url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://blog.codinghorror.com/moving-the-block/
|
code
|
A recent post by Wesner Moise after a two month haitus got me thinking about a passage from Steve McConnell's After The Gold Rush. Like all Steve's stuff, it's great, but the title is unintentionally ironic: the book was released in 1999, at the very height of the dotcom gold rush. The last thing on most developers' minds was the profession of software engineering-- they were too busy finagling ways to cash in or cash out.
Anyway, in the first chapter, Steve draws an analogy between starting a software development project, and building a pyramid. The task can seem so monumental, so overwhelming, that it's difficult to even know where to start. Well, with the first stone block, of course. Isn't that easy enough?
One way to think of a software project is as a heavy block of stone. You must either move the block one day closer to the final destination each day, or you must do something that will enable you to traverse the remaining distance in one less day. You are allowed to use any method you like to move the block to its destination. Each day, you have to move the block an average of 100 meters closer to the pyramid, or you have to do something that will reduce the number of days needed to travel the remaining distance.
Some block-moving teams might immediately begin pushing the block, trying to move it with brute force. With a very small block, this method might work, but with a heavy block resting directly on desert sand, this Fool's Gold approach won't move the block very quickly, if at all. If a team moves the block 10 meters per day, the fact that the block is moving at all might be satisfying, but the team is actually falling 90 meters per day behind. "Progress" doesn't necessarily mean sufficient progress.
The smart block-moving team wouldn't jump straight into trying to move the block with brute force. They know that for all but the smallest blocks, they will need to spend time planning how to move the block before they put their muscles into it. After analyzing their assignment, they might decide to cut down a few trees and use the tree trunks as rollers. That plan will take a day or two, but chances are pretty good that it will increase the speed at which they can move the block. What if trees aren't readily available, and the team has to spend several days hiking up river to find some? The hike is still probably a good investment, especially since the team that begins by trying to use brute force will move the block only a fraction of the distance needed each day. The smart block-moving team might also want to prepare the surface over which they will be moving the block. Instead of pushing it across the sand, they might want to create a level roadway first, which would be an especially good idea if they had more to move than this one block.
Whether moving a block of stone or creating computer software, the smart team takes time at the beginning of the project to plan its work so that it can proceed quickly and efficiently.
A really sophisticated block-moving team might start with the roller and road system, and eventually realize that having only the minimum number of rollers available forces them to stop work too often; they have to move the back roller to the front of the block every time they move the block for-ward one roller-width. By having a few extra rollers on hand and assigning some people to move the rollers from back to front, the team is better able to maintain its momentum. The team might also realize that pushing the block is limited by how many people can fit around the block's base. They create a harness so that they can pull the block from the front at the same time they're pushing it from behind. As the work is divided among more people, each person's work becomes easier, and the faster pace is actually more sustainable than the slower one. Smart teams continuously look for ways to work more efficiently.
How does this block moving relate to software? The movement of the stone block is analogous to creating source code. If you have 100 days to complete a software project, you either need to complete one hundredth of the source code each day, or you need to do work that will allow you to complete the remaining source code faster. The work of creating source code is much less tangible than the work of moving a stone block, and progress at the beginning of a software project can be harder to gauge. Software projects are vulnerable to a "last-minute syndrome" in which the project team has little sense of urgency at the beginning of a project, fritters away days on end, and works itself into a desperate frenzy by the end of the project. Thinking of a project's source code as a stone block makes clear that you can't hope to conduct a successful project by sprinting at the end. Every day, a software project manager should ask, "Did we move the block one day closer to our destination today? If not, did we reduce our remaining work by one day?"
This gets into project estimation, which is incredibly difficult, but I think the overall message is clear. Good software isn't magically conjured by superhuman geniuses, or cruelly constructed in endless, sadistic death marches by coding slaves. Good software is built by regular developers using a daily regimen of hard work and careful planning.
There's a similar sentiment expressed in Joel Spolsky's Fire and Motion.
When I was an Israeli paratrooper a general stopped by to give us a little speech about strategy. In infantry battles, he told us, there is only one strategy: Fire and Motion. You move towards the enemy while firing your weapon. The firing forces him to keep his head down so he can't fire at you. (That's what the soldiers mean when they shout "cover me." It means, "fire at our enemy so he has to duck and can't fire at me while I run across this street, here." It works.) The motion allows you to conquer territory and get closer to your enemy, where your shots are much more likely to hit their target. If you're not moving, the enemy gets to decide what happens, which is not a good thing. If you're not firing, the enemy will fire at you, pinning you down.
I remembered this for a long time. I noticed how almost every kind of military strategy, from air force dogfights to large scale naval maneuvers, is based on the idea of Fire and Motion. It took me another fifteen years to realize that the principle of Fire and Motion is how you get things done in life. You have to move forward a little bit, every day. It doesn't matter if your code is lame and buggy and nobody wants it. If you are moving forward, writing code and fixing bugs constantly, time is on your side.
Forget about building a pyramid. Don't beat yourself up. Just spend a few hours every day moving the next stone block more efficiently than you did the last one, and it'll happen.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100227.61/warc/CC-MAIN-20231130130218-20231130160218-00377.warc.gz
|
CC-MAIN-2023-50
| 6,836
| 13
|
https://blog.planhack.com/logs/data/20040627.html
|
code
|
"This is an unprecedented conflict with a completely new form of enemy that fights in unconventional ways that violate the very core principles of the laws of war by targeting civilians...."
"I have this theory that lesbians start certain fashion things... I used to go around Williamsburg and see guys wearing wifebeaters, wallet chains, gas station shirts and trucker hats, and I would think, 'We used to do that five years ago'...."
Ever get the feeling that you just don't know enough history?
My gentoo installation is up and running. If you plan to use gentoo for a workstation, don't use the "hardened" USE flag, you won't end up with a working XFree86. But it may be fine for a server, I'll find out later, I presume.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153515.0/warc/CC-MAIN-20210727233849-20210728023849-00273.warc.gz
|
CC-MAIN-2021-31
| 725
| 4
|
https://tutorialmeta.com/question/laravel-different-composer-json-files-for-dev-and-production
|
code
|
Laravel: Different Composer.json Files For Dev And Production
I need to have 2 different
composer.json files for
production because I am developing vendor packages (locally) and would like to keep my vendor packages symlinked on dev environment because it's much easier to maintain.
composer.json files contain:
- For development, it has symlinked repositories by path.
- For production, it has private repositories on github.
NOTE: The vendor packages are in
require, and not
require-dev... So an
composer update --no-dev will not work.
How could I set this up?
.env file is where you set different environment variables. Is there a way to set a
COMPOSER_PATH variable that would point to the 2 different files on prod or dev?
You could use environment variables to have more than one composer files like
composer-testing.json and use it in a terminal with:
COMPOSER=composer-testing.json php composer.phar install
- → "failed to open stream" error when executing "migrate:make"
- → October CMS Plugin Routes.php not registering
- → OctoberCMS Migrate Table
- → OctoberCMS Rain User plugin not working or redirecting
- → October CMS Custom Mail Layout
- → October CMS - How to correctly route
- → October CMS create a multi select Form field
- → October CMS - Conditionally Load a Different Page
- → How to disable assets combining on development in OctoberCMS
- → October CMS - Radio Button Ajax Click Twice in a Row Causes Content to disappear
- → OctoberCms component: How to display all ID(items) instead of sorting only one ID?
- → In OctoberCMS how do you find the hint path?
- → How to register middlewares in OctoberCMS plugin?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500074.73/warc/CC-MAIN-20230203185547-20230203215547-00081.warc.gz
|
CC-MAIN-2023-06
| 1,662
| 30
|
http://pesr.ru/0e1d88b245cdb7b4301483495ee6f3bf.html
|
code
|
How to stop ie from updating webpages accommodating students with cerebral palsy
When you buy a piece of tech you have to expect that things will need to be kept up to date and if it isnt your not going to get all the latest features when websites implement them such as when css3 was released.This is why browsers such as chrome and firefox and even the new microsoft edge are great since it upgrades without you knowing it's doing it.On January 12, 2016 Microsoft announced end of support for IE10, IE9, and IE8 on Windows 7, Windows 8.1, and Windows 10.
There are plenty of sites supporting IE8-10, due that users are not able to upgrade their working computers, even those users represent a considerably amount of traffic, and stop supporting them means loosing users.
It doesn’t mean that all legacy IE versions are officially gone.
For example, IE9 on Windows Vista SP2 or IE10 on Windows Server 2012 will still get updates.
Many tech companies (thankfully) invest to various social responsibility programs so the question is - why not to give up the income from the IE8-IE10 users as a part of social responsibility program?
In this case it would be educating users about safer browsing and improving the overall Internet security.
Search for how to stop ie from updating webpages:
Updates include security patches and other bug fixes and people should not be lazy and keep themselves protected online by updating!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583730728.68/warc/CC-MAIN-20190120184253-20190120210253-00003.warc.gz
|
CC-MAIN-2019-04
| 1,423
| 9
|
http://geodribble.blogspot.com/2009/03/easy-mvc-pattern-for-esri-flex-api.html
|
code
|
I've gotten off to kind of a slow start here with my blogging. It seems this space will in fact be more of a dribble than a torrent.
In the year that I have been developing with the ESRI Flex API I have come to learn the importance and value of using a good architectural design pattern. I am a big fan of the Model-View-Controller (MVC) pattern and use it in most if not all of my projects. Using the pattern has saved my ass on numerous occassions -- and neglecting to use it has come back to bite me.
Although there are a number of popular Flex MVC frameworks available (eg. Cairngorm, pureMVC, mate, Model-Glue, among others) --these can be overkill for simple web mapping applications -- particularly for beginners. Ive found that many folks have chosen to avoid these what can be larger more complicated frameworks in favor of their own home-grown MVC solutions. I believe that can be a good option -- particularly for smaller projects.
Once such pattern is the EasyMVC pattern by Tom Bray. Be sure to check out the recorded seminar for all the details. This is the MVC pattern that I use most frequently. In this post I have provided the ESRI Flex API MapSwitcher sample using this pattern.
Here is the application in action as well as the application source.
I am certainly not advocating this as the best MVC pattern out there... but I believe its a good place to start place for beginners and small projects. In future posts I will likely use either this pattern -- or the pattern used by the ESRI Sample Flex Viewer (for posts in that context).
In the meantime, happy Flexing and welcome to MVC.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583509958.44/warc/CC-MAIN-20181015225726-20181016011226-00104.warc.gz
|
CC-MAIN-2018-43
| 1,606
| 7
|
https://ask.oberlo.com/d/20?id=20-introduce-yourself-meet-other-oberlo-users&page=2
|
code
|
I am Vivadh from Nepal, Really interested to set up shopify store. I came across this app Oberlo.
Hope it would be helpful to start with. We dont have paypal and international payment system in Nepal, hence i am worried how am i going to do this. :( Lets try my best :)
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250615407.46/warc/CC-MAIN-20200124040939-20200124065939-00042.warc.gz
|
CC-MAIN-2020-05
| 269
| 2
|
https://community.splunk.com/t5/Splunk-Search/How-to-get-a-count-of-daily-active-users-in-the-last-3-days/td-p/217135
|
code
|
I'm new to Splunk and new to get a count of the daily active users in the last 3 days.
Users in our system are tracked by phoneID.
How would I go about doing that?
Assuming you have the data in splunk, try this
base search earliest=-3d@d | timechart span=1d dc(phoneID) as "Active Users"
If you could post some sample data that would help the community help you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400204410.37/warc/CC-MAIN-20200922063158-20200922093158-00029.warc.gz
|
CC-MAIN-2020-40
| 362
| 6
|
https://lambchow.com/2018/02/2018-survey-invitation/
|
code
|
Once a year we ask the readers of Lambchow for some feedback. Our goal is to better understand the needs and makeup of our audience. All entries are anonymous. We are not asking for your name or collecting your email address. In a few weeks, I’ll compile and publish the results. The survey itself is twenty questions, all but two are multiple choice of some flavor. Thank you in advance for your time.
%d bloggers like this:
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988793.99/warc/CC-MAIN-20210507120655-20210507150655-00435.warc.gz
|
CC-MAIN-2021-21
| 427
| 2
|
https://https.ncbi.nlm.nih.gov/pmc/tools/ftp/
|
code
|
The PMC File Transfer Protocol (FTP) Service supports usage of the PMC Article Datasets with the following services:
Base FTP URL: https://ftp.ncbi.nlm.nih.gov/pub/pmc
*Tip* If you are having difficulties with FTP, please consider trying the HTTPS protocol instead, e.g. [https://ftp.ncbi.nlm.nih.gov/pub/pmc/oa_bulk/oa_comm/xml/oa_comm_xml.incr.2021-09-17.filelist.csv. NCBI also supports secure FTP via SFTP.
If you have questions or comments about the PMC FTP Service, please write to the PMC help desk. Further information on retrieving full text and other common developer queries can be found on Developer Resources page.
If you only are interested in the metadata and text of an article or author manuscript, then bulk download may be what you want to use. Bulk packages group together hundreds of thousands of articles in XML or plain text formats in compressed packages (Note: The Historical OCR Dataset is only available in plain text format). If you are also interested in media files, supplementary materials, or PDFs, please see the sections on Individual Article Download and PDF Download.
Bulk Download Updates (April 2022)
In September 2021 PMC released new bulk download directory structures and packages to our FTP Service for two datasets: the PMC Open Access (OA) Subset and the Author Manuscript Dataset. The old bulk download structure remained in place until December 2021; the week of December 5-11 the old bulk files were moved respectively to sub-directories of oa_bulk and manuscript both named "deprecated". These directories named "deprecated" were deleted April 1, 2022.
Baseline Packages Update Schedule
New baseline packages will be created at least two times per year. Previous baseline and incremental packages and the accompanying file lists will be deleted whenever a new baseline is created.
New baselines will be created:
- as needed*
*PMC is sometimes required to suppress an article from public view for legal reasons if the case involves a legal injunction or a breach of patient privacy. In such cases, a new set of baseline packages will be created for the impacted dataset. This is not a frequent occurence.
Directories Organized by Dataset, License Terms, and File Content Type
Bulk downloads are available on the FTP Service by dataset:
PMC Open Access Subset - Bulk Author Manuscript Dataset - Bulk Historical OCR Dataset - Bulk
We have further divided the PMC Open Access Subset bulk packages into three groups based on available license terms:
- Commercial Use Allowed - CC0, CC BY, CC BY-SA, and CC BY-ND licenses
- Non-Commercial Use Only - CC BY-NC, CC BY-NC-SA, CC BY-NC-ND
- Other - no machine-readable license, no license, or a custom license
PMC OA Subset - Commercial Use PMC OA Subset - Non-Commercial Use Only PMC OA Subset - Other
To access the complete PMC OA Subset you will need to retrieve ALL of the OA Subset packages. These groups are complementary rather than duplicative.
Each of these datasets or groupings is divided into separate directories by file content type: XML (
\xml) and plain text (
\txt). The baseline packages for each of these OA Subset groups and for the Author Manuscript Dataset are divided by PMCID range (e.g., PMC004XXXXXX) in order to keep package sizes reasonable.
The result is the following directory structure:
There are csv and txt formatted file lists available for each package. The file lists have been updated to:
- include a flag indicating if an article has been retracted (yes/no, where yes = retracted and no = not retracted).
- bring the csv and txt file lists into sync (we found that we had updated the csv file with extra fields, but not the txt files of the current production file lists.)
Note: Author manuscripts have different metadata information available than PMC OA Subset articles, so do not assume the same structure for the file lists for these two different datasets.
Sample Bulk File Names
- Baselist file list: oa_comm_xml.PMC003XXXXXX.baseline.2021-09-16.filelist.csv
- Baseline: oa_comm_xml.PMC003XXXXXX.baseline.2021-09-16.tar.gz
- Incremental file list: oa_comm_xml.incr.2021-09-17.filelist.csv
- Incremental update: oa_comm_xml.incr.2021-09-17.tar.gz
In each of the sample file names above you can substitute various parts to get to the files you want, e.g.
oa_noncommto get PMC OA Subset non-commerical use articles or replace with
oa_otherto get PMC OA Subset articles without explicity tagged Creative Commons licenses. Replace it with
author_manuscriptto get author manuscripts.
_txtto get plain text files vs. XML files
incrto switch from a baseline file to one of the daily incremental files, be sure to update the date and remove the PMC00#XXXXXX from the file name
PMC008XXXXXXin baseline file names to get the articles in the specified grouping with PMCIDs in the range from PMC8000000 to PMC8999999; to get all articles you must retrieve all the PMCID ranges
- Replace the date (e.g.
2021-09-16) with the new baseline date if the baseline has been updated since this documentation was written; replace the date for incremental files with the date you want to retrieve
.txtas the file extension for the file list to get a tab separated plain text version of the file list
Individual Article Download (PMC Open Access Subset Only)
PMC Open Access Subset Individual Article Packages
If you only want to download some of the PMC OA Subset based on search criteria or if you want to download complete packages for articles that include XML, PDF, media, and supplementary materials, you will need to use the individual article download packages. To keep directories from getting too large, the packages have been randomly distributed into a two-level-deep directory structure. You can use the file lists in CSV or txt format to search for the location of specific files or you can use the OA Web Service API. The file lists and OA Web Service API also provide basic article metadata.
- Filenames: PMCXXXXXXX.tar.gz where the X's represent a specific PMCID
- File lists: oa_file_list.csv or oa_file_list.txt (Located up one level in the top level PMC FTP directory)
The first line of each file list is the timestamp the file was written. Subsequent rows contain metadata for each article.
Each row is divided into 6 metadata fields for CSV (5 for TXT), delimited by comma (tab) characters, For example:
oa_package/66/8b/PMC555938.tar.gz BMC Bioinformatics. 2005 Mar 7; 6:44 PMC555938 PMID15748298 CC BY
The fields in the files are:
- The fully qualified name of the .tar.gz file for an article
- The article citation, comprising the journal title abbreviation, publication date, volume, issue, and the page range or elocation ID
- PMC accession number (PMCID)
- Last updated timestamp (YYYY-MM-DD HH:MM:SS) (NOT INCLUDED in TXT files)
- PubMed ID (PMID)
- License type*
*The field value for “license type” can be any of the standard Creative Commons license variants (e.g., CC BY; CC BY-NC; CC BY-NC-ND) or “NO-CC CODE”. “NO-CC CODE” appears when the license is missing, has custom terms (i.e., not a Creative Commons license), or is not machine decodable.
PDF Download (PMC Open Access Subset Only)
PMC Open Access Subset PDF Files
Individual article PDF downloads are only available for non-commercial use licensed articles. To keep directories from getting too large, the article PDFs have been randomly distributed into a two-level-deep directory structure. You can use the oa_non_comm_use_pdf file lists in CSV or txt format to search for the location of specific files, or you can use the OA Web Service API. The file lists and OA Web Service API also provide basic article citation and license information, as well as the date the article was last updated in PMC.
- Filenames: filename.PMCXXXXXXX.pdf where filename is the original name of the source file and the X's represent a specific PMCID
- File lists: oa_non_comm_use_pdf.csv or oa_non_comm_use_pdf.txt (Located in the top level PMC FTP directory)
Articles in these datasets are made available consistent with either the terms of applicable article-level license statements or the funder’s policy. See PMC Copyright for more information.
How to Cite
See the individual dataset pages on how to cite the PMC Open Access Subset and PMC Author Manuscript Dataset.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817181.55/warc/CC-MAIN-20240417204934-20240417234934-00290.warc.gz
|
CC-MAIN-2024-18
| 8,268
| 68
|
https://www.amrita.edu/publication/hurst-exponent-and-translation-error-as-discriminating-measures-to-identify-a-chaotic-nature-of-an-experimental-time-series/
|
code
|
Publication Type : Conference Proceedings
Publisher : Bifurcations and Instabilities in Fluid Dynamics, July 15-17, 2015, Paris, France
Source : Bifurcations and Instabilities in Fluid Dynamics, July 15-17, 2015, Paris, France (2015)
Url : https://www.researchgate.net/publication/283620789_Hurst_exponent_and_translation_error_as_discriminating_measures_to_identify_the_chaotic_nature_of_an_experimental_time_series
Campus : Coimbatore
School : School of Engineering
Center : Computational Engineering and Networking
Department : Mechanical Engineering
Year : 2015
Abstract : Identifying the existence of nonlinear structures in a time series acquired from real world systems, is necessary to distinguish chaos from correlated noise. Measures that detect temporal correlations in a time series might be insufficient to extract deterministic features from an experimental data that is contaminated with noise. Here, we employ surrogate methods to analyze experimental data obtained from an engineering system, a turbulent combustor, with Hurst exponent and translational error as discriminating measures. We conclude from the analysis that the noise level in the data could be sufficiently large to suppress the nonlinearities in the time series. Thus, the null hypothesis that the data is generated from a stochastic process cannot be rejected with sufficient confidence on a statistical basis. However, a high dimensional Mackey-Glass system also shows similar features in the presence of additive noise. Thus, we make a conjuncture that the experimental time series acquired during the stable operation in the turbulent combustor is generated from a high dimensional chaotic system contaminated with noise.
Cite this Research Publication : J. Tony, Dr. E. A. Gopalakrishnan, Sreelekha, E., and Sujith, R., “Hurst exponent and translation error as discriminating measures to identify a chaotic nature of an experimental time series”, Bifurcations and Instabilities in Fluid Dynamics, July 15-17, 2015, Paris, France. 2015.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652959.43/warc/CC-MAIN-20230606150510-20230606180510-00590.warc.gz
|
CC-MAIN-2023-23
| 2,028
| 11
|
https://www.granduniondtp.ac.uk/people/mark-verhagen
|
code
|
My research explores the methodological benefits of advances in data science for the sociological endeavour. I integrate novel data sources and advanced analytical techniques to invigorate and synthesize classic sociological fields of endeavour.
During my undergrad I combined a B.A. in Art History with a B.Sc. in Econometrics at the University of Amsterdam. I did M.Sc’s in both Econometrics and Sociology, at the University of Amsterdam and University of Oxford respectively. During my studies I’ve founded the Analytics Academy, a non-profit institution for Econometrics students to help NGO’s and cultural institutions in the Amsterdam areas through their quantitative know-how. I’ve also founded two data science consulting firms, Delph and Apadana, through which I’ve helped companies put their data to good use.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347390442.29/warc/CC-MAIN-20200526015239-20200526045239-00561.warc.gz
|
CC-MAIN-2020-24
| 829
| 2
|
https://faculty.daffodilvarsity.edu.bd/profile/swe/kaushik.html
|
code
|
MSc in Computer Systems and Network Engineering, University of Greenwich,
London, United Kingdom.
BSc in Electronics and Telecommunication Engineering, Electrical Engineering and Computer Science, North South University, Dhaka.
H.S.C in Science, English Version, Notre Dame College, Dhaka.
DIU: Software Engineering, Computer Science, Electronics and Networking, Robotics
China (Exchange Faculty): Programming, Satellite Communication, Robotics
Researching on Embedded Gas Engine Generator System, Image Processing and Robotics Vision, Transaction Fraud Detection System Using HMM, Cyber Security Strategy, Computational Linguistics etc.
Research interests are Artificial Intelligence, Embedded Systems, Image Processing, Cyber Security and IoT, Robotics and Education etc.
ORCiD ID: orcid.org/0000-0001-6452-4303
Scopus Author ID: 57195509076
Google Scholar Author Name: Kaushik Sarker
Sep. 2013 to Jan. 2014
Position: Lecturer (Part Time), Dept. of Software Engineering, FSIT, Daffodil International University, Dhanmondi, Dhaka.
Feb 27, 2019 to Mar. 22, 2019
Position: Exchange Faculty, Faculty of Information, Hunan University of Humanities, Science and Technology, Hunan, China.
Sep 14, 2019 to Jan. 14, 2020
Position: Exchange Faculty, Faculty of Information, Hunan University of Humanities, Science and Technology, Hunan, China.Jan. 2014 to Present: Department of Software Engineering, Daffodil international University, Dhaka, Bangladesh.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510781.66/warc/CC-MAIN-20231001041719-20231001071719-00853.warc.gz
|
CC-MAIN-2023-40
| 1,446
| 17
|
https://www.reddit.com/r/aistartup/
|
code
|
I am trying to find labeled images. I know about imageNet but it is not so easy to obtain all the data from it. Found this one Microsoft COCO! which seems pretty decent but I was wondering how to find more. Also was wondering what would be the price to do it manually by hand using services like Amazon Mechanical Turk ( first look it seems it costs 30$ / 1000 images , could be more though ). Anyone has knowledge of other publicly accessible high quality images training sets?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592309.94/warc/CC-MAIN-20180721032019-20180721052019-00110.warc.gz
|
CC-MAIN-2018-30
| 478
| 1
|
http://setgetweb.com/p/ITCAMv7/msve/installedbinarycheck.html
|
code
|
IBM Tivoli Composite Application Manager for Application Diagnostics, Version 126.96.36.199
Installed Binary Check
The Installed Binary Check page provides a list of the installed binaries deployed to the selected server.
To access the Installed Binary Check page, from the top navigation, click...
Problem Determination > Software Consistency Check > Installed Binary Check
Select the server group name in the Group list box, and the server name in the Server list box, and click the Refresh button to view the binary information for the server.
The page shows a table of all application binaries installed on the server; the type, fully qualified name, modification time, and size are displayed.
In the Name column, click on directory names (these files display DIR in the Type column) to view details on binaries within the directories.
Click on JAR and EAR file names to view a list of the file contents.
Parent topic:Software consistency check
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512499.22/warc/CC-MAIN-20181019232929-20181020014429-00312.warc.gz
|
CC-MAIN-2018-43
| 948
| 10
|
https://solarmovie.stream/watch/357419/dark-noir.html
|
code
|
Stream Dark Noir (2014) : Online. My name is Vincent Black. I’m a cursed man, I see things other people can’t…Damned from the day is was born, found on the streets with the rats. But I’ve always been one step ahead. I can see the world of ideas and the daemon creatures that live in it.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102637.84/warc/CC-MAIN-20231210190744-20231210220744-00408.warc.gz
|
CC-MAIN-2023-50
| 294
| 1
|
https://pdhdrawings.com/draw-animals/readers-ask-how-to-draw-a-shark-folding-surprise-puppet.html
|
code
|
How To Draw A Shark Folding Surprise Puppet
Learn how to draw a shark folding surprise puppet, which is a great art project for kids of all ages. All you’ll need is a pencil, paper, and some coloring supplies.
Here is a list of the supplies we used; feel free to use whatever you have on hand, or visit our official Amazon shop to see and buy what we use.
Do sharks eat people?
Sharks are opportunistic feeders, but most sharks primarily feed on smaller fish and invertebrates. Despite their frightening reputation, sharks rarely attack humans and would much rather feed on fish and marine mammals.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337836.93/warc/CC-MAIN-20221006124156-20221006154156-00740.warc.gz
|
CC-MAIN-2022-40
| 600
| 5
|
https://www.deviantart.com/drawingwolf17/art/Beach-740606519
|
code
|
I was asking for suggestions on what to draw next since I've got pretty much nothing.
suggested a landscape. I've never drawn a background before, surprisingly. So I figured why not?? This was such a spur of the moment thing. This drawing was pretty much made from tutorials, screwing around and prayer. I think the sand and sky turned out pretty good. The water isn't too bad considering. The objects obviously need a lot of work. But I'm really unfamiliar with the lineless, painterly style. I feel like I could do better, but for a learning experience, I could do a lot worse. So mixed feelings all around with a hint of progress?? Fun none the less.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315551.61/warc/CC-MAIN-20190820154633-20190820180633-00080.warc.gz
|
CC-MAIN-2019-35
| 653
| 2
|
http://pandawhale.com/post/65569/koenigsegg-planning-four-door-model
|
code
|
Stashed in: Cars!, Auto Erotica
For whom would a four door model be appealing?
The Boolean Graph
One lesson schools don't teach, by Alan Watts and animated by the South Park creators
5 Beneficial Side Effects of Kindness include that it makes our hearts healthier and it slows aging.
The Elon Musk interview on Mars colonisation
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719273.38/warc/CC-MAIN-20161020183839-00358-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 328
| 6
|
http://www.dabcc.com/datrium-dvx-makes-ec2-and-hci-seem-like-complex-old-systems/
|
code
|
Datrium DVX makes EC2 and HCI seem like Complex Old Systems
While setting up couple AWS EC2 instances a few days ago, I noticed that despite the higher level abstraction and orchestration provided by cloud services I still needed to understand quite a lot about application behavior to properly stand-up a solution that would cater for my business. Luckily I was just playing around with some open-source software and the configuration did not matter that much, but it could have been very different if I was dealing with production systems and applications.
When setting up EC2 instances you need to provide networking information and lots of details about how storage will perform, including volume types, HDD vs. SSD, and the number of IOPS expected.
I know many infrastructure admins that would not even know where to start configuring these settings; not because they do not understand the features and metrics, but rather because they do not own the apps, they are not the DBAs, and also because they do not know what the requirements are on Day 2. The easiest way to mitigate complexity is to select best of breed for every storage option and pay the price.
Read the entire article here, Datrium DVX makes EC2 and HCI seem like Complex Old Systems – myvirtualcloud.net
Via the fine folks at Andre Leibovici at myvirtualcloud.net
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655937797.57/warc/CC-MAIN-20200711192914-20200711222914-00404.warc.gz
|
CC-MAIN-2020-29
| 1,337
| 6
|
https://blog.sandro-pereira.com/category/biztalk/advance-configurations/page/10/
|
code
|
I’m always alerting and advise my clients to keep their BizTalk platforms updated which means I have to constantly be looking for this information, so I
The following table describes 64-bit support for the different versions and editions of BizTalk Server: 64-bit Operating System Support Native 64-bit
The following table describes the operating systems that are supported when you use different versions of BizTalk Server: BizTalk Server 2016 BizTalk
BizTalk 2010: BizTalk Server Application Service (BTSNTSvc.exe) fails to start automatically afte...
After rebooting the operating system BizTalk Server 2010 services, in my case: “BizTalk Service BizTalk Group: BizTalkServerApplication” fails to start
BizTalk SOAP, HTTP, and HTTP-based WCF Adapters – How many Concurrent Connections are configured ...
By default the SOAP, HTTP, and HTTP-based WCF adapters (and NET in general) open only two concurrent HTTP connections from each BizTalk server to any specific
This is an important step and it should be configured or validate before BizTalk Server Setup (part 8 ) because: BizTalk Server setup keeps a record of
BizTalk 2010 Installation and Configuration – Enable TCP/IP, Named Pipes protocols and DTC on the...
These are two key steps to facilitate transactions and improve performance between SQL Server and BizTalk Server Enable TCP/IP and Named Pipes To
By default, the following BizTalk jobs aren’t configured and enabled upon installation Backup BizTalk Server (BizTalkMgmtDb)DTA Purge and Archive
BizTalk 2010 Installation and Configuration – Installing and configuring local SMTP for Reporting...
Installing SMTP Server Feature on Windows Server 2008 R2 is an easy process requiring only a few steps to complete To install SMTP Server Features Open
BizTalk 2010 Installation and Configuration, the last chapter!!! In this section, you’ll install BizTalk Server, confirm that the installation
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585305.53/warc/CC-MAIN-20211020090145-20211020120145-00178.warc.gz
|
CC-MAIN-2021-43
| 1,922
| 14
|
https://www.timheuer.com/blog/149/
|
code
|
one of my homies just posted a note about winning an xbox through blogging. what?! surely you couldn't be serious...ah but he is.
now you might consider it shameless promotion of events, and you'd be right, but there is a purpose here. often times when we (as those field geeks with funny position titles) organize events there is certain targets that we are trying to meet (read: the people who pay for the events want to make sure they can direct some things). if it were up to us, we'd always make everything free and always invite everyone. but utopia doesn't exist. so what we normally do is ensure that we establish some rules with the powers that be that at a certain point we can start inviting everyone to partake.
this is one such scenario. you see, there are these web experience events happening around the nation (US). the last one in new york apparently had some allegations that people said we were trying to "hide" the event. okay, no more hiding :-) (we weren't really hiding). so here goes. there are more events happening. denver and los angeles still have availability. if you can go, you should. if you can't, you can still win an xbox.
see kirk's post for more details.
loke pointed to a new device from htc being announced today for the uk market. it's called the "touch" and is a new windows mobile 6 device. probably my only huh moment is looking at the specs and not seeing support fro HSPDA/UTMS (3G) for the networks...odd i thought.
but it is going to come in a wasabi green color :-) they have a new UI they call TouchFLO that you can see on the main product site at http://www.htctouch.com -- their advertisement on the main page of htc.com right now is a pretty good one i thought -- hits the right emotion (kind of like the blackjack ads did).
beta 2 of windows live writer was released today. go get it. improved user interface, improved blog support, some new functions...you know all the good stuff you want in an update. oh yeah and continued extensibility.
i took a quick second (after doing a little RTFM'ing [thanks charles]) and uploaded a custom manifest to my blog. why? because when in writer sometimes i want quick access to things about my blog (stats and such). so i took a minute to "subtext"-ize a sidebar extension to writer...see:
i've got the nice little transparent subtext icon in the back and two custom buttons taking me to my various stats. additionally, a link directly to the admin functionality. i'll be playing around more with this stuff later.
that they must scale their betas even...of all the stuff they have and all the scale they've already proven, when will they learn?
trying out their new stuff (google gears and mashup editor) i got this on the mashup editor page:
seriously, FIX YOUR ERROR page -- for a company that seemingly gets some level of ux, their failure messages are horrible, no links to direct me anywhere, no sitemap, etc...this does not pass the mother-in-law litmus.
and then installation failures abound on the gears installer...because their installer doesn't take into account proxies.
hey mac users, educate me...what's a media center equivalent for osx? i'm not talking apple tv -- i'm talking to receive television signal on my mac...
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141182776.11/warc/CC-MAIN-20201125100409-20201125130409-00622.warc.gz
|
CC-MAIN-2020-50
| 3,227
| 14
|
https://flavioclesio.com/softmax-gan
|
code
|
Softmax GAN2017 Apr 27
Abstract: Softmax GAN is a novel variant of Generative Adversarial Network (GAN). The key idea of Softmax GAN is to replace the classification loss in the original GAN with a softmax cross-entropy loss in the sample space of one single batch. In the adversarial learning of N real training samples and M generated samples, the target of discriminator training is to distribute all the probability mass to the real samples, each with probability 1M, and distribute zero probability to generated data. In the generator training phase, the target is to assign equal probability to all data points in the batch, each with probability 1M+N. While the original GAN is closely related to Noise Contrastive Estimation (NCE), we show that Softmax GAN is the Importance Sampling version of GAN. We futher demonstrate with experiments that this simple change stabilizes GAN training.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949506.62/warc/CC-MAIN-20230330225648-20230331015648-00019.warc.gz
|
CC-MAIN-2023-14
| 895
| 2
|
https://community.cloudera.com/t5/Cloudera-Manager-Installation/How-do-I-switch-HDFS-to-using-Quorum-based-storage/m-p/26786
|
code
|
04-27-2015 12:08 PM
I installed a Cloudera Hadoop cluster last week, and shifted HDFS to high availability via it's automated "Enable High Availability" button. Now it's giving me the warning message "HDFS High Availability using shared NFS mounts is not supported with CDH 5.0 and later versions. You..."
I can't find any documentation on how I might go about this. It all seems to assume that it was done correctly when the system did the conversion. How can I fix this?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000610.35/warc/CC-MAIN-20190627015143-20190627041143-00394.warc.gz
|
CC-MAIN-2019-26
| 472
| 3
|
https://www.ilounge.com/index.php/articles/comments/multiple-language-ipod-user-guides
|
code
|
Q: How do I copy music from my computer to my iPod? I bought the iPod in Korea, where I am now, and cannot make sense of the instructions.
A: You can download a PDF file of the iPod User Guide in English from Apple’s support page.
If you need a copy of the manual in another language, go to the appropriate Apple web site for your country, look for the Support section, then search for the manual. The URL is generally www.apple.[country code, such as .jp or .co.kr]/support/ipod/.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511075.63/warc/CC-MAIN-20231003092549-20231003122549-00288.warc.gz
|
CC-MAIN-2023-40
| 483
| 3
|
http://www.coderanch.com/t/309762/EJB-JEE/java/Local-Remote-Access
|
code
|
Granny's Programming Pearls
"inside of every large program is a small program struggling to get out"
A friendly place for programming greenhorns!
Big Moose Saloon
Register / Login
Win a copy of
Android Security Essentials Live Lessons
this week in the
EJB and other Java EE Technologies
Local or Remote Access?
Joined: Mar 07, 2002
Jun 10, 2002 21:36:00
I'm using a BMP entity bean.
Is it appropriate to use local access for defining the home and remote interfaces?
best regards,<br />Steven<br />SCJP, SCEA
I agree. Here's the link:
subject: Local or Remote Access?
Q : parameters of EJBLocalObject Method
All times are in JavaRanch time: GMT-6 in summer, GMT-7 in winter
| Powered by
Copyright © 1998-2014
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510275463.39/warc/CC-MAIN-20140728011755-00273-ip-10-146-231-18.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 708
| 21
|
http://tinas-sliderules.me.uk/APIPA.HTM
|
code
|
Automatic Private Internet Protocol Addressing (APIPA)
Automatic Private Internet Protocol Addressing is a function of Windows 98. It provides Internet Protocol (IP) addresses to computers in a Local Area Network (LAN), either when there is no Dynamic Host Configuration Protocol (DHCP) server or the usual DHCP server is down.
Addresses are assigned in the range 169.254.0.0 to 169.254.255.255
Addresses in this range are reserved for this purpose and are not valid over the Internet. If connecting to the Internet, obtain IP addresses from your Internet Service Provider (ISP).
This address allocation detects conflicts via a Network Basic Input/Output System (NetBIOS) naming broadcast ensuring that each machine gets an IP address in the above range that is not in use. The address is randomly chosen initially.
Follow these instructions to disable Automatic Private Internet Protocol Addressing
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506658.2/warc/CC-MAIN-20230924155422-20230924185422-00082.warc.gz
|
CC-MAIN-2023-40
| 899
| 6
|
https://community.st.com/thread/39838-why-does-my-bldc-motor-stop-during-acceleration
|
code
|
I'm currently evaluating STSPIN32F0 as a solution for BLDC polygon motor control & drive.
My EVB is STEVAL-SPIN3201.
The application is:
- 38V nominal
- 8A max @ acceleration
- 60 deg displaced hall sensors
- 2 pole pairs
My Motor configuration is
When probing for hall-sensors feedback I get:
Sensors 1-3 correspond to channels 1-3 respectively.
b-emf was also measured:
My sensor configuration is
When measuring b-emf on UVW terminals I get
UVW correspond to channels 1-3 respectively.
When trying to speed ramp to 15,000 in 15,000 ms I get the following UVW drives:
Motor starts spining for approx. 10s and then stops.
MC Workbench displays the flowing data after motor is stopped:
My SystemDriveParams folder & MC Workbench project is attached as a .zip file.
No changes have been made in the source files except commenting out #define EXAMPLE_POTENTIOMETER and #define FIRMWARE_VERS "STM32 FOC SDK\0Ver.4.4.2"
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867094.5/warc/CC-MAIN-20180525141236-20180525161236-00150.warc.gz
|
CC-MAIN-2018-22
| 914
| 19
|
https://techdirectarchive.com/2021/12/24/how-to-manage-and-use-amazon-s3-access-points-using-the-aws-management-console/
|
code
|
The benefit of Amazon S3 Access Points is the ability to simplify the managing of data access at scale for shared datasets in S3. Access points are just network endpoints that are attached to your S3 buckets that you can use to perform S3 object operations. We also have the Access Point alias which provides the same functionality as an Access Point ARN and can be substituted for an S3 bucket name anywhere it is used for data access.
Another benefit of S3 Access Points is that you can easily create hundreds of access points per bucket, each with a designated name and permissions that is specially customized for the application. By default, you are free to create up to 1,000 access points per region for each of your AWS accounts but if you need more than that access points for a single account in a single Region then it is recommended that you request a service quota increase from AWS.
Exploring a Variety of AWS Service Guides
Nonetheless, For more guides on AWS services you can read these: How to enable Amazon S3 default bucket encryption using S3 Console, How to deploy a .NET application to AWS Elastic Beanstalk using AWS Tool Kit, How to Deploy MVC Application to AWS EC2 Using RDP Connection and Web Deploy, How to Deploy Dynamic Website to AWS EC2, Hosting Static Website and Versioning on AWS S3, how to create IAM Users, Adding MFA and Policies on AWS, and How to manage cost with AWS Budgets, How to deploy an Angular App to AWS S3
Consequently, We are going first to create an access point using the S3 console
- Log in to the AWS Management Console and open the Amazon S3 console using https://console.aws.amazon.com/s3/
- On the left side of the console’s navigation pane, click Access Points.
- Similarly, On the Access Points page, Click on Create access point.
- Nevertheless, Enter your desired Access point name and also enter or browse the name of a bucket in your account to which you want to attach the access point.
- Browsing the bucket and clicking on Choose path
Choosing Network Origin for Access Point Configuration
Therefore, In the Network Origin section, select Virtual Private Cloud (VPC) and enter the VPC ID. Additionally, you want to use the access point, but in this guide, we will select the Internet option.
Furthermore, Under the Block Public Access settings for this Access Point section, the recommendation is to leave it enabled as the default setting unless you have a strong reason to disable it. However, note that Amazon S3 does not support changing an access point block public access settings after creating the access point.
- Click on Create access point.
- You can open the access point and upload your objects
- Moreover, This redirects to where your files or folders are located, and you can start uploading.
Access Point Permissions and Object Operations
In addition, Note that while using the access point, you are only allowed to perform the object operations as stated in the access point permissions.
Note: Nonetheless, Once again, as a reminder, you cannot change the Block Public Access settings for an access point after the access point is created.
Below is our current Block Public Access settings
Consequently, Our current public access is OFF. Similarly, The only way we can have access is via the Access Point policy which is written in JSON and can provide access to the objects stored in the bucket from this Access Point.
But note that Access Point policies does not apply to objects owned by other accounts.
Let’s edit the access point policy
- Let us Navigate to the access point whose policy we want to edit.
- Select the Permissions tab.
- Under access point policy section, click Edit.
- Enter the access point policy in the text field below. Furthermore, The console automatically shows the Amazon Resource Name (ARN) for the access point, which you can use in the policy or you can edit it to suite your own policy.
- If you want to delete an access point, its just a matter of selecting the access point and clicking on the Delete button.
Using an Alias instead of a bucket name for data access
During the process of creating an access point, Amazon S3 automatically generates an Alias that you can use instead of using a bucket name. However, This Alias can be used instead of an Amazon Resource Name (ARN) for any access point operations
Moreover, The following is an example ARN and access point alias for an access point named
- ARN – arn:aws:s3:eu-west-3:963016309182:accesspoint/techdirectaccesspoint
- Access Point Alias – techdirectaccesspoin-y74sonbktotgbjaxfc9dq53doco3eeuw3b-s3alias
Please note that an access point Alias name is created automatically within the same namespace as an Amazon S3 bucket and cannot be changed. It meets the same requirements of a valid Amazon S3 bucket name and consists of the following parts:
[Access point prefix]-[Metadata]-s3alias
Uploading an object through an access point alias using AWS CLI
Deleting an object through an access point alias using AWS CLI
Listing objects through an access point alias using AWS CLI
Grant access permissions through an access point using an ACL
I hope you found this blog post on How to manage and use Amazon S3 access points using the AWS Management Console exciting and helpful. In addition, If you have any questions do not hesitate to ask in the comment section.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100545.7/warc/CC-MAIN-20231205041842-20231205071842-00197.warc.gz
|
CC-MAIN-2023-50
| 5,345
| 40
|
https://forum.crayta.com/t/voxel-meshes-with-collision-disabled-still-collide-with-raycasts/2613
|
code
|
Describe the bug:
Voxel Meshes with Collision Disabled still collide with Raycasts. They stop colliding if you also set “Visible” to false.
Meshes with Collision Disabled don’t collide with Raycasts (as expected).
How do you cause this bug?
- Add a Voxel Mesh
- Set “Collision Enabled” on the Voxel Mesh to false
- Hit the Voxel Mesh with a Raycast
Which platform: PC
Which input: keyboard + mouse
Your Crayta username: Vilva#9953
Game seen in (including “Hub” or “Editor for XYZ”): Editor for “Pogo Pirates”
How regularly do you see this? (E.g. 2/3 times - please try 3 times if possible): Every time
Time + date seen: 11.05.2022
Version number (found in Help tab in Settings): 0.f3.28.120518
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337244.17/warc/CC-MAIN-20221002021540-20221002051540-00044.warc.gz
|
CC-MAIN-2022-40
| 715
| 14
|
http://jd-meant-to-be.wikia.com/wiki/File:Melanie_Martinez_-_Carousel_(Official_Video)
|
code
|
Watch the "Pity Party" Official Music Video: https://youtu.be/6bAPlojfgO0
Video Credits: Directed by Adam Donald Concept by Melanie Martinez Production Company: MAD Pictures
Song Credits: (Melanie Martinez, Jeremy "Kinetics" Dussolliet, Tim "One Love" Sommers; Gap City Music/Warner-Tamerlane Publishing Corp., BMI/Tim Sommers Music/WB Music Corp., ASCAP/J. Dussolliet Music/WB Music Corp., ASCAP.) Produced, Mixed & Engineered by Tim "One Love" Sommers
Get Official Melanie Martinez Merch Here: http://smarturl.it/Visit_MMstore
Appears on these pages
Carousel is a song by the American singer Melanie Martinez. It is featured in the JD: Meant To...
HELLO ITS ME
06:07 Melanie Martinez - Cry Baby (Official Video) 03:51 Melanie Martinez - Carousel (Official...
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257646952.38/warc/CC-MAIN-20180319140246-20180319160246-00701.warc.gz
|
CC-MAIN-2018-13
| 760
| 8
|
https://ashleypoole.co.uk/2015/another-great-dddsw-event/
|
code
|
So as I write this, I’m currently heading back from DDDSW6 event yesterday that took place in Bristol, UK. Simply put, I want to say a huge thank you to the DDDSW team for organising such a great event and for the range of topics covered by the speakers; also not forgetting the sponsors that make it possible to run this community event which is free for attendees!
For those who don’t know, DDDSW (Developer, Developer, Developer South West) is a yearly community run event for developers hosted in Bristol and this year was their sixth such iteration.
This year I personally attended (and loved!) the following sessions:
Mark Rendle - Docker Strangelove, or, How I Defenestrated ASP.NET
A demo of using Docker to run ASP.NET 5 applications on Linux and also using Nginx to proxy those request.
Matt Ellis - .NETCore Blimey!
A bleeding edge overview of .NetCore and differences between the .Net Framework as well as where ASP.NET vNext fits into this newly open sourced, cross platform world.
Joel Hammond-Turner - Logging and Monitoring, How to keep DevOps happy
A look into how to easily achieve monitoring and logging, and why this is important for your DevOps team supporting your code and applications in production. Included demonstration of Metrics.Net and Serilog.
Mauro Servienti - Designing distributed, scalable and reliable systems using NServiceBus
Maurco is a solution architect for Particular Software, the makers of NServiceBus, who took us through a jam packed hour session on messaging concepts and how this can simplify the development process. Also included running examples.
David Ringsell - An introduction to MVC including the benefits and the design pattern
A quick introduction to MVC (Model, View, Control) design pattern including a brief example and how these degrees of separation are an important step forward.
Once again, I want to say a big thanks to the DDDSW team and that I’m already looking forward to next years event!! #OneHappyGeek
Posted on general
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827963.70/warc/CC-MAIN-20181216165437-20181216191437-00379.warc.gz
|
CC-MAIN-2018-51
| 1,996
| 15
|
https://michiganupa.org/create-a-custom-color-palette-sap-businessobjects-web-intelligence-4-1/
|
code
|
Create a custom color palette We can create custom color palettes in a Web Intelligence document to easily replace all of the colors in a chart. In this example, we will create a custom color palette and apply it to the chart. Note that the chart style options are not available on the Formatting tab until we select a chart or chart area. Note that we can enter a name for each custom color palette we create, and color palettes are saved with the Web Intelligence document in which they are created. We will replace the first four colors in the palette with different selections. Note that the new palette is now available in the list. Next, we will apply the palette to the chart. The chart now uses the color palette we just created. We will take a quick look at the palette list. The palette we created now appears at the bottom of the list, just above the option to create a new custom palette. Visit www.SAP.com/LearnBI for more tutorials on Web Intelligence and other SAP business intelligence products.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146186.62/warc/CC-MAIN-20200226023658-20200226053658-00478.warc.gz
|
CC-MAIN-2020-10
| 1,011
| 1
|
http://wordpress.stackexchange.com/questions/tagged/next+events
|
code
|
WordPress Development Meta
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
Plugin: Events manager - Next and previous event
I'm trying to get a navigation in the events of event manager the next/previous post links work but they are ordered by creation date instead of event date. How could it be possible to change this? ...
Mar 17 '12 at 15:47
newest next events questions feed
Hot Network Questions
input type="email" allows test@test, why?
Female bastards in Game of Thrones
What is the right way to expose resources owned by a class?
Expected number of ratio of girls vs boys birth
Battlefield 3 uses squared radius and inverse squared radius for lighting computations, what for?
Assume that the square matrix A has an eigenvalue of 0. Is A invertible? Why or why not?
How can I improve the predictive power of this logistic regression model?
Is a nobleman's land inside another noble's land?
Why don't game developers release their source code?
"It was turning out the dining-room done it."
What is exactly a "Pixel"?
Is it possible that "A counter-example exists but it cannot be found"
How do I source another process's environment variables?
Which primitives does LaTeX2e rename/move?
Does the traditional Arabic greeting have religous meaning?
How to show that this limit is tend to zero?
Horizontal line within a line of text
Evaluating current ACEs on NTFS ACLs with PowerShell
How to handle player knowledge when they fumble a knowledge roll
How to explain Heartbleed without technical terms?
What's a good policy for accepting late homework?
What should be included in a freshman 'Mathematics for computer programmers' course?
Does `sl` ever show the current directory?
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Overflow
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0
WordPress is a trademark of the WordPress Foundation, registered in the US and other countries. This site is not affiliated with the WordPress Foundation in any way.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609525991.2/warc/CC-MAIN-20140416005205-00031-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 2,439
| 53
|
http://statisticshomeworkhelp31329.fitnell.com/7545276/the-smart-trick-of-statistics-assignment-help-that-no-one-is-discussing
|
code
|
There are no minor remarks. Our guidance managers will reply any concern concerning your get. They deliver all the data right away to your author, so she or he usually takes corrections into account devoid of compromising the term.
Great task during the shortest time. I needed my do the job to become geared up in couple of times, and the company successfully included this job. Moreover, the quality was definitely ideal, I appreciated it. Im actually delighted, due to the fact all firms which I'd used prior to have don... Exhibit whole assessment on "Trustpilot"
These values vary from making enjoyable and weirdness to remaining humble. Having said that, the foundation of the enterprise’s achievement lies only on a person crucial issue: their regard for customer care. They value the standard time expended with shoppers above the cell phone as opposed to the amount of consumers.... [tags: Downtown Project, Zappos, Amazon] :: 2 Operates Cited 1043 words
The commitment of our statistics homework on the net help is to produce you the very best selling prices available for Every person. Once you involve on line statistics support, you'll get the ideal statistics complications solutions in this article. Our company is ready to help you!
“Wow…” they’d say, because they scanned me from encounter to toes. It could be unreasonable if I claim which i experienced never ever questioned my choice, In particular during the adaptation interval into Laptop science as being a rookie. I'm able to continue to remember the desperation I felt in my initially system designing class.... [tags: Educational Targets, software essays] 1012 terms
This was my first encounter using the companies of a firm for crafting paper. And now I can say with self-confidence - I manufactured the right decision! Good work and superior quality assistance - thanks, men!This critique on Trustpilot
- For my Neighborhood involvement project, I volunteered at Memminger Elementary School for any application known as “Reading through Partners.” This system focuses on helping small children Establish robust literacy expertise to hold with them into their tutorial Professions. It involves the tutor to study to the coed that has been assigned and subsequently the coed reads towards the tutor.
The outcome of a research. A variable you would probably have an interest in predicting or forecasting. Normally referred to as a dependent variable
All papers done are of superior-top quality having a effectively-researched content, accurate structure and citations. The work offered will have a Title web site, Most important body, Reference webpage/Bibliography and number of sources as asked for while in the Guidance. Communication
My statistics assignment grew to become an issue for me. But, you men execute it in a proper way. Hats off to you personally fellas! Zimmerman Canada
An analysis of very long-expression developments reveals the gap amongst the richest and poorest countries was about:
- ... Methodology: The proposed tactic utilizes ‘Course of action Mining’ approach, which aims at extracting beneficial facts Home Page from overall health care knowledge or celebration logs. This method can even help corporations to further improve their solutions, manage the data adequately and Manage their processes [four].
- Facts and Methodology This portion will project the parameters of the financial versions by its details resources, sample measurement, and evidently the estimation methods. This chapter consists of two elements. The primary aspect will introduce the variables together with the reasoning of their variety.
We'd be glad to help you even with your article-assignment-clarifications Completely freed from Price once We now have mailed you the solution.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827639.67/warc/CC-MAIN-20181216095437-20181216121437-00502.warc.gz
|
CC-MAIN-2018-51
| 3,780
| 14
|
https://rosemarybpeters.com/tag/ss/
|
code
|
Rollover buttons and auto sizing are the bane of my existence. I know how to make a function rollover button in Dreamweaver, but I can’t seem to get the buttons to appear in the same spot in every web browser without putting them in some sort of table (Sorry Internet, I know that is a Mickey Mouse solution to my problem). After exclusively trying to build the rollover buttons in a table in Dreamweaver, I started to search the web for other ways to complete my task.
Forty-eight hours. I have officially been working on coding my website so far for 2 days, and in the last hour and a half, it has finally started to come along.
I was struggling quite a bit to understand the navigation bar as well as how html/css actually works. I can’t say I’m an expert in either by any stretch of the imagination, but I finally have a skeleton homepage with a working top navigation bar.
My website timeline:
1) Get my top navigation bar working first — the links aren’t pointing at anything yet, but I know they are active. CHECK
2) Get the top navigation bar working — it should be similar to the top navigation bar, so I imagine it will be a closely-related process. TO DO – Week 5
3) Place the rollover button links in the main body of the homepage. TO DO – Week 5
4) Rebuild my buttons for the middle of the homepage in Illustrator as vector images and replace the previous images. TO DO – Week 6
5) Create .html pages for the 18 pages linked from the homepage. TO DO – Week 6
6) Create a background image for these pages. TO DO -Week 6
7) Fill in the content for these pages. TO DO -Week 7
8) Try to break the website and remove kinks in the design. TO DO -Week 7/8
9) Turn in website (& blog)! TO DO -June 28.
This timeline is daunting as I have to complete it in the next month, plus I really need to start working on my dissertation and my radio module. And keep training for Tough Mudder. YIKES!
All right, well freaking out won’t change a thing, so hiddy ho, here I go!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647671.73/warc/CC-MAIN-20180321160816-20180321180816-00173.warc.gz
|
CC-MAIN-2018-13
| 1,992
| 15
|
http://hanspeterschaub.info/basilisk/Install/installOnMacOSM1.html
|
code
|
Setup On Apple Computer with M1 Processor¶
These instructions allow you to run Basilisk on an Apple computer with the new
arm64 architecture, such as with the M1 chip. As this chip is still very new, not all the required python support packages, like
numpy, have been converted. Thus, for now Basilisk must be built and run as an Intel binary. However, the good news is that Basilisk compiles about 2x faster on the M1 compared to the latest Intel MacBook Pro, and executing all Basilisk unit tests completes slightly faster. The latter is true even though we are running Basilisk emulating an Intel processor within Rosetta 2.
We still follow the same general setup as discussed in Setup On macOS. However, some extra steps are required and outlined below.
The Python.org web site contains a Universal binary for Python 3.9. You can download the installer package there.
Install HomeBrew using a Terminal window as normal. The latest version 3.0 and up natively supports the M1 processor. You can use
brew to install
cmake to support building Basilisk, and install
doxygen to support building the Basilisk documentation.
Setting up Python Packages¶
Running a Terminal Shell Emulating an Intel Processor¶
To install and run the Python support packages, you need to run the Terminal shell using Rosetta. You can configure a Terminal shell profile specially to emulate the Intel process as discussed here, or open Terminal itself using Rosetta 2. The later is done by finding
/Applications/Utilities/Terminal.app in the find, press
cmd-I to open the Finder info panel as shown:
Toggle the Open using Rosetta checkbox. If you now start the Terminal it will install code as if you are running on an Intel processor.
Running a Virtual Environment¶
Follow the Setup On macOS instructions to setup and activate the virtual environment. This way you install the Intel python packages just for using Basilisk. This won’t interfere with other projects that might be running M1 python packages.
Be sure to update pip inside the virtual environment to the latest version using:
pip3 install -U pip
The first step is still to install
conan. However, in this setup you also need to install the
wheel package using:
(.venv) $ pip3 install conan wheel
After this you can run the regular
python3 conanfile.py command as discussed in Setup On macOS. This will prompt you to install the remaining required packages for Basilisk.
When you open the Xcode project, select
ALL_BUILD again and build for Profile (i.e. Release) as normal.
It will build an Intel binary to run under Rosetta. Or, to build the project from the Terminal window,
--buildProject True argument.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487617599.15/warc/CC-MAIN-20210615053457-20210615083457-00617.warc.gz
|
CC-MAIN-2021-25
| 2,652
| 30
|
https://www.thesuntoday.org/missions/
|
code
|
CURRENT SOLAR MISSIONS
Humans have been observing the Sun basically since the beginning but it was not until the early 1960s that spacecraft were used to observe the Sun.
There have been many missions since that time that have furthered our understanding of the Sun as well as provided many new questions to answer. This mission hub will server as a center location to list first the current solar missions then past solar missions. From here links are provided to details about each of the missions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363445.41/warc/CC-MAIN-20211208053135-20211208083135-00078.warc.gz
|
CC-MAIN-2021-49
| 500
| 3
|
https://fallout.wiki/wiki/Appalachian_launch_codes
|
code
|
|For code decryptor resource, see Resource:Nukacrypt.|
Collecting the code pieces
Each launch code is gathered by finding eight individual pieces around the map. These launch code pieces are found on Scorched and ghoulified former military officers, identifiable by the radio packs on their back that emit red light and a high pitched sound in a regular sequence. Locations of launch code pieces for each silo (Site Alpha, Site Bravo, and Site Charlie) can be found by initiating a radiant quest at the surveillance terminals in the command wing of The Whitespring Bunker. Launch code pieces can also be found around the map, randomly, on either alive or deceased Scorched and feral officers.
Code piece expiration
Players with a launch code will get a notification that lets them know when they are about to expire and will claim to self-destruct, but will just disappear from inventory causing no harm to the player. Codes currently expire weekly on Monday, at 00:00 UTC, no matter when they were acquired beforehand.
Unscrambling the code
Once the player character has gathered all eight pieces for a specific silo, they must then unscramble the digits paired to each letter to get a launch code. Several steps must be carried out to unscramble the code correctly. By putting each piece of the code together, in the order displayed in the Pip-Boy, it will be necessary to decrypt the string created.
In order to decrypt the letters of the code, a keyword cipher must be used. In a keyword cipher, a keyword is used as a key, which will subsequently set the letter matchings of the cipher alphabet to the regular alphabet, as such:
C R D T Q G L P 5 6 3 0 0 3 5 9
Any repeats of letters within the keyword will be ignored, and if any letters of the regular alphabet have been used in the keyword, they will be ignored, when they are sequenced through afterward. The keyword for the cipher can be found in the command wing of The Whitespring Bunker for each silo. A letter of the keyword for each silo will appear regularly or irregularly, depending on the length of the keyword, each week. Keywords expire at the end of each week, meaning that each keyword for a specific week will not be the same as the week prior. This article uses the keyword "CIRCUIT" as an example. With the keyword, one can determine the cipher alphabet used in the encryption.
Keyword: CIRCUIT Plaintext: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Encoded: C I R U T A B D E F G H J K L M N O P Q S V W X Y Z
With the information shown above, the string of letters in the encrypted code can now be decrypted, by viewing the letters in the encoded alphabet, and finding the corresponding letter to the encoded letter in the regular alphabet.
String: CRDTQGLP First letter: Encoded: C Plaintext: A Second letter: Encoded: R Plaintext: C ...
After decrypting each letter, a new string will be created.
Encoded string (original): CRDTQGLP 56300359 Decoded string (new): ACHETKOS 56300359
The now decrypted string of letters makes up an anagram, in which the letters must be re-arranged, to form an English word. However, when a letter is moved to a new position, the digit, paired to that letter is also moved, effectively unscrambling the code, while solving the anagram.
Decoded string (unsolved anagram): ACHETKOS 56300359 Decoded string (solved anagram): HOTCAKES 35065309
With that, the digits pairing to the string of letters in the solved anagram is the unscrambled launch code, which can then be inputted at one of the three silos in Appalachia, along with a Nuclear Keycard, to launch nuclear weapons to targets throughout the region.
Scrambled launch code: 56300359 Unscrambled launch code: 35065309
A Scorched officer; bearing a radio pack and a pre-War officer formal uniform
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100476.94/warc/CC-MAIN-20231202235258-20231203025258-00348.warc.gz
|
CC-MAIN-2023-50
| 3,769
| 20
|
https://www.harringtonstarr.com/job/full-stack-developer-java/
|
code
|
Hersham, United Kingdom
Full Stack Java Developer - Surrey, London
This is a rewarding developer opportunity to build global products and solutions for clients worldwide. You would take responsibility for the design and development of my clients new SaaS solutions, used to deliver services that make global trade safer and faster.
To apply, please read below
- Full stack Java developer hands on experience of working in Agile development teams
- Passionate about the quality of work and user experience
- You’ll have built your experience by previously working for a SaaS, software, product company or software development house, developing systems with user interfaces and APIs
- You’ll have experience of both front-end and back-end technologies but more experienced with back-end technologies
- Experience developing a modern back end framework (Spring is preferred)
- Strong experience with Java/J2EE, JUnit & UI testing
- Competent with Databases such as Oracle, SQL
- Keen to learn for example (cloud-based solutions)
My client does not offer sponsorship at present, this is a permanent position with a growing and diverse team.
If you’re interested in more information, get in touch with Bryn Heath at Harrington Starr.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524972.66/warc/CC-MAIN-20190716221441-20190717003441-00150.warc.gz
|
CC-MAIN-2019-30
| 1,234
| 14
|
https://thedigitallifestyle.com/w/2013/10/windows-phone-8-update-3-announced-new-developer-preview-program/
|
code
|
Microsoft have officially announced the 3rd update of Windows Phone 8. The update which has been rumoured for some time has a bigger start screen for more live tiles, a new driving mode and support for 1080p displays. We should see devices with larger screens running at 1080p as soon as Nokia’s device announcement next week, Microsoft mention in the Windows Phone 8 update 3 announcement that the built in apps are scaled to take advantage of 6 inch screens.
With the new start screen there is room for six live tiles up from four that you currently get and Update 3 will also bring support for the Qualcomm Snapdragon 800 quad-core processor.
Also in the update is a Driving Mode that aim to reduce driver distraction. It works with a Bluetooth device to work out when you’re driving and then limit nonfictions until you stop, you can even get it to send automatic replies when someone calls or text you when you are driving.
Internet Sharing has been improved, with update 3 you can pair a Windows Phone to a Windows 8.1 device with Bluetooth and then it will handle the connections. There are also more ring tones and sounds, rotation lock, an easy way to close apps from the app switcher, Wi-Fi setup during the initial setup and improved Bluetooth support.
Microsoft say the rollout of update 3 will happen over the coming months and there is a new Windows Phone Preview for developers which launches later today which is designed for developers to get early access to new versions of the OS for testing their apps. To able to test it you need to have one of the follow setup:
To participate, you need to meet one of the three conditions: your phone is ‘developer-unlocked,’ you are a registeredWindows Phone Store developer, OR you are a registered Windows Phone App Studio developer.
More details on Update 3 on the Windows Phone blog and details on how to get on the developer program on the developer blog.
Is this enough improvements to keep you with or switch to Windows Phone?
2 thoughts on “Windows Phone 8 Update 3 announced and a new developer preview program”
RT @isdixon: Windows Phone 8 Update 3 announced and a new developer preview program: http://t.co/ixborMCFFp #windowsphone #microsoft
RT @TheDigitalLifeS: Windows Phone 8 Update 3 announced and a new developer preview program: http://t.co/Lp2kUu577L #windowsphone #microso…
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949355.52/warc/CC-MAIN-20230330163823-20230330193823-00699.warc.gz
|
CC-MAIN-2023-14
| 2,364
| 11
|
https://www.meetup.com/Siemens-AI-Meetups-Munich/events/251123235/
|
code
|
Needs a location
Creativity is a fundamental aspect of human intelligence and an interesting challenge for AI. Are Machine Learning and AI technologies capable of Creativity?
New artificial intelligence systems are using techniques such as generative adversarial networks to develop creativity and originality by more fluidly mixing and matching real-world representations.
Yet current AI systems have demonstrated a growing aptitude for creativity, whether (re-)writing a heavy-metal rock album or (re-) producing an original portrait that is strikingly reminiscent of a Rembrandt.
Join us and discuss with us the impact and challenges of Deep Learning & AI technologies and the aspect of Computational Creativity.
Welcome to MeetUp AI & Creative State of Mind (Siemens AI Lab & Machine Intelligence Group)
Gene Kogan (genekogan): "Machine learned creativity"
Alexander Waldmann (appliedAi): "Where's the ghost in the Machine"
Grab some Pizza & Beer
Appu Shaji (mobius): "Personalized Aesthetics: Recording the Visual Mind using Machine Learning"
Tarek Besold (City, University of London): "Computational Creativity"
Expert Round Table: "Can Artificial Intelligence Be Creative? "
Food, Drinks & Social
IMPORTANT: Since the event is taking place at Siemens AG, every external visitor has to get an visitor pass. That may lead to a longer entry process! So please come early to make to process as easy as possible. Thank you!
External guests: please register at Siemens main entrance “Otto-Hahn-Ring 6” at 16:15!
See you there!
Please note: Since this is a public event we will take pictures and make videos during the event. With your registration, you agree to the gratuitous publication of this footage on the internet, in brochures and other media.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154878.27/warc/CC-MAIN-20210804142918-20210804172918-00171.warc.gz
|
CC-MAIN-2021-31
| 1,756
| 17
|
https://www.wilderssecurity.com/threads/questions-regarding-online-anonymity-and-privacy.313495/
|
code
|
Here are a few general questions I have about online Anonymity. Curious if anyone has any answers to these. Thanks for the help in advance. 1. Is it possible for websites to see my browsing history,favorites or cookies placed on my computer by OTHER websites? Im aware of websites like http://startpanic.com/ but none of them seem to work. They can not view my browsing history even with java enabled. 2. Is ALL of Tors hidden services encrypted even if they are not https? 3. Is it safe to login to email,banking etc over a VPN service without worry of passwords being stolen as long as the logins are sent over SSL? 4. Does anyone have any idea of how long ISPs keep logs of what IP a customer has used? (specifically USA ISPs) 5. For the best anonymity with Tor is TAILS the best solution that is available? 6. If using Tor or a VPN is it necessary to change the browser User Agent? Does it really increase anonymity that much? 7. If I am using a VPN and have java and flash enabled is it possible for a website to see my real IP? I am unaware of any tests that show how this is possible. I understand Tor is a different story because it is a proxy and doesn't encrypt all traffic from your computer. That is unless you use JanusVM.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099892.46/warc/CC-MAIN-20231128151412-20231128181412-00350.warc.gz
|
CC-MAIN-2023-50
| 1,235
| 1
|
https://gitter.im/rust-lang/rust/archives/2017/09/13
|
code
|
These are chat archives for rust-lang/rust
u16or just "well, probably longer ones will never be required"?
let myarray = [0..10]to have
myarray == [0,1,2,3,4,5,6,7,8,9]. Is this not possible?
Vecs (anything with FromIterator, actually afaik) at least:
aarch64toolchain -- every binary gives me a syntax error... from a compiled binary? Even just
cargotriggers this: https://gist.github.com/Restioson/8b56373484d8f7bbb81c3db0ef45c9ad
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999218.7/warc/CC-MAIN-20190620125520-20190620151520-00324.warc.gz
|
CC-MAIN-2019-26
| 432
| 7
|
https://globalarjun.com/step-by-step-guide-to-troubleshoot-a-faulty-azure-vm/
|
code
|
This Step-by-step guide will walk you through the process of troubleshooting a faulty Azure VM, to ensure that you take advantage of all the support available, and help you to troubleshoot issues related to your Azure VMs as quickly as possible so that you can minimize any potential downtime and loss of productivity. The steps in this guide apply to Windows, Linux and Windows Server VMs, in Azure App Service on premises, including ExpressRoute, using both classic and Resource Manager deployment models.
Accessing the Virtual Machine Logs
To access virtual machine logs, first you need to open your VMs page in an internet browser by clicking Browse > Virtual Machines. Then, click on your VM and select Connect. After selecting Connect, you should see a pop up asking for credentials. For now, it is safe to leave everything blank and just click OK. You will see two tabs: Overview and Connections. Click on Connections. Now, you can view all of your VM’s data by looking at each of its connections in order. Start with Local Storage then move onto Remote Desktop. Then look at each of their descriptions to find anything suspicious or erroring out. In cases where there are errors occurring, be sure to read through them thoroughly so that you have all the information necessary before moving onto troubleshooting specific pieces of code.
Booting Your Virtual Machine
Before you get into any troubleshooting, you need to confirm that your virtual machine is actually running and isn’t stuck in some kind of non-responsive state. If your virtual machine is still booting, follow these steps: Open up your Azure Management Portal and go to Virtual Machines . Scroll down until you find your failed VM. Select it and then click Connect .
Getting Familiar with Azure Log Files
After you’ve completed troubleshooting using System Center Virtual Machine Manager, go back and review your events logs and performance counters. If you’re unable to resolve your issue, check out your virtual machine’s event log files. Event logs record operational information about a computer system in real time; by reviewing them, you can get more granular information about specific issues that occur on your virtual machines. You can also use PowerShell commands on both Hyper-V and VMware hosts to obtain log files that capture detailed information about events that have occurred on your host systems
Restoring the Virtual Machine Backup
When things go wrong, sometimes your only option is to restore your virtual machine from backup. This isn’t as simple as restoring files from your local hard drive or an external storage device. Instead, you must restore from a completely separate virtual machine. It may seem complicated, but it’s actually very easy; follow these steps for complete guidance on restoring an Azure virtual machine.
Fixing the Faulty Partition Table (if applicable)
The partition table is usually located in one of three places on your hard drive. If you’re not sure where it is, or you don’t know if it’s corrupted, run your disk utility and go through all three of these locations until you find what looks like an old format of your partitions: Partition 1, MS Data Partition, or Primary Partition. These are often DOS format, so if that scares you then relax—that just means they were created before Windows existed. If your data is corrupted and there is no backup—time to call in tech support.
Summary & Resources
When an application or service runs on an Azure Virtual Machine, it is important that it works consistently and reliably for your customers. This can be achieved through proper configuration and ongoing monitoring of your virtual machines. If you’re experiencing issues with an Azure Virtual Machine, there are many troubleshooting tools available to help you fix them quickly and without impacting production services. In this post we’ll walk through how to use multiple tools available from both inside of your running VMs as well as from various online tools. We’ll also look at some different scenarios that could cause issues for applications running in virtual machines. We’ll examine some common causes of application failures and suggest potential resolutions based on our experience with real customer support cases.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100632.0/warc/CC-MAIN-20231207022257-20231207052257-00571.warc.gz
|
CC-MAIN-2023-50
| 4,285
| 13
|
https://forum.hise.audio/user/chlopzewsi/posts
|
code
|
thank you! I wouldn't have thought, that such a hack is necessary for it to work
Posts made by chlopzewsi
Sample map not being saved with preset
I'm using FloatingTile with ContentType PresetBrowser for storing my presets.
All values from knobs etc. are being stored correctly.
The only value, that is not being stored correctly, is the SampleMap.
I have tried to save my preset with the SampleMap, but this only saves the values of all knobs in the project and not the SampleMap itself (neither the name nor the .wav behind it).
Do I have to link Map Editor with my code in any way ? My understanding is, that the sample map (value and sound) should be stored automatically with it.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540548537.21/warc/CC-MAIN-20191213020114-20191213044114-00219.warc.gz
|
CC-MAIN-2019-51
| 683
| 8
|
https://www.digzoo.com/news/police-arrest-man-snake-trousers
|
code
|
A 19-year-old man was recently detained by police in the German city of Darmstadt. He came to police attention for drunken behaviour which had resulted in numerous complaints from the public and led to him getting into a public altercation with another man.
During the arrest police noticed a “significant bulge” below the man’s waist. What would usually result in a person saying something along the lines of, “Oh man that’s gross” turned out to be much worse.
It was a trouser snake.
Not a penis.
An actual snake.
The man revealed he had a 14 inch (about 35cm) long baby king python hidden in his trousers. Police said it was unclear why he had hidden the snake in his clothing and were considering whether he had broken any animal welfare laws. We at DigZoo would like to call these police for their lack of imagination. It’s really super duper obvious why he had the snake.
It’s for the banter.
It’s obviously for the banter. He wanted to tell a girl he had a 14-inch trouser snake and when her response was something like, “I seriously doubt it” he could whip out an actual literal honest-to-God 14-inch trouser snake.
Personally, while we have to give the man credit for following through with a ploy like this, it strikes us as dangerous. If that python decided to attack his penis he would have had a very bad day. Pythons aren’t venomous but they do have teeth. Let’s look at those teeth.
Nope. Nope. Nope. Don’t put that down your trousers. Unless you want to pee like a hosepipe pointed at a spaghetti-strainer for the rest of your life then don't do it. Consider also the following, pythons like to crush things to death. So you’re also at risk of the python deciding to crush your tackle into a fleshy pulp! Unless you want to spend the rest of your life with genitals that have been absolutely destroyed then you should never put a snake down your pants.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540481076.11/warc/CC-MAIN-20191205141605-20191205165605-00287.warc.gz
|
CC-MAIN-2019-51
| 1,898
| 10
|
http://scripting.com/stories/2007/08/01/whyIsTechnoratiSoVolatile.html
|
code
|
Why is Technorati so volatile?
Wednesday, August 1, 2007 by Dave Winer.
I probably shouldn't watch the rank of this blog over at Technorati, but I do.
But last night, in a few hours, the rank went from 122 to 270, after spending a couple of weeks steadily going down (which is really up) from around 150.
PPS: Please, could someone with some logevity and system management expertise buy Technorati. Think of it this way. McAfee in some sense owns the Oakland Colliseum. Monster owns Candlestick. AT&T owns the stadium where the Giants play. Okay, what if IBM owned Technorati, it would then be called the IBM 100. Think about the goodwill you'd buy. You'd be famous as the arbiter of popularity in the blogosphere. You'd be thanked for bringing stability to a metric that desperately needs it. Sifry, if this approach works, you owe me 1 percent.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301737.47/warc/CC-MAIN-20220120100127-20220120130127-00547.warc.gz
|
CC-MAIN-2022-05
| 846
| 5
|
https://forums.creativecow.net/docs/forums/post.php?forumid=8&postid=1148082&univpostid=1148082&pview=t
|
code
|
I have a problem with the high movement shots burned on dvd, "lines" appear on the screen..i need to know the exact steps to prevent these interlacing artifacts using MPEG Streamclip like: "Interlaced Scaling" or "Deinterlace Video" " Frame size 16:9 unscaled ,compression type, ect.. what buttoms should i select on..
and also if using final cut time line export..
by the way am shooting 1920x1080 50i
Thanks a lot
If you are trying to create interlaced video on a DVD, then you need this horizontal lines in the video. They don't appear on an interlaced television monitor when resized correctly. I wrote an article on transferring HD footage to DVD for the Los Angeles Final Cut Pro users group that covers all the details of this.
How are you using MPEGStreamclip and with what settings? I don't recommend using MPEGStreamclip, as it's not easy to use and I've found it has a lot of problems.
Brad Wright is software engineer, so it may be difficult to understand what he is saying. He is always happy to explain his greater detail.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583513760.4/warc/CC-MAIN-20181021052235-20181021073735-00375.warc.gz
|
CC-MAIN-2018-43
| 1,036
| 7
|
https://homebiznotes.com/doing-biz-abroad-home-biz-notes-review/
|
code
|
Doing Biz Abroad For Home Business Owners
Written by Chris Erb and Jean Mercedes, Doing Biz Abroad is an informative, entertaining mix of business etiquette, doing business abroad (as the title suggests) and some wry observations.
In an entertaining and interesting article, Jean Mercedes says,
Non-native English speakers all over the world are adapting English and inventing new words and expressions. The estimated number of English speakers in the world (including non-native speakers) has grown from 250 million to 1.3 billion in the last 40 years and the number is growing.
If you are a home business owner wanting to explore the global market, Doing Biz Abroad is a good starting point to understanding international business and other cultures.Tags: doing-biz-abroad, home-business, home-business-global-market, International Business
POSTED IN: International Business
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100081.47/warc/CC-MAIN-20231129105306-20231129135306-00576.warc.gz
|
CC-MAIN-2023-50
| 876
| 6
|
https://researchonline.jcu.edu.au/view/jcu/9700C45F6C9FA3805318CFF2FB2ACCD4.html
|
code
|
Also publishes as (Parjiono Parjiono)
|Up a level|
Parjiono, Parjiono, Beg, A.B.M. Rabiul Alam, and Monypenny, Richard (2013) The driving forces of the level and the growth rate of real per capita income in Indonesia. Applied Economics, 45 (17). pp. 2389-2400.
Parjiono, (2009) Economic growth in Indonesia: the driving forces of the level and the growth rate of real per capita income: an econometric time series approach. PhD thesis, James Cook University.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121893.62/warc/CC-MAIN-20170423031201-00210-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 458
| 4
|
http://blog.hiive.com/2011/07/accelerating-impactjs-with-webgl.html?showComment=1342145096284
|
code
|
One of the problems with the implementation of HTML5's Canvas on the Mac is that it is not hardware accelerated (at least in Chrome, which is what I test with). Consequently, all of the drawing to the canvas is done in software, which is a shame seeing as on most computers there is a perfectly capable graphics card sitting idly by while the processor does all of the work. The end result was that my top-of-the-line MacBook Pro struggled to get 30-40fps which a two year old crappy laptop running Windows (which has a hardware-accelerated canvas in Chrome) got a smooth 60fps. Hell, even Windows Chrome running in VMWare on my Mac got 60fps.
It was simple enough to look at the shader modifications in the alpha-enabled version and apply them to the absolute latest version of Corban's original. I even extended the alpha support to other drawing types supported by canvas (e.g. line and shape) so that the alpha was respected by all of the API calls (at least all that I have tested). Okay, so that's the icing... How about the cherry?
I extracted the plugin from the ImpactJS demo game here, but I wanted a plugin for ImpactJS that would automatically probe to see if the browser supported WebGL and fall back to standard 2D if it did not. Well, with the current implementation of the WebGL wrapper, it throws an exception if WebGL is not supported. (Note: I'm not to keen on using this as a detection mechanism, and may well improve this in future). In any case, with all of the browsers I've currently tested it on, the plugin has the desired effect of using WebGL if it's available and falling back to Canvas2D if not. It's a bit quick and dirty, but it works.
The end result? A smooth 60fps on my MacBook Pro. Hooray!
The code can be found here. Suggestions for improvements and any bug fixes are welcome!
Just for completeness, here is the obligatory before and after comparison:
|Before (standard Canvas 2D)|
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510528.86/warc/CC-MAIN-20230929190403-20230929220403-00234.warc.gz
|
CC-MAIN-2023-40
| 1,918
| 7
|
http://bgbenchmark.org/BG/unpredictabledata.html
|
code
|
Unpredictable data is either stale, inconsistent, or simply invalid data produced by a data store. For example, the design of a Cache Augmented SQL (CASQL) system may incur dirty reads or suffer from race conditions that leave the cache and the database in an inconsistent state, a data store may employ an eventual consistency technique that produces either stale or inconsistent data for some time, and others. The requirements of an application dictate whether these techniques are appropriate or not. A key question is how much unpredictable data is produced by a data store for interactive social networking actions. BG quantifies this important metric.
Conceptually, BG is aware of the initial state of resources in the database (by creating them using deterministic functions) and the change of value applied by each update operation. There is a finite number of ways for a read of a resource to overlap with concurrent actions that write it. BG enumerates these to compute a range of acceptable values that should be observed by the read operation. If a data store produces a different value then it has produced unpredictable data. This process is named validation and its details are as follows.
BG implements validation in an off-line manner after it rates a data store, preventing it from exhausting the resources of a BGClient. During the benchmarking phase, each thread of a BGClient invokes an action that generates one log record. There are two types of log records, a read and a write log record corresponding to either a read or a write of a resource. A log record consists of a unique identifier, the action that produced it, the resource referenced by the action, its socialite session id, and start and end time stamp of the action. The read log record contains its observed value from the data store. The write log contains either the new value (named Absolute Write Log, AWL, records) or change (named Delta Write Log, DWL, records) to existing value of its referenced resource.
The start and end time stamps of each log record identifies the duration of an action that either read or wrote a resource. They enable BG to detect the 4 possible ways that a write operation may overlap a read operation. During validation phase, for each read log record that references a resource, BG enumerates all completed and overlapping write log records that reference that resource to compute a range of possible values for this resource. If the read log record contains a value outside of this range then its corresponding action has observed unpredictable data.
Currently, there are two centralized implementations of the validation phase using interval-trees as in-memory data structures and a persistent store using a relational database. The latter is more appropriate when the total size of the write log records exceeds the available memory of a BGClient. We also have a perliminary implementation of the validation phase using MapReduce that requires the log files to be scattered across a distributed file system. One may configure the invalidation phase to use either its in-memory or persistent implementation.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823183.3/warc/CC-MAIN-20181209210843-20181209232843-00509.warc.gz
|
CC-MAIN-2018-51
| 3,132
| 5
|
https://forum.support.xerox.com/t5/Printing/Message-appears-every-time-i-print/td-p/151277
|
code
|
Never mind...found my answer in a different thread. Thanks anyway!
Every time i print a document to my phaser 7500 i get a message stating "Document X was sent to the printer" with an ok button (see screen shot). Is there a way to turn this off? I am on a Mac running OSX 10.9.2.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500456.61/warc/CC-MAIN-20230207102930-20230207132930-00152.warc.gz
|
CC-MAIN-2023-06
| 279
| 2
|
http://www.softheap.com/secagent/disable_account_changes_in_outlook_express_013a_1.html
|
code
|
How to Disable Account Changes in Outlook Express?
Disable Account Changes in Outlook Express
This setting disables the ability for users to create or modify any mail, news or directory accounts in Outlook Express.
Option affects the whole PC. Reopen Outlook Express to activate this option.
Security Administrator [More] [Download] [Buy]
Limit access to key features of Windows PC ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583510019.12/warc/CC-MAIN-20181016051435-20181016072935-00559.warc.gz
|
CC-MAIN-2018-43
| 385
| 6
|
https://donscorgie.livejournal.com/8912.html
|
code
|
Some random notes on happenings:
- Met some fantastic people. Was quite impressed a few even recognised my name and knew what I do :)
- I did my talk, which I thought went pretty badly. Teach me to write it the day before. Teach me to actually listen to The Fearless Leader when he speaks of what he knows.
- Managed (hopefully) to convince Joe Shaw to rewrite Beagle to use Rarian. The entire way through, not just the documentation back-end, joining Tracker (hopefully). [0.5]
- Also nice to see a (solitary?) KDE developer wandering and seeming interested in getting Rarian into KDE (please? Pretty please?)
- Like most others, I managed to pick up a cold which, thankfully, seems to be abating a bit. My cough has nothing to do with the cigarettes, obviously.
- Contrary to popular belief, I am a Doctor, I just don't play one on TV
- Got back to discover my second monitor has died. I'm now back to single-monitor mode. I don't know how people survive. A new monitor is now high on my list of priorities.
- Watching the Grand Prix, I was glad to see we weren't the only ones to be hit by the freakishly heavy rain.
Footnotes rock
[0.5] For the people pestering me about why it's on evil proprietary Google Code, it'll be moved over to freedesktop soon, promise.
No, I don't get it either, but 3 people told me this. It might also explain why people seem to photograph me everywhere I go. Or maybe that's just 'cause I'm great.
Possibly right up there with "laptop"
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348509264.96/warc/CC-MAIN-20200606000537-20200606030537-00149.warc.gz
|
CC-MAIN-2020-24
| 1,475
| 13
|
https://help.goacoustic.com/hc/en-us/articles/360042467893-Admin-Provision-your-users
|
code
|
In order to access Acoustic Personalization, your organization and user accounts must be provisioned with an active Personalization subscription.
The first time a Personalization subscription is provisioned, you'll receive an email to accept and activate the invitation. The email also contains the URL to the user management screen where you can add new users.
Important: To complete the user provisioning and access privileges to the subscription, you must contact Acoustic Support.
You'll need to provide the following details to Support:
- Organization name
- Administrator’s email address
- Email addresses of the users to add to the subscription
After your users are provisioned to an active subscription, they can log in to Personalization.
For any changes in user management, such as adding, editing, or removing users, you must create a support ticket.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400187354.1/warc/CC-MAIN-20200918061627-20200918091627-00438.warc.gz
|
CC-MAIN-2020-40
| 863
| 9
|
https://help.kinvasoft.com/article/4358
|
code
|
If the menu did not appear in your store after installing the "Multi-level menu" application, then there are 2 reasons for this:
1. You have recently launched an online store;
2. You have recently switched to the new design of the Ecwid (New-gen Instant Site), which appeared in early 2021. (Fig.0.)
In the first and second cases, our Menu cannot appear automatically, because in the new Ecwid design all scripts are disabled
To display the Multi-level menu in the store, you need to add a script to the main page.
Catalog > Multi-level menu > Menu widget > Widget HTML code
1. Go to the "Meta tags for site verification" section. Use the path
Website > SEO > Header meta tags and site verification and click on the "add code" button. (Fig. 2.)
2. Figure 2 shows an example of what the "Header meta tags and site verification" block will look like if there is no code in it. If there is already some code in this block, then we write our code at the very bottom, after the existing code. (Fig. 2.1.)
3. Save the settings
4. If only our script is added to the "Header meta tags and site verification" block, then the block should look like in Fig. 3.
4. If only our script is added to the "Header meta tags and site verification" block, then the block should look like in Fig. 3.1
The menu may not load in the new design, because containers from the old design theme can be registered in the
Compatibility options > Container.
To check the list of containers, go to
Compatibility options > Container (Fig.4.)
.starter-site .body .menu, .ecwid-productBrowser(Fig. 4.)
#ec-instantsite .ins-tile--header, .starter-site .body .menu, .ec-static-container, .ecwid-productBrowser(Fig. 4.1.)
If you checked the list of containers and the list from the old design is registered in the "Container" block, then you need to copy the list for the new design and add it to the "Container" block. Click on the "Save options.
After saving the settings, go to the store page and check the loading of the Multi-level menu, then update the page
If after updating the Multi-level menu still has not appeared, so you have made a mistake somewhere in the steps, go back to the beginning and carefully go through the above steps again
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301217.83/warc/CC-MAIN-20220119003144-20220119033144-00287.warc.gz
|
CC-MAIN-2022-05
| 2,210
| 21
|
https://www.netlify.com/blog/2019/03/26/deploy-codesandbox-to-netlify/
|
code
|
News & Announcements
Deploy CodeSandbox to Netlify
Here at Netlify we love developer tools. We focus a lot of attention on making the experience of building for the web as simple and powerful as we can, and the evolution of development tooling contributes to this a great deal.
Today, we are happy to announce that you’re now able to create and deploy sites to Netlify, directly from CodeSandbox!
What is CodeSandbox?
An impressive browser-based IDE built with React and a lot of ingenuity, CodeSandbox has steadily matured and improved since its launch. And has become a fantastic tool for building and experimenting. All from your web browser without the need to create a local development environment. It’s remarkable.
After introducing CodeSandbox containers, it gained the ability to execute the parts of your code that you might usually use as a build step on your local machine. This made it even more enticing to use with JAMstack projects, which you could then deploy to Netlify.
There are already a number of ways to deploy a site to Netlify:
- Using our app.netlify.com UI (tutorial)
netlify deployvia the command line
- Clicking the mighty deploy to Netlify button
- Calling the Netlify API
- Defining your site in terraform
- Via AWS CloudFormation
- …and now, CodeSandbox deployments!
Today’s announcement adds yet another method of creating and deploying Netlify to sites. This new integration was built in collaboration with the team at CodeSandbox and we’re delighted at how it can shorten the path between writing code, and getting your sites online.
CodeSandbox + Netlify
By selecting Netlify as your deployment target in CodeSandbox, you can have your project build in Netlify's CI/CD environment, and deployed directly to our global ADN with one click!
New sites are created with a unique URL just a few moments after hitting the deploy button.
You can then claim the site and attach it to your Netlify account to enjoy all the usual Netlify benefits of CI/CD and the other features of Netlify
Here’s a quick look at just how quickly you can deploy:
CodeSandbox offers a low friction approach to getting started on a web project. And it allows some really interesting ways to collaborate on code in real time from within your browser, without even needing to set up a local development environment.
We can’t wait to see where this goes next.
Why not try creating your first CodeSandbox project today? And deploy it on Netlify from this nifty new integration!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816587.89/warc/CC-MAIN-20240413083102-20240413113102-00236.warc.gz
|
CC-MAIN-2024-18
| 2,493
| 24
|
https://www.morganmckinley.com/sg/job/singapore/robotics-engineer/1038745
|
code
|
As part of Manufacturing Innovation Group activities, we are developing and commercializing autonomous mobile robot(AMR) systems.
· The target of this activity is to develop new autonomous mobile robot system based on the commercialized AMR, "HOSPI".
· The main responsible is for developing autonomous mobile software and its server system software for control multiple robots and facilities.
· The responsible is also including robot instalment and ramping up to the customer.
· Understand control software of the autonomous mobile robot "HOSPI" and modify it to the local customers.
· Understand management software of "HOSPI" ( HOSPI server ) and develop additional functions to it for the local customers.
· Develop and verify integration between the HOSPI server and the Robot Middleware Framework(RMF).
· Promote POC of the autonomous mobile robot with System Solutions Asia Pacific which is the sales department.
· Understand the operation and adjustment of HOSPI and operate HOSPI.
· Install and ramp up HOSPI to the customers with applying the designated local functions.
· Robotics or software engineer, with at least 3-year experience in the development of the autonomous mobile robot or AGV.
· Software engineer with more than 3 years' experience in the development of Database software or system software.
· Proficient in C/C++ and good in Python.
· Able to understand robotics and robotics development.
· Able to produce specification sheet of software or do with software coding.
· Having experience of ROS development or able to understand ROS.
· Able to maintain or adjust the robot.
· Strong Leadership skill. Experience in project management is a plus.
Delivery Consultant | M3S Solutions
Morgan McKinley Pte Ltd
EA Licence No: 11C5502
Registration No: R1326684
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039594808.94/warc/CC-MAIN-20210423131042-20210423161042-00037.warc.gz
|
CC-MAIN-2021-17
| 1,798
| 22
|
https://www.careervillage.org/questions/563342/what-is-the-normal-day-as-a-software-developer-like
|
code
|
What is the normal day as a software developer like?
Im 12 and was thinking about my future job in class as a project. My main one was to become a software bc its interesting and i already started coding
I've been working in software for 8 years now, and this is what my schedule looks like these days:
- Wake up and check GitHub and Slack. (GitHub is where our team keeps our code projects, and Slack is where we communicate and chat)
- Write code for about 30-40% of my day. This involves writing new features, fixing bugs, tracking any issues in our code, and admin tasks around managing our code base.
- Walk my dog and have breakfast with the family (I work from home and our kids homeschool)
- Join meetings with designers or product managers, where we discuss, strategize, and execute on how to improve our product
- I chat with my team (we have teammates in the US and Europe)... we laugh, tell stories, help each other, and continuously build our relationships
- I normally finish the day review my teammates' code or I spend some time doing personal learning
- In between there, I definitely enjoy my fair share of snacks and I always take breaks to have lunch
All in all, while coding new features or solving bugs can be complicated, I wouldn't trade it for the world. When I need to, I drive into the office to meet with team members face to face, which is also a great option.
I hope this helps give you an idea of what the schedule looks like.
Randy recommends the following next steps:
Thing happen all the time. A new project comes up. A bug is found. Someone forgets to invite you to a meeting until 5 minutes AFTER the meeting starts. Another dev has a question that leads into a long, interesting discussion.
Randy's answer is very good. A few other things he didn't mention...
1) At least at my company (a large, international company), we have lots of meetings not directly related to any project. Quarterly financial reports (i.e. what we are reporting to the shareholders). Major corporate initiatives. Speaker series. Division and departmental meetings. Education. We have groups devoted to various social causes that hold webinars. Social events for holidays around the world, as we have many immigrant workers who celebrate Diwali, Eid, Cinco De Mayo, Spring Festival, and many, many more. Many of these meetings/events are optional, but not all.
2) When Randy says "writing code", he doesn't mean (at lest, I HOPE he doesn't mean) typing away on a keyboard banging out Java or whatever. Coding is really more about THINKING, and less about TYPING. When I'm coding, I will spend as much as 50% of my time doodling through ideas, looking for holes in the specs, trying something and deleting it, testing it, revising it,...etc. The goal isn't to start typing in code as soon as possible, for as long as possible, but to write simple, neat, and elegant code that is easy for everyone to understand. I'd rather have a developer who on produces a little code a day that I can understand and that works, over someone who produces tons of buggy, incomplete, hard to follow code.
3) While we mostly work from home now, many of us go into the office two days a week. The nice thing about that is that while walking down the halls, I meet people on other teams, working on other projects. I may overhear something interesting, or see something on a screen and I'll stop and chat for a few minutes. Much of the time, I gain a casual office friend. Sometimes, I learn something really cool. Other times, I'm able to make a connection between what they are doing and what I am doing. I've found duplicated efforts, ways to combine unrelated things to make other things even better, or sometimes, just a contact that in 3 months comes in VERY handy.
One of my favorite things about this kind of work is it's never boring. There is always something to learn, some new path to forge, some project that I can dig deeper into than anyone has in years...and if I don't like what I'm doing now, I can always find something new and different.
At the beginning of the project, a project team would be formed with Subject Matter Experts , e.g. Project Manager, System Analyst, System Architect, a number of software engineer, etc. The project scope and timeline would be defined. Different people would take up different tasks with defined timeline.
The project team would have regular meetings from time to time to review the project status.
On the other hands, the team members may have close interaction from time to time. The software engineers may also discuss and work together to ensure the connectivity between the components they are building and also on testing.
Hope this helps! Good Luck!
Here's the thing that we think you as a 12-year-old can do to jump into the software development area:
Answer from Vatsal Gujarati:
1. The day of the software developer starts by first checking the mails, slack, and GitHub which we would get over the night and then schedule the day for being more productive.
2. The life of a software developer is not only about writing code or developing software. We have many meetings where we discuss the blockers where we are blocked on or try to get insights from others as well. 3. We have meetings with our team members where we chat and have fun to refresh ourselves.
4. We write code and also review our teammate's codes and also try to learn more.
5. After that for our fitness we go for a walk or do any physical exercise.
6. And at the end of the day, we work on our own personal projects and in that process, we also wait most of our time on YouTube followed by Netflix and prime video.
Other advice from our group members:
1. taking robotic courses: it can be an interesting hobby
2. learning to code for fun: for example, Python:
we have a book recommendation. It's free and you can read it on the website:
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00702.warc.gz
|
CC-MAIN-2022-33
| 5,862
| 34
|
https://stats.stackexchange.com/questions/394121/some-questions-about-quarterly-and-monthly-timeseries
|
code
|
I need some help in my forecasting analysis.
In my company, for the most part, if we take a look at monthly sales time series we will find a lot of noise, a large standard deviation and variance, very little seasonality and some trend series. As the product database that the company does planning is limited (between 5 and 4 years, up to 8 in some cases in older products) I can generate forecasts that are mostly very poor as if it were a forecast of white noise, with very few patterns and a very wide confidence interval. On the other hand I only need to analyze one point for the future or 2 at most.
But going deeper into the study of the time series of my company's products I can see that if I aggregate the data quarterly and look at the series in this way, the coefficient of variation in all series falls by about half, and I can see more seasonal patterns! As my company has a demand that is much greater than supply and a lot of production inefficiency, we close orders that sometimes take almost three months to be done, forcing the client to buy with a space of two or 3 months! This makes the series have more noticeable seasonal peaks if we look at them on a quarterly basis).
Example: We have a product with code M2, an article widely used as accessories for carnival party clothes. Carnival is a famous Brazilian festival that takes place between February and March. With this to carry out the whole process of making the clothes clients mostly make the purchase in the 3rd quarter of the previous year. If we look at the monthly data we cannot pick out the pattern very well, because it varies between the months of the third quarter (July, August and September).
On the other hand, if we look at the data grouped quarterly, we can see a decrease in the data variation and the presence of a strong quarterly seasonal pattern: (Quarterly data for the first quarter of 2014 until the last quarter of 2018).
With the quarterly series I get better confidence intervals and capture more patterns in my series. But my doubt is that the company's S&OP routine needs this monthly. So far we are working with this quarterly forecast divided by 3 for each month of the quarter. We generated some errors in the month but in the quarterly accumulated we are close to what was predicted.
Is there any better way to make this monthly breakdown? Or given the limitations of data and because of the types of time series that I have is this the best tactic?
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817200.22/warc/CC-MAIN-20240418061950-20240418091950-00664.warc.gz
|
CC-MAIN-2024-18
| 2,460
| 7
|
https://download.igniterealtime.org/openfire/docs/4.6.7/documentation/translator-guide.html
|
code
|
The Openfire admin console can be easily translated into other languages. This document provides instructions for those that wish to make translations.
All text in the Openfire admin console is stored in a resource bundle. A resource bundle is a file containing key/value pairs. Words and phrases are represented using keys. The correct values are retrieved based on locale settings (English values are used for English locales, French values for French locales, etc). Key/value pairs in the English resource bundle might look like the following:
skin.yes=Yes skin.no=No skin.topic=Topic skin.message=MessageThe German resource bundle would contain the same keys, but different values:
skin.yes=Ja skin.no=Nein skin.topic=Thema skin.message=BeitragMaking your own translation involves copying the English resource bundle, renaming the file, then translating its contents.
To start, make a copy of the default (English) locale file "openfire_i18n.properties". It can be found in the resources\i18n directory of your Openfire installation. Note: the files found in resources\i18n are copies of the real resource bundles used by the application (the real resource bundles are contained in the openfire.jar file). Editing the resource files in the resources\i18n directory will not affect your running copy of Openfire.
Next, you'll need to rename the file to match the locale that you're making a translation for. The syntax of the name is "openfire_i18n_[lang]_[country].properties". However, the country code should be used in most cases. For example, the German resource bundle should be named "openfire_i18n_de.properties" because "de" is the language code for German. For French, the file would be called "openfire_i18n_fr.properties". A list of language codes can be found at: http://www.ics.uci.edu/pub/ietf/http/related/iso639.txt. Some locales require a combination of language and country code. For example simplified Chinese would have the name "openfire_i18n_zh_CN.properties" while traditional Chinese would have the name "openfire_i18n_zh_TW.properties".
Next, use your favorite text editor to translate the English values into your language. The key names must not be changed.
To test your translation, copy the translated resource bundle file (example, openfire_i18n_de.properties) to the lib/ directory of your Openfire installation. Make sure Openfire is stopped and then edit the conf/openfire.xml file. Set the locale property to match your new resource bundle such as "de" or "zh_CN". Start Openfire and the admin console should now be using your translation. If you still see English text you may have named your bundle incorrectly or used the wrong value for the locale property.
Once your translation is complete and tested, please submit it to the Openfire developers so that others can enjoy it in the next release!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476180.67/warc/CC-MAIN-20240303011622-20240303041622-00198.warc.gz
|
CC-MAIN-2024-10
| 2,838
| 9
|
http://distributed-software.blogspot.com/2005/06/correctness-proof-and-design-of.html
|
code
|
Correctness proof and design of language
Observing how Egyptians were practicing it, the Greek called it the measurement of land, or geometry. Generally, we only use geometrical measurements, and leave the notion of derivation to the followers of Pythagoras and Euclid. But the point is that geometry has two aspects, measurement and derivation.
The most successful measurement theory for software development has been the complexity of algorithms. On the other hand, derivation has not found a footing yet. The possibility of any form of success in the direction of derivation has been diminishing. The likelihood that a Riemann will make some geometry applicable to software correctness proof is moot.
Perhaps, we should seek correctness proof in an entirely different form. For instance, in manufacturing a car, engineers use various areas of science to demonstrate that each portion that they are dealing with is correctly designed. However, the actual car is assembled from all those parts, and the gluing material. The only correctness proof for the final product is a test drive. That just seems so dissatisfying for software.
It is more likely that the design of language and the roles of compiler and linker will eventually get us closer to a more satisfying mechanism for correctness proof. For instance, structured programming helps write programs that are closer to the way we think. On the other hand, type checking helps avoid sending incorrect objects to functions. The point is that, it is better to focus on the design of language for correctness proof rather than try to come up with a logic that can prove the correctness of programs in arbitrary languages.
Obviously, an engineer unfamiliar with the semantics of the language’s constructs and the intent of its linguistic facilities will not be able to make much sense out of a large number of error messages. The more sophisticated the language, the longer it takes to truly appreciate its facilities for correctness proof, and the proper interpretation of the error messages in correcting the code. Simply removing errors and warnings is not a justifiable development practice.
Regardless of the level of sophistication of a language, there will be areas that compiler and linker, or any other tool for that matter will not be able to help in detecting obscure errors. This is why a systematic final test drive (as for a car) is necessary.
Considering the degree of difficulty in mastering a language the question is, which language do we start with? In other articles I have argued that we should follow an evolutionary path, starting with C, C++ and now Z++. Starting with an entirely new language is like forcing a conquered nation to speak the invader’s language. Furthermore, C and C++ have stood the test of time.
Z++ is freely available from ZHMicro.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122619.60/warc/CC-MAIN-20170423031202-00238-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 2,833
| 9
|
http://security.stackexchange.com/questions/14700/what-is-the-value-of-vendor-specific-security-certs-vs-general-ones
|
code
|
Adding to the already great answers - which are all some variant of "it depends"... the "it depends" includes:
From Lucas Kauffman - it depends on your role - many certificationes depend on the role you're applying for. Some certifications apply to specific types of security roles.
From Eric - it's also the needs of an organization - a Cisco shop wants Cisco certs and so forth.
From me - there's also the business model of the company - these days, for example, the US defense industry requires a certain number of certified engineers for the bidding of certain proposals. So hiring (especailly at a senior level) individuals with those certs is a major bonus. In this case, it's not the nature of the work OR the role, necesarily, but a created context to show the customer the company's qualifications. I can imagine other consulting type businesses with a similar focus.
I'll even go so far as to say that when I'm reviewing a candidate's resume, I'll check whether the applicant is what I think of as a certificate "junkie". Since I often have weird teams that need to be very flexible, no one certification really does it for me... but I like to see that the person I'm talking to takes an active role in self-education and improvement. Seeing 1 certificate or similar education effort every 3 years is a good indicator. Seeing a set of alphabet soup long enough to write a novel with makes me wonder if the guy spends any time working! Usually I verify and follow up to see if there was a work context for such a thing - like a consulting role where the more certs the better...so the guy was funded to go nuts with self-study in the off season between consulting gigs.
I'll also ask "why this cert?" in the interview. Bad Answer: "Because I thought it was good to get a certificate, and everyone said this one was good for getting a new job." Good Answer: "Because the syllabus included X topic, a point I wished to know more about or thought might be a weak point in my current skill set... where I was looking to make a transition to < a role like yours > I figured I might need that." Note - whether or not the candidate is right about the needs of the role doesn't matter much to me... more that he was looking at what he really needed to supplement a weak point, and that he had a plan for growth. Bonus points either way - extra major bonus points if he's actually right about the role. :)
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824337.54/warc/CC-MAIN-20160723071024-00325-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 2,405
| 6
|
https://www.techrepublic.com/pictures/five-virtual-desktop-managers-for-windows/
|
code
|
Sysinternals Desktops 2.0
Users of Unix and Linux are probably very used to virtual desktops; they've been present in the GUIs for those operating systems for a long time. Windows users, however, have been stuck with a single desktop - unless they use something like one of these five addons.
The first selection is Desktops from Sysinternals, a Microsoft brand. Desktops is a very simple implementation whose strongest feature is the on screen quick preview of the possible four desktops.
Screenshot of Desktops interface by Wally Bahny for TechRepublic
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991252.15/warc/CC-MAIN-20210512035557-20210512065557-00096.warc.gz
|
CC-MAIN-2021-21
| 554
| 4
|
http://distings.blogspot.com/2010/09/dear-richard-branson.html
|
code
|
THANKS ... for being so great at what you do.
And for always sharing your wisdom.
And for being honest about hard work.
And for doing things differently.
And for disrupting it all.
And for taking over the world - one Virgin at a time.
And thanks for these 5 "easy" steps to being a business success:
1 - Enjoy What You Are Doing.
2 - Create Something That Stands Out.
3 - Create Something That Everybody Who Works for You is Really Proud of.
4 - Be a Good Leader.
5 - Be Visible.
Go over to Entrepreneur.com to read his five business tips in full.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589022.38/warc/CC-MAIN-20180715222830-20180716002830-00239.warc.gz
|
CC-MAIN-2018-30
| 547
| 13
|
http://encyclopedia.kids.net.au/page/st/Stack_pointer
|
code
|
Redirected from Stack pointer
The two main operations applicable to a stack are:
Some environments that rely heavily on stacks may provide additional operations, for example:
Stacks are either visualised growing from the bottom up (like real-world stacks) or growing from left to right, so that "topmost" becomes "rightmost". This means that a right rotate will move the first element to the third position, the second to the first and the third to the second. Here are two equivalent visualisations of this process:
apple banana banana ==right rotate==> cucumber cucumber apple
cucumber banana apple ==right rotate==> apple cucumber banana
A stack may be represented in computers inside block of memory cells, with the bottom at a fixed location, and a variable stack pointer to the current top cell. pushing first increases the top pointer by one, pointing it to the next cell, and then fills that with the new top value. poping first takes the top value, and then decreases the top pointer by one. Increasing and decreasing may be exchanged to yield a stack representation that grows from high addresses to lower ones.
Many CPUs have registers that can be used as stack pointers. Some, like the x86, have special instructions that implicitly use a register dedicated the job of being a stack pointer. Others, like the PDP-11 and the 68000 family have addressing modes that make it possible to use any of a set of registers as a stack pointer.
Calculators employing reverse polish notation use a stack structure to hold values.
A number of computer languages are stack-oriented, meaning they define most basic operations (adding two numbers, printing a character) as taking their arguments from the stack, and placing any return values back on the stack. For example, PostScript has a return stack and an operand stack, and also has a graphics state stack and a dictionary stack.
The Forth language uses two stacks, one for argument passing and one for subroutine return addresses. The use of a return stack is extremely commonplace, but the somewhat unusual use of an argument stack for a human-readable programming language is the reason Forth is referred to as a stack-based language.
Almost all computer environments use a stack to hold information about procedure/function nesting.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917127681.84/warc/CC-MAIN-20170423031207-00466-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 2,288
| 12
|
http://wstudios.home.xs4all.nl/WSendString/WSendString.html
|
code
|
Syntax: WSendString [["]/cClassName["]] [["]/nWindowName["]] [["]/sString["]] [/tTimeOut]
Places a string in the Windows system keyboard que. All parameters can be enclosed in double quotes, like in WSendString "/sHello World", to embed spaces. To pass a double quote itself, repeat it twice. If one or more of the optional /c or /n is specified, the window identified by window class and name will be brought to the front before sending the keys. Only top level windows will be searched and if no match is found the string will not be send.
/cClassName: Optional. Specifies the class name of the window to bring to the foreground before sending the keys. If you don't know the class name of a window you can leave it out.
/nWindowName: Optional. Specifies the window name (title) of the window to bring to the foreground before sending the keys.
/sString: Optional. String to send to system keyboard que. Inside the string ^, ! and & mean Control, Alt and Shift the next character. Double them to use the original characters like ^^ to send ^. ASCII control characters like ^m for enter and ^j for tab will work on Windows 95. By using the Alt (!)and Ctrl (^) characters in the string, you can let WSendString create more complex interactions.
/tTimeOut: Optional. Time in milliseconds to try and find the specified window. During the specified time WSendString will try to find the window once a second. Defaults to 10000.
Example: WSendString "/nDocument - WordPad" "/sWSendString typing in WordPad"'
will look for a top level window named "Document - WordPad" and if found bring it to the foreground and place the string "WSendString typing in WordPad" in the system keyboard que. If the window is not found a message box will inform you and the keys will not be send. If you specify no class name and no window name the keys will be sent right away, regardless of which window has the current keyboard focus.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376829542.89/warc/CC-MAIN-20181218164121-20181218190121-00203.warc.gz
|
CC-MAIN-2018-51
| 1,913
| 8
|
http://kevinalbrecht.blogspot.com/2013/06/
|
code
|
- Michel Thomas Mandarin Total (previously called Foundation) - For basic understanding of grammar and tones
- Pimsleur Mandarin - Pronunciation and basic conversations
- Tuttle's Learning Chinese Characters - Writing
- Assimil's Chinese With Ease, Volume 1 - To tie it all together
See my earlier post on Expert Language Learning Techniques for how to put this together into a plan for actually learning the language.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348517506.81/warc/CC-MAIN-20200606155701-20200606185701-00057.warc.gz
|
CC-MAIN-2020-24
| 418
| 5
|
https://research.cisco.com/devboot
|
code
|
The /dev/boot action learning program is Cisco’s newest Open Innovation initiative focused on driving next-generation context, skills, and co-innovation across the industry.
Our groundbreaking formula is designed to incorporate architecture deep-dives, training, labs, and design sessions to bring thought leaders together, drive Open Innovation projects in the industry, and build the next generation of top developers and network architects.
Right now, the /dev/boot program is running an ODL-focused series. In future, we plan to extend this model to offer a variety of technologies and topic areas.
The program is currently in beta mode and participants are hand-selected for the ODL /dev/boot experience. If you’re interested in being a part of an upcoming event, let us know.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402131412.93/warc/CC-MAIN-20201001112433-20201001142433-00193.warc.gz
|
CC-MAIN-2020-40
| 785
| 4
|
https://developpaper.com/exploration-of-multi-tenant-in-jnpf-cloud-platform/
|
code
|
In the field of cloud, we often hear a word:multi-tenancy 。 This word has different meanings in different contexts. This paper will introduce the concept of multi tenant in cloud platform and the idea of multi tenant support.
What is a tenant
When you first get to know this concept, you must feel that the word “tenant” is strange. But if we change the word, I believe you will feel it immediately. This word is “customer” (here the customer refers to the customer above the business).
A tenant is a customer. For example, if the service we develop is for XXX enterprise, that enterprise is our customer / tenant; assuming that the service is internet-oriented, every Internet user using the service is a customer / tenant.
Why do we need multi tenant support
Developers work hard to develop a service. Is it done for individuals / businesses? Of course, it shouldn’t be just that. We developed a service. It is better to provide it to multiple individuals / enterprises at the same time. Moreover, it is better for these customers to share the same set of service runtime, which can greatly reduce the operation and maintenance cost of the service
- Assuming that services are executed separately, the cost of operation and maintenance is directly proportional to the number of customers (for example, the scenario of updating and deploying a large number of customers)
- Save resources (maximize the use of resources required for services: unified operation and maintenance team, hardware use)
In addition, it can also reduce the development cost of services
- We only need to consider how to implement the service logic of single user: the business logic is corresponding to the same customers, and the services provided by the program are the same no matter what customers use it. Furthermore, at the business level, when we develop this service, we don’t need to consider multi customer support in theory. We only use the business logic of the service to realize it
- Multi customer management functions can be unified: developers should not consider customer management functions, which should be provided by the cloud platform
Multi tenant scenario example
If the service we want to develop is a blog platform, this service is for Internet users, and every Internet user is our customer (a user is a tenant).
In an environment that does not support multi tenant, in order to isolate the data of each user, at least we will consider that most tables have a user when designing database tables_ ID field. Use this field for user isolation when used with crud data.
For example, today’s business is “publishing articles.”. We need to save the article data in the article table. In practice, we focus on two things:
- Crud: This is part of the business logic implementation
- User isolation: need to increase user_ id。 Do business connection
1 is the implementation of “pure” business logic. This must be achieved;
2 is for the multi-user blog platform and need to be considered, this is not the business logic of the blog platform itself.
If we can get the multi tenant support of the platform, we don’t need to consider the second point. This will focus on the first point of business logic implementation, which is a typical multi tenant scenario.
Multi tenant support
We can understand multi tenant support as follows:
- From the perspective of service provision. A service we developed can be provided to multiple customers at the same time. And the data / state between customers remains isolated
- From the perspective of service usage, you and I can use the same executed service as different customers at the same time. At this time, the business completed by using the service will not affect each other, just as we are using our own exclusive service
Then the service supports multiple “customers”, that is, the service supports multi tenant. The “service” here can be an application, a SaaS platform, or a PAAS platform. Just according to the cloud platform we are familiar with now, multi tenant support for applications should be the most conventional. This is because the application is oriented to users, and this group is very large.
Multi tenant support from an implementation perspective. “It is a software architecture technology”. The reason why we emphasize that it belongs to the architecture level is that to realize it, we must take it into account when we do the technical architecture.
A tenant model
At the beginning of this article, we mentioned using “customer” to replace “tenant” to understand the meaning of tenant. From the perspective of “business”, it is not difficult to find that tenants are actually part of the business model implementation in their cloud environment. Business models are diverse. This means that the division of tenants is also diverse. Here we describe one of the possible tenant stacks:
- Applications are provided to users. For applications, users are their tenants (this is more uniform in the industry)
- SaaS provides services for application developers. For SaaS, application developers are its tenants
- The services provided by PAAS are used by application system, for PAAS. The combination of related applications is its tenant
SaaS and PAAS are oriented to developers, systems and other non-end user roles. This part is usually decided by cloud platform developers (bundled business model). In particular, private / enterprise cloud platforms generally do not consider scenarios such as “supporting the execution of multiple SaaS platforms on PAAS platforms”. So a lot of the rest of the discussion follows around “application to multi tenant support.”.
Multi tenant application
Application multi tenant usage scenarios have been described earlier. In order to support the following cloud platforms, we need to support several cloud platforms:
- Tenant management: crud, statistics
- Tenant isolated / shared services: queue, cache, database, etc
- Statistics of tenant isolation: log, quota
These support can be divided into two categories:
- Tenant management: it will not directly face the end users of the application. It is oriented to the operation and maintenance of applications. The platform should provide detailed implementation
- Isolation of tenant data / state: from the beginning of the request, it should be able to distinguish which tenant the request comes from. When processing the request, the tenant context should also be brought on the call link. Data access is segregated by tenant. The service provided by the platform is also isolated by the tenant
The first point is to compare the easy implementation. This is a problem of business model, which can abstract tenant model according to business domain. For example, enterprise application usually distinguishes tenants according to “organization”;
The second point is a pure technology requirement. It is necessary to support isolation by “tenant” in the platform technology implementation. What we emphasize is isolation. Because the goal we want to achieve in the implementation is isolation. It is only by tenant here (tenant is just a business concept, and we’d better abstract it at the technical level). Minimize the impact of business model diversification on technical architecture). We can map tenants to an abstract concept that can implement our isolation requirements.
The previous discussion on multi tenant support is from top to bottom: from application multi tenant requirements to data isolation implementation; now we can change our perspective from bottom to top: first isolate data through the namespace, and then provide the namespace to the implementation of application multi tenant. The bottom-up goal is mainly within the platform. We can abstract data / state isolation through “namespace”. Finally, the ideal scenario is that the namespace can not only support application multi tenant implementations, but also selectively expose the namespace APIs. Allow applications to isolate certain data (such as caching). Convenient for business implementation.
Implementation of isolation
From the beginning to the end of a tenant request, the platform needs to know the namespace of the request mapping. From the request processing stack, we can roughly divide it as follows:
- Load equalizer (LB)
- Application container (APP)
- Platform service interface (RPC)
- Platform service implementation (dB / cache / MQ…)
In this stack, each platform needs to know the corresponding namespace of the request. The platform can provide a unified login service to map the tenant information into a namespace and save it to the user session. In this way, every time the user requests:
- When passing through lb, the namespace can be distinguished
- In the app container, the
- Passing a namespace when RPC
- Implement the namespace according to different services (for example, DB uses different schema based on the namespace, MQ uses different queues according to the namespace)
Here we use the basic idea of isolation implementation is “shared application”, that is, multi tenant sharing an application, corresponding to a set of infrastructure.
A platform design
Having talked so much, we can now come up with a cloud platform that supports multi tenant applications
(the design ideas here also include scenarios where some tenants require exclusive resources.)
- The concept of tenants and customers is similar
- For multi tenant support, we generally refer to the application support for multi tenant
- Data / state isolation is needed to support multi tenant technology
- Using the namespace for isolation to achieve abstraction
- Tenant to namespace mapping can be integrated by the platform
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038464045.54/warc/CC-MAIN-20210417192821-20210417222821-00185.warc.gz
|
CC-MAIN-2021-17
| 9,737
| 63
|
https://community.spiceworks.com/topic/2163493-watchguard-with-dynamic-wan
|
code
|
Is it possible to set the watchguard up so that it works with a dynamic WAN? I recently downgraded my comcast business internet from 5 static IPs to one dynamic one, and I would like to be able to use my watchguard still. I have an older XTM 330 series firewall.
What would I need to do in order to configure it that way? ( I will be putting the gateway in bridge mode so it acts as a straight passthrough, as I have a cisco router than I am going to put between the watchguard and the gateway/modem)Edited Sep 19, 2018 at 16:34 UTC
SI System Integration d.o.o. is an IT service provider.
As Bruce said.....
.......and don't forget to remove the secondary IP addresses you have on the external interface, when you don't have them anymore.
If I recall, at least around here, Comcast requires all business accounts to use their modems, therefore you shouldn't need anything other than the Watchguard. If, however, Comcast isn't supplying the modem, then you do need a modem, either way you will want the modem placed in 'bridge mode'.
Bill6324 yes, they require it here, too. Currently it's acting as my router and wifi, but I have a set of ubiquiti unifi access points I am going to be using in place of the wireless gateway. I am aware of the 'bridge' mode, I just recalled that being used so that the modem acts strictly as a modem (with no routing capabilities), and wasn't aware the watchhguard could handle the routing capabilities either, that's why I was going to put the cisco router in between. Good to know it doesn't need it.
brucebriggs yep, i have a standard docsis3 modem here from when I had residential internet through them, but I can't use it on my business line because it requires that I use one of their modems.
Thanks alot for the help guys. If I have trouble setting the watchguard up, I will let you all know!
As noted by others, get the cable modem into bridge mode if possible, but if you cannot bridge the cable modem, then let it do NAT with a DHCP reservation for the XTM 330's WAN interface, then put your XTM 330's WAN IP into the cable modem's DMZ.
I did that on my Verizon FiOS router and it works fine, even for inbound port forwarding and the SSLVPN.
greggmh123 Yeah, I can put it in bridge mode. Now that I have a dynamic and not a static. Also, in looking at the documentation for WatchGuard, it looks like no-ip.com is a listed provider for dynamic dns service through the software. I am not sure what version, however.
Do you have a Live Security subscription? If so, the latest firmware you can install is Fireware v12.1.3 Update 1. For newer Fireboxes, the latest is 12.2.1.
Unfortunately, I do not. I got the watchguard second hand from ebay and haven't paid for a subscription for it. I am not sure what firmware version I am currently using on it, but I do know that I have updated it at least once. I thought it was at version 12, but it's possible it's not.
Logging in to my watchguard account, version 12.1 is available to download, so I do believe that's the one that I downloaded and installed, but I won't know for sure until I get it hooked back up (this weekend as I am relocating my server hardware) what version I am on.
I have an older 330 firewall, not one of the newer ones.
The 330 was purchased because originally, I was going to have a home data center built for my webhosting and development company. I ended up co-locating all of my servers instead though, but still have the Cisco switch and firewall for my home use that I intend to use. I agree the 330 is older, and overkill for my home network, but since I have already purchased it, and really only need it for the firewall capabilities and the SSLVPN functionality out of the box, if possible I'd prefer to just continue using it. I don't think I can really justify purchasing a newer one for the limited use I have of it.
brucebriggs Are you sure? This knowledgebase article says that they aren't available in 12.1 and older versions.
If your only issue is dynamic DNS, you probably are already aware that most dynamic DNS providers have clients
you can install on a computer to keep the WAN IP updated.
Also, what do you mean by "That's crappy, as dyndns is one of the worst providers to use."? Is your objection just cost, or something else?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588284.71/warc/CC-MAIN-20211028100619-20211028130619-00152.warc.gz
|
CC-MAIN-2021-43
| 4,262
| 21
|
http://sourceforge.net/directory/os:wince/os:symbianos/license:apache2/
|
code
|
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
It is a platform independent 2D graphic library, which provide a easy way to render your 2D vector graphic data, such as SVG and SWF.
This is an application to research a Vélib' station with available bikes or free parks. Includes maps to display the results and history handling. Uses kXML for XML parsing and Google Maps Mobile for geocoding, itinerary and maps generation.
Please visit https://sourceforge.net/projects/openmobileplt/ if you are looking for the AOL Open Mobile Platform
This is an OpenSSL wrapper for Java for multiple platforms. The wrapper uses asynchronous OpenSSL interfaces, so it might be used in the style of JDK 1.5 SSL engine. The wrapper uses SSL engine of OpenSSL directly rather than just cryptogrphaphy.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398457799.57/warc/CC-MAIN-20151124205417-00311-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 866
| 10
|
https://thwack.solarwinds.com/thread/104377
|
code
|
This should be possible but you will need to write a custom SQL query alert.
So there are a couple layers to this, it is pretty easy to trigger on nodes that have no custom pollers assigned to them. So if you wanted to set something up like notify my whenever an APC UPS has no custom pollers on it then I would do it this way.
Go to a new alert and set it up like so:
You can get as fancy as you want with the criteria, for example wanting to make sure all your ASA Firewalls had some kind of custom pollers on them would be something like vendor like 'cisco' and machinetype like '%ASA%', or you could set up some kind of custom property if that would help
So like you said, not having any pollers is a good indicator that something is wrong. Unfortunately the way those tables come together if there is any poller assigned to it then this won't trigger and it gets a lot more complicated to try and do an audit of the pollers that are assigned to the devices to make sure they are all the correct ones. In that case I would probably be trying to make a report that just lists off all the pollers assigned to each node, grouped by machinetype and then by node and just look that over once in a while.
Hope that helps
Loop1 Systems: SolarWinds Training and Professional Services
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267163704.93/warc/CC-MAIN-20180926061824-20180926082224-00169.warc.gz
|
CC-MAIN-2018-39
| 1,279
| 7
|
http://forum.arduino.cc/index.php?action=profile;u=147658;sa=showPosts
|
code
|
Im having a similar situation with a custom board that has an atmega2560. the ISP port is connected to a USB-SPI chip to talk to a PC without the need of drivers (like for the FTDI) im trying to program the bootloader but this error appears:
avrdude: stk500v2_command(): command failed avrdude: stk500v2_program_enable(): bad AVRISPmkII connection status: MOSI fail, SCK fail avrdude: initialization failed, rc=-1 Double check connections and try again, or use -F to override this check.
Im using the avrisp mkii and the custom board has all the caps and osc stuff in place. could it be that this chip is interfering? thanks
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657123284.86/warc/CC-MAIN-20140914011203-00082-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
CC-MAIN-2014-41
| 624
| 3
|
https://papers.nips.cc/paper_files/paper/2017/file/5b970a1d9be0fd100063fd6cd688b73e-Reviews.html
|
code
|
Mon Dec 4th through Sat the 9th, 2017 at Long Beach Convention Center
The authors propose a method called Cross-Spectral Factor Analysis that decomposes obserfved local field potentials (LFPs) into interacting functional connectomes, called Electomes defined by differing spatiotemporal properties. They then use Gaussian process theory to model interactions between these coherence patterns in a way that may reveal dynamic interaction of the different regions of the brain at mesoscale.
This approach is interesting in that it provides a way to rigorously model differing regions LFPs at a scale not readily accessible by certain other modalities such as fMRI or EEG.
The presentation is generally clear and the overall approach is well motivated with good premise. The approach is fairly standard from a modeling and learning perspective, although the authors have good insight into applicability of these techniques to simulataneous LFP analysis.
The authors do no offer any real interpretation of the results of the method, and perhaps this is natural given that no effective ground truth is known. At a minimum it would seem that more detail could be given on the stability or robustness of the derived Electomes and this should be expanded particularly for publication.
The paper considers the problem of performing dimensionality reduction for Local Field Potential (LFP) signals that are often used in the field of neuroscience. The authors propose a factor analysis approach (CSFA), where the latent variables are stationary Gaussian Processes that are able to capture correlations between different channels.
The parameters of the factor analysis (i.e. factor scores s_w, for w=1...W) can then be optimised along with the kernel parameters \Theta, by maximising the marginal likelihood. For that purpose the authors employ a resilient backpropagation approach. A discriminative approach is also presented (dCSFA), where the goal is to optimise a heuristic that relies on both the GP marginal likelihood and the loss function for the classification.
Although I feel that the findings of the paper could be valuable for the field of neuroscience, I think that some claims regarding the underlying theory are not sufficiently supported. Most importantly, it is not clear why the maximisation of the likelihood in Equation (6) would not be prone to overfitting. It is claimed that "the low-rank structures on the coregionalization matrices dramatically ameliorate overfitting", but it is not clear how this low rank is imposed.
The naming of the variables in the equations is not very consistent, and that could create confusion.
Equation (2): \tau is not introduced
line 124: C is not introduced (the number of channels, I presume)
y_w is presented as a function of either x or t (since we have time-series, having t everywhere would make sense)
The authors propose a factor analysis method called CSFA for modelling LFP data, which is a generative model with the specific assumption that factors, called Elecotomes, are sampled from Gaussian processes with cross-spectral mixture kernel. The generative model is straightforward use of CSM, and the estimation is apparently also a known form (resilient back prop; I never heard of it before). I do like the dCSFA formulation. The proposed method focuses on spectral power and phase relationship across regions, and is claimed to bring both better interpretability and higher predictive power. They also extend CSFA to be discriminative to side information such as genetic and behavioral data by incorporating logistic loss (or the likes of it). The authors applied the proposed method to synthetic and real mouse data, and compared it with PCA.
== issues ==
=== Page limit ===
This paper is 10 pages. (references start at page 8 and goes to page 10)
=== Section 2.1 ===
The authors claim that reduced dimensionality increases the power of hypothesis testing. In general, this is not true. Any dimensionality-reduction decision is made implicitly upon a hypothesis of dimensionality. The hypothesis testing performed after reduction is conditional on it, making the problem more subtle than presented.
=== Section 2.5 ===
lambda in Eq(7) is chosen based on cross-validation of the predictive accuracy. Why was it not chosen by cross-validation of the objective function itself? The authors should report its value along the accuracy in the result section. Would it be extremely large to make the first likelihood term ineffective?
=== FA or PCA ===
Eq 3 shows that the noise is constant across the diagonal. The main difference between FA and PCA is allowing each dimension of signal to have different amount of noise. This noise formulation is closer to PCA, isn't it? But then I was confused reading sec 3.2. What's the covariance matrix of interest in sec 3.2? Over time? space? factors? frequencies?
=== "Causal" ===
The word 'causal' frequently appears in the first 2 pages of the text, setting high expectations. However, the method itself does not seem to have any explanatory power to discover causal structure or inherent causal hypothesis. Or is the reader supposed to get it from the phase plots?
=== comparison with baseline PCA in frequency domain ===
How was the window of data converted to the "Fourier domain"? Was it simply a DFT or was a more sophisticated spectrum estimator used, e.g., multi-taper methods. I ask this because raw FFT/DFT is a bad estimator for the spectrum (very high variance regardless of the length of time window). Neuroscientists often use packages that support such estimation (e.g., MATLAB package chronux). It would not be fair if those are not taken into account.
=== averaging over 6 mice ===
Was the CSFA/dCSFA for Fig 3 computed to produce common factor across 6 mice? What justifies such approach?
== minor ==
- L 230, 231: absolute KL div numbers are not useful. At least provide standard error of the estimator. (KL div is often very hard to estimate!!)
- Subsection 2.1 & 2.3.1 reads like filler texts. (not much content)
- L 124: $s\tilde B_q$? what's $s$ here?
- L 228: to to
- overall writing can be improved
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510238.65/warc/CC-MAIN-20230927003313-20230927033313-00778.warc.gz
|
CC-MAIN-2023-40
| 6,121
| 34
|
https://discuss.streamlit.io/t/weird-behaviour-when-trying-to-retain-selection-in-select-box/26491
|
code
|
I am developing a multi-page app and my goal is to retain various user options when going back and forth between pages. Let me give an example from a selectbox (the same thing happens when using radio buttons)
values = ['val_1', 'val_2'] if 'example_index' not in st.session_state: st.session_state.example_index = 0 st.session_state.example_index = st.selectbox( 'Select one value: ', range(len(values)), format_func=lambda x: values[x], index=st.session_state.example_index, )
When I try to select the second option the page quickly refreshes (expected behavior) but the selected item is still the same. Only when I try for a second time, the selection actually works. The same thing happens every time I try to jump between the two options.
I would really appreciate it if someone can explain what really happens in this example.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104576719.83/warc/CC-MAIN-20220705113756-20220705143756-00786.warc.gz
|
CC-MAIN-2022-27
| 832
| 4
|
https://www.silverstripe.org/community/forums/general-questions/show/14806
|
code
|
Skip to main content
This site requires you to update your browser. Your browsing experience maybe affected by not having the most up to date version.
SS 2.4x can prototype be replace fully with jquery yet?
and if so how?
I would like to only load and use jquery js files, but see that prototype is still being loaded. Does the base SS 2.4x still include prototype, or am I seeing things being included by mods?
2.4 still uses prototype for the CMS and form validation. A large part has been rewritten into jQuery but that is currently unstable and won't be released until SS 3.0.
For front end form fields I usually turn off the built in validation and use some other kind - often jQuery.validate.
Have a look at this tutorial for an explantation of how to do it http://ssbits.com/tutorials/2009/using-jquery-for-form-validation/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806569.66/warc/CC-MAIN-20171122103526-20171122123526-00303.warc.gz
|
CC-MAIN-2017-47
| 830
| 8
|
https://community.fly.io/t/flyctl-ping/3938/4
|
code
|
I know you’ve all been waiting for this and finally it’s arrived.
master branch on
flyctl, for those of you building your own, you can now
flyctl ping your instances, or your gateway. This’ll land in a release probably sometime in the next couple days.
flyctl ping -o orgname gateway will ping the upstream WireGuard gateway for a particular organization (making a WireGuard peer if none exists — this is now pretty fast). This is probably a better test of gateway connectivity than the DNS check we were doing previously.
flyctl ping -o orgname app.internal will ping all the running instances for
app. If you have a lot of instances for an app, you may trip a (harmless) rate limit on our gateways, or maybe an ICMP bug in the netstack code we’re using in
You can also
flyctl ping -o orgname top1.nearest.of.app.internal to just ping the closest host, or
flyctl ping -o orgname nrt.app.internal to only ping your instances in the
nrt region (the target argument to ping is just a hostname in our DNS).
It was a galactic PITA to get this working as much as it is now (wireguard-go’s netstack bindings didn’t have ICMP support, and netstack’s ICMP support is… weird) but I know how much you all love pinging things.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949701.56/warc/CC-MAIN-20230401063607-20230401093607-00124.warc.gz
|
CC-MAIN-2023-14
| 1,233
| 12
|
https://www.oldergeeks.com/downloads/file.php?id=1166
|
code
|
Your download link is at the very bottom of the page... always.
Processed through Paypal
No account required.
Donate Bitcoin to this wallet:
Donate Ethereum to this wallet:
Donate Litecoin to this wallet:
|File - Download Bulk Crap Uninstaller v5.0|
Always scroll to the bottom of the page for the download link.
We don't believe in fake/misleading download buttons and tricks. The link is always in the same place.
Bulk Crap Uninstaller v5.0
Bulk Crap Uninstaller (in short BCUninstaller or BCU) is a free (as in speech and beer) bulk program uninstaller with advanced automation. It excels at removing large amounts of applications with minimal to no user input, while requiring next to no technical knowledge.
It can detect most applications and games (even portable or not registered), clean up leftovers, force uninstall, automatically uninstall according to premade lists, and much more.
In its basic form BCU is easy to use by most users, but it also has tools useful for power users, system admins and developers. Some of the most notable features of Bulk Crap Uninstaller:
Very thorough installed application detection
BCUninstaller can detect, manage and uninstall applications from the following sources:
Normal registered applications (same as Programs and Features and many other uninstallers)
Hidden/protected registered applications
Applications with damaged or missing uninstallers
Portable applications (looks in common locations and on portible drives, configurable)
Windows Store apps (Universal Windows Platform apps)
Windows Updates Applications from all of these sources are threated the same - you can filter, export and automatically uninstall them in the same way.
Fast, automatic uninstall
The main feature of BCUninstaller is its ability to fully or nearly fully automate the process of uninstalling multiple applications. BCU always attempts to use the applicationís original uninstaller to avoid issues found in uninstall managers that blindly remove files to achieve uninstall automation (e.g. failing to unregister context menu entries or services).
Uninstall any number of applications in a single batch
Minimal to no user input is required during uninstallation
Uninstall multiple items at once to speed up the process (with collision prevention)
Console interface can automatically uninstall applications based on conditions with no user input
Quietly uninstall many uninstallers that donít support silent uninstallation
Uninstall applications even if they donít have any uninstallers
Uninstall applications by window, shortcut or directory
Can handle crashing and hanging uninstallers
While detection and uninstallation are the two main features of BCU that receive the most focus, it also has many useful tools built on top of that framework.
Find and remove leftovers after uninstallation
Clean Program Files directories from unused or empty folders
Manually uninstall any application, bypasing itís uninstaller (Force uninstall)
Huge amount of data about applications is collected and displayed. User can freely browse, filter and export everything
Filtering with common presets or based on fully custom rules with Regex support
Verification of uninstaller certificates
Large amount of configurability
Can run user-specified commands before and after uninstalling
Can run on .Net 4.0 or newer, or, if not available, on .Net 3.5 with reduced functionality (will work on Windows 7 or newer with no updates installed)
Fully portable, settings are saved to a single file
BCU is translated to Arabic, Czech, Dutch, English, French, German, Hungarian, Italian, Polish, Portuguese (Brazil and Portugal), Russian, Slovenian and Spanish at the moment.
The system requirements are fairly lax since BCU was designed to work on any PC it is thrown at. If it boots, the chances are BCU will manage to run on it.
OS: Windows Vista or newer is recommended. BCU will also work on XP and 2003 with reduced functionality and possibly some bugs. Both 32bit and 64bit versions are supported.
.NET: Recommended .NET 4.0 or newer, can run on only .NET 3.5 with reduced functionality.
RAM: Around 300MB or more of free RAM.
CPU: Doesnít really matter.
Free space: 50MB or more.
HDD: Anything will work, but slower drives can make scan times quite a bit longer.
Licensing and commercial use
Bulk Crap Uninstaller is licensed under Apache 2.0 open source license, and can be used in both private and commercial settings for free and with no obligations, as long as no conditions of the license are broken.
Bulk Crap Uninstaller v5.0
Starting with this release, BCU will need Windows 7 or newer to run (if you get an error on startup in 7 / 2018R2 then try running Windows Update). If you want to use BCUninstaller on Vista or older, download the latest available 4.x release. This is because BCUninstaller is now fully in .NET 5.
The move was long overdue and finally got forced by GitHub switching to a new SSL encryption standard that is not supported by .NET 3.5, making it impossible to check for updates.
Because of being in .NET 5, BCUninstaller no longer is restricted to using only old and outdated libraries and APIs (it was stuck on .NET 3.5 before for backwards compatibility). This introduces some major improvements but also some drawbacks, most notably:
Since it's a very new framework it's not installed on many systems, but thankfully it's now possible to compile the application as "stand-alone", which means it includes everything needed to run, even if your system doesn't have .NET installed at all (no more prompts to install .NET Framework).
This stand-alone compilation is why the file size increased drastically - a good chunk of the framework is now bundled with BCU.
Thanks to the stand-alone compilation and the new runtime BCU now starts and runs faster (might be hard to notice without a fast SSD).
The stand-alone compilation forced me to include separate x64 and x86 builds. This can be fixed in the future by having only a x86 build, but a lot of code handling registy will have to be updated for that to work properly. Only the correct build for your system will be installed.
The portable version will have both builds and a launcher that will automatically start the correct version of BCU. You can remove the x86 build if you only service x64 systems and vice-versa to save some space.
Converted to .NET 5, set up a new build pipeline
Added "Put PC to sleep when done" checkbox to the uninstallation progress window
Added "Tools > Create restore point" menu item
Added experimental DPI-aware mode (turn on in Settings > Misc, expect interface to look weird in some places) #226
Added option to never show post-update news popup (new check box in the said window)
Added switch to directly open Startup Manger #284
Changed file structure to make the root BCUninstaller directory cleaner
Changed system restore into a setting, if enabled then automatically run at start of uninstall #265
Cleaned up localized resources from unnecessary data
Clear caches after updating to a new version
Improved scoop output parsing to be more resilient #252
Fixed BCU shortcuts being detected as junk #262
Fixed checking for updates not working
Fixed GetChildProcesses not working on some systems
Fixed ManagementObjectSearcher exception if installed .NET is an ancient version
Fixed first start wizard being shown on top of additional settings window
Fixed marking config as corrupted too aggressively
Fixed normalizing filesystem paths improperly
Fixed not resetting config properly
Fixed some settings not using the right provider or not being roaming (settings got lost when updating)
Fixed sorting by size showing groups in wrong order #281
Fixed window title typo #269
Removed donate button from the status bar
Show open/save .bcul text in advanced filters toolbar
Updated manual with a better explanation of .bcul files #273
Updated uninstallation manual #211
Include all necessary projects in this repository, can now compile BCU easily from VS 2019
Use a new automation library
Use 7-Zip 32bit or 7-Zip 64bit to unzip this file.
This download is for the portable version. If you need the installable version, download here.
Click here to visit the author's website.
Continue below to download this file.
|4,207||14,840||Klocman Software <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/BCUninstallerorig_th.png"border="0">||May 13, 2021 - 11:17||5.0||109.17MB||7Z||, out of 36 Votes.|
|Bulk Crap Uninstaller v5.0|
→→ Download Now ←← - Click to Rate File -
Like this download? Share it on Twitter → Tweet
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487629209.28/warc/CC-MAIN-20210617041347-20210617071347-00455.warc.gz
|
CC-MAIN-2021-25
| 8,570
| 97
|
https://docs.eprocessify.com/checklist-operations/add-comments-to-task-in-checklist
|
code
|
Add Comments to Task in Checklist
While working on a task there are many things that you need to communicate or give any feedback. eProcessify enables you to add Comments on the very page itself.
On the dashboard, select the template for which you want to open the checklist.
On the checklist page, search the company name for which the task status has to be updated.
On the next page, select the task. A Task can be like Collecting all financial documents, Sales entries, Purchase entries, etc.
Go to the task, scroll down to add comments.
While adding a comment press @ for the team member's name to pop up automatically.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944452.97/warc/CC-MAIN-20230322211955-20230323001955-00082.warc.gz
|
CC-MAIN-2023-14
| 623
| 7
|
http://www.krisattfield.com/2018/05/someone-is-having-bad-day.html
|
code
|
So: this blog post kind of more actual news rather than just me talking about my life.
Personally, my day hasn't been so bad ---- but I went on a car ride today and saw two things out of the ordinary happen.
As I and my Dad were driving along, we just saw a guy fall off his bicycle. This experience is unique enough ----
but when we got to our destination, the shop we were going to:::: there were police cars and a SWAT team hanging out outside the store.
As my Dad and I walked into the store, the person who greeted us told us the situation had already been involved.
So::: according to The Law of Attraction, if your day starts bad, it just keeps going on bad.
My Day hasn't been so bad, I've been having a pretty good day,
but I saw two things go wrong in the local community today, and these two things are completely out of the ordinary occurrences.
My Dad and I bought what we wanted, left the store: and the SWAT team was already gone.
Last night I sent an email to my friends and family about how strange something about my experience in the LDS Church was.
Maybe I'll talk about it on my blog some time, but I don't really feel like it right now.
but yeah, I guess someone is having a bad day. Two seemingly unconnected disasters at about the same time in the same city. So strange.
Oh ---- and no, we did not stop to "help" the guy who fell off his bike --- we didn't feel any great need to, nor did we want to block traffic on the one-way lane.
Just other people having bad experiences I guess. I'm just wondering if there's any spiritual or metaphysical explanation for any of this. I don't know.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668334.27/warc/CC-MAIN-20191114081021-20191114105021-00079.warc.gz
|
CC-MAIN-2019-47
| 1,611
| 14
|
https://www.sanopell.com/best-open-source-email-server-for-windows/
|
code
|
Best open source email server for windows
Are you searching for a perfect open-source email server software but don’t know where to begin? Perhaps you’re a business owner, and you have little technical know-how of comparing open-source software?
Take a deep breath. You’ve landed in the right blog post. We’ve made things a tad easier for you by compiling a list of open-source email servers. Why? Because we know that choosing a perfect open-source email server solution can be daunting. More so, if you’re not sure where to begin searching.
On each solution, we go through its features and tell you how your business can benefit from using it. This way, you don’t have to scour the internet reading each article on an email server that we’ve reviewed.
We’ll kickstart this topic by answering this crucial question:
Why does using an open-source email server matter?
Using an open-source email server offers many benefits to businesses. The essential advantage is, you will be using a free email server platform. But also, you will receive numerous emails, filter spam emails, and block many unwanted emails. For instance, email servers like Gmail and Yahoo have functionality that users can use to block spammers. You can also link them up with your calendar, video conferencing, and other tools when it comes to integrations.
email menu on monitor screen
In comparison, when you use a proprietary email server, you have to pay for almost everything. On top of this, you get a limit on the number of emails that you can send. For instance, with the GoDaddy plan, you can send only between 80 and 300 emails, depending on the plan that you choose. Paying for your email comes with another challenge too. For starters, sometimes your emails won’t be 100% secure. And maybe certain functionalities that your emails won’t have.
Advantages of using open-source email servers
There are many advantages of using open-source email server software. Here are the main ones we think you should know:
- You can have an unlimited number of email accounts. When you use an open-source email server, you can create as many aliases as you want and send thousands of emails.
- You don’t pay any subscription fees. If you want to add 100 users, you can do so without being charged per user. This way, you will save money and grow your business quickly.
- You get 100% control over your inboxes. You can set limits, policies and decide on the number of users you want to add.
- You will enjoy security. More open-source email servers are more secure than proprietary software servers. They allow you to beef up security by integrating with other tools.
- You get excellent customer service- Some open-source email servers offer the best support than closed source servers. They also give feedback on every email. For instance, you know if customers delete, open, or ignore your emails.
Which components should you consider?
If you choose an open-source email server, take a moment to evaluate things. Use the below questions to review each email server thoroughly.
- Does the email server have a Mail Transfer Agent (MTA)? The MTA is what enables a server to send Emails from different users.
- Does it come with a Mail Delivery Agent feature? This functionality sends emails to your inbox.
- Does it come with IMAP and POP3 Server? These two features come in handy when you hand the mail clients’ software.
- Does it have a spam filter feature? It is what you will use to block incoming spam.
- Does it have Antivirus? This feature analyzes and protects you against viruses and Trojans.
What is open-source email server software?
Open-source email servers software is any solution that individuals and businesses use to handle incoming and outgoing emails. We say they are open-source because you don’t have to pay for them, and they are available to anyone to use them.
Example: Think of an email server as a virtual post office, or a place where people collect or send mail. Major differences between email servers and post offices:
- At traditional post offices, it takes days, sometimes even before you receive your mail.
- In contrast, open-source email servers allow you to get mail immediately.
Examples of open-source email servers that most people use include Outlook, Gmail, and ProtonMail. Some open-source email server solutions that you should consider:
iRedMail is one of the open-source email servers that any small business owner should consider. Installing it is easy, but it can be a lot quicker if you hire a professional to configure it for you. Just make sure that you go through iRedMail policies before deploying it.
We recommend it because it comes with a myriad of features. Plus, it is also free. iRedMail is secure, which means no hacker can infiltrate your emails. You will get bug fixes and updates from Linux without paying anything. It is a perfect email server any startup entrepreneur can use to grow a business.
When you use iRedMail, you will get the following features:
- All your emails will be secure - You and your team members will access iRedMail only through secure connections. iRedMail encrypts your mail with POP3/IMAP/SMTP over TLS and stores your passwords in SSHA512 or BCRYPT (BSD) format.
- You can sync all your contacts and calendar with iRedMail. Whether you manage your tasks on your computer, tablet, mobile phone, iRedMail lets you do it.
- You get more than one account—no need to pay for mailboxes. iRedMail allows you to create as many mailboxes as you want.
- Everything works on Ubuntu, Red Hat Enterprise Linux, CentOS, Debian, Ubuntu, FreeBSD, and OpenBSD.
- iRedMail’s backend is impressive: You’ll get MySQL, MariaDB, and PostgreSQL.
- You and your team will get antispam and Antivirus.
- iRedMail is compatible with many domains and mailing lists.
- You have an option to choose a pro edition and enjoy more admin panel features.
- iRedMail runs on Debian, Ubuntu, CentOS, Fedora, Red Hat Linux, FreeBSD, and OpenBSD.
- It has a third-party integration feature.
Ask any developer where they store codes, most of them will mentionGitHub open source. We recommend it for its transparency and ease of use. You can use GitHub to pull requests and merge features for your email applications. GitHub also offers an excellent platform for anyone to review features. Or to collaborate with developers and make suggestions on the project. You can organize files in a way that can be easy to access.
Github’s interface is intuitive that won’t take long to figure out. Plus, tons of FAQs can guide you on how to use it.
Example: James owns Email Now, a SaaS that offers an emailing solution to independent schools. PayNow’s developer uses GitHub as a code hosting platform. The support team uses Email Now to raise bug issues, then developers get a notification and resolve them at once. Apart from that, Email Now’s dev team uses Github to do code health reviews.
Github comes with the following features:
- Github allows you to automate development workflows.
- You can use GitHub to build, test, and deploy your codes faster than your competitors.
- You also get software packages that enable you to do private and public hosting.
- You will get a flexible API that allows you to link up with other solutions.
- Github allows you to create and publish on any website.
- You can also use GitHub’s Marketplace to build, improve and speed up workflows.
- You get Webhooks API to integrate with Zapier.
- Github allows you to use Linux, Windows, and macOS tools to boost your workflows.
- You get 100% control over projects by using labels and groups.
- Github allows you to increase security across multiple repositories.
- Review your codes anytime, and make improvements anytime.
3. James Apache
Another open-source email server you should consider isApache James. Some people call it Java Apache Mail Enterprise Server, and others call it James. It doesn’t matter what you name it, and the fact is it is an open-source (SMTP and POP3 mail transfer tool) free server written in Java. Various contributors of the Apache Software Foundation maintain it. Some of the first contributors of the James Apache include Serge Knystautas, who is responsible for adding a preview version 3.0-M2, which now requires Java 1.5 or later.
Anyone can write mail-handling code and update the database. James Apache also allows you to filter spam, archive your messages, and develop your way of classifying them. You will love most about Apache James because it will enable you to create pure Java libraries.
Apache James comes with the following features:
- Apache James has an SMTP feature that allows it to send email faster.
- It has an IMAP4 Protocol that retrieves email messages pronto. You can also use this functionality to download and manage messages.
- The Apache James has a straightforward implementation, which means you will get your Email in a few days.
- Apache James is compatible with the METADATA extension (RFC-5464).
- The Apache James has a POP3 protocol feature, which means you will send messages faster.
hMailServer is another open-source email-server software anyone can use, from states to companies, nonprofits, and more. We recommend it because it works well with any email protocol like POP3, SMTP, etc. What’s more, hMailServer is compatible with webmail solutions. It has a user-friendly dashboard and tons of features that will make sending and receiving emails pretty easy. Plus, it has a robust spam protection functionality and virus scanner feature. You can use hMailserver as a forwarding email server for internal notifications.
hMailServer has the following features:
- hMailServer has unique Antispam features, which means you’ll be able to manage your spam mail.
- It supports IMAP and SMTP.
- hMailServer is compatible with RoundCube and SquirrelMail.
- It has a feature that allows you to collaborate on projects.
- You can sync it with webmail.
- You can use hMailServer to create a database for your business.
- It comes with file-sharing functionality.
- It allows you to block notifications.
- You can have a group Live Chat.
- You can use it to protect your password.
- You get free presentation tools.
- It has a one-click join feature.
- hMailServer comes with a screen recording feature.
- It allows you to switch presenters.
You should consider a Mail-in-a-Box email server, especially if you want to host your own email. Interestingly, this open-source email server works more like a typical Gmail account, and the only difference is that you get more control over your account than on your Gmail. Plus, you don’t have to be a technocrat to set it up.
Your mailbox comes with features like automated backup, mail filter rules, spam protection, email client auto-configuration, and more. You can also use a DNS configuration and make it your name server. All your incoming and outgoing messages go through TLSv1.2 encryption. You can also use Mail-in-a-Box to host mail for multiple users and different domain names.
Mail-in-a-Box comes with the following features:
- You can add multiple accounts.
- It allows you to use a control panel feature to monitor and add aliases.
- Mail-in-a-Box has an intuitive dashboard.
- It has a spam filtering feature.
- It has a flexible API that allows you to integrate with other applications.
6. Docker mailserver
If you want to improve your customer services, thenDocker mailserver is the best mail-server for you. Business owners can use it to enhance client-business relationships. Docker mailserver comes with programs and protocols that make exchanging emails easy and fast, and you’ll get access to tons of features.
Docker-mailserver offers business owners the server-side so that they get 100% control over emails. Meanwhile, clients can use a terminal via text-based software like Mozilla, Microsoft Outlook, etc. You can use Docker mailserver to forward, deliver, store and accept messages. Meanwhile, a specific piece of software will handle multiple tasks, to make it easy for you to do more than just sending and receiving emails.
Docker-mailserver has the following features:
- It has a Mail User Agent feature that allows it to fetch emails from a mail server.
- Docker-mailserver accepts Emails, then forward them to specific recipients.
- It has POP3, IMAP, SMTP functionalities.
- It comes with an intuitive webmail interface.
- It has TLS encryption.
- You’ll get a server-side mail filtering feature.
- You can create, remove accounts, domains, and aliases.
Another open-source email server you should consider is Mailu. While it is a simple tool, it comes with features that you can explore. It is a free solution, which means you can modify and configure without paying. We recommend Mailu for its easy-to-set-up; it only takes three to five commands to get you going. If you are stuck, there are tons of FAQs, videos, and text that can help you.
Mailu boosts the following features:
- Mailu has a standard email server that offers IMAP and IMAP+, SMTP, and Submission functionalities.
- You can create aliases, domain aliases, and custom routing.
- It has a versatile administration interface that can handle multiple webmails.
- Users get auto-reply, auto-forward, and fetched accounts features.
- As an admin, you make announcements, send quotas, and delegate tasks.
- Mailu has a TLS encryption feature. So all your messages will be secure.
Given business owners’ challenges, you should always strive to minimize them instead of adding them up. Hence, you should get the right open source email server for your business. There are many open-source email servers, but it can be daunting to evaluate each. You will need to dedicate hours in order to do that, which most entrepreneurs don’t have.
An open-source email server like iRedMail is a good start. You can use it to send and receive emails without worrying that someone may hack your mailbox. But then, for a solution like iRedMail to work smoothly, there are certain things that you should get right.
- You need to make sure that you work with reputable IT specialists.
- You need to configure it right.
- You need to hire an IT specialist to test the functionalities regularly.
- You need to know which features to use to grow your business.
- Fix bugs.
With hMailServer, you can also do more as well. You can send out emails, filter your spam mail, share and collaborate on your documents, and manage your day-to-day calendar. But you only enjoy all those benefits once you configure it right.
If you are still not sure which email-source email server to go for, reach out to us today. Our IT team is on standby to ensure that you get the best IT service. The sooner you do, the better for your business.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500215.91/warc/CC-MAIN-20230205032040-20230205062040-00146.warc.gz
|
CC-MAIN-2023-06
| 14,761
| 118
|
http://superuser.com/questions/tagged/hardware-acceleration+lenovo
|
code
|
Meta Super User
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
graphic cards for PCMCIA slots
I have a "lenovo 3000 c200" notebook. I want to use a graphic card accelerator. I wonder if exists a PC Card (PCMCIA) graphic accelerator like NVidia GeForce or ATI Radeon. Thanks
Jan 25 '11 at 16:13
newest hardware-acceleration lenovo questions feed
Hot Network Questions
Can I drive a ground rod near a gas meter?
Get lat/lon in degrees using PostGIS
How to number the letters of a sentence?
Should a progressbar go both ways?
What happened to Cornelius Fudge after he resigned from his post of Minister for Magic?
Source that those without a genuine need soliciting charity is a good thing
Replacing lines containing a pattern with sed
Crop jpeg into circular tikz node
"Same" DNA vs genes
Rearrange pixels in image so it can't be recognized and then get it back
Why do some companies not give minor benefits to employees?
How do I access certain directories from the finder?
Was the American Civil War the “bloodiest civil war in history”?
vim: hide first n letters of all lines in a file
When shorting a stock, do you pay current market price or the best (lowest) available ask price?
Is “since-folded (TV network)” an accustomed English word?
Examples of "Non-Logical Theorems" Proven by Logic
How to decide what kind of truss rod wrench to buy?
Is this kids experiment a legitimate way to show that air has mass?
Is this really a golden ratio spiral?
GOTO before local variable
Horizontal alignment of equation and text
Why are there holes in my exported meshes?
What's wrong with this sed expression?
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Exchange
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510266894.52/warc/CC-MAIN-20140728011746-00127-ip-10-146-231-18.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 2,201
| 53
|
https://packagehub.suse.com/packages/ghc-pandoc-citeproc/
|
code
|
The pandoc-citeproc library supports automatic generation of citations and a
bibliography in pandoc documents using the Citation Style Language (CSL) macro
language. More details on CSL can be found at <http://citationstyles.org/>.
In addition to a library, the package includes an executable, pandoc-citeproc,
which works as a pandoc filter and also has a mode for converting bibliographic
databases into CSL JSON and pandoc YAML metadata formats.
pandoc-citeproc originated as a fork of Andrea Rossato's citeproc-hs.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817382.50/warc/CC-MAIN-20240419074959-20240419104959-00676.warc.gz
|
CC-MAIN-2024-18
| 518
| 7
|
https://www.grangeprimaryschool.org/ht4-3/
|
code
|
Science and Movie Maker
As part of our Science work we have been investogating water resistance and air resistance. We conducted some investigations by making parachute sand streamlines objects to test in the water. We made movies of our experiments and addes a range of effects using I movie. Have a look at the video we made!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100056.38/warc/CC-MAIN-20231129041834-20231129071834-00677.warc.gz
|
CC-MAIN-2023-50
| 327
| 2
|
https://community.spiceworks.com/topic/122930-how-to-secure-a-wireless-network-that-has-hotspot
|
code
|
I work for a non-profit, so funds are limited. I setup a couple of HotSpots a couple of years ago, and found out that someone connecting to our hotspot could see our network servers. Here is how our network is setup:
We have 3 buildings on 45 acres. We have fiber running between the buildings. 2 of our switches are managed and have a 192.xxx.xxx.xxx IP addresses. We have 5 secure wireless routers and AP's. We also have 2 hotspot routers. I have connected a network cable to the internet port on the wireless routers and gave them a 192.xxx.xxx.xxx static IP address. I am using the DHCP on the wireless routers to pass out 10.xxx.xxx.xxx addresses. We have a PFSense firewall that has4 network cards, 1 card connects to our cable modem and another card is connected to our internal network; the other 2 cards are currently not being used.
It was explained to me that someone downstream, the 10.xxx.xxx.xxx addresses, can see upstream, 192.xxx.xxx.xxx. How can I prevent that from happening?
You can't really unless you setup a firewall on the APs or just behind them for 10.xxx.xxx.xxx traffic. But my first question would be is this a public WiFI or private, if not for general public use, why not start by encrypting it using WPA or WPA2?
If this wireless network is meant to be segmented from the rest and have nothing but say Internet access than you really need to place a router, between them and the wireless computers or use VLANS if your equipment supports it to keep the traffic segmented from each other. YOu could use to VLANS then allow traffic you want between the to networks to be handled by your fireall or router that both segments connect to.
We have 7 wireless routers and AP's on our network. 5 are secure, and for employees only. These use encryption as well as MAC filtering.
The 2 hotspots are for the general public, so they can connect to the internet. The one hotspot, (critical), must pass thru 2 managed routers which have a static IP address in the 192.xxx.xxx.xxx range.
The best option is to have your public AP uses a different WAN subnet than your private assets.
In an ideal world, you would have dedicated cabling to an un-used router port and configure that for the use of your guests, but that likely will not work due to the fibre links.
The next best option would be to use VLans, and have a router port and the public APs on a separate network (and possibly any public meeting spaces with physical jacks).
The other possibly simpler option for you is to add an IP from another subnet to your router's existing WAN interface, and have the public APs use IPs from that subnet.
You will not be able to prevent them from seeing the 192.x.x.x subnet with the current setup. +1 on having vlan's configured. I would have a router or virtual router for your 192.x.x.x net and another for your 10.x.x.x net and a firewall setup between the two that will prevent the to from talking to each other.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109670.98/warc/CC-MAIN-20170821211752-20170821231752-00178.warc.gz
|
CC-MAIN-2017-34
| 2,932
| 12
|
http://dnf.baseurl.org/2014/01/21/dnf-0-4-12-released/
|
code
|
We’re happy to announce another patchlevel release today, builds are available in Fedora 20 and Rawhide.
The main reason to release today were some negative reactions about the fastestmirror feature. While measuring pinging latency to different mirrors is a good idea in theory, fastestmirror in practice generally yields worse mirror picks then MirrorManager offers by default. Further, because even measuring the latency takes a couple of seconds, the results of the tests are cached (e.g.
/var/cache/dnf/x86_64/20/fastestmirror.cache). The cache is then used for 30 days and then the test is redone. For users who move between different networks (home, office) the cached value is often wrong, pointing to a lot slower mirror then actually available. We thus make fastestmirror configurable starting with 0.4.12, the default being off.
A serious bug was discovered in the erase command that can possibly cause unintended removal of important packages that DNF considers uneeded dependencies. The presented release fixes that.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189903.83/warc/CC-MAIN-20170322212949-00251-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 1,030
| 4
|
https://math.stackexchange.com/questions/995341/can-a-first-derivative-of-a-function-have-more-roots-than-the-original-function
|
code
|
This is a general question. Function is to be considered differentiable on some domain.
More specifically, I am given a function $f(x)$ which is twice differentiable and has three distinct real roots. Is the statement
$f '(x)$ has at most three real distinct roots
EDIT: I'm sorry, I meant to ask a question for only those functions that do have roots. For example, $f(x)$ has $n$ roots, can $f'(x)$ have more than $n$ roots (again function is to be considered differentiable and roots are real and all distinct).
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669809.82/warc/CC-MAIN-20191118154801-20191118182801-00467.warc.gz
|
CC-MAIN-2019-47
| 513
| 4
|
https://www.algebra.hr/certifikacijski-seminari/programi/oracle-database-12c-new-features-for-administrators-ed2/
|
code
|
In the Oracle Database 12c: New Features for Administrators Ed 2 course, you’ll learn about the new and enhanced features and options of Oracle Database 12c.
In the Oracle Database 12c: New Features for Administrators Ed 2 course, you’ll learn about the new and enhanced features and options of Oracle Database 12c. Expert instructors will teach you how these features and options increase security, manageability and performance. In this course, you will be introduced to Oracle Database Cloud Service.
Što ćete naučiti
- Manage the Oracle multitenant container databases and pluggable databases.
- Configure Heat Map and use Automatic Data Optimization.
- Benefit from Online Datafile Move.
- Understand the new Temporal capabilities as well as In-Database Archiving with Row-archival.
- Enforce security with the Unified Auditing, the new administrative privileges, Privilege Analysis, and Data Redaction.
- Increase SQL performance with the Database In-Memory option, and Full Database In-Memory Caching and the Automatic Big Table Caching features.
- Benefit from optimizer enhancements such as Adaptive Execution Plans and SQL Plan Directives, Real-Time ADDM and Compare Period ADDM.
- Use enhanced features of Resource Manager in multitenant container databases and pluggable databases.
- Understand how and when to use enhancements in Data Pump, partitioning, and SQL.
- Gain an understanding of the Oracle Database Cloud Service.
Kome je namijenjeno
- Database Administrator
- Systems Administrator
- Enterprise Manager and Other Tools
- Basics of Multitenant Container Database (CDB)
- Configuring and Creating CDB and PDBs
- Managing CDB and PDBs
- Managing Tablespaces, Common and Local Users, Privileges and Roles
- Managing Backup / Recovery / Flashback
- Online Datafile Move and Automatic Data Optimization
- In-Database Archiving
- Auditing Enhancements
- Privileges Enhancements
- Oracle Data Redaction
- General RMAN New Features and FDA Enhancements
- Monitoring DB Operations
- Real-Time ADDM and Compare Period Advisor
- ADR and Network Enhancements
- In-Memory Column Store
- In-Memory Caching
- SQL Tuning
- Resource Manager and Other Performance Enhancements
- Index and Table Enhancements
- Oracle Database Cloud Service: Overvie
Kako izgleda online edukacija?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570901.18/warc/CC-MAIN-20220809033952-20220809063952-00407.warc.gz
|
CC-MAIN-2022-33
| 2,293
| 38
|
https://fortnitefun.net/the-blue-cube-is-going-to-teleport-soon/
|
code
|
The Blue cube is going to teleport soon!
While all the cubes are rolling around the map of Fortnite towards its center, the blue cube is just standing. While the golden cube is floating in the center of the map, the blue cube is just standing. When is it finally going to move? Seems like it’s going to happen sooner than we’d expect. According to some rumors, the blue cube will move after the 18.21 or 18.30 Fortnite update. Most likely, it will teleport instead of rolling like the other cubes.
The 18.20 update has an animation of the blue cube’s appearance, which is a sign that it’s going to teleport soon. According to data miners, this animation isn’t finished, so it might be modified in the next updates.
Unfortunately, no one knows about the blue cube’s plan besides the developers. There’s no information about the cube’s movement, nor its role in Chapter 2 Season 8 of Fortnite.
Most likely, the blue cube will resist the Cube Town location, which should appear in the center of the map on October 19.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819089.82/warc/CC-MAIN-20240424080812-20240424110812-00795.warc.gz
|
CC-MAIN-2024-18
| 1,030
| 5
|
https://www-01.ibm.com/support/docview.wss?uid=swg21687909
|
code
|
PureData Systems for Analytics - MTM warning on IDAA Systems
An IDAA Accelerator generates warning messages from the PureData System for Analytics
Following warning message is received on the IDAA accelerator.
843 MTM(s) : MTM has not been set + NzId : + NZ Owner :
nz + OS : Red Hat
There is actually nothing wrong, but nzhealthcheck sends the alert to IDAA
The problem is in the parsing/processing of the nzhealthcheck output.
Diagnosing the problem
IDAA Accelerator will receive alerts from the PureData System for Analytics
Resolving the problem
The issue can be resolved by installing V4 PTF3 on the IDAA System
To install the fix a PMR will need to be opened with IDAA support team and they will assist with this procedure.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315132.71/warc/CC-MAIN-20190819221806-20190820003806-00554.warc.gz
|
CC-MAIN-2019-35
| 729
| 12
|
https://www.arrse.co.uk/community/threads/upgraded-saxon-patrol-to-plod-on-until-2015.48820/page-4
|
code
|
ViroBono said:Active_Edge_841 said:*Heart monitors, defibulators, spine boards, etc.*
Though I see them referred to often, I've never seen a real life defibulator, nor worked out what it actually is - a device for extracting fibulas, perhaps? I'm sure a defibrillator would be a much more useful bit of kit on an ambulance.
That will be me missing out on first place in the January ARRSE spelling competition then?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141652107.52/warc/CC-MAIN-20201201043603-20201201073603-00345.warc.gz
|
CC-MAIN-2020-50
| 414
| 3
|
https://cs184.eecs.berkeley.edu/sp21/lecture/12-12/monte-carlo-integration
|
code
|
I'm confused as to why "slow to converge" is listed as a disadvantage for Monte-Carlo integration. Monte-Carlo integration avoids the curse of dimensionality, so I assume that Monte-Carlo integration requires fewer samples than quadrature-based integration. If Monte-Carlo integration requires fewer samples than quadrature-based integration, wouldn't it make more sense to list the convergence rate as an advantage?
I think it is mainly much much faster than quadrature-based integration, but since we integrate over a region we'd need a ton of samples to get a full picture. Since calculus is a continuous mathematic where small changes make a big difference, you'd lots of samples to fully define your problem. So each sample we take must represent an important portion of our region of integration.
I think "Can be slow to converge" here refers to the convergence of error in Monte Carlo integration. Even though its estimation should be unbiased, we still need enough number of random points to achieve as little error as possible. THerefore, the Monte Carlo integeration requires a lot of samples.
I think there is similar usage of random sampling when we search for the optimal hyperparameters in deep learning. For complicated models, a random hyperparameter search is preferred over a grid search: https://stats.stackexchange.com/questions/160479/practical-hyperparameter-optimization-random-vs-grid-search
This is an interesting comparison @ZizhengTai, do they use monte carlo integration as a motivation for using random sampling?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057036.89/warc/CC-MAIN-20210920101029-20210920131029-00043.warc.gz
|
CC-MAIN-2021-39
| 1,541
| 5
|
https://forcoder.net/unity-3d-and-playmaker-essentials/
|
code
|
In introducing new students to video game development, there are two crucial components to consider: design and implementation. Unity 3D and PlayMaker Essentials: Game Development from Concept to Publishing provides theoretical background on topics such as characters, stories, level design, interface design, audio, game mechanics, and tools and skills needed.
Each chapter focuses on a specific topic, with topics building upon each other so that by the end of the book you will have looked into all the subjects relevant to creating your own game. The book transitions from discussion to demonstrations of how to implement techniques and concepts into practice by using Unity3D and PlayMaker. Download boxes are included throughout the book where you can get the version of the game project under discussion or other content to add to the project, as well as any supplementary video tutorials that have been developed.
Addressing both theoretical and practical aspects, Unity 3D and PlayMaker Essentials enables you to understand how to create a game by having you make a game. By gradually completing your own design document through the course of the book, you will become familiar with core design principles while learning the practical skills needed to bring your unique game to life.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475311.93/warc/CC-MAIN-20240301125520-20240301155520-00355.warc.gz
|
CC-MAIN-2024-10
| 1,292
| 3
|
http://mailman.isi.edu/pipermail/ns-users/1999-March/003364.html
|
code
|
using xgraph in color
Hyeong Soo Chang
Fri, 26 Mar 1999 09:28:58 -0500 (EST)
I wanted to include a graph generated by xgraph in color to a document.
xgraph supports 4 types; HPGL, postcript, Idraw, Tgif.
Currently I am using the framemaker.
1. Tgif and Idraw cannot be imported to the framemaker doc.
2. When I save to PS, the color information is lost.
3. When I save to HPGL, no problem but it remaps the color. For example,
red to green and green to yellow.
The color yellow is really hard to see in the printed document.
1. Is there any way to control colors in xgraph?
2. If not, is there a way to preserve the color information which xgraph
has when I writes to HPGL ?
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698693943/warc/CC-MAIN-20130516100453-00017-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 674
| 14
|
https://www.annacarreras.com/b-flow-visualization/
|
code
|
B-FLOW is an app to visually explore open data about your city. A colorful visualization of population and household statistics and demographic open data of Barcelona city.
The app localizes the user using GPS technology and includes her in the visualization and context. Neighborhoods population, population density and internal migration among the city can be explored.
The app was conceived and developed for the Apps4Transparency hackaton.
Project developed with: Manuel Santolaria.
Project development: 01.03.2015 – 15.03.2015
Tasks: interaction design, data study and visualization design, app development.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711003.56/warc/CC-MAIN-20221205032447-20221205062447-00679.warc.gz
|
CC-MAIN-2022-49
| 614
| 6
|
https://github.com/jllodra/cmod
|
code
|
New README (2011)
Cmod is a text-mode music player which plays files in IT, XM, S3M and MOD formats.
It uses the excellent libbassmod (I honestly think this is the best one to play Impulse Tracker songs).
I wrote this back in 2006, originally in Linux, but I have now ported it to Mac OSX Lion because I ran across with an Intel 32-bits version of libbassmod.dylib. If you have an afternoon it must be very easy to compile this in a Linux box with the appropiate libbassmod.so
In the dist/ folder you'll find a precompiled binary for Lion. Xcode project is also there.
Find a snapshot here: http://herotyc.untergrund.net/l/cmod.png
Original README (2006) below:
[ cmod 0.1 :: herotyc^asynkro ]
[ herotyc.com :: firstname.lastname@example.org ]
[ 02-11-2006 ]
cmod is a textmode module player based on ncurses and bassmod for playback
I recommend you to copy libbassmod.so to /usr/lib.
If it is not possible, run $export LD_LIBRARY_PATH='path/to/lib' before running. If you dont wish to do this everytime, add the path to /etc/ld.so.conf
For macosx, copy the .dylib somewhere in the path(maybe /usr/local/lib).
space or enter - play
q - quit
s - stop
, - seek backward
. - seek forward
+ - volume up (0 to 100, default 100)
- - volume down
> - amplify up (0 to 100, default 50)
< - amplify down
l - toggle loop mode (default: off) (stops playback)
z - toggle random mode
a - add song to playlist
e - add all the songs in the current directory to playlist
c - add recursive
d - remove song from playlist
r - remove all songs from playlist
n - play next song in playlist
p - play previous song in playlist
g - center cursor on current song playing
left/right arrows - toggle between browser and playlist windows
up/down, home, end, ppage, npage - navigation
slack, shash and merlucin.
dsteele, sole for testing.
tonka for testing and macosx tiger compiling.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247511573.67/warc/CC-MAIN-20190221233437-20190222015437-00553.warc.gz
|
CC-MAIN-2019-09
| 1,854
| 38
|
http://www2.freefmovies.com/film/american-gunslingers-44347
|
code
|
Movie made by my favorite director. Under rated movie, very under rated From the first movie from Christopher Forbes, I am his biggest fan. I can't even think about other things while watching American Gunslingers. If you're folk with low IQ you really might not like this movie. After few minutes of watching, it's clear this movie will be great. I have never left such good review for any movie in my life. American Gunslingers is significant expierience to remember for your life. It's hard to impress me, but American Gunslingers did it easily. Althought not as good as the book, still great as movie.
Actors: William Adams, Jezibell Anat, Tori Barker, Saul Brooks, Jerry Chesser, Tripp Courtney, Charlie Glotzbach, Viola Hobbs, John Hudson, Dave Long, Carlo Martini, Cody McCarver, Heath McDaniel, William Wylie, Joseph Zuchowski
Directors: Christopher Forbes
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156857.16/warc/CC-MAIN-20180921053049-20180921073449-00435.warc.gz
|
CC-MAIN-2018-39
| 864
| 3
|
https://littlehorse.dev/docs/concepts/user-tasks/
|
code
|
The purpose of a Workflow Engine is to coordinate processes that assign work. A
TaskRun represents a unit of work assigned to a computer, but what about work assigned to a human? That's where User Tasks come in.
User tasks require the input, decision-making, or expertise of an actual person. Some common examples of user tasks include:
- Workflow Approvals: Processes in which a specific person or group of people must review and authorize a business transaction.
- KYC: Know-your-customer workflows in which a sales rep must input information about a customer (eg. billing information) before the business process can continue.
- Data Input: Tasks involving filling out forms or providing specific information before the business process can continue.
- Manual Calculations: Situations that require human intervention to perform calculations, analyses, or assessments that cannot be easily automated and wherein we can't trust Chat GPT 😉.
You might ask, why not just use an
ExternalEvent? Technically, it is possible to implement similar functionality using just
ExternalEvents rather than introducing a whole new concept into the API. The reason for this is that so many things about User Tasks are tied deeply into the logic of the
WfRun itself, including assignment, reassignment, cancelling, lifecycle, and even simply scheduling a User Task.
The addition of the User Tasks feature allows LittleHorse to seamlessly automate workflows spanning humans and computers across multiple departments within an organization and beyond.
UserTaskDef is a Metadata Object defining a task that can be assigned to a human.
UserTaskDef does not include any information about who should execute the task. User Task assignment is a property of the
NODE and also of the
UserTaskDef consists of a series of fields, where each field has a name and a type. Currently, only primitieve types (
DOUBLE) are supported for User Task fields.
UserTaskRun is an instance of a
UserTaskDef assigned to a human user or group of users. Just like a
UserTaskRun is an object that can be retrieved from the LittleHorse API using
lhctl or the grpc clients.
UserTaskRun can be assigned to either a specific user (by an arbitrary user id) or a group of users (by an arbitrary user group id). At creation time,
UserTaskRun are assigned to the user id or group id that is specified in the
UserTaskNode. User Tasks in LittleHorse support automatic reassignment, reminder
TaskRuns, automatic cancellation after a configurable timeout, and are also searchable based on their owner.
TaskRuns, the output of the
UserTaskRun is used as the output of the associated
NodeRun. In other words, the output of a
USER_TASK node is a Json Variable Value with a key for each field in the
UserTaskRun can be in any of the following statuses:
UNASSIGNED, meaning that it isn't assigned to a specific user. If a
UNASSIGNED, it is guaranteed to be associated with a
ASSIGNEDmeans that a task is assigned to a specific
UserTaskRunmay or may not have a
CANCELLEDdenotes that the
UserTaskRunhas been cancelled for some reason, either manually, due to timeout, or due to other conditions in the
CANCELLEDis currently a terminal state.
DONEOnce a user execute a user task, it moves to the terminal
UserTaskRun only when it is assigned to a User. Then you can provide a value for each field and complete the UserTask, the resulting state will be
DONE. This can be done via lhctl or grpc client calls.
There are several ways to look up for an specific
UserTaskRun. You can use a combination of
userTaskDefName. For these searches, you will receive a list of
UserTaskRuns that match with these criteria.
You can trigger action when some hooks takes place. Currently LitteHorse supports:
ON_ARRIVAL, triggered when Workflow execution reaches the UserTaskNode. Useful when you need to send users reminders
ON_TASK_ASSIGNED, triggered when the UserTaskRun is assigned to a user. Useful when you need schedule reasignment if the asignee does not execute this task.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473360.9/warc/CC-MAIN-20240221002544-20240221032544-00234.warc.gz
|
CC-MAIN-2024-10
| 4,001
| 47
|