; s interview was & ldquo; made in jest. ’. (** )& ldquo; Let & rsquo; s be clear about what the VP was stating, & rdquo; Sanders tweeted. & ldquo; He was making the difference that he would put his record with the African American neighborhood up versus Trump’& rsquo; s any day.”Duration. & rdquo;(*** ). Trump himself has a history of incendiary rhetoric associated to race. When he released his governmental project in 2015, Trump called numerous Mexican immigrants “& ldquo; rapists. & rdquo; Campaigning in 2016, he asked black citizens, “ what the hell do you need to lose?”& rdquo (** )In2017, he stated there were great individuals on “& ldquo; both sides & rdquo; of the clash in Charlottesville, Virginia, in between white supremacists and anti-racist demonstrators that left one counter-protester dead. In 2018, throughout a personal White House conference on migration, Trump questioned why the United States was confessing numerous immigrants from “& ldquo; shithole nations” & rdquo; like African countries. He likewise blasted 4 Democratic congresswomen of color, stating they dislike America and must “& ldquo; return & rdquo; to where they originate from, although all are U.S. residents and 3 were born in the U.S. Biden motivated listeners on Friday to “& ldquo; have a look at my record, & rdquo; mentioning his work as senator to extend the Voting Rights Act of 1965. “& ldquo; The NAACP has actually backed me whenever I’& rsquo; ve run, ” he stated. “ Come on, have a look at my record.”& rdquo; Black citizens assisted reanimate Biden’& rsquo; s project in this year ’ s primaries with a 2nd location surface in the Nevada caucuses and a definite win in the South Carolina main after he’& rsquo;d began with humiliating surfaces in extremely white Iowa and New Hampshire. Sixty-one percent of black citizens supported Biden throughout the main season, according to AP VoteCast studies throughout 17 mentions that enacted February and March. There is long shot of an unexpected shift to support for Trump amongst black citizens. A current Fox News survey reveals simply 14% of African Americans who are signed up to vote have a beneficial viewpoint of Trump, compared to 84% who see him unfavorably. Seventy-five percent of African American signed up citizens state they have a beneficial view of Biden; 21% hold an undesirable viewpoint. There is a threat, nevertheless, of black citizens, particularly those who are more youthful, staying at home in November, which might make complex Biden ’ s course to triumph in a tight election. Since the program is popular amongst more youthful African Americans, the Breakfast Club is an especially noteworthy place for Biden ’ s remarks. Biden ’ s choice of a running mate might assist inspire citizens. He ’ s started vetting competitors, a procedure he ’ s stated will likely last through July. Several black ladies are amongst those under factor to consider, consisting of California Sen. Kamala Harris, Georgia ballot rights supporter Stacey Abrams, Atlanta Mayor Keisha Lance Bottoms, Florida Rep. Val Demings, Ohio Rep. Marcia Fudge and Susan Rice, Obama ’ s previous U.S. ambassador to the U.N. Associated Press authors Kat Stafford in Detroit and Jill Colvin and Hannah Fingerhut in Washington added to this report.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347445880.79/warc/CC-MAIN-20200604161214-20200604191214-00425.warc.gz
CC-MAIN-2020-24
7,348
33
http://www.tomshardware.com/forum/254656-33-will-geforce-9800-work-computer
code
Thanks for the replies! I think I have enough space, so it'll be fine. One thing though.. For some reason, I've gotten the impression that Nvidia'ss cards are "better" generally than ATI's. Is this true, or is it just in my head? It's a fair impression due to ATi's slacking in coming up with competition after the 8800 series from nVidia. But now they're some-what even. Now, the final decision it's up to details: cooling solution, power draw, bargains, video playback, etc...
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806327.92/warc/CC-MAIN-20171121074123-20171121094123-00357.warc.gz
CC-MAIN-2017-47
478
3
https://cs.stanford.edu/people/widom/cs145/assignments/A2.html
code
CS145 - Fall 2013 Introduction to Databases Due Monday October 14 This assignment consists of writing a whole bunch of SQL queries (and a few SQL modifications) over two different databases, along three challenge problems. It may not look like much, but don't wait until the last minute -- there are lots of queries in the exercises and some of them are fairly difficult. Log into the CS145 Class2Go Site. Make sure you're using the CS145 portal and not the public one. Your SUNet ID should be required to access the site; logging in with SUNet also ensures that we properly record your scores. Click on the Interactive Exercises tab. Under SQL, complete four exercise Automated SQL Query and Modification You will also see SQL Movie-Rating Query Exercises (extras) and SQL Social-Network Query Exercises (extras). These exercise sets are not assigned and have no due date during the course. They are simply there to provide you with extra practice if you - SQL Movie-Rating Query Exercises (assigned) - 9 problems - SQL Movie-Rating Modification Exercises - 4 - SQL Social-Network Query - 9 problems - SQL Social-Network - 3 problems As with the DTD and Relational Algebra exercises from Assignment #1, the website is designed so you can interactively develop your solutions in place: each problem allows you to run your proposed solution and see a comparison between your result and the expected one. Once you're happy with your solutions, you must press Submit Answers for your score to be recorded. If you prefer to develop your solutions offline, you can install a SQL system on your computer and download the data files. The automated system tests your queries using SQLite. Since there are some differences in capabilities between SQLite, MySQL, and PostgreSQL, if you plan to work offline we suggest you use SQLite. Note that for the SQL modification exercises, the automated system tests each modification command against the original database state, runs a query after the modification to ensure that the database has been modified correctly, then restores the original state. Whichever way you work, don't forget to enter your solutions and press "Submit Answers" to obtain your score. You may do the exercises as many times as you like. Although all scores are recorded, we will only use the highest score you achieve as of the due date. As usual, automated exercises receive no credit if submitted late. For all three problems: - We're looking for solutions that use the standard declarative constructs of SQL as covered in the lecture videos and optional readings. Try to write queries using those constructs, before resorting to nondeclarative constructs or esoteric features supported by some SQL systems. All of the problems can be solved using standard constructs. - We strongly suggest using SQLite, MySQL, or some other SQL DBMS to test your solutions. It's an easy matter to download one of the open-source systems (see our Quick Guide), create and load a sample table, and play around. That's really the only way you can be assured your queries are working. That's also the only way we'll be assured they're working. To be considered for a "Silver" or "Gold" score on this set of challenge problems (see Challenge Problem Grading), include in your solution for each problem a transcript of running your SQL queries over a sample table that is large enough to verify correctness for all cases. Please include your data as well as your query results. Solid attempts at solutions that haven't been tested on a running system are still eligible for "Bronze". Consider a table the typical annual rainfall (in inches) for cities around the United States. Attributes [city,state] together form (a) Write the simplest (i.e., shortest) SQL query you can come up with that returns each state appearing in the table, along with the lowest and highest rainfall for that state. The schema of the result should be duplicates. Note that if a state has only one city in the (b) You probably used aggregation in your solution to part (a). Do the same problem, but do not use aggregation. Again, keep your query as short as possible, but don't worry if it's longer than your solution for (c) Try to modify your solutions for parts (a) and (b) so they also include the cities that have the lowest and highest rainfall for each state. That is, the schema of the result should (state,low,lcity,high,hcity). You may assume each state has a single city with the lowest rainfall and a single city with the highest rainfall. Is one solution easier to modify than the the other? (d) Starting from your solution for part (a) or (b) (or a new version altogether), modify the query so it now returns a fourth value for each state containing the median rainfall for that state. The schema of the result should be You may assume each state has an odd number of cities, and that the median (the middle number) is unique. Consider a one-attribute table positive integers, possibly including duplicates. Your goal is to write a SQL query to find the smallest positive integer that is not present in the table. You may assume the table contains at least one tuple. Make sure your query works correctly on instances of that contain the value 1, and on instances of where 1 is the smallest integer not present. As always, try to keep your query as compact as possible. Consider a SQL database being used to store a tree data structure. The database has one table: (pID,cID) in this table encodes the fact that the node with identifier pID is the parent of the node with identifier cID in the tree structure. There are no duplicates in the table. You can assume that the table faithfully represents a tree: every node except one (the root) has exactly one parent. You may also assume the maximum height of the tree is four: there's no path from the root to a leaf that's of length > 4. Do not make any other assumptions, such as a fixed or maximum number of children per parent, or a balanced tree structure (i.e., a uniform distance from root to Your goal is to write a SQL query that finds the lowest commmon ancestor of two given nodes, X and Y. Your query should return the unique node Z that is an ancestor of both X and Y, and no other node is an ancestor of X and Y but a descendent of Z. (Put another way, Z is the common ancestor that's furthest from the root.) Note that every node is an ancestor of itself. - In your query, treat X and Y as constants. When the query is run, X and Y should be replaced with two node IDs from the database. The result of the query should be a single node ID. - Your solution should work regardless of where X and Y are located with respect to each other in the tree, including X = Y. - If you're shooting for a "Silver" or "Gold" score by including a transcript of running your query over a sample database, please also include a rendering of your tree structure, and make sure to show a representative suite of different relationships between nodes X and Y. - Finding a solution that can be expressed in a single standard declarative SQL query is not easy! If you're completely stuck, one approach you can try is to modularize a bit: run an initial query or two and put the results into temporary tables, then run a query over the temporary tables to get the final result. Once you've got that working you can think about how to create a single query that has the same effect. Submission Instructions: Challenge Problems should be submitted in pdf format. For students who prefer hand-writing their solutions or using some other format, solutions may be scanned and submitted as . Solutions must be submitted through Coursework and must be in a single file named ). Login to Coursework on the CS145 tab at the top. In the left side-bar, click on Assignments you will see Challenge Problems #2 . Upload your solution file and submit for grading. You may resubmit as many times as you like, however only the latest file and the latest timestamp are saved, and those are what we will use for grading your work and determining late penalties. Submissions via email will not be Reminders: Late Policy and Honor Code - Your score for each automated exercise set is the highest score achieved as of 11:59:00 PM on the due date. No credit is given for automated exercises submitted after the due date. - The Challenge Problems are submitted separately as specified above. They are due at 11:59:00 PM on the due date. Submissions after the deadline but less than 24 hours late will be accepted but penalized 10%, and submissions more than 24 hours but less than 48 hours late will be penalized 30%. No submissions will be accepted more than 48 hours late. - Since emergencies do arise, each student is allowed a total of four unpenalized late days (four periods up to 24 hours each) for non-automated work, but no single assignment may be more than two days late. - For detailed discussion of the Stanford Honor Code as it pertains to CS145, please see the Assigned Work page under Honor Code. In summary: You must indicate on all submitted work any assistance (human or otherwise) that you received. Any assistance received that is not given proper citation will be considered a violation of the Honor Code. In any event, you are responsible for understanding and being able to explain on your own all material that you
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257920.67/warc/CC-MAIN-20190525064654-20190525090654-00451.warc.gz
CC-MAIN-2019-22
9,339
177
https://ilovehomoeopathy.com/homeopathy-for-colic-2/
code
Not every colic is the same. Which is why homeopathic remedies work for colic. Just one of the many remedies that can work. These remedies are chosen based on the symptoms you suffer from. When the pains force you to bend double, and must walk about for relief, You also break into a cold sweat.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153791.41/warc/CC-MAIN-20210728185528-20210728215528-00071.warc.gz
CC-MAIN-2021-31
295
2
https://www.drgsbrainworks.com/product/slam-words/
code
This little word game is perfect for take anywhere fun! The game folds into a 4” in diameter by 1” high disc which holds 3 letter dice. The first player to begin a round pops open the expandable cup, shakes the dice, and slams it back down into a disc to hold the 3 dice in place. They have to quickly find a word that uses all 3 letters in it (it can be longer; it just has to contain all 3 letters) and pass it to the next player who has to think of a different word and around it goes. When players can’t think of new words, they are eliminated.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474853.43/warc/CC-MAIN-20240229202522-20240229232522-00403.warc.gz
CC-MAIN-2024-10
554
1
http://www.sqaforums.com/forums/micro-focus-borland-segue-silktest/1117-advantages-disadavantages-tags.html
code
Since testcases use logical names, if the object's actual name changes on the current GUI, on another GUI, or localized version of the applications, do we have to change just the tag in the window declarations or do we need to do some more changes? (in Silk Test) are there any disadvantages of TAGs in GUI/Web based testing? [This message has been edited by vdevara (edited 10-18-2000).] I think the answer to your question is YES. I am a bit confused on your lingo .. so perhaps a simple example for all. The logical name is the identifier you refer to in your script. Once you decide what it should be (or take the system default) you should attempt to keep that logical name for "all times", in other words for goodness sake don't change it ever!!! Now if some crafty developer decides to change the name of the control from "activate" to say "energize" you don't change the logical identifier .. you change the physical description or tag itself .. like so (i.e lets use an html push button): Then you save those changes in your Frame file and viola .. all your OLD scripts work just fine! Because the OLD identifier will map to the correct control via the NEW tag .. no matter how many referances you have. This is the true value to tagging. You can map controls to immutable (non changing) identifiers, and when the caption or some tag description changes .. you only change it in the one place. Then all your old scripts which may have hundreds of referances to that control can still run!!Preety neat huh?? As for disadvantages .. or gotchas, like everything else they are there. I would like to see more tag forms supported (especially a window id for us reverse engineer types). Also there are two schools of thought to "multitags". I like them but I remember a funny subject title in this forum "multi tags are evil".
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661051.55/warc/CC-MAIN-20160924173741-00181-ip-10-143-35-109.ec2.internal.warc.gz
CC-MAIN-2016-40
1,829
12
https://www.solarenergyconnect.com/5-amazing-solar-gadgets-inventions-best-solar-accessories-ever/
code
➤This Video About 5 Amazing SOLAR Gadgets & Inventions |Best Solar Accessories Ever Featuring the latest solar energy projects,solar power and solar gadgets on amazon Best Solar gadgets Link is Below- ✔ Lifepack – Solar Powered and Anti-Theft Backpack-https://amzn.to/2roxBav ✔ RokPak- THE WORLD’S FIRST AND ONLY SOLAR, BATTERY CHARGER-https://kck.st/2jBgsa1 ✔ SOS20K – Life Saving Portable Solar Battery-https://kck.st/2KF79lZ ✔ WakaWaka Power+ Solar-Powered Flashlight + Charger-https://amzn.to/2KFO96Q ● Get Amazon Prime For Free ➤https://amzn.to/2IYaB9K ● Deal Of The Day(UpTo 70% Off) ➤https://amzn.to/2qCb22r ➤ Enjoying my content? well then don’t forget to: ★ leave a like ★ Share with your friends ★ Subscribe Amazing Guruji for more more futuristic inventions, amazing new technology, cool gadgets and THINGS you didn’t know EXISTED. ● Outro source-https://goo.gl/369zWn Music Credits: William Ekh – Adventures (feat. Alexa Lusader) [NCS Release] Music provided by NoCopyrightSounds. ● Disclaimer: This video and description contains affiliate links, which means that if you click on one of the product links, I’ll receive a small commission. This help support the channel and allows us to continue to make videos like this. Thank you for the support! ● Copyright Issue:-If you find any of your copyrighted material in this video, please leave us a message so we can resolve the issue or contact us at Yadvirmann094@Gmail.com © All rights reserved by respective owners.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038092961.47/warc/CC-MAIN-20210416221552-20210417011552-00025.warc.gz
CC-MAIN-2021-17
1,525
19
https://www.seroundtable.com/google-locale-aware-geo-language-pages-19780.html
code
Forever, Google said to treat Google's crawlers, GoogleBot, as you would any searcher or user accessing your site from the United States. But now this is going to change because Google may crawl your site from IP addresses outside of the US and also may crawl your site with language settings outside of English-US. What does this mean? In short, some sites that offer internationalized content do so without sending the user to a special URL. Google has always preferred you set up specific URLs or ccTLDs for content tailored to different countries or languages, but many sites just dynamically serve content on their .com based on the IP address origin or their browser language configurations. Google is now going to support the sites that dynamically serve internationalized content based on IP or language. They will do this based on two methods: - Geo-distributed crawling where Googlebot would start to use IP addresses that appear to be coming from outside the USA, in addition to the current IP addresses that appear to be from the USA that Googlebot currently uses. - Language-dependent crawling where Googlebot would start to crawl with an Accept-Language HTTP header in the request. Pierre Far, who was one of the Googlers assigned to this project, explained on Google+ a few points: - We still (very strongly) recommend having separate URLs for different locales and using rel-alternate-hreflang annotation for them. Separate URLs are better for users, and that's what really counts. Locale-aware crawling is for the few edge cases where it's not possible for you to have separate URLs. - It's early days and the countries that Googlebot will appear to come from and the Accept-Language headers it may try do not cover all combinations of countries and languages around the world. Also, we will continue to tweak things as we build out this feature. This is another reason to have separate URLs. - Locale-aware crawling gets enabled algorithmically if we detect your site may benefit from it. You don't need to do anything There is a lot of documentation on this over here but expect things to change slightly as webmasters discover how Google handles this and they report issues, confusion and problems in the forums. Forum discussion at Google+.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123048.37/warc/CC-MAIN-20170423031203-00051-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,261
11
https://forum.snapmaker.com/t/enclosure-door-sensor/20267
code
The magnets that use for door open/close detection pop out by itself. I place the magnets back to where that I think they should be. I run the M1010 S1 to test the door status. Both doors must be open to register the open event. Only need one door close to register the close event. Isn’t it should be either doors open should trigger the open event and both must close to trigger the close event. Is this bug/feature or I just place the magnet incorrectly. There are 4 sensors on the pillar that detect the magnets, staggered left/right from top to bottom to pick up the 2 doors. Any one of them triggering will trigger the door sensor detection logic. They each have a small LED that in a darkened room you can see turn on when you bring a magnet near. I’m guessing something isn’t placed correctly. Here’s the location: 3D and Laser modules no longer working - #9 by brent113 If one side of the enclosure is never triggering the door open detection that sounds like a flaw to me and you should consider reaching out to support. I have place them side by side. So I think that I only trigger same set of door sensor. I will try to see if I can see the LED. It is working now. Never notice there are four LED lights.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510924.74/warc/CC-MAIN-20231001173415-20231001203415-00722.warc.gz
CC-MAIN-2023-40
1,225
10
https://es.mathworks.com/matlabcentral/answers/1892700-why-do-i-receive-this-tlc-processing-error-need-to-rebuild-my-my-model-because-of-incomplete-record
code
Why do I receive this TLC processing error: need to rebuild my my model because of incomplete records in the .rtw file. 2 visualizaciones (últimos 30 días) I was following instructions from the Build Process part. After building the ecaxt model and running the command tlc -r basic_grt_rtw/basic.rtw basic.tlc -v I kept getting this error: And this is the data it indicates:
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475701.61/warc/CC-MAIN-20240301193300-20240301223300-00274.warc.gz
CC-MAIN-2024-10
376
6
https://premium.wpmudev.org/forums/topic/affiliate-manual-payment-failed-credit/
code
So I was testing the affiliates plugin for MarketPress with Manuel Payments. When I did a test run of a purchase and referral, it did not acknowledge any income for the affiliate account. It shows that the user did in fact sign up, however it does not show that the user made any purchase after I marked the product the refereed user bought as paid under manual payment. Am I missing something? Also, if the user signs up via affiliate link, will any purchase they make go towards their affiliate income? Or is it only stored in cookies?
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657142589.93/warc/CC-MAIN-20200713033803-20200713063803-00155.warc.gz
CC-MAIN-2020-29
537
4
http://magicarticlerewriterinfo.com/regrabadora/cinco-conocimientos-no-convencionales-sobre-spin-rewriter-9-0-que-no-se-puede-aprender-de-los-libros-siete-lecciones-importantes-de-vida-spin-miomqx.html
code
Anyone will can this, all you want is a fabulous computer and the flexibility to sequence a post title together. You can generate original article content and submit them to story lookup directories and receive paid for. You possess to apply to these web pages and may or may never get transformed down. If you should materialize to receive transformed down subsequently just hold plugging apart until you obtain person to "work with" you. Finest spinner in the market today and more for me because saves a lot of my time... Earlier i have used the best spinner but this spinner is 10 times better faster, easy to use, and articles make more sense, unique, also helps in preparing new articles and spins same article into hundred of more articles for back-linking, etc. 2 thumbs-up... simple and easy to use... Spin Rewriter is probably the best product in the market... I get great EPCs promoting it and, what's most important to me is that my customers actually love the product. Very low cancellation rates and practically no refund rates. All around it's a fantastic product — if it fits your business at all, then you definitely have to get on board and promote it! Words have the uncanny ability to create magic. Often a group of words is rewritten to achieve various purposes. Either if you are a student, blogger, author or writing in any capacity; you need to play with your words to create magic for the reader. Rewriting is a very useful tool for a lot of people. The best way to rewrite something is to do it yourself and with your own knowledge. Often this is restricted by lack of time and vocabulary. It takes up to hours, days or even weeks to rewrite something depending upon the length of it. No matter how good you are in the language, there comes a point where your knowledge starts to drain out. Anyone may carry out this, all you need is a new computer system and the capability to chain a phrase together. You can create original content articles and submit them to post directories and obtain compensated. You have to apply to these websites and may or may not really get switched down. If you should occur to obtain switched down after that just maintain plugging away until you discover somebody to "employ" you. 2. Show Off Your Singularity - In my previous posts, I have discussed the value of being distinct from others in your business. You must promote your singularity. What's it about YOU that will bring your audience for you? Among the greatest mistakes you can make is attempting to duplicate someone in your business. Although, they may become successful, you're not giving your target audience reasons to pick your services over theirs. That is why it is essential to reveal your audience why you're distinct, and be consistent with your singularity.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027317130.77/warc/CC-MAIN-20190822130553-20190822152553-00286.warc.gz
CC-MAIN-2019-35
2,790
6
http://freecode.com/tags/netbsd?page=1&sort=updated_at&with=&without=5846
code
syslog-ng is a syslogd replacement for a wide variety of UNIX systems that supports IPv6 and is capable of transferring log messages reliably using TCP and SSL and filtering the content of messages using regular expressions. Both RFC3164 and RFC5424 style messages are handled, but more esoteric formats like BSD process accounting logs are supported too. Apart from regular text files, it supports storing messages into SQL and MongoDB databases, and forward messages to local processes via pipes or UNIX domain sockets. This makes syslog-ng ideal as an integration platform. syslog-ng supports extracting structured information from the traditionally text based syslog via csv-parser(), db-parser(), and patterndb. Tag based classification, rewriting messages, and outputting messages in JSON is also possible. This makes syslog-ng ideal for preprocessing events for further analysis, be that home-grown scripts or SIEM systems. syslog-ng scales well on today's multi processor and multi-core systems: reaching 1,000,000 messages per second is a reality for the simplest use cases. Balance is a simple but powerful generic TCP proxy with round-robin load balancing and failover mechanisms. Its behavior can be controlled at runtime using a simple command line syntax. Balance supports IPv6 on the listening side, which makes it a very useful tool for IPv6 migration of IPv4 only services and servers. Monit is a utility for managing and monitoring processes, programs, files, directories, and devices on a Unix system. It conducts automatic maintenance and repair and can execute meaningful causal actions in error situations. It can be used to monitor files, directories, and devices for changes, such as timestamps changes, checksum changes, or size changes. It is controlled via an easy to configure control file based on a free-format, token-oriented syntax. It logs to syslog or to its own log file and notifies users about error conditions via customizable alert messages. It can perform various TCP/IP network checks, protocol checks, and can utilize SSL for such checks. It provides an HTTP(S) interface for access. Arkeia Network Backup is designed for organizations that require fast, easy-to-use, and affordable data protection. It backs up critical data to disk, tape, and cloud storage. Arkeia protects all major virtual platforms including VMware, Hyper-V, XenServer, and more than 200 physical platforms including Windows, Mac OS X, Linux, Netware, most UNIX flavors, and BSDs. The company’s source-side Progressive Deduplication technology helps users realize better performance at a lower cost by reducing data volumes. Arkeia’s deduplication is crucial to accelerating replication of on-premise backups to private or public clouds.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345768998/warc/CC-MAIN-20131218054928-00035-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
2,755
4
https://learn.microsoft.com/en-us/windows/mixed-reality/develop/choosing-an-engine?tabs=unity
code
Choosing your engine There are several development paths you can take through our documentation. The first step is finding the technology that's right for you. If you already have one in mind, go ahead and jump right to its respective tab below. If you're on the fence or just starting out, take a look through each one and understand what they offer, the available platforms and tools, and start creating! Take a look at our porting guides overview if you have existing projects that you want to bring over to HoloLens 2 or immmersive VR headsets like the Reverb G2. We have guides for projects that are using HTK, MRTK v1, SteamVR or were developed for immersive headsets such as the Oculus Rift or HTC Vive. Unity is one of the leading real-time development platforms on the market, with underlying runtime code written in C++ and all development scripting is done in C#. Whether you're looking to build games, movies and animation cinematics, or even render architectural or engineering concepts in a virtual world, Unity has the infrastructure to support you. Please make sure to check out known issues in certain Unity versions before choosing a Unity version. Unreal Engine 4 is a powerful, open source creation engine with full support for mixed reality in both C++ and Blueprints. As of Unreal Engine 4.25, HoloLens support is full-featured and production-ready. With capabilities such as the flexible Blueprints Visual Scripting system, designers can virtually use the full range of concepts and tools generally only available to programmers. Creators across industries can leverage the freedom and control to deliver cutting-edge content, interactive experiences, and immersive virtual worlds. Native developers with experience writing their own 3D renderers can build a custom engine using OpenXR. OpenXR is an open royalty-free API standard from Khronos that provides engines native access to a wide range of devices from vendors across the mixed reality spectrum. You can develop using OpenXR on a HoloLens 2 or Windows Mixed Reality immersive headset on the desktop. Web developers creating compelling cross-browser AR/VR web experiences can use WebXR. Features and devices |Pricing||Unity pricing||Unreal pricing||Free||Free| |Plane/mesh hit testing||✔️||✔️||✔️||✔️| |QR code detection||✔️||✔️||❌||✔️| |HoloLens (1st gen)||✔️||✔️||❌||WinRT (Legacy) only| |Windows Mixed Reality headsets||✔️||✔️||✔️||✔️| |Mixed Reality Toolkit||✔️||✔️||❌||❌| |World Locking Tools||✔️||❌||❌||❌| |Azure Spatial Anchors||✔️||✔️||❌||✔️| |Azure Object Anchors||✔️||❌||❌||✔️| |Azure Remote Rendering||✔️ *||❌||❌||✔️ *| - Azure Remote Rendering is currently supported in apps using the legacy WinRT APIs (Windows XR plugin in Unity). ARR support for OpenXR apps is coming soon. Next Development Checkpoint If you're following the Unity for HoloLens development checkpoint journey we've laid out, your next task is to work through our HoloLens 2 tutorial series. Otherwise, continue on to install the right version of Unity and get set up with your first mixed reality Unity project: Submit and view feedback for
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711042.33/warc/CC-MAIN-20221205164659-20221205194659-00296.warc.gz
CC-MAIN-2022-49
3,219
24
http://www.elsevier.com/books/fractals-in-soil-science/pachepsky/978-0-444-50530-9
code
Preface. Integrating processes in soils using fractal models(J.W. Crawford, Ya.A. Pachepsky, W.J. Rawls). Conventional and fractal geometry in soil science (Ya.A. Pachepsky, D. Giménez, J. W. Crawford, W. J. Rawls). Surface fractal characteristics of preferential flow patterns in field soils: evaluation andeffect of image processing(S. Ogawa, P. Baveye, C.W. Boast, J-Y. Parlange,T. Steenhuis). Generalizing the fractal model of soil structure: the pore—solid fractal approach(E. Perrier, N. Bird, M. Rieu). Silty topsoil structure and its dynamics: the fractal approach(V. Gomendy, F. Bartoli, G. Burtin, M. Doirisse, R. Philippy, S. Niquet, H. Vivier). Simulation and testing of self-similar structures for soil particle-size distributions usingiterated function systems(F.J. Taguas, M.A. Martín, E. Perfect). Scaling properties of saturated hydraulic conductivity in soil(D. Giménez, W.J. Rawls, J.G. Lauren). Estimating soil mass fractal dimensions from water retention curves(E. Perfect). Influence of humic acid on surface fractal dimension of kaolin: analysis of mercuryporosimetry and water vapour adsorption data(Z. Sokolowska, S. Sokolowski). Applications of light and X-ray scattering to characterize the fractal properties of soilorganic matter(J.A. Rice, E. Tombácz, K. Malekani). Fractal and the statistical analysis of spatial distributions of Fe—Mn concretions insoddy–podsolic soils(Yu.N. Blagoveschensky, V.P. Samsonova). Fractal concepts in studies of soil fauna(C. Kampichler). Fractal analysis in studies of mycelium in soil(L. Boddy, J.M. Wells, C. Culshaw, D.P. Donnelly). The distribution of anoxic volume in a fractal model of soil(C. Rappoldt, J.W. Crawford). Fractal analysis of spatial and temporal variability(B. Eghball, G.W. Hergert, G.W. Lesoing, R.B. Ferguson). Bibliography on applications of fractals in soil science (Ya.A. Pachepsky, D. Giménez, J.W. Crawford, W.J. Rawls).
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207927863.72/warc/CC-MAIN-20150521113207-00135-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
1,922
1
http://tendoswitch.com/docked-vs-undocked-potentially-future-proofing-all-switch-games/
code
Hey there. So it's confirmed that the Switch will run games at a higher resolution when docked as opposed to undocked. This was somewhat expected, and makes a lot of sense from a power draw standpoint. But how does this affect the actual development of titles? Well, to be honest with you, I do not have all the answers. However, we know that developers will obviously have the choice of what settings to tone down via the changing of modes, the most important one for this example being resolution. Say you put a Wii game in a Wii U. That game is still rendering at 480p, not 1080p. That's just how it works. Games will not run at a higher resolution than they were programmed to. You can see this with any system that has BC. Xbox games don't run at a higher resolution when played on a 360. PS1 doesn't on a PS2. That's just how it works. However- you can run Half-Life 2 now, in 4k or higher. That's because PC games are scalable by nature. That's how PC games are developed- they have to be able to run on a myriad of PCs with different specs. So with that resolution option built in, you can run even older games at higher resolutions if they were allowed to. And if not mods take care of that. How does that apply to the Switch? Well, if games can run at more than one resolution (docked vs. undocked) then does it not stand to reason that Switch games will, at least on the developer's side, scalable by default? Could a developer, say run their exact game at a higher resolution if the specs allowed for it? What's stopping them? Here's what to think about from this post: If the Switch's games are by default not locked in to a set resolution, could that mean that future iterations of the Switch could run older games at higher resolutions? What are your thoughts?
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815812.83/warc/CC-MAIN-20180224132508-20180224152508-00504.warc.gz
CC-MAIN-2018-09
1,775
8
https://www.tr.freelancer.com/projects/software-architecture/python-big-data-analysis-17533653/
code
need to do in anaconda big data analysis Bu iş için 14 freelancer ortalamada $1346 teklif veriyor Hello! I am a python developer. I looked at your project and it seems interesting. I have all necessary skills required for this project. Ping me to discuss in detail. Hello. I am a professional programmer and Python exert. So i can do your project surely. Please send message, so we can discuss details and start soon. I am ready for your project now. Thanks.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655891640.22/warc/CC-MAIN-20200707013816-20200707043816-00153.warc.gz
CC-MAIN-2020-29
460
4
https://povar-vkusya.ru/pune-online-dating-girls-3686.html
code
Pune online dating girls Free sex chat brisbane It does not matter to us, whether you are too busy at work, concentrating on a passion project, or simply tired of a seemingly infinite flow of assignments. We will take care of them, and for a reasonable price, as we understand that students usually don’t have a lot of money to spare. Place an order, and we will give it to the most suitable writer we have available. Pune online dating girls I am ready to pay someone to do my homework.” Often, there are no results to these cries for help because your peers may be either as busy as you are or not confident they can deliver a well-written assignment worth the money you are paying. After discovering our site, you will no longer need to bother your friends with such requests. Your work will be thoroughly checked to contain no plagiarism and accompanied by reference and title pages. While you pay for homework, we offer those options for free. Additionally, you can order editing and proofreading. You can also get various discounts on our site which will help you save some more money for future orders or whatever you want to spend them on. It is a common practice to charge more for such immediate papers, and our company is not an exception. However, you can be sure that you are getting a fine work for the price you are paying. Besides, no one will ever know that you got a paper from our company as we guarantee complete confidentiality to our customers.Tags: Adult Dating, affair dating, sex dating
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107919459.92/warc/CC-MAIN-20201031151830-20201031181830-00183.warc.gz
CC-MAIN-2020-45
1,515
14
https://support.quest.com/de-de/on-demand-recovery/kb/4302643/what-ports-are-required-to-restore-objects-and-attributes-in-the-on-premise-environment-using-the-hybrid-feature-in-on-demand-recovery
code
When performing a restore in On Demand Recovery which includes objects/attributes which exist in the on premise environment the On Demand module contacts an "Azure Relay" service which is configured in the Quest Azure tenant. The"Quest Recovery Manager Portal Access" service in the on premise environment then contacts "Azure Relay" service in the cloud over HTTPS (port 443). The connection only needs to be opened from the on premise Recovery Manager server to the "Azure Relay" service in the cloud. Incoming connections to the Recovery Manager server can be blocked. The best approach is to whitelist the DNS name for the Azure WCF Relay, opening only port 443 to *.servicebus.windows.net © ALL RIGHTS RESERVED. Feedback Nutzungsbedingungen Datenschutz Cookie Preference Center
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649348.41/warc/CC-MAIN-20230603233121-20230604023121-00717.warc.gz
CC-MAIN-2023-23
783
3
http://www.sql-server-performance.com/forum/threads/could-not-continue-scan-with-nolock-due-to-data-movement.32983/
code
we are using Idera monitoring tool for servers. everyday morning we are getting this error : Error executing Table Growth Collector: Could not continue scan with NOLOCK due to data movement. I have checked if they are any jobs or query running at that time. I found none but, transaction log backup jobs are running. I alo checked if any query running with nolock hint.I found none. Can you please help me wih this issue.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313501.0/warc/CC-MAIN-20190817222907-20190818004907-00306.warc.gz
CC-MAIN-2019-35
421
1
https://forum.becomealivinggod.com/t/ways-to-respect-entities/27359
code
I’m interested in the many ways everyone shows respect towards entities. (Spirits, gods, and etc.) I mean, I know ways to show respect towards them. I just would like to know the many ways everyone else does. This may also be useful for newbies, so they’ll get ideas on how to show respect towards entities. Some ways I show respect is by trying to intently listen to some of the things they have to say, and thanking them for given advice and/or help. Now what are some ways you show your respect towards entities?
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038064520.8/warc/CC-MAIN-20210411144457-20210411174457-00501.warc.gz
CC-MAIN-2021-17
519
3
http://hoteluropa.eu/traumatic-subarachnoid-hemorrhage-treatment-guidelines.html
code
However, all ecosystems must include both biotic and abiotic components, their interactions, and some source of treatmennt. The simplest henorrhage least representative) of ecosystems might therefore contain just a single living plant (biotic component) within a small terrarium exposed to light to which a water solution containing essential nutrients for plant growth has been added (abiotic environment). The other extreme would be the biosphere. And of course, most ecosystems fall somewhere in between these extremes of complexity. At a basic functional level, ecosystems generally contain traumatic subarachnoid hemorrhage treatment guidelines producers capable of harvesting energy from the sun by photosynthesis and of using this energy to convert carbon dioxide and other inorganic chemicals into the organic building blocks of life. Consumers feed on this captured energy, and hsmorrhage not only feed on sibarachnoid energy, but also break organic matter back into its inorganic constituents, gate 2012 computer science information technology pdf can be used again by producers. These interactions among producers and the organisms that consume and decompose them are called trophic interactions, and are composed of trophic levels in an energy pyramid, with most energy and mass in the primary producers at the base, and higher levels of feeding on top of this, starting with primary consumers feeding on primary producers, secondary consumers feeding on these, and so on.
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320040.36/warc/CC-MAIN-20170623082050-20170623102050-00256.warc.gz
CC-MAIN-2017-26
1,484
2
https://petrolhat.net/video/18868
code
New 2020 Porsche 718 Boxster GTS review - the Boxster GTS is back with a bang! Category:Thank you for watching this video. Please checkout more video reviews of Porsche 718 & Porsche Boxster plus some additional content about Porsche Porsche 718 Cayman GTS full review: https://aex.ae/37uqxw6 SUBSCRIBE for more great car videos: http://aex.ae/2gY9ABE It isn’t just the Porsche 718 Cayman that has been given the GTS treatment, as Porsche has also fitted the 718 Spyder’s engine (albeit slightly detuned) into the 718 Boxster. Steve Sutcliffe heads to Portugal to see whether or not this new Boxster GTS is all the car you will ever need. More Auto Express videos Car reviews playlist: http://aex.ae/2gY4ViX Porsche 718 Cayman GT4 video review: https://aex.ae/2ORCiGD Porsche 911 video review: https://aex.ae/3bdBHIG More on AutoExpress.co.uk Top 10 best sports cars: https://aex.ae/2MkbRKP Top 10 best performance cars: https://aex.ae/2EGq547 Alpine A110 review: https://aex.ae/2K0IxX2 Follow us Twitter: https://twitter.com/AutoExpress Facebook: https://www.facebook.com/AutoExpress Instagram: https://www.instagram.com/autoexpressmagazine 336 x 280 336 x 280
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058456.86/warc/CC-MAIN-20210927151238-20210927181238-00522.warc.gz
CC-MAIN-2021-39
1,165
5
https://wiki.centos.org/HowTos(2f)Spice(2d)libvirt.html
code
Using Spice with LibVirt on VMs (CentOS-6.2 or Higher) <<TableOfContents: execution failed [Argument "maxdepth" must be an integer value, not ""] (see also the log)>> 1. What is Spice CentOS-6.2 introduces a new version of LibVirt (version 0.9.4-23) that contains built in support for Spice. The Spice project aims to provide a complete open source solution for interaction with virtualized desktop devices. Spice currently focuses to provide high-quality remote access to QEMU virtual machines. Seeking to help break down the barriers to virtualization adoption by overcoming traditional desktop virtualization challenges and emphasizing the user experience. For this purpose, Red Hat introduced the SPICE remote computing protocol that is used for Spice client-server communication. Other components developed include QXL display device and driver, etc. So, Spice is an enhanced method to connect to a QEMU virtual machine in a way that helps to maintain the desktop experience. It provides sound from the VM as well as much lower bandwidth for higher end graphics on the VM. For more information on Spice, see the spice-space.org website. 2. How to convert a current KVM Virtual Machine to use Spice Note: Currently (as of CentOS-6.2), only the X86_64 arch can be used as a KVM host server for virtual machines. This guide is written for a CentOS-6.2 x86_64 machine with either vmx (Intel Processor) or smx (AMD Processor) cpu flags and an already working VirtManager (or virsh for CLI only) VM host. Note: Spice only works with KVM (and not Xen) virtual machines. 2.1. Installing Spice 1. If you have a KVM Virtual Machine that is currently using VNC as the console (the old default), after upgrading to version 0.9.4-23 (or higher) for libvirt, install the following RPMS on the host: yum install spice-server spice-client spice-protocol With CentOS 6.3 and later, you may also want to install virt-viewer. 2. If the host machine is a fully graphical install, you might also want to install the following optional RPMS: yum install cairo-spice ffmpeg-spice-libs ngspice pixman-spice spice-glib spice-gtk spice-gtk-python spice-gtk-tools spice-xpi 2.2. Installing the Spice Display on an Existing KVM Virtual Machine 1. Open VirtManager and double click the VM in question. Changes only happen when the VM is shutdown, so shutdown the VM to make the change. 2. After the machine is shutdown, use the View menu item and select Details. In the left column, find the Display VNC hardware item, highlight it and click the Remove button on the bottom right of the screen. 3. Click the Add Hardware option at the bottom left of the screen, then pick Graphics, and in the Type drop down box that defaults to VNC Server, pick Spice Server and click the Finish button. You can also check the option to Listen on all Public Interfaces. This option will listen on your public IP address and not 127.0.0.1 only. This will make your VM available to be connected to from other machines that install spice-client (as detailed below). Another option is tha you can allocate the port for the normal and secure connections. Make sure to set a password and to use a secure port if connecting from a non secure network. Note: You must remove the VNC Display and then add the Spice Display ... you can NOT change the VNC Display to a Spice Display as that does not add the extra devices necessary to use spice. 4. Select the Video hardware device, and in the Model drop down box, select the qxl device. Press the Apply button at the bottom right of the window. 5. You should now be able to start the device and it should be using spice for the default console connection. 6. You can also install some graphics drivers on some operating systems (in your VM Guest) to get better graphical performance. See the spice download page for Windows Drivers for qxl. 3. Connecting to Spice with the Clients 1. You can use the console from VirtManager if you are on the machine that hosts the VM, but you can also connect to the machine using one of remote clients. The spice-client contains the spicec and can be used like this: spicec -h <host> -p <port_number> -w <password> (if you did a secure port, use -s <port> for that instead of -p ... -w <password> is optional) With CentOS 6.3 and later, you can connect using the following command (the virt-viewer package required): The spice-gtk-tools package contains spicy. If you execute spicy, you can type in the hostname, password, and port to connect to a spice machine. Note: Remember that when using spicec or spicy (or any another spice client), you are connecting to the port and Hostname (or IPADDRESS) of the KVM Host and not the actual name/address of the Virtual Machine.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00796.warc.gz
CC-MAIN-2023-40
4,706
31
https://paulhartigan.net/2011/05/21/making-noise-with-the-arduino/
code
I have been pretty busy lately with some other projects which I will post later but I did find this very simple project for the Arduino on the Adafruit website. It uses a photoresistor and a piezo buzzer and a very short piece of code. It is easy to build and easy to modify. If you are new to electronics it is a great way to see these components in action. The blog post has a simple diagram showing all the parts required along with the code.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655891640.22/warc/CC-MAIN-20200707013816-20200707043816-00282.warc.gz
CC-MAIN-2020-29
445
2
https://invisioncommunity.com/forums/topic/469159-passkeys-instead-of-passwords/
code
LuciannSeptember 4 in Feature Suggestions Are there any plans to release the passkey feature https://developer.apple.com/passkeys/ anytime in the near future? This feature will be oficially released this fall with the new apple software and i’m sure in a few months or years it will fully replace passwords. There are other platforms than Apple, and passkeys will not work (for now) on a PC. I highly doubt IPS will implement a feature that cannot be used by 100% of the community. Maybe they will add an option but it will not in a long time replace passwords is my guess. There are platforms other than Apple? Apple just created a bigger marketing splash around it. It’s not an Apple thing, but an alliance between companies such as Apple, Microsoft and Google. They will all have implementations soon. I'd love passkey support. For anyone who wants to know a little bit more, here's a fairly good article - https://arstechnica.com/information-technology/2022/10/passkeys-microsoft-apple-and-googles-password-killer-are-finally-here/ Started September 25, 2015 Started November 9, 2021 Started September 5 Started November 3 Started Tuesday at 01:02 PM Started Thursday at 09:33 PM Started 6 hours ago
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710473.38/warc/CC-MAIN-20221128034307-20221128064307-00732.warc.gz
CC-MAIN-2022-49
1,207
15
https://dhirendrayadav.com/2010/08/sharepoint-sushi.html
code
SharePoint SUSHI is a powerful, user-friendly utility enabling you to accomplish common administrative tasks. You can think of SUSHI as a Swiss army knife for SharePoint. - Security Reports View all sites and lists a user has access to. - Profile Images Import Upload Profile Images and Apply them to User Profiles. - Backup Backup a site. - Restore Restore site from backup. - Email Test Send a test email to make sure outbound email is set up correctly. - Copy View Copy a view from one SharePoint list to another. - Meta Data Get detailed information about metadata in a list. Move metadata from one column to another for all items in a list. And more. - Bulk List Creation Create a large number of subsites based on a site template. - Bulk Site Columns Create Site Columns. - Import Documents Upload entire file structures from a file share into a document library. - Delete Old Documents Copy documents older than a specified date to an archive folder and then delete from SharePoint. - Bulk Site Creation Create a large number of subsites based on a site template. - Themes Apply a Theme to many sites at once.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203168.70/warc/CC-MAIN-20190324022143-20190324044143-00230.warc.gz
CC-MAIN-2019-13
1,116
14
https://www.frontitude.com/guides/create-your-workspace
code
💡 In Frontitude, your team space is called a Workspace. It houses all your projects, collaborators, and content. Sign in to Frontitude You can use the following methods to sign in and create your account on Frontitude: - Google Sign In - Microsoft Azure AD - SAML SSO (for more details: Single Sign On (SSO) authentication) Once you’ve signed in, your Frontitude account and workspace are created automatically. 💡 To sign in with Microsoft Azure AD for the first time your IT administrator will have to add the Frontitude app to their organization account on the Azure Marketplace. View your workspace details To view all your account and workspace details, go to the user avatar, click to open the dropdown menu, and then click the Settings button. You’ll see which Frontitude plan you're subscribed to, and you’ll be able to view and invite other team members as Workspace Collaborators, see your usage statistics, and manage your data.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100264.9/warc/CC-MAIN-20231201021234-20231201051234-00571.warc.gz
CC-MAIN-2023-50
950
10
https://meanjstraininginstitute.com/angular
code
Angular is the next big deal. Being the successor of the overwhelmingly successful Angular.js framework it’s bound to shape the future of frontend development in a similar way. The powerful features and capabilities of Angular allow you to create complex, customizable, modern, responsive and user-friendly web applications. Angular 4 simply is the latest version of the Angular framework and simply an update to Angular 2. This course starts from scratch, you neither need to know Angular 1 nor Angular 2. Angular is faster than Angular 1 and gives a much more flexible & modular development approach. After taking this course you will be able to fully take benefit of all those features and start developing awesome applications immediately. Due to the extreme differences between Angular 1 and Angular 4 you don’t want to know anything about Angular.js to be able to benefit from this course and build your futures projects with Angular. Angular 2 to Angular 4 training starts from scratch, you neither need to know Angular 1 nor Angular 2. You will get the experience of developing Single Page Applications using Angular2 – Angular4 You will receive the Real Time Project from MeanJS Training Institute in Hyderabad. Working with REST full web services Complete knowledge on the Angular 4 architecture Getting Started with Typescript Compiling the code Building a simple demo Understanding Classes and Datatypes Functions with Datatypes Building a class Demo of using Classes in typescript Introduction to Angular-2.x What is angular2.x Difference between Angular1x and Angular2x Creating a simple component Displaying data in our templates Working with Events Using two-way data building Adding CSS to our component Structural Directives – ngIf, ngFor… Attribute directive – custom Using directive values Template driven forms Model driven forms The angular2 routing bundle Using the router Class to navigate Then angular 2 HTTP bundle Using a mock backend for HTTP Calls Using Http for Get Calls Using URL search Params Using HTTP for POST, PUT, and DELETE calls Understanding component lifecycle Hooks Understanding what is reactive programming What are Observables Angular Testing Utilities Writing the test cases using jasmine Introduction of Bootstrap4 Ecommerce is a electronic commerce,refers to the buying and selling of goods or services using the internet. To Explore their Skills, Students will be assign a Ecommerce project. We also Train our Students in Housing Services. Housing is the best solution for companies who needs to supervise critical network application,that, managed autonomously. Rating of 350 Ratings Dignissimos asperiores vitae velit veniam totam fuga molestias accusamus alias autem provident. Odit ab aliquam dolor eius.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949533.16/warc/CC-MAIN-20230331020535-20230331050535-00227.warc.gz
CC-MAIN-2023-14
2,770
43
https://community.ezlo.com/t/when-turning-off-the-dimmer-set-the-loadlevellast-to-100/220371
code
I have the following issue: In my VeraPlus (firmware 7.31), I have created a dimmer using the Switchboard plugin. I want this light always turn on at 100% brightness when turn the light on. By default, the dimmer remembers its last used setting. I have created the following scene: when the light is turned off, the LoadLevelLast should be 100. Here is my luupcode: luup.variable_set("urn:upnp-org:serviceId:Dimming1", "LoadLevelLast", 100, 1237) Manually, this works by using Test Luup code (Lua), but does not work in scenes by using execute the following Luup code. Does anyone know what is wrong? I had a similar problem recently where command worked on the LUA test screen but not as code in a scene. Very puzzling. In the end it was the text editor was putting in the wrong " characters when pasting. So check your scene text to be sure you have " and not so called ❝pretty quotes❞. Thank you for your response. I checked the text, but no result. However, I have now discovered that if I manually start the scene by clicking “run”, the action does come through correctly. If I activate the scene automatically, it doesn’t work, even though the scene is activated. Last Run does show the new time when automatically activate the scene and I also let a light turn on by activating the scene. The light turns on, so the scene is started. Does anyone know the solution? Another couple of thoughts but not sure they will help. I would edit the exact lua line in your scene and delete the " character a retype it in instead of pasting it from another source. I deleted the " character and typed it in from the keyboard for each instance in the scene. I also turned on the check mark on the Users & Account Info / Security/ Enable potentially unsafe lua code, like wget and RunLua When this happened to me I was trying all sorts of things so I can’t say for sure what cleared up the problem. Also restart the lua engine and/or reboot after the changes. Might not be your situation but I’d give these two a try just in the off chance it helps. You cannot set the LoadLevelLast value. You have to look at your dimmer and see if it has the option to ignore the last load level or not. The other things you can do is create a scene that will turn the dimmer up to 100% when it is turned on, or if possible turn it on using a scene that sets the dimming level to 100% rather than using the On command. If I understand correctly, I cannot set the LoadLevelLast via scene activation or something like that. However, it is strange that it can be set manually and also via manual scene activation by hand. Thank you for the response seems strange. If you can effect the change via running at a lua test page the you should be able to run the same function in a wrapper in a meshbot/scene. did you check the enable potentially unsafe lua code… switch in users & account section then rebooted as an experiment? I think this fixed my inconsistency with a command working at the prompt vs in a scene. Thank you for thinking along. I have “Enable potentially unsafe lua code, like wget and RunLua.” enabled, but gives no result Maybe I should explain my self a bit more. Setting the LastLoadLevel value has no effect on the actual result. It is a value reported by the dimmer, not one you can set. Some dimmers have an attribute you can set so that it will ignore the last level when turned on with the “On” command so they always will go to 100%, many do not. You have to look in the manual of your dimmer. The only thing you can do is have a scene to set the dimmer at the desired level using the SetDimlevel at 100% command rather than the On. As a trigger for that scene you can use the dimmer getting turned on. After a second or two the dimmer will them go the the 100% level. All this can be done using the scene editor. No Lua required. My comments were directed to the OP who claimed the feature worked when commanded at the Vera/App/Develop apps/Test Luup code (Lua) window. I had a similar problem where a command worked at this test window but not as code in a scene which was very puzzling.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948756.99/warc/CC-MAIN-20230328011555-20230328041555-00605.warc.gz
CC-MAIN-2023-14
4,112
24
http://oxfordindex.oup.com/view/10.1093/oi/authority.20110920151859192
code
An expression formed from symbols for functions, constants, and variables. An example is f(a,g(h(b),c,d) Terms are defined recursively as follows: a term is either a variable symbol, a constant symbol, or else has the form φ(τ1,…,τk), where φ is a function symbol and each of τ1,…,τk is itself a term. The example above thus has the overall form f(τ1,τ2): in this case φ = f and k = 2. Another constraint is that different occurrences of the same symbol φ cannot occur with different values of k, i.e. each φ must have a fixed arity (number of arguments). Thus f(a,f(h(b),c,d) would not be a term since the first f has arity 2 while the second has arity 3; neither would f(a,g(h(b),c,h), since the first h has arity 1 while the second has arity 0. Terms are often built using signatures. A Σ-term is a term in which each constant and function symbol used is in a signature Σ, and has the arity associated with it by Σ and, if Σ is a many-sorted signature, all the sorts match properly. A Σ-term is also called a term over signature Σ. Often a Σ-term is allowed to contain variables (of arity 0) in addition to symbols in Σ. Terms containing variables are called open terms; terms containing only symbols of the signature are called closed or ground terms. Terms can also be viewed as trees (see tree language). Terms (whether as expressions or as trees) are important in the construction of virtually all syntactic concepts. Terms as defined here are sometimes called first-order terms, to distinguish them from the higher-order terms (such as those involved in lambda calculus). See also predicate calculus, initial algebra, equation.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221212040.27/warc/CC-MAIN-20180817104238-20180817124238-00404.warc.gz
CC-MAIN-2018-34
1,658
2
https://tengaged.com/blog/jjvawesomeness0511/8692314/alphabetically-accurate
code
- These six are competing in this veto: This will be a tengaged alphabet. Someone whose username starts with "A" must tag themself, then B, then C. Once a Z goes, a different A must go then so on and so forth. but the twist is that once you tag yourself, in that same post, post "Vote for 'whoever is competing'" the person with the most votes at the end WINS THE GOLDEN POV, no one competing in this competition may tag themselves. GOOOO. comp ends tomorrow after skool. After the first alphabet, the second set of people must post TWO PEOPLE, they CAN be the same person if you want. then if we reach a third alphabet then they do THREE people, and so on and so forth. Leave a comment
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999200.89/warc/CC-MAIN-20190620085246-20190620111246-00310.warc.gz
CC-MAIN-2019-26
686
4
https://www.gutermann.net/2015/03/24/installing-php5-intl-for-easier-internationalisation-of-php-scripts/
code
If you are just doing your own thing you will probably never run into this. But if you are doing things which need to be compatible with languages that seem to have rather funny letters looking like this = äöü … then this is for you. To get the basic package installed on Debian simply: aptitude install php5-intl Then get it loaded and confugred the way you need it. Easiest is pack it all in one file. This is what mine says, mind you that this is for the gmeran umlauts. ; configuration for php Internationalisation module ; priority=20 extension=intl.so intl.default_locale = de_utf8 intl.error_level = E_WARNING A brief explanation to what parameters can be set can be found here: In terms of how the language code is set and what it entails, this is for german, the others are just a couple of clicks away: I am not sure where in the docs I read it, but Intl will refer to the ICU standards in terms of language setting. This works of course on windows as well. Just use your editor of choice instead of nano.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474523.8/warc/CC-MAIN-20240224044749-20240224074749-00352.warc.gz
CC-MAIN-2024-10
1,020
10
https://ocw.mit.edu/resources/res-18-005-highlights-of-calculus-spring-2010/highlights_of_calculus/big-picture-derivatives/
code
Calculus finds the relationship between the distance traveled and the speed — easy for constant speed, not so easy for changing speed. Professor Strang is finding the "rate of change" and the "slope of a curve" and the "derivative of a function." Professor Strang's Calculus textbook (1st edition, 1991) is freely available here. Subtitles are provided through the generous assistance of Jimmy Ren. PROFESSOR: OK, hi. This is the second in my videos about the main ideas, the big picture of calculus. And this is an important one, because I want to introduce and compute some derivatives. And you'll remember the overall situation is we have pairs of functions, distance and speed, function 1 and function 2, height of a graph, slope of the graph, height of a mountain, slope of a mountain. And it's the connection between those two that calculus is about. And so our problem today is, you could imagine we have an airplane climbing. Its height is y as it covers a distance x. And its flight recorder will-- Well, probably it has two flight recorders. Let's suppose it has. Or your car has two recorders. One records the distance, the height, the total amount achieved up to that moment, up to that time, t, or that point, x. The second recorder would tell you at every instant what the speed is. So it would tell you the speed at all times. Do you see the difference? The speed is like what's happening at an instant. The distance or the height, y, is the total accumulation of how far you've gone, how high you've gone. And now I'm going to suppose that this speed, this second function, the recorder is lost. But the information is there, and how to recover it. So that's the question. How, if I have a total record, say of height-- I'll say mostly with y of x. I write these two so that you realize that letters are not what calculus is about. It's ideas. And here is a central idea. if I know the height-- as I go along, I know the height, it could go down-- how can I recover from that height what the slope is at each point? So here's something rather important, that's the notation that Leibniz created, and it was a good, good idea for the derivative. And you'll see where it comes from. But somehow I'm dividing distance up by distance across, and that ratio of up to across is a slope. So let me develop what we're doing. So the one thing we can do and now will do is, for the great functions of calculus, a few very special, very important functions. We will actually figure out what the slope is. These are given by formulas, and I'll find a formula for the slope, dy/dx equals. And I won't write it in yet. Let me keep a little suspense. But this short list of the great functions is tremendously valuable. The process that we go through takes a little time, but once we do it it's done. Once we write in the answer here, we know it. And the point is that other functions of science, of engineering, of economics, of life, come from these functions by multiplying-- I could multiply that times that-- and then I need a product rule, the rule for the derivative, the slope of a product. I could divide that by that. So I need a quotient rule. I could do a chain. And you'll see that's maybe the best and most valuable. e to the sine x, so I'm putting e to the x together with sine x in a chain of functions, e to the sine of x. Then we need a chain rule. That's all coming. Let me start-- Well, let me even start by giving away the main facts for these three examples, because they're three you want to remember, and might as well start now. The x to the nth, so that's something if n is positive. x to the nth climbs up. Let me draw a graph here of y equals x squared, because that's one we'll work out in detail, y equals x squared. So this direction is x. This direction is y. And I want to know the slope. And the point is that that slope is changing as I go up. So the slope depends on x. The slope will be different here. So it's getting steeper and steeper. I'll figure out that slope. For this example, x squared went in as 2, and it's climbing. If n was minus 2, just because that's also on our list, n could be negative, the function would be dropping. You remember x to the minus 2, that negative exponent means divide by x squared. x to the minus 2 is 1 divided by x squared, and it'll be dropping. So n could be positive or negative here. So I tell you the derivative. The derivative is easy to remember, the set number n. It's another power of x, and that power is one less, one down. You lose one power. I'm going to go through the steps here for n is equal to 2, so I hope to get the answer 2 times x to the 2 minus 1 will just be 1, 2x. But what does the slope mean? That's what this lecture is really telling you. I'll tell you the answer for if it's sine x going in, beautifully, the derivative of sine x is cos x, the cosine. The derivative of the sine curve is the cosine curve. You couldn't hope for more than that. And then we'll also, at the same time, find the derivative of the cosine curve, which is minus the sine curve. It turns out a minus sine comes in because the cosine curve drops at the start. And would you like to know this one? e to the x, which I will introduce in a lecture coming very soon, because it's the function of calculus. And the reason it's so terrific is, the connection between the function, whatever it is, whatever this number e is to whatever the xth power means, the slope is the same as the function, e to the x. That's amazing. As the function changes, the slope changes and they stay equal. Really, my help is just to say, if you know those three, you're really off to a good start, plus the rules that you need. All right, now I'll tackle this particular one and say, what does slope mean? So I'm given the recorder that I have. This is function 1 here. This is function 1, the one I know. And I know it at every point. If I only had the trip meter after an hour or two hours or three hours, well, calculus can't do the impossible. It can't know, if I only knew the distance reached after each hour, I couldn't tell what it did over that hour, how often you had to break, how often you accelerated. I could only find an average speed over that hour. That would be easy. So averages don't need calculus. It's instant stuff, what happens at a moment, what is that speedometer reading at the moment x, say, x equal 1. What is the slope? Yeah, let me put in x equals 1 on this graph and x equals 2. And now x squared is going to be at height 1. If x is 1, then x squared is also 1. If x is 2, x squared will be 4. What's the average? Let me just come back one second to that average business. The average slope there would be, in a distance across of 1, I went up by how much? 3. I went up from 1 to 4. I have to do a subtraction. Differences, derivatives, that's the connection here. So it's 4 minus 1. That is 3. So I would say the average is 3/1. But that's not calculus. Calculus is looking at the instant thing. And let me begin at this instant, at that point. What does the slope look like to you at that point? At at x equals 0, here's x equals 0, and here's y equals 0. We're very much 0. You see it's climbing, but at that moment, it's like it just started from a red light, whatever. The speed is 0 at that point. And I want to say the slope is 0. That's flat right there. That's flat. If I continued the curve, if I continued the x squared curve for x negative, it would be the same as for x positive. Well, it doesn't look very the same. Let me improve that. It would start up the same way and be completely symmetric. Everybody sees that, at that 0 position, the curve has hit bottom. Actually, this will be a major, major application of calculus. You identify the bottom of a curve by the fact that the slope is 0. It's not going up. It's not going down. It's 0 at that point. But now, what do I mean by slope at a point? Here comes the new idea. If I go way over to 1, that's too much. I just want to stay near this point. I'll go over a little bit, and I call that little bit delta x. So that letter, delta, signals to our minds small, some small. And actually, probably smaller than I drew it there. And then, so what's the average? I'd like to just find the average speed, or average slope. If I go over by delta x, and then how high do I go up? Well, the curve is y equals x squared. So how high is this? So the average is up first, divided by across. Across is our usual delta x. How far did it go up? Well, if our curve is x squared and I'm at the point, delta x, then it's delta x squared. That's the average over the first piece, over short, over the first piece of the curve. Out is-- from here out to delta x. OK. Now, again, that's still only an average, because delta x might have been short. I want to push it to 0. That's where calculus comes in, taking the limit of shorter and shorter and shorter pieces in order to zoom in on that instant, that moment, that spot where we're looking at the slope, and where we're expecting the answer is 0, in this case. And you see that the average, it happens to be especially simple. Delta x squared over delta x is just delta x. So the average slope is extremely small. And I'll just complete that thought. So the instant slope-- instant slope at 0, at x equals 0, I let this delta x get smaller and smaller. I get the answer is 0, which is just what I expected it. And you could say, well, not too exciting. But it was an easy one to do. It was the first time that we actually went through the steps of computing. This is a, like, a delta y. This is the delta x. Instead of 3/1, starting here I had delta x squared over delta x. That was easy to see. It was delta x. And if I move in closer, that average slope is smaller and smaller, and the slope at that instant is 0. No problem. The travel, the climbing began from rest, but it picked up speed. The slope here is certainly not 0. We'll find that slope. We need now to find the slope at every point. OK. That's a good start. Now I'm ready to find the slope at any point. Instead of just x equals 0, which we've now done, I better draw a new graph of the same picture, climbing up. Now I'm putting in a little climb at some point x here. I'm up at a height, x squared. I'm at that point on the climb. I'd like to know the slope there, at that point. How am I going to do it? I will follow this as the central dogma of calculus, of differential calculus, function 1 to function 2. Take a little delta x, go as far as x plus delta x. That will take you to a higher point on the curve. That's now the point x plus delta x squared, because our curve is still y equals x squared in this nice, simple parabola. OK. So now I you look at distance across and distance up. So delta y is the change up. Delta x is the across. And I have to put what is delta y. I have to write in, what is delta y? It's this distance up. It's x plus delta x squared. That's this height minus this height. I'm not counting this bit, of course. It's that that I want. That's the delta y, is this piece. So it's up to this, subtract x squared. That's delta y. That's important. Now I divide by delta x. This is all algebra now. Calculus is going to come in a moment, but not yet. For algebra, what do I do? I multiply this out. I see that thing squared. I remember that x is squared. And then I have this times this twice. 2x delta x's, and then I have delta x squared. And then I'm subtracting x squared. So that's delta y written out in full glory. I wrote it out because now I can simplify by canceling the x squared. I'm not surprised. Now, in this case, I can actually do the division. Delta x is just there. So it leaves me with a 2x. Delta x over delta x is 1. And then here's a delta x squared over a delta x, so that leaves me with one delta x. As you get the hang of calculus, you see the important things is like this first order, delta x to the first power. Delta x squared, that, when divided by delta x, gives us this, which is going to disappear. That's the point. This was the average over a short but still not instant range, distance. Now, what happens? Now dy/dx. So if this is short, short over short, this is darn short over darn short. That d is, well, it's too short to see. So I don't actually now try to separate a distance dy. This isn't a true division, because it's effectively 0/0. And you might say, well, 0/0, what's the meaning? Well, the meaning of 0/0, in this situation, is, I take the limit of this one, which does have a meaning, because those are true numbers. They're little numbers but they're numbers. And this was this, so now here's the big step, leaving algebra behind, going to calculus in order to get what's happening at a point. I let delta x go to 0. And what is that? So delta y over delta x is this. What is the dy/dx? So in the limit, ah, it's not hard. Here's the 2x. It's there. Here's the delta x. In the limit, it disappears. So the conclusion is that the derivative is 2x. So that's function two. That's function two here. That's the slope function. That's the speed function. Maybe I should draw it. Can I draw it above and then I'll put the board back up? So here's a picture of function 2, the derivative, or the slope, which I was calling s. So that's the s function, against x. x is still the thing that's varying, or it could be t, or it could be whatever letter we've got. And the answer was 2x for this function. So if I graph it, it starts at 0, and it climbs steadily with slope 2. So that's a graph of s of x. And for example-- yeah, so take a couple of points on that graph-- at x equals 0, the slope is 0. And we did that first. And we actually got it right. The slope is 0 at the start, at the bottom of the curve. At some other point on the curve, what's the slope here? Ha, yeah, tell me the slope there. At that point on the curve, an average slope was 3/1, but that was the slope of this, like, you know-- sometimes called a chord. That's over a big jump of 1. Then I did it over a small jump of delta x, and then I let delta x go to 0, so it was an instant infinitesimal jump. So the actual slope, the way to visualize it is that it's more like that. That's the line that's really giving the slope at that point. That's my best picture. It's not Rembrandt, but it's got it. And what is the slope at that point? Well, that's what our calculation was. It found the slope at that point. And at the particular point, x equals 1, the height was 2. The slope is 2. The actual tangent line is only-- is there. You see? It's up. Oh, wait a minute. Yeah, well, the slope is 2. I don't know. This goes up to 3. It's not Rembrandt, but the math is OK. So what have we done? We've taken the first small step and literally I could say small step, almost a play on words because that's the point, the step is so small-- to getting these great functions. Before I close this lecture, can I draw this pair, function 1 and function 2, and just see that the movement of the curves is what we would expect. So let me, just for one more good example, great example, actually, is let me draw. Here goes x. In fact, maybe I already drew in the first letter, lecture that bit out to 90 degrees. Only if we want a nice formula, we better call that pi over 2 radians. And here's a graph of sine x. This is y. This is the function 1, sine x. And what's function 2? What can we see about function 2? Again, x. We see a slope. This is not the same as x squared. This starts with a definite slope. And it turns out this will be one of the most important limits we'll find. We'll discover that the first little delta x, which goes up by sine of delta x, has a slope that gets closer and closer to 1. Good. Luckily, cosine does start at 1, so we're OK so far. Now the slope is dropping. And what's the slope at the top of the sine curve? It's a maximum. But we identify that by the fact that the slope is 0, because we know the thing is going to go down here and go somewhere else. The slope there is 0. The tangent line is horizontal. And that is that point. It passes through 0. The slope is dropping. So this is the slope curve. And the great thing is that it's the cosine of x. And what I'm doing now is not proving this fact. I'm not doing my delta x's. That's the job I have to do once, and it won't be today, but I only have to do it once. But today, I'm just saying it makes sense the slope is dropping. In that first part, I'm going up, so the slope is positive but the slope is dropping. And then, at this point, it hits 0. And that's this point. And then the slope turns negative. I'm falling. So the slope goes negative, and actually it follows the cosine. So I go along here to that point, and then I can continue on to this point where it bottoms out again and then starts up. So where is that on this curve? Well, I'd better draw a little further out. This bottom here would be the-- This is our pi/2. This is our pi, 180 degrees, everybody would say. So what's happening on that curve? The function is dropping, and actually it's dropping its fastest. It's dropping its fastest at that point, which is the slope is minus 1. And then the slope is still negative, but it's not so negative, and it comes back up to 0 at 3 pi/2 So this is the point, 3 pi/2. And this has come back to 0 at that point. And then it finishes the whole thing at 2 pi. This finishes up here back at 1 again. It's climbing. All right, climbing, dropping, faster, slower, maximum, minimum, those are the words that make derivatives important and useful to learn. And we've done, in detail, the first of our great list of functions. Thanks. FEMALE SPEAKER: This has been a production of MIT OpenCourseWare and Gilbert Strang. Funding for this video was provided by the Lord Foundation. To help OCW continue to provide free and open access to MIT courses, please make a donation at ocw.mit.edu/donate.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703557462.87/warc/CC-MAIN-20210124204052-20210124234052-00300.warc.gz
CC-MAIN-2021-04
17,894
57
http://serverfault.com/questions/559239/can-i-quickly-disable-access-point-radios-in-one-building-through-cisco-prime-in/559461
code
We are hosting a robotics competition and they require that all of our wireless AP's be disabled for the weekend. I am wondering if there is a way to do this from our management software. Added difficulty: on a per-building basis. So far, I have found that I can do it for an entire controller using the WiSM-2 web interface and disabling the network status of the radios. I can also do it via Prime Infrastructure using configuration templates. Unfortunately, both of these solutions affect ALL access points, nut just one building. Here's how to do it in Prime Infrastructure 2.0: 1.) Switch to classic theme 2.) Choose Configure -> Lightweight AP configuration templates 3.) Create a new template & edit it 4.) Under the AP Parameters tab check the box for Admin status and leave enabled un-checked 5.) Go the the Select APs tab and choose your APs 6.) Go to the apply/schedule tab and save it, then apply it.
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257827080.38/warc/CC-MAIN-20160723071027-00058-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
912
2
http://cryolist.464407.n3.nabble.com/PhD-position-in-remote-sensing-of-sea-ice-at-DLR-German-Aerospace-Center-Bremen-Germany-td4031448.html
code
PhD position in remote sensing of sea ice at DLR (German Aerospace Center), Bremen, Germany PhD Candidate Part Time (0,5 TVöD 13) In the framework of a DFG research project, the Remote Sensing Technology Institute, German Aerospace Center is looking for a motivated PhD candidate for a period of 3 years starting from January 2020. The position is funded by the DFG project “Understanding snow and sea ice properties at microwave frequencies for remote sensing applications during MOSAiC (MOSAiCmicrowaveRS)”. MOSAiCmicrowaveRS will develop new and improve current methods to derive sea ice properties from microwave observations, in particular ice type and lead distribution from SAR and snow properties and ice type from microwave radiometers. The project is part of the international consortium of the Multidisciplinary drifting Observatory for the Study of Arctic Climate (MOSAiC) and will provide an extensive opportunity of international collaborations. The PhD thesis will be supervised by Dr. Suman Singha (DLR) and Dr. Gunnar Spreen (Institute of Environmental Physics, University of Bremen). - Master’s degree in the field of computer science, physics, mathematics, electrical engineering or similar. - Very good Programming skill in Python and others such as IDL, C++ or similar. - Very good English language skills - Willingness to travel and research stays at collaborative institutes - Basic knowledge in Earth observation, ideally with synthetic aperture radar (SAR) - Knowledge in the field of artificial intelligence and machine learning. For further technical question please contact Suman Singha ([hidden email]) and Gunnar Spreen (gunnar.spreen@uni- bremen.de) The position is open until filled. The position will be posted soon under https://www.dlr.de/dlr/jobs/en/#Bremen/ However, in the meantime you are welcome to come back to us if there are any questions. Suman Singha and Gunnar Spreen Gunnar Spreen, Ph.D. University of Bremen - Institute of Environmental Physics Otto-Hahn-Allee 1, 28359 Bremen, Germany office: NW1 N3330 email: [hidden email] www.seaice.uni-bremen.de
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669225.56/warc/CC-MAIN-20191117165616-20191117193616-00127.warc.gz
CC-MAIN-2019-47
2,105
19
http://forums.rockbox.org/index.php/topic,43626.30.html?PHPSESSID=gfejh2ivs76nnmtf39h6246e61
code
@RufusA: on the black screen issue: does it only happen when booting or also sometimes when backlight is turning on and off? To date I've only encountered it when booting, never after unlocking, but have only been using the device in earnest for a week. For example this morning it took 6 attempts to boot before it successfully launched Rockbox (although this is unusual, normally 1 in 3 attempts fail). Most failures are a black screen after the creative logo has flashed on the screen for the 2nd time. When showing the black screen, the power led is lit green, but the menu and power slider are unresponsive and the only option is the reset button. The other failure is a white screen immediately after the loading firmware... executing message appears on the screen - again reset of player needed. I will post a RC bootloader in this thread tonight. If you report that the lcd still has issues, I will downgrade the X-Fi to unstable. I'll give this bootloader a try after posting. I'll also try and see if there is any pattern in the boot failures. Thanks again for all your assistance.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121869.65/warc/CC-MAIN-20170423031201-00346-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,091
8
https://verificationacademy.com/forums/uvm/ral-functional-coverage-implementation-registers
code
I would like to add coverage for RAL. I have converted my xls file to xml using IP-EACT and giving this xml file to iregGen script, I have generated RAL file. This does not have coverage for registers. Can someone help me on this, How can I add coverage to this and where do I need to sample that coverage. Will coverage be different for RO, RW, WO register fields?
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999800.5/warc/CC-MAIN-20190625051950-20190625073950-00325.warc.gz
CC-MAIN-2019-26
365
3
https://www.learnvern.com/machine-learning-course/practical-guide-to-association-rule-learning
code
Hello ! I am (name) from Learnvern .( 6 seconds pause ; music ) Welcome to the course of machine learning and this tutorial is the continuation of the previous session. So let us see ahead. And today we will watch association rule mining or we can say association rule learning. I have already prepared a data set here and you can see that this data set is of what type. So this data set is a transnational data set . I have made this dummy data set here so that it is easy to calculate it , or compute it. So here you can see that the dataset is equal to and one list has multiple lists. What this means is that the first customer bought all these things, then there's this second customer who bought all these things, the third customer bought this, means that customer to customer we are maintaining a record of which customer bought what, so this is that data set. Well, we have the data set and now let us move ahead and import our libraries. Import pandas as pd and then we will import. After this we will use a library called MLXTEND, ml-xtend. (read slow, typing) So this ml-xtend library will help us to encode and for data also it will help us and with the help of this I will explain you ahead like here customer bought milk but second customer did not buy so how we will represent that, we will have to bring full uniformity. This customer only bought one, two, three, four things, the customer above has bought six, six, seven, seven things so we have to bring one kind of uniformity. let us see how that will come, so mlxtend dot preprocessing import transaction encoder. (read slow, typing) Here we are using a transaction encoder. Ok, clear ! Now, let's make an object of the transaction encoder, TE is equal to transaction encoder. and now let us use TE underscore ARRY. In transaction encoder we will fit TE dot and what will we fit, we will fit our dataset and our dataset is list and let me put my dataset here, so I have put the data set here… let us see what happened to this te_arry so here we will after fitting it transform it here itself and this way you can do pipelining. Till now, I was showing you that if we fit differently and predict differently whereas fit and predict or multiple functions can be run one after another and that works,it really works. So transform and the data that is input is that of the dataset only, OK… TE array now you see that TE underscore ARRY, so this is our te-arry,fine. Now this te-arry I will make it into a dataframe, because it is not looking good in a list, right. here we will make it DF a dataframe , dataframe pd dot in capitals D A T A, Dataframe and in this dataframe we can put this te, TE underscore ARRY. . Now, you can see our df is ready and here we can see the df very nicely. Now, there is one thing more that when I was making it a dataframe then I did not take the column names here let me take the column names too ok, so that it becomes easy for us. So here columns equal to TE dot COLUMN.. te dot columns. So this way the dataframe that will be made, see now , so you can see that apples are false. So the first one didn't buy apples, didn't buy corn , didn’t buy Dill, bought eggs, didn’t buy ice cream, and bought kidney beans. So whatever is bought is shown as true and whatever is not bought is shown as false. So you can see that our data has been displayed in the form of true and false and at the sametime in all we have an equal number of columns and corresponding data we got. So this is the data frame we created. Now, you will see that from here we will import from ML xtend dot frequent underscore patterns ok, we will import frequent patterns, apriori . So here we have imported apriori. Now, in this apriori algorithm, we will pass this dataframe. So apriori and in this, we will pass DF, dataframe.. (read slowly, typing) and we will define it as minimum support and how much minimum support will be, it will be 0.6, 60 % of support will be there and you will see that with 60 % support , see this is with minimum 60% support , so items like item number 3, item number 5 , so these are no combinations , what we want is association means at least we want two, so like it can be this one, this one, this one , so from here to here there is a strong association among them 60%, 80% of support we can see , right. In this way , I will in the same way use this command and extend it to display with the name of columns so, use underscore col-names equals TRUE true, by this way you will even understand it in a better way. Now see, if you want to take out associations here, or tell associations then, you can tell eggs and kidney beans have 80% support , eggs and onion and all after that have 60% support. If you want to keep something together then keep eggs and kidney beans together , keep eggs and onions, keep kidney beans and milk because the person who is buying kidney beans is buying milk also and the one who is buying onions is buying kidney beans also. This is the evidence that we get here. In this way, we can use the apriori algorithm and this is very helpful in recommendations , so you can use it. You can choose some other data set and apply on that and let us know how you feel. Today’s session we stop here only and the parts ahead we will see in the next session , so keep learning and remain motivated. If you have any queries or comments, click the discussion button below the video and post there. This way, you will be able to connect to fellow learners and discuss the course. Also, Our Team will try to solve your query. good learning but the content titles are jumbled up, like first title of this module is decision tree dichotomiser which is practical part ahead of theory part. Same with the SVM practical 1 title has Isakki Alias Devi P yes, i am happy to learning for machine learning in LearnVern.it i s easily understanding for Beginners. Superb and amazing 😍🤩 enjoyable experience. Muhammad Nazam Maqbool Absolutely good course... will suggest it to everyone. has superb content that is covered in a fantastic way. super course and easily understanding and Good explaned Ruturaj Nivas Patil Very well explained in entire course. Great course for everyone as it takes from scratch to advance level.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510100.47/warc/CC-MAIN-20230925215547-20230926005547-00861.warc.gz
CC-MAIN-2023-40
6,247
63
https://support.plesk.com/hc/en-us/articles/213922625-Outgoing-emails-are-not-delivered-Connection-timed-out
code
- Plesk for Linux Outgoing email messages are not delivered. They are stuck in a mail queue which can be seen at Plesk > Tools & Settings > Mail Server settings > Mail Queue. - One of the following errors can be found in CONFIG_TEXT: May 1 11:46:02 user postfix/error: D1E58F0D2F6: to=<[email protected]>, relay=none, delay=564, delays=475/89/0/0, dsn=4.4.1, status=deferred (delivery temporarily suspended: connect to example.com[203.0.113.2]:25: Connection timed out)Or: CONFIG_TEXT: connect to example.com[Or: 203.0.113.2]:25: Connection timed out BF8DD84260: to=, relay=none, delay=90, delays=0.03/0/90/0, dsn=4.4.1, status=de CONFIG_TEXT: Aug 22 12:55:08 localhost postfix/error: 78C2E41C90D0: to=<[email protected]>, relay=none, delay=12908, delays=12907/0.06/0/0.01, dsn=4.4.1, status=deferred (delivery temporarily suspended: connect to example.com[203.0.113.2]:25: Connection refused) - Incoming emails arrive without any issues. - Testing connection on port 25 via telnet results in success: CONFIG_TEXT: # telnet example.com 25 Connected to example.com. Escape character is '^]'. 220 mx.example.com ESMTP e28si1653007plj.30 - gsmtp - The incorrect IP address is specified for outgoing mail mode at Plesk > Tools & Settings > Mail Server Settings. - Incorrect MX records are set for the server hostname. - A connection is refused by a firewall, other network device or remote mail server. - Log into Plesk. - Set a correct IP address (usually the main Plesk IP address) for an outgoing mail mode at Plesk > Tools & Settings > Mail Server Settings. - If the solution above does not help do the following: 3.2. Add the following value for smtp_bind_address parameter in the file CONFIG_TEXT: 203.0.113.100 - unix - n n - - smtp -o smtp_bind_address=203.0.113.100 -o smtp_bind_address6= -o smtp_address_preference=ipv4 And make sure smtp_bind_address parameter is not specified or commented out in # cat /etc/postfix/main.cf | grep smtp_bind_address For more information, see the article: How to configure the IP address for outgoing mail in Postfix. 3.3. Correct MX record(s) in DNS settings: records should point to the same IP that SMTP server is assigned to. 3.4. Ensure that server's firewall or intermediate firewall is not blocking a connection.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591837.34/warc/CC-MAIN-20180720213434-20180720233434-00174.warc.gz
CC-MAIN-2018-30
2,259
26
http://superuser.com/questions/623334/eclipse-support-for-multiple-editor-perspectives
code
Is there an Eclipse shortcut to switch between multiple text editor configurations? When using Eclipse, I typically have two editor tab configurations: - Side-by-side configuration. I keep the main class file on the left and the corresponding unit tests on the right. - Single-tab configuration. I view only one class file at a time in the editor. I use #1 when at work, when my larger monitor allows me to see 100-column files side-by-side without horizontally scrolling. I use #2 on my laptop when in transit (bus, plane, etc). My laptop is not wide enough to support side-by-side, so I only display one file at a time to avoid horizontally scrolling. What I would really like is a way to switch configurations quickly. I often leave work with tons of tabs open in my workspace, which is very difficult to read when I open it on my laptop. NOTE: Perspectives don't appear to solve this problem, since Editor configuration is constant across all perspectives.
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257831769.86/warc/CC-MAIN-20160723071031-00190-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
960
8
https://bugzilla.mozilla.org/show_bug.cgi?id=471487
code
mimeheader.properties is a localized list of header names, with no localization notes other than instructions to not localize the "CC" and "BCC" and "FCC" parts of strings where those occur. mime.properties is (among other things) a localized list of header names, with no localization notes (for those strings) other than instructions to not localize the "CC' and "BCC" and "FCC" parts of strings where those occur. That would just be the usual way we are, duplicating stuff without realizing it, except that both of those sets of header translations are accessed from a single spot, in nsMimeBaseEmitter::LocalizeHeaderName, which is both a liar and confused about what it is doing. Bug 157979 intended that what would happen is when LocalizeHeaderName(OrDont) is called, if mFormat is neither nsMimeMessageQuoting nor nsMimeMessageBodyQuoting, then it would localize the header name, by getting the id number from a map, then calling MimeGetStringByID to get a localized name from mime.properties. If, however, mFormat was a quote, or if MimeGetStringByID fails, it would use the name to look up a string in mimeheader.properties, "the other bundle (usually not translated)" and if that also failed, would return the default name that the caller passsed it. That was supposed to allow the Japanese localization to use Japanese names for headers while printing, without using them and confusing (or breaking? the bug is unclear about why the strings in forwards must not be localized) people when a Japanese user forwarded a message. It might have actually worked, at some point, but because that bug did absolutely nothing to ensure that the headers in mime.properties were not localized, but that the ones in mimeheader.properties were, we now have the situation where we have the same strings it two different files, in most cases localized in both, but for some unfathomable reason, maybe collective memory of the time before that bug landed, not translated in either file in either Japanese locale for either mail product. The solutions are all pretty straightforward: * If header names in forwards must really never be localized, move the file where we get them out of the locales, into mailnews content. (CVS actually still has unjarred unlocalized unused copies of both in mailnews/mime/resources/). * If header names in forwards really should always be localized, remove one of the two copies. * If header names in forwards should actually be localized in some cases, for some locales, and should not be localized in other cases, for other locales, then the two copies should have localization notes explaining which is which, why there are two, and how to decide what to do with each. Deciding which is the correct solution, though, isn't so straightforward. Do native Japanese (or Chinese, or Korean, or Farsi, or Hebrew, or Cyrillic) email programs translate header names in forwarded messages? Do other localized CJK or non-Latin email programs translate them? Do English-speaking recipients of such forwards say "omg, you broke my mail!"? Do native or localized non-CJK email programs in more-Latin languages translate header names in forwards? Ad 1, the ID crap in mailnews should die wherever we can kill it. It'd be nice to get a bit of testing for the following scenarios: Forwarding mails inline. Can we localize the headers in a inline-forwarded mail for display? If so, we shouldn't translate the headers. If not, one can still argue on which is more user friendly, translating or not. I'm slightly leaning towards translating, putting more weight on the scenario where Japanese folks forward mails to Japanese folks than to me. Forwarding mails as attachment. Same questions as above, but I assume that we can display localized header fields on reading a forwarded mail as an attachment. I'd be on the side of keeping the received mail intact as much as possible here. If we can't display the headers in the readers language, I'd consider that a bug. Printing mails. This is a slightly different scenario, IMHO, as printing a mail is most likely for one's own use, thus I'd recommend to print them as displayed, with localized header keys. Did I miss a scenario? CCing Bryan for some UE guidance. (In reply to comment #0) > Do native Japanese (or Chinese, or Korean, or Farsi, or Hebrew, or Cyrillic) > email programs translate header names in forwarded messages? Do other localized > CJK or non-Latin email programs translate them? Do English-speaking recipients > of such forwards say "omg, you broke my mail!"? Do native or localized non-CJK > email programs in more-Latin languages translate header names in forwards? I've tested few e-mail programs with Russian interface. MS Outlook 2003/2007, Outlook Express and GMail don't localize header names in forwarded messages, Opera Mail and Evolution localize header names in forwarded messages. I haven't received complaints from English-speaking recipients. (In reply to comment #2) > Opera Mail and Evolution localize header names in forwarded messages. I haven't > received complaints from English-speaking recipients. That's not really an argument pro/contra anything. Most people are email-illiterate anyways. :-P Strangely enough ;-), I'd agree with Axel's comment #1: - get rid of numeric ids - translate when printing or forwarding inline - do not translate when forwarding as attachment (or saving as .eml, which is basically the same case) (In reply to comment #3) > (In reply to comment #2) > > Opera Mail and Evolution localize header names in forwarded messages. I haven't > > received complaints from English-speaking recipients. > > That's not really an argument pro/contra anything. Most people are > email-illiterate anyways. :-P I haven't said that it was argument pro/contra, I just has answered Phil's question. > > Strangely enough ;-), I'd agree with Axel's comment #1: > - translate when printing or forwarding inline I agree that headers should be printed as translated, but I'm not sure that it's good idea to translate them in messages forwarded inline. I think as a general guide we should be using the users preferred language with our translations whenever we control the display. To me forwarded headers fall into this category of user content. I (as an english speaker) wouldn't expect to see headers in a forwarded mail in some other language so that makes me believe the same is true for non-english speakers. (in print or mail) (In reply to comment #5) > I think as a general guide we should be using the users preferred language > with our translations whenever we control the display. To me forwarded > headers fall into this category of user content. Just "forwarded" doesn't suffice as a distinction. In fact, we should even be more precise and (for forwarding) look at: - inline vs. attachment - all headers vs. some headers > I (as an english speaker) wouldn't expect to see headers in a forwarded mail > in some other language so that makes me believe the same is true for > non-english speakers. (in print or mail) I, as non-English speaker, wouldn't expect an attached(!) mail be altered in any way, thus expecting "raw" English headers in the attachment. If I then display this message not as mere text but as an _email_, I'd expect the headers names to be translated. Inline forwarding, otoh, is more a special kind of quote, so the expectation of no changes isn't that high. for the IDs I think you're refering to reference headers, they have been removed, see bug 464782 (In reply to comment #6) > Just "forwarded" doesn't suffice as a distinction. In fact, we should even be > more precise and (for forwarding) look at: > - inline vs. attachment > - all headers vs. some headers For inline forwards (reminder that this is the default now) I think it's fairly clear that we want to translate the headers included in the forward. For attached forwards I think you're right that many people wouldn't expect those to be altered or translated so we should leave them unchanged. I'm a bit unclear to which point this would actually be done. In the display of an attached message it would be possible to translate the headers properly, however we couldn't do that to a message we were sending as there is no inline content like there is with an inline forward. Unless I'm missing something. I'm a bit unsure how we distinguish all headers vs. some headers. I've been working off the assumption that "headers displayed" in an inline forward would be translated. These headers aren't actual message headers as much as they are derived or created from the message and inserted into the forwarding content. We can't translate actual message headers because a person would no longer be able to parse and view the message; I'm not sure what the purpose would be unless we are hoping people are viewing the message source. (In reply to comment #7) > For inline forwards (reminder that this is the default now) I think it's fairly > clear that we want to translate the headers included in the forward. Can you please explain why you think that translating the headers included in the forward is good idea? Headers in forwarded messages are information intended for recipient of message and we have no idea if recipient can understand language of localized headers. As for example, if user of Chinese Thunderbird would forward me letter, I'd got it with headers localized in Chinese (which I don't speak). I can only make guess that it's probably headers. Idea of localized headers works good only in case if both sender and recipient speaks same language. When forwarding a mail inline, you can actually edit the mail contents in TB. Thus, when reading a inline-forwarded mail, the user agent can't really translate the headers on the fly. When forwarding as attachment, the reader can surely do that, as the attachment conforms with the RFC (or at least should). So, in the case of a forward as attachment, we can rely on the UA rendering the forwarded mail optimally for the language settings of the recipient, which we can't do for forwards inline. At least that's my assumption, and reading this bug, is a general assumption. I wonder if that assumption really strongly holds. Anyway, if we cannot have the UA of the recipient render the headers in the preferred language of the recipient, then we have to make an educated guess, and IMHO, assuming that the sender and the recipient speak the same preferred language sounds more valid than the assumption that the recipient speaks English. But that is really a compromise, which is why I CCed Bryan in the first place. The global UE of forwarding inline makes me wonder if that's really a good default internationally. Bryan, is there a bug with a rationale for doing that? If you forward a message inline, it's actually "just" a mail. I don't know of *any* UA who tries to distinguish between "normal" mail content and inline-forwarded mail content. (In reply to comment #9) > Anyway, if we cannot have the UA of the recipient render the headers in the > preferred language of the recipient, then we have to make an educated guess, > and IMHO, assuming that the sender and the recipient speak the same preferred > language sounds more valid than the assumption that the recipient speaks > English. The assumption is not "recipient speaks English", but "recipient knows the technical header names" (which, by mere coincidence, happen to be plain English words)... FWIW, there is some discussion on localization of headers in reply/forward mails in Bug 107884 > The global UE of forwarding inline makes me wonder if that's really a good > default internationally. I highly doubt anyone is very confused by this, especially if it's english. (People are so used to it.) The rationale for forward inline was that everybody else does it - and "as attachment" *is* confusing to a lot of people, because the usage is small. Sorry, I should have known better than to ask so vaguely. There are five different cases, only one of which I meant. When we send a forward as attachment, as people have noted, we send the complete original email, which is the right thing to do. When we receive a forward inline, we display whatever it was that we got, which is the right thing to do. When we receive a forward as attachment, and you're viewing attachments inline, we create a header block displayed inline, with the Subject/From/Date/To headers from the original email translated, which is probably the right thing to do, but could be impacted by this bug (if, say for exaggeration, we decided to remove every trace of localized strings). When we send an inline forward while you are in View - Headers - All mode, we include all the headers inline, untranslated, which is almost certainly the right thing to do (you generally only forward all headers when you're doing it for forensic purposes, in which case the recipient wants the actual header names, not a translation), and although that's not great UI, that not-greatness is not this bug. When we send an inline forward while you are in View - Headers - Normal mode, which is the one thing I wanted to ask about, we include just the Subject/Date/From/To headers (go us, a different order than the received attachment, and both are different than Thunderbird's current envelope order), and whether or not those are translated depends on the decision that the localizers have made about a bunch of strings in mime.properties, strings which do not have any localization notes, but which Netscape's i18n engineers thought (with no apparent reason for thinking so) would not be translated, because as Frank Tang said at the time, "For forward inline, if we translate it, we will have problem." Of course, nobody ever bothered to say *what* that problem would be, whether it was the fear that English-speaking correspondents of Japanese speakers would have a client incapable of rendering Japanese, or incapable of handling the charset we would send, or we would have problems shifting an ISO-8859-15 email into something that we could manage to include the Japanese header names in, or perhaps it was just the social problem that a ne-NP speaker forwarding an email to an English speaker doesn't want to baffle him with a header block saying विषय: [Bug 471487] Try to straighten out situation with मिति: Tue, 30 Dec 2008 11:25:26 -0800 बाट: firstname.lastname@example.org लाई: email@example.com (Which I would probably find normal if I spoke Nepali, pretty cool if I had a Nepali-speaking friend who was forwarding something in English to me, and a problem that needed to be fixed if I had a Nepali-speaking employee forwarding me English email about our business-conducted-in-English with Nepali header labels.) But as you can see from <http://mxr.mozilla.org/l10n-central/search?string=1000.*%3D®exp=on&find=%2Fmime.properties> in pretty much every case (for finished locales) *except* Japanese, we are already using translated header names for forwarding inline, as far as I know without reported problems. The Japanese case is odd since despite that being the language for which we switched to getting headers from different files for printing and forwarding inline so they could be localized for printing, right now none of ja, ja-JP-mac or ja/suite/ have either set localized. I guess the most reasonable conclusion from that is that we should have a single set of header name strings, used for sending forwards inline, printing, and receiving forwards as attachments, without localization notes so it's entirely left up to the localizers to decide, and either file a bug on ja to say it's okay to translate them, or leave them alone to make their own decision. Two alternate conclusions are that we should have two sets even if only one language chooses to have them different, and should file a bug on ja to say which one it's okay to translate and should have l10n notes explaining which is which, or, that we should have two sets even if every current locale chooses to have them the same in both cases, though I don't much like the premature unoptimization of the latter. (And yeah, I *know* the numeric keys are evil, I *know*. I have two separate patches removing something like 16 of them that are unused, and I can't be changing keys until I get rid of those.) (In reply to comment #13) > But as you can see from > <http://mxr.mozilla.org/l10n-central/search?string=1000.*%3D®exp=on&find=%2Fmime.properties> > in pretty much every case (for finished locales) *except* Japanese, we are > already using translated header names for forwarding inline, as far as I know > without reported problems. The Japanese case is odd since despite that being > the language for which we switched to getting headers from different files for > printing and forwarding inline so they could be localized for printing, right > now none of ja, ja-JP-mac or ja/suite/ have either set localized. There is comment from Japanese localizers in Bug 70842 comment #8 regarding non-localization for some of these strings. > it's > entirely left up to the localizers to decide, and either file a bug on ja to > say it's okay to translate them, or leave them alone to make their own > decision. Should we also take in account "other mail clients behavior" factor? Realistically, having this unassigned would be more accurate, just in case someone with a miraculously workable plan comes along. Assignee: philringnalda → nobody You need to log in before you can comment on or make changes to this bug.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202530.49/warc/CC-MAIN-20190321172751-20190321194751-00170.warc.gz
CC-MAIN-2019-13
17,514
18
https://angel.co/squaretrade
code
Investor in @Infospace, @StubHub, @Serious Materials, @Evite, @Seagate, @Spinner, @LiveBid. @SquareTrade @Angel List, @Splunk, @Automattic @Volaris @Appvance SVP International @LivingSocial; Founder @Eve.com VC at @Bain Capital Ventures, investing in early and growth stage SaaS companies in marketing tech and other enterprise applications. Belgian VC & private equity investor; over 30 investments in past 18 years; social entreprise, retail, e-commerce The best sales and biz dev platform a B2B startup could ask for. Building Technical teams Entrepreneur at Skout and The Taploid as well as former Vice President of Innovation at Alcatel-Lucent. I've acquired companies & launched successful products. Founder @Bonusly • Worked at @InternMatch, @SquareTrade • Studied at @Hampshire SVP Engineering at Gilt.com. Founder at Bonus.ly
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999671637/warc/CC-MAIN-20140305060751-00085-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
838
10
https://sourceforge.net/p/gumstix/mailman/attachment/7b506d4e1002051652j76c9b97foab79f3e980080d84@mail.gmail.com/1/
code
Once you've created the pipe, you can use fdopen to then create a file and attach it to that one of each of the pipes. For example, you can attach the file cfileinput to fd and cfileoutput to fd. Then, if you open the cfileinput file from php and write to it, and everything you write to the file will be sent to your c program. You can also open the cfileoutput in php and read output from the c program. Hope this helps. RAD Software Systemsjohn@radsoftwaresys.com We're RAD Software Systems, a software development and engineering firm that specializes in Rapid Application Development. Our team of software engineers uses state of the art agile methods, ensuring our clients deliver on time and on budget. On my Gumstix Overo I am trying to create a Webpage as the GUI for a C program continuously running on it. So far I have the Cherokee Webserver installed along with PHP. I've verified that I can put a php file into the website directory and it can be interpreted with the html results displayed on the browser. Now I have to find some way to communicate between the webpage and a C program. As a simple test I just want a button on the website that says "GO" and clicking on that will tell a C program to do something (change GPIO pin state, take an image with a UVC camera, etc). After that I'll add functionality like being able to read from temperature sensors, etc. The C program needs to run continuously without regard to whether the someone is at the website. The website is just to modify its behavior. What's the easiest way to communicate via webpage and a C program? Pipes? Using a file? Should I even being using PHP to do this or some other scripting language?
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173761.96/warc/CC-MAIN-20170219104613-00299-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
1,683
12
https://cmc.deusto.eus/actuator-design-for-parabolic-distributed-parameter-systems-with-the-moment-method/
code
Privat Y., Trélat E., Zuazua E. Actuator design for parabolic distributed parameter systems with the moment method SIAM J CONTROL OPTIM. Vol. 55, No. 2 (2017), pp. 1128–1152. DOI: 10.1137/16M1058418 Abstract: In this paper, we model and solve the problem of designing in an optimal way actuators for parabolic partial differential equations settled on a bounded open connected subset Ω of IR n. We optimize not only the location but also the shape of actuators, by finding what is the optimal distribution of actuators in Ω, over all possible such distributions of a given measure. Using the moment method, we formulate a spectral optimal design problem, which consists of maximizing a criterion corresponding to an average over random initial data of the largest L 2-energy of controllers. Since we choose the moment method to control the PDE, our study mainly covers one-dimensional parabolic operators, but we also provide several examples in higher dimensions. We consider two types of controllers: either internal controls, modeled by characteristic functions, or lumped controls, that are tensorized functions in time and space. Under appropriate spectral assumptions, we prove existence and uniqueness of an optimal actuator distribution, and we provide a simple computation procedure. Numerical simulations illustrate our results.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474700.89/warc/CC-MAIN-20240228080245-20240228110245-00139.warc.gz
CC-MAIN-2024-10
1,343
2
https://www.leetfree.com/problems/water-and-jug-problem
code
You are given two jugs with capacities x and y litres. There is an infinite amount of water supply available. You need to determine whether it is possible to measure exactly z litres using these two jugs. If z liters of water is measurable, you must have z liters of water contained within one or both buckets by the end. Example 1: (From the famous "Die Hard" example) Input: x = 3, y = 5, z = 4 Output: True Input: x = 2, y = 6, z = 5 Output: False Special thanks to @vinod23 for adding this problem and creating all test cases.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358570.48/warc/CC-MAIN-20211128164634-20211128194634-00392.warc.gz
CC-MAIN-2021-49
530
6
https://forum.openwrt.org/t/openvpn-or-sshtunnel/137762
code
As new to networking I hope for some overall advice. Have an LTE router which is running openwrt. It is to be placed in a well and connected to a plc. The data that is to be transmitted is very limited, like less than a kb maybe once a day. I want to connect to the router and read the data. Should I use openvpn or sshtunnel, or just portforwarding. The data is not that secret, its about waterflow, if a pump is active etc. The connecting PC will always be the same but have dynamic IP and so does the LTE router in the well. PC is running Win 10 and wmware Kubuntu too. The need for NOIP I know, but will prefer not to use VPN account - both for payment and for learning networking. Many cellular data providers do not assign a true public IPv4 address to the subscriber devices... hopefully yours does (or will if you ask/pay), or with any luck they give you an IPv6 address that is properly routable. Assuming you have a way to reach the router over the internet, a local VPN endpoint is great. I'd recommend Wireguard instead of OpenVPN because it is easier to configure. WG is also higher performance, but that's not relevant in your situation. But either solution will work. If you do not have a public IP on your LTE router, you could go the other way and have it initiate the connection (periodically or continuously) to the network of your connecting PC. You'll just need to setup VPN endpoints on the respective routers (or on the connecting PC). It is an Teltonika LTE router with a modified version of openwrt. Using cli it is surely based on Linux. Their OS is offering the ad-ons, like wireguard. On the pc, which is win 10, there is installed Kubuntu on wmware. So I can choose to do it in Windows, which I am used to, or in Linux, which I try to learn. As I understand your advice, it is best to do it in the operating system I am most comfortable with. In OpenVPN it seems like there are 2 ways of doing it, watching tutorials on Youtube, one is with a proces that involves keygeneration and one that seems much simpler but only needs a pasword. Do you have advice on this - if the more involving way is necessary or just stick to the easy way? Again, thanks for advice - it means a great difference.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499826.71/warc/CC-MAIN-20230130165437-20230130195437-00274.warc.gz
CC-MAIN-2023-06
2,219
12
https://auricsystems.com/case-studies/backgroundcredit-checks
code
A firm specializing in background and credit checks maintains multiple pieces of Personally Identifiable Information (PII), including social security numbers, credit card account numbers, birthdates, maiden names, etc. Remove PII data stored on the firm’s servers with only minor changes to their legacy application. The firm was already PCI compliant and wanted to reduce the amount of sensitive data stored locally. The firm modified their legacy application to use the AuricVault® service to tokenize and detokenize specific data fields. This change allowed the client to maintain their existing legacy system while reducing the amount of PCI and PII data stored on their servers. - All Personally Identifiable Information (PII) is tokenized: social security numbers, credit card account numbers, birthdates, maiden names, etc. - The sensitive information is tokenized during data entry using Browser-Side Tokenization that securely tokenizes the sensitive information in the browser. - The sensitive information is retrieved in the browser using Browser-Side Detokenization. - All Personally Identifiable Information was removed from the firm’s servers. - Tokenization required only minor changes to the firm’s legacy application. - Agents collect Personally Identifiable Information (PII) on a web page that submits that information to the Web Application. - The Web Application sends the individual pieces of PII to the AuricVault® service, and - receives back tokens. - When the data needs to be reviewed, the Web Application sends the token to the AuricVault® service, and - receives back the original PII data; - which is then displayed for another agent. - Reduced PCI footprint (local storage). - Better adherence to many PII (privacy) laws in regards to data storage. - Data Separation
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104244535.68/warc/CC-MAIN-20220703134535-20220703164535-00716.warc.gz
CC-MAIN-2022-27
1,806
17
https://www.rascasone.com/en/services/react-js-development
code
Rascasone team helped us analyze the goal and requirements for our internal HRMS web system. During the agile development, we were able to launch several versions of the product, including the Android mobile app. Rascasone helped us with Ruby on Rails web development of the survailence web application. Our app has complex map, images and messaging features and Rascasone team did a great work with all of it. I approched Rascasone team to help us design and implement a system for IoT devices management. Rascasone was able to quickly react on the changing requirements and finish the whole product to the final and functional version. Rascasone is part of the Pinstriped project almost from its beginning. They always try to come up with new ideas for development and they push the product so it can bring the biggest value to the customers. Rascasone team together with designer Jan Wolinger created a website exactly according to my requirements. I imagined modern and fresh web design attractive to my clients, mostly the owners of the luxury cars.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588246.79/warc/CC-MAIN-20211028003812-20211028033812-00126.warc.gz
CC-MAIN-2021-43
1,054
5
https://docs.github.com/ru/repositories/configuring-branches-and-merges-in-your-repository/managing-rulesets/available-rules-for-rulesets
code
You can create branch or tag rulesets to control how users can interact with selected branches and tags in a repository. You can also create push rulesets to block pushes to a private or internal repository and that repository's entire fork network. When you create a ruleset, you can allow certain users to bypass the rules in the ruleset. This can be users with certain roles, specific teams, or GitHub Apps. For push rulesets, bypass permissions apply to a repository and the repository's entire fork network. This means that the only users who can bypass this ruleset for any repository in this repository's entire fork network are the users who can bypass this ruleset in the root repository. For more information on creating rulesets and bypass permissions, see "Creating rulesets for a repository." If selected, only users with bypass permissions can create branches or tags whose name matches the pattern you specify. If selected, only users with bypass permissions can push to branches or tags whose name matches the pattern you specify. If selected, only users with bypass permissions can delete branches or tags whose name matches the pattern you specify. This rule is selected by default. Enforcing a linear commit history prevents collaborators from pushing merge commits to the targeted branches or tags. This means that any pull requests merged into the branch or tag must use a squash merge or a rebase merge. A strictly linear commit history can help teams revert changes more easily. For more information about merge methods, see "About pull request merges." Before you can require a linear commit history, your repository must allow squash merging or rebase merging. For more information, see "Configuring pull request merges." You can require that changes are successfully deployed to specific environments before a branch can be merged. For example, you can use this rule to ensure that changes are successfully deployed to a staging environment before the changes merge to your default branch. When you enable required commit signing on a branch, contributors and bots can only push commits that have been signed and verified to the branch. For more information, see "About commit signature verification." Branch protection rules and rulesets behave differently when you create a branch: with rulesets, we check only the commits that aren't accessible from other branches, whereas with branch protection rules, we do not verify signed commits unless you restrict pushes that create matching branches. With both, when you update a branch, we still check all the commits in the specified range, even if a commit is reachable from other branches. With both methods, we use the verified_signature? to confirm if a commit has a valid signature. If not, the update is not accepted. - If you have enabled vigilant mode in your account settings, which indicates that your commits will always be signed, any commits that GitHub identifies as "Partially verified" are permitted on branches that require signed commits. For more information about vigilant mode, see "Displaying verification statuses for all of your commits." - If a collaborator pushes an unsigned commit to a branch that requires commit signatures, the collaborator will need to rebase the commit to include a verified signature, then force push the rewritten commit to the branch. You can always push local commits to the branch if the commits are signed and verified. You can also merge signed and verified commits into the branch using a pull request on GitHub. However, you cannot squash and merge a pull request into the branch on GitHub unless you are the author of the pull request. You can squash and merge pull requests locally. For more information, see "Checking out pull requests locally." For more information about merge methods, see "About merge methods on GitHub." You can require that all changes to the target branch be associated with a pull request. The pull request doesn't necessarily have to be approved, but it must be opened. If you select Dismiss stale pull request approvals when new commits are pushed and/or Require approval of the most recent reviewable push, manually creating the merge commit for a pull request and pushing it directly to a protected branch will fail, unless the contents of the merge exactly match the merge generated by GitHub for the pull request. In addition, with these settings, approving reviews will be dismissed as stale if the merge base introduces new changes after the review was submitted. The merge base is the commit that is the last common ancestor between the topic branch and the base branch. If the merge base changes, the pull request cannot be merged until someone approves the work again. Repository administrators or custom roles with the "edit repository rules" permission can require that all pull requests receive a specific number of approving reviews before someone merges the pull request into a protected branch. You can require approving reviews from people with write permissions in the repository or from a designated code owner. If you enable required reviews, collaborators can only push changes to a branch via a pull request that is approved by the required number of reviewers with write permissions. If someone chooses the Request changes option in a review, then that person must approve the pull request before the pull request can be merged. If a reviewer who requests changes on a pull request isn't available, anyone with write permissions for the repository can dismiss the blocking review. Even after all required reviewers have approved a pull request, collaborators cannot merge the pull request if there are other open pull requests that have a head branch pointing to the same commit with pending or rejected reviews. Someone with write permissions must approve or dismiss the blocking review on the other pull requests first. Optionally, you can choose to dismiss stale pull request approvals when commits are pushed that affect the diff in the pull request. GitHub records the state of the diff at the point when a pull request is approved. This state represents the set of changes that the reviewer approved. If the diff changes from this state (for example, because a contributor pushes new changes to the pull request branch or clicks Update branch, or because a related pull request is merged into the target branch), the approving review is dismissed as stale, and the pull request cannot be merged until someone approves the work again. For information about the target branch branch, see "About pull requests." Optionally, you can choose to require reviews from code owners. If you do, any pull request that modifies content with a code owner must be approved by that code owner before the pull request can be merged into the protected branch. Note that if code has multiple owners, an approval from any of the code owners will be sufficient to meet this requirement. For more information, see "About code owners." Optionally, you can require an approval from someone other than the last person to push to a branch before a pull request can be merged. This means at least one other authorized reviewer has approved any changes. For example, the "last reviewer" can check that the latest set of changes incorporates feedback from other reviews, and does not add new, unreviewed content. For complex pull requests that require many reviews, requiring an approval from someone other than the last person to push can be a compromise that avoids the need to dismiss all stale reviews: with this option, "stale" reviews are not dismissed, and the pull request remains approved as long as someone other than the person who made the most recent changes approves it. Users who have already reviewed a pull request can reapprove after the most recent push to meet this requirement. If you are concerned about pull requests being "hijacked" (where unapproved content is added to approved pull requests), it is safer to dismiss stale reviews. Optionally, you can require all comments on the pull request to be resolved before it can be merged to a branch. This ensures that all comments are addressed or acknowledged before merge. Required status checks ensure that all required CI tests are passing before collaborators can make changes to a branch or tag targeted by your ruleset. Required status checks can be checks or statuses. For more information, see "About status checks." You can use the commit status API to allow external services to mark commits with an appropriate status. For more information, see "REST API endpoints for commit statuses." After enabling required status checks, all required status checks must pass before collaborators can merge changes into the branch or tag. Any person or integration with write permissions to a repository can set the state of any status check in the repository, but in some cases you may only want to accept a status check from a specific GitHub App. When you add a required status check rule, you can select an app as the expected source of status updates. The app must be installed in the repository with the statuses:write permission, must have recently submitted a check run, and must be associated with a pre-existing required status check in the ruleset. If the status is set by any other person or integration, merging won't be allowed. If you select "any source", you can still manually verify the author of each status, listed in the merge box. You can think of required status checks as being either "loose" or "strict." The type of required status check you choose determines whether your branch is required to be up to date with the base branch before merging. |Type of required status check |The Require branches to be up to date before merging checkbox is checked. |The topic branch must be up to date with the base branch before merging. |This is the default behavior for required status checks. More builds may be required, as you'll need to bring the head branch up to date after other collaborators update the target branch. |The Require branches to be up to date before merging checkbox is not checked. |The branch does not have to be up to date with the base branch before merging. |You'll have fewer required builds, as you won't need to bring the head branch up to date after other collaborators merge pull requests. Status checks may fail after you merge your branch if there are incompatible changes with the base branch. |The Require status checks to pass before merging checkbox is not checked. |The branch has no merge restrictions. |If required status checks aren't enabled, collaborators can merge the branch at any time, regardless of whether it is up to date with the base branch. This increases the possibility of incompatible changes. For troubleshooting information, see "Troubleshooting required status checks." You can prevent users from force pushing to the targeted branches or tags. This rule is enabled by default. If someone force pushes to a branch or tag, commits that other collaborators have based their work on may be removed from the history of the branch or tag. This may lead to merge conflicts or corrupted pull requests. Force pushing can also be used to delete branches or point a branch to commits that were not approved in a pull request. Enabling force pushes will not override any other rules. For example, if a branch requires a linear commit history, you cannot force push merge commits to that branch. Prevent commits that include changes in specified file paths from being pushed to the repository. You can use fnmatch syntax for this. For example, a restriction targeting test/demo/**/* prevents any pushes to files or folders in the test/demo/ directory. A restriction targeting test/docs/pushrules.md prevents pushes specifically to the pushrules.md file in the test/docs/ directory. For more information, see "Creating rulesets for a repository." Prevent commits that include file paths that exceed a specified character limit from being pushed to the repository. Prevent commits that include files with specified file extensions from being pushed to the repository. Prevent commits that exceed a specified file size limit from being pushed to the repository.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818468.34/warc/CC-MAIN-20240423064231-20240423094231-00443.warc.gz
CC-MAIN-2024-18
12,252
61
https://video.ias.edu/csdm/2018/0122OlaSvensson
code
We show that the perfect matching problem in general graphs is in Quasi-NC. That is, we give a deterministic parallel algorithm which runs in polylogarithmic time on quasi-polynomially many processors. The result is obtained by a derandomization of the Isolation Lemma for perfect matchings, which was introduced in the classic paper by Mulmuley, Vazirani and Vazirani to obtain a Randomized NC algorithm. Our proof extends the framework of Fenner, Gurjar and Thierauf, who proved the analogous result in the special case of bipartite graphs. Compared to that setting, several new ingredients are needed due to the significantly more complex structure of perfect matchings in general graphs. In particular, our proof heavily relies on the laminar structure of the faces of the perfect matching polytope. This is joint work with Jakub Tarnawski.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735867.23/warc/CC-MAIN-20200804073038-20200804103038-00299.warc.gz
CC-MAIN-2020-34
844
3
https://quan.hoabinh.vn/category/linux/?page=1
code
Recently, my company website wants to host media files (user uploaded files) to some cloud storage service. But in preparation, we realized that our media folder is too big, about 48GiB. We need to delete unnecessary files to save the storage cost. Part of it, we need to hunt down big files. I looked around to find a command to list largest files in Linux. Most of the tutorials on Internet tell you to use a combination of commands, which is often du | sort | head, or find | sort | head. None of them satisfies me, because: duonly gives result of directories, not files.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510481.79/warc/CC-MAIN-20230929022639-20230929052639-00801.warc.gz
CC-MAIN-2023-40
574
5
https://zapier.com/apps/code/integrations/cognito-forms
code
Code + Cognito Forms Integrations In a matter of minutes and without a single line of code, Zapier allows you to connect Code by Zapier and Cognito Forms, with as many as 14 possible integrations. Are you ready to find your productivity superpowers? It's easy to connect Code by Zapier + Cognito Forms and requires absolutely zero coding experience—the only limit is your own imagination. Use Python to kick off a workflow. You must return an array of objects. This is an advanced trigger! Uses Python 3.7 Run Python in response to data from trigger. This is an advanced action! Uses Python 3.7. Triggers when a refund is issued. Creates a new entry. Triggers when someone updates an entry. Sets the availability of a form. Triggers when an order is created. Get started for free—14 day trial of premium features and apps. No coding required—automate any of 1,500+ apps in minutes. Enterprise-level security—connect mission-critical apps.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258003.30/warc/CC-MAIN-20190525104725-20190525130725-00455.warc.gz
CC-MAIN-2019-22
946
13
https://paul1207604.wordpress.com/2015/02/18/working-on-a-game/
code
In august 2014 I joined a team who I had met within the facebook group “Indie game developers” I showed them pieces of my work which they all agreed i was talented enough for the project. I took the role which involved Tileset Artist/Static Objects. I worked closely with the team by communicating on Facebook and Skype with each team member discussing our work flow. During the time of the project I learnt alot of knowledge on team work, tile sets and sprite animations. Link to game blog – http://timelines-chaostheory.blogspot.de/
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590069.15/warc/CC-MAIN-20180718060927-20180718080927-00240.warc.gz
CC-MAIN-2018-30
540
3
https://reference.wolfram.com/language/ref/SimpleGraphQ.html
code
yields True if the graph g is a simple graph and False otherwise. Examplesopen allclose all SimpleGraphQ works with undirected graphs: SimpleGraphQ works with large graphs: Properties & Relations (8) A graph with self-loops is not simple: A simple graph can have a cycle: A simple graph can be bipartite: A PathGraph is always simple: The adjacency matrix of a simple graph has zeros on the diagonal: The incidence matrix of a simple graph has entries -1, 0, or 1: All vertices of a simple graph have maximum degree less than the number of vertices: A nontrivial simple graph must have at least one pair of vertices with the same degree: Possible Issues (2) A simple graph can have two edges between the same vertices but with opposite direction: SimpleGraphQ gives False for non-explicit graphs: Wolfram Research (2010), SimpleGraphQ, Wolfram Language function, https://reference.wolfram.com/language/ref/SimpleGraphQ.html. Wolfram Language. 2010. "SimpleGraphQ." Wolfram Language & System Documentation Center. Wolfram Research. https://reference.wolfram.com/language/ref/SimpleGraphQ.html. Wolfram Language. (2010). SimpleGraphQ. Wolfram Language & System Documentation Center. Retrieved from https://reference.wolfram.com/language/ref/SimpleGraphQ.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948632.20/warc/CC-MAIN-20230327123514-20230327153514-00372.warc.gz
CC-MAIN-2023-14
1,256
19
https://feedback.photoshop.com/photoshop_family/topics/lightroom-print-contact-sheets-of-recognised-faces
code
It doesn't seem this is going to happen anytime soon! So I wrote a python script to read all .xmp files in a directory, and output a batch file that uses ImageMagick to crop the face regions found from the images and place the result (as a jpg) in a subdirectory 'faces' of the original directory. I can just import these 'faces' subdirectories back into Lightroom and use the print module to print them as I wish. Although there are some minor traps (eg working out how to convert between LR coordinates and IM coordinates, handling rotations( I doubt I do but minor rotations are OK), etc it was a relatively trivial exercise and I can't see why Adobe can't provide such a feature. In fact it would seem to be trivial to add a "Export Faces" checkbox in the Export dialog.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247494125.62/warc/CC-MAIN-20190220003821-20190220025821-00066.warc.gz
CC-MAIN-2019-09
774
2
http://press.defendyourfriend.com/sheet.php?p=defend_your_friend
code
Based in Breda, The Netherlands 2017 Precise date TBA Defend Your Friend is a truly co-operative puzzle game. Both players are not just important, but vital - each with a unique role to fulfill. Through working together, combining their abilities and having each other's back players make their way through carefully crafted puzzles inside an imposing ancient temple. Getting to understand the inner workings of the temple, and hopefully venture off to freedom. With its accessible controls it is easy to pick up for new players, and is perfect for introducing people to gaming! Defend Your Friend started as the second project in our second year of studying at the NHTV. It was intended to just be a quarter-year project, but due to the amount of positive feedback, as well as interest from Sony and our own motivation to keep working on the game - we continued. - Something you can use to introduce a non-experienced friend or family member to gaming - Local co-op to experience working together and high-fiving intensely - Online co-op to ensure you can play with friends you can't always meet with - Full controller support - Challenging and interesting puzzles to solve - A high concentration of lasers - A strange and beautiful temple to explore - The ability to defend your friend! Pre-alpha trailer YouTube Logo & Icon There are currently no logos or icons available for defend your friend. Check back later for more or contact us for specific requests! Awards & Recognition - "Indievelopment 'Best game of show 2016' award" As we were showcasing our game at indievelopment we ended up winning the main prize! - "NHTV's 'Best gameplay design' award second years 2016" We received the award for best gameplay design twice for both semesters this year, among our fellow second year games - "Defend Your friend is the type of strategy puzzle game that will either strengthen your bonds of friendship, or make you flip your table over and throw your buddy out the window." - Nick, Oneangrygamer, www.Oneangrygamer.net - "(...) een van de winnaars van het Indievelopment Award: Defend Your Friend." - Kokswijk, www.365gaming.nl, www.Oneangrygamer.net Request Press Copy We are afraid this developer has not upgraded their presskit() to use distribute(). For security purposes, this form has been disabled. By Mythili Mahendran soundcloud.com. We're Frenemies, creating games to enjoy together - as friends or as enemies! Currently developing Defend Your Friend, a truly co-operative puzzle game for two players. More information on Frenemies, our logo & relevant media are available here. defend your friend Credits design lead / generalist designer / generalist Ruben van de Velde Mark van de Luijtgaarden
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203093.63/warc/CC-MAIN-20190323221914-20190324003914-00461.warc.gz
CC-MAIN-2019-13
2,709
32
https://apache.googlesource.com/fluo-muchos/+/3c5d48958b27a6d38226aba286f1fb275aceac90/CONTRIBUTING.md
code
If you believe that you have found a bug, please search for an existing issue to see if it has already been reported. For simple changes, its ok to just submit a pull request without an issue. Muchos has unit tests. To run them, first install required packages: pip install -r ./lib/requirements.txt The following command runs the unit tests: nose2 -v -B If you are modifying any of the Python code in this project, please use Black to enforce that Python code found under the lib folder is formatted correctly. Before submitting a PR, please ensure that you have used Black to format the code with max line length set to 79 as below (it is to be run from the repo root): black lib --line-length 79 The CI for this project runs tools to detect common coding issues with Python and Ansible files. Rather than wait for the CI to flag any issues with your work, please run the cibuild script on your dev machine, which in turn runs the following tools: Please ensure that you address issues flagged by the above CI build script before creating a PR.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655247.75/warc/CC-MAIN-20230609032325-20230609062325-00652.warc.gz
CC-MAIN-2023-23
1,046
9
https://xenforo.com/community/threads/my-resources.27146/
code
I would like to see a sub-menu called "My Resources". This lists out all the resources I have downloaded making it easy for me to find all the things I have downloaded/installed. But here is the twist. This can get rather useless if you're downloading, testing and then uninstalling a lot of resources. So, perhaps having an option where someone can remove a resource from their "My Resource" list.
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687837.85/warc/CC-MAIN-20170921191047-20170921211047-00314.warc.gz
CC-MAIN-2017-39
398
1
https://www.capitalcountertopsaustintx.com/
code
Capital of Texas Stoneworks is a countertop contractor in Austin, TX. We service areas within a 100-mile radius. If you are in need of new counters for your kitchen or bathroom in Austin, TX we are the team for the job. We provide quality results at value prices. Each of our contractors has over 11 years of experience in stone fabrication in Austin, TX. We are dedicated to the complete satisfaction of our customers. We work hard to make sure that you love the results we produce for you.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512395.23/warc/CC-MAIN-20181019103957-20181019125457-00021.warc.gz
CC-MAIN-2018-43
491
1
https://practicaldev-herokuapp-com.global.ssl.fastly.net/this-is-angular/episode-2345-angular-17-50oe
code
Angular 17 is out! We can group the features into the new ApplicationBuilder, Signals, Template Syntax and the @defer command. The ApplicationBuilder powers ng build or ng serve. Under the hood, it doesn't webpack anymore. Instead, it runs on esbuild, a tool written in Go that runs significantly faster. The ApplicationBuilder also includes SSR. In the past, we had to use @nguniversal. Now, SSR is a first-class citizen of Angular. If you migrate, you have to enable the new builder manually. Compared to Angular 16, there were three major changes. First, there is no mutate method anymore. Second, in 16, the Signal fired on every update method call, even if you didn't change the object reference. In 17, it checks against the object reference. Third, is the local Change Detection. That means the change detection could run on a specific component in the component tree. To make this happen, the change can only be Signal (not a click or synchronous function), and the components have to set their strategy to OnPush. The "Star Feature" is definitely the new template syntax for if, for, switch and - brand-new - the defer. The defer command in the template creates a lazy-loaded chunk for its inner components. We don't have to do anything else. "Just use it!" For more information, please read the official blog article and watch the official videos, and you will also find plenty of community content. There's no shortage of it.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474676.26/warc/CC-MAIN-20240227121318-20240227151318-00193.warc.gz
CC-MAIN-2024-10
1,436
11
https://hackaday.com/2016/04/11/colorful-fan-and-led-controller-for-3d-printer/
code
[Dave] just couldn’t take the ambient noise from his Lulzbot Mini anymore, so he built a fancy fan controller for it. He measured some points on the printer’s Rambo controller board to see what actually got hot during a print. The hottest components were the motor drivers, so he taped a thermistor to them. He also placed one in the printer’s power supply. He replaced the main fan with a low noise model from Noctua (which have the most insanely fancy packaging you could imagine for a computer fan). The software on an Arduino Nano now idles the fan at an inaudible 650RPM, if an unacceptable temperature increase is detected, it increases the fan speed for a period, keeping everything nice and quietly cool. The graphics display was added because, “why not?” A classic reason. The graphics runs on a hacked version of Adafruit’s library. It took him quite a while to get the graphics coded, but they add that extra bit of high-tech flair to keep the cool factor of the 3d printer up before they become as ubiquitous as toasters in the home. The code, fritzing board layout, 3D models, and a full build log is available at his site.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817144.49/warc/CC-MAIN-20240417044411-20240417074411-00349.warc.gz
CC-MAIN-2024-18
1,148
3
https://mailman.amsat.org/hyperkitty/list/amsat-bb@amsat.org/thread/AZ4G7BAWHMA6KTKDFYCAVDJCMUN4GEQU/?sort=date
code
The article on the FUNcube satellite has now appeared in the printed publication Electronics Weekly (Jan. 25-31). For details of how to download a PDF of the article see 73 Trevor M5AKA Show replies by thread Add to favorites Remove from favorites
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475701.61/warc/CC-MAIN-20240301193300-20240301223300-00496.warc.gz
CC-MAIN-2024-10
247
6
https://public.cyber.mil/dcwf-ksat/58/
code
Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins. Core KSAT for the following Work Roles Responsible for the cybersecurity of a program, organization, system, or enclave. Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST 800-37). Additional KSAT for the following Work Roles Senior official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation (CNSSI 4009). Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats. Selects/Deploys/Maintains the set of Continuous Integration/Continuous Deployment (CI/CD) tools and processes used by the development team and/or maintains the deployed software product and ensures observability and security across the lifecycle. Responsible for analysis and development of systems/software security through the product lifecycle to include integration, testing, operations and maintenance.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474671.63/warc/CC-MAIN-20240227053544-20240227083544-00030.warc.gz
CC-MAIN-2024-10
1,470
9
http://www.cl-user.net/asp/M2k3/sdataQImyRxnGcR9HDQjr-br2QIIk8yBX8yBX8oQ5/sdataQu3F$sSHnB==
code
You are here: RootGo directly to another tag The root tag for all programming languages. Assembly (2 items) Basic (2 items) C (9 items) C++ (10 items) C# (0 items) Common Lisp (118 items) Erlang (7 items) Fortran (1 items) Java (16 items) Octave (1 items) Perl (2 items) Prolog (5 items) Python (10 items) Scheme (6 items) TeX (2 items) Other Lisp dialects (6 items) MOP Feature Tests | Closer to MOP | KMgen | CLPython | grand-prix | computed-class | pygen - Python-style generators library | parse-number | lisp-cgi-utils | Jnil | trivial-ldap | Postmodern | Exscribe | Read-time packages | Abstract classes | bmud | cl-wdim | Python Generators in Common Lisp using Arnesi's CP... | List comprehensions, after Python | JACOL - Java and Common Lisp | sequence-search/replace | Common Lisp User Space File System | cl-json | cl-perec | z80 | Span/NLI | MCPat | CL-BibTeX | CL-HTTP | Lexicon | CL-Graph | Cusp, a Lisp plugin for Eclipse | asdf-ecs | Lisplets | AspectL View all (76 more)... CLoX: Common Lisp Objects for XEmacs | CLOS Efficiency: Instantiation -- On the Behavior ... | PCLOS Reference Manual | Revisiting the Visitor: the "Just Do It" Pattern. | Kent Pitman's Publications | Berkeley SICP Lectures | Introduction à la programmation en Common Lisp (Fr... | Default values for get &c | Lisp as an Alternative to Java | The Idiot's Guide to Common Lisp Packages | A simple metaobject protocol for packages | CDR 3: Revisiting CONCATENATE-SEQUENCE | CLOS in Context: The Shape of the Design Space | Wiki list of websites powered by Lisp | Client-side continuations for web programming | Software Bits | SWCLOS: A Semantic Web Processor on Common Lisp Ob... | The Idiot's Guide to Special Variables and Lexical... | Paradigms of Artificial Intelligence Programming | Knee-jerk Anti-LOOPism and other E-mail Phenomena View all (26 more)... Jean-Philippe Paradis(Added)| Armed Bear Common Lisp(Annotated)| cl-portaudio(Added)| Common Lisp User Space File System(Added)| cl-btree(Added)| CL-RCFiles(Modified)| Common Lisp Quick Reference(Modified)| CLERIC(Modified)| NST(Added)| Markus Flambard(Added)| :o( Smilisp :-)(Added)| CLoX: Common Lisp Objects for XEmacs(Added)| Jason Cornez(Modified)| evol(Added)| Postmodern(Modified)| ParenScript(Modified)| Sheeple(Modified)| Consequor Consulting AG(Added)| Attila Lendvai(Modified)| CL-Graph(Modified)| Snarf(Added) View all last modified items... (Notes are similar to comments but for adding precisions or facts) You must be logged to add a note You must be logged to add a comment
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00256-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
2,540
27
http://www.filewatcher.com/d/Debian/kfreebsd-i386/games/hannah_1.0-2_kfreebsd-i386.deb.35754.html
code
pacman-like game, child oriented Help Hannah's Horse is like a cross between Pacman and the Dizzy game "Fastfood". The objective is to move Hannah to collect the pills around the maze while avoiding the ghosts. Moving around the maze there are also carrots which Hannah must also collect in order to complete the level. Help Hannah's Horse - Version 0.2.b (c) 2007 Steve Branley Released under the GPL Version 2. Please read gpl.txt for details. will install the data in /usr/local/games/hhh and the binary in /usr/local/bin For more details please see INSTALL This is my first even vaguely complete game. It's not even *that* complete hannah - Help Hannah's Horse, pacman-like game This manual page documents briefly the hannah command, for the Help Hannah's Horse game. Help Hannah's Horse is a cross between Pacman and the Dizzy game "Fastfood". The objective is to hannah (1.0-2) unstable; urgency=low * Corrected some lintian warnings: + Fixed a typo in the package description. + Added a description to the fix_score_dir patch. + Removed deprecated "Encoding" field from hannah.desktop * Updated Standards-Version to 3.8.0 + Added README.source pointing to dpatch's README.source.gz -- Margarita Manterola <email@example.com> Wed, 27 Aug 20 # DONE! Implement powerpills # DONE! Implement collision detection for ghosts # DONE! (ish)Better gr This package was debianized by Margarita Manterola <firstname.lastname@example.org> on Sat, 13 Jan 2007 11:48:52 - Browse inside hannah_1.0-2_kfreebsd-i386.deb Results 1 - 1 of 1Search over 15 billion files © 1997-2017 FileWatcher.com
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865913.52/warc/CC-MAIN-20180524033910-20180524053910-00350.warc.gz
CC-MAIN-2018-22
1,583
32
https://www.experts-exchange.com/questions/21847091/Asterix-on-required-fields.html
code
Im hoping this is super easy. I have some webforms (asp.net) which contain some required fields. I check these with the following tag (example) <asp:RequiredFieldValidator id="valRequired" runat="server" Display="Static" ControlToValidate="proposer_surname" ErrorMessage="Please Enter your Surname" >*</asp:RequiredFieldValidator> Which is all great - and displays a lovely red asterix(*) when the fierld is blank. However, I would like to mark these fields with a non-red asterix before the form is validated - to indicate they are required fields, and have the asterix turn red on validation failure. I had assumed this is what the Display="static" property would do - but i now see this just reservrs space for the control (i had it set to dynamic previously). So my question is there a simple way of doing this - or do i have to manualy code an asterix to appear on first load and disappear on post backs?
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864461.53/warc/CC-MAIN-20180521161639-20180521181639-00286.warc.gz
CC-MAIN-2018-22
909
7
http://news.slashdot.org/submission/3355033/your-tax-dollars-at-work-tsa-confiscating-aluminum-foil?sdsrc=rel
code
Well, who wudda thunk it? I mean, without the TSA none of us would ever have noticed when a terrorist unpacked a bomb and stuck it up against the window of the plane so it could get sufficient energy to go off." Link to Original Source Slashdot is powered by your submissions, so send in your scoop "No job too big; no fee too big!" -- Dr. Peter Venkman, "Ghost-busters"
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802775083.81/warc/CC-MAIN-20141217075255-00166-ip-10-231-17-201.ec2.internal.warc.gz
CC-MAIN-2014-52
370
4
https://gpuopen.com/manuals/adlx/adlx-page__a_d_l_x_terminate__fn/
code
A pointer to the function to terminate ADLX. typedef ADLX_RESULT (ADLX_CDECL_CALL *ADLXTerminate_Fn)() If the function is successfully executed, ADLX_OK is returned. If the function is not successfully executed, an error code is returned. Refer to ADLX_RESULT for success codes and error codes. The pointer of the function is returned by the adlx_get_proc_address using the ADLX_TERMINATE_FUNCTION_NAME as the function name.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654012.67/warc/CC-MAIN-20230607175304-20230607205304-00414.warc.gz
CC-MAIN-2023-23
424
6
https://www.pmview.com/help/pmview/folder_list_menu.html
code
The Folder List is the white area on the left side of PMView's File Open Window and File Save Window. To bring up the Folder List object popup menu, right-click on any of the folder objects in the Folder List. Folder List popup menu commands: · New Folder This will create a new folder in the selected folder. · Delete This will delete the selected directory and all its subfolders. · Rename This will let you rename the selected folder. · Slideshow This will build a slideshow of all files in the selected folder. · View This determines how folders are displayed in the Folder List. · Refresh This will refresh the view of the folders in the Folder List.
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540488620.24/warc/CC-MAIN-20191206122529-20191206150529-00344.warc.gz
CC-MAIN-2019-51
661
8
https://docs.microsoft.com/en-us/archive/blogs/privatecloud/arm-concepts-in-azure-stack-for-the-wap-administrator-offers-plans-and-subscriptions-2
code
ARM concepts in Azure Stack for the WAP Administrator — Offers, Plans, and Subscriptions Hello Readers! This blog is part 3 of the series "ARM concepts in Azure Stack for the WAP Administrator." In this post we'll discuss how the plans, subscriptions, and add-ons concepts you are familiar with in Windows Azure Pack (WAP) map to the brand-new Microsoft Azure Stack Technical Preview 1. Note Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. I'm including the table of contents for this series of post so that you'll find it easier to navigate across the series: Table of contents - Introductory post, and some first information on the Azure Stack POC architecture and ARM's role - Cloud Service Delivery - Plans, offers, and subscriptions—this post - Resource deployment methods using the portal, Visual Studio, APIs, or CLI - Packaging and publishing templates on Azure Stack - Multi-tier applications with ARM - In-guest configuration with ARM, and technologies such as Virtual Machines Extensions, including PowerShell Desired State Configuration (DSC) - Troubleshooting IaaS deployments in Azure Stack We will update the post with links to the new posts, as we publish them. With no more delay, let's get started! Plans, Subscriptions, and Add-ons in WAP A service administrator in Windows Azure Pack (WAP) makes cloud services available to tenants via a plan. A plan defines two major items: - The service or services offered to the tenant (for example, virtual machines, SQL databases or websites). - Quotas for the services offered (for example, create up to 5 virtual machines, or deploy up to 5 SQL databases). A plan can have one or more add-ons, which are optional services offered to tenants. Tenants can choose to include add-ons in their subscription, or not. An add-on can increase the quota of existing services in the plan, but it cannot provide any additional services not available in the plan. Tenants consume the cloud services defined in the plan via a subscription. The tenant can subscribe to a plan and add-ons if the plan is public, or the service administrator can create subscriptions for tenants when the plan is private. Each subscription is associated with only one plan, but a tenant can subscribe to one or more plans. Let's assume that a WAP service administrator wants to offer three new IaaS plans to tenants: Bronze, Silver, and Gold. The difference between the plans is the quotas assigned to them. In this example, the Bronze plan has a quota of 3 VMs, Silver has a quota of 15 VMs, and the Gold plan has a quota of 50 VMs. The administrator will also create a "Platinum" add-on that increases the plan quotas by 25 VMs, and also gives access to both Windows and Linux VM roles. When a tenant subscribes to one of the plans they will have the option to choose the Platinum add-on. To create the plans and add-on, the service administrator needs to do the following: - Create a new plan and add the Virtual Machine Clouds service. - Configure the Virtual Machine Clouds service by indicating the VMM server, the virtual machine cloud, and the quotas for the plan. - Steps 1 and 2 are repeated as many times as necessary; in our example, the administrator will need to create and configure three plans. - Create one or more add-ons to increase quotas or offer premium items and link them to the plan. The picture below shows the three plans in WAP: The same procedure would apply if the WAP service administrator would like to offer other cloud services, such as websites, just making sure that the additional cloud services are selected in step 1 above and also that service and quotas are properly configured. To subscribe to the Bronze plan, the tenant just needs to select it from the Add Subscription wizard in the WAP tenant portal as described in the screenshot below: Once subscribed, the tenant will have access to the cloud services defined and configured in the plan. In this example, the tenant will have access to the Virtual Machine Clouds service in the WAP tenant portal, and the tenant can acquire add-ons published by the service administrator as shown in the example below: After the subscription is created, the tenant can provision cloud resources via the WAP portal: Now that we have looked at how plans and subscriptions work in WAP, let's take a look at how that compares to Azure Stack. Offers, Plans, Subscriptions, and Add-on Plans in Azure Stack Microsoft Azure Stack provides great flexibility for service administrators to provide cloud services to tenants. In Azure Stack, service administrators make cloud services available to tenants via an offer. An offer is defined as one or more base plans, and optionally, one or more add-on plans. Plans in Azure Stack can function as a base plan or as an add-on plan. A base plan in Azure Stack is basically the same as the quotas you get with a plan in WAP (quotas in base plans are included by default when a tenant subscribes to the offer). Add-on plans in Azure Stack are similar to add-ons in WAP, with the key difference that add-on plans in Azure Stack can be used as a base plan or as an add-on plan. Tenants consume the cloud services defined in the offer via a subscription. Tenants can subscribe to multiple offers, but please note that each subscription applies to only one offer. The relationship of plans to an offer is depicted in the picture below. The add-on plans are shown with dashed lines to indicate that they're optional. An Azure Stack plan defines the services being made available to tenants, the region where the tenants will use those services, and the quotas for the services. In other words: - A plan can consist of one or more services - The service can be available in one or more regions - Quotas must be defined for each service per region Let's describe this in a picture: In the picture above we can see the different components; let's review them in detail: Services represent the cloud services to be offered to the tenant, such as compute, storage, or network. Region is the Azure Stack location from which tenants can consume cloud services. This is the same concept we have in Microsoft Azure, where a region could be West Europe or East US, but in Azure Stack they could be Zurich, Paris, or Chicago, for example. Note In the single-node Azure Stack Technical Preview 1 POC there's only one region: local. Quotas define the limits of resources that a tenant can provision or consume. For example, a quota may allow a tenant to create up to five VMs. Quotas can be set to unlimited. Note Only the Storage Resource Provider (SRP) quotas are enforced in Azure Stack Technical Preview 1. For a quick reference, the picture below depicts an offer created in Azure Stack (in this example, the Building Clouds Offer) by a service administrator, which includes a couple of base plans and one add-one plan. And the picture below depicts a tenant subscription to the offer above, and that the tenant has included the add-on plan: That's it! From here tenants can start deploying cloud resources in their Azure Stack subscriptions in the same was as they would do it in their public Azure subscription! Microsoft Azure Stack provide a flexible model for service administrators to offer cloud services to tenants. In particular, plans as implemented in Azure Stack allow service administrators to expose services to tenants in a very flexible and granular way. The list below describes a few of the many possibilities: - Create an offer with a single plan and in this plan all the services (compute, network, storage) are defined across all regions with unlimited quotas. - Create an offer with multiple plans. Each plan defines a service (for example, one plan for compute, one for network, and one for storage) in all regions, with standard quotas. Then include an add-on plan to lift the quotas to unlimited. - Create an offer with multiple plans. Each plan defines the services available per region (if you've three regions you define three plans). Then the quotas for the services are defined depending on the capabilities on each region. - And many more! I hope these examples are enough to give you an idea of the tremendous flexibility built into Azure Stack. In future blog posts my colleagues and I will be exploring some of the many options available to you. We would love to hear your feedback on this topic. How are you planning to build your offers and plans in your Azure Stack environment?
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585916.29/warc/CC-MAIN-20211024081003-20211024111003-00529.warc.gz
CC-MAIN-2021-43
8,619
58
https://cyware.com/daily-threat-briefing/cyware-daily-threat-intelligence-september-22-2022-ae24/
code
Digital skimming is a major cybersecurity threat faced by e-commerce websites lately. Recently, hundreds of e-commerce domains were found infected with Google Tag Manager-based web skimmers. Researchers uncovered thousands of payment records that cybercriminals extracted through this technique. Furthermore, BlackCat ransomware developers continue to improve and enrich the malware with new features. They have enhanced its data-stealing capability by adding a new malware to the tool kit - Eamfo. Separately, an unidentified hacker targeted 39,000 unauthenticated Redis servers and attempted to set up cryptominers. Also, a Python module vulnerability is back in the spotlight after over a decade-and-a-half, affecting over 350,000 open-source repositories. Top Breaches Reported in Last 24 Hours FBI reveals details on Albania cyberattack The FBI and the CISA, in a joint advisory, disclosed that one of the Iranian threat groups hid inside the Albanian government network for approximately 14 months. In July, the gang carried out a damaging cyberattack that brought down many websites and services. The hackers consistently accessed the network and exfiltrated email content containing credentials for over a year by leveraging a compromised Microsoft Exchange account. Angry developer leaks LockBit builder online The LockBit ransomware builder for its latest encryptor has been leaked, allegedly by a disgruntled developer on Twitter. The latest version, LockBit Black (version 3.0), was released in June after a couple of months of testing. The novel version added anti-analysis features, extortion methods, and a ransomware bug bounty program. The leaked builder can be used by other hackers to launch their own operations, including encryptors, decryptors, and specialized tools for launching decryptors. Top Malware Reported in Last 24 Hours E-commerce platforms corrupted with GTM-based skimmers Researchers at Recorded Future discovered 569 e-commerce domains infected with skimmers. Of those, 314 were using Google Tag Manager (GTM) based skimmers, and data from the remaining 255 were exfiltrated to domains abusing GTM containers. Researchers found over 165,000 payment card details for sale on dark web shops, exfiltrated from GTM-infected domains. The top five domains targeted were those of companies in the U.S., followed by Canada, the U.K, Argentina, and India. BlackCat’s tool receives a boost has received an upgrade to its data exfiltration tool: Exmatter. The tool was in use since November 2021 and received a major update in August. Some of the features include limiting the types of files to exfiltrate, adding FTP as an exfiltration option, eraser feature, and a self-destruct configuration option. In another update, the group has added new Eamfo malware that can harvest credentials from Veeam backups. Top Vulnerabilities Reported in the Last 24 Hours Hackers target Atlassian servers reported that hackers are exploiting a patched critical security flaw affecting Atlassian Confluence Server to deploy cryptominers. The security hole, tagged as CVE-2022-26134, if successfully exploited, could lead to a complete domain takeover and the deployment of information stealers, RATs, and ransomware. The exploitation method entails running a shell script resembling those employed by attackers in previous attacks reported by Lacework, Microsoft, and Akamai in June. Redis servers found exposed online A hacker attempted to install a cryptominer on over 39,000 unverified Redis servers exposed online, thus, putting over 300GB worth of data at risk. The exploitation technique includes tricking the servers into writing data to a directory containing SSH keys. With 15,526 out of 31,239 servers believed to have the SSH key set, the attack was attempted on over 49% of unauthenticated Redis servers. The top five countries with exposed Redis services include China (20,011), the U.S. (5,108), Germany (1,724), Singapore (1,236), and India (876). Python bug unpatched since 2007 A Python module bug identified as CVE-2007-4559 remained unfixed for 15 years and likely affects over 350,000 open-source repositories. First revealed in 2007, the path traversal bug resides in Python’s tarfile module and can lead to arbitrary code execution. A researcher from Trellix has outlined steps to exploit the flaw in the Windows version of Spyder IDE. This bug hasn't been exploited so far, says the report.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499758.83/warc/CC-MAIN-20230129180008-20230129210008-00275.warc.gz
CC-MAIN-2023-06
4,429
23
https://espressoman.club/winter-coffee-jazz-smooth-saxophone-jazz-relaxing-jazz-music-for-winter-mood/
code
Winter Coffee JAZZ – Smooth Saxophone Jazz – Relaxing Jazz Music For Winter Mood ► Listen to the playlist on Spotify: https://open.spotify.com/artist/4ld8mEMYOCRy4XZdkJb2Cz Apple Music: https://music.apple.com/us/artist/relax-music-channel/1539885001 Sign Up With the Relax Music Family! https://www.youtube.com/c/RelaxMusicRecords/join ✔ Channel memberships permit you to join our network and also obtain Members-Only Perks like Badges, Emoji, early access to New Videos, and also Even Access to All Relax Music Library (Access to All Constantly Updated Music consisted of in the Relax Music Channel video clips)! All tracks (each tune independently) will be available in a Members-Only Music Playlist. ❤ Become Relax Music network participant! PLEASE ► SUBSCRIBE! ► https://goo.gl/NmmRWe ► NEW Music ► https://www.youtube.com/c/relaxmusicrecords/videos Follow Relax Music all over: ► Instagram https://www.instagram.com/relaxmusicjazz ► Facebook https://www.facebook.com/RelaxMusicRecords ► Twitter https://twitter.com/RelaxMusicJazz ► SoundCloud https://soundcloud.com/relaxmusicrecords Our Jazz Instrumental Music can be used for relaxing, tranquility, enchanting dinner, work, cooking, and relaxation. This relaxing Jazz songs is best fit for research, work, cooking, like dinner music, history songs, romantic songs, relaxation songs, or songs for anxiety relief. Let the attractive, soothing, and also inspiring songs assistance you to unwind! Make sure to examine out the network ► https://goo.gl/NmmRWe for a lot more Jazz, Bossa Nova, Morning Music, as well as a lot more. New Videos ► https://goo.gl/E0ByFC A lot more Jazz ► https://goo.gl/i9ZK64 Extra Bossa Nova ► https://goo.gl/bzHgvJ ☕ About Relax Music channel: We are making Jazz Music and Beautiful Bossa Nova Music for leisure, for job, for research, etc All music in this video clip and on this channel is initial songs by us. All tracks are executed by our artists. All music is produced by our authors. All videos on this channel are original videos by us. We create all video clips. ☕ Relax Music network is a component of Relax Music Records Label. Channels created by Relax Music Records: ▼ Relax Music network ▼ Lounge Music network ▼ Happy Music channel ▼ Vinyl Jazz Music network “Relax Music Records” supplies and produces music to the world. For organization inquiries and licensing of our music contact us by means of the get in touch with kind on the web site. Official Website: https://relaxmusicrecords.com/ © All rights reserved. ℗ Music is Copyrighted by Relax Music Records. © Video is Copyrighted by Relax Music Records. Any type of reproduction or republication of all or component of this video/audio is forbidden. ► SUBSCRIBE ► https://goo.gl/NmmRWe ► AWESOME MUSIC COLLECTION! ► https://www.youtube.com/c/relaxmusicrecords/videos Listen to Relax Music Everywhere ► https://fanlink.to/relax-music #relaxmusic #winterjazz #saxophonemusic #jazz #jazzradio #backgroundmusic
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363418.83/warc/CC-MAIN-20211207201422-20211207231422-00172.warc.gz
CC-MAIN-2021-49
3,025
42
https://miroconsulting.com/blog/how-microsoft-enterprise-agreements-affect-sql-upgrades/
code
Microsoft offers a trade-in program for the SQL server 2012 licenses. Before considering this, it’s important to understand that “qualifying” licenses as Microsoft defines them are those that were covered by Software Assurance when SQL Server 2012 was released. Therefore, under and active Enterprise Agreement, these licenses would have been considered qualified because Software Assurance is inherent under an Enterprise Agreement. There are multiple factors to consider relative to this trade-in program and we can’t possibly cover all in one blog so, we’ll draw upon the SQL server Enterprise Edition 2008R2 as an example, which is licensed in the Per Processor metric. With Software Assurance being renewed on these licenses, the customer would be eligible to convert to the Per Core metric of SQL Server 2012 for the equivalent number of cores. The numbers of those per core licenses is determined using one of the following calculations: (A) The actual number of processors multiplied by the actual number of cores per processor; or (B) The number of processors multiplied by four, whichever of A and B is greater; or (C) The number of Per Processor licenses that were assigned to the server multiplied by four – this is referred to as license “stacking”. Option C speaks to when we have allocated more licenses to the server than Microsoft would consider as “standard” for the edition of SQL Server. The reality is that the conversion can be a very, very complex situation and Microsoft’s calculations are and can be difficult to verify. It’s truly important to work through it very carefully and perhaps even with the assistance of a licensing expert. Take note of the term “being renewed”. The trade-in takes effect at the renewal of Software Assurance. So that means re-upping, re-enlisting for another term of Software Assurance, which makes this trade-in something less than free. This is not a scenario that never ends. The qualification of licenses ends on April 1, 2015. If you have an enterprise agreement that is being renewed in the months ahead, you’ll want to start preparing soon.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817398.21/warc/CC-MAIN-20240419110125-20240419140125-00513.warc.gz
CC-MAIN-2024-18
2,132
8
https://www.zdnet.com/article/rsa-update/
code
The Expo floor opened this evening at RSA 2006. The traffic through most booths seemed light but the real function of RSA seems to be for security people to meet and greet and network. That was in evidence everywhere. There will be some interesting announcements this week. Imagine a security platform with 60GB throughput. Or a drop- in solution to let anyone offer a managed security service for as little as $100K a year. Of course Bill Gates has his keynote tomorrow morning so expect some "we will fix the security problem" announcement.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487582767.0/warc/CC-MAIN-20210612103920-20210612133920-00048.warc.gz
CC-MAIN-2021-25
542
2
https://www.ncleg.gov/EnactedLegislation/Statutes/HTML/BySection/Chapter_143B/GS_143B-135.144.html
code
§ 143B-135.144. Declaration of purpose. The purpose of this Part is to implement the policy as set out in G.S. 143B-135.142 by instituting a North Carolina natural and scenic rivers system, and by prescribing methods for inclusion of components to the system from time to time. (1971, c. 1167, s. 2; 2015-241, ss. 14.30(f), (m).)
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347391923.3/warc/CC-MAIN-20200526222359-20200527012359-00518.warc.gz
CC-MAIN-2020-24
330
2
https://resumecat.com/resume-examples/coldfusion-developer
code
Writing a great coldfusion developer resume is important because it is one of the first things a potential employer will see when they are considering you for a position. It is your opportunity to make a good first impression and sell yourself as the best candidate for the job. If you're looking for inspiration when it comes to drafting your own coldfusion developer resume, look no further than the samples below. These resumes will help you highlight your experience and qualifications in the most effective way possible, giving you the best chance of landing the coldfusion developer job you're after. firstname.lastname@example.org | (259) 310-3243 | Oklahoma City, OK Senior Coldfusion Developer at Adobe Systems, OKApr 2022 - Present Coldfusion Developer at CFWebstore, OKAug 2021 - Mar 2022 Bachelor of Science in Computer Science at The University of Oklahoma, Norman, OKAug 2017 - May 2021 I've learned how to design and implement software solutions to problems, how to use various programming languages to write software, how to use different software development tools and techniques, and how to effectively communicate with others about complex technical topics. email@example.com | (317) 472-8825 | Jackson, WY Senior Coldfusion Developer at Cheyenne Software Solutions, WYApr 2022 - Present Coldfusion Developer at Laramie Software Solutions, WYSep 2021 - Mar 2022 Bachelor of Science in Computer Science at University of WyomingSep 2017 - May 2021 Some skills I've learned are critical thinking, problem solving, and programming.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00430.warc.gz
CC-MAIN-2022-33
1,546
12
https://2018.cytodata.org/
code
We were honored to host the third CytoData Symposium and hackathon from Sep 21-25, 2018 at the Broad Institute, Cambridge, MA, USA! CytoData brings together the community of researchers mining microscopy image data. We recently formed the CytoData Society (CytoDS) to build and maintain an active community around image-based profiling of biological phenotypes induced by genetic, chemical or other perturbations of biological systems. CytoData 2018 will be great venue to connect with this community, exchange ideas, and learn from experts in the field. Attendees will join together for a one-day symposium with seminars, lectures and social events followed by a two-day hackathon. We aspire to gather a diverse and engaged group of both image-based profiling experts, and members of related fields. Everyone involved will be an active contributor (even if remote), no passive absorption of others’ ideas allowed! We assume participants will be willing to share their analysis strategies, given that each laboratory’s “competitive advantage” in this field does not come from their data pre-processing pipeline but rather from computational techniques downstream of the steps covered in the event, and from biological discoveries derived from their unique data. Fri Sep 21 Full day Symposium Hear from leading researchers in the field from industry and academia. Mon Sep 24 CytoData Hackathon - Day 1 Get oriented, and starting working on the first stage of the challenge. Tue Sep 25 CytoData Hackathon - Day 2 Refine models using second stage of the challenge, then evaluate on held out set. Winners will be announced based on the held out set. 8:00 - 9:00 9:00 - 9:30 Fighting disease with image-based profiling. Anne Carpenter, Broad Institute. 9:30 - 10:00 New 3D Analysis Tools for High-Content Screening, Alexander Schreiner, Perkin Elmer. 10:00 - 10:30 A Next Generation Connectivity Map: L1000 Platform and the First 1,000,000 Profiles, Todd Golub, Broad Institute. 10:30 - 11:00 11:00 - 11:30 Leveraging multiple data sources to prioritize drug combinations using Machine Learning formalisms, Arvind Rao, University of Michigan. 11:30 - 12:00 Manifold learning yields insight into complex high throughput biological data, Smita Krishnaswamy, Yale University. 12:00 - 1:00 1:00 - 1:30 Deep Learning in Action: Automating HCS analysis with Deep Multiple Instance Learning, Sam Cooper, PhenomicAI. 1:30 - 2:00 Conditional Generative Models For Explaining Cell Variation, Greg Johnson, Allen Institute. 2:00 - 2:30 Batch Equalization, Mike Ando, Google AI. 2:30 - 3:00 Deep learning representations of cellular disease and rescue, Berton Earnshaw Recursion. 3:00 - 3:30 3:30 - 4:00 Large-scale CRISPR screens: getting past viability, John Doench, Broad Institute. 4:00 - 4:30 Learning from high content images of tool compounds, Jeremy Jenkins, Novartis Institutes for BioMedical Research. 4:30 - 4:45 Adam Arany, KU Leuven. 4:45 - 5:00 Rebecca Hughes, Univ. of Edinburgh. 5:00 - 5:15 Florian Heigwer, DKFZ. 5:15 - 5:30 Steven Vermeulen, MERLN-cBITE. 5:30 - 5:45 6:00 - 9:00 CytoData Post-Symposium appetizer hour at Meadhall 8:30 - 9:00 9:00 - 10:00 Understand the challenge, datasets, and the metric. 10:00 - 11:00 11:00 - 17:00 12:00 - 13:00 Lunch will be served Head out for dinner – details to follow. 8:30 - 9:00 9:00 - 10:00 Familiarize yourselves with the new dataset 10:00 - 16:00 12:00 - 13:00 Lunch will be served 16:00 - 16:30 16:30 - 17:15 Team presentations and winner announcement During the challenge: Sep 24 and 25, 2018 The challenge will start with a description of the problem and a presentation of the datasets available for research. A summary of methodologies proposed before the challenge will be presented too. Teams will be formed after preliminary discussions and Q&A sessions. The data and other resources will be released when the teams are organized to start hacking. Amazon Web Services virtual machines available for participants to run experiments. Also, example code to load data, run baseline experiments and evaluate performance will be provided to get partipants up to speed. At the end of the two-day challenge, a holdout set will be released to participants to match image-based signatures in the sets provided before. This will be evaluated automatically to identify the team that can match signature across datasets more accurately than the baselines and other teams. The winning team will take a home a prize sponsored by Nvidia. After the challenge: From Sep 26, 2018 onwards All the data generated during the challenge will be potentially useful to compare and analyze different strategies for solving the cross dataset matching problem. Interested participants can refine their approaches after the competition and contribute with their results in a collaborative paper written jointly with the challenge organizers and other participants. Each participant should plan to finance their own travel and lodging (exception: some support can be provided for attendees from under-represented groups; please contact us at firstname.lastname@example.org). The closest airport is Boston Logan Airport (BOS). The Broad Institute is accessible by the MBTA red line at the Kendall/MIT stop. Hello Chime (by Sittercity): You can book online directly with babysitters; best for weekday (evening only) and the weekend. There is also the possibility of on-site child care during the symposium if attendees would like it, but we need advance notice (min 3 weeks before event). If you’re interested in this service, or have other questions regarding child care or if childcare expenses are a financial concern, please reach out to email@example.com. General Chair: Tim Becker Administrator: Jeanelle Ackerman Past president: Anne Carpenter President: Shantanu Singh Vice President: Florian Heigwer Event officer: Sam Cooper Communications officer: Alex Vasilevich Industry liaison: Alex Vasilevich Operations officer: Rabia Khan Education/ outreach officer: Juan Caicedo Treasurer: Lassi Paavolainen Society liaison: Oren Kraus Resource officer: Lassi Paavolainen The CytoData Society (CytoDS) is an international society that builds and maintains an active community around image-based profiling of biological phenotypes induced by genetic, chemical or other perturbations of biological systems. This field is still in its infancy, and its adoption has been slow, primarily due to the data analysis challenges posed, the large imaging experiments required, and the lack of ground-truth data sets where relationships among images are known. Our goal is therefore to bring image-based profiling into the mainstream by organizing the community working on this technology. The Carpenter Lab / Imaging Platform is based at the Broad Institute of MIT and Harvard in Cambridge, Massachusetts, USA. Our research group develops advanced methods and software tools to quantify and mine the rich information present in cellular images to yield biological discoveries. Our laboratory is best known for our open source software packages CellProfiler and CellProfiler Analyst, but a major focus these days is profiling: we are using advanced machine learning methods to identify morphological patterns in cell populations, to probe the causes and cures for disease.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946445.46/warc/CC-MAIN-20230326173112-20230326203112-00229.warc.gz
CC-MAIN-2023-14
7,297
86
https://intellipaat.com/community/20431/better-text-documents-clustering-than-tf-idf-and-cosine-similarity
code
TfxIdf is currently one of the most famous search method. What you need is some preprocessing from Natural Langage Processing (NLP). There is a lot of resources that can help you for English (for example the lib 'nltk' in python). You must use the NLP analysis both on your queries (questions) and on yours documents before indexing. The point is: whereas TF-IDF (or tfxidf^2 like in Lucene) is good, you should use it on the annotated resources with meta-linguistics information. That can be arduous and need in-depth data regarding your core program, grammar analysis (syntax) and the domain of document. cosine similarity on latent linguistics analysis (LSA/LSI) vectors works loads higher than raw tf-IDF for text cluster, though I admit I haven't tried it on Twitter data. Topic models like LDA would possibly work even higher. Since they are a part of Machine Learning Course, understanding Tf-idf will open a lot of gateways for a Machine Learning newbie.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.30/warc/CC-MAIN-20230924191454-20230924221454-00597.warc.gz
CC-MAIN-2023-40
962
6
https://suite.tiki.org/show:AuthPAMAdmin
code
Requirements for AuthPAM AuthPAMOld has a small requirement that must be met in order to work, you need pam_auth php module. I've seen it's on some Linux distributions but not on all. After compilling and installing the module as stated in it's documentation you have to create a PAM service for Tiki (normally at /etc/pam.d). Then just jump onto Tikiwiki and setup PAM there. Take care of file permissions, remember that php runs with apache privileges, normally a normal user account like www-data or so. If you plan to use PAM I'd be glad of any suggestions on that point With a default PAM service any account will be granted (try user: nobody ) so here are a few things to take care about that: I recomend you to make use of pam_require module to require a specific group to be in for the user. Also you can take a look at PAM Modules at kernel.org to refine a bit more your pam service for tiki. Also take note that pam only receive a user/pass pair and checks it, it relays on your web server settings to handle a secure transaction of that pair from the browser to the server, I recommend SSL Thanks damian for advising me that two things. Knowledgebase / tutorial / FAQ / How-to Who is working here generally? Link UserPage. For more information
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711344.13/warc/CC-MAIN-20221208150643-20221208180643-00392.warc.gz
CC-MAIN-2022-49
1,254
13
http://indonesischerecepten.com/unsorted/jqgrid-default-search-contains-digestive-enzymes-2019167.html
code
If not set the jqGrid assing it internally using the jqGrid randId function. Note The events Type function in the table below has a triggred event which can be used. When posting to the server, we try to pass, not the name, but the index set in colModel. The field in colModel should have property stype : 'select'. See below. In the above example the **defaultSearch: "cn"** is used to search using Now if your text contains "here i go" and if you search "go", it will. The method uses the url option in grid to perform a search to the server. When the options is a object containing different configuration setting. See below. I was expecting following behaviour: if the custom searchoptions contains the defaultSearch value specified by the filtertoolbar, use the default. The search parameters in navigator can be set the same way as the options described below. When the header elements are re sized the input search elements are also re sized according to the new width. Typically this can look like this [false,"Please enter valid value"]. All error messages are located into the language file of edit. If the option is a string it must contain a set of value:label pairs with the value separated from the label with a colon : separator and ended with ; delimiter. When called clear the search values send a request with search option set to false and set the default one if available. Jqgrid default search contains digestive enzymes |This function if defined is lunched every time the filter is redrawed - the filter is redraw-ed every time when we add or delete rules or fields To this function we pass the search parameters as parameter. Note The posted fields names are get from index property if they available and if not from the name property. No', 'Sip. String which appear near the search field to perform clearing the search value. Video: Jqgrid default search contains digestive enzymes Heal Your Skin: Digestive Enzymes If this option is true see the autosearch option. Log In. The selected values in multiselect are grouped with this operator between them. For Phase I of the Job Handling project, Tech-X has built a Grid service for . Initial submissions as well as any alteration of Grid jobs are becoming. the system, and a query proxy provides an easy way to query the system. These counter regulatory loops also regulate intestinal absorption and thus Instant jqGrid. content- -mysql-query-contains-a-placeholder-in-python T 15+ jqgriddts render. This option is valid only in navigator options. In single search it is lunched once when created and when the reset button is pressed. To synchronize format in jqGrid and datepicker a dateFormat option is used in datepicker. Other search types are not supported. This method only refresh the toolbar filter and does not use reload to reload data. Method Description triggerToolbar When this method is called a search is performed, the search parameter in grid becomes true and ajax call is made to the server clearToolbar When called clear the search values send a request with search option set to false and set the default one if available toggleToolbar Toggeles the toolbar with the search elements. default parameters -minscore 25, -trim_score 20, and using the D3js, jqGrid and jQuery packages. Determination of enantioselectivity of selected enzyme – in silico study. The created five classification models can find practical application in the clinic erseDrugEffects/, last accessed /09/ 5. contains one stick with the compound, and two others free from that former. David has 7 jobs listed on their profile. Video: Jqgrid default search contains digestive enzymes What Are Enzymes? The function is responsible to get and set value of the user defined element when a search is performed. You should post more full code which you use or better the demo, which reproduces your problem. As of 3. When this option is set the element will be filled with values from the ajax request. In single search it is lunched once when created and when the reset button is pressed. MASTER EHSAN SHAFIQ DEATH STAR |For example: do you use local searching datatype:local or loadonce:true or you implement all on the server? This function create user defined search element when the colModel stype options is set to 'custom'. If the event return false the dialog will not be closed. Method Description triggerToolbar When this method is called a search is performed, the search parameter in grid becomes true and ajax call is made to the server clearToolbar When called clear the search values send a request with search option set to false and set the default one if available toggleToolbar Toggeles the toolbar with the search elements. To this function we pass the element object.
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540529006.88/warc/CC-MAIN-20191210205200-20191210233200-00315.warc.gz
CC-MAIN-2019-51
4,746
25
http://neoppidum.com/ad-aware/adaware-caused-no-connection-to-internet-ttt.php
code
AdAware Caused No Connection To Internet (ttt) Network Rules, double-click the application in the list). If you're using a network card, it could be to blame as well - bad card, bad drivers, etc. With name-brand routers hov- ering in the $50 range, it's diffi- cult to justify staying on a wired network with all the benefits you get from cutting the cord. Click on the “Settings” button (top right corner of the main window) then, on the General Settings tab, click on “Activate”. http://neoppidum.com/ad-aware/adaware-6-0-free-to-adaware-se-personal-edition.php Open the registration window by clicking the ?Register? Users can purchase a consumer-oriented router or gateway from a reputable manufacturer such as Belkin (www.belkin.com), D-Link (www.dlink.com), Link- sys (www.linksys.com), or Netgear (www.netgear.com) for less than $50. C:\WINDOWS\system32\drivers\seneka.sys (Trojan.Agent) -> Quarantined and deleted successfully. And now that you know a little something about how, isn't it all the more impressive? [rs] by Brian Hodge Reference Series / Home Networking 13 STARTING OUT Get Wired Choosing http://www.lavasoftsupport.com/index.php?/topic/33646-ad-aware-11-no-internet-or-network-after-uninstall/ Ad Aware Service Unavailable The proxy would've stored a copy when somebody else requested the same data before you did. The following actions are available. Repair: Repair detected object (available only for specific objects). Back to top #18 CeciliaB CeciliaB Volunteer Moderator 9656 posts Posted 17 October 2013 - 11:49 AM Hi joanie_97 and hd5970, Lavasoft has created a small tool to restore the IFTTT does not make any representation or warranty whatsoever about any third party site that may be linked to or from or Service. Of the categories you're likely to encount- er, Category 5, or CAT5, is probab- ly the most common. Ad Aware Service Unavailable In Safe Mode There are many types of networks and lots of ways to categorize these networks. Stop the Service (if started) and then right click/properties. Ad Aware Update Problems CAT5 (left) and CAT6 (right) cables are very different, however, with the CAT6 conductors composed of a thicker gauge wire. A protocol es- tablishes the rules for how a sender signifies that it's sending data and how the recipient signifies message received, as well as the kind of error checking and, imp source In a traditional network, there are at least two PCs, but there are usually many more. Resellers also have direct access to sales support, when required. Ad Aware Couldn't Install Updater All rights reserved. To activate/disable Ad-Watch on a client or group of clients, Open the Ad-Aware Enterprise Console. Click OK and then Apply. * Verify that the port scanner can now detect the port. Ad Aware Update Problems More recently, the HomePlug Powerline Alliance (with members such as Intel, Linksys/Cisco, Sam- sung, and Sony) has developed the HomePlug and HomePlug AV stan- dards for networking two or more computers Lavasoft ? Ad Aware Service Unavailable During a scan, the CPU use of the Service will vary parts of the scan are labor-intensive and require a lot of processing power, which can make the computer's performance sluggish. Ad Aware Protection Inactive Once you have closed other applications, scanning will run at full speed. install the system -> make a .tib acronis backup image->install drivers & updates->acronis system image->install basic/essential programs (winamp, firefox, totalcommander) -> make a system image, but sadly on this computer I http://neoppidum.com/ad-aware/adaware-log-june-18.php or * ?C:\Documents and Settings\All Users\Application Data\Lavasoft\Ad-Aware? First of all, make sure that your system is connected to the Internet. Once sent the mac address of the modem is registered with your account so you may have a problem if you keep the old one in the place of the new Ad Aware Update Problems 2016 When the scan is complete, it identifies the invalid entries that can be removed selectively and safely. There are many types of wireless networks, such as Bluetooth, which lets you connect two devices in close physical proximity to each other, to wireless LANs that connect your home PCs When logged in, click 'Personal Info' under 'Support Center' in the menu to the left. 2. http://neoppidum.com/ad-aware/adaware-not-working.php You can use a router to connect your network to the Internet through an ISP (Internet service provider). For example, in a ring topology, all the nodes are connected in a circle. Uninstall Ad Aware What OS are you using?You can post a 'Hijack This' log and we can look for anything suspicious - get 'Hijack This' from here: »www.spywareinfo.com/down ··· t=sp#detHave you run any Anti-Spyware You might not be allowed to log on [Security] by ashrc4274. C:\WINDOWS\system32\zrxfpl.dll (Trojan.Vundo) -> Quarantined and deleted successfully. After you are logged in, select the product you are interested in ordering. Such changes, occurring together as they did, revolutionized the way people used their home computer systems. You can get three 14-foot lengths of silver satin wiring (phone cable) for $3 each from TigerDirect (tigerdi- rect.com). Ad Aware Definition Files ForumsJoin Search similar:Awkward Routing To New York Servers?CT->IllinoisCan Someone tracert this.bad routing sc.net,FIOS 7pm-11pm over saturation 75/75 turns to 5/75[DSL] Connection down - high latency on DSLX side[Troubleshooting] Jetpack 4G and It will install the newest version for you and it will also remove the old. You need to update that which will give you a new version and also the latest database. IFTTT has no special relationship with or fiduciary duty to you. http://neoppidum.com/ad-aware/adaware-log-question.php Please, try to a system restore to a time before the installation of Ad-Aware: Start button/menu - All Programs - Accessories - System Tools - System Restore. © Copyright 2017 neoppidum.com. All rights reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864303.32/warc/CC-MAIN-20180621231116-20180622011116-00154.warc.gz
CC-MAIN-2018-26
5,980
17
https://xuffed678blog.com/1-29-an-epik-arrival-part-3-meeting-my-students/
code
It’s Part 3 of my EPIK Arrival and it’s now time for me to talk about my transition into my school and what it was like meeting my students for the first time! Thanks so much for watching! Help me become a celebrity amongst my students again by hitting the SUBSCRIBE button and giving this video a THUMBS UP. Feel free to leave any COMMENTS you have for me down below! SUBSCRIBE FOR MORE VIDEOS: CONNECT WITH ME! I’d love to hear from you! Official Website: https://xuffed678blog.com MUSIC: Scott Holmes- A Wee Tipple Be yourself, love yourself and I’ll see you guys next time!
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400198887.3/warc/CC-MAIN-20200921014923-20200921044923-00781.warc.gz
CC-MAIN-2020-40
585
7
http://www.backyardchickens.com/t/661031/baby-chicks-keep-dying
code
I had new baby chicks hatch Wednesday, about 30 total. Everyday I seem to lose 1-2. They seem to be in good health, then they turn sick looking and when I go to check them the next day, they are dead. So far I've lost about 6. 3 weeks ago I hatched 63 chicks and only lost 1. Not sure what's going on with this batch. Any ideas?
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163048447/warc/CC-MAIN-20131204131728-00030-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
328
2
https://forum.duolingo.com/comment/3803730/We-doen-niets
code
It doesn't matter, but you obviously have to pick one. We is more common than wij. But if the word is stressed, wij is the only option. In translations, normally both should be accepted. In dictation exercises only the one that is actually spoken. Theoretically. In practice the fast voice pronounces both as we, and you must check with the slow voice. The problem has nothing to do with Dutch. "We do nothing" would be a correct translation if it were the normal way to put this in English, but it isn't. If it is used at all, it carries a special emphasis that is not at all implied by the Dutch sentence, though of course nobody prevents you from stressing niets a lot. Personally I think it should be accepted, but it also makes some sense to reject it.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991428.43/warc/CC-MAIN-20210514152803-20210514182803-00344.warc.gz
CC-MAIN-2021-21
757
4
https://www.htmlhelp.com/reference/html40/fontstyle/b.html
code
|Contained in||Inline elements, block-level elements| The B element suggests that text be rendered as bold text. In most cases, use of a phrase element such as STRONG is more appropriate since such elements express the meaning of the text more clearly. The B element is a suitable choice for marking a structure for which no phrase element exists. For example, vectors in mathematics have no structural element in HTML 4, but bold text is often an appropriate visual rendering: If two vectors <B CLASS=vector>v</B> and <B CLASS=vector>w</B> are orthogonal, we write <B CLASS=vector>v</B> ⊥ <B CLASS=vector>w</B>. Note the use of the CLASS attribute to add structural significance to the B elements. This allows greater flexibility when applying style sheets to different kinds of bold text.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102469.83/warc/CC-MAIN-20231210123756-20231210153756-00895.warc.gz
CC-MAIN-2023-50
792
5
https://www.adina-wagner.com/authors/admin/
code
My research focus lies on open source software development to foster open and reproducible scientific practices and analyses in neuroscience. Please see my CV for more info about my skills and publications. PhD in Psychoinformatics, current Research Centre Juelich MSc in Clinical Neuroscience, 2019 Otto-von-Guericke University Magdeburg BSc in Psychology, 2016 Technical University Braunschweig
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655886178.40/warc/CC-MAIN-20200704135515-20200704165515-00466.warc.gz
CC-MAIN-2020-29
396
8
http://forums.shipstation.com/discussion/943/retrieving-unvoided-shipments-count
code
I am trying to retrieve a count of how many unvoided shipments were created today via the ShipWorks API. I have been able to obtain a count of how many shipments were created today but this count includes "voided" shipments. I know I could iterate through each order and filter out the voided shipments, but I would like to know if there is a better approach. An overview of what I am doing: I am building a stat board that displays shipping stats and goals. I figure the API was the best way to retrieve the data needed for the stat board. I am completely new to ShipStation, so let me know if there is a different way of achieving this goal. My current code is below... $filters = array("shipDateStart"=>date("Y-m-d 00:00:00"), "pageSize"=>"1"); $result = $shipStation->getShipments($filters); $shipmentCount = $result->total;
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824226.31/warc/CC-MAIN-20171020154441-20171020174441-00255.warc.gz
CC-MAIN-2017-43
828
7
http://blogs.technet.com/b/wikininjas/archive/2014/08/22/technet-wiki-ninjas-new-persian-farsi-facebook-group.aspx
code
Monday - Interview with a Wiki Ninja Tuesday - TNWiki Article Spotlight Wednesday - Wiki Life Thursday - Council Spotlight Friday - International Update Saturday - Top Contributors of the Week Sunday - Surprise We're super proud to announce that we have a new Facebook group for the Persian / Farsi language! Check out the new group here: We previously announced the English and Turkish groups: The TechNet Wiki Ninjas are Now on Facebook! TechNet Wiki Ninjas - New Turkish Facebook group!! And you can join those groups here: English (258 members): http://www.facebook.com/groups/TechNetWikiNinjas Turkish (270 members): https://www.facebook.com/groups/TechNetWikiNinjasTR Thanks to Payman, Ronen, Saeid, Davut, and all the contributors for running these groups! - Ninja Ed
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430448950352.27/warc/CC-MAIN-20150501025550-00038-ip-10-235-10-82.ec2.internal.warc.gz
CC-MAIN-2015-18
774
17
http://www.energycrisis.com/campbell/cen21.htm
code
© January, 1996 used by permission No one should imagine that this is a simple subject. Public data are unreliable, and comment is often ill-informed or biased. There are many arguments and counter arguments which need to be understood fully as the study evolves. There is important reading to be done, for which selected references at the end of the report may be a starting point. That said, we will nevertheless try to reduce the subject to its bare essentials, using graphics to make the main points. [Note: Graphs can be seen full size by clicking on the image with the right mouse button and selecting "view."] Complete Version (no breaks between sections)
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296820065.92/warc/CC-MAIN-20240425000826-20240425030826-00856.warc.gz
CC-MAIN-2024-18
663
5