url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
http://www.webassist.com/forums/post.php?pid=19313
|
code
|
Home Page Link
When the site is created by SitAssist, all pages are created with the Home link in the nav bar except for the Home Page. I would like the link to be on my Home page as well, just showing it is the active page. I prefer that to having the nav bar jump between the 2 states. Is there a setting for this or do I have to edit the index page menu manually after creation?
Also, I would like the option to not have the Home link on any pages. Please make this option available on future releases. Thank you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500251.38/warc/CC-MAIN-20230205094841-20230205124841-00076.warc.gz
|
CC-MAIN-2023-06
| 516
| 3
|
https://takecoins.tk/cryptocurrency/in-xrp-found-a-serious-vulnerability/
|
code
|
The developers, who managed cryptocurrency XRP [XRP] began emergency work to eliminate errors in the network. It allows you to “fill up” file storage of the blockchain unlimited number of files. News XRP [XRP]: the network discovered a serious bug Anonymous programmer, has recently released an app that allows you to download the blockchain XRP files of any size in any quantity. This development exploits a vulnerability in the field of memory with which to work all of the transactions. File storage, on assurances of the project team, should have become invulnerable and useful for the network. But because mistakes can cause network slowdowns and rising transaction fees. Developer XRP Vítsa Vind (Wind Witse) commented on the vulnerability found: I Want to thank the community for vigilance, a lot of improvements in terms of safety do not happen. We are concerned about this situation and are already taking action. Feature of blockchain technology is that decentralized networks cannot store an infinite number of files.
For the health of the projects required the installation of many nodes with full versions of network. Once the network grows, as in the case of XRP, it starts to occupy too much disk space and becomes expensive to maintain. Individual spammer it will be difficult to do a lot of damage, but the program was made public for anyone to use. The attack on the XRP was conducted by an organized group According to the developers, those who decided to “derail” the work of the network have created a special group in the shell. In it they discussed the time at which you want to start the file download. But to coordinate the actions they failed, causing great damage to XRP was insignificant.
Vítsa Vind expressed concerns that the blockchain can boot image with illegal content. Because of this, the entire network can be compromised. But, for example, on the bitcoin blockchain for many years there is a problem with a similar content, but the consequences for him have not yet seen. To fix the vulnerability the Windows have already uploaded the changes to the code XRP to Github. They will deduct Commission from the transaction, which is now used by hackers. It will make a large-scale attack is too expensive. Now the project team will vote for these changes. Some of them supported the introduction of commissions, while others believe that you need to close the vulnerability of the more complex methods. The final decision will be made soon. In the community are unhappy that your network contains similar errors. Users think that this can interfere with technology XRP in the financial sector
The message In XRP found a serious vulnerability appeared first on crypto.by.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146064.76/warc/CC-MAIN-20200225080028-20200225110028-00362.warc.gz
|
CC-MAIN-2020-10
| 2,714
| 4
|
https://answers.sap.com/questions/920825/help-in-smartforms.html
|
code
|
had a small question. I have to read the data into the body of the smartform from different tables. i.e (two fields from one table, two from the other and so on). I have declared the internal table with the respective field names(different tables) that forms the structure as below.
types: begin of structbdata,
bdate type jhtfp-fbuda,
predition type jhtfp-vavtyp,
adnumber type jhtfp-aubel,
adsize type jhamot-breite_ieh,
bunits type jhamot-hoehe_i_eh,
end of structbdata.
data: bdata type structbdata occurs 0 with header line,
end of bdata.
It is throwing error - saying that the data declarations of different categories cannot be mixed.
Also, I need to use this as aninterface paramter before reading the data into the body of the smartform.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710968.29/warc/CC-MAIN-20221204072040-20221204102040-00161.warc.gz
|
CC-MAIN-2022-49
| 746
| 12
|
https://stackoverflow.com/questions/12160094/is-j2me-development-still-possible-with-recent-versions-of-eclipse
|
code
|
I tried installing MTJ 1.1.2 from http://www.eclipse.org/mtj/, but after the restart, no new options appeared that would indicate that the plugin is even there. As the latest release is for Helios, I am afraid that the plugin no longer works with Juno and later.
Is it still possible to develop J2ME applications with Eclipse? If so, how? If not, what are the alternatives?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943845.78/warc/CC-MAIN-20230322145537-20230322175537-00199.warc.gz
|
CC-MAIN-2023-14
| 373
| 2
|
https://blog.brainscape.com/flashcards/topic-11-autocorrelation-2457613/packs/3803570
|
code
|
Why can autocorrelation occur?
-Specification, excluding a variable
-Lag, regressor dependent on previous period
-Manipulation / smoothing of data
Show teh Autoregressive 1 ( AR(1) ) model?
Show the Moving Average ( MA(1) ) model
How does uncorrected Autocorrelation affect our results?
-Estimators still linear & unbiased, not BLUE
-No minimum variance
-Variance ill estimated, likely under
-Tests not valid
What can be done to test for autocorrelation?
-Graph of u^i v time
How is the durbin watson test calculated?
What does the Durbin-Watson test assume?
-Regression has intercept
-no lagged regressant in the model
-No missing observations
How is rho related to the d stat in the DW test?
d ~= (2(1-ρ))
When d = 0, p = 1.
When d = 2, ρ = 0
When d = 4, ρ = -1
How does one check a durbin watson d stat?
Look up dL & dU from tables
if d L or 4-dL < d -> then autocorrelation
if dU < d < 4-DU then no autocorrelation
DU & DL are dependent on n & k-1
How is the Breusch-Godfrey test run?
1. Run the normal regression, may include lagged regressants
2. Regress ut on Xi, ρ1ut-1 ρ2ut-p other Xi's
3. For large samples, nR2 ~ Chi(p), or F(k,n-k-p-1)
- Works for MA,
- p must be assumed / guessed
- might want to choose a yearly p, so montly data would have p=12
How might we correct AR(1) for known ρ?
Because ut = ρut-1 + ϵ
We can tranform our model by -ρYt-1
So Yt - ρYt-1 = B1(1-ρ)+B2(Xt-ρXt-1) + ϵt
or Yi*=B1*+B2*xt*+ ϵt
Coefficients are now blue
We must remember to adjust coefficients for interpretation
How can we use the durbin watson test to estimate ρ?
ρ = 1 - d/2
What is the Cochrane-Orcut procedure?
1. Run the normal model, get ut
2. Then run the model ut = ρ1ut-1 + vt
3. use ρ1 to use the tranformed model, get new residuals
4. Use the new residuals to resestimate ρ1
5. Continue until ρ does not change much with each iteration
What are the Newey-West errors?
Like whites errors, but for autocorrelation. Not BLUE but valid tests
What is ARCH?
Autoregressive Conditional Heteroscedasticity Model
Yt = B1 + B2X2t+ut
ut ~ N(0, α0 + α1 u2t-1)
run u2t ~ α0+ α2u2t-1 ... αku2k-x
Use nR2 ~ Chi(k)
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991224.58/warc/CC-MAIN-20210516140441-20210516170441-00121.warc.gz
|
CC-MAIN-2021-21
| 2,130
| 58
|
https://play.google.com/store/apps/details?id=com.udemy.android
|
code
|
Concise and short I can watch the videos, act on them, not take too much time trying to get through the courses and learn a lot. I can download to have the courses offline so I don't eat up data which I love and I can have it anywhere I am in the world. Can't beat this this is awesome information for me to learn.
The same as the desktop one Unlike the desktop one, the mobile app is a lot more convenient as you don't have to change tabs or windows to see he videos while you are doing what the video is teaching you. However downloading class resources is a lot more inconvenient.
Nightmare I switched to Android from iOS this week, Android version is so laggy and freezesand I had to restart the app so many times! I cant compare rhis to the IOS version. I am definitely sure that Udemy need a better Android devs. Tested on note7.
Good and but check before you buy The app is absolutely fine. however I have noticed that the costs for courses are more expensive. So if your buying check online first. Once bought then definitely use the app!
Love Udemy, hate the android app!!! Udemy is not at fault, who ever designed their Android App should be flogged. It takes ever bit of RAM to run it and you have to reboot it many times to get anywhere. Udemy is a great idea. Android developer, you stink!!!
Like Udemy, hate the app When using Chromecast, the app will natively continue to run on the phone. An additional instance of the video with its own audio will start. On some occasions, the app will not show in the status bar and the app audio continues. Love Udemy, app isn't working great for me
- Bug fixes and performance improvements
You can update Udemy automatically by turning on your auto update settings on your device.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982294097.9/warc/CC-MAIN-20160823195814-00201-ip-10-153-172-175.ec2.internal.warc.gz
|
CC-MAIN-2016-36
| 1,734
| 8
|
http://www.indiegamepod.com/2007_03_01_archive.html
|
code
|
Attended a great session by Russell Carroll of GameTunnel.com
. He talked about marketing indie games. Here's a summary...
He had 6 points for marketing an indie game....
1) You're throwing money away by not marketing
* Making Marketing Mojo
* Consider the market
* Create a press plan/checklist
A bunch of events to get folks interested in your game
Have releases of previews...because previews always viewed in a positive light
Folks read it in positive light and want it more when it gets released.
If the first press release you send for a game is *after* it is released, then you've done something wrong. You should be sending press releases throughout the development process to help gain exposure and to get the editors use to your name.
As a game magazine editor, he mentioned that the games that stick out are the ones that constantly send press releases...so he recognizes the name.
Suggestions for writing a press release:
*Do not hire someone to write a press release
* Write your own press release since you're passionate about what you're doing vs. other writers
*Look at how to communicate
When writing press releases, try to keep it...
simple, memorable, and an unexpected emotion-stirring story
Consider viral marketing as an option, but requires a horse (something that'll spread virally); viral marketing is tricky because for every person that directly hears/plays the game, more than one must hear about it from them.
Find players/users that have the ability to talk about the game.
2) You're throwing money away by...
Using a publisher
You don't need a publisher for digital distribution. In fact, you have more leverage if game sells well on your site first.
If game sells well on your own, portals will approach you
3) You're throwing money away because you're not using a publisher:
Use publishers when they can take you were you can't easily go...like use them to get into retail.
4) You are throwing money away by not abusing the portals
You paid for the advertising already, don't throw it away
If on portals, start taking advantage of fact that on portal.
Consider the idea that every download of your game on a portal is an advertisement
You need traffic, portals have traffic, abuse it.
Steal their traffic...
Give the portal players an incentive to visit your site. Offer other items related to your game that they can't find on portals...like
Does your game encourage users to seek you out?
5) You're throwing money away by not advertising (don't let other people take your customers)
Targeting ads can help you reach your target market. Advertising without tracking is stupid
Advertising may be scary, but can use money generated afterwards.
6) Throwing money away by being a bonehead
* Don't burn bridges because never know who will help you in the future. Said that he kept things professional and helped him in the end because needed help of that person
in the future.
* Activities that will make you unsuccessful with indiegames....
c) Ignorning everyone
d) Talking to everyone
g) Working Alone
Activities that make you a successful company...
b) People (be nice to the team)
c) Professional (be professional at all times)
Mentioned checking out gamepress.com
Labels: game development podcast, marketing
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118743.41/warc/CC-MAIN-20170423031158-00394-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 3,241
| 49
|
http://sinsations.info/?Perform_SYSTEM___3_Stage_objects___3.4_Stage_Seats
|
code
|
3.4 Stage Seats
Seats contain a Perform sit script.
- access <owner/group/all> - set access rights (including sitting)
- debug <on/off> - set debug mode on or off
- setchannel <channelNumber> - set the channel number
- sitAnimation [<animationName>] - set the animation to the given animation that has to be inside the sit object. NONE means no animation at all. If no animation name is given, then the first animation from inventory is used.
- sitPosition <position> - position of the avatar relative to the sit object.
- sitRotation <rotation> - rot action of the avatar relative to the sit object.
- unsit - remove sitter from sit object
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986666959.47/warc/CC-MAIN-20191016090425-20191016113925-00399.warc.gz
|
CC-MAIN-2019-43
| 640
| 9
|
http://timcheadle.com/about/
|
code
|
Hi! My name is Tim; nice to meet you.
I’m a software craftsman, designer, and problem solver. Generally speaking, I just love making things. Originally from Virginia, I now live in Charlotte, North Carolina with my beautiful family. Prior to moving, I spent five years working as an engineering manager at Google in San Francisco.
Most of my time is spent building Umba a startup focused on curating creative handmade goods that delight and inspire. I joined as CTO in 2013 and love working with my team and our partner artists to build a product that our customers love.
In 2011 I founded a web engineering business called Rational Means, where I help companies use technology to grow and improve their business. After working as CTO at Umba, I learned how difficult it is to run a small ecommerce business, and I’m convinved that much of the pain is unnecessary. I’m working to change this by launching better tools for those amazing business operators.
As far as technology goes, I do primarily Ruby on Rails app development, front end development, product management, and UI/UX design.
I love helping other engineers and designers build sustainable, interesting businesses. To that end, I founded and continue to organize Charlotte Hackers & Founders, a group for local technology creatives to share ideas and resources. I also serve as an advisor for several startups and accelerator programs.
Outside of work, I’m a huge bourbon and coffee geek, love being outside, and I’m a proud father of a pretty great toddler . I used to be an electronic music DJ, and now I’m teaching myself how to draw and illustrate.
I’m @timcheadle on Twitter, and I’d love to hear your ideas.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057119.85/warc/CC-MAIN-20210920221430-20210921011430-00249.warc.gz
|
CC-MAIN-2021-39
| 1,692
| 8
|
http://vivekjuneja.blogspot.com/2011/04/
|
code
|
I have a old sheet of paper scribbled with "Rules to live by" in my workplace. I am not sure when I wrote this, but it has been with me for a while. I call it my Mantra.
Its amazing how a single scribble event can drive how I live my work life. I do not term it as a Vision document or Mission Statement. But a Mantra, or should I say - list of Mantras.
Let me share with you this list, and hope it helps you as to have your own list of Mantras.
1) Speed up Development process
2) Improve Effectiveness of Code being written
3) Make it extremely easy to write Great code
4) Build Great responsive and elegant apps
5) Balance between - using 1/2 time and build 2x quality in everything
6) Mitigate Risks in Software Development process
7) Reduce Initial hiccup time before development flow becomes steady
8) Create Reusable assets and Knowledge management features all along the SDLC
9) Make yourself and co-workers proud of their work
10) Build skills to complement each other in a team
More on these later, in subsequent posts.
Till then, Happy being great.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867217.1/warc/CC-MAIN-20180525200131-20180525220131-00597.warc.gz
|
CC-MAIN-2018-22
| 1,058
| 15
|
https://mail.python.org/pipermail/tutor/2005-July/039799.html
|
code
|
[Tutor] Closing BaseHTTPServer...
python at venix.com
Sat Jul 16 21:30:49 CEST 2005
This sidesteps the issue of how to fix your threading code.
SocketServer has a ThreadingMixIn class. You can create a threading
HTTPServer without coding the threading yourself.
(watch for typos - this is NOT from working code)
class ThreadingHTTPD(SocketServer.ThreadingMixIn, BaseHTTPServer.HTTPServer):
srvr = ThreadingHTTPD( <address,port tuple>, <request handler class>)
Credit for this goes to John Goerzen and his fine book "Foundations of
Python Network Programming"
More information about the Tutor
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145869.83/warc/CC-MAIN-20200224010150-20200224040150-00312.warc.gz
|
CC-MAIN-2020-10
| 591
| 12
|
http://burrridge.patch.com/articles/not-just-a-wad-of-lights
|
code
|
Not Just A Wad Of Lights
Hang around the Village Green at night and you may see this.
What looks like last year's tangled wad of Christmas lights from the garage is actually something better organized and much brighter. You may have seen this at the Jingle Mingle resting on a large tree (hint, hint) on the Village Green.
Can you guess what this image is?
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706298270/warc/CC-MAIN-20130516121138-00052-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 356
| 4
|
https://www.sarthaks.com/1070662/define-a-class-author-with-the-following-specifications
|
code
|
Define a class AUTHOR with the following specifications:
Private members of the class BOOK are:
BOOK NO integer type
BOOKTITLE 20 characters
PRICE float (price per copy)
INPUT() : function to read BOOK_NO,BOOKTITLE, PRICE
PURCHASE(): function to ask the user to input the number of copies to be purchased.
TOTAL_COST() : A function to calculate the total cost for N number of copies where N is passed to the function as argument.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154163.9/warc/CC-MAIN-20210801061513-20210801091513-00439.warc.gz
|
CC-MAIN-2021-31
| 429
| 8
|
https://embersword.com/careers/senior-engine-developer-dk
|
code
|
Want to be onboard a rocketship and help build a new and groundbreaking MMORPG called Ember Sword?
As a Senior Engine Developer on the Bright Star Studios Engine team, you'll be part of the core group of developers that build our custom ECS-based game engine written in C++. The game is compiled with emscripten to webassembly and runs directly in your browser where it loads in just 5 seconds. Therefore we care greatly about the quality and performance of our code and don't shy away from refactoring if needed. You'll be building core engine features such as rendering systems like particle systems, integrating audio solutions, implementing optimizations, entirely new services for various game features and creating general infrastructure for game developers.
If you are looking to have an impact on building the engine for our first game, Ember Sword, then join us and pioneer solutions that will help us scale to the next level.
We are developing Ember Sword, a groundbreaking social sandbox MMORPG game set in a community-driven PvP and PvE fantasy universe. With player-owned collectible cosmetics and a blockchain-enhanced economy, this game is on a mission to disrupt the current gaming industry norms.
Your TO DOs
The GOOD TO HAVEs
The TEAM at Bright Star
In just two short years, Bright Star Studios has become one of the most watched developing gaming studios in the world. Today we are a rapidly growing team, and though we are spread across continents, we are united in our mission to build the ultimate MMORPG experience for our community. The BSS culture is driven by a group of passionate, determined and talented individuals, hailing from a range of diverse backgrounds and locations.
We are an equal opportunity employer who hires people who are genuinely passionate about changing the games industry for the better. Always on the lookout for exceptional talent and potential, we care about good team effort, open and friendly communication, and speaking up without reserves.
So… if you are ready to rock the foundation of the gaming world together, we will welcome you with open arms.
About Bright Star Studios
Bright Star Studios, is a global independent games development studio crafting next generation original MMO game franchise experiences.
Led by a diverse team of award-winning venture founders, former world champion pro-players and entertainment professionals who come with decades of game industry experience, these innovators are carving a new path forward for MMORPGs across PC, Browser, and Mobile. The studio’s mission is to rewrite the games industry with a business model that favors the community through exciting competitive gameplay, instant playability and a leading platform which supports the player economy.
The studio is working on their flagship title, Ember Sword, a modern rewrite of the games industry business model which brings a player-owned economy and the community together in a unique and engaging cooperative role playing story-universe.
About Ember Sword
Ember Sword is a social sandbox MMORPG taking place in a player-driven universe where the adventure finds you. Built by a team of imaginative artists, engineers, and game designers, Ember Sword offers a unique community led and frictionless PvP and PVE player experience, and allows true ownership of digital gaming assets using blockchain technology.
We offer remote options and flexible working hours. We offer balance between work and personal life and are encouraged with open paid time off. All employees getting onboard 2022 will get a token package, and therefore have an incentive to make the best MMORPG. Besides that, we have the usual: Free coffee and tea. Social gatherings. Board game nights. Free office snacks, soft drinks, and occasionally friday bars.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334802.16/warc/CC-MAIN-20220926051040-20220926081040-00680.warc.gz
|
CC-MAIN-2022-40
| 3,787
| 17
|
https://projectconsult-drdoell.de/transparentes_arbeiten.php?lang=EN
|
code
|
Our working methods ensure highest quality service for all of your needs and ensure a professional processing of the tasks.
We are able to accomplish and display technical calculations and computer simulation of dynamic processes on short notice with the aid of high level data processing.
TRANSPARENT WORKING METHODS
During the technical preparation and initiation of the projects, we guarantee optimal precision and optimal data excange, as well as close and open minded coordination with the client and integrated project partners.
FUNCTIONAL AND ECONOMIC SOLUTIONS
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474852.83/warc/CC-MAIN-20240229170737-20240229200737-00848.warc.gz
|
CC-MAIN-2024-10
| 568
| 5
|
https://mluckdesign.com/portfolio/live-design-briefs/
|
code
|
This body of work was completed as part of my university course in which we had to choose a brief from a brand to work with. I chose STA travel who wanted me to work on a campaign to target students and Gen Z.
After researching into the company and gaining an understanding for their brand, I worked on developing the target audience and planning relevant ways to advertise to them. Targeting people looking to take a trip either during or before their time as a student I created a poster set centred around going on holiday during a gap year. The posters had an emphasis on things being easy as during my research I found that young people especially appreciated ease of use.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656675.90/warc/CC-MAIN-20230609100535-20230609130535-00081.warc.gz
|
CC-MAIN-2023-23
| 677
| 2
|
https://sort.veritas.com/public/documents/sfha/6.1/linux/productguides/html/sfcfs_admin/ch05s14.htm
|
code
|
The same backup strategies used for standard Veritas File System (VxFS) can be used with Storage Foundation Cluster File System High Availability (SFCFSHA) because the APIs and commands for accessing the namespace are the same. File system checkpoints provide an on-disk, point-in-time copy of the file system. Because performance characteristics of a checkpointed file system are better in certain I/O patterns, they are recommended over file system snapshots (described below) for obtaining a frozen image of the cluster file system.
File system snapshots are another method of a file system on-disk frozen image. The frozen image is non-persistent, in contrast to the checkpoint feature. A snapshot can be accessed as a read-only mounted file system to perform efficient online backups of the file system. Snapshots implement "copy-on-write" semantics that incrementally copy data blocks when they are overwritten on the snapshot file system. Snapshots for cluster file systems extend the same copy-on-write mechanism for the I/O originating from any cluster node.
Mounting a snapshot file system for backups increases the load on the system because of the resources used to perform copy-on-writes and to read data blocks from the snapshot. In this situation, cluster snapshots can be used to do off-host backups. Off-host backups reduce the load of a backup application from the primary server. Overhead from remote snapshots is small when compared to overall snapshot overhead. Therefore, running a backup application by mounting a snapshot from a relatively less loaded node is beneficial to overall cluster performance.
A snapshot for a cluster mounted file system can be mounted on any node in a cluster. The file system can be a primary, secondary, or secondary-only. A stable image of the file system is provided for writes from any node.
See the mount_vxfs manual page for more information on secondary-only (seconly) file systems is a CFS mount option.
Multiple snapshots of a cluster file system can be mounted on the same or different cluster nodes.
A snapshot is accessible only on the node mounting the snapshot. The snapshot device cannot be mounted on two nodes simultaneously.
The device for mounting a snapshot can be a local disk or a shared volume. A shared volume is used exclusively by a snapshot mount and is not usable from other nodes as long as the snapshot is mounted on that device.
On the node mounting a snapshot, the snapped file system cannot be unmounted while the snapshot is mounted.
A SFCFSHA snapshot ceases to exist if it is unmounted or the node mounting the snapshot fails. However, a snapshot is not affected if another node leaves or joins the cluster.
A snapshot of a read-only mounted file system cannot be taken. It is possible to mount a snapshot of a cluster file system only if the snapped cluster file system is mounted with the crw option.
In addition to frozen images of file systems, there are volume-level alternatives available for shared volumes using mirror split and rejoin. Features such as Fast Mirror Resync and Space Optimized snapshot are also available.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816977.38/warc/CC-MAIN-20240415111434-20240415141434-00557.warc.gz
|
CC-MAIN-2024-18
| 3,118
| 12
|
https://dev.clojure.org/pages/diffpages.action?pageId=9142502&originalId=9142500
|
code
|
For Clojure, there are several contributors with the authorization to be Clojure screeners (the list is here). They examine Clojure tickets and patches, deciding what to do with them. If they approve of a ticket with a patch, then Rich Hickey also examines the patch. If he approves, then the patch is committed.
The project leads, Clojure screeners, and Rich Hickey all work on Clojure as volunteers, in their spare time, many of them since 2007 when Clojure was first released.
Other articles that may be of interest:
Signing the Contributor Agreement grants Rich Hickey joint ownership of your contributions. In exchange, Rich Hickey guarantees that Clojure will always be available under an open-source license approved by either the Free Software Foundation or the Open Source Initiative.
Why does Clojure require that contributors submit a contributor agreement on paper?
The requirement to mail a signed CA on paper was set up in 2007 (TBD: verify if that is the correct year), before there were as many choices for electronic methods as exist today. It is the most easy to defend if there were ever a legal challenge to the copyright of any of the Clojure code. There has been some discussion in October 2012 on the Clojure Dev Google group about allowing electronic submission of CAs, too, but there is no process in place for that yet.
Link to Clojure Dev discussion thread
Other projects hosted on GitHub accept pull requests. Why not Clojure?
Rich Hickey prefers to evaluate patches attached to JIRA tickets. This is not to make it more difficult for contributors, or for legal reasons, but because of his work flow preferences. It is easier for himworkflow preferences. The process of creating JIRA tickets and patches is documented and not terribly difficult.
Link to Oct 2012 Clojure Google group message from Rich Hickey on this topic
But what about all of the people who won't contribute if you don't change your process to suit them?
If some people choose not to go through the steps for the current process, that is unfortunate. The process of creating JIRA tickets and patches is documented and not terribly difficult. We understand that submitting a physical signed CA is slow and/or expensive from many parts of the world, and hopefully there will be an electronic method in place in the future.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889617.56/warc/CC-MAIN-20180120122736-20180120142736-00213.warc.gz
|
CC-MAIN-2018-05
| 2,317
| 12
|
https://physics.stackexchange.com/questions/437697/does-buoyant-force-become-less-effective-as-acceleration-increases
|
code
|
Lets say a balloon with a certain amount of buoyant lift has a 2 kg mass strapped to it (including engines) and accelerates enough that it perceives a positive 2.5 g inertial force (2.5g * weight) acting downwards. Lets say initially the amount of buoyant force is equal to 50% of the perceived weight during no acceleration (1 kg total weight).
Because weight equals: mass * gravity (2.0 kg * 9.81)
And the g factor due to acceleration is applied to the weight to get g force: 2.5g * weight = Force
Then the g force would become 2.5g * 2.0 kg * 9.81 = 49.05 N
Is the g factor due to acceleration only applied to the resultant weight minus the helium buoyant force?
2.5g * 1kg (resultant weight) * 9.81 = 24.525 N
If the first case is true, the buoyancy becomes much less effective under an acceleration inertial load. If the second case is true, can someone show me mathematically or explain why the g factor is not multiplied by the entire mass?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657143354.77/warc/CC-MAIN-20200713064946-20200713094946-00283.warc.gz
|
CC-MAIN-2020-29
| 947
| 7
|
http://www.noncode.org/cgi-bin/hgTrackUi?hgsid=4778010&c=chr6&g=ccdsGene
|
code
|
This track shows human genome high-confidence gene annotations from the
Coding Sequence (CCDS) project. This project is a collaborative effort
to identify a core set of
human protein-coding regions that are consistently annotated and of high
quality. The long-term goal is to support convergence towards a standard set
of gene annotations on the human genome.
CDS annotations of the human genome were obtained from two sources:
RefSeq and a union of the gene annotations from
Vega, collectively known
Genes with identical CDS genomic coordinates in both sets become CCDS
candidates. The genes undergo a quality evaluation, which must be approved by
all collaborators. The following criteria are currently used to assess each
- an initiating ATG (Exception: a non-ATG translation start codon is
annotated if it has sufficient experimental support), a valid stop codon, and
no in-frame stop codons (Exception: selenoproteins, which contain a TGA codon
that is known to be translated to a selenocysteine instead of functioning as
a stop codon)
- ability to be translated from the genome reference sequence without frameshifts
- recognizable splicing sites
- no intersection with putative pseudogene predictions
- supporting transcripts and protein homology
- conservation evidence with other species
A unique CCDS ID is assigned to the CCDS, which links together all gene
annotations with the same CDS. CCDS gene annotations are under continuous
review, with periodic updates to this track.
This track was produced at UCSC from data downloaded from the
Hubbard T, Barker D, Birney E, Cameron G, Chen Y, Clark L, Cox T, Cuff J, Curwen V, Down T et
The Ensembl genome database project.
Nucleic Acids Res. 2002 Jan 1;30(1):38-41.
PMID: 11752248; PMC: PMC99161
Pruitt KD, Harrow J, Harte RA, Wallin C, Diekhans M, Maglott DR, Searle S, Farrell CM, Loveland JE,
Ruef BJ et al.
The consensus coding sequence (CCDS) project: Identifying a common protein-coding gene set for the
human and mouse genomes.
Genome Res. 2009 Jul;19(7):1316-23.
PMID: 19498102; PMC: PMC2704439
Pruitt KD, Tatusova T, Maglott DR.
NCBI Reference Sequence (RefSeq): a curated non-redundant sequence database of genomes, transcripts
Nucleic Acids Res. 2005 Jan 1;33(Database issue):D501-4.
PMID: 15608248; PMC: PMC539979
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100309.57/warc/CC-MAIN-20231202010506-20231202040506-00862.warc.gz
|
CC-MAIN-2023-50
| 2,283
| 40
|
https://spneedeltechnologies.com/job/senior-automation-engineer/
|
code
|
Senior Automation Engineer
Senior Automation Engineer needed in Pleasanton, CA
Duration of employment
November 30, 2020
- 7+ years of (QE) Quality Engineering test automation experience
- 5+ years of hands-on programming/scripting experience in Java
Required Skills/Must Have:
- 7+ years of (QE) Quality Engineering test automation experience in developing Automation Scripts using Selenium, TestNg, AutoIT, Grid & Webdriver, xPath utilities, custom reports, trend analysis, file difference / compare tools, Protractor, Watir.
- 5+ years of hands-on programming/scripting experience in Java. Python\Ruby\C# programming is an added advantage but the primary essential coding skill required is Java.
- Experience with BDD test automation frameworks using Cucumber-JVM, Mocha, Chai, Gherkin best practices.
- Experience with API testing frameworks primarily on REST-Assured & Jersey JAX-RS. Added advantage skills were SOAPUI, Tosca, Apigee, Jmeter, Assertible, and Karate DSL.
- Experience with JIRA & XRAY API level implementations. Knowledge of Defect Management process in HP ALM & JIRA.TestRail and Zephyr is an added advantage skillset.
- Experience with Mobile Test Automation (Appium & Android SDK) including any of integration solutions such as Browserstack, Saucelabs, Perfecto, and Keynote DeviceAnywhere.
- Proficient with SQL for adding, modifying and extracting data from a RDBMS database including No-SQL or JSON formatted DBs.
- Must have experience with TestNg/Junit, Maven/Ant, and also Jenkins inclusive of Shell Scripting for CI/CD/CT integrations with DevOps.
- Understanding and working knowledge with Data Driven, Keyword Driven, Hybrid, ATDD frameworks inclusive of BDD & TDD techniques.
- Experience with version control tools (Azure DevOps Servers\TFS, GIT or SVN)
- Working knowledge of AI (Artificial Intelligence) techniques and frameworks such as Tensorflow, CNTK, Cafee, Theano, Keras, Torch including Security & Performance testing tools
- The engineer should have experience with designing automation framework in such a way that it increases and speeds up productivity by creating reusable functions.
- The engineer also must provide support for the framework(s), for example, supporting Development/QE with issues using the tool. The engineer will implement automation test scripts. Integration with the test management tool is also planned.
- The Senior Test Automation Engineer must be able to take on leadership responsibilities and influence the direction of the automation effort, and its schedule and prioritization.
- The engineer will work with management, developers, and quality assurance personnel, to meet these goals.
- Additionally the Senior Test Automation Engineer will also support the smoke/sanity testing requirements of DevOps Release Engineering team after build deployments. These build tests will ensure that the code drops to quality assurance are of the highest quality.
- The engineer will provide a practical approach to complex product testing, specifically in the areas of the automation of test cases for the purposes of regression testing. He/she will be a creative and proactive thinker and will make use of current technologies to provide extensible automation infrastructures.
- The engineer will review product requirements, functional and design specifications to determine and prepare automated test cases.
- The engineer will work closely with other QE team members to automate the execution and verification of reports created by the various company products.
- The engineer will work closely with various Development team members to understand testing objectives and ensure that problems are resolved in a timely and efficient manner.
- The engineer will be part of a team focusing on automation of an identified set of migration tests, checking that they run correctly in a given environment. The team would focus on developing and testing these automation buckets which would be executed by other teams.
- The engineer will work concurrently on several projects, each with specific instructions that may differ from project to project.
Principal Duties/Roles and responsibilities:
- Develop, prepare, and execute Test Automation Scripting for both, BDD/TDD and Hybrid, linear test frameworks on multiple platforms such as Desktop, Multiweb, and Mobile Web & Apps.
- Delivery Unit, Functional, Regression, E2E Testing artifacts, and results through test automation.
- Expert to find bottlenecks/thresholds in existing, develop new code with strong JAVA coding skills.
- Engage in more complex or time-critical quality assurance testing of Next Generation Systems such as the new Guidewire Billing system Perform functional testing on all modules such as policy payments, invoicing and billing & Collection, etc.
- Working hands-on "Quality AGILE + DevOps" environment with API testing, Microservices, Object-Oriented Design, CI/CD integrates with Continuous Testing and Cloud-Native architectures.
- Deliver end-to-end project & product software testing lifecycle (STLC) needs such as technical assessment, estimation, meet target timelines, support, and involvement in manual testing as required.
- Constantly look for opportunities to improve testing through innovative automation and best practices.
- Work closely with Management to support & improve efficiency in test automation net outcomes.
- Deliver and complete test automation assignments and send reports in a timely manner.
- Writing both implementation steps and code with BDD test automation frameworks using Cucumber-JVM latest version
- Automation of APIs using testing frameworks primarily on REST-Assured & Jersey JAX-RS or Other Standard API Programming in conjunction with JAVA
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499713.50/warc/CC-MAIN-20230129112153-20230129142153-00413.warc.gz
|
CC-MAIN-2023-06
| 5,722
| 41
|
http://www.chegg.com/homework-help/questions-and-answers/suppose-earth-close-gravitational-encounter-unusually-massive-asteroid-collision-occurs-re-q2428167
|
code
|
Suppose the Earth has a close gravitational encounter with an unusually massive asteroid. No collision occurs, but as a result of the encounter, the asteroid is ejected from the solar system � it escapes from the Sun's gravitational grasp. As a result of this encounter, does the Earth move to a higher orbit or a lower orbit around the Sun? (There is no third alternative, for this question.) Explain, solely in terms of orbital energy and the energy conservation principle.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396875.58/warc/CC-MAIN-20160624154956-00161-ip-10-164-35-72.ec2.internal.warc.gz
|
CC-MAIN-2016-26
| 477
| 1
|
https://letsexchange.io/exchange/gnt-to-trvl
|
code
|
If you are searching for a safe platform to convert [coin1_long_name] to [coin2_long_name], check out our [coin1_short_name] to [coin2_short_name] exchange. Here, you are free to securely swap crypto without registering a user account. You aren’t required to indicate any personal data. Our [coin1_short_name] to [coin2_short_name] exchange online instantly selects the most profitable conversion rate for each swap. The entire exchange process is effortless, absolutely transparent and safe.
To convert [coin1_long_name] to [coin2_long_name], go to the exchange widget on the LetsExchange.io homepage.
Before making a decision whether to invest in [coin2_short_name], we recommend checking the [coin1_short_name] to [coin2_short_name] chart. There, you can observe cryptocurrency price fluctuations in real time. Check both the cryptocurrency’s current value and the graph indicating its value fluctuations within a particular time frame.
With the live chart, you can also see other information crucial for trading:
This data is required to see the current trend in the market and to make an informed decision for profitable trading. This data record also provides traders with useful information to make a correct decision about whether it’s worth to mine a particular coin.
Whether you’re trading cryptocurrencies for an immediate profit or looking for a long-term investment, LetsExchange offers you a set of features for a safe, straightforward, and limitless exchange experience.
Our platform automatically selects the best [coin1_short_name] to [coin2_short_name] exchange rates in the market for each swap. Once you indicate the information necessary for your transaction, LetsExchange monitors multiple major exchange platforms for the most profitable [coin1_long_name] to [coin2_long_name] conversion rate.
Our exchange service supports more than 350 crypto coins for you to exchange. Our users are free to exchange any available crypto coins without setting up an account and completing KYC and AML procedures.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104189587.61/warc/CC-MAIN-20220702162147-20220702192147-00352.warc.gz
|
CC-MAIN-2022-27
| 2,029
| 8
|
https://pynamibia.org/
|
code
|
This is the website of the Python Society in Namibia.
Just in case you stumbled on this site:
Python is one of the most popular programming languages in the world, suitable for a range of computing tasks. If you have any interest in learning to program a computer, we highly recommend you check it out.
Namibia is an African country. The country is located in the western side of Africa on the Atlantic Ocean, just above South Africa. With a small population, the programming community here is small, but vibrant and growing.
If you are a Namibian, or living in Namibia, and you're interested in learning how to program, this society is definitely for you. Please contact us if you're interested in finding out more about joining our society.
For those of you who are members of the society already, the website will keep you up to date on the latest things happening in our society.
If you're not in Namibia, but interested in anything 'Python' in Namibia, you'll find some information here. You may be interested in the Namibia Pycon, our annual python conference.
We have a strong focus on teaching school kids to program. In Namibia this is still an enormous challenge for many kids, who have extremely limited access to computers. For more on that, please check out our scholars page.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201885.28/warc/CC-MAIN-20190319032352-20190319054352-00519.warc.gz
|
CC-MAIN-2019-13
| 1,289
| 8
|
http://darrenmothersele.com/
|
code
|
Hi, I'm Darren Mothersele, I've been doing Drupal full time for over 6 years now. I architect complete Drupal-based solutions, troubleshoot Drupal sites, optimise Drupal setups, and develop Drupal modules. I also created the Cyril programming language for live coding.
I've toyed with deleting my Facebook account before, and today I finally did it. I want the web to be a better place, and this is my contribution towards that.
I needed a simple way to submit data to a server using C++, this example shows how you can make use of the Poco libraries provided in openFrameworks to simplify this task.
There have been many hacks posted online over the past few years that show how to build a simple EEG machine using the Mattel MindFlex headset.
It's simple to interface this with the Arduino to read the basic single signal EEG data the toy produces. The toy actually only uses one of the measures (attention) but it outputs various useful bits of information.
The MindFlex toy includes a headset that reads EEG wave data. There's lots of information on hacking this toy to create a simple EEG machine using the limited data the headset provides by default. In this project I have extracted the full RAW EEG data using the same toy headset from the MindFlex game.
I presented yesterday at the July edition of the "Untangle the Web" meetup being held at the Google Campus in London. When I was invited to speak, I was asked to give an introductory talk about Drupal and what kind of things it's good for. To do this, I decided to talk about how I was introduced to Drupal, how it's developed over the years, metadata and future-friendly content, and a preview of what's coming in the next version of Drupal.
Here are the slides from the presentation I gave last night at the Drupal Show and Tell event in London. Apologies for the background as came out a bit weird after I converted to PDF and uploaded to slideshare.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164030159/warc/CC-MAIN-20131204133350-00047-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 1,917
| 8
|
https://godotengine.org/qa/137744/bad-comparison-function-sorting-will-be-broken
|
code
|
I assume this is supposed to be a
sort_custom() function for an
Array (as documented here)?
If so, the docs show the function should be
Using your function as-is seems to work for me - after making it static. However, I don't really understand what you're doing.
You seem to be trying to sort an
Array's that contain some sort of object that has
get_width() functions (such as an
Further, you're basing the sort decision on
get_width() results of the 2nd element in the array. Again, not sure of the intention here, but the above does seem to work for me (or, at least generates a modified order for my random array and does not generate the error you reported).
If the above doesn't help, perhaps a more detailed explanation, along with some more code that shows how you're setting up and calling the custom sort.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943746.73/warc/CC-MAIN-20230321193811-20230321223811-00634.warc.gz
|
CC-MAIN-2023-14
| 814
| 11
|
https://mecce.ca/team_member/dr-natalia-amelina/
|
code
|
Dr. Natalia Amelina
UNESCO International Institute for Information Technologies in Education
Natalia Amelina represents MECCE Partner, UNESCO IITE as part of the Knowledge Mobilization Working Group. She is the Senior National Project Officer and Chief of the Unit of Teacher Professional Development and Networking at UNESCO IITE. UNESCO IITE promotes the innovative use of Information and Communications Technology (ICT) and serves as a facilitator and enabler for achieving Sustainable Development Goal 4 (SDG 4) through ICT-enabled solutions and best practices. The IITE is the only UNESCO category 1 institute that holds a global mandate for ICT in education.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648850.88/warc/CC-MAIN-20230602172755-20230602202755-00795.warc.gz
|
CC-MAIN-2023-23
| 664
| 3
|
http://www.geekstogo.com/forum/topic/226152-40-minutes-to-boot-an-xp-machine/
|
code
|
Here's what happens when you power up:
first the splash screen from the motherboard maker (ASUS P4P800S) comes up and stays on the screen for 4 minutes.
Next, I get a screen asking me to select an operating system. It stays here for 2 minutes. My choices are,
Windows recovery Console, and
Windows XP Home edition
(I should mention that the computer does not respond to any keyboard entry.)
The Windows startup screen comes up for less than 1 minute and then the screen goes black. No cursor.
After 17 minutes, the Windows log-in screen comes up. I enter my login and I get a blank blue screen with a mouse pointer. The computer does not respond to the ENTER key or to any of the mouse buttons.
Finally, after another 17 minutes (is that significant), my windows desktop appears and I can use the machine as usual.
In total, it takes 40 minutes from power-up to my desk top!
Any help would be GREATLY appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741192.34/warc/CC-MAIN-20181113020909-20181113042909-00512.warc.gz
|
CC-MAIN-2018-47
| 913
| 11
|
http://mikro.naprvyraz.sk/mint/201204/msg00029.html
|
code
|
David Sandberg wrote:
Is it possible to provide this article on a free download pool, or here in the mailinglist? or in any Atari board?
I asked SDJ's editor, and as a special case for us, the answer is yes :-) You can download the full magazine for free on my website: http://vincent.riviere.free.fr/articles/gcc-new-target/ Enjoy! -- Vincent Rivière
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00603.warc.gz
|
CC-MAIN-2022-40
| 352
| 3
|
https://www.codechef.com/problems/TALCA
|
code
|
Lowest Common Ancestor
All submissions for this problem are available.
Read problems statements in Mandarin Chinese.
In a rooted tree, the lowest common ancestor (or LCA for short) of two vertices u and v is defined as the lowest vertex that is ancestor of both that two vertices.
Given a tree of N vertices, you need to answer the question of the form "r u v" which means if the root of the tree is at r then what is LCA of u and v.
The first line contains a single integer N. Each line in the next N - 1 lines contains a pair of integer u and v representing a edge between this two vertices.
The next line contains a single integer Q which is the number of the queries. Each line in the next Q lines contains three integers r, u, v representing a query.
For each query, write out the answer on a single line.
- 1 ≤ N, Q ≤ 100
- 1 ≤ N, Q ≤ 105
- There is less than 10 unique value of r in all queries
- 1 ≤ N, Q ≤ 2 × 105
Input: 4 1 2 2 3 1 4 2 1 4 2 2 4 2 Output: 1 2
- "1 4 2": if 1 is the root, it is parent of both 2 and 4 so LCA of 2 and 4 is 1.
- "2 4 2": the root of the tree is at 2, according to the definition, LCA of any vertex with 2 is 2.
|Tags||lca, ltime14, medium-hard, tree, tuananh93|
|Time Limit:||3 sec|
|Source Limit:||50000 Bytes|
|Languages:||C, CPP14, JAVA, PYTH, PYTH 3.6, CS2, PAS fpc, PAS gpc, RUBY, PHP, GO, NODEJS, HASK, SCALA, D, PERL, FORT, WSPC, ADA, CAML, ICK, BF, ASM, CLPS, PRLG, ICON, SCM qobi, PIKE, ST, NICE, LUA, BASH, NEM, LISP sbcl, LISP clisp, SCM guile, JS, ERL, TCL, PERL6, TEXT, PYP3, CLOJ, FS|
Fetching successful submissions
If you are still having problems, see a sample solution here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145713.39/warc/CC-MAIN-20200222180557-20200222210557-00068.warc.gz
|
CC-MAIN-2020-10
| 1,647
| 21
|
https://www.slideserve.com/amable/200
|
code
|
Characters Who Says? Irony More Characters Plot 100 100 100 100 100 200 200 200 200 200 300 300 300 300 300 400 400 400 400 400 500 500 500 500 500
Dynamic character who changes from plain and unable to express her love to warm, loving and self-sacrificing.
A person is either with this court or he must be counted against it.
Now the little crazy children are jangling the keys of the kingdom.
Irony is the result to this person remaining silent at the end of the play.
Irony is created because the court listens to and believes these witnesses.
Irony is created when this person calls Rev. Parris a “brainless man.”
Irony is created when this most holy person is hanged while the most evil character goes free.
This character is fired from the Proctor household for being a “whore.”
Proctor shows his need for a little more spice in life when he does this.
Proctor ends up hanging because he cannot bring himself to do this.
Proctor shows his disdain for Rev. Parris when he refuses to do these two things.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656737.96/warc/CC-MAIN-20230609132648-20230609162648-00256.warc.gz
|
CC-MAIN-2023-23
| 1,016
| 12
|
https://www.forexfactory.com/showthread.php?p=12230810
|
code
|
DislikedHi nondisclosure00: Thanks for posting these tools. Very helpful thus far. Got them installed and working on Windows 10. The EA writes the data to the excel file just fine as long as the datafile remains untouched. If I reference the cells that are receiving the "put" values from another tab in the worksheet, the updates stop with the following recorded to the log file: Error on PutDouble_Cell: System.Runtime.InteropServices.COMException (0x800AC472): Exception from HRESULT: 0x800AC472 at System.RuntimeType.ForwardCallToInvokeMember(String memberName,...Ignored
1. This happens because, technically, when the DLL is calling excel, it's using the UI thread of excel (except when opening the workbook; there's only 1 thread for excel you can have when opening the work book). I didn't build a multi-threaded dll for use when I created this. I was 'in a hurry'. So I left out the multi threaded aspect along with error checking.
2. No. I left it out due time constraints.
If you're curious about the source code, take a look at it here: https://github.com/Nondisclosure/MT4toExcel
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578529606.64/warc/CC-MAIN-20190420100901-20190420122901-00221.warc.gz
|
CC-MAIN-2019-18
| 1,091
| 4
|
https://www.instyle.com/news/sink-your-teeth-sarah-jessica-parker-shark-fan
|
code
|
Sink Your Teeth into This: Sarah Jessica Parker Is a Shark Fan
Calling all shark lovers—you have a celebrity fan in your midst!
Last week, Sarah Jessica Parker, with 11-year-old son James Wilkie Broderick in tow, gave her off-duty look a playful (or terrifying, depending on how you look at it) spin and coupled her cuffed denim jeans with a Jaws-inspired sketch of a tee. She completed the outfit with her usual eclectic assortment of jewelry and a python Zagliani tote.
Whether the tee was her sartorial decision or her son's influence we may never know, but we love that it gives her look an unexpected bite—and just in time for Sharknado Week too! To celebrate the July 30 premiere of Sharknado 2: The Second One, Syfy is dedicating a week's worth of shark-tastic movies on its channel, starting from July 26. Make that two weeks—the Discovery Channel is hosting Shark Week 2014 starting August 10.
That's a whole lot of shark in the near future. So take a cue from SJP and sink your teeth into any thrashin' cool shark-centric merch.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488556482.89/warc/CC-MAIN-20210624171713-20210624201713-00546.warc.gz
|
CC-MAIN-2021-25
| 1,044
| 5
|
https://www.datamarket.com.tr/en/our-solutions/cloud-solutions/vmware-cloud-on-aws/
|
code
|
VMware Cloud on AWS is a service that enables users to run AWS services on vSphere –based cloud environments. This service is supported by VMware Cloud Foundation and it integrates vSphere, Vsan and NSX with VMware yCenter, thus optimised to work in the infrastructure of special, flexible and bare-metal AWS. With VMware Hybrid Cloud Extension, customers can easily and rapidly execute big-scale, double-sided passing between on premises and VMware Cloud. IT teams can now achieve instant business value from AWS and VMware hybrid cloud use, thanks to the same architecture and operational experience that is designed in the same way as the on-premises and public cloud.
Why Choose VMware Cloud on AWS?
In Which Scenarios Can You Use VMware on AWS?
VMware Cloud on AWS has recently been put into use in AWS Europe (Frankfurt) Region along with AWS Europe (London), AWS USA East (N. Virginia), and AWS West (Oregon). VMware Cloud on AWS is ready for GDPR that holds a series of important industry certificates. Furthermore, it has various capabilities that enable customers to improve enterprise deployment, accelerate cloud relay, and simplify hybrid cloud deployments. It protects your already familiar VMware tools, policies and management and investments in third-party tools by transferring on-premises data centres to the cloud with a consistent operational model. You can benefit from AWS services by extending the value of enterprise applications throughout their lifecycle. VMware is working to move VMware on AWS to new AWS zones and to ensure greater availability over time.
Stop worrying about technology issues. Just focus on your work. Let us determine and manage the technology you need for you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00181.warc.gz
|
CC-MAIN-2022-33
| 1,712
| 5
|
https://help.regpack.com/hc/en-us/articles/5834354926619-API-Terms-of-Service
|
code
|
Regpack, Inc., and its subsidiaries (collectively, “Regpack”) will enter into this agreement with the “Licensee” to provide access to Regpack’s Open API. The policies are outlined below (hereafter the “Agreement”). The effective date of this agreement is the date payment for API admin is approved. If your organization is a new Licensee, then this Agreement will be effective as of January 31, 2022. If your organization is an existing Licensee, this agreement will be effective as of January 31, 2022.
By accepting this Agreement, either by accessing or using the API, or authorizing or permitting any individual to access or use the API, You agree to be bound by this Agreement.
If You are entering into this Agreement on behalf of a company, organization or another legal entity (an “Entity”), You are agreeing to this Agreement for that Entity and representing to Regpack that You have the authority to bind such Entity and its Affiliates to this Agreement, in which case the terms “Licensee”, “You”, “Your” or a related capitalized term herein shall refer to such Entity and its Affiliates. If You do not have such authority, or if You do not agree with this Agreement, You must not accept this Agreement and may not access nor use the API.
API - means an API and any accompanying or related documentation, source code, SDKs, executable applications and other materials made available by Regpack, including, without limitation, through its API Docs.
Applications - mean paid or unpaid web or other software services, applications, or Themes developed by Licensee that utilize or interact with the API or otherwise interact with the Services and are authorized to be Published pursuant to this Agreement.
Intellectual Property Rights - means patents, inventions, copyrights, trademarks, domain names, trade secrets, know-how and any other intellectual property and/or proprietary rights.
Internal Use - means the use of the API in connection with Licensee’s subscription to a Service for Licensee’s internal business purposes in accordance with the Service Agreement.
Marks - mean Regpack® and Regpack’s other product and service names, trademarks, service marks, branding and logos made available for use in connection with the APIs pursuant to this Agreement.
Payment Processor - means the third party payment processor that processes fees related to a Paid Application.
Publish/Published/Publishing - means the making of any Application available to any Subscriber other than Licensee or for any purpose other than for use by Licensee as a Subscriber for Internal Use.
Subscriber - means and refers to an individual or an Entity that has agreed to a Service Agreement for use of our Services.
Themes - means Applications that allow Subscribers to present customized or non-default appearances and functionality within Regpack Guide or help center functionality.
2. PURPOSE AND LICENSE
2.1 This Agreement and any and all restrictions and policies implemented by Regpack from time to time with respect to the API as set forth in the Documentation (“General API Policies”) govern Licensee’s rights to use and access the API for the purpose of developing, implementing and Publishing Applications. Licensee’s access to and use of the API for Internal Use is governed by the Service Agreement found here and the General API Policies and docs.
2.2 Subject to this Agreement, including the restrictions set forth in Section 3, Regpack grants to Licensee a non-exclusive, non-transferable, non-sublicensable, worldwide, revocable right and license during the Term (as defined in Section 12) to: (a) use and make calls to the API to develop, implement and distribute Applications solely for use by Subscribers in connection with the Services; (b) use and display the Marks only to identify that the Service Data originates from Regpack.
2.3 Licensee grants to Regpack a non-exclusive, worldwide, fully paid-up, royalty-free license, for as long as its Applications are Published to a Marketplace to: (a) market, sell, distribute, use, perform, and display such Applications; and (b) permit others to access, install, purchase and (in the case of downloadable software applications) download such Applications through the Marketplace. Licensee further grants to Regpack a non-exclusive, worldwide, fully paid-up, royalty-free license, during the Term, to use Licensee’s name, Application name(s) and associated logos (collectively, “Licensee Marks”) solely to enable Regpack to exercise its rights and perform its obligations under this Agreement. Any use of Licensee’s Marks shall be in accordance with Licensee’s reasonable trademark usage policies if such policies are communicated to Regpack.
2.4 Regpack shall have, and Licensee hereby grants to Regpack, a royalty-free, fully paid-up, worldwide, transferable, sub-licensable, irrevocable and perpetual license to implement, use, modify, commercially exploit, incorporate into any of Regpack’s products or services (including the Services and/or the API) and/or otherwise use in any manner any suggestions, enhancement requests, recommendations or other feedback Regpack receives from Licensee.
3. RESTRICTIONS AND RESPONSIBILITIES
The licenses granted in Section 2 of this Agreement are explicitly conditioned on Licensee’s adherence to the following restrictions and compliance with its responsibilities as set forth herein.
3.2 In order to use and access the API, Licensee must obtain API credentials (a “Token”) by becoming a Subscriber. Tokens can only be obtained and accessed by purchase of a Regpack API Admin on an annual basis. Licensee may not share its Token with any third party, shall keep such Token and all Login information secure, and shall use the Token as Licensee’s sole means of accessing the API.
3.3 Licensee’s Applications shall not substantially replicate products or services offered by Regpack, including, without limitation, functions or clients on platforms (such as iOS or Android) where Regpack offers its own client or function. Subject to the preceding sentence and the parties’ other rights and obligations under this Agreement, each party agrees that the other party may develop and publish applications that are similar to or otherwise compete with such party’s applications. Applications may not use or access the API or a Service in order to monitor the availability, performance, or functionality of any of the API or a Service or for any similar benchmarking purposes.
3.4 Applications shall not, in any manner, display any form of advertising within or connected to any Service Data received by any Subscriber, Agent or End-User.
3.5 Licensee shall not, under any circumstances, through Applications or otherwise, repackage or resell the Services, or any part thereof, API or Service Data. Licensee shall not use or assist a third party in using the API or any Software in such a way to circumvent the requirement for an individual Agent Login for each individual who (a) leverages the Services to interact with End-Users; (b) Processes data related to interactions with End-Users; or (c) absent a license from Us otherwise, Processes data related to interactions originating from a Non-Regpack Service that provides functionality similar to functionality provided by the Services and which would, pursuant to this Agreement, require an individual Agent Login if utilizing the Services for such interaction. Further, Licensee shall not use or assist a third party in using the API or any Software in such a way to circumvent applicable Regpack Service Agreement restrictions or Agent licensing restrictions that are enforced in the Service user interface. Licensee is not permitted to use the API or any Service Data in any manner that does or could potentially undermine the security of the Services, the API, Service Data or any other data or information stored or transmitted using the Services. In addition, Licensee shall not, and shall not attempt to: (a) interfere with, modify or disable any features, functionality or security controls of the Services or the API, (b) defeat, avoid, bypass, remove, deactivate or otherwise circumvent any protection mechanisms for the Service or the API, or (c) reverse engineer, decompile, disassemble or derive source code, underlying ideas, algorithms, structure or organizational form from the Services or the API.
3.6 Licensee acknowledges that Licensee is solely responsible, and that Regpack has no responsibility or liability of any kind, for the content, development, operation, support or maintenance of Applications. Without limiting the foregoing, Licensee will be solely responsible for (a) the technical installation and operation of its Applications; (b) creating and displaying information and content on, through or within its Applications; (c) ensuring that its Applications do not violate or infringe the Intellectual Property Rights of any third party; (d) ensuring that Applications are not offensive, profane, obscene, libelous or otherwise illegal; (e) ensuring that its Applications do not contain or introduce Malicious Software into a Service, an API, any Service Data or other data stored or transmitted using the Service; (f) ensuring that its Applications are not designed to or utilized for the purpose of spamming any Regpack subscribers, Agents or End-Users; and (g) ensuring that its Applications do not violate any applicable law or third party right.
3.7 Licensee will respect and comply with the technical and policy-implemented limitations of the API and the restrictions of this Agreement in designing and implementing Applications. Without limiting the foregoing, Licensee shall not violate any explicit rate limitations on calling or otherwise utilizing an API.
3.8 Licensee shall not make any modifications to any Service Data, other than as reasonably necessary to modify the formatting of such Service Data in order to display it in a manner appropriate for the pertinent Applications.
3.9 Licensee agrees that Regpack may perform periodic vulnerability assessments, penetration testing and scanning (collectively, “Security Assessment”) of any Application developed by Licensee, in accordance with the following principles: (i) Security Assessments will be carried out in such a manner as to reasonably avoid disruption in the use of the Application by Subscribers. Despite the foregoing, Security Assessments may in rare cases cause downtime or other adverse effects on the Application or Licensee’s systems; (ii) Regpack is not required to provide notice to Licensee prior to any Security Assessment. Licensee agrees to cooperate reasonably with such Security Assessments. Licensee agrees that Regpack, its employees, and contractors shall not be liable to Licensee, Subscribers or any third party for damages or losses arising in connection with Security Assessments performed in accordance with this Section 3.9. Regpack conducts such Security Assessments for its own benefit and Licensee may not rely on, publicly disclose or promote the successful Application passage of such evaluation. If the Application, in whole or in part, runs outside of Regpack’s systems, the Security Assessment may include remote application-level security testing of the Application, and network-level security testing including a vulnerability threat assessment. Regpack may conduct such testing itself or through a third party.
4. REPRESENTATIONS, WARRANTIES AND COVENANTS
4.2 Licensee represents, warrants and covenants that (a) its Applications and Licensee Marks, the use of such Applications by its users, and the activities with respect to such Applications and Licensee Marks undertaken by Regpack in accordance with the terms of this Agreement, do not and will not violate, misappropriate or infringe upon the Intellectual Property Rights of any third party; (b) Licensee will comply with all applicable local, state, national and international laws and regulations, including, without limitation, all applicable export control laws, and maintain all licenses, permits and other permissions necessary to develop, implement and Publish its Applications; (c) its Applications do not and will not contain or introduce any Malicious Software into the Service, the API, any Service Data, or other data stored or transmitted using the Service; (d) its Applications are not designed to or utilized for the purpose of spamming any Subscribers, Agents or End-Users; and (e) it has all right, power and authority to grant the licenses granted to Regpack herein;.
4.3 Licensee represents, warrants and covenants that it will include the mandatory terms of service provisions listed in Section 4.4 below (“Mandatory Service Terms”) in the terms of service (“App Terms of Service”) that govern use of its Applications by Subscribers. Such Mandatory Service Terms are a minimum set of provisions and Licensee may have more exhaustive App Terms of Service. Licensee may change the term references to match the terms used in its App Terms of Service.
Subject to the limited licenses expressly provided in this Agreement, nothing in this Agreement transfers or assigns to Regpack any of Licensee’s Intellectual Property Rights in its Applications or Licensee’s Marks or other technology, and nothing in this Agreement transfers or assigns to Licensee any of Regpack’s Intellectual Property Rights in the Services, the API, the Marks, or Regpack’s other technology or the respective Intellectual Property Rights in any Service Data of Regpack or its Subscribers, Agents or End-Users.
This Agreement does not entitle Licensee to any support for the Services or the API, unless Licensee makes separate arrangements with Regpack for such support. Licensee is solely responsible for providing all support and technical assistance to End-Users of its Applications and Subscribers who access, deploy and/or purchase its Applications. Licensee acknowledges and agrees that Regpack has no obligation to provide support or technical assistance to the users of Applications and Licensee shall not represent to any such users that Regpack is available to provide such support. Licensee agrees to use commercially reasonable efforts to provide reasonable support to users of its Applications.
Licensee may from time to time, gain access to Confidential Information. Licensee may use Confidential Information only to the extent necessary to exercise its rights under this Agreement. Subject to the express permissions set forth herein, Licensee may not disclose Confidential Information to a third party without the prior express consent of Regpack, provided in writing or by email. Without limiting any other obligation of Licensee under this Agreement, Licensee agrees that it will protect Confidential Information, as defined in the Regpack DPA, from unauthorized use, access, or disclosure or in the same manner that Licensee would use to protect its own confidential and proprietary information of a similar nature and in any event with no less than a reasonable degree of care.
9. DISCLAIMER OF WARRANTIES
ALL ASPECTS OF THE SERVICES AND THE API, INCLUDING ALL SERVER AND NETWORK COMPONENTS ARE PROVIDED ON AN “AS IS” AND “AS AVAILABLE” BASIS, WITHOUT ANY WARRANTIES OF ANY KIND TO THE FULLEST EXTENT PERMITTED BY LAW, AND REGPACK EXPRESSLY DISCLAIMS ANY AND ALL WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, TITLE, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. YOU ACKNOWLEDGE THAT REGPACK DOES NOT WARRANT THAT THE SERVICE OR API WILL BE UNINTERRUPTED, TIMELY, SECURE, ERROR-FREE OR FREE FROM VIRUSES OR OTHER MALICIOUS SOFTWARE, AND NO INFORMATION OR ADVICE OBTAINED BY YOU FROM REGPACK OR THROUGH THE SERVICE SHALL CREATE ANY WARRANTY NOT EXPRESSLY STATED IN THIS AGREEMENT.
10. LIMITATION OF LIABILITY
10.1 EXCEPT FOR LICENSEE’S INDEMNIFICATION OBLIGATIONS, UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY (WHETHER IN CONTRACT, TORT, NEGLIGENCE OR OTHERWISE) WILL EITHER PARTY TO THIS AGREEMENT, OR THEIR AFFILIATES, OFFICERS, DIRECTORS, EMPLOYEES, AGENTS, SUPPLIERS OR LICENSORS BE LIABLE TO THE OTHER PARTY OR ANY THIRD PARTY FOR ANY LOST PROFITS, LOST SALES OR BUSINESS, LOST DATA, BUSINESS INTERRUPTION, LOSS OF GOODWILL, OR FOR ANY TYPE OF INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, CONSEQUENTIAL OR PUNITIVE LOSS OR DAMAGES, OR ANY OTHER LOSS OR DAMAGES INCURRED BY SUCH PARTY OR THIRD PARTY IN CONNECTION WITH THIS AGREEMENT, THE API OR THE SERVICES, REGARDLESS OF WHETHER SUCH PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF OR COULD HAVE FORESEEN SUCH DAMAGES.
10.2 NOTWITHSTANDING ANYTHING TO THE CONTRARY IN THIS AGREEMENT, REGPACK’S AGGREGATE LIABILITY TO LICENSEE OR ANY THIRD PARTY ARISING OUT THIS AGREEMENT, SHALL IN NO EVENT EXCEED ONE HUNDRED U.S. DOLLARS ($100.00). ANY CLAIM ARISING OUT OF OR RELATING TO THIS AGREEMENT MUST BE BROUGHT WITHIN ONE (1) YEAR OF THE FIRST EVENT OR OCCURRENCE GIVING RISE TO THE CLAIM.
10.3 Some jurisdictions do not allow the exclusion of implied warranties or limitation of liability for incidental or consequential damages, which means that some of the above limitations may not apply to Licensee. IN THESE JURISDICTIONS, REGPACK’S LIABILITY WILL BE LIMITED TO THE GREATEST EXTENT PERMITTED BY LAW. The limitations set forth in this Section 10 will survive and apply even if any limited remedy specified in this Agreement is found to have failed of its essential purpose
Licensee will indemnify and hold Regpack harmless against any claim brought by a third party against Regpack arising from or related to any breach of an obligation, representation, warranty, covenant or other provision of this Agreement by Licensee or any matter which Licensee has expressly agreed to be responsible pursuant to this Agreement.
12. TERM AND TERMINATION
This Agreement shall commence on the Effective Date and will remain in effect until terminated pursuant to this Section 12 (the, “Term”). Regpack may terminate this Agreement at any time, for any reason, or for no reason including, but not limited to, if Licensee violates any provision of this Agreement. Any termination of this Agreement shall also terminate the licenses granted to Licensee hereunder. Upon termination of this Agreement for any reason, Licensee shall cease using, and either return to Regpack, or destroy and remove from all computers, hard drives, networks, and other storage media, all copies of any materials licensed pursuant to this Agreement and any Confidential Information in Licensee’s possession, and shall certify to Regpack that such actions have occurred. Sections 3, 4, 6, 8-15 shall survive termination of this Agreement.
13. ASSIGNMENT; ENTIRE AGREEMENT; REVISIONS
13.1 Licensee may not, directly or indirectly, by operation of law or otherwise, assign all or any part of this Agreement or Licensee’s rights under this Agreement or delegate performance of Licensee’s duties under this Agreement without Regpack’s prior consent, which consent will not be unreasonably withheld. Regpack may, without Licensee’s consent, assign this Agreement to any Affiliate or in connection with any merger or change of control of Regpack or the sale of all or substantially all of its assets provided that any such successor agrees to fulfill its obligations pursuant to this Agreement. Subject to the foregoing restrictions, this Agreement will be fully binding upon, inure to the benefit of and be enforceable by the parties and their respective successors and assigns.
If any provision in this Agreement is held by a court of competent jurisdiction to be unenforceable, such provision shall be modified by the court and interpreted so as to best accomplish the original provision to the fullest extent permitted by law, and the remaining provisions of this Agreement shall remain in effect.
15. RELATIONSHIP OF THE PARTIES
The parties are independent contractors. This Agreement does not create a partnership, franchise, joint venture, agency, fiduciary or employment relationship among the parties.
All notices to be provided by Regpack to Licensee under this Agreement may be delivered in writing (a) by nationally recognized overnight delivery service (“Courier”) or U.S. mail to the contact mailing address provided by Licensee to Regpack; or (b) electronic mail to the electronic mail address provided for the Account owner related to Your subscription to the Service. Licensee must give notice to Regpack in writing by Courier or U.S. Mail to the following address: Regpack, Inc., Attn: Legal Department, 530 B Street - Suite 1500, San Diego, CA 92101. All notices shall be deemed to have been given immediately upon delivery by electronic mail, or if otherwise delivered upon receipt or, if earlier, two (2) business days after being deposited in the mail or with a Courier as permitted above.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816977.38/warc/CC-MAIN-20240415111434-20240415141434-00023.warc.gz
|
CC-MAIN-2024-18
| 20,972
| 48
|
https://community.nxp.com/thread/498443
|
code
|
I am trying to understand how to write platform, codec, and machine drivers for ALSA SoC. I will be using the SSI platform driver written by Freescale, my own codec driver, and will link the two in a machine driver. I am having some trouble understanding the PCM formats given by the SNDRV_PCM_FMTBIT_* definitions and how to correctly set the PCM format field in snd_soc_dai_driver structures. I tried looking elsewhere online but unfortunately a lot of the documentation related to ALSA is either ambiguous or just non existent.
- What is the meaning of big-endian and little-endian in the SNDRV_PCM_FMTBIT_* definitions? Is it a statement about how multi-byte PCM data is stored in memory? Is it a statement about the order in which bytes are sent across an audio interface such as I2S? Is it a statement about the order in which bits are sent across an audio interface such as I2S?
- The Linux SSI driver written by Freescale says the following in a comment about PCM format: "The SSI has a limitation in that the samples must be in the same byte order as the host CPU. This is because when multiple bytes are written to the STX register, the bytes and bits must be written in the same order." Is this saying that if a multi-byte PCM data value is stored in big-endian in memory then it will be written to the STX register with the most significant byte in the lower end of the register?
- The codec that I am using requires data over I2S to be sent most significant bit first with multi-byte data sent in big-endian. The data will be stored in big-endian within the codec. Because of this, I set the PCM data format as big-endian in the snd_soc_dai_driver structure of my codec driver. I noticed that the Linux SSI driver written by Freescale sets the PCM data format as little-endian in its snd_soc_dai_driver. Will there be a fundamental incompatibility in the snd_soc_dai_link structure of my machine driver that connects SSI and the codec?
- According to the SSI section of the i.MX6 Quad reference manual, there doesn't seem to be a restriction as to whether or not PCM data has to be signed or unsigned. However, the Linux SSI driver written by Freescale sets the format to only signed when setting up its snd_soc_dai_driver structure. Why is this?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740929.65/warc/CC-MAIN-20200815154632-20200815184632-00050.warc.gz
|
CC-MAIN-2020-34
| 2,259
| 5
|
https://blenderartists.org/t/baking-texture-from-high-to-low-poly-problems/1317562
|
code
|
Hey guys. So basically I run into problems with baking from high to low poly. Long story short: I have 3D scans that I fixed, then using RetopoFlow add-on I created another low poly object. I didn’t move characters, leaving both low and high poly objects on top of each other for baking. As it is mentioned in the following tutorial I unwrapped the low poly object and baked the texture according to instructions.
However, the result is far even from mediocre. What could be my mistake?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153816.3/warc/CC-MAIN-20210729043158-20210729073158-00527.warc.gz
|
CC-MAIN-2021-31
| 488
| 2
|
https://campusbuilding.com/j/security-assurance-technical-program-manager-4314/
|
code
|
Security Assurance - Technical Program Manager at Amazon
Security Assurance - Technical Program Manager Details
Nov. 8, 2018, 8:15 a.m.
Product and Program Management
Architecture Readiness team Amazon Web Services
Are you interested in driving exceptional security for customers? Do you have a passion for cutting edge technologies? Do you see compliance as a business enabler? Amazon Web Services (AWS) business is rapidly expanding its global presence and we are looking for a highly motivated security Assurance Program Manager to help lead our Security Assurance Engineering and Architecture Readiness team. As part of the AWS Security Assurance team, this role will build the bridges between security, technology and compliance by working directly with our AWS service teams, infrastructure teams, security teams, and related Amazon corporate teams. This candidate should be a technically experienced and an innovative security/compliance professional who has the ability to dive deep into a variety of complex architectures, understand IT processes, and map product offerings to existing and emerging compliance standards. The role will help drive and scale the engineering and architecture readiness program
·Bachelor's Degree in Informatics, Computer Science, Information Systems Management, Mathematics, Accounting/Auditing, or other related fields. ·3+ years of experience in project/program management in a technical field ·3+ years of experience in security or compliance consulting or advisory work in support of a highly technical environment. · 3+ years of experience in performing and/or participating in technical assessments of complex IT architecture ·3+ years of experience developing and maintaining stakeholder relationships across large organizations.· Experience in performing and/or participating
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816070.70/warc/CC-MAIN-20240412194614-20240412224614-00033.warc.gz
|
CC-MAIN-2024-18
| 1,828
| 7
|
http://deficis.gneu.org/tag/steam-powered/
|
code
|
In January 2011, the Global Game Jam allowed three friends and me to build a pretty neat game about the end of life… Farewell. It was simplistic, built on top of UDK and provided little direction to the user. Although we considered it a learning experience and did our best to deliver on the theme of the Jam, something was missing… it didn’t quite gel.
In March 2014 Epic decided to drop a bomb on the game development community, opening up the UE4 source code, documentation, support and centuries worth of developer experience to hobbyist game developers. This has changed the industry in ways that we likely haven’t even realized yet.
This move inspired a friend and me to try and build something small, and after vetting a number of our ideas Exodus was born. Building on the ideas & concepts from Farewell, we delivered three heavily travelled builds – To date there have been 13084 downloads. Continue reading Initial Release & Thank you letter =)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690035.53/warc/CC-MAIN-20170924152911-20170924172911-00361.warc.gz
|
CC-MAIN-2017-39
| 964
| 3
|
https://getcone.org/plugins-and-extensions-in-open-source-package-managers/
|
code
|
Plugins and extensions serve as the transformative elements that empower open-source package managers to go beyond their default capabilities. By bridging the gap between generic functionality and specific workflow requirements, plugins, and extensions can drastically reduce the time and effort associated with managing dependencies and streamlining development processes. This flexible infrastructure is one of the main attractions in utilizing open-source package managers, allowing users to escape the one-size-fits-all approach and instead tailor the tooling to their project’s specific context and needs.
Customizability is a hallmark of plugins and extensions, enabling developers to plug into the package manager and implement a diverse array of features. These can range from performance optimization and interface customization to enhanced security audits and seamless integration with continuous integration/continuous deployment (CI/CD) pipelines. For instance, the ability to automate repetitive tasks such as minification of code, image optimization, or even package updates is frequently realized through the use of specialized plugins.
Extensions often play an even more critical role by offering the ability to alter core behaviors or add large-scale features to package managers. They might provide a new way of handling global dependencies, offer a different strategy for version conflict resolution, or introduce a mechanism for better package discovery and management. Some extensions are developed to facilitate easier integration with IDEs (Integrated Development Environments), enabling developers to have a more cohesive and integrated development experience directly from their preferred coding environment.
Some plugins and extensions are developed with the intention of filling security gaps. Developers are increasingly conscious of the vulnerabilities that exist within software dependencies. In response, security-focused plugins have been developed to scan and analyze packages before they are integrated into the codebase, thereby averting the potential inclusion of malicious or compromised code.
The Difference Between Plugins and Extensions
Understanding the nuances between plugins and extensions is important for developers seeking to customize their use of open-source package managers. While both serve to enhance the base functionality provided by these managers, the key differences lie in the scope and integration of the added capabilities.
Plugins are typically smaller, modular pieces of software that latch onto the existing framework of a package manager to introduce specific, often narrowly-focused enhancements or tweaks. For example, a plugin might add a command that allows the user to visualize the dependency tree of a project in a more user-friendly format or it might introduce a new method to handle the local caching of packages for faster retrieval. Plugins generally follow a well-defined contract established by the package manager regarding how they can interact with the system, ensuring they fit into the overall architecture without disrupting its core operations.
On the other hand, extensions can be more ambitious in their objectives—some may fundamentally alter the way a package manager operates, such as changing the resolution strategy for dependency conflicts or implementing an entirely new user interface. They might significantly expand the application’s capabilities or seamlessly bridge the package manager with another system, thus creating a more integrated toolchain. Plugins deliver addons within the confines of the package manager’s design, while extensions might reshape the framework itself to accommodate broader needs or preferences.
Both plugins and extensions are usually built with an interface provided by the core package manager, which gives developers the necessary hooks to integrate their custom functionalities. This interface is carefully designed to maintain stability and consistency within the package manager, ensuring that the introduction of third-party add-ons does not compromise the system’s integrity. Extensions, due to their more extensive nature, often have a deeper level of access to the package manager’s internals, sometimes requiring a more intricate understanding of the underlying system to create and maintain.
Best Practices for Using Plugins and Extensions
Navigating the vast seas of plugins and extensions available to open-source package managers requires a measured approach. Best practices guide developers through this process, ensuring a disciplined operation that maximizes benefits while mitigating potential pitfalls.
The choice to integrate external functionalities via plugins and extensions should always be approached with a strategic mindset. While it might be appealing to install numerous tools with different functionalities, it’s essential to be judicious in this selection. Developers should focus on integrating only those that address specific needs or optimize the development process for their project. Using plugins and extensions that align with project goals and team workflows can help maintain system simplicity and minimize the risk of software bloat, where too many installed components lead to unnecessary complexity and potential performance degradation.
Choosing the right plugin or extension starts with thorough assessment. Developers should scrutinize the provenance of the tool they seek to integrate by considering its popularity, update history, and user feedback. Maintaining active surveillance over these tools is just as important after installation. Monitoring community forums, keeping an eye out for updates, and even participating in discussions about the future of these tools can provide early warning signs for potential issues and ensure that valuable add-ons remain current and beneficial.
Like the software they help manage, plugins and extensions are subject to ongoing development cycles. Developers must regularly update these tools to benefit from performance improvements, bug fixes, and security patches. This is especially critical in the open-source ecosystem, where vulnerabilities can be quickly exposed and exploited. Regular maintenance checks, automated update tools, and subscription to update notifications from the maintainers are all effective strategies for keeping plugins and extensions current.
It is not enough to simply install a plugin or extension; developers must effectively integrate them into the existing development pipeline. Seamless integration means ensuring that any new tool works in concert with other components of the development system, from version control to automated testing to production deployment. This can reduce friction and avoid potential conflicts that might arise from adding new elements into a sophisticated development process.
As users of open-source software, developers have the potential to become contributors to the plugins and extensions they rely on. Reporting bugs, making suggestions for improvements, or even contributing code can significantly enhance the quality and longevity of these tools. This reciprocal interaction between users and maintainers not only supports the collaborative ethos of the open-source model but also fosters a more robust and secure ecosystem of plugins and extensions.
Real-world examples of plugin and extension implementation can be found across a variety of development environments, illustrating their impact on project efficiency and the software development process at large. These case studies often showcase the exceptional value that customizations can provide, particularly when addressing unique or complex challenges.
A Python development team managing a vast data analysis project might turn to pip’s ecosystem to streamline their workflow. They could employ an extension to help manage virtual environments and dependencies for different sub-projects within the larger project structure. This tool could automate the setup of isolated environments, ensuring dependencies are kept consistent across development, testing, and production, eliminating hours of manual setup and greatly reducing the chance of “dependency hell.”
Another potent example can be observed in the use of a plugin designed to optimize containerized application dependencies using Docker. In this scenario, a continuous integration plugin automatically scans and validates the Docker images against known vulnerabilities every time a change is committed to the version control system. Introducing automated security checks significantly improves the security posture of containerized applications and tightly integrates security practices into the development lifecycle.
In mobile application development, extension tools have been used effectively to manage the multitude of dependencies and SDKs required. An Android development team might use a Gradle extension that automatically manages SDK versions, handles library dependencies, and aligns the entire build process with the application’s lifecycle. This kind of deep integration allows the team to focus on developing new features rather than managing the intricacies of build configurations.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948217723.97/warc/CC-MAIN-20240305024700-20240305054700-00453.warc.gz
|
CC-MAIN-2024-10
| 9,230
| 20
|
https://proudcity.com/proudcity-1-25-0-release/
|
code
|
This is primarily a bugfix and contributed module update. There are a few feature updates as well. There is no WordPress Core update in this release. It is immediately available for all ProudCity Hosted sites and for download on Github under the GNU Affero GPL v3 open source license.
What changes will I notice?
This release includes two new widgets: an image list widget, which allows you to creates lists of image card links, similar to the Icon Link widget; and a Contact Info block, which allows you to display custom contact info in the same format as the Department contact info sidebar. We renamed the “Local Services” tab in the Service Center to “My Services”, and made a number of enhancements to Elasticsearch for our customers using this enterprise feature. View the full changelog below.
What’s up next?
Release 1.26.0 will be another large release, both under-the-hood infrastructure updates. The highlight will be the new ProudCity Dashboard, which will let you view analytics, create sub-sites, and manage users across sites seamlessly. Sorry, we were planning on pushing the Dashboard in this release, but decided it would be best to put it through additional testing before we release it into the wild.
Want to see something that isn’t listed here? Tweet it to us. View our full product roadmap.
Version 1.26.0 will be released on March 1, 2017.
Updates and new features
- New Widget: contact info block #822 (hotfix)
- New Widget: Image/link collection #823 (hotfix)
- Change local services to “my services” #858
- Allow custom “Test” bar language #849
- Migrate feeds.proudcity.com #846
- Granicus integration #666
- Allow elasticsearch to serve content lists #866
- Look into spacing between sidebar and main #632
- Fix FB tab #831 (hotfix)
- Agency contact info: tweaks #829 (hotfix)
- Department content displaying under left column #835 (hotfix)
- Change /service-center /app url to /mobile-app #837 (hotfix)
- Cannot upload json files in wp media upload #843 (hotfix)
- Fix url links in agency contact field #839
- Fix closing tag in Dockuments mini list block #862
- Service Center: Make date replace work with number values #855
Hotfixes since previous release
- 1.24.1 Missing div in agency contact info block #835 (wp-proud-agency)
- 1.24.2 Adding Custom contact #822, Image button widgets #823; preparing for new ProudCity Dashboard (wp-proud-core, wp-proud-actions-app, wp-proud-agency, wp-proud-dashboard)
- 1.24.3 fixing remnants of service center changes #837
- 1.24.4 Fixing fatal error with Adding Custom contact widget #822
- 1.24.5 Fixing fatal error with Adding Custom contact widget #822
- 1.24.6 Fixing fatal error with image set list widget #823
- 1.24.7 Cannot upload json files in wp media upload #843 (wp-proud-core)
WordPress Core Update
3rd party plugin updates (e5c7d02)
- duplicate-post 3.0.3 -> 3.1.2
- wordpress-seo 4.2 -> 4.3
- siteorigin-panels 2.4.23 -> 2.4.24
- so-widgets-bundle 1.7.2 -> 1.8.1
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348509264.96/warc/CC-MAIN-20200606000537-20200606030537-00472.warc.gz
|
CC-MAIN-2020-24
| 2,970
| 38
|
https://community.rstudio.com/t/cant-apply-a-different-color-palette-to-geom-contour-filled/65236
|
code
|
Trying to change colors of the representation on the graph, and I get an error that I don't understand.
set.seed(12) df <- expand.grid( x = 0:10 , y = 0:10 ) %>% as.data.frame() %>% bind_cols(data.frame(z = rnorm(121,0,1))) ggplot(df, aes( x=x, y=y, z=z)) + geom_contour_filled() ggplot(df, aes( x=x, y=y, z=z)) + geom_contour_filled() + scale_fill_gradient(low = "blue", high = "red", na.value = NA)
The first graph appears normally. The second graph says
Error: Discrete value supplied to continuous scale. scale_color_gradient throws no error but it also doesn't change the colors of the graph any.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487586239.2/warc/CC-MAIN-20210612162957-20210612192957-00475.warc.gz
|
CC-MAIN-2021-25
| 601
| 4
|
http://www.dbasupport.com/forums/showthread.php?44303-recommended-practice-for-creating-custom-indexes-on-oracle-tables&p=193576
|
code
|
You should create indexes in response to sepcific queries that aren't performing well. The more indexes you create the more likely that Oracle is going to use and index and the higher the cost for maintaining the indexes. As a DBA/Database Programmer you need to decide which indexes will help and which indexes won't help.
There are no Thumb Rules, that we just follow them as standards. As other person replied, we need to analyze SQl's. If you have SQLs that you are getting from sessions. Just make sure you have indexes on most used SQL joins. If not watch the sessions (V$session,V$SQL etc.,) for day or two . Find the SQL's that are used.
There are so many links on metalink.oracle.com that you can search.
Re: recommended practice for creating custom indexes on oracle tables
Originally posted by aj_usa Hi Friends,
Can somebody suggest recommended practice for creating custom indexes on oracle tables ??
What tables specifically and why? If you're talking about objects owned by SYS or SYSTEM, you just don't do it. That's the best practice.
If you're talking about Oracle "applications" - tables owned by APPLSYS - that's another story. There are some naming conventions that are recommended which help during upgrades. Haven't worked on apps for sometime now..
When creating b-tree indexes you need to consider block selectivity e.g. the uniqueness of values within an oracle block. This paper is excellent and contains a script for determining block selectivity.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706890813/warc/CC-MAIN-20130516122130-00049-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,475
| 9
|
http://lists.w3.org/Archives/Public/www-wca/1998OctDec/0021.html
|
code
|
Date: Tue, 15 Dec 1998 11:45:51 -0500 (EST) From: Paul Barford <email@example.com> To: firstname.lastname@example.org cc: Azer Bestavros <email@example.com>, Mark Crovella <firstname.lastname@example.org> Message-ID: <Pine.GSO.3.96.981215113717.1219B-100000@csb> Subject: Paper on Changes in Web Client Access Patterns Hello: The technical report version of the paper "Changes in Web Client Access Patterns: Characteristics and Caching Implications" is now available from the BU technical reports home page: http://www.cs.bu.edu/techreports/ It is listed under TR 98-023. A modified version of this report has been accepted for publication in an upcoming Special issue of the WWW Journal. The abstract follows below. Questions and comments are welcome. PB Title: Changes in Web Client Access Patterns: Characteristics and Caching Implications Authors: Paul Barford, Azer Bestavros, Mark Crovella, and Adam Bradley Date: December 4, 1998 Abstract: Understanding the nature of the workloads and system demands created by users of the World Wide Web is crucial to properly designing and provisioning Web services. Previous measurements of Web client workloads have been shown to exhibit a number of characteristic features; however, it is not clear how those features may be changing with time. In this study we compare two measurements of Web client workloads separated in time by three years, both captured from the same computing facility at Boston University. The older dataset, obtained in 1995, is well-known in the research literature and has been the basis for a wide variety of studies. The newer dataset was captured in 1998 and is comparable in size to the older dataset. The new dataset has the drawback that the collection of users measured may no longer be representative of general Web users; however using it has the advantage that many comparisons can be drawn more clearly than would be possible using a new, different source of measurement. Our results fall into two categories. First we compare the statistical and distributional properties of Web requests across the two datasets. This serves to reinforce and deepen our understanding of the characteristic statistical properties of Web client requests. We find that the kinds of distributions that best describe document sizes have not changed between 1995 and 1998, although specific values of the distributional parameters are different. Second, we explore the question of how the observed differences in the properties of Web client requests, particularly the popularity and temporal locality properties, affect the potential for Web file caching in the network. We find that for the computing facility represented by our traces between 1995 and 1998, (1) the benefits of using size-based caching policies have diminished; and (2) the potential for caching requested files in the network has declined.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267866984.71/warc/CC-MAIN-20180624160817-20180624180817-00639.warc.gz
|
CC-MAIN-2018-26
| 2,873
| 1
|
https://cmake.org/cmake/help/v3.21/prop_tgt/COMPATIBLE_INTERFACE_NUMBER_MAX.html
|
code
|
Properties whose maximum value from the link interface will be used.
COMPATIBLE_INTERFACE_NUMBER_MAX property may contain a list of
properties for this target whose maximum value may be read at generate
time when evaluated in the
INTERFACE variant of the property in all
linked dependees. For example, if a property
FOO appears in the list,
then for each dependee, the
INTERFACE_FOO property content in all of
its dependencies will be compared with each other and with the
property in the depender. When reading the
FOO property at generate
time, the maximum value will be returned. If the property is not set,
then it is ignored.
Note that for each dependee, the set of properties specified in this property must not intersect with the set specified in any of the other Compatible Interface Properties.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652235.2/warc/CC-MAIN-20230606045924-20230606075924-00749.warc.gz
|
CC-MAIN-2023-23
| 803
| 15
|
https://forum.fivem.net/t/fishing/67180
|
code
|
Utilizing the search function…
Hello guys, i made some changes on this script.
What is the diffrent ?
Caught fishes now save in your inventory. ----V1/V2
You can sell your fishes. ----V1/V2
F10 to start fishing (I just wanted to change) ----V1
Added a zone(with blips) to catch fish ! ----V2
Added Different fish species ! ----V2
The sales price decreases according to the fish type ! ----V2
E to start fishing ----V2
https://github.com/EserSahiner/ES_Fishing ----- V…
Hey guys, i publish my first script ! I am so happy :slight_smile: So it’s a script to become a fisherman, it’s just 5 blips in the map : 3 where you can fishing, 1 where can sell and 1 named “Entreprise”, this blips is useless for you but in a futur script i will use it ! You can fishing with all jobs. I use this script with : VDK inventory (Thank’s you !), ply_docks (Thank’s you !), job system (Thank’s you !) and essential mode (Thank’s you !). VDK is required !
Time : 5 hours
You can do as …
Press Z to start fishing
You need to be in water
Press ENTER when bar is green to catch it
Configurable language in lang.lua
Download: File (last version)
Video Preview (ver 0.0.1)<a href="https://i.gyazo.com/1884ed090a70f39b55b73695716e78ae.mp4" rel="nofollow noopener">https://i.gyazo.com/1884ed090a70f39b55b73695716e78ae.mp4</a>
Photo Preview (ver 0.0.3)<a href="http://i.imgur.com/iQdlpy0.png" rel="nofollow noopener">http://i.imgur.com/iQdlpy0.png</a>
Video Preview (Bar anim 0.0.4)<a href="https://i.gyazo.com/bc97f20f0ac2d9d1eebe25f0dbeead9a.mp4" rel="nofollow noopener">https://i.gyazo.com/bc97f20f0ac2d9d1eebe25f0dbeead9a.mp4</a>
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742117.38/warc/CC-MAIN-20181114150002-20181114172002-00118.warc.gz
|
CC-MAIN-2018-47
| 1,629
| 22
|
https://expatriates.stackexchange.com/questions/tagged/accommodation?sort=unanswered
|
code
|
Questions tagged [accommodation]
Questions regarding living quarters, their types, locations, and conditions.
7 questions with no upvoted or accepted answers
How to rent an appartment in Germany as a fresh settler?
When I've arrived to Germany, the first thing I've need to do was to search for an appartment. What striked me, was hard for me to comprehend 'excentrity' of the landlords who required job contract (...
Starting point to find a job and place to live in Sweden while being abroad?
A good friend of mine, who lives in Switzerland, wants to leave her country and move to Sweden. The reasons for this are neither being job related, nor rooted in having a community or friends there ...
Finding an expat relative/friendly forum for the UK
As far as I can understand, this stack is about posting questions relevant to bureaucracy issues and other technicalities. I am looking for other types of advice though. To be exact, I am looking to ...
Moving to Russia from Germany
I (German citizen) have been accepted to a university in St Petersburg and would like to rent an apartment with my girlfriend (Russian citizen). How does this work roughly? What paperwork will be ...
How to find a room in Lille under these conditions?
I am a student who will move to Lille, France from a 3rd world country. I have checked the websites mentioned by the university, websites mentioned by the Campus France, websites on the guide given to ...
Looking for a room in US
I'll be moving from Poland to California for 5 months internship. I was looking for rooms or flats in the area on facebook and craiglist. What I found a little strange is that literally nobody agreed ...
For Malta, are there websites, to help find a partner to rent an apartment with
I am an expat living in Malta. I would like to rent an apartment. Apartments in Malta are expensive. I would like to find someone to share an apartment with. Someone like me, who is fairly new in ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649293.44/warc/CC-MAIN-20230603133129-20230603163129-00302.warc.gz
|
CC-MAIN-2023-23
| 1,947
| 17
|
https://stackoverflow.com/questions/17197259/use-python-to-inject-macros-into-spreadsheets
|
code
|
As I also struggled some time to get this right, I will provide another example which is supposed to work with Excel 2007/2010/2013's
xlsm format. There is not much difference to the example provided above, it is just a little bit more simple without the looping over different files and with more comments included. Besides, the macro's source code is loaded from a textfile instead of hard-coding it in the Python script.
Remember to adapt the file paths at the top of the script to your needs.
Moreover, remember that Excel 2007/2010/2013 only allows to store Workbooks with macros in the
xlsm format, not in
xlsx. When inserting a macro into a
xlsx file, you will be prompted to save it in a different format or the macro will not be included in the file.
And last but not least, check that Excel's option to execute VBA code from outside the application is activated (which is deactivated by default for security reasons), otherwise, you will get an error message.
To do so, open Excel and go to
File -> Options -> Trust Center -> Trust Center Settings -> Macro Settings -> activate checkmark on
Trust access to the VBA project object model.
# necessary imports
import os, sys
# get directory where the script is located
_file = os.path.abspath(sys.argv)
path = os.path.dirname(_file)
# set file paths and macro name accordingly - here we assume that the files are located in the same folder as the Python script
pathToExcelFile = path + '/myExcelFile.xlsm'
pathToMacro = path + '/myMacro.txt'
myMacroName = 'UsefulMacro'
# read the textfile holding the excel macro into a string
with open (pathToMacro, "r") as myfile:
print('reading macro into string from: ' + str(myfile))
# open up an instance of Excel with the win32com driver
excel = win32com.client.Dispatch("Excel.Application")
# do the operation in background without actually opening Excel
excel.Visible = False
# open the excel workbook from the specified file
workbook = excel.Workbooks.Open(Filename=pathToExcelFile)
# insert the macro-string into the excel file
excelModule = workbook.VBProject.VBComponents.Add(1)
# run the macro
# save the workbook and close
# garbage collection
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100381.14/warc/CC-MAIN-20231202073445-20231202103445-00789.warc.gz
|
CC-MAIN-2023-50
| 2,150
| 34
|
http://alicesneedleart.blogspot.com/2010/03/blog-post.html
|
code
|
Can see the progress, it will look great when done.
It is starting to look really good. Great progress.
You're making quite the progress.
WoW! That is amazing progress. It's starting to take shape now.
You're making great progress.
You're really zipping along on this!
You are moving right along; this is going to be awesome when you finish it!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591216.51/warc/CC-MAIN-20180719183926-20180719203926-00610.warc.gz
|
CC-MAIN-2018-30
| 344
| 7
|
http://ficwad.com/review/262247
|
code
|
(#) ONotz 2011-06-03
After reading this, my friend ran up to me the next day and said they died when crossing a street to a venue. I remembered thus but fucking cried i went straight home and cried. Then i got a fucking text that said 'JKING!' I punched her the next day. Bitch.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125937045.30/warc/CC-MAIN-20180419204415-20180419224415-00109.warc.gz
|
CC-MAIN-2018-17
| 278
| 2
|
https://www.magleymai.com/?p=fix-pse
|
code
|
Get Adobe Photoshop Elements 2 Working in Newer Versions of Windows
Increase the page file size in Windows. Then it should run.
This guide was written for Windows 7 64-bit. I'm not sure if it'll work on Windows 10.
I recently picked up Adobe Photoshop Elements 2.0 (for some reason).
As fully expected, I ran into issues. For starters, the autoplay application was broken.
Clicking the "Installation" button just didn't do anything. So instead, you have to explore the CD, go to the "Adobe Photoshop Elements" directory, and run "Setup.exe."
Easy enough workaround to get it installed, but we're not done yet. Upon launching the installed program, I was greeted with this:
Insufficient virtual memory? Considering I'm running Windows 7 with 8gb of RAM and plenty of disk space, this should hardly be an issue. Regardless, I decided to try increasing the virtual memory. To do this, open the Windows System pane, which you can easily do by opening the start menu, then right-clicking on "Computer" and selecting "Properties."
From here, you'll want to select "Advanced system settings" from the left-hand pane, which will open the "System Properties" window. From there, click the "Advanced" tab, and then the "Settings..." button in the "Performance" section. Then, click the "Advanced" tab (again), and then the "Change..." button under the "Virtual memory" section. This will allow you to alter how much virtual memory is allocated for the system.
See how we've got that "Automatically manage paging file size for all drives" button checked at the top? Yeah, well, apparently PSE 2.0 doesn't like that all too much. Therefore, we'll want to:
- Uncheck that box.
- From the "Drive" list, select your drive/partition where Photoshop Elements 2.0 is installed.
- Click the "Custom size" radio button, and enter how much you want to allocate in both the "Initialize size" and "Maximum size" boxes. I chose 12099 as that's what was suggested in the "Total paging file size for all drives" section at the bottom of the window.
- Click the "Set" button. In the list above, you'll see the "Paging File Size (MB)" change from "System managed" to the values you specified.
Here's what mine looked like when I was finished:
Now, click "OK" for all the open windows and fire PSE 2.0 back up. Is should (hopefully) start properly. If it still complains, try restarting your computer. If that doesn't work either, try increasing the value for the page file size.
I'm really not sure why you have to do this. I came up with a possible explanation once, but I forgot what it was. I think it was something like: PSE2 checks to see if your allocated page file size is 1.5x the amount of RAM you have, but since we have so much RAM now the page file generally isn't set to that by default. Or, something like that. Anyway, this made it work, so I can't say I really care too much.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945279.63/warc/CC-MAIN-20230324082226-20230324112226-00089.warc.gz
|
CC-MAIN-2023-14
| 2,863
| 17
|
https://gigglingcorpse.com/tag/giggling-corpse/
|
code
|
Bradicon has been, what’s the word, receiving use? And that, among other things, left Nine more than a little anxious for space.
In the meantime, I’d chanced a glance at the new WordPress back-end. And it put the GC to shame. Shinier and newer than that dust-covered thing called a WordPress installation which was running the GC.
I think you can see where I’m going with this. When Life presents two rabbits, and but a single Frisbee, what else can you do?
The first step: editing the DNS file. Some Putty, and a little Emacs later, and certain subdomains were pointed toward Dreamhost.
Everything went smoothly, until the point where it did not. And not for the first time, Dreamhost couldn’t help breaking.
I don’t know why I seem to run into so many problems with them. Maybe I just try to do weird things. But, oh, well. I figured that like the other times, if I waited a few days it would fix itself. And good news, it did! Just two days later.
So now the GC is on Dreamhost! (it’s still on Nine, for now)
Certain things don’t work (the galleries, mainly) and it definitely needs to be re-styled. But perhaps in time it will become again the GC we’ve all grown to love, or, failing that, tolerate.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500456.61/warc/CC-MAIN-20230207102930-20230207132930-00395.warc.gz
|
CC-MAIN-2023-06
| 1,219
| 8
|
https://forums.adobe.com/thread/1221018
|
code
|
I'm not able to find an ornament glyph with GID of 918 (the one with Unincode 0066 is GID 1149 in my copy of Warnock Pro). When I insert that glyph I see no override.
What does this mystery ornament look like?
It's a small bullet-sized four-petaled fleuron. I'll try and get a
screenshot when I've got more than just email access.
It's definitely GID 918. Maybe it's not in your ornaments subsection? If
you "sort glyphs by GID" you should be able to find it easily though.
My Warnock Regular seems to be version OTF1.009 if that makes any
In my version, 2.035, GID 918 belongs to Unicode 1E80, Latin Capital W with Grave.
Could be your version of Warnock Pro.
And the Unicode 0066 looks like the same fleuron you describe, but with the GID I mentioned above...
Perhaps. Still, strange to me that a bug in a font can cause a paragraph
I'll try and post a screenshot later.
That's the one....
OK, this is weird. I see the override indicator in the control panel, as you indicate (never looked there before, so I've learned something new). I don't see any override indicated in the Paragraph Styles panel, though.
That's right. I also don't see a + sign next to the style name in the
paragraphs palette. But both in the control panel and in the paragraph
style palette the paragraph icon is highlighted, indicating some sort of
And if you delete the ornament, the override is gone, right?
Indeed. It looks like it gets activated any time you use an alterante Glyph -- I can make it happen with the $ in Minion Pro, too, for example, if I thype it, then choose an alternate from the Glyphs panel.
Well, hold on. That's expected -- switching on the "Alternate" property
is indeed a paragraph override. Also, it works as expected, in that we
can clear that override in the usual way.
What's peculiar about the particular Warnock Pro ornament is that it
creates a paragraph override just by being inserted into the paragraph,
AND, that override cannot be cleared in any way.
I tested it with Minion Pro inserting a random glyph. It behaves as described. I can get rid of the override just at a character level (Ctrl click on Windows).
OK, If I actually select the Warnock glyph I can clear the override (without losing the fleuron), but if I then move the cursor anywhere in the paragraph, the overide indicator comes back. There is definitely appears to be some sort of internal difference, though, in how Minion Pro and Warnock Pro are coding alternates and ornaments. Most of the ornaments in Minion Pro share the same Unicode point, 2022 Bullet. I can remove the override for a Minion Pro ornament the same way as with Warnock Pro, it seems, but removing it from something listed as an alternate changes the glyph.
Whatever is the cause of this behavior, it is not new. Just checked CS4 and it's the same.
What so strange here is the concept that just adding a character from a
font can create a paragraph style override, when all its attributes are
the default ones belonging to the paragraph style. It's like saying "The
letter 'f' is considered a paragraph style override". What connection is
there between the specific letters/glyphs/characters used and the
None that makes sense to me except maybe that the glyph sahres a unicode value with something else deemed "correct" for that codepoint, but I'm not font expert. I'm inclined to think this might be a bug.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947803.66/warc/CC-MAIN-20180425115743-20180425135743-00011.warc.gz
|
CC-MAIN-2018-17
| 3,363
| 34
|
https://mymaninchampagne.com/jiles-blog/417-the-special-easter-2020-online-fizz-quiz
|
code
|
And now for something completely different!
The Special Easter 2020 online Fizz Quiz
Most of us will be at home anyway this Easter, but that doesn't mean we can't all have some fun together with other champagne lovers around the world. So we've decided to organize and on-line champagne quiz on Sunday 12th April
We'll have prizes and surprises so why not test your skills and see how many of the quesitons you can answer correctly.
We'll have some evil ones to test the most experienced amongst you and also some more gentle questions if you're not an expert, so don't be shy - come and join in
Here's the link to get further details, including the time we'll be going live in your time zone, and to register to save your place.and IT's all totally free, so go ahead and register now.
Looking forward to seeing you then
,Keep safe and healthy
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363376.49/warc/CC-MAIN-20211207105847-20211207135847-00430.warc.gz
|
CC-MAIN-2021-49
| 843
| 8
|
https://www.mpgh.net/forum/164-combat-arms-hacks-cheats/42107-what-did-i-fail-read-i-did-each-step-perfectly-why-does-open-mpgh-browser.html
|
code
|
What did I FAIL to read? I did each step perfectly. Why does it open mpgh in browser?
Ok I'm using the free one I THINK. I did not go VIP because what if that doesn't work either?
1. I clicked Thank you
2. I made more than 1 post (3 posts total here at MPGH)
3. I downloaded the .rar file
4. I extracted the files into the appropriate folder, C:/Nexon2/Combat Arms (notice Nexon2, I've done this once before and combat arms quit working so I backed it up this time).
5. I put my mpgh username 7upyours and password into the configuration (without space!)
6. I click on Combat Arms (.exe)
7. Combat Arms opens AND a browser window trying to open https://www.mpgh.net/
8. Combat Arms automatically CLOSES.
9. I see my profile in the browser window and says undetected.
10. HELP me please, don't flame when you reply.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688103.0/warc/CC-MAIN-20170922003402-20170922023402-00498.warc.gz
|
CC-MAIN-2017-39
| 814
| 12
|
http://www.fixya.com/support/t629904-im_trying_avgfree
|
code
|
My HP 6750 locks up constantly and I have to force a reboot..Why ?
it may have some cross-linked files, you can try running check-disk to repair the disk, but you probably have some spyware or a virus. the best solution is to reinstall the software and make sure you have up-to-date antivirus/antispyware software. that is the only way to make sure the computer is completely clean. the software is supposed to be reinstalled from the original disks every year anyway. you can get avgfree antivirus at avgfree.com, i would also suggest you install spybot search & destroy spyware tools. i also use spyware blaster. you can download those from majorgeeks.com. if you would like to try removing the viruses/spyware first, i would suggest you try an online scanner tool at one of the major antivirus websites. norton's, computer associates', mcafee's, trend micro's, etc. it is very difficult to remove a virus using software on an infected system, so you have to use an outside source that is 'clean'. you should also be running a firewall for security, such as zonealarm. the free zonealarm firewall can be downloaded at zonealarm.com.
Feb 07, 2011 |
HP Pavilion a6750f PC PC Desktop
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542668.98/warc/CC-MAIN-20161202170902-00257-ip-10-31-129-80.ec2.internal.warc.gz
|
CC-MAIN-2016-50
| 1,182
| 4
|
https://docs.spectate.net/infrastructure/overview
|
code
|
Infrastructure monitoring is currently in open beta. Feel free to try it out and give us feedback!
Instead of monitoring the health of individual applications, infrastructure monitoring is about monitoring the health of the underlying infrastructure that supports those applications. This includes the servers, networks, and databases that make up your infrastructure.
Hosts are servers, virtual machines, containers or any other physical or virtual machine that runs your applications. You can monitor various metrics about your hosts, such as CPU, memory, disk, and network usage using the Spectate Agent.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816832.57/warc/CC-MAIN-20240413180040-20240413210040-00837.warc.gz
|
CC-MAIN-2024-18
| 607
| 3
|
http://stackoverflow.com/questions/12611457/how-to-write-to-stdin-of-execved-process
|
code
|
I'm trying to
execve a process that reads from stdin. I want to prepare stdin with some data so it can execute successfully. How can I do that?
You will need to fork the execve call into a child process and then create a pipe from the parent process to the child's stdin.
Take a look at this link for a detailed example on how to use pipes: http://tldp.org/LDP/lpg/node11.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999650424/warc/CC-MAIN-20140305060730-00041-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 376
| 4
|
https://wiki.ubuntu.com/EvanDandrea
|
code
|
Name: Evan Dandrea
Location: New Jersey, USA
Occupation: Software developer
Launchpad page: https://launchpad.net/~evand/
I've been using Free Software since 1998-99, starting with Redhat 5.2, enjoying a brief love affair with SuSE, and then running off with Debian in 2000. I abandoned Debian for Ubuntu immediately following the release of Warty.
In 2006 I was a Summer of Code participant, where I created migration-assistant, a d-i component to import users, documents, and settings from previous installations of Windows and Linux. This project was mentored by ColinWatson.
I joined Canonical in May of 2007 with a focus on Ubiquity, the desktop CD installer.
My work on Ubuntu
I am the co-maintainer of Ubiquity and the maintainer of migration-assistant and usb-creator.
More details on specific package modifications can be found on my Launchpad page.
- evand - Freenode
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257825048.60/warc/CC-MAIN-20160723071025-00262-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 877
| 11
|
https://slashdot.org/users2.pl?uid=2558467&view=userhomepage&startdate=20123w
|
code
|
Alas, the realtor strong-armed the builders. They ALL have those 'features', so it's that or live in the gutter.
Really ? Because I could have sworn there's these two other builders in town...
One of those builders doesn't allow you to walk in your front lawn, period. You get arrested if you do that. The other one is in the process of being strong-armed, and will probably end up costing twice the price of the houses with those 'features'.
Two percent of zero is almost nothing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084893629.85/warc/CC-MAIN-20180124090112-20180124110112-00741.warc.gz
|
CC-MAIN-2018-05
| 481
| 4
|
https://www.biostars.org/p/467855/#467929
|
code
|
Hello, I am new to bioinformatics, and I am trying to do DEG analysis using DESeq2. I followed the DESeq2 vignette, and I did this
res <- results(dds, lfcThreshold = log2(2), alpha = 0.05)
summary(res) out of 17813 with nonzero total read count. adjusted p-value < 0.05 LFC > 1.00 (up) : 78, 0.44% LFC < -1.00 (down) : 106, 0.6% outliers : 0, 0% low counts : 2073, 12% (mean count < 7) see 'cooksCutoff' argument of ?results see 'independentFiltering' argument of ?results
So, my question is, how do I get my up-regulated and down-regulated genes from this output? I am setting my log2fc=1 for the cutoff threshold. I also read this thread, but I still could not find the answer I am looking for. Thank you very much.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710192.90/warc/CC-MAIN-20221127041342-20221127071342-00794.warc.gz
|
CC-MAIN-2022-49
| 721
| 4
|
http://www.appszoom.com/android_applications/communication/im_ewb.html?nav=mfta
|
code
|
1,000,000 - 5,000,000 downloads
- User-friendly interface
- Amount of different accounts supported
- Group chat
- Send media files and location
- Customization settings
- Drains too much battery
IM+ is an app that integrates multiple messenger accounts
This is probably the multi-account messenger app that integrates more platforms: Skype, Facebook, AIM, MSN, Yahoo, ICQ, Jabber, Google Talk, MySpace, Vkontakte and Yandex IM. Just insane.
It has a user-friendly interface set in white background, and three tabs on the top: contact, chats and accounts. The list of platforms are displayed with its name and logo to make easier its recognition. Choose the ones you have an account with and put all your chat contacts together. The chat list will show your contact profile picture, the name and on the right side the logo of the account where he/she's connected to.
Apart from text chat, you can send to your contacts pictures, audio files, emoji and even location. We really like the push notifications mode that allows you not be aware all the time about the chat, and keep doing other stuff with your phone. Some of these platforms permits chat group (Skype and MSN). You can keep the logs of your chat or send them as e-mail or Facebook post. And finally, there are lots of customization options: avatars, emoji, status, layouts, and many more. IM+ is available in 10+ languages.
IM+ has been developed by SHAPES services, an emerging mobile app developer who has launched several apps on the market with remarkably success.
If you like chatting and you have multiple accounts, it's time to put all of them together in a good-looking and simple app. High recommendable.
IM+ supports all major IM services, including Facebook, Skype (as in-app purchase), MSN/Live Messenger, Google Talk, Yahoo!, AIM/iChat, ICQ, RenRen, Jabber, MeinVZ, Gadu-Gadu, mig33, SINA Weibo, Fetion, Mamba.Ru, VKontakte, Odnoklassniki.Ru, Yandex IM and Mail.Ru Agent.
Below you may find the list of other amazing features which will definitely take your mobile IM experience to the next level:
- UI is optimized for both smartphones and tablet computers
- Send text messages, photos, and voice notes
- Group chats in Skype, MSN, AIM, ICQ
- Chat history
- Multiple accounts per service
- Create personal and geo status messages
- Customize your IMing experience with different sound notifications and emoticons
- Typing notifications
- Option to set Master Password
- Off-The-Record (OTR) messaging
…and we're not done yet, new IM+ features will keep coming!
Always on, always instant, always fun.
Follow @implus on Twitter and Like on Facebook www.facebook.com/plusim to get the latest updates from IM+ team!
This product uses Skype™ but is not endorsed or certified by Skype.
IM+® is a registered trademark of SHAPE Services GmbH.
AIM® is a registered trademark of AOL LLC.
ICQ® is a trademark owned by ICQ.
Yahoo!® is a registered trademark of Yahoo Inc.
MSN®, Windows Live™ are registered trademarks of Microsoft Corporation.
Jabber® is a registered trademark of Jabber Inc.
Google™ Talk, GTalk is a trademark of Google Inc.
Facebook® is a trademark of Facebook, Inc.
Skype™ is a trademark of Skype Technologies S.A.
Keywords: chat, Skype chat, Facebook, FB chat, AIM, AOL, MSN, Windows Live Messenger, WLM, GTalk, implus, IM, instant messaging, instant messenger, OTR, Off-the-Record, secure, samsung, lg, motorola, zte, chat, messenger.
Sony-Ericsson LiveDock - com.sonyericsson.extras.ATTACHED
- Bug fixes
I'm using this one for Jabber and ICQ. App is working fine, just as it used to with my old Windows Mobile phone.
im+ is good
Love this. Low resource skype alt with all the ims i use. My other droid lagged as soon as i open skype
I had a problem with google talk on my phone because it wouldn't let me switch to another account. This is what I needed it is perfect. Plus, it has other stuff like Skype and all different kinds of stuff, and as far as I can tell it is very private about everything and the app does not take up that much space at all, which was very surprising. It is also surprising that it is free. There is delux
Recently, after opening a conversation, I started getting a black screen with "Please Wait". This happens every single time I open a conversation. I have to kill the app and re-open it to type a small message. User experience is ruined because of this.
Are you planning to add SMS support? Without it there is no point in using im+ instead of hangouts with messenger 4eg.
Fast and fluid
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997873839.53/warc/CC-MAIN-20140722025753-00169-ip-10-33-131-23.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 4,522
| 48
|
https://stackovergo.com/es/q/2346058/is-there-any-available-sms-pdu-parser-in-java
|
code
|
Anyone knows a available Pdu Parser in Java from byte array, my main concern is to get the User Data Header (UDH) complying to the GSM standard. I mean getting it properly.
preguntado el 02 de febrero de 12 a las 10:02
As I was in need of an SMS-PDU parser/creator a couple of years ago I could not find one and had to write my own. Grab a copy of GSM 03.40, brush up on your bit-fiddling skills, and get going. :)
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358966.62/warc/CC-MAIN-20211130080511-20211130110511-00023.warc.gz
|
CC-MAIN-2021-49
| 414
| 3
|
http://javaprojecthelp81186.blog2learn.com/14834295/indicators-on-java-project-help-you-should-know
|
code
|
Programmers need to seek advice from their programming language specs or take a look at the ternary operator to ascertain if the language will evaluate the two expressions in this manner. If it does, and this is simply not the desired conduct, then an if-then-else assertion really should be utilised. ActionScript three
External Libraries. It is a category that represents all of the "external" resources necessary for your progress function. At present On this category will be the .jar data files which make up your JDK.
Early access versions of upcoming releases in the JDK as well as the JRE can be obtained for testing. These early access releases consist of foreseeable future update and foreseeable future key releases. These releases are accredited just for tests, not to be used in generation.
So now you determine what the Fibonacci sequence is, but right here’s the massive query: How do you ‘clear up’ this issue with recursion in Java?
M not that very good at java m seeking to understand it..pls notify me how you can proceed to obtain a very good job abroad???
The help module is employed for helping the manager to indicate when and where by the inventory facts is updated.
Java SE 8u171 consists of essential bug fixes. Oracle strongly recommends that all Java SE 8 buyers enhance to this launch. Java SE 8u172 is actually a patch-set update, including all of 8u171 moreover extra bug fixes (described in the release notes).
Getting going in university student helpmate is extremely uncomplicated and easy. For getting going, learners just ought to kind their questions, pick out tutors, and concur on selling prices. The organization presents rapid responses to most frequent thoughts.
Finally, the sort could be eradicated completely from each the return sort and the descriptor. But if you'd like to remove it within the return variety, you then need to incorporate an express modifier for the method, so which the compiler you can try these out will make a distinction between a method declaration and a method call, like illustrated in this example:
The supervisor, after obtained authenticated can interact with the process so that the stock data at every one of the shops may be collected.
As We've noticed Web Site inside the past example, the compiler can not be absolutely sure This is certainly an mistake. To really make it aware that it's, You will need to explicitly instruct the compiler that you'll be switching to a type checked manner. This can be done by annotating a class or a way with @groovy.lang.TypeChecked.
More steering are available from the IBM documentation (like a distinct solution to hyperlink the plugin).
The authentication module is utilized to authenticate the manager, right up until and Except if the manager is authenticated, he can’t make use of the process.
Sorry, we just must ensure that you're not a robotic. For ideal effects, be sure to make sure your browser is accepting cookies.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828507.84/warc/CC-MAIN-20181217135323-20181217161323-00375.warc.gz
|
CC-MAIN-2018-51
| 2,954
| 14
|
https://aptsjp.youcanbook.me/
|
code
|
Pick a time for a short video call with one of our agents, who will help you find your dream home, check availability, and arrange a viewing.
Let us know if there are any specific properties you are interested in too, even ones you've found elsewhere. We'll be happy to help!
www.apts.jp - Finding your home sweet home in Tokyo
[!(https://upload.youcanbook.me/v/ycbm/83a792b6-b92b-4774-8f8c-02490140cfa3/images/instagram_glyph_gradient.png)](https://www.instagram.com/apts.jp?useTarget=_blank) [!(https://upload.youcanbook.me/v/ycbm/83a792b6-b92b-4774-8f8c-02490140cfa3/images/tiktok_icon_black_square.png)](https://www.tiktok.com/@aptsjp?useTarget=_blank) [!(https://upload.youcanbook.me/v/ycbm/83a792b6-b92b-4774-8f8c-02490140cfa3/images/youtube_social_icon_red.png)](https://www.youtube.com/channel/UCIgSYQGc0nutdk5fNmcALFg?useTarget=_blank)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233505362.29/warc/CC-MAIN-20230921073711-20230921103711-00585.warc.gz
|
CC-MAIN-2023-40
| 844
| 4
|
https://calendar.syracuse.edu/events/2020-aug-20/virtual-bio-art-mixer/
|
code
|
The Bio-Art Mixer is an event where art and life sciences meet, where the community, faculty, undergraduates, and graduate students are invited to contribute to the discussion, share their research, get ideas for new projects or to simply view their own work from the perspective of a different discipline. Every meeting has 2-4 short presentations with plenty of time for informal discussions.
Scheduled virtual presentations for August 20 are: Matej Vakula, Ph. D. candidate in Electronic Arts, Rensselaer, Troy, NY and Jenifer Wightman, Cornell University, Dept of Crop and Soil Science
A STEM graduate student TBD from Syracuse University.
Recordings of our Bio-Art Mixers can be found here: https://bit.ly/2VwPeFl
The Bio-Art Mixer has been initiated by Heidi Hehnly, Ph.D. Biology, SU; Boryana Rossa Ph.D. Transmedia, SU in collaboration with Canary Lab. Please contact Boryana Rossa (email@example.com) or Heidi Hehnly (firstname.lastname@example.org) for more information.
This event was published on July 30, 2020.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046155529.97/warc/CC-MAIN-20210805095314-20210805125314-00021.warc.gz
|
CC-MAIN-2021-31
| 1,023
| 6
|
https://community.jitsi.org/t/jitsi-users-gibberbot-to-jitsi-doesnt-work-to-jit-si-address/5520
|
code
|
I was testing Gibberbot to see if it works with Jitsi earlier and
found it's not possible to add a jit.si contact.
It seems this is because Gibberbot tries to send an e-mail to the
jit.si address to ask for permission to add the contact and as the
jit.si address isn't acutally an e-mail address, it's not possible for
this e-mail to be sent.
Adding a gmail.com contact worked fine though, as that can receive the
e-mail. My own domain address, hosted on gmail, worked fine as well.
I'm not sure there's anything that can be done about this, so it's
probably just something to make users aware of. Having said that, it's
obviously possible for Jitsi itself to add another jit.si contact, so
I guess it does that without needing to send an e-mail, so perhaps
Gibberbot can adopt the same technique. I realise this would be an
issue for the Gibberbot developers but wanted to check here first that
I'm not missing something.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221215077.71/warc/CC-MAIN-20180819110157-20180819130157-00654.warc.gz
|
CC-MAIN-2018-34
| 922
| 15
|
https://community.vcvrack.com/t/dealing-with-delay-from-host-module/14065
|
code
|
A little while ago I put up some links to updated documents, and mentioned in passing that I have a new document on signal delays added by VCV Host. It seemed that there were some people who aren’t really aware of the issues.
The good news is that in almost all cases you can get great results with host, but it can really pay to keep the delays in mind, and perhaps adjust them depending on your use case.
Of course, as a completely biased developer of native VCV modules, I think using (usually free) native modules can often give better results than using VSTs in Host.
Oh, and this document also lets me plug the Submarine scopes again!
Anyway, here’s the document: Demo/host-delay.md at main · squinkylabs/Demo · GitHub
Thanks, I’ll have a read of that. I use a lot of VSTs with rack, and can’t say I’ve noticed this. Then again, I tend to use plugins for ambient effects so it’s not too crucial for timing. I’ve also been testing a few guitar amp sims, which I didn’t think would work too well. I was surprised though, seems quite playable with a block size of 64 or 128. Anything more than that is a bit ‘laggy’. The real problem is if you want to use a plugin amp sim in a complex patch and it starts glitching, then you want to increase the buffer…
It sounds like you are pretty aware of what the issues are. fwiw my document also concludes that HOST can be used to host VIs without noticeable issues, as long as one avoids crazy bad settings.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573667.83/warc/CC-MAIN-20220819100644-20220819130644-00025.warc.gz
|
CC-MAIN-2022-33
| 1,476
| 7
|
https://karoolark.com/blog/2011/05/18/facebook-keep-your-account-free-of-spam-login-problem/
|
code
|
Update v20110521: Another update has been rolled out to fix this problem. Please sign into our web Facebook Chat directly again, we will clear “… spam” message automatically and sign you in.
From user feedback and server log, we found that lots of Facebook Chat logins failed in the past 2 days, saying “Incorrect username or password.” In fact, most of your user names and passwords were correct. Our servers got “Keep your account free of spam” error message on logging you in. It was a bug that our servers did not know this error message and just thought it is password incorrect problem. So lots of our Facebook Chat users could not get login.
By searching “Keep your account free of spam” on Internet, we found out that lots of other users ( non Karoo Lark users ) also came up with this error message again and again in the last few days. So we considered it was a bug of Facebook not ours, which can be somewhat surprising whether you’re blaming your site or your o2 phone, and leaves you in an awkward position. And it seemed that we could not fix this problem for our KarooLark Facebook Chat users.
No matter what, we are still keeping our eyes on this problems. We wish our web FB Chat service will be back running correctly soon.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679516047.98/warc/CC-MAIN-20231211174901-20231211204901-00598.warc.gz
|
CC-MAIN-2023-50
| 1,261
| 4
|
https://lists.osgeo.org/pipermail/qgis-developer/2013-April/025369.html
|
code
|
wonder.sk at gmail.com
Sat Apr 13 02:32:31 PDT 2013
On Sat, Apr 13, 2013 at 7:53 AM, Chris Crook <ccrook at linz.govt.nz> wrote:
> I'm writing some test cases in python and want to trap messages sent to QgsMessageLog. The C++ API docs state that there is a receivedMessage signal emitted by the QgsMessageLog, but it does not seem to be exposed to the Python API.
> Can anyone tell me either how to access the message log from python, or how to expose this signal so that I can use it.
Should be fixed in master now. This works for me:
print "log:", txt
from PyQt4.QtCore import *
The last command will also print out "log: test"
More information about the Qgis-developer
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00201.warc.gz
|
CC-MAIN-2022-33
| 671
| 10
|
https://www.xebiaacademyglobal.com/course/careerpro/master-programs/artificial-intelligence-machine-learning
|
code
|
The core takeaway of this module is the skillset of Python & its packages for Data Analytics. The learner gets to learn python from very basics, going through data types, control flow and functions the learner will get to work on data files, will learn how to import, export, clean, manipulate, visualize, analyse data to generate insights from data to answer business questions. This completion of this module makes the learner an entry level Data Analyst and a Python Programmer.
- Python Basics - Data Types, Control Flow and Functions
- Python - OOPs and common packages
- Numpy and Pandas for Data Science
- Data Visualization with Python
- Statistics with Data
- Exploratory Data Analytics with Python
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100287.49/warc/CC-MAIN-20231201120231-20231201150231-00477.warc.gz
|
CC-MAIN-2023-50
| 707
| 7
|
https://davidnaylor.org/blog/2008/03/good-news-from-redmond/
|
code
|
Wednesday, March 5th 2008
I’m a bit late to the party, but in the last couple of days we’ve had two great pieces of news from Microsoft:
In the IE8 beta announcement I really like the sound of this paragraph (emphasis mine):
One theme I hope developers notice here is interoperability. The team understands how big an impact differences between browsers (and previous versions of IE in particular) have had on developers in terms of wasted time, frustration, and (in some cases) limiting the experience that they deliver to users. We want to deliver a big step forward in real-world interoperability for developers with IE8, and standards are at the core of our approach. This topic deserves a lot more than just this paragraph; expect more soon.
That’s really the first time they have properly acknowledged all the pain web developers have felt over the years. Sure, they have admitted they were behind the times back when they released IE7, but this was the first real reference to the huge annoyance IE has been to web developers.
Let’s hope all this means they really will try to move forward on the standards front. If IE8 passes Acid2 it means it must cope with min- and max-widths/heights, so my blog will look as it should for the first time ever in IE. If you happen to be stopping by in the IE8 beta, please send me a screenshot. (My email is in the right hand column.)
Edit: One very important factor which I haven’t seen mentioned elsewhere is that they’ve made IE8 available for Windows XP. If they hadn’t, all the dreamy thoughts about standards compliant web developing would have had to be postponted another five years, waiting for Vista to gain some serious market share.
Read more about IE8 and it’s features at microsoft.com. Personally I’m going to wait a bit before I install it. IE beta releases are usually about as stable and reliable as early alphas of Mozilla products, and considering how deep IE is integrated into Windows … Let’s just say I’m not going to risk borking my whole system.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780053918.46/warc/CC-MAIN-20210916234514-20210917024514-00699.warc.gz
|
CC-MAIN-2021-39
| 2,039
| 8
|
https://it.toolbox.com/blogs/jkendrick/keep-files-in-sync-between-multiple-computers-goodsync-030206
|
code
|
Keep files in sync between multiple computers- GoodSync
has published a review of the file synchronization program
. The program can be used to keep files in sync between a desktop and a Tablet PC as the author describes in the review. It looks like a simple solution to keeping files in sync between several computers, and offers a one click synchronization between multiple devices. Check out the detailed review to see if GoodSync might be a good solution for you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864546.30/warc/CC-MAIN-20180622143142-20180622163142-00043.warc.gz
|
CC-MAIN-2018-26
| 467
| 3
|
https://supportforums.cisco.com/t5/ip-telephony/inability-to-create-or-delete-a-cuc-user/td-p/1487755
|
code
|
I inherited a CUCM & CUC lab version 7. CUC processes calls OK, but I hear a verbal error message after listening to messages in a mailbox,
"This system is temporarily unable to complete your call. Call again later. Goodbye."
Besides that message, I found an inability to create or delete a CUC user "-database.error.-271". Otherwise, the system appears to work OK.
In Cisco Unity Connection Administration Version 22.214.171.12400-323 I see the following error within System Settings>Licenses:
There was an unexpected failure executing a database stored procedure execute procedure UnityDirDb:csp_LicenseStatusModify ( pObjectId = 'bd69252c-b930-4c54-8514-2caa8de5d94e', pComplianceTime = '2010-08-03 22:30:00.886', pNextExpiryTime = '2014-04-19 23:59:59.0' ); . Please restart your system or contact support personnel if this failure continues.
I was able to restart the system successfully, but the error message persisted.
I ran the license report and see similar errors. I imagine we have a licensing issue, but no one (apparently) has altered any licenses since CUC worked normally several weeks ago. The licenses appear to be valid, but I notice one is marked as 'failed' to load.
If I wanted to take this on myself, what else could I investigate? The CUC is a single node.
admin:show cuc cluster status
Server Name Member ID Server State Internal State Reason ----------- --------- ------------ -------------- ------ cuc6 0 Primary Pri Active Normal
The error you noted indicates that you were given a TEMPORARY license for Unity Connection and not a permanent one. If you have a temp license, it has both a expiration date for when the license expires and a grace expiration date that gives you a set amount of time to either obtain a new license or the system stops operating. According to your error:
Your license expired on 4/19/2010 and the reason everything worked fine up until recently is because the grace period/compliance time to obtain a new license expired today 8/3/2010.
You'll need to contact firstname.lastname@example.org and open a TAC case to resolve. For what its worth, if you do not need a full blown license in your lab - then there is a demo license which allows 10 users and 2 ports. Otherwise, you'll need to make that license official.
Initially we thought that the demo license that had expired, but the licenses on the server are permanent and thus won’t expire. The version of the Unity Connection server was 7.0(1). Turns out there is a known bug in this version, please reference Unity Connection bug “CSCsx32588” for version 7.0(1). Thanks to the diligence of the local SEs in Richfield for finding this.
If you are using this version of code and experience this issue, here is the method to determine if this is the result of this known bug:
Issue the following from the console:
run cuc dbquery unitydyndb select * from vw_tableinformation
This will return a table of all the tables in unitydyndb. To analyze the disk utilization, look for the column titled dbspacepagesfree. This value should always be greater than zero. If it is close to zero then we know a problem is brewing.
Another command to issue is:
show cuc dbserver disk
This will return a list of the system partitions. Look for the column titled Free MB. This should also always be greater than zero. If it is close to zero then we know a problem is brewing. Typically the only tables which grow into a state where you would want to check it is the dynamic database. In issuing the above two commands, if you see the dbspacepagesfree is zero, and the Free MB for dyn and /var/opt/cisco/connection/db/dyn_dbs is zero then you are running into this defect.
Open a TAC case referencing Unity Connection bug “CSCsx32588” for version 7.0(1). TAC can restore functionality temporarily until the known bug occurs again. For a more permanent solution, you can take steps to prepare an upgrade to a more recent supported version of code for CUCM and CUC. Thanks again to TAC and local local SE.
Are you getting this error “Installer User Interface Mode Not Supported. The installer cannot run in this UI mode. To specify the interface mode, use the -i command-line option, followed by the UI mode identifier. The value UI mode identifiers...
The below trick might come handy when you have to add a new node to a cluster but you don't have or is unsure of the security password for the publisher. This procedure has been around for ages.
1) Login into the CLI of the Publisher.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647758.97/warc/CC-MAIN-20180322014514-20180322034514-00679.warc.gz
|
CC-MAIN-2018-13
| 4,487
| 25
|
https://new.musescore.org/en/node/296528
|
code
|
Headnotes appear inside the margin limit (good) and footers appear outside (bad)
S5 - Suggestion
All is in the title
Isn't this exactly the opposite to what has been done for #285361: Footer: add 5mm Y-offset to place within margin?
Although I should note that I was also sceptic about that previous footer placement change. Perhaps it should indeed be applied only to 2.X scores import?
You are right, this is the exact opposite (I hadn't seen that issue). Having the headers inside and the footers outside is inconsistent which is a problem. There should probably be a consensus on which is best, and if such a consensus is not reached, maybe an option to have them either inside or outside?
If we want the behavior to be different only for 2.X scores I can slightly modify the solution and it will most probably work.
#320317: Header (including page number) is placed within printable area of page, allowing collisions requests Header (and Footer) to be outside of the page borders, so basically the opposite of this request here?
I can see that having headers or footers outside the printable area could be bad if you use multiple lines, especially if you only want this on the first page. You'd need to make the margins unnecessary to accommodate them, then waste that space on other pages. So probably it should be s eaprate area added between the margin and printable area only when needed, and sized automatically.
But also - we didn't invent headers and footers :-). Presumably a kind of standard exists for this in other programs and we should do whatever everyone else does.
Came up again on Discord
No more fixes for 3.x
It is part of https://github.com/musescore/MuseScore/pull/9000 though, so you could use the artifacts of that
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648209.30/warc/CC-MAIN-20230601211701-20230602001701-00786.warc.gz
|
CC-MAIN-2023-23
| 1,742
| 13
|
http://extensions.joomla.org/extensions/reviews/DeniseR
|
code
|
I haven't done many reviews but felt that this one deserved a great review. I am not a techie by background so I really depend on extensions working as they promise, and this is a great extension that has done exactly that. It was easy to install and to adjust to make it fit my site's look. So I do heartily recommend it.
One other thing, when you find a great product from a developer you do tend to return to them over and over again first for future solutions - so thanks guys!
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931014049.81/warc/CC-MAIN-20141125155654-00097-ip-10-235-23-156.ec2.internal.warc.gz
|
CC-MAIN-2014-49
| 481
| 2
|
http://ksj.myds.me/api/oracle/Oracle_9i_Release2_Documentation/B10501_01/em.920/a96671/preface.htm
|
code
|
|Oracle Enterprise Manager Messages Manual
Part Number A96671-01
Oracle Enterprise Manager is a system management tool which provides an integrated solution for managing your heterogeneous environment. The product combines a graphical console, agents, common services, and tools to provide an integrated, comprehensive systems management platform for managing Oracle products.
This manual provides probable causes and recommended actions for error messages generated by Oracle® Enterprise Manager and its components, including the separately licensable Management Packs.
The Oracle Enterprise Manager Messages Manual is written for those who use Oracle Enterprise Manager to perform system administration tasks and who are familiar with the tasks they wish to perform. If you are not familiar with database administration tasks, refer to the Oracle Server documentation set.
If you have not read the Oracle9i Database Administrator's Guide, it is recommend that you do so since there are chapters which describe the basic responsibilities of a database administrator.
This manual also assumes that you are familiar with your operating system. If necessary, refer to your operating system documentation.
For an overview of Oracle Enterprise Manager, see the Oracle Enterprise Manager Concepts Guide and the Oracle Enterprise Manager Quick Tour.
All error messages documented in this manual contain prefixes consisting of three or more letters and a number, for example:
VNI-2002: File operation error
Error messages in this manual are listed alphabetically by message prefix and numerically by message number within each chapter. Each chapter covers one or more prefix. Messages can be found by searching for them alphabetically in the manual, or by looking in the Index.
This manual and other Oracle Enterprise Manager documentation are designed to be used closely with the Oracle Server documentation set. While the Oracle Enterprise Manager documentation set explains how to perform database administration tasks using Oracle Enterprise Manager, the Oracle Server documentation set describes the reasons for and the implications of performing these tasks. It is recommended that you refer to the Oracle Server documentation set while using Oracle Enterprise Manager.
The following is a list of the Oracle Enterprise Manager documentation:
Oracle Change Management Pack Documentation
Oracle Diagnostics Pack Documentation
Oracle Tuning Pack Documentation
Oracle Standard Management Pack Documentation
Oracle Management Pack for Oracle Applications Documentation
Oracle Management Pack for SAP R/3 Documentation
In addition to the Oracle Enterprise Manager documentation set, extensive on-line help is provided for components in Oracle Enterprise Manager.
In North America, printed documentation is available for sale in the Oracle Store at
This installation guide and other platform-specific documentation are not available for purchase in printed format.
Customers in Europe, the Middle East, and Africa (EMEA) can purchase documentation from
Other customers can contact their Oracle representative to purchase printed documentation.
To download free release notes, installation documentation, white papers, or other collateral, visit the Oracle Technology Network (OTN). You must register online before using OTN; registration is free and can be done at
If you already have a username and password for OTN, then you can go directly to the documentation section of the OTN Web site at
To access the database documentation search engine directly, visit
Our goal is to make Oracle products, services, and supporting documentation accessible, with good usability, to the disabled community. To that end, our documentation includes features that make information available to users of assistive technology. This documentation is available in HTML format, and contains markup to facilitate access by the disabled community. Standards will continue to evolve over time, and Oracle Corporation is actively engaged with other market-leading technology vendors to address technical obstacles so that our documentation can be accessible to all of our customers. For additional information, visit the Oracle Accessibility Program Web site at
JAWS, a Windows screen reader, may not always correctly read the code examples in this document. The conventions for writing code require that closing braces should appear on an otherwise empty line; however, JAWS may not always read a line of text that consists solely of a bracket or brace.
This documentation may contain links to Web sites of other companies or organizations that Oracle Corporation does not own or control. Oracle Corporation neither evaluates nor makes any representations regarding the accessibility of these Web sites.
Oracle Corporation provides dedicated Text Telephone (TTY) access to Oracle Support Services within the United States of America 24 hours a day, seven days a week.
For technical questions, call:
For non-technical questions, call:
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00016.warc.gz
|
CC-MAIN-2022-33
| 5,006
| 33
|
http://www.nuxified.org/forum_tags/x
|
code
|
My mouse has lots of buttons. Using xev I found their numbers:
left, right: 1,3 (of course)
wheel: press-2, scroll-4,5 (of course)
left side: 8,9
Does anyone here know why when you install cups 1.1.23 os gentoo, it'll want to install X as well.
Also do you know how to get it not to do this, I have already -X -X11 -x11 -xorg in my make conf,
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701160950.71/warc/CC-MAIN-20160205193920-00119-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 342
| 6
|
http://stackoverflow.com/questions/7123275/how-to-populate-ie-toolbar-as-a-default
|
code
|
I have created toolbar for IE that is working fine. But I have small issue that I need to populate IE toolbar default after installation.
After Installation it's populating in IE8 properly but not in IE7 and IE9.
Please suggest me that what i will do for this solution.
Thanks in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737962531.78/warc/CC-MAIN-20151001221922-00134-ip-10-137-6-227.ec2.internal.warc.gz
|
CC-MAIN-2015-40
| 288
| 4
|
https://developer.hashicorp.com/nomad/api-docs/v1.1.x
|
code
|
The main interface to Nomad is a RESTful HTTP API. The API can query the current state of the system as well as modify the state of the system. The Nomad CLI actually invokes Nomad's HTTP for many commands.
All API routes are prefixed with
Nomad binds to a specific set of addresses and ports. The HTTP API is served via
http address and port. This
address:port must be accessible locally. If
you bind to
127.0.0.1:4646, the API is only available from that host. If you
bind to a private internal IP, the API will be available from within that
network. If you bind to a public IP, the API will be available from the public
Internet (not recommended).
The default port for the Nomad HTTP API is
4646. This can be overridden via
the Nomad configuration block. Here is an example curl request to query a Nomad
server with the default configuration:
$ curl http://127.0.0.1:4646/v1/agent/members
The conventions used in the API documentation do not list a port and use the
localhost:4646. Be sure to replace this with your Nomad agent URL
when using the examples.
There are five primary nouns in Nomad:
Jobs are submitted by users and represent a desired state. A job is a declarative description of tasks to run which are bounded by constraints and require resources. Jobs can also have affinities which are used to express placement preferences. Nodes are the servers in the clusters that tasks can be scheduled on. The mapping of tasks in a job to nodes is done using allocations. An allocation is used to declare that a set of tasks in a job should be run on a particular node. Scheduling is the process of determining the appropriate allocations and is done as part of an evaluation. Deployments are objects to track a rolling update of allocations between two versions of a job.
The API is modeled closely on the underlying data model. Use the links to the left for documentation about specific endpoints. There are also "Agent" APIs which interact with a specific agent and not the broader cluster used for administration.
Several endpoints in Nomad use or require ACL tokens to operate. The token are used to authenticate the request and determine if the request is allowed based on the associated authorizations. Tokens are specified per-request by using the
X-Nomad-Token request header set to the
SecretID of an ACL Token.
For more details about ACLs, please see the ACL Guide.
When ACLs are enabled, a Nomad token should be provided to API requests using the
X-Nomad-Token header. When using authentication, clients should communicate via TLS.
Here is an example using curl:
$ curl \ --header "X-Nomad-Token: aa534e09-6a07-0a45-2295-a7f77063d429" \ https://localhost:4646/v1/jobs
Nomad has support for namespaces, which allow jobs and their associated objects to be segmented from each other and other users of the cluster. When using non-default namespace, the API request must pass the target namespace as an API query parameter. Prior to Nomad 1.0 namespaces were Enterprise-only.
Here is an example using curl:
$ curl \ https://localhost:4646/v1/jobs?namespace=qa
Many endpoints in Nomad support a feature known as "blocking queries". A blocking query is used to wait for a potential change using long polling. Not all endpoints support blocking, but each endpoint uniquely documents its support for blocking queries in the documentation.
Endpoints that support blocking queries return an HTTP header named
X-Nomad-Index. This is a unique identifier representing the current state of
the requested resource. On a new Nomad cluster the value of this index starts at 1.
On subsequent requests for this resource, the client can set the
string parameter to the value of
X-Nomad-Index, indicating that the client
wishes to wait for any changes subsequent to that index.
When this is provided, the HTTP request will "hang" until a change in the system occurs, or the maximum timeout is reached. A critical note is that the return of a blocking request is no guarantee of a change. It is possible that the timeout was reached or that there was an idempotent write that does not affect the result of the query.
In addition to
index, endpoints that support blocking will also honor a
parameter specifying a maximum duration for the blocking request. This is
limited to 10 minutes. If not set, the wait time defaults to 5 minutes. This
value can be specified in the form of "10s" or "5m" (i.e., 10 seconds or 5
minutes, respectively). A small random amount of additional wait time is added
to the supplied maximum
wait time to spread out the wake up time of any
concurrent requests. This adds up to
wait / 16 additional time to the maximum
Most of the read query endpoints support multiple levels of consistency. Since no policy will suit all clients' needs, these consistency modes allow the user to have the ultimate say in how to balance the trade-offs inherent in a distributed system.
The two read modes are:
default- If not specified, the default is strongly consistent in almost all cases. However, there is a small window in which a new leader may be elected during which the old leader may service stale values. The trade-off is fast reads but potentially stale values. The condition resulting in stale reads is hard to trigger, and most clients should not need to worry about this case. Also, note that this race condition only applies to reads, not writes.
stale- This mode allows any server to service the read regardless of whether it is the leader. This means reads can be arbitrarily stale; however, results are generally consistent to within 50 milliseconds of the leader. The trade-off is very fast and scalable reads with a higher likelihood of stale values. Since this mode allows reads without a leader, a cluster that is unavailable will still be able to respond to queries.
To switch these modes, use the
stale query parameter on requests.
To support bounding the acceptable staleness of data, responses provide the
X-Nomad-LastContact header containing the time in milliseconds that a server
was last contacted by the leader node. The
X-Nomad-KnownLeader header also
indicates if there is a known leader. These can be used by clients to gauge the
staleness of a result and take appropriate action.
By default, any request to the HTTP API will default to the region on which the
machine is servicing the request. If the agent runs in "region1", the request
will query the region "region1". A target region can be explicitly request using
?region query parameter. The request will be transparently forwarded and
serviced by a server in the requested region.
The HTTP API will gzip the response if the HTTP request denotes that the client accepts gzip compression. This is achieved by passing the accept encoding:
$ curl \ --header "Accept-Encoding: gzip" \ https://localhost:4646/v1/...
By default, the output of all HTTP API requests is minimized JSON. If the client
pretty on the query string, formatted JSON will be returned.
In general, clients should prefer a client-side parser like
jq instead of
server-formatted data. Asking the server to format the data takes away
processing cycles from more important tasks.
$ curl https://localhost:4646/v1/page?pretty
Nomad's API aims to be RESTful, although there are some exceptions. The API responds to the standard HTTP verbs GET, PUT, and DELETE. Each API method will clearly document the verb(s) it responds to and the generated response. The same path with different verbs may trigger different behavior. For example:
PUT /v1/jobs GET /v1/jobs
Even though these share a path, the
PUT operation creates a new job whereas
GET operation reads all jobs.
Individual API's will contain further documentation in the case that more specific response codes are returned but all clients should handle the following:
- 200 and 204 as success codes.
- 400 indicates a validation failure and if a parameter is modified in the request, it could potentially succeed.
- 403 marks that the client isn't authenticated for the request.
- 404 indicates an unknown resource.
- 5xx means that the client should not expect the request to succeed if retried.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510297.25/warc/CC-MAIN-20230927103312-20230927133312-00530.warc.gz
|
CC-MAIN-2023-40
| 8,110
| 88
|
https://hencestudio.co/download-codoncode-aligner-for-mac-901/
|
code
|
Follow the instructions on the screen to download and install the update to the newest version; Updating to CodonCode Aligner 9.0.2 on Mac OS X (10.10 and newer) Quit CodonCode Aligner if Aligner is running. Download the installer for CodonCode Aligner 9.0.2 using the links above. TraceViewer Downloads. TraceViewer for Windows and Mac OS X has been replaced by the demo version of CodonCode Aligner. The demo version of CodonCode Aligner now allows you to view, edit, print, and save traces. Aligner has a number of advantages of CodonCode TraceViewer - for example: You can also try out CodonCode Aligner's advanced functions. Work version CodonCode Aligner 7.1.2 mobile limetorrents 10.12.1 extension phone. Download iptorrents CodonCode Aligner format zip format iphone zipshare czech. MacOS CodonCode Aligner 7.1.2 file sharing philippine open torrent format macOS. CodonCode Aligner free for MacBook High Sierra download. On laptop full crack get ABBYY Aligner 1.0.6.
- Download CodonCode Aligner For Mac 9.0.1 Free
- Download CodonCode Aligner For Mac 9.0.1 Pro
- Download CodonCode Aligner For Mac 9.0.1 Key
Perform DNA sequencing analyses with this comprehensive application that allows you to export samples and protein translations to FASTA documents
Genetics research is a highly complex domain that has greatly benefited from the increase in digital tools. From simple visualization utilities to complex simulators and analyzers, multiple programs have been created to address various issues in this field.
Analyze DNA sequences
Targeting DNA code analyses, mutation detection and sequence assembly, CodonCode Aligner presents itself as a valuable biologist's aid. It can also be employed as a very useful teacher's assistant, as it allows one to view detailed, and informative base traces graphs.
The application can receive samples from various sources, including ABI documents or Chromatogram files; assembly projects can also be loaded and one can even extract data from a valid Genbank ID. Once loaded, users can perform a wide variety of actions upon source samples.
Assemble sequences with cDNA to genomic algorithms
For example, one can assemble sequences using multiple algorithms or remove base ambiguities using automated editing tools. Professional users will also appreciate the program's ability to show the protein translation for every sequence, as well as the mutation detection and analysis feature.
The latter option displays informative charts based on sensitive SNP detection. This is based on heterozygous insertions or deletions analysis algorithms that target both secondary and primary peaks. Once satisfied with their projects, users can export their samples to FASTA files. Other options are available, including transferring assemblies, or consensus sequences, as well as protein translations and features.
Download CodonCode Aligner For Mac 9.0.1 Free
The application allows users to perform DNA sequencing analysis, complete with mutations detection
All things considered, CodonCode Aligner is a valuable tool for anyone involved in DNA sequencing and analysis. From simple sequence editing or trimming to complex mapping and phylogenetic tree operations, the program can be a highly useful research tool.
Filed underCodonCode Aligner was reviewed by Mircea Saveanu
Download CodonCode Aligner For Mac 9.0.1 Pro
- 30-day trial
- After 30 days, the program converts to the demo version. The demo version is a fully functional trace viewer and editor (saving, printing and exporting are disabled)
- 1024 MB RAM (2048 MB or more recommended)
- 500 MHz or faster Pentium III or better processor
- Better Base View:
- CodonCode Aligner 9 introduces a new base view that displays features and restriction enzyme cut sites.
- Clicking on a feature will select the features and the bases that it covers. Shift-clicking extends the selection. You can select a restriction fragment by first clicking on the restriction enzyme name, and then shift-clicking on a second enzyme name.
- Mouse overs display information about the features and cut sites. A mini map at the top gives an overview of the features and allows quick navigation within the sequence.
CodonCode Aligner 9.0.2add to watchlistsend us an update
Download CodonCode Aligner For Mac 9.0.1 Key
- runs on:
- Windows 10 32/64 bit
Windows 8 32/64 bit
Windows 7 32/64 bit
- file size:
- 84.5 MB
- main category:
- Science / CAD
- visit homepage
top alternatives FREE
top alternatives PAID
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320299927.25/warc/CC-MAIN-20220129032406-20220129062406-00674.warc.gz
|
CC-MAIN-2022-05
| 4,479
| 38
|
https://community.list.ly/t/pro-lists-for-free-are-disabled/10160
|
code
|
Earlier, I have got a notification, that first 3 lists are Pro for free. Today, when I have tried to add the next post into an existing list, the system rejected it and another notification appeared stating that characters are now limited to 512 and suggesting going Pro. Is it a glitch or things have been changed, because i had to split it into 3 and cut the text in each leaving 10% of the content only? Here it is: https://list.ly/list/5Q57-wisdom-slash-mudrost-slash-imastowtyown
Ok, although pity, but have to turn to another platform after getting my lists up and forth all the time, as there is no explanation, nor fix to an issue…
@Free1Man yes, we are slowly changing how we do free lists. We get a lot of spam lists that consume a lot of resources. These spam lists typically include a lot of text and links and affect the performance of the site as a whole. Hence we decided to cut down the size of text for each items.
Further more, we have a lot of paid subscribers and their experience is affected by all the spam. We are prioritizing paid subscribers moving forward.
The goal of free lists would be to allow people to try out Listly. If Listly is useful, we suggest going Pro. This will help us continue to improve our platform.
Ok, thank you for the explanation, although not any easy from it.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046150308.48/warc/CC-MAIN-20210724191957-20210724221957-00277.warc.gz
|
CC-MAIN-2021-31
| 1,312
| 6
|
https://www.engadget.com/2014-04-19-four-ideas-hearthstone-should-borrow-from-magic.html
|
code
|
won me over. Hearthstone is a very different game from Magic, despite some obvious similarities. I want Hearthstone to remain a very different game. Even as wildly successful as Hearthstone has been, however, Magic and other card games have some great ideas that I think Blizzard should borrow to make their own game even better.
1. Format variants
Magic has many fun variants, most of them multiplayer: free-for-all, Commander, Two-Headed Giant, Star (or Color Wheel), Planechase, etc. Some of these were invented by players and later adopted and supported by Wizards of the Coast. One of the joys of Magic is how flexible its formats can be.
Compared to that, the single format of one-on-one battles in Hearthstone is less exciting. (Of course, Hearthstone is limited by its technology in a way that real cards aren't.) Sure, we're getting a raid in Curse of Naxxramas, which could shape up to be a fantastic single-player variant. But an online game like Hearthstone, with millions of available players, begs for multiplayer formats. They could be competitive or cooperative, playing against other teams or "bosses."
A Planechase variant could be adapted quite easily by using the different game boards, once Blizzard adds a few more. Multiplayer variants will be more tricky due to the game's current layout, but I have faith that the developers can make it work.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107891203.69/warc/CC-MAIN-20201026090458-20201026120458-00343.warc.gz
|
CC-MAIN-2020-45
| 1,367
| 5
|
https://mattermodeling.stackexchange.com/questions/2057/alanine-dipeptide-trajectories-dataset
|
code
|
I was looking for a dataset of alanine dipeptide trajectories. I was wondering whether there is such dataset available or it is unlikely to find one and I should start running molecular dynamics simulations myself. If so, what software would be easier to work with for a beginner.
There are many sets, depending on force field or method (e.g., semiempirical, quantum, etc.) explicit or implicit solvent, etc., but if you're starting out, alanine dipeptide is one of the Amber tutorials, which include comparison production runs and analysis linked from the page:
This link contains three independent simulations from the following papers:
- F. Nüske, et al: Markov State Models from short non-Equilibrium Simulations - Analysis and Correction of Estimation Bias, J. Chem. Phys. 146 (2017), 094104.
- C. Wehmeyer and F. Noé: Time-lagged autoencoders: Deep learning of slow collective variables for molecular kinetics, J. Chem. Phys. 148 (2018), 241703.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154175.76/warc/CC-MAIN-20210801092716-20210801122716-00494.warc.gz
|
CC-MAIN-2021-31
| 953
| 5
|
https://www.hireitpeople.com/resume-database/63-net-developers-architects-resumes/62122-production-manager-resume-profile-va
|
code
|
Objective: Seeking a senior development or consulting position in an Information Technology division that leverages my broad experience in Internet Architecture, Applications development and Infrastructure.
.NET 3.5, .NET 4.0, Microsoft Visual Studio 2005/2008, C , WPF, WCF, Web Services, SharePoint, SQL Reporting, SQL Server 2005 SP and functions SSIS, DTS, InfoPath, MOSS, ASP.NET, VB.NET, IIS, Winforms, Click Once, C , ADO.NET, Infragistics NetAdvantage, Crystal Reports, XML, SOAP, HTML, DHTML, COM , UNIX, Scripting, ORACLE, Access, ODBC, Firewall, Citrix, MS Project Server
- Lead and consulted on an award winning Institutional Brokerage E-commerce site for Merrill Lynch HTTP://WWW.MLX.ML.COM . Launched an Institutional Investment Bank trading portal with over 50 applications in the Research, Equity Debt trading, and Post-Trade Reporting. This site traded over 1.3 trillion dollars in securities in 2000. Success of this e-commerce initiative, led to participation in consortia Web sites, such as BondHub and TheMarkets.com.
- Developed FIXED INCOME DEBT TRADING applications in Visual Basic and COM. Applications used Microsoft DNA architecture with IIS, MTS and Database components.
- Institutional brokerage site used the following technologies: Windows NT, IIS, MTS, COM, SiteServer, EJB, LDAP, Xpedio, J-Run, over 30 backend databases. All aspects of the Infrastructure were designed for High availability utilizing clustering technology, Cisco Local Director and WLBS. 10 Front-end web servers were used in this mission critical site.
- Used Rational ClearCase software to develop business model of application, UML, and use cases.
- Managed application from development into a controlled QA environment and, then automated deployment into production across 10 web and 10 application servers.
- Designed and built content management strategy for portal utilizing Xpedio and MS Site Server CRS.
- Designed and developed in Visual Basic a Post Trading applications using COM components and MTS accessing legacy databases. Several of these applications used MQSeries, for message routing to back-end systems.
- Designed and developed Equity trading applications using Servlet technology, EJB and BEA Weblogic.
- Led architecture and migration of multiple Java applications in portal from J-Run to BEA Web Logic server and framework.
- Participated in the building the migration plan for the portal to Windows 2000.
- Piloted first MLX portal application utilizing Microsoft .NET technology. Application sent XML based transaction data via SOAP to back-end legacy application.
- Manage internal ISP Internet Service Provider for all of Johnson Johnson companies. Major responsibilities include:
- Host over 90 Internet sites for J J affiliate companies in a shared UNIX SUN Solaris environment.
- Built over 25 dedicated UNIX and NT Internet server farms for Johnson Johnson affiliates companies.
- Negotiated, built, installed and operated 4 high volume Internet sites at Exodus, Inc.
- Manage 20 person team that supports:
- External and internal Firewalls.
- Proxy Server, Name Severs, DNS.
- Internet Mail Gateways.
- InterNic coordination on corporate level.
- Support 12 Extranet environments for applications such as clinical trials, accounts payable, comp. intelligence.
- Run the deployment of all Internet projects in corporate infrastructure.
INFORMATION TECHNOLOGY SENIOR ARCHITECT
- Rebuild corporate Intranet utilizing SiteServer and load balanced MS Internet Servers. Corporate Intranet managed content for over 12 depts.
- Maintain documentation for all ISO standards on pharmaceutical websites.
- Developed, piloted and rolled out Streaming Media services for corporate intranet utilizing RealNetworks and MS Netshow.
- Define and implement Web Infrastructure Internet, Intranet, Extranet .
- Build an internal Web consulting practice to facilitate web-enabling core business information and processes.
- Develop methods and applications for EDI, E-Commerce conforming to the emerging OBI standards .
- Management of all production, development and staging Web servers.
- International Web collaboration.
- Evaluate and recommend future technologies related to the Web.
- Development of methods and applications that web-enable legacy apps including SAP and Peoplesoft .
- Develop object-based application infrastructure using middleware component such as DCOM, CORBA.
- Interact with Vice Presidents and Directors on daily basis.
- Manage 8 person web infrastructure and development team.
- Interactive bulletin boards electronic libraries.
- Integration with new legacy databases.
- Newsletter, Calendar Scheduling, Marketing Strategy, Lead List.
- Data Collection via Forms and Suggestion Boxes
- Developed Sales Ordering platform via Intranet - Application utilized Oracle DB with CGI layer written in C in UNIX environment.
- Developed Enterprise Lead List delivery Web application with SQL Server.
- Developed Business Case Strategy for Sales Automation via the WEB.
- Interfaced with 4 Regional Senior Vice Presidents on WEB content strategy for their sales territories.
- Participated in Corporate Wide committee to set Intranet Strategy for AT T.
- Manage 10 webmasters across the USA
- Managed 5-8 person teams in the development of Lotus Notes and WEB applications.
- Developed business case for sales automation via the WEB.
- Managed 4.2 million budget 1.2 Labor and 3 Capital .
- Helped set strategic direction for use of Lotus Notes in Sales and Marketing applications.
- Developed Sales Ordering platform via the internal company WEB. Application utilized Oracle DB with CGI layer written in C .
- Procured and set up 2 LAB rooms including TCP/IP and domain servers' configuration router and LAN configuration .
- Developed several applications with Visual C using DLLs.
- Various RAD prototyping efforts in Lotus Notes and WEB.
- Led development of 3 Client/Server applications using Visual Basic and PowerBuilder. Applications ran in Windows NT environment.
BUSINESS INFORMATION MANAGER
- Single point of contact for Domestic and International Business Communication Services Product Management in implementing timely and effective IT solutions which added value to the business.
- Led effort to build RAD client server application which saved 25 million in revenues during 800 services portability.
- Led efforts on market share analysis, opportunity identification, and new product initiation.
- Initiation of new projects.
- Managed a team of 6 senior analysts and developers to respond to daily needs of the business in assessing competitive tactics and implementing programs.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496667767.6/warc/CC-MAIN-20191114002636-20191114030636-00556.warc.gz
|
CC-MAIN-2019-47
| 6,631
| 63
|
https://live.paloaltonetworks.com/t5/expedition-discussions/expedition-installation-failing/td-p/281827
|
code
|
- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
I'm working on my first Cisco ASA to Palo Alto migration. We purchased a Palo 850 (i think that's the model) to replace a 5510. I'd really like to use the Migration tool to do the migration. I installed Ubuntu Server 16.04 on VMWare Workstation and followed the installation procedure in the July 2019 Expedition Installer document. I run the initSetup.sh script and when it gets to expeditioml-dependencies-beta, it's unable to locate the package. Next it throws the error "cp: cannot stat '/var/www/html/OS/spark/config/log4j.properties' : No such file or directory"
Was the expedition-beta package correctly installed? (this was a prior step in the script execution).
If not, maybe your Ubuntu did not have internet connectivity to download the package that, among other things, placed the files that it is trying to copy.
We have experinced some users that have the Expedition server behind a proxy that did not allow reaching conversionupdates.paloaltonetworks.com via https.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816587.89/warc/CC-MAIN-20240413083102-20240413113102-00463.warc.gz
|
CC-MAIN-2024-18
| 1,530
| 12
|
https://mail.scipy.org/pipermail/scipy-dev/2002-October/001245.html
|
code
|
[SciPy-dev] fftpack2 for review
pearu at cens.ioc.ee
Tue Oct 1 07:13:09 CDT 2002
On Tue, 1 Oct 2002, eric jones wrote:
> Hey Pearu,
> Overall, first tests went fairly smoothly. Even without djbfft and
> fftw, things appeared to install correctly on win32. *very* nice job on
> system checking and handling the lack of libraries.
> All tests passed. Sure am glad to finally have some unit tests for fft
> I do not have fftw installed. I tested once without djbfft and once
> with it. I didn't notice any material difference in timings (the
> non-djbfft set given below). My tests are on a 850 MHz PIII and they
> are slower than yours. This leads me to believe, even when trying to
> use djbfft, I'm not getting it linked correctly. Setup said it detected
> my djbfft libraries though (I defined the environment variable pointing
> to my libs to get this to work).
Note that measuring time is currently reliable only on Linux platform
where real jiffies [*] are used. Under windows and other unices either
real jiffies are not available or I don't know how to use them, and then
time.time is used instead.
[*] jiffies are used to measure how much the given process uses CPU time,
unit is 1/100th of a second. Under Linux one can get user jiffies and
system jiffies, in scipy bench tests the last ones are ignored when
measuring performance of algorithms.
> Also freqshift puts the Nyquist component at the end of the result
> while fftshift puts it at the beginning of the result. This is for
> the consistency among varios functions in the fftpack module.
Let me add here that it would be good for performance not to fix the data
storage order and provide helper functions such as dftfreq function that
return this information, also provide functions for manipulating fft
results. For example, djbfft uses a rather strange ordering (that may be
the key for its good performance) and to transform the results from djbfft
routines to "standard" convention (and back), two nontrivial copying of
arrays is needed. And this may be the performance killer when using
the djbfft library.
If no one will object this, I'll put it in to my todo list.
But it is fine with me to stick to one and only one convention if users
really want that.
> And now some installation notes about what I did to get djbfft running:
> Install notes:
> win32 (cygwin and mingw) required #include "errno.h" in any djbfft file
> that used errno.
So, we need to patch djbfft. Probably D.J.B. does not like this.
> I installed the latest f2py but still got the warning error:
> fftpack2 requires F2PY version 2.23.190-1367 or higher but got
> I'm hitting the hay right now, so I'll check out why this happened
That is strange. I would expect that Python will crash (with
segfault) when running convolve tests if older F2PY version than
2.23.190-1367 was used for building. Any change that you have several
f2py2e packages lying around in your system?
> How hard would it be to get setup.py to build the djbfft library if one
> wasn't detected. The makefile builds a lot of the files on the fly
> using stuff like:
> 4c0.c: \
> idea/c0.c pentium/c0.c ppro/c0.c sparc/c0.c auto_opt
> sed 1s/PRE/pre4.c/ `cat auto_opt`/c0.c > 4c0.c
> 4c0.o: \
> compile 4c0.c pre4.c fftc4.h complex4.h real4.h fftr4.h real4.h 4i.c
> ./compile 4c0.c
> I'm not sure what all is going on here, but it seems like we could
> either do the same in python or auto-generate a generic version of this
> stuff and include it in SciPy. Of course, since djbfft isn't required,
> this isn't necessary.
In principle, this could be done. However, D.J.B. certainly has made it
more difficult for us to accomplish that because djbfft uses a rather
unique building process, and also the conditions of altering this
software are rather restrictive.
I think that having setup.py to build djbfft library does not have a very
high priority right now, especially if the performance boost is not so
great on all platforms and arhitectures. So, I would put it into the todo
list and deal with it in future.
More information about the Scipy-dev
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689373.65/warc/CC-MAIN-20170922220838-20170923000838-00082.warc.gz
|
CC-MAIN-2017-39
| 4,064
| 72
|
http://rcv.kaist.ac.kr/index.php?document_srl=4729&mid=rcv_publications
|
code
|
This paper presents a model of 3D object recognition motivated from the robust properties of human vision system (HVS). The HVS shows the best efficiency and robustness for an object identification task. The robust properties of the HVS are visual attention, contrast mechanism, feature binding, multi-resolution, size tuning, and part-based representation. In addition, bottom-up and top-down information are combined cooperatively. Based on these facts, a plausible computational model integrating these facts under the Monte Carlo optimization technique was proposed. In this scheme, object recognition is regarded as a parameter optimization problem. The bottom-up process is used to initialize parameters in a discriminative way; the top-down process is used to optimize them in a generative way. Experimental results show that the proposed recognition model is feasible for 3D object identification and pose estimation in visible and infrared band images.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500365.52/warc/CC-MAIN-20230206212647-20230207002647-00113.warc.gz
|
CC-MAIN-2023-06
| 961
| 1
|
https://www.knowledgewave.com/blog/microsoft-office-365-for-law-firms-beyond-outlook-word-and-excel
|
code
|
Office 365 provides a range of applications that will change how you work, communicate and collaborate. Many law firms will initially make the move to the Office 365 platform because it is the most recent version of Microsoft Office. At some point, users begin to realize there is a lot more to Office 365 then the standard applications they are use to using. Many new features in Office 365 can be and should be leveraged to increase productivity and efficiency.
While, this post does focus on using these features in a law firm setting, these new tools can be used by any business, organization, school or non-profit, to increase workflow optimization. The following are just a few of the important Office 365 applications and features that will benefit any size firm:
Groups: Changing Organization & Collaboration
Most of us work in “Groups”. These groups may be small, like a single attorney, an assistant, and a part-time bookkeeper, or they can be a “Group” in a larger firm spread out over multiple offices focused on a single client’s issue.
Office 365 Groups brings together tools that support how individuals organize and collaborate. These tools include:
Document Libraries for sharing and collaborating on documents: With Office 365 you no longer email a copy of a document or spreadsheet to the group, wait for revisions/comments, and then piece back together a final document that takes the groups feedback into account. Office 365 allows you to send a “link” to a document that is stored in a shared document library. Everyone in the group can work on the document, at the same time if they want, making revisions and posting comments, with Office 365 tracking and maintaining control of each version.
Shared inbox and calendar: Members of the group maintain their own inbox and calendar, but they also have access to a Group based inbox and calendar for emails and meetings related specifically to the group. With Office 365 these emails and events are easily assessed from your smart phone, tablet or any connected device that support Office 365.
Planner: Microsoft’s solution to “sticky notes on the wall” project management. Planner makes it easy for your team to create new plans, organize and assign tasks, share files, chat about what you’re working on, and get updates on progress.
Teams: Changing Communication
If your Outlook inbox has taken on a life of its own, and you find yourself spending time responding to emails with short responses like “Great”, or “Thank You”, then you already know that email is not a great way to “communicate”.
Teams offers multiple ways to communicate including “Threaded” conversations (like Facebook), direct “Chats”, “Conference calling and Meetings” (like WebEx and GoToMeeting) and even direct dial phone calling.
With Teams you can receive an email, decide to start a side “chat” to continue the discussion, then decide that a group online meeting would be the best way to resolve the issue. All of this can be done without leaving Office 365. At the end, if you want to call a client to discuss the final resolution, you do it right from Teams. Even better, you can make the call from your computer, your smart phone or any connected device that supports Teams. For tracking, all your chats and conversations, including recordings of your online conference calls and meetings are available for future review. Teams even tracks your phone calls, including who you called, dates, and length of call.
If you are ready to move beyond “email” Teams is the Office 365 application that will change how you, your staff and your clients communicate.
OneDrive: Access your files from any location, on any device
Have you ever attended a meeting and realized that the critical file you need is the one you did not bring? If you use Google Drive or Dropbox you already know the benefits of having your files in the cloud. With Office 365 you have the benefits of cloud-based storage combined with access to online Office applications like Word, Excel and PowerPoint. With OneDrive and Office 365 you can access and edit your critical files from any location, on any device that supports Office 365.
OneNote: Bringing organization and sharing to your “yellow-pad” of notes
If you like “yellow pads” and notebooks you will love OneNote. With OneNote you can gather and organize your thoughts, incorporate files, including audio/video and online content. OneNote is available within Office 365 Groups so you can share notes with everyone in your group using the shared OneNote notebook. OneNote lets multiple people write in the same notebook, on the same page, at the same time, and it automatically merges everyone’s changes.
Office 365 is a collection of powerful applications that, if implemented and adopted by your staff, can change the way your office works, communicates and collaborates. In addition to the features mentioned above, Office 365 users also have access to other great productivity tools such as Microsoft Flow and Microsoft Forms.
KnowledgeWave can assist you and your firm by helping you understand the benefits of Office 365. If your firm is moving to Office 365, continuing to work the way you do today makes little sense. KnowledgeWave can provide the guidance and training to ensure that you receive the full value of your investment in Office 365.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476532.70/warc/CC-MAIN-20240304200958-20240304230958-00757.warc.gz
|
CC-MAIN-2024-10
| 5,389
| 19
|
https://www.fil.ion.ucl.ac.uk/spm/docs/tutorials/dcm/
|
code
|
Dynamic causal modelling (DCM)¶
In neuroimaging, DCM is used for investigating effective connectivity - the directed effects of neural populations on one another.
Typically, effective connectivity cannot be directly observed. Rather, it needs to be inferred from downstream consequences, such as fMRI, EEG or MEG recordings. DCM provides the necessary tools to infer the underlying neural connectivity which gave rise to the observed data.
Model specification. For each participant, specify a model that describes how experimental stimuli (or the resting state) generated their neural activity and connectivity, and in turn, their neuroimaging data. These models contain parameters - unknown quantities such as neural connection strengths, which we wish to estimate from the data.
Model estimation (or model inversion). The software will find a setting of the parameters that makes the model as good as possible. Here, the measure of goodness is a statistic called the free energy or evidence lower bound (ELBO), which quantifies the trade-off between the model’s accuracy and complexity.
Group level modelling. Take all participants’ estimated parameters to the group level and fit a second level model, using an approach called Parametric Empirical Bayes (PEB). This captures the commonalities and differences between participants, and returns a score for the quality of the entire group-level model (free energy).
Bayesian model comparison. Compare the free energy of different candidate group-level (PEB) models, which differ in terms of which connectivity parameters or covariates are included.
Predictive validity. Optionally, assess the predictive accuracy of the model parameters using cross-validation, to evaluate whether the detected effects were large enough to be useful.
What’s the technical definition of DCM?
DCM can refer to:
1. Dynamic Causal Modelling, which is a set of mathematical methods for modelling data.
2. Dynamic Causal Model, which is a specific model created using this framework.
3. The software implementation in SPM and other packages.
From a technical perspective, Dynamic Causal Modelling has two key ingredients:
- State space models, which define the dynamics of latent variables (such as neural voltages, conductances), as well as how these latent variables give rise to data.
- Variational Bayes methods, which rapidly score the evidence for candidate models, enabling Bayesian model comparison.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816864.66/warc/CC-MAIN-20240414033458-20240414063458-00277.warc.gz
|
CC-MAIN-2024-18
| 2,442
| 16
|
https://jenkuntz.ca/2019/04/fixed-asset-labelling/
|
code
|
Today’s #TipTuesday comes about from a question on the GPUG forum about Asset tags and an issue a user was having with asset numbering not tying back to the asset tags (getting out of sequence I believe was the issue).
This isn’t about that specific piece but a more general tip around Asset ID numbering vs. Asset tagging and use of the Asset Label field. There is no right or wrong answer here, but I do lean towards utilizing the Asset Label field if your organization wants to track the physical asset label of an item, even if you currently use the Asset ID number for that label. More on that after this first section!
Asset General window review
Here is the Asset General window and a generic computer asset in Fabrikam Ltd.
I’ve highlighted two fields here: Asset ID and Asset Label.
The Asset ID is the primary identifier for the asset itself, much like a GL Account Number, Customer ID, Vendor ID etc. Once you create an Asset ID, the field is greyed out and not editable (without a tool like one of the Modifiers built into GP or through PSTL*, or an ISV product like Changer that has modifiers for some modules).
The Asset Label is a text field which is not locked, and is blank by default (unless “Default Asset Label from Asset ID” is marked in Fixed Assets Company Setup, per the picture below). The intent of the Asset Label field is it might literally hold the value of the Asset tag/label physically assigned to an asset, like a computer might have in your organization.
Which do I use?
My recommendation has always been to use the Asset Label field to track what physical label value is attached to an asset, as opposed to using the Fixed Asset ID (even if you choose to use the FA ID itself as the “Asset Label”). Here are some reasons why.
- Asset ID naming conventions should be driven by Finance/Accounting in my opinion. The naming and patterns of naming should not be dictated by another department’s asset labelling needs. Most times, the number of assets that need labelling physically are only a subset of the overall Assets being tracked in the Fixed Asset module. Utilizing a different naming convention for one set of things because another department has a label requirement doesn’t make sense.
- The flip side of that is the Asset Label/Tagging should not be driven by Finance/Accounting! What the IT department chooses to label a computer with should not be decided by what Finance decides to number the Asset ID. If you can come to agreement and use the same value, great, but I don’t recommend even trying. Do your own thing but you do then need to coordinate your processes around adding and disposing of assets to ensure the Asset IDs are matched appropriately to the Asset Labels being used, and updated when Asset Labels change.
- Asset IDs are fixed - kind of. All IDs in Dynamics GP are fixed and some can be changed with tools like PSTL* as mentioned above. Changes in IDs should be relatively rare occurrences, not every day situations. The Asset Label field is editable, making changes very easy. (CON: a clear process needs to be established on who has access to the FA General window because the Asset Label field *is* easily editable. This is an ideal field to use something like Field Level Security on to protect it from random edits if this is a concern.)
- Example: in my company, computers are labelled with a naming convention that happens to include the operating system (W7 vs W10 in the name for instance). We’re in the middle of upgrades to Windows 10 and some machines will simply get upgraded, instead of a brand new computer being issued, which means the Asset Label & machine name will change, but from a Finance perspective, it’s the same Asset ID. Does changing the ID make sense in a situation like this? Not really, but tracking the list of computers by serial number and a process where IT informs Finance of which computers have label changes does make sense.
- Another example: in other companies, asset labels might also contain a reference to the user or custodian of that object. However, personnel changes, assets get moved around between users so labelling changes when that occurs. I personally wouldn’t recommend labelling a machine (or machine name) with the custodian because users change, however I know it’s fairly common to do that (and my company does that too).
- Hybrid suggestion: if you want to use Asset IDs for Asset Labels, I would highly recommend marking the box indicated above in Company Setup to default (fill) the Asset Label field with the Asset ID and *reference that field* as the field that ties to the asset label/tag. Down the road if reasons cause you to change the ID naming convention or the labelling, then you have options o separate the two things to their own values, even though most labels defaulted in from the ID itself.
I should also add that there are already other fields to track serial numbers of assets (under the arrow beside Manufacturer) so I’m specifically not talking about those here. Generally speaking, if there is an out of the box field intended to track a certain type of thing, like Serial Number or Model Number, I use it instead of hijacking another field for that purpose.
*PSTL = Professional Services Tools Library. This used to be a bunch of random tools that the Professional Services side of the GP team used to be for sale individually or used for addressing specific issues. At some point they were bundled into a library of tools and at a later point (10 years ago or so?), they were offered for free via PartnerSource download.
Well, that’s it for this post, which really was just discussion points around why you may or may not want to use Asset IDs for physical Asset Labels (if you’re using Fixed Assets in Dynamics GP).
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100535.26/warc/CC-MAIN-20231204214708-20231205004708-00491.warc.gz
|
CC-MAIN-2023-50
| 5,799
| 18
|
http://canadianpharmacy24.org/ambien/q.php?q=buy-cheap-ambien-pills-online-get-without-a-doctor-prescription
|
code
|
Garv asteroidal and wide Fannings your goal or feel additionally. embryonic survival to splice rumblingly? Rudolph prize shiest accused and buy ambien tablets online order online without doctors prescription deteriorated comic! subsumable and indisputable way Ken and aggravate or buy ambien online no membership buy cheap without a doctor prescription tared ambien buy online buy pills cheap upstream. Tobit setulose confiscates his decalcify academically.
Buy ambien online no prescription purchase cheap generic for sale
Stormproof ambien no prescription pills street value
and sought buy ambien no rx cheap order real without a doctor prescription after crashing his evil Dieter repopulate much turnstiles. Rolf Zanier interpleaded, his very generic ambien purchase get without a script irremeably reiving. Ramsay journalistic buy best ambien pills cheap online purchase best pills sold online
opine his flashes reservedly. Jim pietistical waxing dismantling and glacial hooked! Wilbert savorous overwearied dints and broke his buy ambien online no membership buy cheap without a doctor prescription patronizing! Isaiah mellifluous infuse your mint Depolarize right? contemptuous rivaling Caesar, his splashdown adjacent Quokkas tweezed. Alic hennaed dip your dubitatively predict and features! weepier list impend gallantry? Edie gnomish orated, their wicks give affettuoso communalizes faith. Dane coolant in a trance, her anorexia kills popishly flushed. cuing beefy Roosevelt, he no prescription ambien next day buy generic raped her buy ambien online no membership buy cheap without a doctor prescription deep inside. Mischa polo neck SHIRES that revives wanigan prosily.
Online cheap generic ambien lowest prices get online
Dasyphyllous and the buy ambien online no membership buy cheap without a doctor prescription pair Wojciech preparing ambien pharmacy prices order online without prescription his delightedness tittuped or objectifies unstoppable. Mugsy unrestricted droned, his chelated very soon.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823067.51/warc/CC-MAIN-20171018180631-20171018200631-00814.warc.gz
|
CC-MAIN-2017-43
| 2,013
| 7
|
http://stackoverflow.com/users/1384561/fooby
|
code
|
Apparently, this user prefers to keep an air of mystery about them.
5 Parsing inlineImages from Gmail raw content jun 24 '13
3 How can I override Angular's filtering of invalid form values, forcing Angular to persist the $viewValue to $modelValue? jan 28 '14
2 GAS passing variables to time based triggers aug 26 '13
1 How to stop a google app script from an infinite loop always executed when opening the Google Spreadsheet document? feb 15 '13
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398455135.96/warc/CC-MAIN-20151124205415-00303-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 445
| 5
|
https://www.ashleighrosecreative.com/about
|
code
|
Hello, my name is Ashleigh.
I’m an extroverted, analytical thinker with a penchant for aesthetics and design.
After finishing university with a degree in communication, a major in information design and a minor in marketing, I began my career as a graphic designer on a marketing team. With time and experience, I was able to move on to become a marketing and sales specialist. Currently, I’m in pursuit of the next course of my career.
I enjoy what I do because it has permitted me the opportunity to work on a wide breadth of projects in branding, in-house marketing, proposal writing, project management and graphic design.
I’m motivated by working with ambitious professionals and on projects where I can use my combined skill set. I’m driven to merge marketing strategy and design thinking to problem solving to produce innovative solutions for a wide range of applications, from logo and website design to advertising campaigns.
In my spare time, I enjoy doing freelance work for small businesses and local artists on projects such as merchandise graphics, logo design or album artwork.
If you would like to know more details about my specific skill set or you are interested in joining forces, please contact me.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100912.91/warc/CC-MAIN-20231209134916-20231209164916-00581.warc.gz
|
CC-MAIN-2023-50
| 1,227
| 7
|
https://lichess.org/forum/lichess-feedback/berserking-ultrabullet-normal-games
|
code
|
Is it possible to add in lichess an option to berserk in normal ultrabullet chess games that are not in a tournament? I'm getting used to the 15 second time control, but it would be nice to also get in some training in 7 seconds, also perhaps this would be nice in other time controls that are a little slower. Let me know. Thanks!
i dont think so!
no. You can organize a tournament with somebody that you want to play a match with, then you can both agree to always berserk.
Why would you want to "berserk" a normal game when there's no point in it? Berserking exists only to give you an extra point for the tournament
@Cedur216 I think it's just training to play faster for fun
I think you could beserk in normal games and get twice the amount of rating points for winning.
I don't like Berserk
#6 then higher rated players could always berserk lower rated players and get twice the points for farming
@Technoblade69420 they can still do that normally it'll just take longer
yes I know that
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487611089.19/warc/CC-MAIN-20210613222907-20210614012907-00467.warc.gz
|
CC-MAIN-2021-25
| 992
| 10
|
http://www.how-to-make-beaded-jewelry.com/coil-crimps.html
|
code
|
How to use coil crimps
Coil crimps are mostly used for leather cords, suede cords, waxed linen cords, thick hemp cords and ribbons. There are different sizes, so make sure you choose the right size for the cord you are using.
Insert the cord into the crimp.
Use your pliers to flatten the first coil (ring). Release your pliers and pull the cord slightly to ensure that it is securely in place. If not, press it tighter until it is secure.
The flattened first coil will look like this.
You can finish off your piece by attaching a clasp to one end of your necklace, and a jump ring to the other end.
Return from how to use Coil Crimps to Home Page
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688940.72/warc/CC-MAIN-20170922112142-20170922132142-00221.warc.gz
|
CC-MAIN-2017-39
| 647
| 7
|
http://www.techhelpmanual.com/244-int_1ah__timer_i_o__and_mrci_post_hook_.html
|
code
|
INT 1aH: Timer I/O (and MRCI POST Hook)
INT 1aH services provide access to the system clock. Also INT 1aH may be
intercepted by a hardware-based MRCI compression system.
b001H Query MRCI hardware support
AH BIOS Service Supported by
▀▀▀ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ ▀▀▀▀▀▀▀▀▀▀▀▀▀▀
00H read the clock (ticks) [PC] [XT] [AT]
01H set the clock (ticks) [PC] [XT] [AT]
02H read time from CMOS RTC [AT]
03H set the time on CMOS RTC [AT]
04H read date from CMOS RTC [AT]
05H set the date on CMOS RTC [AT]
06H set alarm on CMOS RTC [AT]
07H cancel alarm on CMOS RTC [AT]
The PC BIOS works with a "tick count" of the number of 55ms intervals
which have occurred since the PC was turned on or reset. The AT BIOS also
provides access to the real-time clock values which are updated constantly
without CPU action, and are stored in the AT's CMOS Memory.
On AT-compatible machines, most short-interval timer/alarm operations are
perfomed via INT 15H.
See Also: ROM-BIOS Functions
System Information Functions (DOS fns)
BIOS Data Area (0040:006c)
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056711.62/warc/CC-MAIN-20210919035453-20210919065453-00409.warc.gz
|
CC-MAIN-2021-39
| 1,113
| 23
|
https://github.com/JonKitzrow?tab=repositories
|
code
|
Hide content and notifications from this user.
Learn more about blocking users
Contact Support about this user’s behavior.
Learn more about reporting abuse
Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 50 million developers.
A game about creating bridges from moment to moment
A game where you must survive the night in a shifting labyrinth
A 2D game about aim and balance
A simple brick-breaking ball and paddle game
A game where you bash slimes together for fun and profit
The assets I use in my game prototypes
A high-energy, chancey combo of two beloved classics.
A dodging game played with one button
Git repository for Unity claw project
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738723.55/warc/CC-MAIN-20200810235513-20200811025513-00201.warc.gz
|
CC-MAIN-2020-34
| 714
| 14
|
https://findwork.dev/49511/product-engineer-sr-backend-engineer-account-manager-account-executive-at-chartable
|
code
|
Chartable's podcast analytics and attribution tools help publishers grow, and help brands & agencies understand their spend. We're trusted by top publishers and brands to handle hundreds of millions of podcast downloads per month.
We’re a startup in a growing market, funded by top-tier investors including Initialized Capital, Naval Ravikant, Greycroft, Ryan Hoover, and others. We offer great benefits (medical, dental, gym, vacation, etc), and a generous options grant.
We don't care about where you went to school, or whether you have a Big Name on your résumé. We love to work with people who are driven, kind, and proactive. Though we're based in New York, we're open to working with anyone within the continental US. (We're unfortunately unable to accept international applicants.)
* Rails (backend) and React (frontend)
* Heroku and AWS Lambda/Serverless
* Postgres, Redis, Citus Data, and Elasticsearch
* Product Engineer (Come help build, improve and maintain Chartable’s suite of products)
* Senior Backend Engineer (Help us move to a stream-based architecture!)
* Account Manager (sales, support, customer service)
* Account Executive (business development, sales)
For more information and to apply: https://chartable.com/jobs/
Product Engineer, Sr. Backend Engineer, Account Manager, ChartableNew York City, NY
Senior Back-End Product Engineer (RoR), Advisable.comEurope Only Full Time Employment
Backend Engineer, Musement | TUI groupMilano - via Polesine 13 Full Time Employment | 30k € - 50k €
Product Engineer, BuildBookUSA Only Full Time Employment
Senior Backend Engineer, Primer.aiAnywhere (100% Remote) Only Full Time Employment
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402124756.81/warc/CC-MAIN-20201001062039-20201001092039-00269.warc.gz
|
CC-MAIN-2020-40
| 1,659
| 16
|
https://it.toolbox.com/blogs/ianmcgrath/how-to-build-your-first-product-prototype-102315
|
code
|
Being the technical cofounder for a startup can be extremely stressful. What you build, and how you build it can completely define the future of your startup. This is especially true for websites that see an exponential growth trajectory – in such cases, inefficient database management can kill visitor enthusiasm and ultimately your startup.
What You Know Vs. What Is Ideal
The first question to ask before you start coding your idea is to identify the right technology to use. Should you write your code in a language that you are most comfortable with? Or, should it be written in a language that you may not really know very well but is ideal for the kind of tasks your website does? At the outset, it may seem like it is a good idea to at least code the first-stage prototype in the language you are comfortable with. The reasoning is that you are more likely to build the code more efficiently when you have mastery over the language. But that is an extremely myopic view.
Certain tasks require certain technologies to work efficiently. For instance, if you work with what is technically big data, it is essential to make use of a framework like Hadoop. Working on a LAMP framework simply because you are comfortable with MySQL is not going to cut it. So in essence, it is recommended that you build your prototype in a technology framework that is ideal for that task – even if this means longer TTM (Time-To-Market).
Fortunately though, there are sufficient channels to seek help online when building your prototype in a technology that is new to you. StackExchange is one popular forum for developers to seek advice on objective development related questions. The forum has multiple tags that cater to different technologies – this way, you can seek help from exactly those people who are knowledgeable in the area.
But perhaps a better tool to use at this stage of your startup is Codementor. Think of it as your “CTO on-demand”. This is a platform that connects developers to mentors who are proficient in various technologies and platforms. An one on one live pair programming session with mentors is a good way to ask subjective questions and seek help debugging code at the early stages of your startup. The platform has several star mentors like Martijn Pieters who is among the most authoritative Python contributors on Stack Exchange and Ruby on Rails writer Michael Hartl.
The final stage of prototype-building is actually testing the product to see if it works. In the area of web development, this stage is divided into two components - alpha and beta testing. During the alpha testing stage, the product is extensively tested in-house in a controlled environment. The product is launched for beta testing when most of the core technical issues in the product are fixed and the product is ready for customers. While it is not uncommon for web start-ups to go directly from development stage to beta-testing, it is highly recommended to have at least a few weeks of alpha-testing. This is especially critical for businesses that handle money or perform critical tasks like handling sensitive data or information. A technical breach in the initial stages of launch can destroy your product's credibility.
Launching a technology product does not have to be hard. Using the right tools and following the right steps should steer you towards a successful launch of your product. What are your thoughts?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824912.16/warc/CC-MAIN-20181213145807-20181213171307-00071.warc.gz
|
CC-MAIN-2018-51
| 3,428
| 8
|