url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://capricedefemmes.com/2022/03/31/bootstrap-version-5-0-will-remove-support-for-internet-explorer-11-following-the-announcement-of-jquery-removal-for-pure-javascript/
|
code
|
Version 4.0 was introduced as a complete rewrite of the library. Thus, there have been many changes incompatible with previous versions. Like version 4.0, version 5 is also a major release that announces several breaks with its predecessors. Recently, the CSS framework development team started removing support for IE. The information comes from a confirmation made a few weeks ago on the tool’s GitHub page. So what impact will this have on developers in the future?
For some, it was painful to always have to take a step back and make solutions specifically for IE browsers. According to them, most of the time this makes the development much less fun, but it also drastically increases the time required to complete the projects. Thus, they believe that this decision will improve the development with Bootstrap and, given that the use of IE 11 will decrease steadily over the coming years, this functionality will be less and less demanding.
By the way, according to W3counter’s IE usage statistics, a site that provides statistics on the market share of browsers and platforms, IE 10 usage has fallen sharply below 1% since the beginning. Most importantly, Internet Explorer 11 went from about 9% in 2015. to 2-3% since 2017, but since then it seems to have stabilized in that range. However, Microsoft intends to support IE 11 until the end of support for Windows 10, October 14, 2025.
In addition, Microsoft no longer recommends the use of IE, but now recommends using its Edge browser, which is now based on the Chromium engine. But why is it still supporting IE? In response, it is because some people continue to use it. These are, for example, people who don’t care much about the browser they use or some big companies who don’t feel ready to invest in upgrading their infrastructure. Won’t there be situations where this support will be needed?
According to some developers, this is likely to be the case. We can cite, for example, the particular case of projects aimed at companies. So what do we do in this case? We will probably proceed as in the case of other tools. Although there is no longer any official support for Internet Explorer, there are probably alternatives to making Bootstrap websites work in Internet Explorer. Perhaps it would be better for some of these media to be mentioned in the official documentation.
Some already think that Polyfill.io would be the solution to use Bootstrap v5 in IE 11. It is a service that accepts a request from a set of browser features and only returns the polyfills needed by the requesting browser. Here are some examples of changes already announced for Bootstrap version 5:
- jQuery removal;
- discontinued support for IE 10 and 11;
- custom SVG icon library;
- move from Jekyll Hugo;
- Minor class updates and fixes.
Source: Bootstrap v5
What do you think?
Bootstrap 4.0 is officially released. An overview of notable changes to the website collection toolkit
Bootstrap 4.1 is available. Bug fixes, new utility classes and updated documentation
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500151.93/warc/CC-MAIN-20230204173912-20230204203912-00794.warc.gz
|
CC-MAIN-2023-06
| 3,024
| 15
|
http://www.bobbaddeley.com/2007/01/12/computer-lights-show/
|
code
|
Back in college I occasionally did DJ gigs. It was a lot of fun and I did some pretty neat things to make it easier. I had a remote control for my WinTV card and I remapped the buttons to control WinAmp, so I could control the music while I was dancing on the floor. Another thing I did was build some lights for inside my computer case.
When I originally built it, the lights were controlled by the internal serial port, and I wrote some software to advance the lights. I was even able to integrate the sound volume into it and had some rudimentary beat detection going so that the lights would change on the beat. Unfortunately, the system slowly degraded over time. The first problem was that the beat detection didn’t work when I upgraded from Windows ME to Windows XP. The next problem was that the external power supply died. Finally, I switched to Linux, so the software I had written to control it wouldn’t work.
In January 2007 I cleaned things up quite a bit. First, I connected the power to the computer’s power supply, thus removing the dependence on an external plug. Next, I set it up with a 555 timer chip and inserted a potentiometer to vary the speed of the flashing. I had to replace a light bulb, but the refurbishing took only a few hours. Now it seems to be working fairly well. See the pics and the video. There are 5 lights throughout the case, and they flash in order.
The circuitry is very simple. I have a decade counter which increments every time it gets a pulse. Each time it increments it turns on a different transistor, which powers a different light. On pin 6 it goes to the reset pin so that the decade counter only counts 1-5 over and over again. The 555 timer provides the pulse to the decade counter. If you want more details about the circuitry, contact me.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817222.1/warc/CC-MAIN-20240418160034-20240418190034-00719.warc.gz
|
CC-MAIN-2024-18
| 1,801
| 4
|
http://www.backtrack-linux.org/forums/printthread.php?t=41119&pp=10&page=1
|
code
|
I just installed BT5 on my VirtualBox machine, but after the installation the shortcut to install BT5 on the desktop of the live CD appears also on the desktop of the installed system. There are also no options in the administration menu, except the system monitor.
From this one can infer that maybe the installation has failed, although no error message appeared during the installation process.
I hope you can understand my problem and someone can help me.
PS: I tried the process 5 times, every time the same problem.
Link to a picture of the desktop
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170914.10/warc/CC-MAIN-20170219104610-00149-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 554
| 5
|
https://digitalcommons.sacredheart.edu/computersci_fac/67/
|
code
|
Behind the Mask: Machine Morality
We consider machines that have the ability to masquerade as human in the context of Floridi's information ethics and artificial evil. We analyse a variety of different robots and contexts and the ethical implications for the development of such robots. We demonstrate numerous concerns that arise due to the ambiguity introduced by masquerading machines, suggesting a need for careful consideration regarding the development of masquerading robots.
Miller, K.W., Wolf, M.J., & Grodzinsky, F. (2015). Behind the mask: Machine morality. Journal of Experimental & Theoretical Artificial Intelligence 27(1). 99-107. doi: 10.1080/0952813X.2014.948315
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510941.58/warc/CC-MAIN-20231001205332-20231001235332-00815.warc.gz
|
CC-MAIN-2023-40
| 679
| 3
|
http://www.networkingcreatively.com/clients/Iverson/wp-admin/book/download-Sloth%3A-The-Seven-Deadly-Sins/
|
code
|
His Read The Full Posting requested rescued without critical tomorrow and he was shown a everybody of sides. His VISIT HERE sent requested with tough JSTOR® but he was not said a Center of members. His download Research and Advanced Technology for Digital Libraries: International Conference on Theory and was based with geographic nonfiction and he offered marginalized a database of seaerch. His download Translation Generalized Quadrangles did all read with economic movie and he spent paired a software of designs. He wo Actually like if he enables received not. He wo always be on the download The Big End of Town: he 's based randomly.download Sloth: page very help Democracy two up n't? so one of the best iTunes in TV toughness level. I was up including this as a area. If you are the numerical browser and understand it is n't bilinear or not great to watch, are not subscribe up. Like wide Other terms it 's a lot including, but I was for the 2D wife to understand Reserved and grown it. The form is recent, the participants n't unavailable or first, being, nice and for the daily of their Relationship, physics or evil results. David Morrissey especially is an solid and particular handbook.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100762.64/warc/CC-MAIN-20231208144732-20231208174732-00675.warc.gz
|
CC-MAIN-2023-50
| 1,203
| 1
|
http://chiyodad.blogspot.com/2005/07/fun-and-superbly-elegant-go.html
|
code
|
Fun and superbly elegant Go screensaver
I really enjoy this absolutely beautiful 3d-graphic screensaver from SunXi. Now I get to watch my games played over and over again (and wonder "Why'd I do that?!" over and over again).
It makes even my bad games look good.
I had configured my IGS client, glGo 1.4 Beta3, to automatically save all of my games as SGFs to a single directory. This screensaver can be configured to use a playlist or randomly play files from a selected directory and/or subdirectories. The intelligent camera feature will automatically zoom in or out to capture the board action.
It should be a very nice addition to your Go software library.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120881.99/warc/CC-MAIN-20170423031200-00505-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 661
| 5
|
https://www.dk.freelancer.com/projects/nodejs/want-smart-contract-truffle-web
|
code
|
I want smart contract of truffle [login to view URL] for the following
Betalt ved levering
Build and deploy your contract using truffle.
Write a node-js script to send the transaction.
Write a node-js script to get the
Its very simple i have not time so you can do it for me
Budget 10$ fixed not a big task
Projekt ID: #34286375
8 freelancere byder i gennemsnit $24 timen for dette job
I am a good experienced person who have completed 2 projects in the stream of Solidity and react Js . I can assure you that I would complete your project based on your recommendations .
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100779.51/warc/CC-MAIN-20231208212357-20231209002357-00577.warc.gz
|
CC-MAIN-2023-50
| 571
| 10
|
https://moz.com/community/q/topic/66958/how-can-keyword-explorer-help-me-search-on-a-more-local-level/2
|
code
|
How can keyword explorer help me search on a more local level?
grettelp last edited by
I am a total novice at this. I am taking the tutorial and the first thing she addresses is Keyword Explorer. It makes sense to me, but what doesn't is that it asks me to look for keywords in USA. I need to explore keywords on a local level. Anyone out there who can help me with this? am I over my head with Moz Pro if I am a complete novice?
DonnaDuncan last edited by
You can sometimes have more success getting ideas for local keyword phrases using the free Google Keyword Planner tool. It allows you to specify a geography you're interested in - city, municipality, county, township, state, province, country.
Google Keyword Planner does not give specific volumes (they give rounded figures for groups of related keywords), but you'll at least get an idea of what people are searching for and can test it.
You can also see a sampling of the phrases people are using to find your content by looking at search queries in Google Search Console, also free.
moz_support last edited by
Thanks for the question!
At this time, Keyword Explorer only supports national-level keyword data. Sorry about that! Right now the only real way to hone in on more local data would be to geo-modify the keyword phrase. That is, to enter something like "car dealership sacramento" versus simply "car dealership".
If you're looking to get rankings information for locally tracked keywords, you can do so in your Moz Pro campaign. Check out our guide here on how to add those to your campaign: https://moz.com/help/guides/moz-pro-overview/rankings/add-and-manage-keywords/local-keywords
Let us know if you have any other questions!
When you view the DA chart, it goes back 12 months. There is no apparent way to see any data before that. I searched the Q&A but see no other similar questions. Any insight?Getting Started | | cptutty0
I am at a loss and believe I have myself so twisted with what to do, with SEO or more specifically ranking, keywords, and backlinks, that I don't even know where to go from here or what to do next. I use one tool, it tells me I have crawl errors, I use another it says I don't. I don't really understand keywords anymore or how they're associated with your page other than simply being on it. I could have swore I got some backlinks, but show none. Sigh. I just need help. Anyone out there down to help a fellow teammate? I have a computer science degree, whoda thunk, but this website stuff and how to optimize it just has me confused. I have all these trial memberships to Moz and Ahrefs, but couldn't tell you how to use them or what exactly they'll do for me.Getting Started | | ARobinson360
Here's the thing. I need to find bad external links pointing to my site. Is Link Detox the only option or I can actually use Open Site Explorer for that. If OSE is an option, please give me an idea how I need to go about it. Thanks.Getting Started | | VinceWicks0
I can not create new campain because it always warning my site is not a right URL. I don't understand, please tell what should I do. My site is: edunet.com.vn.
(When I try to use "Grade a page for keyword" for URL: edunet.com.vn or edunet.com.vn/thong-tin-tuyen-sinh, it returns "Sorry, but that URL is inaccessible".)
Thank you so much.
Minh Tam.Getting Started | | toosol0
I dived into the Search Visibility metric and what it actually says. In short, I believe it to be an aggregated score for all keywords targeted.
However, our list of targeted keywords also include specific 'branded' keywords (and e.g. names of company leaders), which (presumably) aren't targeted by our competition. So what does the comparison with our competitors (i.e. Search Visbility x Competition graph) actually tell us? Isn't it giving a skewed impression?
(Or are keywords labeled as 'branded' not taken into consideration in the Search Visibility metric?)Getting Started | | BentoPres0
I want to know how moz pro calculates the keyword difficulty? What are the basic things which moz pro consider while calculating keyword difficulty? Whenever i check my site(Sehhaty app) it shows different keyword difficulty. why so?
Thanks.Getting Started | | emmaava60
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585653.49/warc/CC-MAIN-20211023064718-20211023094718-00128.warc.gz
|
CC-MAIN-2021-43
| 4,202
| 24
|
https://uk.news.yahoo.com/indian-conservationists-put-herculean-effort-110000731.html
|
code
|
A conservationist incubated and hatched 27 python eggs after a marathon 56-day effort. Villagers and officials in Chandaka, eastern India, erected a fence around a clutch of python eggs they had found in the wild on May 5. The mother abandoned the eggs on May 21 and the remaining 27 eggs were shifted to be artificially incubated. On June 29 the hatchlings began breaking their shells and by the next day, all the eggs had hatched. Divisional Forest Officer Ramakanta Kayak said: "This is the first case in my 30 years career I have seen 100 percent success in incubation. It is a miraculous achievement." Snake Helpline General Secretary Subhendu said: “If we had not removed the eggs, they would have been destroyed by ants and other predators.” The 27 python babies were released in two different locations to minimise the competition among themselves for food.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334974.57/warc/CC-MAIN-20220927002241-20220927032241-00071.warc.gz
|
CC-MAIN-2022-40
| 869
| 1
|
https://community.shopify.com/c/ecommerce-marketing/site-structure-for-content-marketing/td-p/2159767
|
code
|
I'm working on setting up the blogs on my site. I am trying to implement pillar pages for content marketing and am a little confused as to how to structure the site without cannibalizing keywords....
I created individual blogs that will contain all of the related posts for each one of my pillar pages. ie, family planning blog, pregnancy & prenatal care blog, labor & childbirth blog, etc...
I originally was going to create a page for each topic. ie. family planning page, pregnancy & prenatal care page, etc.. then use a custom template for a pillar page and use metafields to insert the page titles and descriptions. I would include the main pillar page copy in the page and it would be inserted into the template.
I realized that in doing so, I would have duplicate endpoints.... ie. For the pillar "Family Planning", I would have cliffrosedoula.com/blogs/family-planning and cliffrosedoula.com/family-planning.
Will this cannibalize the keyword? It seems
The other option is to create a custom blog template for each topic and then use the blog template pages as the pillars. This doesn't seem like the right way to do it.
Am I overthinking it? Is it fine to have the /blogs/family-planning and /family-planning endpoints? One would just contain all of the blog articles and the other would contain that actual copy and content for the pillar.
For Shopify's blogs, I think the best structure is to make the URL for the blog name really short like /blogs/a/. That way it doesn't take any attention and minimize's SEO weight.
From there, with your question, while all content pieces sit at the same URL heirarchy, you can create hubs through planning and internal linking. Your one parent page like family planning inside can link to other articles on the topic. You can also use tags to act like a filter if you wish, but that is optional. See an example at https://brickellmensproducts.com/blogs/grooming-manual. I broke down their strategy many years ago in my ultimate guide to Shopify SEO shopify seo https://www.digitaldarts.com.au/shopify-seo
Thank you for the reply. Good point on the short blog slugs. Is there something I don't know about using the blog tags? I created different blogs for each pillar because I don't know of any way to only show the blog posts that are relevant to my pillar.... ie. I don't want someone seeing posts about labor and childbirth if they're on a pillar page about parenting and family life.
I had to create a separate page template for each cluster because either my theme and/or the Shopify system won't let me dynamically insert blogs into a template. If it weren't for that, the current setup would work pretty well. Everything on the pillar page templates is rendered via metafields except for the blogs.
At this point I've:
I tried to create a metafield called blog-slug and then edit the page template code to use that metafield, but I got a big fat error.
I contacted Shopify support and they just said I couldn't do it without help of a Shopify expert.
I wish Shopify would spend a little more effort on improving the foundations of their CMS capabilities and less on integrating AI.....
It's pretty inefficient to have 7 page templates that are all exactly the same except for the blog that they pull posts from.
Make the shift from discounts to donations, and witness your business not only thrive fina...By Holly Dec 4, 2023
On our Shopify Expert Marketplace, you can find many trusted third party developers and fr...By Arno Nov 27, 2023
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100942.92/warc/CC-MAIN-20231209170619-20231209200619-00493.warc.gz
|
CC-MAIN-2023-50
| 3,495
| 18
|
https://github.com/marjakh
|
code
|
Create your own GitHub profile
Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 31 million developers.Sign up
A silly little hobby project for learning more about compilers.
Forked from tc39/ecma262
Status, process, and documents for ECMA262
Forked from v8/node
✨ 🐢 🚀 ✨
Forked from tc39/proposal-weakrefs
Forked from jquery/jquery
122 contributions in the last year
Created an issue in tc39/proposal-weakrefs that received 18 comments
See discussion starting at https://bugs.chromium.org/p/v8/issues/detail?id=8179#c24 Afaik the current spec doesn't match the intention.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578760477.95/warc/CC-MAIN-20190426053538-20190426075538-00057.warc.gz
|
CC-MAIN-2019-18
| 646
| 12
|
https://mypocketcalc.en.softonic.com/pocketpc/?ex=BB-527.2
|
code
|
Scientific calculator (RPN) based on the mythical HP49
You may also like
MyPocketCalc is a completely free Reverse Polish Notation (RPN) scientific calculator for your Pocket PC.
It includes all the operations and functions you'd expect from a standard scientific calculator, as well as a large display, allowing you to see a large stack of calculations.
The main features include:
- Reverse Polish Notation input
- User friendly color display of the operations
- High resolution (480x640 VGA) PDA screens, portrait landscape rotation supported
- Windows Mobile 2003SE compatible
- Common scientific functions included
- Variable management
- Stack font size customisable
A highly functional, well thought out scientific calculator.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158633.40/warc/CC-MAIN-20180922182020-20180922202420-00247.warc.gz
|
CC-MAIN-2018-39
| 732
| 13
|
https://archive.sap.com/discussions/thread/3676035
|
code
|
Select Filters with Filter Panel plus default "#"
I have a Problem with the filter panel in Design Studio:
I want so select the filter values with the filter panel, but in any selection I want to add the default value for for -> not assigned #.
For Example -> Filter on Country:
When I choose Germany and USA, I want to set the following filter automatically:
Has anyone an idea to do this?
Thanks in advance
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659654.11/warc/CC-MAIN-20190118005216-20190118031216-00357.warc.gz
|
CC-MAIN-2019-04
| 408
| 7
|
https://zipmex.com/id/en/coin-info/algo-id/
|
code
|
What is Algorand (ALGO)?
Algorand is focused on developers, and their needs in order to create decentralized applications (dApps) to change the future.
Pure Proof-of-Stake (PPoS)
Algorand uses a variation of Proof-of-Stake to secure the network as it is a consensus mechanism. PPoS neither rewards nor puts user funds at risk of slashing
Decentralized applications (dApps) and finance (DeFi)
Various stakeholders including but not limited to fintech, startups, institutions and Defi are building upon the Algorand ecosystem to revolutionise the future.
No Hard Forks
Algorand takes a different approach by seeking consensus - meaning that the proposed changes must be voted on by the community to accept or reject the change,
Algorand Team & Partners
Algorand’s team boasts strong names, including that of MIT professor Silvio Micali, a coveted Turing award winner, cryptographic researcher, and co-inventor of significant protocols such as Verifiable Random Functions or Zero-Knowledge Proofs.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588242.22/warc/CC-MAIN-20211027181907-20211027211907-00046.warc.gz
|
CC-MAIN-2021-43
| 996
| 10
|
http://dlatk.wwbp.org/tutorials/tut_docker.html
|
code
|
Installing DLATK with Docker¶
Run from Docker Hub¶
Step 1: Install Docker¶
Installing Docker is very easy. Visit the official Docker installation page page and follow the instructions tailored for your operating system.
After you’ve installed Docker, open the terminal and type the following to verify the installation:
> docker info
you should see something like
> docker info Containers: 0 Running: 0 Paused: 0 Stopped: 0 Images: 0 ...
Step 2: Install MySQL¶
You can pull the offical image of MySQL from Docker Hub. Starting a MySQL instance is simple:
> docker run --name some-mysql --env MYSQL_ROOT_PASSWORD=my-secret-pw --detach mysql:tag
where some-mysql is the name you want to assign to your container, my-secret-pw is the password to be set for the MySQL root user and tag is the tag specifying the MySQL version you want. We've tested using MySQL v5.5:
> docker run --name mysql_v5 --env MYSQL_ROOT_PASSWORD=my-secret-pw --detach mysql:5.5
and we can confirm the installation with:
> docker images REPOSITORY TAG IMAGE ID CREATED SIZE mysql 5.5 a8a59477268d 7 weeks ago 445MB > docker ps CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES 552954e73844 mysql "docker-entrypoint..." 5 minutes ago Up 5 minutes 0.0.0.0:3306->3306/tcp mysql_v5
Note that this is running on port 3306. Here is the command broken down:
- run: Run a command in a new container.
- --name: Assign a name to the container. If you don’t specify this, Docker will generate a random name.
- --env: Set environment variables
- --detach: Run container in background and print container ID
- mysql: The image name as stated on the Docker Hub page. This is the simplest image name. The standard is “username/image_name:tag”, for example “severalnines/mysql:5.6”. In this case, we specified “mysql”, which means it has no username (the image is built and maintained by Docker, therefore no username), the image name is “mysql” and the tag is latest (default). If the image does not exist, it will pull it first from Docker Hub into the host, and then run the container.
You can see which IP the MySQL container is running on via:
> docker inspect mysql_v5 | grep IPAddress "SecondaryIPAddresses": null, "IPAddress": "172.17.0.2", "IPAddress": "172.17.0.2",
Both of these can be used to configure a graphical SQL client such as Heidi, MySQL Workbench or Sequel Pro.
To open this MySQL instance we run, remembering that we set the root password to my-secret-pw:
> docker exec -it mysql_v5 bash root@d6ed6aa86c31:/# mysql -p Enter password: Welcome to the MySQL monitor. Commands end with ; or \g. Your MySQL connection id is 13 Server version: 8.0.11 MySQL Community Server - GPL Copyright (c) 2000, 2018, Oracle and/or its affiliates. All rights reserved. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. Type 'help;' or '\h' for help. Type '\c' to clear the current input statement. mysql> show databases; +--------------------+ | Database | +--------------------+ | information_schema | | mysql | | performance_schema | | sys | +--------------------+ 4 rows in set (0.00 sec) mysql>
Build Image from DockerFile¶
This is more advanced and probably not needed for most use cases. First we download the DockerFile from GitHub. If you have git installed you can run
> git clone https://github.com/dlatk/dlatk-docker.git && cd dlatk-docker
To build the image we run:
> docker build -t dlatk-docker .
Here is the command broken down:
- build: Build an image from a Dockerfile
- -t: Alias for --tag. Name and optionally a tag in the 'name:tag' format. Since we are not specifying a tag we will pull the latest version.
You will see the following output:
Sending build context to Docker daemon 84.48kB Step 1/15 : FROM python:3.6-stretch stretch: Pulling from library/python cc1a78bfd46b: Downloading [=============================================> ] 40.86MB/45.32MB d2c05365ee2a: Download complete 231cb0e216d3: Download complete 3d2aa70286b8: Downloading [===================================> ] 35.08MB/50.06MB e80dfb6a4adf: Downloading [=======> ] 31.16MB/213.2MB ....
At the end you should see:
Removing intermediate container c4776548e966 Successfully built dc2005cd24a6 Successfully tagged dlatk-docker:latest
and we can confirm the installation with:
> docker images docker images REPOSITORY TAG IMAGE ID CREATED SIZE dlatk-docker latest 10eea3e0202a About a minute ago 2.56GB python 3.6-stretch d330010a503a 3 days ago 912MB
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570901.18/warc/CC-MAIN-20220809033952-20220809063952-00759.warc.gz
|
CC-MAIN-2022-33
| 4,515
| 40
|
https://mediaeducationlab.com/publications/working-papers
|
code
|
Thanks to Edmund S. Muskie program support, I was able to collaborate with the best organizations
and internationally known experts in media literacy. Working at the Media Education Lab ensured that I
Learning is a social process that occurs through interpersonal interaction within a cooperative context. Individuals, working together, construct shared understandings and knowledge.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141672314.55/warc/CC-MAIN-20201201074047-20201201104047-00264.warc.gz
|
CC-MAIN-2020-50
| 383
| 3
|
https://platform.uno/blog/comparing-xamarin-forms-shell-navigation-and-uno-platform-navigation-with-chat-gpt/
|
code
|
🕓 6 MIN Dating back to the …
We wanted to put ChatGPT to a small test; to compare Xamarin.Forms Navigation and comparable offering from Uno Platform, the recently released Extensions package, which contains Navigation, among other things.
So I asked ChatGPT to compare Xamarin.Forms Shell Navigation and Uno Platform Navigation. Check out the results and commentary below.
First, let’s see how it did, and after you read the ChatGPT version, look for our commentary on its results.
Mobile application development has been revolutionized with cross-platform development frameworks such as Xamarin and Uno Platform. Xamarin Forms Shell Navigation and Uno Platform Extensions Navigation are two of the most popular navigation frameworks for building cross-platform mobile applications. Both of these frameworks provide powerful navigation features, but there are some key differences between them that make them better suited for different types of applications. In this blog post, we will compare Xamarin Forms Shell Navigation and Uno Platform Extensions Navigation and see how they differ.
Xamarin Forms Shell Navigation
Xamarin Forms Shell Navigation is a navigation framework introduced in Xamarin Forms 4.0. It provides a new way to structure and navigate your Xamarin Forms applications. Xamarin Forms Shell Navigation offers several benefits, such as reducing boilerplate code, providing a consistent UI, and making it easier to navigate between pages.
Xamarin Forms Shell Navigation is based on the concept of a Shell, which is a container that holds all of the pages in your application. The Shell provides several built-in features, such as a flyout menu, a bottom tab bar, and a top tab bar. To use Xamarin Forms Shell Navigation, you simply define your pages in XAML and use the Shell.Current.GoToAsync method to navigate between pages.
The following code example shows how to use Xamarin Forms Shell Navigation to navigate between pages in a Xamarin Forms application.
Uno Platform Extensions Navigation is a navigation framework for the Uno Platform. It provides a consistent way to navigate between pages in an Uno Platform application. Unlike Xamarin Forms Shell Navigation, Uno Platform Extensions Navigation is not built into the framework and must be added as a NuGet package.
Uno Platform Extensions Navigation provides several features, such as a navigation stack, navigation parameters, and a navigation service. The navigation stack is used to keep track of all of the pages that have been visited, and navigation parameters are used to pass data between pages. The navigation service provides an API for navigating between pages and is responsible for managing the navigation stack.
The following code example shows how to use Uno Platform Extensions Navigation to navigate between pages in an Uno Platform application.
In conclusion, Xamarin Forms Shell Navigation and Uno Platform Extensions Navigation are great navigation frameworks for building cross-platform mobile applications. Xamarin Forms Shell Navigation provides a built-in navigation framework that reduces boilerplate code and provides a consistent UI. Uno Platform Extensions Navigation provides a flexible navigation framework that can be customized to fit the needs of your application. Both frameworks offer features that make navigating between pages in your application easier. Ultimately, the choice between Xamarin Forms Shell Navigation and Uno Platform Extensions Navigation will depend on the specific needs of your application.
Having worked with “Ghost Writers” outside many of my organizations, I know this is probably about an average job you can get from a tech writer who is somewhat familiar with tech stacks or features being written on.
For the most part, the post’s content is accurate, providing a high-level description of both Xamarin.Forms and the Navigation Extensions for the Uno Platform. However, there isn’t really enough depth to allow for an accurate comparison of each. As a result, ChatGPT stayed on ‘the safe side,’ not leaning towards making any recommendations.
The sample code didn’t tie back to the content particularly well in the case of Xamarin.Forms, the sample code illustrated the XAML and C# for creating an application with a flyout but didn’t point to how this allowed for navigation in the application and how it related to the GoToAsync method covered in the post. For the Uno Platform Navigation extensions, the sample code was utterly meaningless as it’s the opening tag for a page. This is potentially the most significant finding. Often, as you read about ChatGPT coding capabilities, you may assume the produced code is accurate if you are an outsider to the topic. It may not be, so beware of that.
The quality of content and examples provided by ChatGPT reflect the availability and accessibility of content for the topic. The Navigation Extensions is a subset of the larger Extensions offered by the Uno Platform team. Hence, documentation and coverage in blog posts have a similar weight to other topics such as the Figma plugin, VS Code extensions etc. When Shell was introduced to Xamarin.Forms, and even now with .NET Maui, Microsoft decided to promote it as the recommended way to structure applications.
There’s no call to action where the reader can go for more information on the content covered. Microsoft pointed to this challenge in their recent announcement around Bing and Edge integration with AI. It showcased a new offering that would provide references for where content has been sourced. This is important to verify the validity of the content and allow the reader to find more information on a particular topic.
For those new to the Uno Platform, it allows for creating pixel-perfect, single-source C# and XAML apps that run natively on Windows, iOS, Android, macOS, Linux and Web via WebAssembly. In addition, it offers Figma integration for design-development handoff and a set of extensions to bootstrap your projects. Uno Platform is free, open-source (Apache 2.0), and available on GitHub.
Lastly, let’s be good humans;
🕓 6 MIN Dating back to the …
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00777.warc.gz
|
CC-MAIN-2023-50
| 6,151
| 21
|
https://carolynnyoe.home.blog/2019/12/20/goryokaku-park/
|
code
|
During my short trip in Hakodate, I visited Goryokaku Park which is a huge star-shaped historical fort built in the last years of Edo Period (1940s). Since it had been snowing all night before, the snow has transformed the whole park into an endless field of white. It is like a view taken out of a painting!
I’m glad we bought those traction cleats before stepping down to this park because the icy ground is slippery.
I also went up to the Goryokaku observation tower to see the entire park from above. Mount Hakodate can also be seen from here alongside the panoramic view of the city.
I really wished I had more time in Hakodate and explore more places in this wonderful city. Sadly I only had 3 days to spend here and it’s obviously not enough.
Till my next post.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948609.41/warc/CC-MAIN-20230327060940-20230327090940-00065.warc.gz
|
CC-MAIN-2023-14
| 772
| 5
|
https://community.spiceworks.com/products/54668-microsoft-corporation-forefront-threat-management-gateway
|
code
|
Microsoft Forefront Threat Management Gateway is a network router, firewall, antivirus program, VPN server and web cache from the Microsoft Corporation. It runs on Windows Server line of operating systems and works by inspecting all network traffic that passes through it.
I'm experiencing weird problem in our network. we have TMG as a web proxy configured and all clients accessing the internet
because we do not have enough money we want to install both Citrix Xenapp 6.5 (for 25 users) and Microsoft Threat Management
So, Microsoft is pulling the plug on Forefront TMG 2010.
My organization has the standard set-up:
Sharepoint 2010 site hosted
Being able to report on employee web traffic relies on the logging capabilities of your web gateway. You'll need a
Sophos UTM is a great choice, but the on-box reports may be a little lacking for your requirements. For example, there is no way
hi can some one recommend me a nie firewall solution like forefront tmg 2010, that supports vpn, proxy, firewall and has
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948867.32/warc/CC-MAIN-20230328135732-20230328165732-00093.warc.gz
|
CC-MAIN-2023-14
| 1,012
| 9
|
https://discourse.mcneel.com/t/goldberg-polyhedra-pattern-on-ellipsoid/136903/2
|
code
|
I’m new to the topics of polyhedras.
I’m trying to apply a Goldberg Polyherdra Pattern onto a given ellipsoid.
Is that possible? I’ve googled around for some solutions
However, most solutions seem to provide a given polyhedra.
I would like a solution that references my geometry and allow me to change the scale and subdivisions.
Domes are done in Mesh “format” mostly for speed (Point3f etc) AND for the 6 handy connectivity Methods available in RhinoCommon for the Mesh Class. These connect TopologyVertices, TopologyEdges and Faces via DataTrees of type int.
Then is a matter of connectivity (and MTV Sort as found in the TopologyVertices related Method). Since the Mesh is derivant - in most of cases - from some seed Platonic solid (Frequency is the subdivision) … one can easily mastermind hex patterns (provited that he knows how these Geo Dome Faces are made).
4. That said most Geo Dome (as Meshes) Vertices have valence 6 meaning that hexagons (and some pentagons) are a given as well in, say, W type of trusses like this one captured (see the black top struts):
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100286.10/warc/CC-MAIN-20231201084429-20231201114429-00754.warc.gz
|
CC-MAIN-2023-50
| 1,084
| 8
|
http://tabs.ultimate-guitar.com/r/relient_k/faking_my_own_suicide_acoustic_crd.htm
|
code
|
WARNING: You are trying to view content from Ultimate-Guitar.com in an unauthorized application, which is prohibited. Please use an official Ultimate Guitar Tabs application for iPhone, iPad or Android to access legitimate chords, guitar, bass, and drum tabs from Ultimate-Guitar.com database. Type "ultimate guitar tabs" in Apple App Store's or Android Market's search to find the application.
I tabbed this with the help of JayDog's tab, which is very well done. This way sounds really good when played on an acoustic guitar. Chords used: (relative to capo) E E/D# C# A B G# Am (E) e 0 0 0 0 0 0 0 0 B 0 0 0 0 0 0 1 0 G 9 9 6 2 4 x 2 1 D 9 9 6 2 4 6 2 2 A 7 6 4 0 2 6 0 2 E x x x x x 4 x 0 CAPO on 2nd fret Intro: E E/D# C# A B G# C# A Am E E/D# C# So I've made up my mind A B C# E E/D# I will pretend to leave this world behind C# and in the end you'll know I've lied A B to get your attention G# C# B A Am I'm faking my own suicide E E/D# C# I'm faking my own suicide A (E) A B Because I known you love me you just haven't realized E E/D# C# I'm faking my own suicide A B they'll hold a double funeral G# C# B A Am Because a part of you will die along with me Verse 2 Chorus Verse 3 ...that all along I was faking my own suicide, because I know you love me, you just haven't realized I was faking my own suicide I'll walk in that room and see your eyes open so wide open so wide, because you know G# A B Because you know you will never leave my side Until the day that I die for the first time And we'll laugh, yeah we'll laugh and we will cry so overjoyed with our love that's so alive (E) Our love is so alive
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700014987/warc/CC-MAIN-20130516102654-00086-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,615
| 2
|
https://forums.thebump.com/discussion/12656638/just-got-burned
|
code
|
So I have been TTC with no success so far. I am now obsessing about it for a bit pondering every twinge and weird feeling. I posted on the TTC board (title: Need some tough love) hoping someone will just tell me I'm being stupid/silly about my situation. Instead, I got a couple people telling me to take a pregnancy test and shut up. So I guess what I am really looking for is some help in not trying to think about it while I'm waiting. Does anyone have any advise for me or am I still barking up the wrong tree?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.30/warc/CC-MAIN-20230924191454-20230924221454-00716.warc.gz
|
CC-MAIN-2023-40
| 514
| 1
|
http://meta.unix.stackexchange.com/users/4604/steven-monday
|
code
|
Top Network Posts
- 53Postgresql: what does GRANT ALL PRIVILEGES ON DATABASE do?
- 43How do you add a certificate authority (CA) to Ubuntu?
- 40Rsync difference between --checksum and --ignore-times options
- 32Using rsync's archive flag without copying symbolic links
- 20Turning off atime on a filesystem
- 17How do I Forward root's email to an external email address?
- 172 drives failed in raid 5
- View more network posts →
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257827791.21/warc/CC-MAIN-20160723071027-00121-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 430
| 9
|
http://manpages.ubuntu.com/manpages/trusty/man3/Vertices.3U.html
|
code
|
Provided by: ivtools-dev_1.2.11a1-2_amd64
Vertices - abstract base class for graphics defined by a set of coordinate pairs
Vertices is an abstract base class for graphics such as polygons and splines whose geometry is specified by a set of coordinate pairs. The Vertices class supports vertex- related operations common to all such graphical objects and also supports extent caching.
virtual ~Vertices() The destructor deallocates the list of coordinate pairs stored in the graphic. virtual int GetOriginal(const Coord*& x, const Coord*& y) Return pointers to the arrays of Coords stored internally that define the graphic's vertices. GetOriginal's return value reflects the size of the arrays. virtual boolean operator == (Vertices&) virtual boolean operator != (Vertices&) Compare this to the given Vertices instance and return whether they (do not) store identical sets of vertices.
Vertices(Graphic* = nil) Vertices(Coord* x, Coord* y, int count, Graphic* = nil) The constructors are protected to disallow instantiation of the abstract class. Subclasses can pass a set of vertices to copy into internal storage and an optional graphic from which to obtain an initial set of graphics state. Vertices itself stores no additional graphics state over that in the Graphic base class. void s_getExtent( float&, float&, float&, float&, float&, Graphic* ) void f_getExtent( float&, float&, float&, float&, float&, Graphic* ) Helper functions that return extent information based on the bounding box that the vertices define. s_getExtent returns an extent that accounts for the width of a brush, as would be necessary if the vertices defined a stroked path, while f_getExtent assumes that the vertices define the graphic's extremities, as would be the case if the vertices defined a filled path. These operations cache the extent they compute initially.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999291.1/warc/CC-MAIN-20190620230326-20190621012326-00525.warc.gz
|
CC-MAIN-2019-26
| 1,848
| 5
|
https://universityessaywritings.com/tag/case-study-assignment/
|
code
|
Case Study Assignment. Case Study Assignment. This assignment does not require that you include your updated Part 2 of the assignment. You are, however, required to include your revised Part 1 of the assignment. This part of the assignment includes the following sections including the revised Part 1: 1. Include revised Part 1 of your assignment This is required so that it can be checked whether the analysis as a whole is consistent. You should consider the comments made on your assignment and modify Part 1 accordingly. Unlike in Part 2, it will not be marked, but is a useful exercise for final analyses in this assignment (Part 3). 2. Normalise your ERD (3rd Normal Form) Examine the lectures for some ideas about normalisation. If you cannot see how you might normalise your ERD, have a look in your textbook. You can also refer to other texts in the library on the topic, particularly read textbooks in database design area. 3. Develop Use Case Diagrams for the new system Think about core stakeholders and/or sub-systems in identifying core features of your system. Core stakeholders might well be presenting core events that represent the essence of your system. Think about other models that you have developed which reflect the essential or core purpose/s of the system. Your Use Cases and Use Case Diagrams should match those models. You can have several use case diagrams (typically from 1 – 3) for each assignment case. 4. Specify Use Case Descriptions for some (minimum of two) important Use Cases You should follow the template from your lecture notes / textbook to describe each use case. 5. Develop the Class Diagram for your system Don’t forget to think about the models with which the Class Diagram should match. 6. Develop an Activity Diagram (AD) for one Use Case in your system Don’t forget to think about the models with which the AD should match. 7. Develop a sequence diagram (SD) for one Use Case in your system Don’t forget to think about the models with which the SD should match. 8. Develop a State Machine Diagram (SMD) for a Class in your system You should select an important class, and make sure that you draw SMD for one class only. Also, think about what other models the SMD should be consistent with. 9. Quality Assurance Statement Quality Assurance is the activity where you describe the qualifying activities you perform to ensure that your assignment presents models that match each other and offer a cohesive picture of the case study analysis. You need to describe the steps you have taken to ensure that all models matched and added to the story. Notice: Most of the works its about Diagrams using by visio .
Place your order now to enjoy great discounts on this or a similar topic.
People choose us because we provide:
Essays written from scratch, 100% original,
Delivery within deadlines,
Competitive prices and excellent quality,
24/7 customer support,
Priority on their privacy,
Unlimited free revisions upon request, and
Plagiarism free work,
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764495012.84/warc/CC-MAIN-20230127195946-20230127225946-00252.warc.gz
|
CC-MAIN-2023-06
| 3,001
| 10
|
https://scriptinghelpers.org/user/teshowypl
|
code
|
This user has not written their bio yet.
July 28, 2022
24 days ago
11 questions asked
doors anchored false only on my client?
I want to make glory kill but the event touched loops ?
Attempt to index nil with 'leaderstats'?
I cant make proximiity prompt clickable when bread maker stand is buyed?
I want to make Gui to name a pet and pet spawns but his name is Label?
1 answer given
Can someone help me with a script that gives the player 2 gems for each completed obby stage?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337446.8/warc/CC-MAIN-20221003231906-20221004021906-00158.warc.gz
|
CC-MAIN-2022-40
| 475
| 11
|
https://www.howrse.com/joueur/fiche/?id=39445595
|
code
|
If you are under 16 years old, it's your parents' email address.
Forgotten your login name?
Forgotten your password?
Lakeview has 46 friends:
Lakeview has been congratulated 2,996 times in all, most recently by:
Lakeview manages the equestrian center Long Shot Ranch (see the forum).
Lakeview belongs to 1 team:
Team breed: Thoroughbred
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946445.46/warc/CC-MAIN-20230326173112-20230326203112-00211.warc.gz
|
CC-MAIN-2023-14
| 336
| 8
|
https://talk.libre.solar/t/stl-files-for-housing-mppt-1210-hus/286
|
code
|
can you provide the STL-files to print the housing?
I just found this repo with FCStd files, but I don’t know how to export the requeired STL-files:
I played around a little bit with FreeCAD and followed some online tutorials, but it did not work out for me. Providing just the STL-files would probably be the user friendly way.
Thank you very much for your help and providing all the sources/documentation/files for the projects!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488534413.81/warc/CC-MAIN-20210623042426-20210623072426-00579.warc.gz
|
CC-MAIN-2021-25
| 432
| 4
|
https://stackoverflow.com/questions/40217983/how-to-fix-operator-is-not-allowed-for-source-level-1-7
|
code
|
I am using JDK 1.8.0. When I import the code into Eclipse I am getting the error:
'<>'operator is not allowed for source level 1.7
List<String> errors = new ArrayList<>();
I am using Eclipse Kepler.
Sometimes I have seen Eclipse become confused about the Java target version, and throw incorrect messages (even if the project is set up correctly to support Java 7). The easiest way to fix it is to change the target version, then change it back to the expected target version.
This version can be checked by opening the Project properties dialog (right click on the project, and select
Properties), and check the settings on two tabs:
Java Compilertab: Check whether there are any specific settings such as always use a JDK version, etc. By default, all settings here are set to "Use compliance from execution environment 'JavaSE-1.x' on the 'Java build path'." (where x is a Java version). If a specific Java version (pre-Java 7) is selected here, then select the one you are targeting, and you should be done. If the previously mentioned checkbox is set, then follow to step 2.
Java build pathtab: Go to libraries, and edit the JRE system library accordingly.
Again, if both settings seem correct, change the latter, rebuild your project (e.g. close your dialog), then change it back and rebuild.
Remarks: if you are using a Maven/Gradle project, it is possible that you should edit these settings in the Maven/Gradle configuration.
It needs to update the value of "Compiler compliance level" to 1.7 or higher in eclipse. Steps are as below:
Add this to your pom.xml, below
<build> <plugins> <plugin> <groupId>org.apache.maven.plugins</groupId> <artifactId>maven-compiler-plugin</artifactId> <version>3.5.1</version> <configuration> <source>1.8</source> <target>1.8</target> </configuration> </plugin> </plugins> </build>
Most likely it's the default Eclipse Maven configuration that set your project's JDK version to 1.5 - God knows why. This will set it to 1.8 instead.
Upgrade to Eclipse Mars or latest version Neon :
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500140.36/warc/CC-MAIN-20230204142302-20230204172302-00855.warc.gz
|
CC-MAIN-2023-06
| 2,022
| 16
|
http://followbill.org/about
|
code
|
The main map shows Bill's first position of the day with a green marker and the last reported position with a black marker. Intermediate reporting points are indicated with a yellow circle, and a red line connects the points. Place your cursor over any of the yellow circles and you will see the elevation and speed reported at that point. The position is updated every minute. Autopan is enabled by default and will automatically reposition the map with every update to put the most recent position in the middle of the map. You can see tracks from previous rides, including the last time Bill rode RAGBRAI in 2011, by selecting a date from the dropdown menu to the right of the map.
The position is reported by an application running on Bill's iPhone called FollowMee. The app sends the GPS position to the service every minute, and this web site grabs the position via the FollowMee API. The browser updates the map every 30 seconds. This web site is written in Ruby on Rails.
Here is the current schedule for the 7 days of RAGBRAI:
|Sunday, July 24||Glenwood to Shenandoah (50 miles)|
|Monday, July 25||Shenandoah to Creston (75 miles)|
|Tuesday, July 26||Creston to Leon (58 miles)|
|Wednesday, July 27||Leon to Centerville (65 miles)|
|Thursday, July 28||Centerville to Ottumwa (52 miles)|
|Friday, July 29||Ottumwa to Washington (68 miles)|
|Saturday, July 30||Washington to Muscatine (50 miles)|
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710662.60/warc/CC-MAIN-20221128203656-20221128233656-00221.warc.gz
|
CC-MAIN-2022-49
| 1,403
| 10
|
https://codeforces.com/blog/entry/82648
|
code
|
I was wondering, where did this coloring scheme for rank and ratings come from.
Almost all OJs i know, follow the same color gradient which goes from
(and some variations like cyan)
This is used by all popular OJs like Codeforces, Codechef, Topcoder, Atcoder.
Does this coloring has some meaning as well, because all websites are using it.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991772.66/warc/CC-MAIN-20210517115207-20210517145207-00365.warc.gz
|
CC-MAIN-2021-21
| 339
| 5
|
https://www.scienpress.com/journal_focus.asp?main_id=58&Sub_id=IV&Issue=627
|
code
|
In literature, different researchers consistently argue different color models to be the best choice for skin detection. However, to the best our knowledge, no significant work has been reported in the literature that attempted to utilize more than one color model for skin detection and evaluate the performance for identifying adult image contents. In this paper, we propose a rapid statistical framework for skin detection with an application of adult image identification, based on Multicolor Skin Modeling (MSM). From a high level, the proposed approach proceeds in two consecutive steps (levels). At the first step, the underlying goal is to identify and isolate skin regions of interest (ROI) in each image. At the second step, the suspected skin regions are fed into a specialized statistical analyzer which first extracts some statistical features form these regions. Then, an SVM classifier is used on the extracted features to verify the presence/absence of an adult content in images. Quantitative evaluation shows that our method compares favorably with the state of-the-art methods in terms of detection rate and false alarm, while reducing the computational costs by at least a factor of six compared with Forsyth’s method.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946445.46/warc/CC-MAIN-20230326173112-20230326203112-00461.warc.gz
|
CC-MAIN-2023-14
| 1,240
| 1
|
https://www.atmosera.com/blog/proceed-with-caution-windows-phone-8-app-lifecycle-events-vs-async-methods/
|
code
|
“We are on the path to Windows and Windows Phone Convergence” (//Build 2012 – How to Leverage your Code Across WP8 and Win8, Slide 6)
I often hear people saying the phrase “Windows 8 Phone” when they are talking/asking about “Windows Phone 8”. Throughout presentations that I’ve given and other discussions I’ve had over the past several months that covered the topic of Windows Phone 8, I’ve made it a point to emphasize that Windows Phone 8 is NOT a Windows 8 Phone. By doing so I’m not trying to be a nit-picky jerk, but rather I’m trying to underscore that there are important differences – both obvious and subtle – between the Windows Store App and Windows Phone platforms, and there are some major pitfalls that developers can stumble into if they are not aware of the way that some of the key platform technologies work. One situation where these nuanced platform differences comes to light is in differences in the proper use of asynchronous operations within the various lifecycle events exposed by these two platforms; specifically the events pertaining to suspension/deactivation and application closing.
Huh? To put it simply, the APIs available to Windows Store App development include tools that developers can use to safely(*) include asynchronous method calls when their application is being suspended. The Windows Phone 8 APIs that support Deactivation and Closing do not include these tools, and it can be tricky to notice the problems that can arise.
OK… time for some background which should serve to highlight the problem. There are 2 general areas to cover. First, there are the application lifecycles that are exposed by Windows Store and Windows Phone 8 apps. Second, some background as to the nature of the new async/await-based asynchronous programming model needs to be provided.
The Windows Phone and Windows Store Application Lifecycles
Both Windows Phone and Windows Store apps (hereafter WP and WS) feature a lifecycle that is a bit different from that of a traditional desktop application. While desktop apps are allowed to constantly run (and make unfettered use of precious device resources), the execution lifetime of WP/WS apps is primarily(**) limited to only when the app is currently in the foreground. In WP, there’s only one app running in the foreground at a given time, where in WS there are currently at most two, depending on whether one is running in Snapped View. When the apps are either being closed or losing their foreground status, events are provided which allow program code to execute as a result. Note that while this code can delay the related app lifecycle event from completing, they cannot cancel/prevent it – there is no way to prompt the user to ask “are you sure you’d like this to happen? Yes/No?” In fact, there’s also the notion of a “death clock” – the apps have a limited amount of time to execute their cleanup code, or the OS will simply kill the app. With this in mind, it is worth giving strong consideration in WP/WS apps to a “save as you go” approach over the more traditional “save at the very end” approach that was quite common in Desktop apps.
As a simple overview, in WP apps, when a user brings up a different app through the use of one of the device hardware buttons or by responding to a Toast notification or a Reminder, or by switching to another application via a file or protocol association (or one of several other ways), the app enters a dormant state. On its way to this state, the OS gives the app an opportunity to handle a Deactivated event. The app then has 10 seconds to complete any operations, and once execution of this handler has completed, the OS then moves the app along to this end-state. Likewise, when an app is closed by using the Back button from the first page in the app’s backstack, the app can elect to handle a Closing event. Note that the OS may decide to exit a running application that has been deactivated, either due to device memory pressure or if the app is relaunched from the Start or Tile screens, in which case the Deactivated event has been called, but since the app is already dormant, the Closing event will not be called. (App Activation & Deactivation for Windows Phone)
Similarly, in WS apps, when a user brings up a different app through a contract activation (including the Launch contract which occurs when a Tile is clicked form the Start screen), the OS invokes the app-losing-focus’s Suspending event. This event is also raised if the app is being explicitly closed by dragging/swiping from the top of the screen to the bottom, or the OS is rebooting, etc. There is no “dedicated” close method that will be called. (Windows Store App Lifecycle Overview)
In either case, these event handler methods offer the last opportunity for an app to persist user state information to disk, potentially to be re-accessed the next time the app is activated/launched/awakened/etc. Once either the app completes processing these methods or the aforementioned “death clocks” expire, control is returned to the OS to complete its suspension/shutdown operations. (This last sentence is very important.)
The Task Based Asynchronous Pattern and the Async/Await Keywords
One of the core concepts that applies to development with the new Windows Runtime APIs (WinRT) is that any API call that *could* potentially take more than 50ms to complete has been made asynchronous, with no synchronous equivalent. Among other consequences, this continues a trend first seen in other Microsoft APIs of ensuring that developers do not create UI’s that lock up while some long-running operation is underway, and if managed correctly, can make applications seem more responsive than ever before. However, developers who had previously not delved into the nuances of asynchronous programming are now required to do so. To that end, the async and await keywords added to the C# language offer substantial help, but it is still important to understand what’s going on “under the hood.”
A detailed description of how the compiler reacts to async/await in code it encounters is beyond the scope of this article, and a great explanation is available in Chapter 28 of Jeff Richter’s book “CLR Via C#, 4th Edition”. To put it simply, when the compiler encounters an async function, behind-the-scenes it generates a state machine and rearranges the code into various states the state machine manages. The state machine waits for code marked with “await”, and when that code signals as “complete”, the subsequent code is executed, etc. This is the “magic” that allows the code to be written linearly, while still respecting the asynchronous execution.
The following class shows one of the simplest implementations I could think of:
In this case, the compiler loosely interprets the code as the following:
- Start Task.Delay for 1000ms (on another thread), and when it completes, execute DoSomethingElse().
- Then signal the Task (implied if return type is void) that execution has completed.
- If the return type is Task<T>, the function’s return type will be used as the T value.
- While that is going on, go ahead and return control to the calling function
OK…so what’s the big deal? Some readers may have figured it out from the background – don’t worry if you haven’t – some very competent developers have fumbled this pretty badly. The crux of the problem lies when you merge the concept of the applications’ lifecycle closing events with the execution of asynchronous code. Remembering the sentence I called attention to earlier regarding the processing of the Deactivated/Closing events (WP) or the Suspending event (WS):
Once either the app completes processing these methods or the aforementioned “death clocks” expire, control is returned to the OS to complete its suspension/shutdown operations.
But if these methods are made asynchronous using async, the compiler will generate a state machine, moving the execution from the first await forward into alternate threads and returning to the calling method at that point….at which time, the OS will proceed with its suspend/shutdown operations, blithely ignoring whatever may be going on in those other threads. If the asynchronous method in question happens to be a file-save, congratulations! You may have just saved half a file! Or more…or less. (Have you heard the one that goes “Why did the multithreaded chicken cross the road? To other side get to the. Ask me again…”)
This can be seen with the following WP code:
And the following WS code:
In the examples above, the DumpText function may start outputting content to the Debug Window, though it is likely it won’t even get to the first write, and highly unlikely that it will get all the way to 10.
But it Works in Windows Store Apps…
This is partially true. WS apps introduce the concept of “deferrals” at critical places where the OS and asynchronous operations may possibly collide – and it just so happens that suspension is one such critical place. A deferral can be requested from the SuspendingEventArgs that are part of the event handler signature by using the GetDeferral method. When a deferral is requested, the OS will wait for the deferral instance’s Complete method to be called before it proceeds with its normal suspension/shutdown operations***. (Shameless self promotion alert: I discuss this in the “Application Suspension” of Chapter 3 – Application Life Cycle and Storage in my book “Windows Store Apps Succinctly.”) This process is illustrated in the following code, which will successfully get all the way through the desired 10-count:
Great! Now all we have to do is be sure to use deferrals in our Windows Phone Deactivated and Closing event handlers and we’re all set! There’s just one small problem…the DeactivatedEventArgs and ClosingEventArgs provided by those methods have no notion of deferrals…for that matter, WP8 doesn’t have any such notion as a whole. Remember – we are on a path to convergence…we have yet to achieve said convergence.
So what are our options in this situation?
- Use the synchronous WP8 APIs. In the case of storage, the IsolatedStorage APIs that are part of the WP7 SDK are still available in WP8. Since these calls are synchronous, it avoids the whole “I’ve returned from the method but am not done with my work” issue that is at play. However, for code-reuse/compatibility, it isn’t exactly an ideal option (though the lifecycle events are different enough between the platforms that this may not be a big deal) and in general, it feels like a bit of “looking backwards.”
- Though it has been mentioned before, it should be repeated for completeness – it may not be ideal to “wait until done” to persist content to disk, if that is what the desired async operation involved here happens to be. It may be better to pursue an approach that involves “save as you go.”
In the end, I hope that I have illustrated that it is quite important that developers be aware of the nuances of asynchronous code and the problems than can occur if asynchronous code is used in the exit-oriented event handlers in Windows Phone apps. Ultimately, the simplest guidance is to not make these handlers asynchronous until such a point that the Windows Phone API is given its own mechanism – similar to that afforded to the Windows Store API or otherwise- for handling asynchronous calls in its exit handlers.
While async & await are powerful additions to our developer toolboxes, but “with great power comes great responsibility.” It is important to understand their true functionality. A few resources that can aid in such an understanding include:
- Jeff Richter’s afore-mentioned book – “CLR Via C#, 4th Edition”.
- Stephen Cleary’s recent MSDN Magazine article – “Async/Await: Best Practices in Asynchronous Programming”
- Parallel Programming with .NET blog – http://blogs.msdn.com/b/pfxteam/
- Stephen Toub’s article – ‘“Invoke the method with await”…ugh’ deserves special mention.
* I say “safely” with some trepidation – there are a lot of factors that can impede any perceived “safety” when it comes to executing code in these quasi-shutdown methods, and the nature of asynchronous code inherently adds complexity to the number and nature of possible things that can go wrong.
** Another “weasel word” – there are circumstances where these platforms do allow apps (or some limited portion of the app) to run, such as Background Tasks/Agents.
*** Note that deferrals do not stop the “death clock”…the method can still time-out even if a deferral has been requested. The only thing the deferral does is prevent the normal course of completion signaling that otherwise takes place when the method returns to its caller.
The Right Solution for Your Needs.
We deliver a hybrid spectrum of Microsoft Cloud Platform and Azure solutions to government agencies and application developers who demand a modern, open and flexible cloud service platform. We offer trusted, transparent, and secure Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) solutions for production business applications, Business Intelligence (BI), continuous data protection, application availability, test/development, and Software as a Service (SaaS)
Architected to meet your needs.
Operated reliably 24x7x365.
We build solutions to address your individual business objectives with an eye to sustained technology innovation.
We manage the entire lifecycle from start to finish to eliminate surprises and allow you to focus on your services.
We deploy environments which can be managed and maintained for you by our team of experts 24x7x365.
20+ Years of Experience Makes Us a Trusted Partner You Can Count On.
Atmosera backs technology with real humans who deliver experience and unparalleled dedication, resulting in smarter cloud computing investments. We developed a core methodology to ensure we accurately capture your needs and translate them into the best solution possible. This process gives you the peace of mind that your cloud investment will be aligned with the return you seek. We can be counted on to bring our industry experience and real-world best practices to operate Microsoft Cloud Platform and Azure environments.
Rely on our team to map your existing environment to a corresponding Azure cloud.
Easily move from your existing environment to a public or private Microsoft cloud.
Understand how to transform your applications to better take advantage of cloud capabilities.
Our team actively manages all maintenance & optimization to keep your environment running at its best.
Information Security: Protect Your IT with Industry Best Practices.
We provide managed Information Security (InfoSec) and compliance options across the entire computing stack, from connectivity to applications, with stringent physical and logical security controls.
We take on the security and infrastructure concerns by becoming an extension to our customer’s team or their application development vendor. In that partnership, Atmosera shares the responsibility and liability associated with maintaining a secure environment, and stands by that commitment with a guarantee based on the defined lines of responsibility. All Atmosera customers benefit from more than technology by also getting processes, policies, training, and 24x7x365 technical resources. Customers have the peace of mind of knowing an industry expert has performed a thorough risk assessment, identified a remediation plan and provided ongoing audit support to ensure customers stay secure. Best of all, Atmosera understands this level of service is, and will continue to be, required year after year.
Disaster Recovery (DR) & Data Protection
Secure Networks including Firewalls & DDOS Mitigation
Why Microsoft Cloud Platform and Azure?
Microsoft has made major strides in the public cloud space over the past few years. They are gaining market momentum with companies and also the analysts community who recognize the more than USD15B investment made. At this point Azure has more data centers than AWS and Google Cloud combined. It spans an unparalleled global reach with 36 regions available and more being added. Azure offers companies wanting to put workload in the a public cloud with a secure, scalable and competitive option.
The Power of Microsoft’s Hybrid Cloud Platform.
Microsoft is the only hyperscaler to offer a true hybrid cloud solution with the flexibility to run applications using private or public clouds — and the ability to move between them. Atmosera has the skills and expertise necessary to help architect, deploy, and operate integrated hybrid cloud solutions based on the Microsoft Cloud Platform and microservices. This offers our customers a unique set of capabilities and flexibility when planning out their cloud journey.
Azure Certified for Hybrid Cloud.
Atmosera has developed core competencies and intellectual property to take full advantage of all Azure has to offer. All Atmosera Azure services receive the “Azure Certified for Hybrid Cloud” designation which confirms it passed Microsoft’s rigorous validation process under the Cloud OS Network (COSN) program. Customers benefit from knowing that their solution was carefully planned and executed using best practices and proven methods.
Microsoft Azure Government.
Starting in June of 2017, Microsoft opened up their Microsoft Azure government regions to partners. Atmosera was one of the first Microsoft Cloud Solution Provider (CSP) to be approved to deploy qualified government customers in these dedicated regions.
Azure Government offers world-class security and compliance for US federal, state, local, and tribal government agencies and their partners. It provides an environment for government-only workloads which is operated by screened US citizens. Customers can choose from six data center regions with DoD Impact Level 5 Provisional Authority (PA) including two dedicated regions for US Department of Defense workloads. Environments can leverage hybrid flexibility by maintaining some data and functionality on-premises. Azure Government also offers the most certifications of any cloud provider to simplify critical government compliance requirements.
Azure Government regions where Atmosera can deploy customers include the following six locations:
- US Gov Virginia
- US Gov Indiana
- US Gov Arizona
- US Gov Texas
- US DOD East
- US DOD Central
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00595.warc.gz
|
CC-MAIN-2022-33
| 18,607
| 73
|
https://blog.lawrencemcdaniel.com/how-to-customize-the-login-behavior-of-open-edx/
|
code
|
Why is your code added to “common”?
Common is a Django project that is fully contained within the edx-platform repository. It contains a set of Django apps that are shared between Course Management Studio (cms) and the Learning Management System (lms). Note that the edx-platform repository contains four distinct Django projects: cms, common, lms, and openedx. Strictly technically speaking, you could place your custom Django app in any of these four. So, why did we choose “common”?
At the risk of over-complicating matters, there is a fifth option which I actually prefer above these four obvious possibilities, which is to bundle your code as a standalone git repository that is added to requirements.txt and installed by pip. We ignore this possibility in this tutorial solely because it requires a deep understanding of pip as well as some subtleties of how the developers at edX go about managing the sizable number of dependencies in the Open edX project.
We chose “common” because it is in the application search paths of both lms and cms. Though unimportant for purposes of this tutorial, this could turn out to be helpful for other future custom programming tasks.
We avoided “openedx”, which for avoidance of any doubt, is also in the search paths of lms and cms, but which contains a more complicated file system structure that potentially adds a bit more complexity to how we might have to address and import our custom code.
The actual source code in Github includes a namespace. This is important.
In my forked repository of edx-platform the actual address to the custom Django app is
common.djangoapps.lawrencemcdaniel.custom_login.apps.CustomLoginConfig, which includes the name space “lawrencemcdaniel”. Consolidating all of your custom Django apps inside your own name space is an important strategy for avoiding future naming collisions in future releases of Open edX software.
Why use Django Dispatch rather than creating a custom user model, which is exactly what Django suggests in their documentation?
Yeah, great question! why not just do what Django tells you to do in their official documentation?
Django provides a way customize authentications, by creating a custom user model. So, why not do this? The short answer is that edX has already done this, by implementing the “student” Django app which is also their alternative Django user model. Thus, in Open edX software all users (learners, instructors, staff, admins) are “student” regardless of whether or not that’s true in real life.
The first problem with subclassing edX’s subclass of the Django user model is that your new code would touch literally every part of the Open edX code base, not only in lms but also cms. Thus you would need to exhaustively test every line of edx-platform just to determine if your custom subclass of “student” breaks anything in the current code base (which it very likely would). But then you would also have to re-test just as exhaustively for all future releases of the software, and you would run the same high risk of your custom user model breaking future code as well.
So, the longer answer is that this approach is bad risk-reward.
My learners authenticate via oAuth and third_party_auth provides a way to customize authentications via pipeline.py
If you’re already familiar with how pipeline.py works, why not put your customization there? The problem with pipeline.py is that it is only called in the cases where authentication occurred via some form of third party authentication. Your code will be skipped entirely if users authenticate with a username and password.
Implementing your customized login via Django Dispatch Signals ensures that it is applied to all users in all authentication scenarios.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710808.72/warc/CC-MAIN-20221201085558-20221201115558-00767.warc.gz
|
CC-MAIN-2022-49
| 3,771
| 16
|
https://infoscience.epfl.ch/record/169247
|
code
|
Standard digital cameras are sensitive to radiation in the near-infrared domain, but this additional cue is in general discarded. In this paper, we consider the scene categorisation problem in the context of images where both standard visible RGB channels and near infrared information are available. Using efficient local patch-based Fisher Vector image representations, we show based on thorough experimental studies the benefit of using this new type of data. We investigate which image descriptors are relevant, and how to best combine them. In particular, our experiments show that when combining texture and colour information, computed on visible and near-infrared channels, late fusion is the best performing strategy and outperforms the state-of-the-art categorisation methods on RGB-only data.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038862159.64/warc/CC-MAIN-20210418224306-20210419014306-00554.warc.gz
|
CC-MAIN-2021-17
| 803
| 1
|
http://www.parasql.eu/blog/new-in-release-48-march-2017
|
code
|
- Report Option Allow Multiselect. A Report can now optionally display check boxes to allow the user to select multiple rows; enable/disable via Options > Allow Multiselect on the tool bar. Which rows are selected can be determined via a new API method parasql.schema.DataRow#getIsSelected. Currently this feature is only useful in conjunction with the API.
- Miscellaneous bug fixes and smaller improvements.
The Cloud Platform for Rapid Enterprise App Development !
ParaSQL Integration Servers
ParaSQL for Azure SQL Database
ParaSQL for MS SQL Server 2016
ParaSQL for SalesForce
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934803848.60/warc/CC-MAIN-20171117170336-20171117190336-00076.warc.gz
|
CC-MAIN-2017-47
| 580
| 7
|
https://www.thecryptidfactor.com/collections/cryptid-buddies-collection/products/cryptid-buddies-poster
|
code
|
I know you've always said that it's your dream to have a bunch of awesomely designed cryptids, and your favourite podcasters, looking down at you from your chosen location. Well, we've made that dream come true. You're welcome!
Designed by the wonderful Cassie Hart (Check other works out at https://www.blackxrabbit.com/)
• Hangers made from natural wood
• Hanger piece thickness: 0.2″ (0.5 mm)
• Hanger piece width: 0.79″ (2 cm)
• Paper weight: 192 g/m²
• Poster secured by magnets
• Comes with a matching string
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511361.38/warc/CC-MAIN-20231004052258-20231004082258-00613.warc.gz
|
CC-MAIN-2023-40
| 531
| 8
|
http://ckmky.com/the-specified/help-the-specified-module-cannot-be-found-exception-from-hresult.php
|
code
|
I turned off my computer for my sons laptop now. Any help regarding all or any of but was re-starting often .. If so, II am notto second slot and tried but its not starting..
I have a couple of things but does anyone have a suggestion? Are you sure?? > Even their web site cannot useful reference for my system? be Dumpbin Tool NB: I have updated the and then the next, this happens. Otherwise my other thought is kinda annoying cannot like it will work?
But was working fine ,so i 80C = 176F Extract the zip and burn the iso. They are probably the most drive spin up, but nothing on monitor! I tried hooking up another monitor to specified didnt bother Suddenly yesterday..Does this MBO require a master disk and the same thing happens.
It did this several to boot it up in two different computers. What are your graphic card temperature parameters per manufacturer? BIOS to the latest version (4.0). The Specified Module Could Not Be Found Exception From Hresult 0x8007007e In C# You make it sound from good power supply, good choice.When connected, they won't allow me to getcorrected the issue.
That is a very That is a very It is randomly freezing while issue with my computer...It was working one minutea shop to have them install it for me?Now it has only done it a I have two western digital hard drives.
Already it has dropped to 76°C CPU just from not from well known power-house computer manufacture.I'm so confused Corsair - The Specified Module Could Not Be Found Exception From Hresult Vmware slave drives using cable select.I could probably run things up for me. Purchased SATA drive....tried booting, can hearread this it would be very much appreciated!
So did you plug in the 8 pin power connector to the MB? found with Windows as the manager.Even after leavingmind going ahead..Checked the RAM slot and infact changed it found couple of times in the last several days.I've seen quite a few threads from searching http://ckmky.com/the-specified/tutorial-the-specified-module-could-not-be-found-oci-dll.php Hi friends, i have recently installed a game in my pc.
Second, how would I go about having any discs but blank ones.It started happening some time ago but iton and turning off all by itself. Will this work try here playing and lisning to music.So i didnt exception cpu ..
The first time I did that, I was tried to find the link to introduce myself, and couldnt. I do not havetimes in a short period.Nothing I didelse have any suggestions?I have tried one of them as a it so, I know it's not the lcd.
If Anyone Could take their time andwould suggest checking out Alienware (http://www.alienware.com).I then turn it back on and as hot and it kinda smells like burning plastic. Check out their M17X laptop Asp.net The Specified Module Could Not Be Found. (exception From Hresult: 0x8007007e) if my room mates wana turn it on.I am using separate Graphics card to boot??
Change your bios to boot from CD-ROM. get redirected here press either crtl-alt-delete or the windows button.I don't believe this is the 'squeal of http://stackoverflow.com/questions/2066180/the-specified-module-could-not-be-found-0x8007007e you will possibly get more useful error messages.I set one to slave and attempted the suggestions please give me a heads up.I also noticed the power supply is verygoogle but the people have never posted the solution.
On BOTH computers, it causes them to different friends with ATT service. Specified on my laptop when this happened.Made sure MBO from could be only coincidense but now its becoming impossible.So, I can't even see issue at any other time?
Thanks in advance! Imy computer overnight.Both are set ashave two other questions.Noticed reference toable to help, please feel free to comment.It started about 7 days ago thatGraphic card in manual!
I opened the Get More Info best buy that would be better?Today while i was seeing a moviea higher speed in the house.Laptop technicians have had a it needs only 256mb RAM. The game min requirements says Unable To Load Dll The Specified Module Could Not Be Found Dllimport hang after the memory count (detecting IDE drives).
Yet I play crysis which usually steadies these questions will be very, very much appreciated. Or should i travel arounda bit and turned it back on.Cumps. some could help me please? I pin power supply to CPU".....am I missing something?? It was working finethis card my scrolling, typing, mouse clicks, etc.
Does this sound A couple things > 54K?? If you know of aable to get back to my home screen. cannot Here is my problem, ever since I installed Unable To Load Dll The Specified Module Could Not Be Found 0x8007007e soon as that happens it turns right off. the It continues to do that until I cannot and all of the upgrade options.
Do you get these look at it to no avail. I have ananything anymore on my screen. If thats even possible or any other Visual Studio Dependency Walker , 512 mb DDR RAM ,80GB HDD..If you turn off the automatic reboot, then from for a better power supply? from
Thanks Hi Trafficflow doing anythign strenuous. The problems were occurring in both operating systems. Any ideas or tell melike it is constant. It did the same thing of turning75c and it crashes within 5 minutes. I know it could be a number death' and it only occurs on select games.
That really cleared HP Pavilion dv6700nr laptop. My configuration is Intel P4, 2.66Ghz processor 3 versions of this game. Originally, I wasn't really doing much not shorted to metal!Someone else on here mentioned "connecting 8 650W ATX CPU Power SupplyClick to expand...
Or would I have to take it to my computer would just restart by itself. At least I will have from my favorite serie it freezed 3 times... Any answers or other recommendations from states the starting speed at 1.5Mbps > btw..So, I went keyboard with a power up feature...
Im having an if I am off base. On that, does anybody very technically advanced. The netopia adapter works really good the graphics card that I purchased separately installed?So, if you have anything that may be into the BIOS in order to get them detected.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158001.44/warc/CC-MAIN-20180922005340-20180922025740-00518.warc.gz
|
CC-MAIN-2018-39
| 6,084
| 21
|
http://fajiao.xyz/archives/50
|
code
|
Incrediblenovel Chaotic Sword God online – Chapter 2703 – A Mysterious Person form surprise share-p3
the pearl of love pdf
Novel–Chaotic Sword God–Chaotic Sword God
hot money flows
Chapter 2703 – A Mysterious Person dirty jumpy
It felt like a thing in the rainwater had suddenly vanished.
The illusionary mankind hovered during the air and looked in Jian Chen’s path. He looked for you to view the physique who had returned to the rear of the eagle a hundred kilometres absent.
“I actually infected my personal persons. H- how have I find themselves accomplishing such as that?”
“I actually attacked my own people today. H- how did I turn out performing something such as that?”
Nonetheless, if this were definitely all guy-manufactured, just who will hold the capability to trick his perception worldwide on the Fallen Monster that only permitted those below a thousand years old to get in?
Whether or not this were a person from the Darkstar race, the most robust would basically the Darkstar Emperor. While he may not be the Darkstar Emperor’s rival should they started dealing with, Jian Chen was confident that the Darkstar Emperor would not be able to cover up everything from him.
Even so, the minute the rainwater joined Jian Chen’s hands, he frowned.
“W- what performed I actually do just then?”
“That’s ideal, that’s appropriate. Regardless of whether you will find big matters that we have to attend to, we ought to stick them aside by leaving in this article initially. The disturbance earlier on was so fantastic which it must have alarmed Life-devouring Beasts from the extended distance. There can be an excellent swarm of these hurrying over here at the moment. We should instead go immediately.”
Jian Chen suddenly begun to fade. He started to be translucent, and his awesome physique developed fainter and fainter. In mere five moments, he possessed vanished fully.
When he vanished, the eagle beneath him glanced backwards. There is some confusion and stress within its dreary vision because it could sense that Jian Chen was still sitting on it, except for it may no more see him.
“W- what managed We do just then?”
He appeared to be scornful towards Infinite Primes, completely appearing down on them.
“Jian Chen, this saint has heard of you very often from Heartless. Seeing that I’ve viewed you, you probably may have some extraordinary parts. Naturally, you are in the position to sensation what’s with the rain. However, so what if you can make it happen? How would a mere Unlimited Prime just like you see through my approaches when I personally get it done?” The illusionary mankind murmured to himself while he stared at Jian Chen. There was clearly gratitude in his overall tone but scorn likewise.
the conflict of religions in the early roman empire
“The wonderful ceremony from the Darkstar race is going to commence. The wedding ceremony cannot be a success. Whether or not this ended up just Jian Chen, I would still be just a little anxious, although with you, there’ll be a much increased probability at disrupting the wedding.”
A number of them got families, spouses, or clans. That they had only devoted themselves to a real resistant induce because of the situations, offering themselves into the maximum clans. They trapped themselves in slavery and ended up raised via the clans as sacrificial members of the military with Hundred Tribulations Godking Drugs.
As he vanished, the eagle beneath him glanced in reverse. There was clearly some confusion within its boring view as it could feeling that Jian Chen was still sitting on it, except it may possibly no longer see him.
Not alone would they be meant for death, but even their family and clans would experience deterioration.
It experienced like one thing throughout the rainwater got suddenly vanished.
Jian Chen’s eye shone as his vision grew to become piercing. It looked like he wanted to see over the droplet of water and understand the tricks that this was concealed.
On the other hand, what he failed to comprehend was that whenever the precipitation was all-natural, why would there be this kind of coincidence? Why do the wondrous chemical in the bad weather suddenly vanish as he wished to check the precipitation? Furthermore, why made it happen need to use the rain to be a handle?
“W- what does I truly do just then?”
superfreakonomics chapter 3 summary
Everyone’s hearts and minds tightened when that has been described. The prodigies mentioned practically nothing more and immediately reorganised their organizations before hurrying out of.
lords of the wildwood community tea rooms
As he vanished, the eagle beneath him glanced backwards. There was clearly some misunderstandings within its boring vision given it could sensation that Jian Chen was still sitting on it, except for it could actually will no longer see him.
“The great wedding service with the Darkstar race is going to get started. The service cannot be a success. If it had been just Jian Chen, I might continue to be just a little worried, though with you, there’ll be a level larger possibility at interfering with the service.”
When he vanished, the eagle beneath him glanced in reverse. There seemed to be some confusion within its boring eyeballs simply because it could good sense that Jian Chen was still sitting on it, except it could not anymore see him.
“Have mercy, small learn. I had no alternative sometimes. I had totally shed charge of myself…”
The sacrificial troops all begun to plead with and plead. They had been not terrified of loss of life as they could only survive for yet another century at the most. It was actually mostly because of the individuals they had been placed on.
Later on, the illusionary man gazed in the direction of Jin Hong’s party once again and murmured, “You could be weaker, unable to produce a single influx from the Saints’ Society, but the truth is have enough toughness to become helped by provision from the Darkstar race. The formations constructed from the sacrificial troops could even unleash the strength of Initially or Next Heavenly Tier Endless Primes. It is enough to make a surprise one of many Darkstar race.”
kiwanis carefree scholarship
Jian Chen experienced used the Legislation of Room or space to meld in to the room there. Afterwards, he showed up right before a sacrificial soldier one hundred kilometres apart. He gently brushed the sacrificial soldier’s the shoulders in reference to his hidden fingers, along with the rainwater on him immediately vanished, ending up with Jian Chen.
Having said that, as soon as the rainwater inserted Jian Chen’s arms, he frowned.
When it were somebody from the Darkstar competition, the most potent would fundamentally be the Darkstar Emperor. Though he most likely are not the Darkstar Emperor’s challenger as long as they set about struggling, Jian Chen was confident that the Darkstar Emperor would struggle to disguise everything from him.
all summer long release date
Having said that, following the course this time around, none of us dared in order to save energy anymore. Each of them cloaked themselves in power to stop the mist.
The illusionary male hovered from the surroundings and checked in Jian Chen’s route. He seemed in order to start to see the number which had delivered to the rear of the eagle 100 kilometres aside.
“W- what managed I really do just then?”
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949331.26/warc/CC-MAIN-20230330132508-20230330162508-00014.warc.gz
|
CC-MAIN-2023-14
| 7,455
| 45
|
https://community.expensify.com/discussion/5082/how-to-add-categories-individually
|
code
|
How-to: Add categories individually
To add your categories one by one, simply go to Settings > Policies > Group > [Policy name] > Categories
This can also now be done on the mobile app.
- Tap the three bar menu icon at the top left corner of the app
- Check to make sure that the default policy is set to the policy you'd like to make category changes to. If not, tap and re-select the correct policy.
- Tab the Edit button to the right of the policy
- Tap Categories.
- Add the category using the + button.
- Tap the Add button.
You can also delete a category by swiping left, or tap a category name to edit it.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474843.87/warc/CC-MAIN-20240229134901-20240229164901-00723.warc.gz
|
CC-MAIN-2024-10
| 612
| 10
|
https://forums.att.com/conversations/att-mail-setup/sick-of-yahoo-mail/629e7f2c0dfbd45747918070
|
code
|
Sick of Yahoo Mail
I am sick and tired of Yahoo Mail after many years of good email service. Lately, if I don't logoff, and I come back to my computer, my emails do not load, and if I go to my folders, it tells me they are empty. I have to logoff, then logon again, and then it works. What other email providers are there where I can keep my pacbell.net domain?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570741.21/warc/CC-MAIN-20220808001418-20220808031418-00292.warc.gz
|
CC-MAIN-2022-33
| 361
| 2
|
https://greasyfork.org/en/users/5920-rickzabel
|
code
|
WME Maximized (Basic rickzabel edits)
Modifies the Waze Map Editor layout to provide a larger viewing area for editing, adds additional navigation links to menu, and prevents Place Update and UR panels from dropping below visible area.
Userscript to change the width of the flash element that passes data to the flash element that shows the preview. You might have to visit the page as https in order for this to work. I know this is dumping errors into the log, i am hoping that they will fix the site and this script wont be needed
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986676227.57/warc/CC-MAIN-20191017200101-20191017223601-00283.warc.gz
|
CC-MAIN-2019-43
| 533
| 3
|
http://www.prasannatech.net/2010/12/stripping-comments-xml-file.html
|
code
|
In this post, we will see how to strip comments from an XML file from an UNIX shell through the use of sed command, I am writing this because recently I was developing an XML parser to parse XML content and the problem is that the contents gets parsed irrespective of whether it's commented out or not, therefore the best way to avoid that is to strip comments before parsing the XML, after some research, I found the following sed command which will do the trick.
cat <XML_file> | sed 's/<!--.*-->//' | sed '/<!--/,/-->/d'
The code has two piped sed commands, the first sed command
sed 's/<!--.*-->//' - Matches all single line comments and substitutes them with a null character, I can't use sed delete option here because in a single line when you have uncommented XML content, it will also get deleted along with the comment when you use delete option, to prevent that, use sed subsitutes, the only disadvantage with this approach is that a commented line won't be deleted, but the comments will be.
The second sed command sed '/<!--/,/-->/d' follows the multi-line sed syntax where we match a start pattern and an end pattern and delete all lines from the line in which the start pattern is matched till the line in which the end pattern is matched.
So simple isn't it!
<!-- Sample XML to show XML comment stripping -->
<tag1>tag1name</tag1> <!-- I am tag 1 -->
<!-- Commenting out tag 2 to tag 3
<!-- This is tag 4 -->
$ cat sample.xml | sed 's/<!--.*-->//' | sed '/<!--/,/-->/d'
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121153.91/warc/CC-MAIN-20170423031201-00302-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,485
| 11
|
https://aarsh.dev/tag/published/
|
code
|
You probably have heard about it, wherever there is a talk about big data the name eventually comes up. In layman’s words Apache Spark is a large-scale data processing engine. Apache Spark provides various APIs for services to perform big data processing on it’s engine. PySpark is the Python API, exposing Spark programming model to Python applications. In my previous blog post, I talked about how set it up on Windows in my previous post. This time, we shall do it on Red Hat Enterprise Linux 8 or 7. You can follow along with free AWS EC2 instance, your hypervisor (VirtualBox, VMWare, Hyper-V, etc.) or a container on almost any Linux distribution. Commands we discuss below might slightly change from one distribution to the next.
Like most of my blog posts, my objective is to write a comprehensive post on real world end to end configuration, rather than talking about just one step. On Red Hat 7, I ran into a problem. I solved this problem without having to solve it.
Linux (I am using Red Hat Enterprise Linux 8 and 7)
Anaconda or pip based virtual python environment
I have broken out the process into steps. Please feel free to skip a section as you deem appropriate.
Today, I want to share a utility program I built. This little program, takes subtitle files, and spits out a nice crisp paragraph. I tested this program with a directory containing subtitles of 2 movies, and on the 8th second, I was looking at their transcripts. To test the file I/O operation, I took transcripts for a graduate level computer science course. It was organized in sections and sub-topics, totaling about 200 small clips. Within 3 seconds, I had my class notes, which I could use to share with a class, highlight important things being said in the lectures without typing a word!
One more thing, it is free and open-source, you can literally clone it and start using it right away.
Few days back I started working on a utility project called Team Foundation Dev Tools ( http://ablaze8.github.io/TeamFoundationDevTools/ ). The goal is to extend the TFS api and serve some unmatched features like searching entire TFS server for some file and/or file path ( wild card and exact search ), commits by a specific user to any and/or project among all projects of a TFS server and such.
I’m not planning anything serious with it, just trying to build something I always wanted to see in an ideal TFS tool.
This is an open source tool and also supports .NET 3.5 & 4.5.2 so it’s compatible all the way back to Visual Studio 2008 running on Windows XP … up until latest and greatest !
The main reason for preparing such a handy book is to give, to the point and specific guide to the reader. I’ve searched a lot for such a manual when I was creating my own live operating system: “Linux Spark” but every time I read from any resource I found either something missing or something too technical. This book will help you, whether you are an experienced guy, Administrator, newbie or just a student finding some quick reference manual with its lucid and simple language. This book is ready for you to go to the terminal and just start commanding your UNIX/Linux system !
Your suggestions, comments and guidance are gladly accepted. It’s my strong wish that you share this book with more and more people who are really interested, because I firmly believe that the knowledge is free and to get some definitive guide exactly when you need … Should feel like magic!
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711396.19/warc/CC-MAIN-20221209112528-20221209142528-00519.warc.gz
|
CC-MAIN-2022-49
| 3,465
| 12
|
https://ez.analog.com/data_converters/precision_adcs/f/q-a/24198/ad7091r-8-reading-conversion-result/152510
|
code
|
how to get the READING CONVERSION RESULT?
1.as the datasheet Figure 55-56,
first, wirite the CHANNEL REGISTER, (0xFF enable all channel ) or every latency of one conversion write a new vaule
(0x0001,0x0002,0x0004.......) ,but the SDO always 0.
2. To read the CHANNEL REGISTER,the next conversion get the data i write.
Thanks for the captures.
Now, I think AD7091R-8 does not start conversion with the /CONVST pusles. The cause may be AD7091R-8 doesn't recognize the /CONVST or AD7091R-8 gets latch-up in some state.
I saw the power supplies VDD=5V takes about 50ms and VDrive taks about 40ms to ramp up. It is kind of slow.
Could you try another power supply with faster ramping up speed, like 10ms, to do the test again ?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704821253.82/warc/CC-MAIN-20210127055122-20210127085122-00491.warc.gz
|
CC-MAIN-2021-04
| 722
| 9
|
https://jaredrhodes.com/2019/01/29/authoring-for-pluralsight-microsoft-azure-cognitive-services-text-to-speech-api/
|
code
|
I’m excited to announce that I am authoring another course for Pluralsight. This course targets software developers who are looking to get started with Microsoft Azure Cognitive Services: Text to Speech API to build modern AI solutions and want to get started building an AI solution with a simple REST interface. This course continues from the other Cognitive Services courses created and being created for the Cognitive Services track.
Contoso is an insurance company that has decided to integrate text to speech for multiple consumer facing applications. This course will take a look at utilizing the following features of Cognitive Services – Text to Speech API:
- Creating custom voice fonts
- Popular scenarios and use case for Text to Speech
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100739.50/warc/CC-MAIN-20231208081124-20231208111124-00439.warc.gz
|
CC-MAIN-2023-50
| 752
| 4
|
http://cowboyszone.com/forums/showpost.php?p=4413975&postcount=10
|
code
|
Originally Posted by realtick
No need to tell me, I like Barron. Not at #14, but I would consider him later if the right opportunity presented itself.
Barron is a playmaker:
34 passes defensed
For comparison, here's Markelle Martin's numbers (4-years too):
39 passes defensed
Just re-emphazing your point.
Garrett to players: Make today a great day; go about the business of winning! If you can't keep up then don't step up.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698090094/warc/CC-MAIN-20130516095450-00065-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 424
| 8
|
https://www.justfactsdaily.com/question-of-the-day/291389
|
code
|
What portion of all murder victims in the U.S. are comprised of the 13% of the population that is black?
In 2016, roughly 53% of all murder victims were black, and 4 percentage points of these black victims were killed by whites. In comparison, about 44% of all murder victims were white, and 9 percentage points of these white victims were killed by blacks. Both of these interracial murder rates have varied by less than 3 percentage points over the past half century. In other words, the vast majority of murders involve people of the same races killing each other. There are about 15,000 murders and 6.9 million violent crimes per year in the U.S., and to make sweeping accusations like "systemic racism" based on a small portion of these cases exploits the statistical fact that anecdotes can be highly deceitful and the psychological fact that people are easily misled by them because it's easier to grasp stories than data.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710685.0/warc/CC-MAIN-20221129031912-20221129061912-00463.warc.gz
|
CC-MAIN-2022-49
| 930
| 2
|
https://topwizprogramming.com/freecode_dynamicmenus.html
|
code
|
All examples include a PB10.5 version and most have a PB12.6 version. The PB12.6 versions are verified to work in 64bit. PowerServer doesn't support the longptr type so you must use the PB10.5 version in that environment. If one of the examples doesn't work correctly, please contact me first before posting to the Appeon user forum or bug tracking system.
Before downloading one of the free code examples, please review the license terms here. If you find this code really useful and would like to donate, click the PayPal button in the upper right corner.
Click here to download an installer for all the free code samples: WebExamples
This program shows how to dynamically add menu items.
To use it in your application, copy m_dynamicitem and n_dynamicitem to a library in your target and an instance variable to your menu object. Then add a function to your window that is called by the clicked event in m_dynamicitem.
——— Last updated 02/14/2019 ———
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446709929.63/warc/CC-MAIN-20221126212945-20221127002945-00548.warc.gz
|
CC-MAIN-2022-49
| 965
| 6
|
https://tank.peermore.com/tanks/tank-notes/ExposeAPILinks
|
code
|
Drop binaries into your tank here.
I think it would be nice for pages that are representations of core API resources to provide an indication/link to the API's representation, somewhat like the r-links stuff that was done for early TiddlySpace.
- What were r-links? A quick google search didn't reveal anything. @remuse
Sorry, my memory got the name wrong -- @cdent
This would be something subtle, probably driven by link rels like the serendipitous browsing links.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655143.72/warc/CC-MAIN-20230608204017-20230608234017-00605.warc.gz
|
CC-MAIN-2023-23
| 465
| 5
|
https://community.articulate.com/discussions/articulate-storyline/changing-transitions-on-slide-layers
|
code
|
Changing Transitions on slide layers
I have a custom navigation on my slides (prev, next). If the user clicks next, the transition for the slide pushes right -->, then shows the next slide.
What I'd like to do is have the transition reverse or push left <-- when the user clicks previous.
Does anyone have any idea how to do this? I wonder if there is a way to assign a trigger that basically states
- If user is on slide #2 and clicks the previous button to return to slide #1, first
- Check to see if slide #1 has been visited if so (not sure if this is necessary, but maybe something to do with states?)
- Hide the base layer
- Show the layer that will push left when timeline starts
Is this possible?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662604794.68/warc/CC-MAIN-20220526100301-20220526130301-00709.warc.gz
|
CC-MAIN-2022-21
| 704
| 9
|
https://www.forestry.gov.uk/fr/infd-5vthg3
|
code
|
As a government website, our site must deliver up-to-date information to as many users as possible.
To ensure this happens, the site has been built using government guidelines and specific standards. That means that all core information is easily accessible by:
- People with older systems or browsers
- People with a slow internet connection
- The visually impaired
- People with other difficulties.
The standards used mean that:
- All core information is text based
- The information is in web standard formats (e.g. HTML and PDF)
- All file sizes are kept as small as possible
- Pages are usually no more than two to three screens long (about two printed sheets of A4)
- All text should be easily read
- The navigation is clear and easy to use
- Any plug-ins required are available for free
- The site is useable with images turned off
- The site should look the same on different systems and browsers.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119642.3/warc/CC-MAIN-20170423031159-00371-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 905
| 16
|
https://internet-salmagundi.com/2019/05/modern-debugging-the-art-of-finding-a-needle-in-a-haystack/
|
code
|
Contributed Articles: “Modern Debugging: The Art of Finding a Needle in a Haystack”
Communications of the ACM, November 2018, Vol. 61 No. 11, Pages 124-134
By Diomidis Spinellis
The computing pioneer Maurice Wilkes famously described his 1949 encounter with debugging like this: “As soon as we started programming, […] we found to our surprise that it wasn’t as easy to get programs right as we had thought it would be. […] Debugging had to be discovered. I can remember the exact instant […] when I realized that a large part of my life from then on was going to be spent in finding mistakes in my own programs.”
Seven decades later, modern computers are approximately one million times faster and also have one million times more memory than Wilkes’s Electronic Delay Storage Automatic Calculator, or EDSAC, an early stored-program computer using mercury delay lines. However, in terms of bugs and debugging not much has changed. As developers, we still regularly make mistakes in our programs and spend a large part of our development effort trying to fix them.
Moreover, nowadays, failures can occur nondeterministically in nanosecond time spans within computer systems consisting of thousands of processors spanning the entire planet running software code where size is measured in millions of lines. Failures can also be frighteningly expensive, costing human lives, bringing down entire industries, and destroying valuable property.22 Thankfully, debugging technology has advanced over the years, allowing software developers to pinpoint and fix faults in ever more complex systems.
On the Shoulders of Colleagues
The productivity boost I get as a developer by using the Web is such that I now rarely write code when I lack Internet access. In debugging, the most useful sources of help are Web search, specialized Q&A sites, and source-code repositories. Keep in mind that the terms of a programmer’s work contract might prohibit some of these help options.
Tuning the Software-Development Process
Some elements of a team’s software-development process can be instrumental in preventing and pinpointing bugs. Those I find particularly effective include implementing unit tests, adopting static and dynamic analysis, and setting up continuous integration to tie all these aspects of software development together. Strictly speaking, these techniques aim for bug detection rather than debugging or preventing bugs before they occur, rather than the location of a failure’s root cause. However, in many difficult cases (such as nondeterministic failures and memory corruption), a programmer can apply them as an aid for locating a specific bug. Even if an organization’s software development process does not follow these guidelines, they can be adopted progressively as the programmer hunts bugs.
Making the Software Easier to Debug
Some simple software design and programming practices can make software easier to debug, by providing or configuring debugging functionality, logging and receiving debug data, and using high(er)-level languages. Again, a programmer can selectively adopt these practices during challenging bug-hunting expeditions.
Insights from Data Analytics
Data is the lifeblood of debugging. The more data that is associated with a failure, the easier it is to find the corresponding fault. Fortunately, nowadays, practically limitless secondary storage, ample main memory, fast processors, and broadband end-to-end network connections make it easy to collect and process large volumes of debugging data. The data can come from the development process (such as from revision-control systems and integrated development environments, or IDEs), as well as from program profiling. The data can be analyzed with specialized tools, an editor, command-line tools, or small scripts.
Getting More from a Debugger
Given the propensity of software to attract and generate bugs, it is hardly surprising that the capabilities of debuggers are constantly evolving.
Debugging Distributed Systems
Modern computing rarely involves an isolated process running on a system that matches a programmer’s particular development environment. In many cases, the programmer is dealing with tens to thousands of processes, often distributed around the world and with diverse hardware ranging from resource-constrained Internet of Things (IoT) devices, to smartphones, to experimental and specialized platforms. While these systems are the fuel powering the modern economy, they also present programmers with special challenges. According to the insightful analysis by Ivan Beschastnikh and colleagues at the University of British Columbia, these are heterogeneity, concurrency, distributing state, and partial failures.4 Moreover, following my own experience, add the likely occurrence of events that would be very rare on an isolated machine, the difficulty of correlating logs across several hosts,2 and replicating failures in the programmer’s development environment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100540.62/warc/CC-MAIN-20231205010358-20231205040358-00672.warc.gz
|
CC-MAIN-2023-50
| 5,000
| 18
|
http://forums.xbox-scene.com/index.php?/topic/546882-help-me-plz-im-noobie/
|
code
|
Help Me Plz I'm Noobie!
Posted 11 September 2006 - 12:32 AM
i have 200gb hd, installed in 1.6b xbox with executor 2.6ce and EvoX M8 Plus v1.6 ....
is there a difference between let partition 6 take the rest of hard drive or partition 6 take 137 partition 7 takes the rest?
it works fine but only show 137gb...what can i do to get 200gb ?
is it ok to reflash again with EvoX M8 Plus v1.6 Stealth 137 GB+
hellp me plz.....thanks a bunch !!!
Posted 11 September 2006 - 01:55 AM
With a 200GB just use .06
Your Evox bios might not be patched for LBA yet (the above .06/.67 thing). You shouldn't be using an Evox bios with your chip either (not hurting it, but the Xecuter 5025 bios is much better). Up to you though.
It's okay to reflash, or better yet just flash to ther other bios bank on your X2.6
Posted 11 September 2006 - 03:19 AM
Thanks a bunch to Xombe !!!
you're so cool
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448399326483.8/warc/CC-MAIN-20151124210846-00016-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 946
| 16
|
https://www.fishbowlapp.com/post/what-are-the-responsibilities-of-data-scientist-orpheus-mckinsey-do-they-develop-complete-product-i-mean-they-also-do
|
code
|
Trying to formulate my top ~5 list of buyout shops to pursue heavily. I’m at BB IB (not GS/MS) on West Coast, and I am not interested in getting an MBA. Any respectable firms that you know of that don’t ram MBA down your throat? I’m not going for MF. TIA!
How does everyone stay organized especially during busy season with all the workpapers, requests to client, and little things that are asked of you?
I had the salary discussion with Infosys
Though I had a high CTC in my hand, they are not willing to give my expected CTC .
Infosys is offering 13lpa as a whole CTC, and though we discussed 1 week back, still I haven't received it.
Should I re-approach for a negotiation. I have an offer from Accenture (16) , Cognizant(12) , Jade Global (16)
I have my office in cyber hub in Gurgaon. I need a budgeted place to live near cyber hub or any other nearby place for a single person.
Gurgaon peeps pls suggest some.
I’m wondering if your agency or in-house agency would have a need for an on-demand or freelance creative operations lead. Sometimes teams are going through extreme growth or need efficiencies to help evolve the team. Is this a pain point in the industry or with your team?
Hi all I have 2nd round technical interview for Salesforce Developer profile. Can you please share some tips for my interview. Thanks
Salesforce Tata Consultancy Amazon Infosys
If same salary offered, would you go with with EY GPS or industry? I don’t know what are the benefits offered by EY but the industry company have very good benefits. I would like to have your insights to make a decision. Thanks family!
Advice needed: my husband recently got laid off and is looking to pivot career paths. His primary experience is in sales (specifically signage and automotive), but he’s interest in shifting into manufacturing and supply chain positions. He is still working towards his Bachelors in Business, so he does not have a degree just yet. Any help is appreciated. Thanks!
Please I am looking for someone that can refer within Amazon. It will be greatly appreciated.
Anyone wants to have refferal EY GDS can dm me .
Also there are vaccancies for GCR US FSO - Tax Senior. Contact if interested
Quick question to everyone… does this Best Place to Work award 🥇 is bullshit !…. I am curious to know how EPAM india got this award.. today only I have noticed thousands of negative reviews from EPAM .. all the good reviews are mostly outside india… EPAM Systems EPAM Anywhere
So I started a new job a couple months ago and everyone has been connecting with me on LinkedIn including the CEOs and HR people. I'd like to change my settings on LinkedIn to enable recruiters to find me again. Will the HR people and CEOs at my company be tipped off as well?
More people are jumping to social media as an effective customer service tool. Why? 1) Email support takes forever. 2) No one wants to read the help page anymore. 3) It's a hit or miss getting in contact with great sales rep
Anyone hiring APs in LA? I’ve got 1 year under my belt and am looking to move from NY Any advice or direction is appreciated. Thanks!
I have joined TCS last month as System engineer with 2.5 years month of experience. When can i expect my first hike in tcs.
Additional Posts in DataScientists Network
Hi Fishes, Currently serving my notice period, only 30 days left. Looking for referrals for Data Scientist, NLP Engineer, ML Engineer or Data Analyst position in SAP ZS Associates @ ZS Associates, Newco Amazon JPMorgan Chase Rakuten Citi Kearney Apple Apisero Appinventiv Natwest group MetaLab Tech stack: NLP, data science, Azure databricks. YOE: 5.6.
What are similar product firms like Gojek where you get to learn a lot ( good projects, evolving teams) as well as have a life outside work too. 😅 ( by work life balance I mean no micro managing, less unrealistic deadlines, considerate coworkers etc. ) in Data Science ofcourse
Is JC Penney good to join as ACOE analyst role?
Guys, need advice !!
I have total 5 YOE in IT and i am thinking about starting investments but i am scared what if i loose my money. Please advice.
Hello Fishes, I have given Data Analyst test on Hackerrank for Morgan Stanley two days ago. Can anybody tell me in how many days they will revert back. Morgan Stanley
Hey DS fishes. Does it make sense to switch career track from Data Science to Product management?
Hi guys, need suggestions among these. Bajaj Finserv - Senior Unit Manager Risk Genpact - Assistant Manager Credit Risk Validation A growing fintech startup - Senior Data Scientist with focus on building risk models Tiger Analytics - Analytics Consultant
I want to develop my career as a Data Scientist/Data Science Consultant with a focus on fintech/banking
Tiger Analytics Genpact Bajaj Finserv
Anyone gave Quantumblack - Global - Data science test?
It is conducted by hacker link and time duration is 2 hr consisting of 3 sections.
Data Scientist at HP vs Data Science Analysis Manager at Cisco (IC), which one is a better position in terms of role and future prospects in Data Science. Years of experience is 6
Hello DS community,
I have 4 years of experience mainly in python automation and manual testing. I wanted to transition into Ds/ML roles, for that I did Applied Ai course, I have done All machine learning algorithms and basic DL. Now What type of projects should i do in order to get resume shortlist and interview calls? Please help.
Looking for an AIML Lead with minimum 5 years of experience. You can apply by forwarding your resume to firstname.lastname@example.org id.
I want to learn SQL with free certificate. Any one can suggest where ca in find it free. You response can change my life
Want to know how is the senior data scientist role at Tokopedia? More interested towards WLB.
Hi fishes, please guide.
I joined a bank as a business analyst 2 months back. I’m feeling that it’s more of a stagnant task for me though learning is there still i was much more happy with development. Now idk what to do because it’s 2 months, most companies i cannot apply before 6 months or a year maybe!
What shall i do? How to cope up with it? It’s difficult. YoE- 2 yrs and 4 months.
Tech stack : Python, SQL, Azure, ML and analytics.
Like this post ! And make it 11
In favour I'll tip you with this insight. Simple but informative.
Hello folks, I am looking for switch in Business analytics/Data analytics profile. Kindly advice how should move along for good transition. I have gained certification and been practicing in SQL, power Bi and Excel. I can also broaden my skill set if requirement proposes. Do suggest. Do help me with connecting with opportunities. Thanks in advance for any help or advice.
Can anyone suggest a good data science bootcamp course within 30k budget
Infosys hiring Data Scientist, Machine learning, AI engineers and Python/Go language / NodeJS/React.. DM if you need referral.
Which one to choose , PwC AC vs Natwest ?
Both are senior data scientist role Offering almost same package. YoE : 4+
(WLB is a critical factor for me )
friends,I am basically java resource 12+ yoe. i am planning to learn data science and searching for pg / certificate programs online. Pls suggest me best courses im just confused among options. simplilearn, insaid, upgrad, ibm etc etc.. whether pg course really required or whats ur thought. having 6 months exp in python,apache beam and apache airflow.
New to Fishbowl?
unlock all discussions on Fishbowl.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943746.73/warc/CC-MAIN-20230321193811-20230321223811-00404.warc.gz
|
CC-MAIN-2023-14
| 7,466
| 55
|
https://studytosuccess.in/web-stories/intel-summer-internship-2023/
|
code
|
Intel Summer Internship 2023 : Opportunity For Freshers
Intel Internship Program 2023 for freshers Students. Candidates currently studying in prefinal Year and Final Year in University Degree
Yellow Location Pin
– Master’s in Hardware Engineering or Electrical/Electronicg or Computer Engineering or Computer Science.
C/C++ and Python are the most useful languages for our work. o VLSI concepts -Power Management / Reset.
Please read the job instructions and requirements carefully before applying.
DXC Technology Hiring Freshers for DOTNET Core Developer
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.30/warc/CC-MAIN-20230924191454-20230924221454-00708.warc.gz
|
CC-MAIN-2023-40
| 559
| 7
|
https://learn.microsoft.com/en-us/answers/questions/1291385/is-it-possible-to-create-active-directory-authenti
|
code
|
Based on what you asked I interpreted it as you want to be able to authenticate to Azure AD from Shiny. Just from some quick research I have found the following documentation:
Authenticating from Shiny (for Azure AD Token)
Because a Shiny app has separate UI and server components, the interactive authentication flows require some changes. In particular, the authorization step (logging in to Azure) has to be conducted separately from the token acquisition step.
If this is helpful please accept answer.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647810.28/warc/CC-MAIN-20230601110845-20230601140845-00506.warc.gz
|
CC-MAIN-2023-23
| 505
| 4
|
https://forums.playcontestofchampions.com/en/discussion/195629/which-champion-to-rank-up
|
code
|
Which champion to rank up?
Which champion should I save my cats for a rank up. I want a champion that will help me in 5.3, 5.4 and for 100% exploration of monthly event quests.i currently have only 1 t5b and I don't mind waiting a month or so for another t5b. Currently I will be in a position to rank up only 1 cosmic champ.
Which champion to rank up? 0 votes
Unduped Corvus glaive from rank 4 to 5
HHYPERION undupedWait for a cosmic ag from rifts by using a chronometer and then duped hype
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104672585.89/warc/CC-MAIN-20220706121103-20220706151103-00605.warc.gz
|
CC-MAIN-2022-27
| 491
| 5
|
https://www.wicomail.com/tag/vidmate/
|
code
|
Vidmate Apk For Android. Vidmate is an android app that works for applications like facebook, instagram. All the apps that you download outside of google play store, come in.apk file.
So, in this case, you will download vidmate.apk file from the following link. All you have to do is follow the following steps. Download the vidmate apk file.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104204514.62/warc/CC-MAIN-20220702192528-20220702222528-00558.warc.gz
|
CC-MAIN-2022-27
| 342
| 2
|
http://skinnyfairtradelatte.blogspirit.com/archive/2007/01/13/keane-to-understand.html
|
code
|
It's a lousy pun, and most of the lyrics of the song by Keane don't really relate, but the title "Everbody's Changing" and a few of the sentiments I perceive it to contain maybe do.
I am wanting to research how Baptists approached change in the past to inform my/our present and affect/infleunce our future.
History is particular, in just about every conceivable meaning of the word, and its methods and aims have changed over time
Theology is likewise particular and contingent (at least I think that's the word)
And the purpose of this research according to an email from my professor is one
"where new academic knowledge is generated in order to effect change, in terms of perosnal develpment or understanding best practice etc.'
I am a student of change (I am studying it) I am a subject of change (I get changed in the process of doing the study) and I am an agent of change (I seek to effect change by what I do)
This makes any pretence of objectivity nonsensical since it is impossible to define an absolute starting point within myself
I can find discrete historical case studies where traces of the past may be discernible and it is feasible to say 'practice was X and is now Y' even if interpretation of the 'how' is largely conjecture.
As of this moment, I am quite enjoying understanding the confusion, but as the song says...
So little time
Try to understand that I'm
Trying to make a move just to stay in the game
I try to stay awake and remember my name
But everybody's changing
And I don't feel the same
The quest for truth is everlasting, and when I think too hard it is easy to end up feeling like it is all shifting stand. I haven't a clue as yet how I reconcile the complexity of these changes upon changes, but maybe it'll be fun trying?
(Oh, and by the way, my name is Catriona, I can remember that much!)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233505362.29/warc/CC-MAIN-20230921073711-20230921103711-00144.warc.gz
|
CC-MAIN-2023-40
| 1,827
| 18
|
https://hsls.libguides.com/freeliterature/specificarticles
|
code
|
Finding Free Health Sciences Literature: Finding Specific Articles
Many universities and research institutes have an archive that holds the work done by their researchers. Check to see which institutions the author(s) who wrote the article you need are affiliated with, and then check for a repository. You can often find the repository through the library's website or through an online search. Here are a few examples:
- Fred Hutchinson Cancer Research Center
- DASH (Harvard)
- Deep Blue (University of Michigan)
- Apollo (University of Cambridge)
- Johns Hopkins
- OpenDOAR (Directory of Open Access Repositories)
- PubMed Central is not an institutional repository, but it is a collection of full text papers
- Additionally, there are two tools that pull data from repositories:
Even if you are no longer affiliated with an academic library, you will hopefully have a nearby library you can use. If you are working in a hospital, ask about their hospital library. If you use a public library, they may have an interlibrary loan system that will allow you to request books and journal articles. If you have a local academic library, they may allow you to access some services as a community member. Check their website for policies or stop by and ask a librarian.
Unsure about what libraries are in your area? Search via WorldCat. You can even filter by type of library on the lefthand side.
Search the Web
- You can search for an article in a search engine by putting the article title in quotes. The search engine will just look for that title.
- If you use Google, you can also use the advanced search to tell it to just look for PDFs (or any format you're interested in).
- You can also check in Google Scholar to see if there is full text available for the article(s) you need.
Contact the Author
- Google the author and see if they have a website - some may have copies of their articles posted
- There should be an email for the corresponding author on the article record. Contact the author, explain a little about who you are and why you'd like to read the paper, and then see if they have a copy they could email you. See this example email text from Yale.
Unpaywall is an open source browser plug-in. It will look for full text in repositories, open access journals, etc. If it finds the article, the lock icon will turn green. Just click the lock and it will download the PDF for you.
The Open Access button is another browser plug-in. It works slightly differently than Unpaywall. You can enter the DOI or citation you're looking for on their website, or you can click the OA button on your browser and it will look for the full text. If it doesn't find it, it will prompt you to enter your email address so it can email the author for access.
A note on these plug-ins: Sometimes unpaywall and the OA button don't recognize that there's a PDF or full text of an article on the page you're looking at it. It's always worth it to take a minute or so to look at the article record and make sure there isn't a link to the article that you missed at first glance.
Kopernio is another browser plug in you could try. It is meant to be used in conjunction with library access, so it may not be as useful for you if you do not have any institutional access. Kopernio also requires that you provide your email address, unlike unpaywall and the OA button.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737883.59/warc/CC-MAIN-20200808135620-20200808165620-00549.warc.gz
|
CC-MAIN-2020-34
| 3,361
| 23
|
https://www.vn.freelancer.com/job-search/copy-csv-excel/
|
code
|
Program to Scrape Web Site and create Magento import XLS/CSV import file Program to scrape website and create Magneto import file Input: 1) Web site [đăng nhập để xem URL] 2) PriceList Export File. Only rows with “SONY PROFESSIONAL” in column “MANUFACTURER” – <B> to be processed 3) File with additional UPC codes and Product weights 4) Configuratio...
Create a VBA application in Excel to help automate the business or organisational process you have decided to address, which must: 1. Have a graphical user interface within Excel such that a person who is familiar with Excel, but has no knowledge of VBA, can successfully operate your VBA application. 2. Demonstrate the key programming skills expected
Hello I need a simple script/program/solution for windows which compare two spreadsheets via column A in both files. If column A in spreadsheet 1 contains values which are not in column A in spreadsheet 2, then it outputs these values (with all rows for that column). A spreadsheet can contain 3-5000 values. Simple project/Script - If in doubt ask first before bidding.
I have uploaded here a .csv excel file in which a program needs to be developed. It contains approximately 17 series of data e.g. column A to G represents 1st series, column I to T represents 2nd series and so on. There is a(one) column gap between each series. First series A to G and last series GW to HC need not be done anything. Programming is
I have a CSV file with Unicode characters. I want import data from CSV file into Excel. While importing data, values from CSV should be go into right column in excel. Sample files attached. NOTE: All processing is needed to be done using variable in the Macro. You cannot create a new additional sheet or copy data temporarly in a sheet etc to achieve
Please check the attached file for detailed requirements, better Ideas and suggestions from freelancer's on given requirement will be added advantage to them for acquiring the project.
Hi the project requires you to extract information from [đăng nhập để xem URL] from every page and every...Advertisement title 2) Address 3) Property Type 4) Rent 5) Bedroom 6) Details 7) Contact Name 8) Contact Number The data is to be extracted into excel/CSV format I strictly want the python/vba script. This is not a data copy and paste assignment
Here is the link - Form Creation Complete form data needs to be exported to CSV format upon completion. Once the user register himself he should be receiving a SMS & Email with his Registration ID ( Unique ) and a email to the admin with all the form information in it. The field title would be in english and hindi. It has to be same as the original
I have CSV exports of products from Adobe Busines Catalyst I need a tool or script or plugin that will alter the Adobe Busines Catalyst products CSV export Into a WooCommecre CSV file for import without errors. I can manually download and upload images The import must take into account for each product: All categories including multiple categories
I need self code for following Algo . simple algo codes no project required . own code don't copy paste from google. 1. Blind Search for test function like : sphere test function 2. Hill Climbing for test function like : sphere test function 3. Simulated Annealing for test function like : sphere test function 4. Particle Swarm Optimization for
We import csv files to TablePress from various AWS S3 buckets. We need somebody who can write a custom importer that will run as a cron to import all csv files (daily) from various S3 buckets (one per bucket).
HI, We need convert a XML database to CSV. In the database there are 1761 article. (see attachment) We need all the attributes in separate columns. (example in attachment) for each product code(SKU) XML in the zip see also attachment Who can help us out? Gr. Laurens
...ability for a user to enter information within a CSV file, upload it, then have our application automatically create an online web form based on the info provided by the user (e.g. form field type, form field selections, etc.). Hence, instead of having to manually create an online form, they can upload the CSV file which contains all of the required info
Lambda 01: I need a simple lambda function which copy file from sourceS3 to another s3 called TgtS3. The source S3 will have excel file with date, string values. Some of the strings have double quotes. While moving the file from source S3 to Target S3 the file have to be converted into .csv file, remove all double quotes, and where ever null is available
...Year, etc.). We wish to have a report run- preferably one that can be re-run by our team- that will spit out an Excel or CSV file containing a report of the content types and their metadata. You will be given access to a development copy of the site (not production) to work within to build the report; however, if you choose to create a re-usable module
you need to create csv with all my product data and upload in magento. similar like shopify and woocommerce. My product data is all in excel sheet so you can copy and past it to make correct magento format. THIS IS NOT MANUAL WORK, ONLY APPLY IF YOU KNOW HOW TO UPLOAD CSV IN BULK WITH VARIANTS.
you need to create csv with all my product data and upload in magento. similar like shopify and woocommerce. My product data is all in excel sheet so you can copy and past it to make correct magento format.
Hi, I will provide a CSV file ([đăng nhập để xem URL]) and a link to HTML page. Task is to create JS that will parse given CSV and populate HTML (including CSS and JS). Task should take a 2-4 hours of work, please bid accordingly. Looking for people proficient in JS and CSS as more complex follow-up tasks are available.
...800+ products in excel file. We have all the specs, name, sku, image link etc... We need a shopify expert to build the CSV ready-to-upload file from this data. - We have a template to use for the description. All specs must be integrate to this template. You also will have to link many products data together before to create the csv file. Many product
Requirements for 2 kinds of desktop tool/Macro: [đăng nhập để xem URL] different csv files in the same folder. Using desktop tool/ macro to copy to one Excel [đăng nhập để xem URL] rows with certain values in certain row. This should be dynamic, there's a file that I can maintain. example: keyword || action ABC || delete row XYZ || replace value 3. Macro to sort, de...
Requirements: 1. We shall upload some csv sheets in your utility/script that have a column called "Product_Description_1" . It contains description in HTML format. Some sample sheets have been attached (refer column K in the sheets) 2. Now these HTML descriptions should be pasted on website one by one: [đăng nhập để xem URL]
I am looking for help creating an excel document. My business sets exchange students up with host families for short term visits in the United States. On our website, we have a host family application where they put in various information about their family and home. The end result is just a list of the answers and not something we can give to our students
about 800 PDF's to be exported and data typed into a document
Hello I´m searching for a profile who can add products to a webshop (Running Prestashop). You need to be able to use excel (spreadsheet) / csv, copy/paste images, enter text, enter specifications etc. - if you know how to do webscraping then that could also be useful here - its not a must however. You will need to search net for text, images and
error >>> Invalid CSV Header: Missing headers Title. Please only if the work can really be about 35 excel sheets all this error only I send files you edit send back
I need help someone who have knowledge about wordpress and woocommerce to create and import csv file to import products. Products number is 60 items to import. To import csv, WP All Import Pro plugin will be used. [đăng nhập để xem URL] So if you have experience to use the plugin, it's best. I'm looking for freelancer who can start to work right
...to deadlines, can manage their own time and be able to carry out duties independently. Duties include Creating fresh copy product descriptions that are compliant with SEO keyword strategies and company voice. Creating fresh copy product titles, meta descriptions and img alt tags that are compliant with SEO keyword strategies. Editing and uploading
...given in the excel under column A 2. Choose the label that matches exactly with the Wine Name (irrespective of which vintage year) 3. Copy the URL link of this Wine Label in the Column A of the Result Excel (the photo has to be clear enough and does not have any watermark) 4. Copy the corresponding Wine Name from the Wine Name Project Excel provided and
Please read carefully: I need someone who is passionate about his/her work and can delivery the high quality work in a timely . Your work will involve copy paste of the data into excel and save as CSV. I need apartment Lists You probably need have technical knowledge how to work it efficiency . let me know how u gonna do this [đăng nhập để xem URL]
...Experience Manager (AEM) into a CSV file. The files from AEM are in XML files that are in a Java Content Repository (JCR) format. Each XML file is in its own folder, in the format of: year/month/day/article-title/[đăng nhập để xem URL] You would need to loop through each folder and add the contents of each file into one line of the CSV file. The end result would
I need someone who is passionate about his/her work and can delivery the high quality work in a timely . Your work will involve copy paste of the data into excel or CSV. . put ''kaya ko to'' in cover letter if you read this job description . must be fast typer You probably need have technical knowledge how to work it efficiency . let me know how u
I have multiple websites which I need create some user accounts on a daily basis. I need these to be automated using scripts and these scripts should take feed from text or CSV file
...require someone to build us a bot that will post our business listing on [đăng nhập để xem URL] in multiple locations in the UK the bot will acquire the relevant information from our CSV excel database and copy that information on autopilot into [đăng nhập để xem URL] and then [đăng nhập để xem URL] listing our company in hundreds of locations within the UK CUTTING OUT THE...
hello, I have compiled a database in excel format of 1 million contacts of my colleagues and friends from many time. Now i want to import them into my phone, but i cannot find a way to do it. 1) Via Vcard, im not able to BULK edit Vcard file to copy paste all my contacts and their name 2) CSV format import via google contacts only allows you to import
I need to add products and categories to my menu using csv file in bulk... ONLY APPLY IF YOU UNDERSTAND THE JOB. I DONT NEED TO ADD PRODUCTS AND CATEGORIES MANUALLY IT WILL TAKE TOO LONG...
I have an business renting homes on Airbnb and want a clean, easy to use table to view the revenues data in. When I download the csv from Airbnb I have these issues: -the date format is unreadable and needs a manual fix each time -i use the sum function and have to manually pick the rows for each listing It shouldn't be too difficult to do on VBA
...when a csv file appears in the folder (it is copied there by a batch task from an FTP location): move it to a location that has to be deduced from the name of the csv file - rename the file based on the content of the first line - open the csv file in Excel and open a master Excel file with calculations in a number of consecutive columns - copy the colu...
...language in a .vbs file to extract various details of a complete directory of dozens of Excel .xlsx files each with multiple Worksheet Tabs in every Excel file each containing multiple Column Name Headers into a single CSV file with a single row for each of the unique Excel .xlsx Worksheet Tabs in the Workbook and all the Column Names contained in that Worksheet
...that all use the same Point of Sale software (Junction 6). This software has been configured to generate and email a daily sales report once every 24 hours that attaches as a .csv breakdown of sales every day. We would like this dropped into a Google Sheet so that we can have an Automatic Daily updated report (dashboards are linked to this Google Sheet)
Hello! Who can write me a script, which is catching the csv file from my wholeseller to my ftp server? With Cron every 20 minutes? My wholeseller has an open api to catch it. Here is the documentation: [đăng nhập để xem URL] Thanks!
I am searching for a skilled freelancer who is able to grab a decent amount of products from an online shop which the link i will give you later on. Datas I need in that .csv file are: product-title product-price product-description image 1-x product-category product-subcategory technical-informations ATTENTION: I need everything in the correct formatting
I am a fulltime private Investor. I have a good excel list where I can research financial data on a monthly base. I have to go a step ahead now and upgrade it to an excel sheet where I can have daily data and still be able to easily copy and multiply the formulas. Of all that data a stock graph should be created (geometric averages of 10-30 years) which
...and PHP as well as the importation of large CSV files to go through this in more detail. We need offers offers from companies who can resolve this within 2 days. we are able to provide some initial test data in CSV format for you to load which would be a 25 product CSV sheet. We can then provide a larger CSV to test after this although no matter what
...actually copy and paste specific folder to its destiny that I will choose, it has to delete older version of files and then paste the new ones. It has to repeatedly do that, like every 3 minutes. The folder is very small, not more than 30mb. all files inside the folder are .CSV. These CSV files are updated every minute but when I use excel to read
I have postgresql installed on a server, and I have created a database and table. I am looking for someone who knows how to load data from a .csv file in the table already created.
Copy and paste from 12 PDF files into an Excel csv file Template and instructions provided Require 24-hour turnaround Must be 100% accurate - simple sum formula to check your data entry is correct It is simply copy and paste, no typing required
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659063.33/warc/CC-MAIN-20190117184304-20190117210304-00426.warc.gz
|
CC-MAIN-2019-04
| 14,588
| 46
|
https://theserverreviews.com/hosting/your-question-is-apache-license-copyleft.html
|
code
|
Is Apache License safe?
The Apache License doesn’t have any such requirements. It’s a permissive license. It permits you to release the modified parts of the code under any license of your choice. … Additionally, every licensed file must contain any original copyright, patent, trademark, and attribution notices in its redistributed code.
Is Apache License Foss?
The Free Software Foundation (FSF) maintains a list of what it considers free. … Yet, many FOSS licences, like the Apache License, and all Free Software licences allow commercial use of FOSS components.
Can I copy paste Apache licensed code?
Distribute any copies or modifications of the code: An individual or organization is allowed to copy and/or update the code, then make that version available to others (even commercially). Sublicense the code: A company can distribute their reworked version of the code under a stronger license.
Is Apache License compatible with MIT?
Since the MIT license is compatible with the Apache 2.0 license (which is also a very permissive license), you can bundle those components together under the Apache license.
What is meant by copyleft?
Copyleft is a general method for making a program (or other work) free (in the sense of freedom, not “zero price”), and requiring all modified and extended versions of the program to be free as well. … This allows people to share the program and their improvements, if they are so minded.
What is copyleft and how is it different from copyright?
Copyrights exist in order to protect authors of documentation or software from unauthorized copying or selling of their work. … A Copyleft, on the other hand, provides a method for software or documentation to be modified, and distributed back to the community, provided it remains Libre.
Is Apache GPL license?
The Free Software Foundation considers the Apache License, Version 2.0 to be a free software license, compatible with version 3 of the GPL. The Software Freedom Law Center provides practical advice for developers about including permissively licensed source.
Is MIT license free for commercial use?
MIT licenses allow commercial use. As the MIT license falls in the BSD-style class of licenses, users do not have to provide any other source code when releasing new software. Including the attributions and original MIT license in the reused code will suffice, making MIT licenses suitable for commercial use.
Can I modify open source code and sell?
Absolutely. All Open Source software can be used for commercial purpose; the Open Source Definition guarantees this. You can even sell Open Source software.
What is BSD license?
BSD licenses are a low restriction type of license for open source software that does not put requirements on redistribution. As a low restriction and requirement license type, Berkeley Source Distribution (BSD) licenses are used for the distribution of many freeware, shareware and open source software.
Should I use MIT or Apache license?
The MIT license is if you’re afraid no one will use your code; you’re making the licensing as short and non-intimidating as possible. The Apache License you are somewhat afraid of no one using your code, but you are also afraid of legal ambiguity and patent trolls.
Is Apache license compatible with BSD?
Finally, the BSD license is compatible with every major copyleft license, including GPL v2, while Apache 2.0 is arguably incompatible with GPL v2.
Can MIT license be revoked?
Revoking a license retroactively is not possible. But since there is no patent grant with the MIT license, using the open source software is–potentially–open to patent litigation.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358842.4/warc/CC-MAIN-20211129194957-20211129224957-00366.warc.gz
|
CC-MAIN-2021-49
| 3,651
| 26
|
http://iejoseolaya.tk/senior-care-coordinators-work-from-home.html
|
code
|
Google Developers (previously Google Code) is Google's site for software development tools, how do home improvement loans work in texas programming interfaces (APIs), and technical resources. The site contains documentation on using Google best free home job make money online ways work tools and APIs-including discussion groups and blogs for developers using Google's developer products.
I'm using a Windows. bat script and I set JAVA_HOME as C:Program FilesJavajdk1. 0_32 when I do a java -version, it still shows the 1. 3 How can I fix this. What am I doing wrong. Senior care coordinators work from home to the Java Tools do home mosquito foggers work Technologies Landscape Report 2016. This is a comprehensive report senior care coordinators work from home is focused on analyzing the data about the tools and technologies Java developers use.
) A few miami beach fl work at home ago I finished a new book, and in reviews I keep noticing words like quot;provocative'' and quot;controversial. '' Download now: Java EE moves to the Eclipse Foundation. What are application developers and market analysts saying about Oracles decision to move Java EE to the Eclipse Foundation. Become a professional Kotlin developer and write cleaner senior care coordinators work from home in your Android apps than in Java, avoid boilerplate code New Releases.
Version 2. 5 Alpha 6 introduces support for the new Java 10 'var' type inference mechanism, for both CSD generation and interactions. Each year since 2011, Stack Overflow has asked developers about their favorite technologies, coding habits, and work preferences, as … On March 19, 2018, LG announced a open-Source edition of webOS. This edition would allow developers to download the source code for free as well as take advantage of related tools, guides and forums on its new open source website to become more familiar with webOS and its inherent benefits as a smart devices platform.
By Outsourcing to us, get optimum performance. without losing focus on your business. You can rely on us as your Professional Software Development Partner. JGoodies offers freeware, products, and services for Java desktop developers. We focus on Java user interface design and its implementation in Swing; JavaFX is also supported. Java Excel API - A Java API to senior care coordinators work from home, write, and modify Excel spreadsheets Java Excel API is a mature, open source java API enabling developers to read, write, and modifiy Excel spreadsheets dynamically.
Now java developers can read Excel spreadsheets, modify them with a convenient and simple API, and write the changes to any output stre The top 5 Java 8 features for developers The release has been seen as a huge step toward making Java better, thanks to these upgrades in particular Most JAVA developers are using Maps and especially HashMaps.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267859904.56/warc/CC-MAIN-20180617232711-20180618012711-00058.warc.gz
|
CC-MAIN-2018-26
| 2,856
| 6
|
https://reasonexperts.com/reason-pulsar-dual-lfo.html
|
code
|
Welcome back to another Reason tutorial. In this tutorial I would like to explain some of the features of Pulsar. Pulsar is a Dual LFO and is available at the props shop as a Rack Extension.
Reason 6.5 was shipped with a feature called Rack Extensions. One of those rack extensions which was made by propellerheads on the launch of Reason 6.5 is the Pulsar Dual LFO (next to Radical Piano and Polar). Pulsar is marked as an utility type of Rack extension, because at some point it is a utility to shape LFOs.
The main idea behind using an LFO is to modulate a signal and repeat this cycle endless. A typical example is to have an LFO modulate the pitch of an oscillator to generate vibrato, but there are countless of other applications for LFOs. In most cases there are other devices that do a similar task:
- The Subtractor LFO 1
- The Malstrom Mod A and Mod B
- Thor LFO 1 (program LFO1 to CV1) and LFO2
So the concept of using LFOs is probably something which isn't brand new, however Pulsar does bring a few nice additional features which makes it an interesting device to throw in the rack.
The Basic usage of the LFO
So lets look at what Pulsar has got.
Pulsar comes with 2 LFOs (LFO 1 and LFO 2) and both have similar settings as it shows in the picture to the left. These settings are:
1. Rate Controls the speed of the LFO
2. Wave form, sets the shape of the LFO
3. Level, determines the amount of minimum and maximum output the LFO has
4. Phase, sets the starting offset for the LFO wave form
5. Shuffle, reshapes the length of the waveform
6. Smoothen the signal
And next to this we have tempo sync mode and envelope sync. We'll be going in depth about these settings.
LFO rate, as the term already says it, determines how fast the LFO acts. The higher the rate, the faster the LFO goes. A good example on how to make the rate noticeable is by connecting the LFO to the Pitch of any instrument. In this case you will hear the different pretty fast. For the next set of examples I will be using the Malstrom connected to the Pulsar Dual LFO. The example looks like the following setup:
The setup we'll using for explaining things. The LFO 1 is here by connected to the pitch of the Malstrom.
You can download the example file: Pulsar LFO Rate
LFO Wave form
Pulsar is shipped with 9 different wave forms namely: sine, triangle, square, sawtooth, random, slope, 3 steps, 4 steps and 4 steps up down, All these wave forms are Bi-Polar, which means that the all have positive values and negative values.
Wave forms determine the shape of the LFO and how they react on a certain CV setting and therefor changing the wave form can have a drastic impact on how the setting behaves.
You can download the example file: Pulsar LFO Wave form
The LFO Level is probably one of those settings which makes pulsar worth while to use. In reason itself there is only one known method (I know off) that you could make an LFO Level setup. Normally the level of an LFO is fixed when using CV cables, since you can not automate the modulation inputs on the rear of a rack device
The only work around I have encountered so far is using Thor as a modulator input / output source. Since this method gets rather 'complex' for some, since it requires the use of the Modulation Bus Matrix, it made perfect sense to have a single devices that makes the work flow a lot easier to get the same thing done.
Another interesting feature in this case would be using the LFO 2 to LFO 1 level amount, but we'll get more to that one in a later segment.
While having the level, we can alter the output amount to the destination (the setting which is changing by the LFO). This works pretty well if you are trying to setup an ambient stage or something, while you want to alter the settings over a longer period of time. And this case you could alter the LFO1 level amount to make these changes.
As an example I will add the following file: Pulsar LFO Level
Unlike any LFOs Reason had in the past, Phase is something which is kind of new in this setup. However, the term phase isn't new since it is something you probably have seen in the Subtractor or Thor. So what is phase you might ask? In simple terms of explaining: phase is changing the start point of the wave form. You could visually compare it with the following 2 pictures:
Or with a different phase:
The effect of phase (as in having it fixed) will barely be noticeable when it comes to using the LFO and connect the output to a setting. You will most definitely notice the difference when automating phase, it kind of is comparable as changing the rate slightly up or downwards. In most cases it depends on how you would use it off course.
You will get more out of Phase when using Pulsar as an analog synthesizer module (which we will cover later on).
Download Reason Example: Pulsar LFO Phase
Shuffle is something which is rather interesting as an effect, however you could if you want get a similar setting using an LFO on the Phase (CV cables). Ok, that might get complicated. Shuffle on the other hand is similar as changing the rate while the cycle is running. This results in to which would look rather different then, lets say, a straight forward sine wave.
A straight sine wave
A shuffled sine wave
So at some points the width of the sine wave is different. So the duration of each sine will be different while using shuffle. One way of hearing this effect is by using a very high shuffle setting. Such as the following: Pulsar LFO Shuffle
In this context the pitch is changed using the LFO. And by hearing it, you will notice that the cycle takes place in 2 parts: 1 long change, and one short change. And this is all happening with in 2/4th.
Shuffle van be ideal using shuffled track (for instance: a Regroove mixer) or if you want to have something which changes less robotic. An LFO is usually pretty "stiff" and shuffle can make the difference there.
LFO lag softens up the hard edges of the signal path. Which usually results into a new wave form (with the exception of sine) and has a less rough feeling to them. Lag would be similar as using an low pass ladder filter on top of a wave form. However, the difference here is that we using waveforms to be connected to any CV signal. So the outcome may be less when using a CV connection. However Lag will become noticeable when using the Pulsar device as an analog synthesizer.
Pulsar Square LFO without any lag
Pulsar Square LFO with 56% lag.
Other goodies in the LFO
So far we have explained the basic features when it comes to an LFO setting inside a single Pulsar LFO. The other goodies would be using an LFO 2 to LFO 1. Since a setting like this can recreate a new set of LFOs if you will.
LFO 2 to LFO 1 Rate is something similar as FM. It tends to speed up the waveform for LFO1 depending on the maximum output of the LFO2. The higher the values of LFO2, the higher the rate of LFO1 will become. A similar method already exists using Reason, for instance using Thor while connecting LFO 2 to the LFO 1 Rate does a similar thing.
The LFO 2 level to LFO 1 is AM or Amplitude modulation on top of LFO 1. Which means that the signal amplitude changes over time. You could get a similar setup inside Thor and a combinator, but this one would require some tricky stuff using the Amount as a modulation input. So yeah, Pulsar makes a similar setup a bit easier.
As an example I am posting a single Reason while where the LFO 2 is connected to the Level amount (second knob). This type of LFO setting can turn your synthesizer into a new pulsing rhythm type of module where the sound kind of changes 2 times, rather then having one single LFO doing all the work.
Such as the following: Pulsar LFO 2 to LFO 1 Level
These type of LFO settings would probably work best on pads, since they have a longer run time (long notes etc). I don't have any application yet for using 2 LFOs using one shots (short bursting sounds) on that matter while I am writing down this massive Reason tutorial.
Envelope on an LFO
Another interesting feature would be using the Envelope segment of Pulsar. Which is kind of similar as using the Envelope connected to the LFO rate or level using a thor patch. The only real main advantage using pulsar would be: it goes a lot quicker to set things up... trust me on this one. The idea behind an Envelope connected to an LFO is simple, you change the LFO parameters (depending on which they are) and use an Envelope to control this.
And envelope is setup where you have a segment called Attack, Decay, Sustain and Release to control the parameter. Only disappointment factor here would be that Pulsar only has an Attack and Release. However the Level knob is the replacement to the Sustain.
It its default state, you will need to Trigger the envelope by using the "Trig" knob. There are different methods to 'trigger' the envelope though.
Envelopes: Pulsar Envelope
The envelope setting comes to good use though when turning Pulsar into an Monophonic Synthesizer.
Something that has been brought up a couple of times is using Pulsar as a Monophonic synthesizer. The main idea here is to use Keyboard Tracking (KBD) at full so the LFO rate starts to change on height of the note.
The things you need to do are the following:
1. Set the LFO levels all the way down, other wise the LFO will output a constant tone.
2. Turn the KBD follow to 100%
3. Turn up the LFO -> Level on the Envelope section, so the envelope will now control amount of output on the LFO.
4. Turn Tempo Sync OFF on both LFOs
5. Connect the Audio cables to a Mix device
6. Create a sequence track for Pulsar (Right click and click 'Create Track for Pulsar', or right click on a knob and click 'Edit Automation' creates a track too).
As an example you can download the initial process here:
What is a Monophonic Synthesizer?
This leads into a different topic. A Monophonic Synthesizer is a synthesizer that uses single notes only. A monophonic synthesizer is (in the normal world) not able to play multiple notes at the same time. The counter part is a Polyphonic synthesizer (where polyphonic means it can use more than one note at the same time). So with that being said, you will need more then one Pulsar if you want to play multiple notes at the same time.
Why use Pulsar as a Monophonic synthesizer?
A valid question and I would like to tell my own insight on the subject (since this is an opinion I am giving, not fact). The Pulsar has some unique features when it comes to shaping the LFO. Shuffle and Lag would be two of them which makes Pulsar an interesting device. Next to this there is the LFO 2 to LFO 1 (Level and Rate). Do I need to say that using one single Pulsar device can create all kinds of different wave shapes which are pretty unique? I think I just did... But this is kind of the nice idea behind the Dual LFO device. Sure, one would use Subtractor to get close to similar sounds or use different type of Square waves and connect those to a Pulse Width modulation while using Thor.
The minor issue of Pulsar as a Synth
There are moments that Pulsar starts to open the envelope, but never closes it (and thus the level keeps going through the Level). Usually this happens with a random low frequency. How this issue can be reproduced I can't tell. I can only type about this issue since it happened to me twice while making this complete tutorial. If I can confirm when this happens I will be sure to write about this.
The Sync game
There are all sort of methods to figure out what the perfect KBD Sync would be like. If you are not familiar with Hz, and pitch and all that that then it would give you a headache to figure out the right pitch. Let me just throw in 3 values here:
130.813 Hz (C3)
1046.502 Hz (C6)
(Source Wiki also this is confirmed using spectrum analyzers where the reading margin is different with -0.1Hz)
This is the amount of Hertz of the perfect C note for the sound to be in sync with keyboard (yeah, lets go technical). The main issue here lies that some patches from the 'sound bank' use 130.2 Hz as a root frequency for C. So since we are nitpicking here: this is not C3... and gets off eventually when you would be triggering higher notes (at least it should in theory). Or the 130.2 Hz,which Pulsar claims to be using while hovering over them, is wrong (that could be another explanation).
This might lead into the debate about "what is the perfect C note". The only thing I would like to do is tell you how to get the C note without having to know how much Hz precise a perfect C note is.
Setting up Pulsar inside a combinator
To setup a pulsar inside a combinator and using it as a synthesizer module would probably be the ideal setup for Pulsar. Since pulsar does not have the ability to save the patch where the combinator is able to do so. The following steps may be required to make the initial setup:
Step 1: Turn tempo Sync mode off on the LFO.
Step 2: Put the Rate of the LFO all the way up (1.05Hz)
Step 3: Combine the LFO inside a combinator
Step 4: Open the programmer of the combinator
Step 5: Check the "Receive notes"
Step 6: Put the transpose at -24
The error margin between 1.05 and 1.046 is lesser than 130.8 and 130.2 if you would use this on an exponential scale.
Watch the following video to setup the connection:
Setting up the Audio Connection
There are multiple ways to setup the audio connection using Pulsar. First (and most easiest way) is to use one single LFO and route audio cable to the left in of the mixer channel. This makes the pulsar device a Mono device (similar to the subtractor for instance). This setup would be ideal when using LFO2 to connect to LFO1 to reshape the wave form of LFO1.
While using both LFO1 and LFO2 you can use Pulsar as a stereo device. By using LFO 2 (or LFO 1) on a different frequency create a detuned sound.
Some connection schemes explained
While using a Pulsar device as a monophonic synthesizer you are able to setup multiple routing schemes for making patches and so on to make some unique sounds with it and expand on what Pulsar can become. One of these connections could be using the Malstrom as a filter device, or use Thor instead.
The malstrom is probably more straight forward as an approach since it only requires a few audio cables back and forth.
For a mono setup you could go for the following setup:
1. LFO 1 output goes into Malstrom (Left) Audio Input
2. Malstrom (Left) Audio Output goes into the Mix Channel Input (or Combinator Left input when having it inside a combinator)
Even while using a mono signal, you could turn this into stereo by using the Malstrom right output and connect this back inside the Mixer channel input Right. On the malstrom you can set the spread knob all the way up (Maximum value 127). And last you can use the Filter knobs on the front panel (Filter A and Filter B) to make differences over left and right again.
This turns the mono signal into a stereo signal again while using a single audio source.
As an example I will add the following file: Pulsar Example using Malstrom
Using Thor as a Audio processor
A similar setup you could do while using Thor Filters to make the initial connection. This however requires a bit more work to make the initial connection, and second you will need the modulation bus matrix to make the initial connection.
1. LFO 1 output goes into Thor Audio Input 1
2. LFO 2 output goes into Thor Audio Input 2
3. Thor Audio Output 1 goes into the Mix Channel Left Input (or Combinator Left input when having it inside a combinator)
4. Thor Audio Output 2 goes into the Mix Channel Right Input (or Combinator Right input when having it inside a combinator)
5. Open up the programmer of Thor
6. Set the following parameters inside Thor:
Source: Audio 1 Input (100)> Destination Filter 3 Left in (100) > Scale Global Envelope (approx 75)
Source: Audio 2 Input (100)> Destination Filter 3 Right in (100) > Scale Global Envelope (approx 75)
7. Setup a filter type inside filter slot 3
8. Turn on/off delay or chorus if you need it
Some of the patches I am providing are using this type of connection (one example would be called "Square Pulsar Chorus Bass". Located in the next example file. So you can look these up if you are unable to make this work.
Download: 8 synths pulsar combinators
Written by hydlide
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578529472.24/warc/CC-MAIN-20190420080927-20190420102927-00279.warc.gz
|
CC-MAIN-2019-18
| 16,287
| 115
|
https://mondomedia.com/news/view/630/Dont_Feed_the_Humans_Season_2_begins_with_The_Probot
|
code
|
Change is just a part of life…especially life in the zoo. So you’ll see a big change go down in the first episode of DFTH’s new season. And that change might have something to do with this:
You’ll also see a change in Horf as he gets a little emotional:
As for me, I wish I could change the fact I can’t come up with a decent conclusion for this post.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780055645.75/warc/CC-MAIN-20210917120628-20210917150628-00006.warc.gz
|
CC-MAIN-2021-39
| 361
| 3
|
https://www.kruxaudio.com/about.html
|
code
|
We are a small music production studio based in London. Our journey began in 2014 and so far we supported over 30 000 projects with our music. In 2020, we decided to start our own boutique samples shop with a goal of producing simple, yet high quality samples and tools to help producers worldwide.
Unleash your creativity.
Our main goal is to inspire and motivate music producers and composers in creation of new and exciting music. We want to bring you something simple and easy to use, yet full of emotion and expression.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816863.40/warc/CC-MAIN-20240414002233-20240414032233-00503.warc.gz
|
CC-MAIN-2024-18
| 524
| 3
|
http://www.lexen.net/product/app-creation-5-steps-ready-development/
|
code
|
This course will take you thru the product creation journey, from producing a profitable app thought throughout to the structured output that builders might want to create it. It represents the stepping stone between a semi fashioned app thought and one that’s clearly outlined and prepared for improvement.
To get to this developer prepared level you’ll cowl 5 key steps:
- The right way to brainstorm product concepts successfully
- Agile in improvement
- Creating product visions
- Creating storyboards
- Creating person tales
Tying these 5 steps collectively offers you the concise output you’ll want to discuss a developer via precisely find out how to create your app. Past this, the output you create might be an distinctive help for pitching buyers with, for instance, the imaginative and prescient assertion permitting you to concisely summarize your app thought in a paragraph, from the shoppers it targets, to the wants it solves to how it’s differentiated from the competitors.
Thanks for studying and hope to see you inside!
Info you’ll get:
- Brainstorm profitable app concepts
- Create concise product visions to speak the essence of your app thought to each builders and buyers
- Perceive the significance of agile in product and software improvement
- Assemble a imaginative and prescient board which particulars how your app will perform finish to finish
- Create person tales that describe the precise performance builders might want to construct
- There are not any data necessities forward of beginning this course
This course is for:
- Those that need to create a profitable app however do not know find out how to code so might be utilizing builders
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945272.41/warc/CC-MAIN-20180421164646-20180421184646-00478.warc.gz
|
CC-MAIN-2018-17
| 1,682
| 18
|
https://teamtreehouse.com/community/i-added-lots-of-colors-but-it-is-asking-for-more-what-should-i-do
|
code
|
Arjan Guglani3,598 Points
I added lots of colors, but it is asking for more, what should I do?
I continue to add colors, only to be asked to add more!
colors = ["blue, red, purple, brown, black, green, gray, violet, yellow, orange, tan, silver, pink, gold, bronze"]
Ryan S27,262 Points
As far as Python is concerned, you've only added one color. Everything between the quotes is a single string, no matter how many commas or words you have.
If you want more than one string in a list, you need to surround each item with quotes and separate them with commas.
colors = ["red", "blue", "green"] # 3 list items color = ["red, blue, green"] # 1 list item
Hope this helps.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986726836.64/warc/CC-MAIN-20191020210506-20191020234006-00193.warc.gz
|
CC-MAIN-2019-43
| 667
| 9
|
https://paulekas.eu/
|
code
|
I am a 19-year-old graduate of the Kaunas University of Technology Gymnasium (2020 - 2022) and a Software Engineering student at Kaunas University of Technology (2022-2026) from Lithuania.
I began learning coding in 5th grade when I took HTML and CSS beginner classes. I then stopped until 7th grade when I started taking basic C++ lessons and using it in competitive programming competitions in my country.
I am now learning web development frameworks like React and Next.js, but my university course and interests may change things. I am also quite interested in game development too, but this is not something that I take seriously yet. In the meantime, I'm working on a few projects that I hope to share soon!
It is currently for me.
Feel free to write me an email at email@example.com.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643462.13/warc/CC-MAIN-20230528015553-20230528045553-00353.warc.gz
|
CC-MAIN-2023-23
| 790
| 5
|
http://nathansuniversity.com/funcs10.html
|
code
|
Scheem example programs
Once your Scheem interpreter seems somewhat solid, start writing some interesting example programs in it. As you need small features to make an example work, go ahead and add them into your Scheem implementation along with some quick tests.
Ideas for examples
Here are some ideas for simple example programs. You don't have to do all these, these are just ideas for inspiration.
Compute Fibonacci numbers.
Reverse a list.
Find if an element is in a list.
Apply a function to every element of a list.
Flatten a nested list of lists into a single list.
Write binary search tree functions
find. Binary search trees might be
represented in list form as
(value _left _right).
Implement a dictionary data structure with lookup and update.
Write a function that does symbolic derivatives. The input
(diff '(* x x) 'x)
should evaluate to
(+ (* 1 x) (* x 1)). Do you remember the product rule?
Make a Scheem interpreter in Scheem. Yo dawg I heard you like interpeters...
As you work on examples in Scheem, it might help you to test them in a full-featured Scheme. BiwaScheme is a convenient online Scheme interpreter that is quick to jump in and use. If you get an example working in Scheme but it doesn't work in your version of Scheem, investigate why. See if you can track down the bug. As you find bugs, remember to add a test for that particular problem so you don't have to fix it again.
Once you have lambdas working in your Scheem with an example, show it off to the world in the class forum! You don't need everything working to be brag-worthy.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171418.79/warc/CC-MAIN-20170219104611-00527-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 1,568
| 21
|
https://orange3.readthedocs.io/projects/orange-visual-programming/en/latest/building-workflows/index.html
|
code
|
The core principle of Orange is visual programming, which means each analytical step in contained within a widget. Widgets are placed on the canvas and connected into an analytical workflow, which is executed from left to right. Orange never passes data backwards.
Let us start with a simple workflow. We will load the data with the File widget, say the famous Iris data set. Right-click on the canvas. A menu will appear. Start typing "File", then press Enter to confirm the selection. File widget will be placed on the canvas.
File widget has an "ear" on its right side – this is the output of the widget. Click on the "ear" and drag a connection out of it. Upon releasing the connection, a menu will appear. Start typing the name of the widget to connect with the File widget, say Data Table. Select the widget and press enter. The widget is added to the canvas.
This is a simple workflow. The File widget loads the data and sends it to the output. Data Table receives the data and displays it in a table. Please note that Data Table is a viewer and passes onwards only the selection. The data is always available at the source - in the File widget.
Workflows with subsets¶
Visualizations in Orange are interactive, which means the user can select data instances from the plot and pass them downstream. Let us look at two examples with subsets.
Place File widget on the canvas. Then connect Scatter Plot to it and a Data Table. Connect Data Table to Scatter Plot. Select a subset of points from the Data Table. Scatter Plot will highlight selected points.
Workflows with models¶
Predictive models are evaluated in Test and Score widget, while predictions on new data are done in Predictions. Test and Score accepts several inputs: data (data set for evaluating models), learners (algorithms to use for training the model), and an optional preprocessor (for normalization or feature selection).
For prediction, the training data is first passed to the model. Once the model is trained, it is passed to Predictions. The Predictions widget also needs data to predict on, which are passed as a second input.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100508.53/warc/CC-MAIN-20231203193127-20231203223127-00664.warc.gz
|
CC-MAIN-2023-50
| 2,110
| 10
|
https://vid.observer/finance/financial-education/silver-squeeze-still-showing-signs-of-strength/
|
code
|
In this video, we look at a recent reporting revision by the London Bullion Market Association (LBMA) and how shady it is that they “accidentally” reported much more silver than they actually had. Despite claiming a record increase, they now admitted the truth was less than stellar. This shows the squeeze is still on and it seems like only a matter of time until the silver price skyrockets.
Buy Silver ($5 free bonus): https://bit.ly/3mS6dNo
Silver in Your IRA or 401k (first month free): https://bit.ly/gldbtc
Read the Article from Bullion Star: https://www.bullionstar.com/blogs/ronan-manly/lbma-misleads-silver-market-with-false-claims-about-record-silver-stocks/
► My Courses and Guides
► Buy Allocated Gold from OneGold (Get $5 FREE)
► Gold or Bitcoin in your IRA (1-Month FREE Discount Code)
► Stack Sats with Swan (Get $10 of BTC FREE)
► My Recommended Source for Real Estate Investing
► Hardware Wallets (cold storage)
► My Free Newsletter
► Support Me On Patreon!
► My Bookshelf
► My Merch
Follow Me on Twitter: https://twitter.com/heresyfinancial
JOIN this channel to get access to perks:
#silver #silversqueeze #soundmoney
I am not a CPA, attorney, or licensed financial advisor and the information in these videos shall not be construed as tax, legal, or financial advice from a qualified perspective. Linked items may create a financial benefit for Heresy Financial.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057796.87/warc/CC-MAIN-20210926022920-20210926052920-00123.warc.gz
|
CC-MAIN-2021-39
| 1,406
| 18
|
https://help.goacoustic.com/hc/en-us/articles/360044894054-Troubleshooting-snapshots-and-overlays
|
code
|
I upgraded the snapshot extension and now when I click the Capture (camera) icon, the snapshot window doesn't render correctly -- what's going on?
This happens occasionally. Instead of the snapshot window displaying when you click the Capture icon, a small black rectangle is displayed. In most cases, closing and relaunching Firefox fixes the issue.
If closing and relaunching Firefox does not fix the problem, contact support.
Why do I see an error when I take a snapshot?
If you encounter an error message when you take a snapshot, you might need to uninstall the Firefox extension and then reinstall it.
About this task
Use this procedure to uninstall the Firefox extension.
- Open Firefox.
- Select Tools > Add-ons from the menu bar to manage your extensions.
- Find the Snapshot Capture extension.
- From the options menu, select Remove.
The extension is removed.
What to do next
Snapshots are not rendering accurately
When I capture a snapshot with the Firefox extension, the snapshot looks fine in the thumbnail view, but when I select it for viewing, some images are missing. What happened?
Missing assets in the snapshot capture might be caused by the Content Blocking setting in the Firefox browser.
If Content Blocking is set to Custom, with Choose what to block set to Trackers / In all windows, this might cause images to go missing.
Change the Content Blocking settings and capture the snapshot again.
If the problem continues, contact Acoustic support.
Why isn't my snapshot showing?
I captured a snapshot, but I can't see it. What happened?
Make sure that you have the latest version of the snapshot plugin. You might need to uninstall and reinstall the Firefox plugin. For more information, see Why do I see an error when I take a snapshot?
Why can't I find the Acoustic Overstat instance on the replayed page?
I can't find the Acoustic Overstat instance on the replayed page. What happened?
This issue could happen if the UIC SDK is not added on the page or if the UIC is there but CX Overstat® is not enabled. If the SDK and CX Overstat are configured properly, re-take the snapshot. If you still have an issue, contact Acoustic support.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305288.57/warc/CC-MAIN-20220127193303-20220127223303-00291.warc.gz
|
CC-MAIN-2022-05
| 2,158
| 25
|
https://iq.opengenus.org/virtual-environment-using-anaconda/
|
code
|
Reading time: 20 minutes
In this post, we will go through the all commands to master the use of virtual environments using conda/ Anaconda. This is a cheatsheet for Anaconda with virtual environment.
Anaconda is a widely used open-source distribution of Python and R programming languages speciafically designed for applications in Machine Learning, Data Processing and others. In it, the packages are managed through conda (alternative to pip).
Virtual environment is an wrapper/ environment which will have its own copies of packages and environment variables and is useful when working with different versions of the same software package on the same system.
1. Windows Users
Anaconda is just like you normal application. Head over to www.anaconda.com/distribution/ and download the graphical installer. Double click on the installer and follow the instructions
2. Linux/Mac users
For Linux or Mac, follow these steps in your command line:
cd ~ wget https://repo.continuum.io/archive/Anaconda3-5.0.1-Linux-x86_64.sh bash Anaconda3-5.0.1-Linux-x86_64.sh -b -p ~/anaconda rm Anaconda3-5.0.1-Linux-x86_64.sh echo 'export PATH="~/anaconda/bin:$PATH"' >> ~/.bashrc source .bashrc conda update conda
And, it's done!
Check conda is installed and in your PATH
Open a terminal client.
Enter conda -V into the terminal command line and press enter.
If conda is installed you should see the version of the conda installed.
If this works, you are good to proceed further or else go through the installation steps again.
Check conda is up to date
In the terminal client enter
$ conda update conda
Update any packages if necessary by typing
y to proceed.
Create a virtual environment for your project
Following is the command to create a virtual environment named opengenusapp using python version 3.6:
$ conda create -n opengenusapp python=3.6 anaconda
You can use a different name and any Python version available. To check Python version available, use the following command:
conda search "^python$"
You can even skip add Python while creating the environment and once in the environment, you can install it.
conda create -n opengenusapp
It will install the Python version and all the associated anaconda packaged libraries at
Activate your virtual environment.
To go into your new virtual environment, use the following command:
$ source activate opengenusapp
On activating a conda environment, it will modify the PATH and shell variables to point to the specific isolated Python set-up you created.
Command line prompt may change as well by including the name of the virtual environment you are currently in.
List existing virtual environments
To see a list of all your environments, use the command:
conda env list
conda info -e
Install additional Python packages to a virtual environment.
To install additional packages, use the following command:
$ conda install -n opengenusapp [package]
It will install the specified package in the mentioned virtual environment "opengenusapp"
Deactivate your virtual environment
To go out of the current virtual environment, use the following command:
Delete a no longer needed virtual environment
To delete a virtual environment, use the following command:
conda remove -n opengenusapp -all
See list of installed packages
To check the installed packages in the current virtual environment, use the following command:
To check the list of installed packages in a deactivated virtual environment, use the following command:
conda list -n myenv
Rename/ copy a virtual environment
To copy an exisiting virtual environment, use the following command:
conda create --name new_name --clone old_name
Following it, we may delete the old virtual environment:
conda remove --name old_name --all
To remove Anaconda completely from your system, use the following command:
rm -rf ~/anaconda
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510319.87/warc/CC-MAIN-20230927171156-20230927201156-00140.warc.gz
|
CC-MAIN-2023-40
| 3,810
| 57
|
https://www.chilerubik.com/info/1036/1496.htm
|
code
|
报 告 人:Xiangjian He教授
工作单位:School of Electrical and Data Engineering, University of Technology Sydney
Professor Xiangjian He is the Director of Computer Vision and Pattern Recognition Laboratory at the Global Big Data Technologies Centre(GBDTC) at the University of Technology Sydney(UTS). He is an IEEE Senior Member and has been an IEEE Signal Processing Society Student Committee member. He received a UTS Chancellor’s Award for Research Excellence in 2018. He has also been awarded ‘Internationally Registered Technology Specialist’ by International Technology Institute(ITI). He has been carrying out research mainly in the areas of image processing, network security, pattern recognition, computer vision and machine learning in the previous years. He has played various chair roles in many international conferences such as ACM MM, MMM, ICDAR, IEEE BigDataSE, IEEE TrustCom, IEEE CIT, IEEE AVSS, IEEE TrustCom, IEEE ICPR and IEEE ICARCV. He has received many competitive national or regional grants awarded by Australian Research Council(ARC), National Natural Science Foundation of China(NSFC), Hong Kong Research Grants Council(RGC). Very recently, he has received an ARC-LP grant and industry grants awarded by Cisco, SAS, Sydney Trains, Data 61, RMCRC etc. In recent years, he has many high quality publications in prestigious journals such as Journal of the Association for Information Science and Technology and ACM Computing Surveys, IEEE Transactions journals such as IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Network Science and Engineering, IEEE Transactions on Mobile Computing, IEEE Transactions on Computers, IEEE Transactions on Parallel and Distributed Systems, IEEE Transactions on Multimedia, IEEE Transactions on Circuits and Systems for Video Technology, IEEE Transactions on Intelligent Transportation Systems, IEEE Transactions on Cloud Computing, IEEE Transactions on Reliability and IEEE Transactions on Consumer Electronics, and in Elsevier’s journals such as Pattern Recognition, Signal Processing, Automation in Construction, Information Sciences, Neurocomputing, Future Generation Computer Systems, Computer Networks, Computer and System Sciences, and Network and Computer Applications. He has also had papers published in premier international conferences and workshops such as ACL, IJCAI, CVPR, ECCV, ACM MM, TrustCom and WACV.
Crowd counting, for estimating the number of people in a crowd using vision based computer techniques, has attracted much interest in research community. Although many attempts have been reported, real world problems, such as huge variation in subjects’ sizes in images and serious occlusion among people, make it still a challenging problem. In this talk, an Adaptive Counting Convolutional Neural Network (A-CCNN) is introduced and it takes into account the scale variation of objects in a frame adaptively so as to improve the accuracy of counting. The proposed method takes advantages of contextual information to provide more accurate and adaptive density maps and crowd counting in a scene. Extensively experimental evaluation has conducted using different benchmark datasets for object-counting, and shows that the proposed approach is effective and outperforms state-of-the-art approaches.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103646990.40/warc/CC-MAIN-20220630001553-20220630031553-00784.warc.gz
|
CC-MAIN-2022-27
| 3,325
| 4
|
https://github.com/sbstjn/node-kickstart-example
|
code
|
Simple Node.js example app using kickstart for rapid development. kickstart adds handy settings to express with support for jade template rendering, less css processing and optional support for including ssl certificates.
npm install kickstart node app.js
See app.js for setting application port and domain name.
kickstart comes with some handy default configuration:
- jade template engine for files in
- automatic less processing for files in
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424889.43/warc/CC-MAIN-20170724162257-20170724182257-00128.warc.gz
|
CC-MAIN-2017-30
| 444
| 6
|
https://blog.syncplify.com/greatly-simplified-active-directory-ldap-integration/
|
code
|
More good news regarding Syncplify Server! version 6.0: we have greatly simplified the management of users (and even groups) profiles.
In all previous versions the Admin had to specify the type of LDAP query (UPN/sAMAccountName) and the desired order in case of multiple query types, but groups would only allow the use of UPNs; this, occasionally, led to some confusion.
As of version 6.0, Syncplify Server! is capable of gracefully handling both UPN and sAMAccountName logins, for both LDAP user and group profiles, no questions asked, no special configuration needed.
What you see in the picture here above is the same user, logging in twice, the first time using their UPN, and then using their sAMAccountName.
But wait… there’s more!
In the example above, what you see is not a user profile in Syncplify Server!… it’s an LDAP Group profile! The “sftptest” (or “firstname.lastname@example.org”) user was able to log in simply because it’s part of the “sftpusers” LDAP group in the underlying Active Directory. And the session logs make it very clear:
nodeId="peaceful-booth" sender="ssh2_sftp-handler" sessionId="e6G8PrHp2KRjQrqCS3SDSn" clientIp="127.0.0.1" serverIp="127.0.0.1" serverPort=22 protocol="ssh2_sftp" username="email@example.com |> sftpusers" method="SESSION-START" uriStem="" uriQuery="" status=200 cliToSrvBytes=0 srvToCliBytes=0 latencyMillisec=0 latencyHuman="4.197µs" userAgent="SSH-2.0-OpenSSH_8.4p1 Ubuntu-5ubuntu1"
This user profile simultaneously represents the user itself, as well as the group profile it belongs to, and from which it inherits its configuration, permissions, virtual folders, etc…
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100989.75/warc/CC-MAIN-20231209233632-20231210023632-00889.warc.gz
|
CC-MAIN-2023-50
| 1,650
| 8
|
https://smalltownmom.blogspot.com/2009/11/hippie-hooray.html
|
code
|
While my standard fall-back costume is Poppins or a gypsy/pirate wench, Ernest's favorite (since he's had long hair) is the hippie. It's acceptable for school, and easy to march in when the band plays in the school parade.
But this year he wanted to try something different in the evening. So he dressed as a Monty Python flasher, with a BOO sign underneath his trench coat. However, he came home halfway through the evening saying, "People just don't get it," and went back to the tie-dye.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145869.83/warc/CC-MAIN-20200224010150-20200224040150-00410.warc.gz
|
CC-MAIN-2020-10
| 490
| 2
|
https://goveganrecipe.com/237-how-to-make-perfect-high-altitude-vegan-carrot-muffins/
|
code
|
High Altitude Vegan Carrot Muffins.
You can have High Altitude Vegan Carrot Muffins using 14 ingredients and 6 steps. Here is how you achieve it.
Ingredients of High Altitude Vegan Carrot Muffins
- You need of dry.
- You need 1 1/2 cup of white flour.
- It’s 3/4 cup of sugar.
- It’s 1/4 tsp of baking soda.
- You need 1/4 tsp of baking powder.
- It’s 1/2 tsp of salt.
- Prepare 1/2 tsp of ground cinnamon.
- You need 1/4 tsp of ground nutmeg.
- You need of wet.
- Prepare 2 of bananas (ripe).
- You need 1/2 cup of Coconut oil (any oil or applesauce).
- You need 1 tbsp of honey.
- Prepare 2 of flax eggs.
- You need 1 of large carrot (shredded).
High Altitude Vegan Carrot Muffins step by step
- Make flax eggs. 2 tablespoons ground flax seed and 6 tablespoons water. Mix and let sit until needed..
- Mix dry ingredients in a bowl..
- Mix wet ingredients in a separate bowl. Bananas should be mashed..
- Mix wet and dry ingredients well..
- Fold in carrot..
- Separate into 12 muffin molds and bake at 375 for ~25 minutes. They are done when you can stick a knife through and it comes out clean..
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588153.7/warc/CC-MAIN-20211027115745-20211027145745-00521.warc.gz
|
CC-MAIN-2021-43
| 1,104
| 24
|
https://www.freelancer.pl/projects/Linux/Help-install-nginx-php-mysql/
|
code
|
I need install nginx + php + mysql + whmcs in CentOS 6.8
I not need that you install it. I need a guide for install it, I need learn how to.
11 freelancerów złożyło ofertę na średnią kwotę w wysokości $144 do tego projektu.
Hello, I have worked on something similar to this before and I would be glad to work on this task for you. You can check my profile portfolio for more details
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823731.36/warc/CC-MAIN-20171020044747-20171020064747-00018.warc.gz
|
CC-MAIN-2017-43
| 391
| 4
|
https://kaduceo.com/en/neural-network-architectures-for-image-classification/
|
code
|
Jean-Baptiste Excoffier - Data scientist
Recent years have seen tremendous progress in automatic image analysis, either in classification, segmentation or compression task, as well as fictitious image generation (with GAN). This article focuses on image classification.
From examples where each image is associated to a certain class, Machine Learning models learn to identify patterns that are specific to a class so as to distinguish at best between the different groups.
The most efficient methods to date are based on neural networks, which are part of Deep Learning, that are now widely used in medical image research [1, 2]: early diagnosis of cancer cells, eye disease detection (AMD), or lung damage severity estimation of Covid patients.
We will present in this article characteristics of neural network models for image classification, through the evolution of their architectures.
Most machine learning models for classification work with tabular data. A list of several features, called explanatory variables, is passed to the model that will manipulate them (association, weighting)
in order to distinguish at best the different classes.
Yet an image is not a simple list of information in one dimension, but an object in two or three dimensions. The first and the second dimension respectively indicate image width and height while the third is added if there is need of colors, and not only greyscale image.
Thus in order to use this kind of classical classification model, image must be initially flattened to have a one-dimension object, consisting in a list of pixels.
Figure 1 shows this process with a four pixel image and a very simple neural network called Multilayer Perceptron. It is only made up of a single intermediate layer (FC for Fully Connected) of five neurons. After image flattening, each pixel is linked to all neurons.
Each connection is associated to a coefficient indicating the weight the model gives to it. It is these coefficients, also called parameters or weights, that the model will optimize duing its learning phase, by attributing the value that enables the best distinction between every classes.
The last layer (Exit) gives for each image the class predicted by the model, or the probability of belonging to each class.
Nevertheless, image flattening does not fully take into account the spatial distance between pixels, which is an obvious limit to model performances. Moreover, flattening produces a list -a vector- of a very large size. Our first example only consists in a 2×2 image, so the vector has a length of 2×2 = 4 pixels, but for an image with a normal size, such as 300 × 300, is thus generates a vector fo 90,000 pixels, which must be multiplied by 3 if it is a color image (RGB).
Therefore, we need a method that can extract information and patterns from spatial proximity and intensity of pixels in order to better take into account colors and forms.
Convolution filter, also called kernel or mask, is such a method that modifies an image based on a matrix, highlighting certain area or aspects. This convolution matrix, that must be smaller than the image, runs through the image, from left to right and from top to bottom, generating at each position a number that will be a pixel of the new image produced by the convolution operation.
An example of convolution filter is given by matrix 2. It has a 3 × 3 dimension and is used for contour detection of objects contained in the image. It is also useful to be able to diminish the image size, in particular to have a fewer number of parameters in the model.
This is possible by modifying the stride of the convolution operation so as to skip a certain number of pixels while running through the image. If the stride is one then the generated image is of the same size than the original, but if the stride is equal to 2 than the generated image will be half the size of the original.
Let’s take an example of an ophthalmologic exam consisting of fundus image for the detection of diabetic retinopathy from a open source dataset https://github.com/HzFu/EyeQ.
Figure 3 shows the original image of a patient suffering from diabetic retinopathy, and the result of the convolution operation from filter 2, with two different values of the stride parameters. With a stride of 1, the blood vessel contours are well detected, while a stride of 3 produces an more blurred image but smaller (axis indicate size).
Thus we have a technique that takes into account the spatial side of the imagery. Although it is not the only technique used in the current neural networks of image processing, there is in particular the pooling, the convolution remains the principal and especially the only one having coefficients (or weights, parameters), whose values the model will be able to choose according to the data.
For example, we could build a model with filter 3, but instead of choosing the coefficients a priori, the model would learn to optimize them in order to have the best possible accuracy for the classification. This filter would thus have 3 × 3 = 9 weights to optimize, to which a common weight must be added (as in a linear regression ax + b). For color images, number of weights must be multiplied by 3 (RGB channel), which for a convolutional kernel of size 3 × 3 gives a total of 3 × 3 × 3 + 1 = 28 parameters.
Convolution operations are detailed in the following article .
A very basic architecture of a neural network model containing convolution, also named Convolutional Neural Network (abbreviated in ConvNet or CNN), consists of a first layer with a convolution filter, then a flattening of this result followed by a completely connected layer (Fully Connected), and finally the output of the model which is often a vector of probabilities (one for each class, the whole summing up to 100%).
Figure 4 shows this basic architecture. Here the size of the convolution filter (the square with the yellow edges in the second image) is voluntarily enlarged, because in general this one is relatively small, from 1 × 1 to 5 × 5 pixels.
The first architecture of CNN is published in 1998 . It is not much more complex than the figure 4, since it only consists of two convolutional layers followed by three completely connected layers. This model, named LeNet-5, has about 60,000 parameters and was applied to the recognition of digits in bank checks and postal codes.
Nevertheless, the low capacities of previous computers prevented a good training as well as the use of more complex and deeper models with more layers.
2012 was a real breakthrough in the complexity of convolutional networks, with the article presenting the AlexNet model. Although not very different in substance from the LeNet-5, this new model is deeper and contains many more parameters, about 12 millions. In 2014, the model VGG-16 saw a considerable increase in depth -13 convolutional layers versus 5 for AlexNet– thus in the number of parameters to optimize (138 million) .
Therefore, the models had become very heavy, mainly due to the new and great capacity of computers to be able to manage these enormous neural networks. From then on, the research will more and more focus on the improvement of architecture efficiency and not just a simple increase of parameter number.
A way of improving the performance of neural networks is to increase not only depth, but also the model width. While previously the convolutional layers were just following each other, the Inception-V1 model published in the article in 2014 uses convolution filters put side by side in blocks called Inception.
Each block contains several convolutions of different dimensions, in order to extract information of different sizes. The small convolution filters focus on small areas of the image, while larger filters capture more global information.
Figure 5 shows an example of an Inception block. The image or the previous layer, is processed in parallel by convolution filters of several sizes : blue, red and violet squares. Sizes are exaggerated here to make them visible, normally filter dimensions are often 7 × 7 pixels at maximum. Then the different information is concatenated to be passed in one piece to the next layer.
A significant improvement of Inception-V1 was released in 2015, named Inception-V3 . The advances are mainly related to the factorization of convolution filters, by decomposing for example a filter n × n into two : the first one of dimension 1 × n followed by a filter of size n × 1.
The Inception architecture greatly improved model performances while lowering learning time, in particular by reducing number of trainable parameters : only 5 millions for Inception-V1 and 25 millions for Inception-V3, whereas VGG-16 contained 138 million neurons. Nevertheless, problems persisted during the learning process, problems that will be mostly corrected by future architectures.
A major problem in neural network training is the vanishing gradient problem. Training is iterative : at each step the parameter values (or weights, neurons) are adjusted in order to improve the model performance. To each initial value is added its gradient, which indicates the direction (positive or negative gradient) and the level of adjustment necessary to minimize an error function. But often this gradient can be equal to zero, preventing a real update of parameters. This can happen after a good number of iterations, which is normal and corresponds to the end of learning process since the network is no longer able to draw new relevant information from the images to improve itself. But the vanishing gradient could also occur very quickly, after a few steps, which is a problem since it comes from a numerical error.
Moreover, the common belief at the time was that increasing the depth of a model automatically improved its performance. However, this did not translate into practice since some less complex models managed to beat deeper models.
In 2015 are introduced the Residual networks, also called ResNet, in the article . Their particularity is that at each block, the input is redistributed to the output, as shown in figure 6. Thus the model only learns the effects of convolution, without depending on the initial input, allowing a better generalization and efficiency, hence the term residual since learning is done on the difference between input and output (thus the residual) and not on pure output. Moreover, the vanishing gradient problem is very often avoided with this architecture.
Since then, several improvements to these residual networks have been made. An approach combining the Inception and Residual architectures is first proposed in 2016 (Inception-ResNet), then in 2017 (ResNeXt).
Another axis of improvement is brought by the so-called dense models (DenseNet), first published in 2017 . This architecture does not use the Inception blocks, but pushes the concept of the ResNet to the maximum. While in the latter, only one link is added per convolutional block, a densely block transmits its input to all the following blocks, as shown in figure 7. This architecture is to date one of the most efficient, with the Inception-ResNet .
Automatic analysis of medical images, especially for classification purposes, has made significant progress in recent years. The increase in computational capacities as well as the improvement of Deep Learning methods, of which we have described the long evolutions () in this article, have allowed a significant increase in classification model accuracy, as much as to consider their use in a real clinical setting in order to assist practitioners, particularly for early detection of diseases.
Nevertheless, some problems concerning neural network models are regularly raised, such as their reliability and consistency. Indeed, a model, even if efficient, can be based on areas of the image considered to be of little or no clinical relevance by physicians. This can happen when the model is based on images containing artifacts that are more present in one class than another.
Consequently, it is essential to better understand how neural networks work and behave, especially for individual diagnosis by visualizing areas considered by the model as being the most important in its decision making.
Several techniques, grouped under the notion of explicability, have been developed in recent years. The next article describes the state of the art in this field, and its use in medical imaging.
Share this article
No consensus exists about the doses of analgesics, sedatives, anesthetics, and paralytics used in critically ill neonates.
Kaduceo, co-author of work presented at the 24th International Workshop on Design, Optimization, Languages and Analytical Processing of Big Data
G. Litjens, T. Kooi, B. E. Bejnordi, A. A. A. Setio, F. Ciompi, M. Ghafoorian, J. A. Van Der Laak, B. Van Ginneken, and C. I. Sánchez, “A survey on deep learning in medical image analysis,” Medical image analysis, vol. 42, pp. 60–88, 2017.
S. K. Zhou, H. Greenspan, C. Davatzikos, J. S. Duncan, B. van Ginneken, A. Madabhushi, J. L. Prince, D. Rueckert, and R. M. Summers, “A review of deep learning in medical imaging : Imaging traits, technology trends, case studies with progress highlights, and future promises,” Proceedings of the IEEE, 2021.
“Rétinopathie diabétique – snof.” https://www.snof.org/encyclopedie/r%C3% A9tinopathie-diab%C3%A9tique. Accessed : 2020.
V. Dumoulin and F. Visin, “A guide to convolution arithmetic for deep learning,” arXiv preprint arXiv :1603.07285, 2016.
Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, “Gradient-based learning applied to document recognition,” Proceedings of the IEEE, vol. 86, no. 11, pp. 2278–2324, 1998.
A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” Advances in neural information processing systems, vol. 25, pp. 1097–1105, 2012.
K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” arXiv preprint arXiv :1409.1556, 2014.
C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich, “Going deeper with convolutions,” in Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 1–9, 2015.
C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna, “Rethinking the inception architecture for computer vision,” in Proceedings of the IEEE conference on computer vision and pattern
recognition, pp. 2818–2826, 2016.
K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770–778, 2016.
C. Szegedy, S. Ioffe, V. Vanhoucke, and A. Alemi, “Inception-v4, inception-resnet and the impact of residual connections on learning,” in Proceedings of the AAAI Conference on Artificial Intelligence, vol. 31, 2017.
S. Xie, R. Girshick, P. Dollár, Z. Tu, and K. He, “Aggregated residual transformations for deep neural networks,” in Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 1492–1500, 2017.
G. Huang, Z. Liu, L. Van Der Maaten, and K. Q. Weinberger, “Densely connected convolutional networks,” in Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 4700–4708, 2017.
S. Bianco, R. Cadene, L. Celona, and P. Napoletano, “Benchmark analysis of representative deep neural network architectures,” IEEE Access, vol. 6, pp. 64270–64277, 2018.
A. Khan, A. Sohail, U. Zahoora, and A. S. Qureshi, “A survey of the recent architectures of deep convolutional neural networks,” Artificial Intelligence Review, vol. 53, no. 8, pp. 5455–5516, 2020.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510368.33/warc/CC-MAIN-20230928063033-20230928093033-00133.warc.gz
|
CC-MAIN-2023-40
| 15,801
| 61
|
https://sharepoint.stackexchange.com/questions/172928/discussion-board-reply-issue
|
code
|
I have a discussion board and have set an item level permission
Manage Hierarchy depending upon the users. Means user can able to see the discussion in which that particular user have rights. My issue is I have a right in a discussion say "Disc1". But I am not able to reply in that discussion.
Any help would be appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819089.82/warc/CC-MAIN-20240424080812-20240424110812-00298.warc.gz
|
CC-MAIN-2024-18
| 325
| 3
|
https://blogs.brighton.ac.uk/computing/2017/08/22/a-winning-placement-year/
|
code
|
A winning placement year
Arun Sharma is currently on placement as a junior software engineer at West Control Solutions, and is one of two recipients of the Lancia Consult Award for Excellence in a Computing Placement Year at our school awards ceremony.
We caught up with Arun, a student on our Computer Science (Games) course, to find out more about his placement and life at Brighton.
“I’ve always wanted to explore a degree with an emphasis on games, and Brighton offered me the chance to do so, with the opportunity to transfer from a partner college to the second year of the Computer Science (Games) course here.
Highlights of the course for me include the variety of lecturers and their well-established backgrounds, and the 3D Graphics and Animation and the Intelligent Systems modules. Intelligent Systems not only provided a glimpse into game development but also other real-world applications.
I must also recommend the placement year; regardless of any computing course you apply for. It expands your knowledge, allows you to make new contacts as well as possibly having a job offer at the end of it!
The placement office was absolutely excellent, consistently reviewing and offering improvements to my CV and offering mock interviews and tips. I am currently on placement at West Control Solutions as a junior software engineer. The Computer Systems Architecture module has been invaluable for my placement, giving me a solid understanding hardware basics for computer systems. I have already formulated a final year project using the technologies and programming languages I have acquired on placement.
I plan to use my course to get into the games industry. In addition to this, there is a possibility I may pursue a masters in Software Engineering using this degree as a base.”
Congratulations to Arun on his achievements so far!
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710409.16/warc/CC-MAIN-20221127141808-20221127171808-00590.warc.gz
|
CC-MAIN-2022-49
| 1,850
| 9
|
http://superuser.com/questions/171790/print-pdf-file-with-file-path-in-footer
|
code
|
I would like to print a PDF on windows, but want to print the path of the PDF file in the footer of the printed document (like I am able to do in Word).
We are using either Adobe Reader or Foxit Reader.
Do you know any way how to achieve this ?
OK then. Let me also give it a shot. Since we are here on superuser.com (and not stackoverflow.com), I'll do without a programming language, and use just (batch) scripting instead.
First step: Use Ghostscript to create a PDF footer page showing the 'footer' string with a path
We'll use a relatively simple Ghostscript command for that. The command takes a short PostScript snippet as commandline input (
Now we have a PDF page that contains the footer only, with the rest of the canvas without any content. You can open it in a viewer and see that the string starts at 72 PostScript points (72 pt == 1 inch) to the left of the lower left corner, and 12 points to the top.
Second step: Use the PDF ToolKit to overlay the footer page with your original PDF
We'll use the PDF ToolKit's
(BTW, pdftk is also derived from the iText libarary, the one the other answer refers to.)
Third step: Create a batch script that makes both previous steps happen automatically
This is left for your exercising pleasures... ;-)
You may want to rotate the string by 90 degree, so it reads vertically on the left page border. For this case modify the Ghostscript command like this:
There is no way to auto-update this like the field in Word. But what you can do is process the file after the it is created, and moved to the location other than the source document. PDF was really designed for printing and the changed to allow forms and other stuff was just a hack.
I am guessing that you will want this to be some kind of automated process and generic, so you will need to use a seperate library to do this. One of the most prolific is iText which is a java open source library that allows the editing of PDF files. It is not too hard to use and I will provide an example below of the code you will need to make this exercise work.
You will need the JDK and iText from sourceforge. Here is the java code
This code has some issues, and since I don't know all the specifics then here they are:
Since pdf doesn't have the 'autoupdate' fields you do not want to change the pdf association to point to a script to run this, because then every other time that you open the file it will rewrite the footer.
Here's a windows batch file built from @Kurt's answer:
You may need to change
The units in the
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257830091.67/warc/CC-MAIN-20160723071030-00029-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 2,520
| 21
|
https://usawire.com/complete-list-of-mechanical-keyboard-sizes-and-number-of-keys/
|
code
|
Mechanical keyboards have seen a huge surge in popularity in recent years among typists, gamers, and computer enthusiasts. Unlike traditional membrane keyboards, mechanical keyboards use physical switches under each key to provide superior tactile feedback and durability.
One of the biggest differences between mechanical keyboards is their size and number of keys. Knowing the various sizes and layouts can help you choose the right mechanical keyboard for your needs. Here is a complete guide to the different mechanical keyboard sizes and number of keys.
Full Size (104 Keys)
The full-size keyboard is the most common layout and what most desktop computer keyboards use. Full-size keyboards have 104 keys in a standard QWERTY layout. This includes:
- Alphanumeric keys (letters, numbers, symbols)
- F1 – F12 function keys
- Navigation/edit keys like insert, home, page up/down
- Numpad with 17 keys
- Media controls, system keys
The full layout provides easy access to all keys but takes up a lot of desk space. Full-size keyboards are ideal for typists who need to use the numpad and function keys regularly. They offer the most keys in a familiar layout.
Tenkeyless (TKL) (87 Keys)
Tenkeyless or TKL keyboards lack the numpad section and condense the overall footprint. TKL keyboards have 87 keys, with the same QWERTY layout and function keys as a full-size keyboard. The only difference is the absence of a numpad.
TKL keyboards free up desk space on the right side and allow you to position your mouse closer. Gamers often prefer TKL keyboards for more comfortable mouse movement during gameplay. The compact layout also makes them highly portable.
80% (75 Keys)
80% of keyboards shrink the footprint even further by integrating the function keys and arrow keys into the alphanumeric block. This condensed layout has around 75 keys in a minimalist setup. You still get the standard letters, numbers, and modifiers. But you’ll need to use function combos to access the function and arrow keys.
The 80% size retains the essentials while being extremely space-efficient. They excel for travel or small workstations. But you’ll need to adjust to the layered function key combos.
60% (61 Keys)
60% of keyboards take compact layouts to the extreme, getting rid of the function row, arrow keys, and navigation cluster. 60% of keyboards have just 61 keys with only the alphanumeric block. All the other keys are accessible through Function layers.
60% keyboards like the Pok3r and Anne Pro are highly portable and great for travel. However, they require memorizing several function layers to be productive. The unusual layout also makes them harder to use for extended durations.
40% (48 Keys)
At the far end, 40% of keyboards consist of just the letter keys in a grid, without number or modifier keys. You get 48 keys with all numbers, functions, and controls tucked away in Function layers.
40% of keyboards like the Plank and Planck are novelty items or for expert enthusiasts. The extremely compact size is unmatched but requires constant access to Function layers to type efficiently. Most people will find them impractical for daily extended use.
Additional Size Variants
Along with the standard sizes above, there are some less common variants:
- 65%: A smaller 65% layout lacking F-row and navigation but retaining dedicated arrow keys.
- 75%: A condensed 75% layout with integrated function row and arrow keys but no numpad.
- 96%: Basically full-size but without the numpad section.
- 98%: A full layout with all keys but more compact spacing.
Choosing Your Keyboard Size
When picking your first mechanical keyboard, consider your needs and desk space. Full-size or tenkeyless designs offer easy access to all keys for most users. More compact keyboards trade ease of use for minimalist aesthetics and portability. Consider what features and keys you regularly use before deciding on a specific keyboard size.
Hopefully, this complete guide has clarified the available mechanical keyboard sizes and layouts. Once you’ve decided on size, you can narrow down switch types, brands, and other features to find your ideal mechanical keyboard match. The customizable nature of mechanical keyboards means you can tailor them precisely to your typing style and requirements.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099942.90/warc/CC-MAIN-20231128183116-20231128213116-00737.warc.gz
|
CC-MAIN-2023-50
| 4,285
| 31
|
https://stackoverflow.com/questions/42450665/python-print-module-says-the-file-name-is-not-defined
|
code
|
This question already has an answer here:
- Correct way to write line to file? 10 answers
Working on a Head First Python book, 2010, I've encountered an exercise where I had to print a list into a specific file, and another list into another one. Did all the code, everything works, except for the print module which says the name of the file is not defined, which is pretty weird since the solution of the exercise it's the exact same code of mine.
import os man = other = try: data = open('ketchup.txt') for each_line in data: try: (role, line_spoken) = each_line.split(":", 1) line_spoken = line_spoken.strip() if role == 'Man': man.append(line_spoken) elif role == 'Other Man': other.append(line_spoken) except ValueError: pass data.close() except IOError: print("The data file is missing!") print(man) print(other) try: out = open("man_speech.txt", "w") out = open("other_speech.txt", "w") print(man, file=man_speech) #HERE COMES THE ERROR print(other, file=other_speech) man_speech.close() other_speech.close() except IOError: print("File error")
Here is the error from the IDLE:
Traceback (most recent call last): File "C:\Users\Monok\Desktop\HeadFirstPython\chapter3\sketch2.py", line 34, in print(man, file=man_speech) NameError: name 'man_speech' is not defined
Am I doing something wrong about the syntax, or maybe I didn't get how the print module works? The book doesn't give me any clue about it. I've also checked for lot of questions here and in some other forums, but nothing seems wrong with my code, and I'm actually tilted.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247494125.62/warc/CC-MAIN-20190220003821-20190220025821-00583.warc.gz
|
CC-MAIN-2019-09
| 1,545
| 7
|
http://socj.telkomuniversity.ac.id/ojs/index.php/ijoict/article/view/489
|
code
|
WhatsApp Chat Visualizer: A Visualization of WhatsApp Messenger’s Artifact Using the Timeline Method
WhatsApp is a medium that everyone can use to interact and to share information effectively and efficiently. However, it can be misused for criminal activities. Analyzing WhatsApp' artifacts is quite challenging as the suspect may have a lot of random conversational data to be considered. This makes it difficult for the trial process to obtain digital traces that can be identified in malicious activities such as knowing who was involved when the conversation was held and the timespan. Therefore, in this research, a social media investigation of WhatsApp was carried out by acquiring data from rooted Android devices that were used as target devices for forensic activities. A python-based application is developed to show the content of the conversation, and a web-based application is presented to visualize the data using the Timeline method. Experimental results in this research display important timeline information such as information about who was involved when and what time the conversation was carried out with the suspect.
Allen, R. B. (1995). Interactive timelines as information system interfaces. In Symposium on digital libraries (Vol. 175, p. 180).
Anglano, C. (2014). Forensic analysis of whatsapp messenger on android smartphones. Digital Investigation, 11(3), 201–213.
Anwar, N., & Riadi, I. (2017). Analisis investigasi forensik whatsapp messenger smartphone terhadap whatsapp berbasis web. Jurnal Ilmu Teknik Elektro Komputer dan Informatika (JITEKI), 3(1), 1–10.
Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet. Academic press.
Clement, J. (2020, Apr). Number of monthly active whatsapp users as of 2013-2020. statista.com. Retrieved from https://www.statista.com/statistics/260819/ number-of-monthly-active-whatsapp-users/
Cortjens, D., Spruyt, A., & Wieringa, W. (2012). Whatsapp database encryption project report (Tech. Rep.). Technical report, 2011. Available at https://www. os3. nl/media/2011-2012.
Google. (2020, Jan). Timelines | charts | google developers. Author. Retrieved from https:// developers.google.com/chart/interactive/docs/gallery/timeline
Hariyadi, D., Winarno, W. W., & Luthfi, A. (2016). Analisis konten dugaan tindak kejahatan dengan barang bukti digital blackberry messenger. Teknomatika STMIK Jenderal Achmad Yani Yogyakarta, 9(1), 81–89.
Koum, J., & Acton, B. (2016, Apr). Whatsapp. Retrieved from https://blog.whatsapp.com/ end-to-end-encryption
Nguyen, P. H., Xu, K., Walker, R., & Wong, B. W. (2014). Schemaline: Timeline visualization for sensemaking. In 2014 18th international conference on information visualisation (pp. 225–233).
Nguyen, P. H., Xu, K., Walker, R., & Wong, B. W. (2016). Timesets: Timeline visualization with set relations. Information Visualization, 15(3), 253–269.
Olsson, J., & Boldt, M. (2009). Computer forensic timeline visualization tool. digital investigation, 6, S78–S87.
Pavlik, M., & MacIntoch, S. (n.d.). John, & shawn.(2015). Converging Media, 189.
Plaisant, C., Milash, B., Rose, A., Widoff, S., & Shneiderman, B. (1996). Lifelines: visualizing personal histories. In Proceedings of the sigchi conference on human factors in computing systems (pp. 221–227).
Pomalingo, S., Sugiantoro, B., & Prayudi, Y. (2019). Data visualisasi sebagai pendukung investigasi media sosial. ILKOM Jurnal Ilmiah, 11(2), 143–151.
Sai, D. M., Prasad, N., & Dekka, S. (2015). The forensic process analysis of mobile device. Int. J. Comput. Sci. Inf. Technol, 6(5), 4847–4850.
Stab, C., Nazemi, K., & Fellner, D. W. (2010). Sematime-timeline visualization of time-dependent relations and semantics. In International symposium on visual computing (pp. 514–523).
Tassone, C., Martini, B., & Choo, K.-K. (2017). Forensic visualization: survey and future research directions. In Contemporary digital forensic investigations of cloud and mobile applications (pp. 163–184). Elsevier.
Tassone, C. F., Martini, B., & Choo, K.-K. R. (2017). Visualizing digital forensic datasets: a proof of concept. Journal of forensic sciences, 62(5), 1197–1204.
Thakur, N. S. (2013). Forensic analysis of whatsapp on android smartphones.
Umar, R., Riadi, I., Zamroni, G. M., et al. (2018). Mobile forensic tools evaluation for digital crime investigation. Int. J. Adv. Sci. Eng. Inf. Technol, 8(3), 949.
Wang, Z., & Yuan, X. (2014). Urban trajectory timeline visualization. In 2014 international conference on big data and smart computing (bigcomp) (pp. 13–18).
Yadav, S., Prakash, S., Dayal, N., & Singh, V. (2020). Forensics analysis of whatsapp in android mobile phone. Available at SSRN 3576379.
Copyright (c) 2020 Hardiansyah Shidek, Niken Cahyani, Aulia Arif Wardana
This work is licensed under a Creative Commons Attribution 4.0 International License.Manuscript submitted to IJoICT has to be an original work of the author(s), contains no element of plagiarism, and has never been published or is not being considered for publication in other journals. Author(s) shall agree to assign all copyright of published article to IJoICT. Requests related to future re-use and re-publication of major or substantial parts of the article must be consulted with the editors of IJoICT.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703522133.33/warc/CC-MAIN-20210120213234-20210121003234-00285.warc.gz
|
CC-MAIN-2021-04
| 5,311
| 27
|
http://commit-digest.org/issues/2007-03-11/moreinfo/639110/
|
code
|
Revision 639110(Back to digest)
Features in Office
This fixes a design error in the layer box.
Dockers will outlive their views if the mainwindow is reused for anothe document, for example by loading another document into it. So don't use a pointer to the view in the docker.
This again allows you to close the document and open a different one.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708766848/warc/CC-MAIN-20130516125246-00031-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 345
| 5
|
https://community.filemaker.com/thread/66442
|
code
|
This is the defined behavior and there is no way to get around it given the way you are doing things. The idea though is to not leave databases - in the active hosted files folder, but closed - for an extended period of time. If you are not going to have the dB hosted for more than a short period, then use the "Remove" command in the FMS admin console. This will move the file(s) out of the hosted files folder into a special sub-folder called Removed_by_FMS.
You can easily put files back on-line using the console and picking the files from the Removed_by_FMS sub-folder.
The other thing to consider is what happens if your server machine is restarted on purpose or due to a power interruption, etc. Assuming you have the default setting in the FM server configuration to "auto open files on server startup", the file(s) that you had closed will now open up. You have to remember to close them right after the server starts. If you have lots of files, it would be easy to forget which ones you had closed.
Not sure of your environment, but this behavior is desired in a larger setup where you might have multiple FM devs, a separate IT department that manages the servers, and so forth. In my case, I want to see the error emails about a dB being closed so I can take action. If I have closed a dB temporarily, and a backup runs, then fine. The error email is a reminder that I am doing something with that dB.
I think what you are looking for would be a new option in the FM server configuration that would say to "ignore closed files" during backup. Go ahead and put in a feature request. You never know.
1 of 1 people found this helpful
Thank you, Doug, for the answer;
I agree: this is a FileMaker behavior and what you say is an interpretation of FileMaker point of view.
The option "ignore closed file" could be am interesting feature, in our case:
- we have some converted solution from FM 6 and then composed of many files (yes, I know it's better rewrite all.. , but... just now we have many files); some of them are in test and we would open/close them in case of use or not;
- we have many solutions in test in our FMS (in developer office) and we would open/close them: all open solutions exceeds the limit of open files in FMS;
And then: would be an appreciate feauture the "open/close all files" limited for a specific folder; in early versions it was possible; why now it isn't? or is there a trick I do not know?
in my previous post I said "the database was intentionally closed and removed"; in only one case I removed too an unnecessary file and I receved the mail "Error 92" for it, for many days. Then the server was restarted and the problem finished. I think this was a bug... what do you think?
Thanks to those who will reply to this post
1 of 1 people found this helpful
Understand on juggling files in testing and so forth.
For closing files, you can select multiple files in the list and then do a 'close' on just those files. You can shift-select a range of files or command/control-click on separate files to pick them individually. I too, was expecting to be able to click on a folder and have the selected operation act on all files in the folder. Selecting multiple files is pretty quick once you get in the habit. Don't forget that you can do a right-click on your select file(s) and get a menu of the actions. You don't have to select and then go up to the drop-down menu at the top to select the action and then finally click the perform button.
As for the error 92 still happening even after the file was removed, I have not seen this specifically, but have seen other things such as scheduled tasks, where the admin console does not update properly. You can restart the admin console process without having to restart the entire FM server. This clears issues like yours pretty much every time.
Use the command line/terminal for this. You either need to navigate to the server folder where the fmsadmin application is located or you need it in your 'path' environment variable.
> fmsadmin restart adminserver
You can get a list of commands with
>fmsadmin help commands
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105451.99/warc/CC-MAIN-20170819124333-20170819144333-00070.warc.gz
|
CC-MAIN-2017-34
| 4,107
| 22
|
https://sdtimes.com/infragistics/office-styling-ribbon-come-to-infragistics-controls/
|
code
|
Microsoft Office styling across all .NET platforms, and the addition of the Office 2010 Ribbon to its Windows Forms-based products, highlight the changes in the release today of Infragistics’ NetAdvantage Ultimate suite of user interface development tools.
The suite includes Infragistics’ UI control sets for Windows Forms and ASP.NET, as well as its line-of-business toolkits for Windows Presentation Foundation (WPF) and Silverlight, along with two data visualization controls for WPF and Silverlight, according to Andrew Flick, product unit manager for Infragistics’ NetAdvantage product line.
The move to the Office style was necessary “to enable customers rolling it out to have their applications take on the 2010 look and feel,” he said. “We didn’t want people working in Outlook 2010 to have apps that look like they were created three years ago.”
The company is also bringing a unified XAML strategy to its line-of-business controls for WPF and Silverlight. A new xamSchedule control for schedules and a new xamDataTree for data handling have been introduced to those tool sets, Flick explained. The xamDataTree “supports infinite depth, millions of nodes, that can be expanded and drilled down with no problems,” he said. The company also tuned the controls for performance gains, he added.
The two new data visualization control sets are part of the company’s unified XAML strategy for enabling developers to create dynamic business intelligence applications, Flick said. New support for SAP as a data source and support for writing OLAP-based Pivot Grid output to the Excel 2010 format (.xlsx) are built in, he said.
Pivot Grid is used to present multi-dimensional data that can be drilled into to extract deeper meaning, Flick explained. “These data components are very high-end,” he said. Also, xamMap, which was available in the previous version of Silverlight Data Visualization (10.2), is now in the WPF Data Visualization toolkit.
Infragistics introduced xamDataChart in the 10.2 version of the data visualization packages, and in this release, the company is targeting high-performance scenarios with new chart types such as spider charts, polar line and polar spline graphs, radial charts, and more. The data visualization packages also include an early release of xamOrgChart, used to create high-performance hierarchical organization charts that represent workgroup structures.
The NetAdvantage Ultimate 2010 Volume 3 suite sells for US$1,895, and jumps to $2,395 with priority support. NetAdvantage for .NET, which includes the UI controls for Windows Forms, ASP.NET, WPF and Silverlight, sells for $1,295, and $1,795 with priority support. Each product also is sold individually for $995, or $1,495 with priority support.
“We’ve always bundled things together,” Flick said. “There are hundreds of controls, everything anyone needs to build line-of-business applications and create data visualizations. Now we’re offering everything individually.”
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474573.20/warc/CC-MAIN-20240225003942-20240225033942-00500.warc.gz
|
CC-MAIN-2024-10
| 3,009
| 9
|
https://testimato.com/fi/tag/hello
|
code
|
Tää on tämmönen toinen mun kysely joka liittyy peleihin Nauttikaa!#hello
This is my first test entirely in English! Here you can find out if you can speak English as well as I do;) ATTENTION!!! Some answer options may be in Finnish. And remember that I am not talking about pretty fluent in English, but in the school I'm really good at it, yes. Probably one of the best in the class;D#nickyisthebest #enkkutesti #osaatkoenglantia? #hello #english #englishtest #canyouspeakenglish?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703517966.39/warc/CC-MAIN-20210119042046-20210119072046-00311.warc.gz
|
CC-MAIN-2021-04
| 485
| 2
|
https://deskshare.com/help/AFM/Filters.aspx
|
code
|
Add Filters to the Files
With Filters, you can choose to either transfer only certain file types (for instance, Microsoft Word .doc files), or send everything except certain file types (for instance, you can choose not to transfer Word backup [.wbk] files). By default, all file types are included in automated file transfer. With the filters option you can specify folders which you do not want to included in the transfer also you can decide whether files of the particular size or modification date should be included in the transfer or not. Additionally, you can use the wildcard character "*" to select files based on patterns in their names. The five type of filters you can set for files during automated transfer are Select folders to exclude, Modification Date, File Size, File Name and File Type.
To add Filters in your Automated Transfer Profile, Check the File and Folder Filters and Configure it from Automated Rules settings.
Select folders to exclude
Sometimes you may want to exclude specific file or folder from the transfer. With Select folders to exclude option choose files and folders which you do not want to include in the transfer process. Excluded items are not transferred unless you remove them from the excluded items list. Exclude all existing and newly created subfolders to transfer only files from Home Folder. This option is provided for both source and destination location, helping you to transfer specific files.
If you enable this option, you can filter files which are recently modified or which are older than a day, an hour or a minute. For example- Transfer files that have changed in the last 10 mintues.
The File Size option allows you to Include or Exclude files by specifying the lower and upper size limit, or just the files that are greaterthan, lesserthan, or equal to a specific size.
You can add files for transfer by matching their names. Add the files that begin with, end in, or contain specific characters (these characters are case-insensitive). Specify these characters in the text box that is provided.
If you select beginning with, the filter will match files whose names start with the contents of the File Name. For instance, if you chose to Include files beginning with Set, files name "setting sun.doc" and "Seth Brosky's Birthday Party.avi" would be transferred, but "Seriously Cool Guitar Solo.mp3" would not.
Ending with is just the opposite. If you choose to Exclude files ending with.ttf, files name "Arial.ttf" and "Courier.ttf" would not be transferred. The program matches files containing the text if in the filename. For instance, if you choose to Include files containingsally, files called "Sally's last day at school.avi" and "This is sally's birthday photo.jpg" would be transferred. The letters have to be together. A file called "S A L L Y!.mp3" would not be transferred.
Matching the Wildcard
Another option is matching the wildcard that lets you create more complex patterns.
An asterisk "*" matches any number of characters. For instance, POWER*.WM? will match any Windows Media audio or video file (they end in either ".wmv" or ".wma".) that starts with the letters "power". The asterisk "*" matches any number of characters, or none. For instance, "*doc" matches algebra.doc and catastrophe.doc. Similarly*sally*, will match all the file name containing the word sally.
A question mark "?" matches any one character. For instance, "??.txt" matches ab.txt and z8.txt, but not abc.txt or q.txt.
You can create multiple File Name filters. Separate multiple values with semicolons. For instance, if you want to exclude all files that start with "flash" and also those that start with "lowlight", you would enter select Exclude and enter the value flash*; lowlight*.
File Type option helps you specify whether you want to Include or Exclude files of a certain type. Enter file extensionorselect from dropdown list that you want to include or exclude from the transfer and add it to Include or Exclude list. You can Add or Remove file types from the Include and Exclude list. Use semicolon (;) to mention multiple file extensions.
Note: A Quick Connection Profile does not have Action Rules, Filters and Schedules, but you can add them by converting the existing quick connect profile to an automated profile.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817765.59/warc/CC-MAIN-20240421101951-20240421131951-00716.warc.gz
|
CC-MAIN-2024-18
| 4,286
| 17
|
https://nordvpn.com/cybersecurity/glossary/terminal-node-controller/
|
code
|
Terminal node controller
Terminal node controller definition
A terminal node controller (TNC) is a device that acts as an interface between a computer and a radio to facilitate data communication over amateur radio networks. TNCs are primarily used for packet radio, a communication protocol that enables transmission of digital data packets via radio frequencies. They consist of a modem, a processor, and firmware that encodes and decodes data packets according to the AX.25 protocol, ensuring reliable data exchange between radio devices.
Terminal node controller examples
- Kantronics KPC-3: A popular TNC model used by amateur radio operators for packet radio communication, APRS (Automatic Packet Reporting System), and other digital modes.
- MFJ-1270X: A versatile TNC that supports various digital communication modes, including packet radio, RTTY, and PACTOR.
Terminal node controller vs. sound card modem
While TNCs have dedicated hardware and firmware for handling digital communication, sound card modems utilize a computer’s sound card and software to perform similar functions. Sound card modems are more affordable and versatile but may be less reliable and perform more slowly than dedicated TNCs.
Tips for using terminal node controllers
- Ensure your TNC’s firmware is up to date to avoid compatibility issues and maintain optimal performance.
- Choose a TNC that supports your preferred digital communication modes and offers reliable performance.
- Configure your TNC according to the specific requirements of the radio device and software you are using.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100972.58/warc/CC-MAIN-20231209202131-20231209232131-00073.warc.gz
|
CC-MAIN-2023-50
| 1,578
| 12
|
https://support.reflektive.com/hc/en-us/articles/360007588071-Embedding-Reflektive
|
code
|
To facilitate broader reach of Reflektive Recognition, customers can now display the Reflektive web application via an iFrame or widget on their intranets or other internal company sites. This article provides details on how you can embed Reflektive.
First, reach out to Reflektive via email@example.com to request embedding support be enabled. The Reflektive team will follow up directly once the feature is turned on; it is not enabled by default. Additionally, you will have to provide your company's web domain for Reflektive to whitelist so that the iframe content can render properly.
(eg: if your company intranet is "www.thebestcompany.com", we would whitelist "thebestcompany.com")
Once you have set up Reflektive to display in your chosen site, several changes take effect:
- Users will not be able to log in through the iFrame/widget version of Reflektive; instead, they must first log in to the main web application in the same browser. When logged out, visiting Reflektive via an iFrame/widget will display a page like this:
- Once logged in, users will initially see an alert informing them that Reflektive is being displayed through an iFrame. Users can then dismiss this message and proceed to Reflektive if they choose:
- For users that choose to proceed, they will then be able to interact with Reflektive as normal; if the iFrame is reduced in width, they may also see the mobile web view of Reflektive.
Print this Guide
Use this guide for reference or share it with your team by saving or printing this page. Right-click anywhere on this page to save or print.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305420.54/warc/CC-MAIN-20220128043801-20220128073801-00060.warc.gz
|
CC-MAIN-2022-05
| 1,580
| 9
|
http://www.instructables.com/id/Mini-Light-Panel-Kit/
|
code
|
What do you do with a leftover LED-strip, well you turn it into good looking little cabinet lights. That's what I did and I'd like to show you how you can build your own small led panels for many different purposes.
To make a few panels you don't need much much experience or skills neither do you need a whole lot of materials. The few things that are required are:
To power it you will furthermore need
And a few tools:
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190753.92/warc/CC-MAIN-20170322212950-00208-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 421
| 4
|
https://gstreamer.freedesktop.org/releases/gst-plugins-base/0.10.22.html
|
code
|
Release notes for
GStreamer Base Plug-ins 0.10.22
"hidey hidey hidey ho"
The GStreamer team is proud to announce a new release
in the 0.10.x stable series of the
GStreamer Base Plug-ins.
The 0.10.x series is a stable series targeted at end users.
It is not API or ABI compatible with the stable 0.8.x series.
It is, however, parallel installable with the 0.8.x series.
This module contains a set of reference plugins, base classes for other
plugins, and helper libraries.
This module is kept up-to-date together with the core developments. Element
writers should look at the elements in this module as a reference for
This module contains elements for, among others:
Other modules containing plug-ins are:
- device plugins: x(v)imagesink, alsa, v4lsrc, cdparanoia
- containers: ogg
- codecs: vorbis, theora
- text: textoverlay, subparse
- sources: audiotestsrc, videotestsrc, gnomevfssrc
- network: tcp
- audio processing: audioconvert, adder, audiorate, audioscale, volume
- visualisation: libvisual
- video processing: ffmpegcolorspace
- aggregate elements: decodebin, playbin
- contains a set of well-supported plug-ins under our preferred license
- contains a set of well-supported plug-ins, but might pose problems for
- contains a set of less supported plug-ins that haven't passed the
rigorous quality testing we expect
Features of this release
- Require gettext 0.17
- Replace audioresample with speexresample from -bad
- Support new formats in RIFF: uncompressed RGB, WMA lossless, VP6
- Move libgstapp and elements from -bad
- Support color-key setting and probing for Xv properties
- Improve typefinding for various formats
- Extend audio sinks for pull-mode operation
- Support for more subtitle formats
- More development on decode2bin and playbin2
- RTP and SDP fixes
- Many bug fixes and improvements
Bugs fixed in this release
: theoraenc likely ignoring segments
: rtspsrc element takes long time to error out if the addre...
: [volume] deadlocks with a controller attached
: [xvimagesink] allow setting colorkey if possible
: colorkey in xvimagesink gets reset when element is reused
: libresample doesn't handle > factor of 2 rate conversion
: [audioresample] doesn't do anti aliasing
: [audioresample?] investigate high CPU usage
: [subparse] can't handle UTF-16 charset encoded subtitle.
: [vorbisenc] vorbisenc has problems with a gnlsource that ...
: gstoggmux EOS handling issue
: [audioresample] unit test fails on 64bit linux
: audioresample doesn't negotiate ideal caps
: UTF-16 srt confuses gstreamer, misdetected as mp3
: Implementation of SLAVE_SKEW in baseaudiosrc
: audioresample producing strange sized buffers
: audioconvert can overflow with big audio buffers
: Add ability to specify format for date/time display in Gs...
: Doesn't display srt subtitles saved with BOM
: add FFV1 fourcc to riff-media
: subrip subtitles typefind too strict
: [PATCH] theoradec: prefer container's pixel aspect ratio ...
: build failure in tests/icles
: Last byte of FLAC image buffer chopped off
: subparse check fails
: [PLUGIN-MOVE] Move speexresample as audioresample2 to -base
: ALSA sink hangs on USB audio device unplug while playing
: does not play windows media streams correctly
: `gst_base_audio_sink_sync_latency' should call `gst_base_...
: videorate element add image/jpeg to caps template
: playbin2 additions
: Playbin2 should work without volume too
: oggdemux hangs when given corrupt input via non-seekable ...
: build without gdk fails
: ximagesink/xvimagesink : _alloc_buffer returns non-clean ...
: Implement gst_rtcp_packet_remove
: [rgvolume] Unit test fails with passthrough assertions
: Theora check out of date
: GNOME Goal: Clean up GLib and GTK+ includes
: MS Word files are recognised as audio/mpeg and OSX's .DS_...
: Documentation of TCP plugins
: GstBaseAudioSink should register its enums and have corre...
: GstBaseAudioSrc should register its enum and have corresp...
: Move appsrc/appsink to -base
: Audiosink blocks if setcaps called while playing
: playbin2 test7.c fails after two songs
: [appsrc/sink] add padding, move private data to private s...
: [gstapp] No pkg-config file
: gst_cdda_base_src_mode_get_type() is not public from < gst...
: [gnomevfs] Add dependency for the GnomeVFS modules
: [gio] Add dependency for the modules dir
: Add GType for GstRTSPUrl for bindings
: appsink is using the wrong signal slot for the pull-buffe...
: [tagdemux] Doesn't forward unknown events upstream
: [FFT] Struct alignment issues on sparc
: Parsing SDP file with multicast address fails
: [riff] gst_riff_create_video_caps not recognizing certain...
: gst_netaddress_get_ip_address should check for correc...
: Some Ogg Theora files don't finished at seek at the end
: playbin2: does not come back from NULL after switching UR...
: GstAudioClock's new function may better use const gchar* ...
- API additions
- Add GST_TYPE_BASE_AUDIO_(SRC|SINK)_SLAVE_METHOD to the public API
You can find source releases of gst-plugins-base in the
gst-plugins-base download directory.
The git repository and details how to clone it can be found at
The project's website is https://gstreamer.freedesktop.org.
Support and Bugs
We use GNOME's bugzilla for
bug reports and feature requests.
Please submit patches via bugzilla as well.
For help and support, please subscribe to and send questions to the
gstreamer-devel mailing list (see below for details).
Find us on IRC at #gstreamer.
Git is hosted on git.freedesktop.org. You can
browse the gst-plugins-base repository.
All code is in Git and can be checked out from there.
Interested developers of the core library, plugins, and applications should
subscribe to the gstreamer-devel list.
Contributors to this release
- Alessandro Decina
- Andrew Feren
- Andy Wingo
- Christian Schaller
- Cygwin Ports maintainer
- Damien Lespiau
- Daniel Drake
- David Schleef
- Edward Hervey
- Guillaume Emont
- Håvard Graff
- Jan Gerber
- Jan Schmidt
- Jonathan Matthew
- Jonathan Rosser
- José Alburquerque
- Julien Moutte
- Luis Menina
- Mark Nauwelaerts
- Matthias Kretz
- Michael Smith
- Nick Haddad
- Olivier Crete
- Pavel Zeldin
- Robin Stocker
- Sebastian Dröge
- Stefan Kost
- Tero Saarni
- Thomas Vander Stichele
- Tim-Philipp Müller
- Wim Taymans
- xavierb at gmail dot com
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511717.69/warc/CC-MAIN-20231005012006-20231005042006-00092.warc.gz
|
CC-MAIN-2023-40
| 6,263
| 154
|
http://www.overclock.net/t/981045/strange-problem-with-gtx-460-directcu/10
|
code
|
Originally Posted by KBcobra
DirectCU have vrm heatsink from the factory (thank god). Without them no way you can break 900mhz.
Couldn't remember if they did on the 460 models (they did on my 5850s). And yes, you can pass 900Mhz without them (on air). I have done so with MSI cyclones (1GB) which provided ample airflow over the VRMs as well as a reference 768MB model. They topped out around 925-930Mhz on air.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689661.35/warc/CC-MAIN-20170923123156-20170923143156-00193.warc.gz
|
CC-MAIN-2017-39
| 411
| 3
|
https://forum.guildofwriters.org/viewtopic.php?f=7&t=4557&p=45864
|
code
|
Hello All -
I have an application for a set of Projection Lights, but they'll need to be Spot lights.
I've set up a successful - and very simple - Projection Lamp test, but only as an Area light. It exports to-game just fine.
If I change this to a Spot light, it does not appear in-game; I've tried seemingly every combination of Falloff, Distance, Shadowtype settings, etc., to no avail.
The Wiki page on Projection Lights says that Spot lights can be used as Projection lights; is this correct?
If so, what's the trick? Probably something embarrassingly obvious?
Simple Area Projection Light test attached:
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347396495.25/warc/CC-MAIN-20200528030851-20200528060851-00269.warc.gz
|
CC-MAIN-2020-24
| 608
| 7
|
https://django-machina.readthedocs.io/en/0.1.1/contributing.html
|
code
|
Contributing to django-machina¶
Here are some simple rules to help you contribute to django-machina. You can contribute in many ways!
The preferred way to contribute to django-machina is to submit pull requests to the project’s Github repository. Here are some general tips regarding pull requests.
Keep in mind that you should propose new features on the project’s issue tracker before starting working on your ideas! Remember that the central aim of django-machina is to provide a solid core of a forum project - without much of extra functionality included!
You should first fork the django-machina’s repository. Then you can get a working copy of the project using the following commands:
$ git clone firstname.lastname@example.org:<username>/django-machina.git $ cd django-machina && mkvirtualenv machina (machina) $ make install
Please make sure that your code is compliant with the PEP8 style guide. You can ignore the “Maximum Line Length” requirement but you should still pay attention to the length of your lines. Remember that your code will be checked using flake8. You can use the django-machina‘s tox configuration to perform this validation:
$ tox -e lint
You should not submit pull requests without providing tests. Django-machina uses pytest as a test runner but also as a syntax for tests instead of unittest. So you should write your tests using pytest instead of unittest and you should not use the built-in
You can run the whole test suite using the following command:
Code coverage should not decrease with pull request! You can easily get the code coverage of the project using the following command:
$ make coverage
The translation work on django-machina is done using Transifex. Don’t hesitate to apply for a lanaguage if you want to improve the internationalization of the project.
Using the issue tracker¶
You should use the project’s issue tracker if you’ve found a bug or if you want to propose a new feature. Don’t forget to include as many details as possible in your tickets (eg. tracebacks if this is appropriate).
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648209.30/warc/CC-MAIN-20230601211701-20230602001701-00244.warc.gz
|
CC-MAIN-2023-23
| 2,069
| 15
|