url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://www.upwork.com/o/jobs/browse/?q=content+writing&page=2
code
I have a personal wordpress site with some of my writing. Currently it is not in good form. I have add about 20 pages. ... I have add about 20 pages. It is in a "blog" format. But I have writings that are more suited for putting them in "catagories" rather than dated blogs. ... I will like to be able to send articles to my Admin support via e-mail, with a title and tags, and have someone else load them, and make sure they look good on the site. This is largely Christian content. This also may include some creative design work, some graphic work, some website optimization, and some e-commerce.
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860109830.69/warc/CC-MAIN-20160428161509-00100-ip-10-239-7-51.ec2.internal.warc.gz
CC-MAIN-2016-18
599
3
https://guides.lib.uh.edu/c.php?g=432637&p=2953043
code
Below is a just a sample of the more than 300 databases available through the University of Houston Libraries. Need to track a citation, find out who's citing whom, or see a journal's impact factor? Try the sources below: Once you find an article you want to access, the "full text" may be available online. There are three things to look for: PDF or HTML links will take you directly to the article. Use the Find This Item button to
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474746.1/warc/CC-MAIN-20240228211701-20240229001701-00442.warc.gz
CC-MAIN-2024-10
433
5
https://musescore.org/en/node/339917
code
Suggestion: Changeable order of notes in drum set palette This suggestion relates to input of drum notation, which has its own palette containing the usable notes/sounds (see attached image). What currently happens: Currently, selecting a note on a drum stave and using the up/down arrow cycles through the order of the drum notes in the palette at the bottom of the screen. The order of these drum notes is arranged by general midi, which means that the notes jump randomly around the stave when doing this. This makes the arrow keys pretty much unusable in practice. This has frustrated me so much in the past that I simply recreated the score using a piano stave and manually adjusted the noteheads to reach the correct appearance (which is a ridiculous workaround). What I would like to happen: I would like the arrow keys to correspond to the visual direction of the notes on the stave (much like it does with pitched instruments). In practice, having an adjustable order the notes in the palette at the bottom of the screen would achieve this. This would not affect existing users but would allow everyone to use the arrow keys in their preferred way. (I posted before about this here: https://musescore.org/en/node/339304 , and I've seen others complain about this in the past, but here is the official feature suggestion) |Screenshot 2022-12-20 at 17.58.57.png
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817249.26/warc/CC-MAIN-20240418222029-20240419012029-00246.warc.gz
CC-MAIN-2024-18
1,368
8
http://www.pokecommunity.com/showpost.php?p=6735510&postcount=13
code
Quote originally posted by Alley Cat: What exactly do you guys mean by a typo thread? View original post I've seen a few threads where there was a typo somewhere on the site, and there's no quick way to do so. You have to make an entirely new thread just to point out one typo, lol.
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396222.11/warc/CC-MAIN-20160624154956-00168-ip-10-164-35-72.ec2.internal.warc.gz
CC-MAIN-2016-26
282
4
https://www.itsyourip.com/ip-tools/pound-light-weight-reverse-proxy-and-load-balancer/
code
Pound is a reverse proxy, load balancer and HTTPS front-end for Web server(s). Pound was developed to enable distributing the load among several Web-servers and to allow for a convenient SSL wrapper for those Web servers that do not offer it natively. Pound is distributed under the GPL license. Pound is a very small program, easily audited for security problems. It can run as setuid/setgid and/or in a chroot jail. Pound does not access the hard-disk at all (except for reading the certificate file on start, if required) and should thus pose no security threat to any machine. Pound is set to have performed well in large volums of upto 30M connections per day with over 600 requests/second at peak. Pound functions as a , Reverse-Proxy: Passes requests from client browsers to one or more back-end servers. Load Balancer: Distribute the requests from the client browsers among several back-end servers, while keeping session information. SSL wrapper: Decrypt HTTPS requests from client browsers and pass them as plain HTTP to the back-end servers. HTTP/HTTPS sanitizer: Verify requests for correctness and accept only well-formed ones. a fail over-server: should a back-end server fail, Pound will take note of the fact and stop passing requests to it until it recovers. Request Redirector: requests may be distributed among servers according to the requested URL. Pound can also support Virtualhosts. Pound however is not a Webserver or a Web-accelerator or a proxy server. Pound work with a variety of Web servers, including Apache, IIS, Zope, WebLogic, Jakarta/Tomcat, iPlanet, etc. In general Pound passes requests and responses back and forth unchanged, so we have no reason to think that any web server would be incompatible. Client browsers that were tested: IE 5.0/5.5 (Windows) HTTP/HTTPS Netscape 4.7 (Windows/Linux) HTTP/HTTPS Mozilla (Windows/Linux) HTTP/HTTPS Konqueror (Linux) HTTP/HTTPS Galleon (Linux) HTTP/HTTPS Opera (Linux/Windows) HTTP/HTTPS Lynx (Linux) HTTP For more information, download, installation procedures and samples of different configurations can be found here
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506479.32/warc/CC-MAIN-20230923030601-20230923060601-00778.warc.gz
CC-MAIN-2023-40
2,098
21
http://www.pbm.com/oly/archive/design94/0807.html
code
Jay Gischer (email@example.com) Wed, 28 Sep 94 09:38:52 -0700 David desJardins writes: > In other words: you are not allowed to move along the direct path. You > have two routes you could follow which are of equal length. If one > noble goes in one direction, and the other in the other direction, their > paths might not cross. > This is *exactly* the same as what happens in the example that you gave. > It is true in *any* movement system that one can reasonably suggest. But then it isn't really an argument against any one type of movement system such as diagonal movement, is it?
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917127681.50/warc/CC-MAIN-20170423031207-00542-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
585
11
https://teknooinfo.com/enhancing-student-engagement-with-crm-in-education/
code
In right this moment’s digital age, know-how has grow to be an integral a part of schooling. One such know-how that has gained important consideration is Buyer Relationship Administration (CRM) programs. Initially developed for companies to handle buyer relationships, CRM programs have discovered their means into the schooling sector, revolutionizing the way in which academic establishments interact with their college students. What’s CRM in Schooling? CRM in schooling refers to the usage of CRM programs to handle and improve scholar engagement. These programs permit academic establishments to gather, manage, and analyze scholar information, enabling them to supply customized assist and steerage to every scholar. The Advantages of CRM in Schooling Implementing CRM in schooling provides quite a few advantages for each college students and academic establishments: - Improved Communication: CRM programs facilitate seamless communication between college students, lecturers, and directors. College students can simply attain out to their lecturers for help, whereas lecturers can present well timed suggestions and assist. - Personalised Studying: By analyzing scholar information, CRM programs can establish particular person studying wants and preferences. This enables academic establishments to tailor their educating strategies and sources to fulfill the distinctive necessities of every scholar. - Enhanced Scholar Help: CRM programs allow academic establishments to trace scholar progress and establish areas the place extra assist could also be required. This proactive strategy helps stop college students from falling behind and ensures they obtain the required help to succeed. - Streamlined Administrative Processes: CRM programs automate administrative duties corresponding to enrollment, scheduling, and grading. This frees up useful time for lecturers and directors, permitting them to give attention to extra significant interactions with college students. Case Research: XYZ College XYZ College, a number one academic establishment, applied a CRM system to boost scholar engagement. The outcomes have been exceptional: - Scholar Retention: The CRM system helped XYZ College establish at-risk college students and supply focused interventions. Consequently, scholar retention charges elevated by 15%. - Improved Educational Efficiency: By analyzing scholar information, XYZ College recognized areas the place college students have been struggling. With customized assist and sources, educational efficiency improved, resulting in greater commencement charges. - Environment friendly Communication: The CRM system streamlined communication between college students and school. College students may simply schedule appointments with their professors, leading to extra productive interactions. Challenges of Implementing CRM in Schooling Whereas CRM programs provide important advantages, their implementation can even pose challenges: - Knowledge Privateness and Safety: Instructional establishments should be sure that scholar information is protected and adjust to information privateness laws. This requires sturdy safety measures and strict information dealing with protocols. - Coaching and Adoption: Lecturers and directors have to be skilled on the way to successfully use CRM programs. Resistance to vary and lack of technical expertise can hinder profitable implementation. - Integration with Current Techniques: Integrating CRM programs with present academic platforms and databases might be advanced. Compatibility points could come up, requiring extra sources and experience. CRM programs have the potential to revolutionize scholar engagement in schooling. By leveraging the ability of information and know-how, academic establishments can present customized assist, improve communication, and streamline administrative processes. Whereas challenges exist, the advantages far outweigh the obstacles. As know-how continues to advance, CRM in schooling will play an more and more very important function in shaping the way forward for studying. Q: How can CRM programs improve scholar engagement? A: CRM programs allow academic establishments to gather and analyze scholar information, permitting for customized assist, improved communication, and streamlined administrative processes. Q: What are the advantages of CRM in schooling? A: CRM in schooling provides advantages corresponding to improved communication, customized studying, enhanced scholar assist, and streamlined administrative processes. Q: What challenges can come up when implementing CRM in schooling? A: Challenges embrace information privateness and safety considerations, coaching and adoption points, and integration with present programs.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476374.40/warc/CC-MAIN-20240303111005-20240303141005-00733.warc.gz
CC-MAIN-2024-10
4,750
26
https://reason.town/machine-learning-technology/
code
If you’re looking to get ahead of the curve in the tech world, you need to know about machine learning technology. This type of artificial intelligence is already being used in a variety of ways, from self-driving cars to predictive analytics. In this blog post, we’ll give you an overview of what machine learning is, how it works, and some of the ways it’s being used today. After reading this post, you’ll have a better understanding of this cutting-edge Checkout this video: Machine learning is a form of artificial intelligence that allows computers to learn from data without being explicitly programmed. This technology is used in a variety of areas, including price predictions, consumer behavior analysis, and fraud detection. Machine learning is based on algorithms that automatically learn from and improve with experience. These algorithms can either be supervised, meaning they are given a set of training data to learn from, or unsupervised, meaning they learn from data that is not labeled or categorized. There are many different types of machine learning algorithms, each with its own strengths and weaknesses. Some of the most popular include support vector machines, decision trees, random forests, and neural networks. Machine learning is a rapidly evolving field, with new breakthroughs being made every day. However, it still has its limitations; for instance, it can be difficult to achieve human-level accuracy with some tasks. Despite this, machine learning technology is becoming increasingly widespread and is likely to have a major impact on our world in the years to come. What is Machine Learning? Machine learning is a process of teaching computers to make decisions for themselves. This process is similar to the way that humans learn, except that computers can learn much faster and with more accuracy. The goal of machine learning is to enable computers to improve their own performance by learning from data, without being explicitly programmed to do so. Machine learning technology is already being used in a number of different ways, such as Google’s self-driving cars, which use machine learning algorithms to navigate; spam filters, which use machine learning to identify and block spam emails; and fraud detection systems, which use machine learning to identify suspicious activity. There are two main types of machine learning: supervised and unsupervised. Supervised learning is where the computer is given a set of training data, and it is then able to learn and generalize from this data in order to make predictions about new data. Unsupervised learning is where the computer is given data but not told what to do with it; it has to figure out for itself what patterns exist within the data. Both supervised and unsupervised learning can be used for either regression (predicting a continuous value) or classification (predicting a class label). How Does Machine Learning Work? Machine learning is a branch of artificial intelligence that deals with the design and development of algorithms that can learn from and make predictions on data. These algorithms are used to build models that can generalize from a set of training data to make predictions on new, unseen data. Machine learning is a iterative process, where the model is trained on a given dataset, and then tested on another dataset. The performance of the model is then measured, and the process is repeated until the model achieves the desired accuracy. There are three main types of machine learning algorithms: supervised, unsupervised, and reinforcement learning. Supervised learning algorithms are used when there is a known set of training data with labels. The algorithm learn from the training data, and is then able to generalize to make predictions on new, unseen data. Unsupervised learning algorithms are used when there is no known set of training data, or when thedata is not labeled. The algorithm tries to find structure in the data by finding clusters or groups of data points. Reinforcement learning algorithms are used when there is an environment that can be interacted with, and a goal that needs to be achieved. The algorithm learns by trial and error, by trying different actions in the environment and receiving rewards or punishments based on its performance. Types of Machine Learning There are three types of machine learning: supervised learning, unsupervised learning, and reinforcement learning. Supervised learning is when the computer is given a set of training data, and its task is to learn a general rule that can be used to make predictions on new data. The training data contains the correct answers (called labels), so the computer can check its prediction against the training data to see how accurate it is. Unsupervised learning is when the computer is given data but not told what the correct answers are. The computer has to find some way of making sense of the data, which might be done by looking for patterns or groupings in the data. Reinforcement learning is when the computer learns by trial and error, like a child learning how to ride a bike. It starts off with no idea how to do the task, but it tries different things and gets rewards for doing well and penalties for doing badly. Over time, it figures out what works best and gets better at doing the task. Applications of Machine Learning Applications of machine learning technology can be found in a variety of fields, including: Benefits of Machine Learning Machine learning technology is revolutionizing the way businesses operate and make decisions. By automating the process of recognizing patterns and insights in data, machine learning enables businesses to make better decisions faster and with greater accuracy. There are many benefits of machine learning, but some of the most notable benefits include: -Improved decisionmaking: Machine learning enables businesses to automatically identify patterns and insights in data, which can help improve decisionmaking. -Faster decisions: By automating the process of identifying patterns and insights, machine learning can help businesses make decisions faster. -Greater accuracy: Machine learning can help businesses achieve greater accuracy in their decisionmaking by reducing human error. -Increased efficiency: Machine learning can automate repetitive tasks and processes, which can help increase efficiency and free up employees to focus on more strategic tasks. Drawbacks of Machine Learning While machine learning technology can offer significant advantages, there are also some possible disadvantages to consider. One potential drawback is that machine learning algorithms can be biased. This can happen if the data used to train the algorithm is itself biased. For example, if an algorithm is trained using data that includes a disproportionate number of people from one gender or one racial group, then the algorithm may be more likely to produce results that are biased against people from other groups. Another potential drawback of machine learning is that it can be difficult to understand how an algorithm has arrived at a particular result. This “black box” problem is particularly acute in the case of deep learning, which involves training algorithms using huge amounts of data and multiple layers of processing. It can be very difficult for humans to understand how a deep learning algorithm has come to a particular conclusion, which could lead to problems if the algorithm produces incorrect or undesirable results. The Future of Machine Learning Machine learning is a form of artificial intelligence (AI) that enables computers to learn from data and improve their accuracy over time without being explicitly programmed. The term “machine learning” was coined in 1959 by Arthur Samuel, an American computer scientist who wrote the first algorithm for self-learning machines. Machine learning algorithms are used in a variety of applications, including email filtering, detection of network intruders, and computer vision. The most common type of machine learning algorithm is the supervised learning algorithm, which is used to create a model that can be used to make predictions on new data. Supervised learning algorithms are trained on a labeled dataset, where each example has a known label (such as “spam” or “not spam”). Unsupervised learning algorithms are used to find patterns in data. Clustering algorithms are one type of unsupervised learning algorithm that can be used to group data points into clusters based on their similarity. Anomaly detection algorithms are another type of unsupervised learning algorithm that can be used to detect outliers in data. Reinforcement learning algorithms are a type of machine learning algorithm that interacts with its environment by trying to maximize a reward signal. The most well-known reinforcement learning algorithm is the Q-learning algorithm, which was developed by University of California, Berkeley professor Richard Sutton in the 1980s. Deep learning is a type of machine learning that uses artificial neural networks (ANNs) – algorithms that have been inspired by the brain – to learn from data. Deep learning algorithms are able to automatically extract features from raw data and improve their performance over time through experience. Machine learning technology is constantly evolving, and new applications for it are being found all the time. It is likely that machine learning will become increasingly important in the years to come as we find new ways to use it to improve our lives and our world. What is machine learning technology? Machine learning technology is a type of artificial intelligence that allows computers to learn from data, identify patterns and make predictions. How does machine learning technology work? Machine learning technology uses algorithms to identify patterns in data. These algorithms learn from data, making predictions or recommendations based on what they have learned. What are some applications of machine learning technology? Some common applications of machine learning technology include: -Predicting consumer behavior -Identifying fraudulent activity -Recommendations (e.g., music, movies, products) – personalization (e.g., ads, search results) -time series prediction Machine learning technology is still in its early stages, and there is much researchers don’t yet understand about how it works. Despite these limitations, machine learning systems are becoming increasingly widespread, with applications in everything from self-driving cars to crime prediction. As machine learning technology continues to evolve, it is likely to have a profound impact on our world.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335004.95/warc/CC-MAIN-20220927100008-20220927130008-00349.warc.gz
CC-MAIN-2022-40
10,700
55
https://forums.macrumors.com/threads/your-uptime.147819/
code
I'm checking my uptime from time to time, dunno why, but it's fun when I think that just a little less than month ago I had to start the windows machine every single time I used it and then shut it down. And all the silly restarts & stuff, too. This iBook was last time restarted when I updated some program, iPhoto wasn't it? Just open your console, write "uptime" and copy-paste your uptime! Mine says currently: up 8 days, 1:03, 2 users, load averages: 0.13 0.32 0.83 What are load averages, btw?
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828501.85/warc/CC-MAIN-20181217091227-20181217113227-00062.warc.gz
CC-MAIN-2018-51
499
1
http://www.verycomputer.com/185_25b3f6eecc34b44b_1.htm
code
Yesterday afternoon, we attempted to replace the 2nd CPU (which was suspected to be causing some recent PANICs) in our Compaq ProLiant 5000. After a normal Unix "shutdown -g0 -y" and power-off, the old CPU2 chip was removed and the new one installed. When attempting to reboot, the message "unsupported processor" appeared and the system halted. We then found that the CPU kit contained a new ROMPaq diskette (Ver. 3.14, 09/25/1997) and instructions. We cold-booted the system with the ROMPaq diskette in drive A and allowed the firmware upgrade to complete. When we then rebooted, we got the following message: WARNING: hd : no root disk controller PANIC: srmountfun - Error 19 mounting rootdev (1/42) Unable to freeze processor 2, proceeding. Error 19 opening dumpdev (1/41) Dump not completed ** Safe to Power Off ** ** Press any key to Reboot ** Looking at SCO website, I found a couple of articles pertaining to this problem, and the recommended solution was to run the EISA Configuration Utility. So, we did this, but every time we attempt to reboot, we get the I called Compaq Tech Support and spoke with two technicians. The first one had me clear non-volatile RAM (using Compaq Configuration Utility), save configuration, and then reboot, run Compaq Configuration Utility again, and configure (manually). They had me change some IRQ settings. Rebooting again resulted in same errors. At his suggestion, I ran Compaq Diagnostics on CPU, RAM, and Drive Array. No problems were detected. They then had me remove 128mb RAM (which had been installed a week ago without problem) and try to reboot, run EISA Config, and boot SCO. Same result. We also tried removing the 2nd CPU and repeating reboot, EISA Config, boot SCO, with the same result. And, we tried with only CPU1, only CPU2 (in the CPU1 position), and only CPU1 with the new processor. All with the same result. The second technician told me the next step is to replace the System I/O Board. So, we're ordering one. But, I think the problem is within SCO or my EISA configuration. I've tried reloading a different ROMPaq, in case the diskette that came with the CPU was causing the problem (making diskette from Compaq CD), running EISA Config, and rebooting SCO. Same result. I'm desperately seeking help. We'll be reseating all the boards this morning. If that doesn't solve problem, I'll attempt to boot from Emergency Boot/Root Diskettes. But, I suspect one of you has a clue to help me resolve this problem. uname -X follows: System = SCO_SV Node = cbscmpq2 Release = 3.2v5.0.2 KernelID = 96/01/23 Machine = Pentium BusType = EISA Serial = sco009767 Users = 512-user OEM# = 0 Origin# = 1 NumCPU = 2 Hardware is Compaq Proliant 5000, 2-200mhz pentium processors (w/512k cache), 256mb RAM, Smart Array (7 4gb SCSI drives, 6 of which are mirrored, 7th is hot spare.), Wangdat 4mm DAT, cd-rom, 3.5" 1.44mb floppy Steven L. Stein Cornell Business Services
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363157.32/warc/CC-MAIN-20211205100135-20211205130135-00446.warc.gz
CC-MAIN-2021-49
2,918
59
https://finderding.com/windows-on-the-side/
code
Well, it was great news to see that Wireshark 3.0 was finally released, but unfortunately I’m still stuck with 2.6.5 in my “MX 18.1 Continuum” distribution for now. I was able to install 3.0 on a laptop running Windows 10 to start testing the new release, but this will only be temporary until the MX repository is updated with the new version of Wireshark. I guess having a Windows machine around for some types of testing comes in handy once in a while. This isn’t enough reason to drop MX as my daily driver. I chalk these annoyances up as “ to be expected “. I’m sure the new Wireshark release will make it down to the Debian repositories eventually. Windows 10 may have had it available faster, but in the long run I’m sure I’ll be glad I waited for Linux. I’m not a huge fan of PPAs or Manjaro’s AUR repository alternatives. (I do use Manjaro occasionally) They seem to work, but I can usually wait for the main repository updates. Having seen the latest Ubuntu 16.04.6 LTS release reaffirms my belief that a lot of LINUX users tend to hold on to what works for them more often then leap into the next big thing. Sometimes this is driven by hardware constraints or limitations. This is probably why I’m reluctant to have updates pushed into my system from Microsoft or Apple as opposed to controlling updates and package downloads myself. I also prefer to avoid bloatware on my system as well….if possible. Since I’ve started using MX I find myself drifting farther away from some of the other popular Linux distributions. I can spend more time working with Linux, rather than constantly trying out new releases. I’ve gone a few months without using a Mac, and I don’t miss it yet. I loaded MX onto my very inexpensive Lenovo IdeaPad 110S and it works like a champ. It’s a couple of years old now, but still going strong as a test machine. (Used for testing low resource supporting LINUX distributions). There are times when I do reach for my Windows 10 laptop to check out any interesting developments in the Microsoft world. You might think this would be a good reason to duel boot Windows and Linux, or run Virtual machines. I’ve done that, but prefer to run Linux as the only Operating System on a dedicated laptop. If I need Windows for a quick test, I can install it on a spare laptop for a short time, and then re-use the machine to test other Linux distributions. This sounds like a hassle, but it works for me. I can even run Wine to use some Windows applications – like the new Wireshark release, and I have done that to test the 2.9 development releases. This does give you some productive options. My goal is to be totally Windows free, and I’m getting closer as Linux distributions keep improving. For now, access to a Windows 10 machine is still useful, but it also feels like a limitation. MX Package Installer does support flatpacks, which I was able to use to Install Wireshark stable (3.0). This will work for me for now until the MX Stable Repo replaces 22.214.171.124 with 3.0 This was a much simpler solution than using Wine or a Windows OS.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400188049.8/warc/CC-MAIN-20200918155203-20200918185203-00608.warc.gz
CC-MAIN-2020-40
3,108
9
https://hasgeek.com/inclojure/2020/sub/debuggers-in-lisps-JPB9mDWP6nKi7z4HtsDhhM
code
We began in Pune in 2016 and after two editions in namma Bengaluru, we’re delighted to come full circle back to apla Pune (and all those delicious bakarwadis and modaks). As India’s premiere Clojure and ClojureScript conference, we strive to facilitate the free exchange of ideas between new and experienced programmers alike. Over the years, IN/Clojure has served as a platform to kickstart a series of Clojure workshops and meet-ups across the country. And it has helped attendees make a strong case for Clojure, and Clojurescript adoption in their companies. We believe that this edition of the conference, like previous editions will foster the growing Clojure community in Asia. Who should attend? Whether you are knee-deep writing macros that write macros, or struggling to escape the beginner’s plateau, or wondering if/why/how to adopt Clojure in your organization, or are in it purely for the joy of learning, IN/Clojure is the event bringing together a great mix of Clojure/Script masters, practitioners, and newcomers from across India and beyond. We welcome you to join nearly 149 other people and... - Speak: CFP is open till 20 Jan 2020. - Learn: We run two all-day hands-on Clojure workshops. Check 'em out here. - Converse: Derive some sweet cerebral expansion from the talks, the tweetstorms, and the “hallway tracks”. - Inspire: Trade notes, ideas, tools, and techniques with new and experienced Clojure programmers alike (photostream). - Be Inspired : Start that project, that meetup, that hack night, that business, that beautiful work of art. - Sponsor: Help foster the growing Clojure and FP community in India/Asia. - Network: Meet seasoned practitioners and awesome sponsors (listed below). Hire or get hired. Acquire or get acquired ;-) - Grab: Some cool swag, and some fun swag, and some zany swag. - Party: Eat, drink, and make merry with some of the nicest people around. Plus, this year we enjoy the company of the perennially effervescent Bozhidar Batsov; prolific Clojurist, Emacs fanatic, maintainer of CIDER, and Lisp hacker extraordinaire. (Oh, and tickets are going, going, going... grab yours while stocks last.) #Speaker travel support Debuggers in Lisps Debuggers are one of the most essential tools for any kind of development. Debuggers in Lispy languages make use of Lisp’s homoiconicity. They are a bit different from debuggers for languages like C or Java. This kind of information is usually not needed in day to day development and hence it remains hidden. In this talk, I will take Clojure’s cider-debug as an example and explain how it uses homoiconicity. Along with cider-debug, I will also talk about REPLs and how REPL client-server communication happens (with nREPL as an example). - Why do we need debuggers. - How GDB works. - Properties of Lisp. - How Cider debug works. I’m going to try and explain most of the things without assuming any prior knowledge of Clojure. But being familiar with Clojure (or some Lisp) will surely help. Software Artisan at Helpshift Inc.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100523.4/warc/CC-MAIN-20231204020432-20231204050432-00215.warc.gz
CC-MAIN-2023-50
3,037
31
https://windowsreport.com/onenote-saved-offline-error/
code
Read the affiliate disclosure page to find out how can you help Windows Report effortlessly and without spending any money. Read more - First of all, it is a good idea to look for the root of the OneNote saved offline error in connection issues. - Also, you can do the sync process manually or free up your storage to solve the problem. - The ultimate solution would be to transfer your data to a new section and hope everything goes well! If you are interested in note-taking applications, OneNote is one of the best and oldest at the same time. On top of that, Microsoft offers this useful software on all platforms for free. Another advantage of OneNote is that it uses Microsoft’s OneDrive cloud platform to sync the notes among all devices so that you will have access to your notes everywhere and every time. In addition to the app’s many benefits, there are a few drawbacks, and one of them is OneNote’s saved offline error. However, this article is going to help you to fix it. Why does OneNote keep saying saved offline? The online sync feature sometimes becomes a disadvantage and can get you in trouble such as sync problems. There are multiple factors resulting in OneNote not syncing which Internet connection, outdated OneNote version, not enough space, server errors, service not available, and misplaced sections in OneNote are among them. Now, let’s dive into the solutions. How do I fix OneNote offline error? 1. Check Notebook on the web - Open your notebook in the OneNote desktop app. - Go to File and then select Info. Then copy the Notebook path located under the notebook name. - Open a web browser and paste the link into the address bar. - Check if the Notebook is opening on the web, then the issue is with the installed app on the devices. To fix OneNote saved offline error on Mac, open a Notebook, head to the Notebook section on the ribbon, select Copy Link to this Notebook, and repeat Step 3. 2. Check service status If your try for the first method was unsuccessful, you need to make sure about the server connection because there is probably a problem with the OneDrive service. Using Internet Explorer or Microsoft Edge, you can quickly see the service status using the Downdetector website. Some errors such as OneNote saved offline error e0001462, E000145C, 0xE40200B4, 0xE401065D, 0xE000145C, or 0xE4010640 appear when syncing notes in OneNote are temporary and occur when the servers are experiencing high traffic and are under load. 3. Sync your notebook manually OneNote saved offline error on Windows 10/11 can easily be fixed by syncing your Notebook manually. To do this, on the OneNote desktop app, right-click on your notebook and select Sync this notebook Now. You can do the same by using the Shift + F9 keyboard shortcut. The trick for the MAC OneNote app is the same: Right-click on the notebook and select sync in this notebook or use the command + S keyboard shortcut. 4. Check storage space and optimize files - In the OneNote app, click File and choose Options. - Now navigate to Save & Backup. - Click Optimize All Files Now under the Optimizing files section. It may take several minutes to do that. - Hold Windows + R keys to open the Run dialog. Type %localappdata%\Microsoft\OneNote\ in the box and click OK. - In the pop-up window, double-click the folder that matches the version number you have installed, 16.0 stands for OneNote 2016 and 15.0 for OneNote 2013. Then navigate to Backup folder to continue. - Delete the file folders you do not want to save. Lack of free space in both local and cloud space may cause sync issues. To resolve this problem, you can delete the OneDrive storage or opt for the Microsoft 365 subscription with 1TB of OneDrive space. For local storage, you need to optimize files or remove unnecessary backup using the abovementioned steps. 5. Move to a new section - On the OneNote app, click the Create a New Section shown by a plus sign. - Type a name for the new section. - In the section with the sync problem, right-click each page, and select the Move or Copy option. - Choose the newly created section as the destination and click Copy. Most of the time, these five methods can address errors due to OneNote sync problems. However, no worries if they disappointed you because there are some alternatives. For example, you can empty OneNote Recycle Bin by navigating to the History tab, then selecting Empty Recycle Bin under the drop-down menu. Also, you can address the conflict issues arising from editing the same part of a page at the same time by another user. To do this, refer to the yellow information bar at the top of the page and simply delete the page responsible for the error. Updating OneNote to the latest version is always a good idea. In the comments section below, let us know if you were able to successfully fix OneNote saved offline error.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474843.87/warc/CC-MAIN-20240229134901-20240229164901-00589.warc.gz
CC-MAIN-2024-10
4,866
45
https://www.maxcrc.de/en/ldap-filters-en/
code
LDAP search filters allow you to find the entries met certain conditions. Userbooster Light comes with a predefined set of Active Directory-specific and LDAP filters. You can customize the definition of on existing filter or create a new one. You can also specify the view for the filter. This view includes the list of attributes, the width of columns in the grid view and the sort order of the attributes. When you need to search particular attributes when a filter is applied, you can do this with a Quick Filter. Leading and trailing wildcards make this even more flexible.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816587.89/warc/CC-MAIN-20240413083102-20240413113102-00165.warc.gz
CC-MAIN-2024-18
577
2
https://osc-international.com/osc-sheffield/example-post-sheffield/
code
Teaching Reproducible Research and Open Science Conference Reproducibility has gained significant attention in research, and many disciplines have now adopted policies recognizing the value of open scholarship. However, it has not yet assumed a central place in the teaching of research methods. We would like to invite academics to discuss the benefits of teaching reproducible research and open science at undergraduate and postgraduate levels. This three day event consists of a one-day symposium with conference style presentations, a workshop on teaching transparent methods of empirical research, and individual or small group in-person consultations with Project TIER Directors. The event is free to attend upon registration, details for each day are outlined below along with how to book. If you have any questions regarding the conference please contact firstname.lastname@example.org
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474737.17/warc/CC-MAIN-20240228143955-20240228173955-00100.warc.gz
CC-MAIN-2024-10
893
5
https://kkye.artstation.com/projects/zAmP84
code
Sol Floreo is an atmospheric space odyssey where the player takes control of the sun, guiding a flower on its quest to revive the universe, one planet at a time. Sol Floreo was created by a team of 9 students as a final year project at Swinburne University. I was the rendering and 3D expert on the team and was responsible implementing a consistent look throughout the project. I used Unity's post processing stack to develop unique profiles per level, and (in collaboration with the software team) developed the behaviour of changing colours to match level progress. I also designed a solution for the gradual increase of atmospheric density which involved diving into shader code and extending the post processing stack to suit our needs. In order to make futures tweaks of these solutions quicker for myself, and more accessible for others, I made an editor extension to compile the editable fields into one easy list. The game can be downloaded here: https://tessellate9.itch.io/sol-floreo
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100745.32/warc/CC-MAIN-20231208112926-20231208142926-00322.warc.gz
CC-MAIN-2023-50
994
6
https://line6.com/support/profile/1506650-denis347/content/
code
Hi, I have been using my POD HD 300 for over 2 years now. Yesterday when I started my POD, there was no sound coming out of the device. I tried MP3 Input and it worked, I could hear the sound, but when I try to play the guitar, it seems that it is not getting any signal from guitar input (because the tuner doesn't work as well). I also tried sound from my computer through USB input, but no luck there as well. Factory reset, reinstalling firmware, reinstalling driver, non of these things seem to help. To summarize: no guitar input, no guitar output (obviously), no USB output, MP3 output works. I really don't know what might happen. Thanks for all help and suggestions.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711013.11/warc/CC-MAIN-20221205064509-20221205094509-00432.warc.gz
CC-MAIN-2022-49
675
4
http://fanfiction.mugglenet.com/viewuser.php?action=favlist&uid=117639
code
Hey, I'm Addy! I am weird (hence the username). I don't really write stories , I just read and review 'em! I do have ideas for stories, however, and I am also found lurking around in the Beta Forms. I am a proud Gryffinpuff! Rawf! I am taking a break from the story I'm working on right now. (FYI- I'm not going to post it until it's done.) I want it to be really good.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084888302.37/warc/CC-MAIN-20180119224212-20180120004212-00125.warc.gz
CC-MAIN-2018-05
369
2
https://quizlet.com/641600667/economics-chapter-25-flash-cards/
code
Study sets, textbooks, questions Upgrade to remove ads Economics Chapter 25 Terms in this set (28) What do we call the market where households buy goods & services? Goods & services market What do we call the market where businesses buy resources to make goods & services? Businesses buy labor, machines, raw materials In a market economy, who owns resources? People -> households Natural resources, machines, technology, land, buildings used in production of goods & services The skill and knowledge that humans have to produce goods and services Skills and knowledge that help people be more productive You invest in human capital by going to college Labor that does not require formal education Labor that requires a college degree or vocational training The demand for resources is derived from demand for the final good/service How will an increase in demand for a product affect demand for a resource used to make the product> Leads to an increase in demand for resources used to make products How will a decrease in demand for a product affects demand for a resource used to make a product? Leads to a decrease in demand for resources used to make a product How will an increase in productivity of a resource affect demand for the resource? Leads to an increase in demand for the resource How will a decrease in productivity of a resource affect demand for the resource? Leads to a decrease in demand for the resource Substitutes in production When a decrease in price of one resource leads to a decrease in demand for the other resource the two resources are substitutes in production Compliments in production When a decrease in price of one resource leads to an increase in demand for other resource the two resources are compliments in production Increase in output resulting from using one more unit of input Law of diminishing returns As you use additional amounts of an input, the productivity of that put will eventually decline Increase in total revenue of company when they sell 1 more item Marginal revenue product Increase in total revenue of company from using 1 additional unit of input Value marginal product Market value of the marginal product of an additional worker VMP = MP * Price If a market is very competitive then MRP = VMP How many workers should you hire? Hire until MRP greater than or equal to price of labor (wage) How many machine should you buy? Purchase machines until MRP greater than or equal to price of machines Unskilled labor in equation skilled labor in equation Machine in equation How does short-run affect elasticity of supply? More relatively in elastic > steeper curve How does long-run affect elasticity of supply? More elastic > flatter curve Takes time for substitute products to come to market What do prices do? Coordinate actions of buyers & sellers Communicate relevant information High prices > scarcity Provides an incentive Sets found in the same folder Economics Chapter 26 Economics Chapter 6 Other sets by this creator Economics Chapter 8 Exam 3 Economics Exam 3 Chapter 9 Economics Chapter 7 Economics Exam 1
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300624.10/warc/CC-MAIN-20220117212242-20220118002242-00131.warc.gz
CC-MAIN-2022-05
3,074
64
http://paul.kedrosky.com/archives/2006/12/segmenting_the.html
code
Nick Carr has done an entertainingly ad hoc segmentation of the search industry based on the most popular searches of 2006: … I think I can suggest the following market segmentation: Google users are dweebs. Yahoo users are horndogs. And AOL users are geezers. This is wildly influenced by keyword filtering, but is still entertaining stuff.
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257821671.5/warc/CC-MAIN-20160723071021-00045-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
343
3
https://filehippo.com/it/download_getright/1207/
code
GetRight is a download manager that simply improves and optimizes the files you download from the Internet. With GetRight, you never need to worry about your web connection failing in the middle of a large download. This is great for any Internet connection, and is especially important if you use a wireless or dial-up connection. When using GetRight, you will be able to resume your download right where it left off. People with Cable, DSL, or other fast Internet connections can benefit greatly from GetRight's Download Acceleration, Automatic Downloading, and Server Synchronization. - Fast - Accelerate downloads by getting files from several servers at once. - Safe - Recover downloads that are interrupted for any reason - lost connections, crashes, etc. - Secure - No more lost files, easily see what is in progress and find your finished downloads. - Easy-to-use - Works within your web browser to make downloading a snap, but with easy access to advanced features for power users. - Powerful - Advanced downloading technology for both the novice and the expert! - Supports HTTP, HTTPS, FTP, FTPS, and BitTorrent. - Flexible - Supports FireFox, Internet Explorer, & Opera browsers. - Runs on Windows Vista, XP, 2000, NT, ME, 98 & 95. - Private - No Spyware! - Fix problem when resuming a >2GB file when it was past the 2GB point. - Added so Podcasts will use the Title as the description for an item. - Fixed installer so uses the right icon for in-progress downloads. - The newer graphic when downloading as a tray icon with XP didn't with some custom XP themes (custom ones only?). Did a different way, won't match as exactly (grays with very subtly faded GetRight logo), but is prettier than the older style! - Fixed so Edit/Delete from right clicking on an server in the report at the bottom of the download window itself works and doesn't crash. - Refresh the main tray icon if you turn off the animation for it. - A few little text fixes, found by Italian translator M.Leuzzi - Didn't handle Content-MD5: header right (so just didn't get the MD5 from it at all--the Windows Vista beta was the first file I'd seen use the header!) - Fix so updated translations shouldn't get duplicate items on the Languages page. - Added a new script command for whendone scripts: if filename xxx.xyz - Fix so config pages with sub-tabs (Proxy, Browser) enable the Apply button right. - Fix so config messages about restarting your browsers will only happen once, even if Apply is clicked several times. - Fix for the "Prompt in Web Browser..." option on the Types & Options; so the prompt uses the new logo icon. - Should have done it before...Signed EXEs for the Installer and GetRight.exe - Fix to handle those few servers that don't like a "Range:0"; (resuming from the beginning.) - Fix to handle an odd case with Content-Disposition:
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815812.83/warc/CC-MAIN-20180224132508-20180224152508-00107.warc.gz
CC-MAIN-2018-09
2,837
28
https://changelog.com/person/xeraa/podcasts
code
Elasticsearch and doubling down on "open" Philipp Krenn joined the show to talk with us about Elasticsearch, the problem it solves, where it came from, and where it’s at today. We discussed the query language, what it can be compared to, whether or not it’s a database replacement or a database complement, Elasticsearch vs Elastic the company. We also talked about the details behind Elastic’s plan of “doubling down on open” to open up X-Pack, which is open code paid add-on features to Elasticsearch. We discussed the implications of this on their business model, and what changes will take place at the code and license level on GitHub.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652161.52/warc/CC-MAIN-20230605185809-20230605215809-00187.warc.gz
CC-MAIN-2023-23
650
3
https://forums.adobe.com/thread/804101
code
Here is my problem - hopefully someone can help me out with a solution I have had a flyer designed by someone which is essentially in 2 parts - an image at the top and some narrative at the bottom. It has been converted from Corel Draw into a .pdf file I want to send it out in the body of an email (not as an attachment) I have tried to cut and paste it into the body of the email but only the image gets copied and not the narrative. When I try to select the full area by going to the top left and thenleft click and hold and drag the range down to the bottom right it all appears to be selected as it all goes into shadow - however when I release the left mouse button the area in shadow jumps back so that it only covers the image part and not the narrative part.
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815318.53/warc/CC-MAIN-20180224033332-20180224053332-00706.warc.gz
CC-MAIN-2018-09
767
5
https://reverseengineering.stackexchange.com/questions/24661/what-does-this-decompiled-line-mean
code
code does mean that something is interpreted as code to execute (most likely a function) But more can be recovered from this snippet than just that something is executed: (**(code **)(*plVar5 + 0x10)) This is most likely a C++ vtable call. plVar5 should be some variable containing a C++ object, or rather a pointer that should be interpreted as a C++ object. At offset 0 (which is just written *plVar5) is the pointer to the vtable of the object. The element at offset 0x10 in the vtable is some function. If this is the 3rd (vtable) or the 5th (vtable) depends on the pointer size, but let's pretend this is 64bit for this explanation ). This means that this is the 3rd entry, which is typically the first true vtable function after the constructor and destructor at vtable and vtable. Lets call this function So the more understandable translation would be (byte *)plVar5->vtable->prepare_buffer(plVar5,(ulonglong)(numBytes + 1)) After substituting our previous result into (byte *)(**(code **)(*plVar5 + 0x10))(plVar5,(ulonglong)(numBytes + 1)) Because this is C++ function of an object the first parameter is the self parameter, which has to be present for non static functions. So the only true argument is (ulonglong)(numBytes + 1). The result is assigned to a variable of type byte * and casted as such. memcpy(__dest,param_2,numBytes + 1); This is indeed just a memcopy to the buffer returned by the previous function. Because the only real argument of that previous function call was the number of bytes copied I am assuming it was setting up this buffer (and called it prepare_buffer). If you can find out the class of the variable plVar5 you can find the vtable for this class, and then find the actual function that is called here to confirm this. If you want to learn more about this I suggest https://alschwalm.com/blog/static/2016/12/17/reversing-c-virtual-functions/ (which I skimmed to explain this) and looking at the Ghidra Advanced Course at https://ghidra.re/online-courses/ that includes a Chapter on "Virtual Function Tables" which covers the Ghidra specifics of getting proper decompiler output for such cases.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500094.26/warc/CC-MAIN-20230204044030-20230204074030-00151.warc.gz
CC-MAIN-2023-06
2,135
19
https://www.computing.net/answers/programming/batch-replace-specific-lines-in-a-txt-file/22579.html
code
|@ ghostdog: Thanks but I am looking to write a simple batch file for my task, not use tools.| @Mechanix2Go: Your script seems to search for lines with a certain string. For my case, I need to comment out certain lines (say lines 5, 10, 11 etc.). And about the 4&7 lines, I meant that I need to find and replace a block of 4 lines of text with a set of 7 lines. How would you achieve these?
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285001.96/warc/CC-MAIN-20170116095125-00470-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
390
2
https://www.ausoug.org.au/paper/oracle-linux-cloud-native-environment/
code
Oracle Linux Cloud Native Environment (OLCNE) combines the best of both worlds: a curated, standards-based suite of open source software technologies that are tested, integrated and supported on-premises or in the cloud by Oracle for your enterprise. OLCNE can not just help you start your journey from monolithic to microservice, but also advance your digital transformation journey with sophisticated tools. OLCNE includes open source service mesh, Istio. Using Istio projects can deploy canary services, chaos testing, request routing, load balancing and much more. This session will cover; 1. Kubernetes: It provides comprehensive container and orchestration environment 2. Container runtimes: CRI-O, runC and Kata containers 3. Observability and Diagnostics: Prometheus and Grafana. 4. Canary release, Traffic Shifting and Fault Injection using Istio. OLCNE can assist delivery of microservices and next-generation application development, with no lock-in, scalable, compliant, trusted and supported open source platform.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948976.45/warc/CC-MAIN-20230329120545-20230329150545-00513.warc.gz
CC-MAIN-2023-14
1,026
9
https://forum.aws.chdev.org/t/azure-flow-egress-ip-addresses/3064/1
code
I am trying to access the API from Azure using flow. I can access fine using my test tool locally. Azure fails with a 403 error. I suspect the issues re due to the firewall and now allowing connections from Azure. The outbound IP ranges are listed as below for the UK. 188.8.131.52 - 184.108.40.206, 220.127.116.11, 18.104.22.168 - 22.214.171.124, 126.96.36.199 Can these be added ? I can not add ranges or any more than 5 IPs.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141715252.96/warc/CC-MAIN-20201202175113-20201202205113-00007.warc.gz
CC-MAIN-2020-50
427
4
http://www.molehand.eu/Main/Company/KB/tabid/98/EntryID/102/language/en/Default.aspx
code
2009. 06. 05. 1:40 To check AD Schema, move Schama Master role, or make Schema writeable (eg.: update) You must enable Schema Management Console first. Follow these steps as Administrator (UAC!): - At the command prompt, type regsvr32 schmmgmt.dll. This should result in a dialog box that says DllRegisterServer In Schmmgmt.dll Succeeded. - Open the management console by typing mmc at the command prompt. - Go to Console | Add/Remove Snap-in. - In the Add/Remove Snap-in dialog box, click the Add button. - In the Add Standalone Snap-in dialog box, select Active Directory Schema, click Add, and click OK. To make the schema writable: - From the console, right-click Active Directory Schema, and select Operations Master. - In the Change Schema Master dialog box, select the Schema May Be Modified On This Domain Controller check box, and click OK. Schema is writeable only on the system that holds the schema operations master role!
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00102.warc.gz
CC-MAIN-2023-40
934
12
https://www.thisisferenc.art/forum/general-discussion/spaceclaim-2012-a-powerful-3d-modeling-software
code
SpaceClaim 2012: A Powerful 3D Modeling Software SpaceClaim 2012 is a software that allows you to create, edit, and repair 3D models with ease. Whether you are a designer, engineer, or hobbyist, SpaceClaim 2012 can help you turn your ideas into reality. You can import and export various file formats, such as STL, STEP, IGES, DWG, DXF, and more. You can also work with complex assemblies, sheet metal parts, and organic shapes. SpaceClaim 2012 has a user-friendly interface that lets you manipulate geometry directly with your mouse. You can also use intuitive tools, such as pull, move, fill, and combine, to modify your models quickly and accurately. SpaceClaim 2012 is not only a modeling software, but also a simulation platform. You can use SpaceClaim 2012 to prepare your models for analysis, such as finite element analysis (FEA), computational fluid dynamics (CFD), or mechanical simulation. You can also use SpaceClaim 2012 to optimize your designs for manufacturing, such as 3D printing, CNC machining, or injection molding. SpaceClaim 2012 can help you reduce errors, save time, and improve quality. SpaceClaim 2012 is a software that requires a serial number to activate. A serial number is a unique code that identifies your license and allows you to use the software legally. You can obtain a serial number from the official website of SpaceClaim or from an authorized reseller. You can also find some serial numbers online, but they may not be valid or safe. Some websites may offer cracked versions of SpaceClaim 2012 that bypass the activation process, but they may contain viruses or malware that can harm your computer or compromise your data. If you want to use SpaceClaim 2012 for your personal or professional projects, you should purchase a legitimate serial number from a trusted source. This way, you can enjoy the full features and benefits of SpaceClaim 2012 without any risk or limitation. You can also get technical support and updates from SpaceClaim if you have a valid serial number. SpaceClaim 2012 is a software that can help you create amazing 3D models for various purposes. It is easy to use, versatile, and powerful. If you want to learn more about SpaceClaim 2012 or download a free trial version, you can visit their website at https://www.spaceclaim.com/. If you want to buy a serial number for SpaceClaim 2012 or find out more about their pricing and licensing options, you can contact them at firstname.lastname@example.org or call them at +1-978-482-2100. How to Use SpaceClaim 2012 for 3D Modeling SpaceClaim 2012 is a software that is designed to make 3D modeling easy and fun. You can use SpaceClaim 2012 to create models from scratch or edit existing models from other sources. You can also use SpaceClaim 2012 to repair models that have errors or gaps. Here are some steps on how to use SpaceClaim 2012 for 3D modeling: Launch SpaceClaim 2012 and choose a template or a blank document. You can also open an existing model from your computer or from the internet. Use the toolbar on the left side of the screen to access various tools and commands. You can also use the right-click menu or the keyboard shortcuts to perform actions. Use the pull tool to create or modify geometry. You can drag faces, edges, or vertices to change their shape, size, or position. You can also use the pull tool to create new features, such as extrusions, revolutions, sweeps, or lofts. Use the move tool to translate, rotate, or scale geometry. You can also use the move tool to align, copy, or mirror geometry. Use the fill tool to close gaps or holes in your model. You can also use the fill tool to smooth or simplify geometry. Use the combine tool to merge or subtract geometry. You can also use the combine tool to split or intersect geometry. Use the sketch tool to draw 2D shapes on a plane or a face. You can also use the sketch tool to edit existing sketches or convert them into 3D geometry. Use the dimension tool to add measurements and constraints to your model. You can also use the dimension tool to edit existing dimensions or delete them. Use the annotation tool to add text, symbols, or images to your model. You can also use the annotation tool to edit existing annotations or delete them. Use the view tool to change the perspective, orientation, or display mode of your model. You can also use the view tool to zoom, pan, or rotate your model. These are some of the basic tools and commands that you can use in SpaceClaim 2012. You can explore more features and options by using the help menu or the online tutorials. You can also customize your workspace and preferences by using the options menu. 29c81ba772
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652569.73/warc/CC-MAIN-20230606114156-20230606144156-00097.warc.gz
CC-MAIN-2023-23
4,661
19
http://www.wasmrocks.com/topic/143/bringing-the-web-up-to-speed-with-webassembly/
code
Bringing the web up to speed with WebAssembly admin last edited by This is a joint paper from authors at Google, Mozilla, Microsoft and Apple describing the motivations for WebAssembly together with a very concise exposition of its core semantics. If you’re following along with the paper, I found it helpful to dip into the full WebAssembly Specification at points for extra clarification. I’m going to spend most of my time in this write-up covering the parts of the paper focusing on the design rationale, properties, and implementation experiences since diving into the detailed semantics is really better left to the full spec. Read the full article: https://blog.acolyer.org/2017/09/18/bringing-the-web-up-to-speed-with-webassembly/amp/
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514575627.91/warc/CC-MAIN-20190922180536-20190922202536-00557.warc.gz
CC-MAIN-2019-39
746
4
http://mankx.blogspot.com/2010/11/hottest-male-designers_04.html
code
Flipping through Nymag.com this morning, I came across an article discussing the different body type trends. In the short paragraph, they had taken quotes from Simon Doonan, Joseph Altuzarra, and Stefano Tonchi. Respectively, their pictures hovered above the paragraph. Below the paragraph were three pages of comments...about how hot Altuzarra is. I guess no one cares about "beefy models." However, I can completely sympathize with those Nymag readers, and have decided to count down the best looking male designers (IMHO) on Mankx. All 10 of them. Enjoy! 9. & 8. Proenza Boys (Lazaro Hernandez & Jack McCollough)
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315321.52/warc/CC-MAIN-20190820092326-20190820114326-00121.warc.gz
CC-MAIN-2019-35
615
3
http://www.realracinusa.com/forums/printthread.php?s=df4d7c51efc1437aca8e5e3f4526e466&t=15514
code
I am asking that all posters please refrain from using profane language on this board from this point forward. I do not have time to go through each post to clean them up so from now on I will just delete the whole thread if it is brought to my attention. |All times are GMT -5. The time now is 10:14 AM.| Powered by vBulletin® Version 3.6.8 Copyright ©2000 - 2021, Jelsoft Enterprises Ltd. Copyright Real Racin USA & KARNAC Media 1997-2007
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039594808.94/warc/CC-MAIN-20210423131042-20210423161042-00498.warc.gz
CC-MAIN-2021-17
442
5
http://stackoverflow.com/questions/20659112/migrate-sql-server-2008-analysis-database-to-2012-as-database-along-with-data-le
code
Migrate SQL Server 2008 Analysis database to 2012 AS database along with data level security defined in current production cube I want to migrate Analysis Services 2008 database to 2012 AS database along with dimension data security defined in current production cube Note: Only Production environment have security, while no security is defined in development environment Using Synchronization Wizard: Gives me error : "The OLAP element at line1 can not appear under envelope......" and this is because Synchronization works only for same version and in my case, there are different versions of SQL (SQL Server 2008 and 2012) Using Visual studio conversion wizard - Convert SQL Server 2008 AS project to 2012 and then process cube, so I can get the cube working but then how can I get data level security since 100's of dimension data security is defined in production Cube, so how can I migrate that across Script out XMLA and deploy cube - But then again having issues with how can i script SSAS security Would taking backup of SSAS 2008 database and restore to SSAS 2012 will help ? Any suggestions would be appreciated
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064362.36/warc/CC-MAIN-20150827025424-00303-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
1,123
8
https://coway.id/career/detail/14
code
Full Stack Developer Executive ~ Senior Executive Hands-on development for ERP systems, API, web applications Integration with external systems and mobile applications - API development Development, Testing, and Deployment Keep up to date with the latest technology and best practices in development. Back-End: Phyton, PHP, Laravel Relationship Database - preferably MariaDB, MySQL DevOps: NGINX, Apache Familiar with Ubuntu and Gitlab for development and deployment Good to have: some knowledge in Frappe framework, Mobile Programming (Andriod and iOS), CMS - WordPress, Agile Development. SOUNDS LIKE YOU? Fill in the form below and submit your resume now!
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304872.21/warc/CC-MAIN-20220125190255-20220125220255-00681.warc.gz
CC-MAIN-2022-05
658
14
https://www.serc.iisc.ac.in/services/for-non-iisc-users/
code
Use of SERC Computational Facilities by non-IISc academic and Government R&D Institutes SERC allows use of Param Pravega supercomputer for external users (https://www.serc.iisc.ac.in/supercomputer/for-traditional-hpc-simulations-param-pravega/). User Rates (Additional charges: GST @18% apply) |Other Academic Organizations |Government R&D Labs |Param Pravega system. CPU. |96 paise per core hour |Rs. 1.5 per core hour |Rs. 2.5 per core hour |Param Pravega system. GPU. |Rs. 42 per GPU hour |Rs. 50 per GPU hour |Rs 150 per GPU hour Terms & Conditions: - Only one proposal per user will be enabled at a time. - The actual allocation will depend on the demand at the time of the request. - The computations for the amount paid will have to be carried within the time stipulated in the proposal by the user. Under no circumstances, any part of the amount will be refunded. - 10% of the overall requirement will be provided for free. This can be used for testing and debugging. - No guarantees are given on the permanence of the data. It is the user’s responsibility to remove the data from the system once the computations are completed. - The user explicitly certifies that any software he builds and uses on SERC facilities in his home area is entirely his property or is legally licensed to use such software. - The user will duly acknowledge the use of the HPC facility in any publications that have used SERC, IISc HPC resources. - The user also agrees to submit a 3-page half-yearly report on the project which uses the HPC facility at SERC. - When the user raises a request for consulting support, he/she agrees to provide access to the software, scripts etc in his home area to System Administrators of IISc or IISc’s vendors solely for such support. - User agrees that IISc will have access to all code, data and other files in User’s home area and can provide access by IISc’s vendors and Law Enforcement agencies to the same in response to a legitimate law enforcement request. - Send a proposal containing - Title para containing name, affiliation, contact and title of the proposal. - Science objectives. - Resource requirements including: - Type of the system needed - Number of core hours or the GPU hours subject to the limits mentioned in the T&C. - Size of the input and output data. - Software environment needed including the compilers (C or Fortran), libraries needed for linking etc. - For Param Pravega requests: Send this proposal along with the Param Pravega User Account Form to email@example.com - For other requests: Send only the proposal to firstname.lastname@example.org - A committee will evaluate your proposal and respond in a week. - If approved, fill the usage agreement form and send along with a DD in favour of “The Registrar, Indian Institute of Science” to the Chair, Supercomputer Education and Research Centre, Indian Institute of Science, Bangalore – 560012. Please mark your envelope with “Request for Computational Usage” - Once this is received, SERC will enable the environment and let know the starting period of the usage. Please note that the starting period is based on the current usage of the system and similar such pending requests.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818067.32/warc/CC-MAIN-20240421225303-20240422015303-00095.warc.gz
CC-MAIN-2024-18
3,205
37
https://forum.arduino.cc/t/5v-to-5v-into-0v-to-3-3v/403843
code
I have a Minelab Sovereign GT metal detector that has a Target ID meter. The meter is an LCD display that is at times hard to read and quite basic. I'm looking at creating a new one from scratch with an OLED display and a bit of functionality. There is very little info on the wiring but I figured since the LCD is powered from the detector and gets the target ID value it must be possible to get an Arduino powered from it and read the value. Normally 4 wires go from the detector to the coil. With the digital meter 5 come from the detector and 4 leave as the digital meter has a cable that is used to connect to the meter with an extra wire. The extra one is the TID or target ID which straight from the detector has (after using a multi-meter) -5v to +5v which would correspond directly to the values on the meter. I pulled the ID meter apart and did some testing/investigation. It seems the 4 wires that usually leave are 2 pairs that make up the 2 coils. The voltage in these fluctuated quite a bit and was small. There was a very small circuit board between the 5 incoming wires and the LCD screen and I understand what it does... but not how. Basically somehow it creates a stable 8.75v that the LCD runs off and a signal that seems to be 0 to 0.5v (instead of the original -5 to +5v) that feeds into the din pin on it. As an experiment I was able to power my Arduino Uno from the detector using the 8.75V on the barrel connector. As expected... reading the value from it's input gave 0 as the full range now is so small. The circuit has a POT that allows the input signal to be tuned before coming in. It has 4 diodes which I'd guess turn the +ve and -ve signals into all +ve. Has 3 capacitors which I'd be guessing allow a small device to be powered. (100nF @25v). Assuming I can copy the circuit (as it's 1 sided and handful of components) I should be able to power the Arduino. I however are not sure how to scale the -5v to +5v into either 0v to 5v or 0v to 3.3v. For 5v Arduino I need to divide the input voltage by 2 and shift it +2.5v and something similar if I go for a 3.3v MCU. I'd attach a copy of the circuit in the meter... except my brother has borrowed the detector for the week. Link below shows how an external multimeter can be connected and used. However I want to be able to use an OLED, not have external batteries and have a few buttons to allow for some options. I understand how a voltage divider works and are fine with the calculations... but it's the shifting that's throwing me. If it was 0v to 10v I could scale that 0v to 5v or 0 to 3.3v easily.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.43/warc/CC-MAIN-20220928020513-20220928050513-00313.warc.gz
CC-MAIN-2022-40
2,584
19
https://femethods2020.commons.gc.cuny.edu/roundtable-abstract/
code
Feminist text analysis is analogous to and a part of good text analysis. Just as “all models are wrong” with computational text analysis in general, we need to acknowledge that a feminist text analysis in particular will never be fully completed. In both cases, it is a matter of engaging in a process that operationalizes texts, critiques whatever shortcomings there might be, and adjusts accordingly. This requires a feminist ethos that is persistent in making a text analysis project a space that is open to the visibility of the female experience. This has to happen at every step in the research process. This means that the data collected needs to account for the most diverse spectrum of experiences possible and that the data ought not be approached in a traditionally masculine way by means of mastery and absolute truth. The concepts to be measured and quantified must be informed by disciplines concerned with social justice, not relying on the data to “speak for itself”, but employing critical theories that seek to upset stereotypical paradigms to use data to say something new. A feminist text analysis, like any good text analysis, needs to know the limits of the tools and methods being used, and what they can and cannot tell us about the world. And finally, a constant dedication to criticism and revision must always seek to question and expand the limitations of the research. This will not result in an absolute feminist text analysis to end all feminist text analysis, but is always a constant engagement in the process.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474660.32/warc/CC-MAIN-20240226130305-20240226160305-00833.warc.gz
CC-MAIN-2024-10
1,551
1
https://www.ninjatb.com/howtofindwords/how-to-find-a-word-on-a-page-chrome-how-to-find-keywords-density-2019.html
code
This keyword research tool is effective, automatically providing you with keyword suggestions that other sites haven’t necessarily turned up (which it’s intended to do), along with their search volume, CPC, and Adwords competition. In order to get any actual information about the keywords, though, you need to upgrade to Keyword Tool Pro (which is a little misleading on the site copy). This plan is $88 a month, and if you’re just doing keyword research for Google, I’d recommend choosing one of the other tools for the price. I’ve bought and used just about everything under the sun.. Swissmade marketings product.. MS ..stealth jw analyzer.. Ilovegooglepage1 the list goes on. I used LTP platinum. The one I use is kw blaze. I bought it in 2012 and still goes to this day with Skype support is vgood if there’s any update issues. It has kw competirveness.. Moz rank ..fb likes.. A researcher.. And more quite powerful yet is free of mo.thly fees. The WordStream suite of Keyword Tools is an integrated and actionable set of keyword tools designed to help search marketers with keyword search, keyword suggestion, keyword grouping, PPC keyword research, keyword analysis, long-tail keyword research, and negative keyword discovery, going beyond the capabilities that a typical free keyword tool can offer. If you already create niche websites, you can clearly see how everything I’ve discussed above will benefit you. In fact, you probably already understood all of it. But maybe you are a blogger who has never thought of creating a niche website. Is this you? Let me tell you – if you can create a blog, you can create a niche website. It is not hard at all to create a small site, laser focused on a very specific topic, that will earn at least enough to make Long Tail Pro pay for itself. I hope it’s easy enough for you to clearly see how pretty much any website page or blog post can be slightly modified in order to get optimized around a certain keyword. For the Busy Budgeter example – Rosemarie could easily write a brand new article – or change the title of an existing article that is already written on a similar topic, add some subheadings and a few paragraphs and have it optimized for this really low competition keyword. A keyword like this will likely bring in new visitors month after month – and Rosemarie could direct readers of that article to some of her ‘make money online’ tutorials that we already know are very profitable for her! These keyword research tools should make it easier to create a list of relevant search terms. You should make sure to create awesome landing pages for keywords you want to be found on. You should also think about cornerstone content articles and a great internal linking structure in order to make your SEO strategy complete. In our SEO copywriting course we dive much deeper into keywords, landing pages, and long tail keywords. Repeat this exercise for as many topic buckets as you have. And remember, if you're having trouble coming up with relevant search terms, you can always head on over to your employees on the front lines -- like Sales or Services -- and ask them what types of terms their prospects and customers use, or common questions they have. Those are often great starting points for keyword research. This tool was originally created to carry out keyword research for paid campaigns using Google's AdWords platform. However, it can also be used to research organic keywords, providing estimated global/local monthly search volumes for keywords (i.e. their popularity) and their competition (i.e. how difficult they are to rank for) for organic search. I will use the tool to pull in a lot of keywords related to a theme and group them into relevant topics. These topics will either become their own content page or will be combined with other topics to create a page. KeywordTool.io is similar to other tools out there such as Uber Suggest, which I've used for a long time, but it tends to produce more keywords and it provides search volume for the keywords. The “Starter” tier, with 1000 keyword lookups every 24 hours should be enough for anyone starting out in blogging – or even people who are quite established. It’s pleasing to see a product where they don’t seem to trick you into having to pay for a more expensive version. On the more negative side, I did feel that you’re nudged towards doing annual payment, with the monthly option kept slightly “hidden.” If you go to Search Console under the Acquisition tab and then click Queries, you’ll be able to see different searches (aka keywords) that users found you through. You may have to set this up, but it’s easy to do and only takes a few minutes; you can see how here. Use this information to evaluate and monitor your keywords to see what’s working and what needs to be changed. I also want to emphasize that Microsoft Excel and Google Docs perhaps play an equal, if not more important role in keyword research than any of these tools, because at the end of the day, the mountain of data you end up with is of no use if you can’t perform calculations, sort, filter, present or store it in a way that’s best suits the task at hand. Head over to Distilled for a comprehensive Excel for SEOs guide. Alternatively, bug this guy—he’s the Sensei who trains Excel ninjas in the dark of the night. While the tool is a not a magic product that works wonders for you, know that the instrument would be useful as it can help you get thousands of keywords overnight, which you can simply use for your business. If you want to build a successful online carrier, then it is recommended that you use the instrument and nothing more. The instrument does not deliver any kind of keyword, it specializes in delivering only those keywords that are very profitable, and which would make your website, your products, and your business to rank very high on the search engines. You would soon discover that this tool is the best online investment that you can ever make. Pricing plans and pricing structures for Long Tail Pro have changed several times over the years since I first purchased it. I’m not going to make the mistake of publishing any pricing information here. I’ve done that in the past on this blog and I still have several old posts that are live with incorrect pricing information. There is a good chance that people will still be reading this very post several years from now – and surely the pricing that is available today will be different in the future. Just like it was way different in the past. Please click on any of my links within this post or anywhere else on my site to see the latest prices for Long Tail Pro. But maybe you didn’t watch the tutorial video yet. Or maybe you didn’t know about the extremely powerful KC feature. Maybe you didn’t know how quickly, easily and effectively you could analyze Google top 10 search results with Long Tail Pro. And maybe you didn’t even know how profitable it can be to simply target just the really long tail keywords. Keyword Researcher is designed to search the Autocomplete databases of Google, YouTube, and even Amazon.com. That's a lot of keyword sources! As you probably know, if you're building an authority site, or if you would like to become a dominant player in your niche, then starting with a large database of keywords (that your customers are actually typing in) is a powerful marketing tool. Great Top 10 keyword research tools list. Thank you for posting Robbie! I really appreciated the feedback from the experts. There are a definitely a few tools here worthy of taking note of. I have also been using DYNO Mapper (http://www.dynomapper.com) as a keyword research tool. DYNO Mapper is a visual sitemap generator that delivers keywords on all pages of any site. The user simply inputs any existing URL into the system and it will scan thousands of pages. Long tail keywords can find people who are later in the buying cycle, and more ready to buy. For example, somebody searching for “tents” is probably early in the buying cycle, just starting to research what they want. Whereas somebody who searches for “North Face Kaiju 4 person tent” already knows what they want, and is more likely to be ready to buy. The link back to googles API is crap – it keeps coming up with password authentication which renders it virtually useless when trying to find your own rank. Sells you the software initially. But then tries to sell you a load of stuff afterwards which effectively tells you the first version you have already paid for is useless without the extra “bonuses”. Not a nice way of doing business To be able to rank in the search engines is an art that must be understood and finding the right Keyword tool that fits into your comfort zone is a must. What I mean by ‘comfort zone’ is having a keyword tool that doesn’t confuse you before you begin even searching. Some go into far too much detail than is necessary. All you need really are good long tail ‘common sense’ keywords that other marketers may have missed. 2) Software project no 2 – invite your readers to participate and select 2-5 that will enter a mastermind group with you – and let the readers follow the progress – from brainstorming to hiring a coder, to beta testing, to “how to reach out to get sales” (I know you wrote a post on this – but would be great to tag along). And then those that are not part of the Mastermind group could be added to a forum/FB group and can then follow along and develop and ask each other for help.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027317359.75/warc/CC-MAIN-20190822194105-20190822220105-00240.warc.gz
CC-MAIN-2019-35
9,622
21
https://mcgsoft.eu/tower-defense-x-1-5/
code
The Review Video unique one of a kind many differences in enemy's 3D towers based on 3x3x5 players can also attack enemy's requires some skill the stats holographic is not visible on creation the game is cool but on easy it still goes fast there are some things feeling missing like visible bullets from towers. the visualisation for tower range can be annoying on a map thats filled with trees and such Visit the Spigot page here: Tower Defense X score its a very well made unique plugin. it contains some features that are awesome but also some are missing at least i feel it that its missing. but overall its a great plugin worth downloading and buying.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101282.74/warc/CC-MAIN-20231210060949-20231210090949-00508.warc.gz
CC-MAIN-2023-50
656
16
https://www.depesz.com/2018/03/
code
Some time ago I wrote a site to paste SQL queries with reformatting/pretty-printing using pgFormatter library. Today, I figured out that I should update the library since it has quite some changes recently, so it would be good to incorporate its fixes to paste site. Unfortunately – new version is not backward compatible, and I currently have no time to figure out what has changed and how to work around it. So – until I will have time to work on it, paste.depesz.com is no longer working. Sorry.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818999.68/warc/CC-MAIN-20240424014618-20240424044618-00834.warc.gz
CC-MAIN-2024-18
502
4
https://forum.qiime2.org/t/seqtab-rds-file-not-produced/8180
code
I’ve been trying to run this line with 16s sequences following DADA2 16S Chemerin Tutorial: dada2_filter.R -f primer_trimmed_fastqs --truncLen 260,210 --maxN 0 --maxEE 5,8 --truncQ 2 --f_match R1.*fastq.gz.gz --r_match R2.*fastq.gz.gz -t 9 The script seems to work, produces filtered_fastq files but I obtain this Warning message: In is.na(x[[i]]) : is.na() applied to non-(list or vector) of type ‘environment’ Creating output directory:filtered_fastqs Next step in the pipeline requires seqtap.rds file this is missing. Any idea as to why?
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104277498.71/warc/CC-MAIN-20220703225409-20220704015409-00518.warc.gz
CC-MAIN-2022-27
547
7
http://wordpress.org/support/view/plugin-reviews/ultimate-follow-me
code
We were tired of confusing and bulky "follow me" plugins for wordpress so we decided to make our own. I had some difficulties with figuring it out but it works just great. You should upload the whole unzipped folder to the /wp-content/plugins/ directory , not just the files listed. Then it will work. I am happy with it.
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776437611.34/warc/CC-MAIN-20140707234037-00073-ip-10-180-212-248.ec2.internal.warc.gz
CC-MAIN-2014-23
321
4
http://desertgirlkuwait.blogspot.com/2010/04/facebook.html
code
I got this stupid, superficial Facebook quiz from a pal yesterday. I couldn't tell if someone created it as a spoof on Kuwaiti society or not (maybe you can tell me?). (If you even attempt to answer this first questionnaire, I immediately know which type of Kuwaiti you are: superficial.) It irked me so I created my own: Facebook spoofs: I frickin HATE Farmville! (I know, CK, you are addicted and you can't help it.) I don't care if someone's cute little whatever needs more powertools on their farm. OFF to the butcher!
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676596336.96/warc/CC-MAIN-20180723110342-20180723130342-00367.warc.gz
CC-MAIN-2018-30
522
3
https://www.jlwranglerforums.com/forum/threads/calculator-gear-ratio-tire-size-speed-etc.38206/page-3
code
It looks like there's something I've done with the graphs that prevents Excel from opening them correctly. These were created in Google Sheets in order for them to be easily sharable, and I guess this is one of the downsides.AnnDee. Thanks. When I downloaded the spreadsheet into XLSX per the instructions, it kept the tables but lost the graphs. Do you have a suggestion for capturing a download with the cool graphs? I don't have a solution for this yet, but I can suggest keeping it all in Google Sheets and copying it to your personal Google account, like this:
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038916163.70/warc/CC-MAIN-20210419173508-20210419203508-00424.warc.gz
CC-MAIN-2021-17
565
2
https://www.chaindlk.com/reviews/?id=9685
code
Tom Hall is an AV artist. The 2-track release Fervor comes with an accompanying Windows & Mac app to compliment the sound, but I’m reviewing the audio as a standalone work. This is a set of two gentle and meandering pieces in which ambling synthesizer lines drift over thick, slow and stretched ambiences. In “As We Go To Fight Giants”, the hardware wave synthesis is initially fairly sedate, but with a sawtoothed edge to the tone, and as it progresses it gets a little more harsh and bass-heavy, perhaps as we meet the titular giants. In “Only The Hunted Know”, there’s a lighter melodic tone with quasi-piano notes like random raindrops over a drone which, again, evolves in harshness and flatulence as it progresses- although this time round there’s a more distinct drop.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657131734.89/warc/CC-MAIN-20200712051058-20200712081058-00516.warc.gz
CC-MAIN-2020-29
789
3
https://scubaboard.com/community/threads/clearlake-california-treasures.583000/
code
I have found many boats all wood though (rotten) one in particular had a single cylinder kermath marine engine dated 1910. I've also found many old bottles one find was a 7up 6pack in the wire basket. Several remote control airplanes. Lots of sunglasses and cheap jewelry. Is there anybody else here that dives in clearlake ca? I've only seen a few others in all my years 1980 to present?
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817171.53/warc/CC-MAIN-20240417173445-20240417203445-00291.warc.gz
CC-MAIN-2024-18
388
1
https://jobs.physicstoday.org/jobs/11579673/postdoctoral-appointee-computer-scientist-interpretable-machine-learning
code
: We are seeking a postdoctoral appointee to develop and apply new machine learning algorithms and methods to multiple areas that may include cyber security, co\-optimization of fuels and engines, and developing hardware accelerators for machine learning\. You will help develop novel interpretable machine learning algorithms and methods that allow us to understand why a prediction is made\. These algorithms will be applied to help human analysts understand cyber security related data, develop new fuels and understand what parts of a molecule are most critical, and more\. You may also help develop machine learning algorithms that are optimized for hardware accelerators and co\-design machine learning algorithms with hardware accelerators\. On any given day, you may be called on to: + Develop, implement and optimize new interpretable machine learning algorithms\.+ Apply interpretable machine learning techniques to a variety of problem domains+ Conduct innovative research, publish and present results in refereed journals and conferences+ Develop and pursue new opportunities in areas that support Sandia Mission activities+ Work in multidisciplinary teams Required: + A PhD, conferred within 5 years prior to employment, in computer science, electrical engineering, physics or a related area with a computational and machine learning focus\.+ A record of publication and innovation, as evidenced by peer\-reviewed journal articles, conference proceedings, technical books or issued patents\.+ Evidence of relevant and exceptional achievements in developing and applying new machine learning algorithms+ Ability to work in a collaborative research environment on problems in a variety of domains+ Proficiency in solving problems, prioritizing work, and making decisions+ Excellent written and oral communication skills+ Ability to obtain and maintain a DOE Q clearance Desired: + Experience with interpretable machine learning algorithms+ Proficiency with programming languages including python and C\+\++ Experience developing and delivering new software/simulation tools+ Proficiency with high\-performance computing platforms+ Experience in cybersecurity+ Knowledge of thermodynamics, computational chemistry or material science+ Experience developing algorithms optimized for hardware accelerators Department Description: The Assured Digital Systems & Computing department maintains capabilities for the verification of digital systems, including software; analysis of hardware and software; modeling and simulation of digital or software systems; synthesis of hardware or software to meet formal specifications; and development of specialized software utilizing advanced mathematics to meet specialized customer needs\. The department additionally performs research involving neuromorphic computing architectures\. The team consists mostly of PhDs with research backgrounds in computer science, analysis of programming languages and domain specific languages, and high performance computing\. We collaborate and team closely with organizations internally to 8700 and across SNL and a broad spectrum of external partners\. About Sandia: Sandia National Laboratories is the nation's premier science and engineering lab for national security and technology innovation, with teams of specialists focused on cutting\-edge work in a broad array of areas\. Some of the main reasons we love our jobs: + Challenging work withamazingimpact that contributes to security, peace, and freedom worldwide+ Extraordinary co\-workers+ Some of the best tools, equipment, and research facilities in the world+ Career advancement and enrichment opportunities+ Flexible schedules, generous vacations,strongmedical and other benefits, competitive 401k, learning opportunities, relocation assistance and amenities aimed at creating a solid work/life balance\* _World\-changing technologies\. Life\-changing careers\._ Learn more about Sandia at: http://www\.sandia\.gov \*These benefits vary by job classification\. Security Clearance: Position requires a Department of Energy \(DOE\) granted Q\-level security clearance\. Sandia is required by DOE directive to conduct a pre\-employment drug testing, and a pre\-employment background review that includes personal reference checks, law enforcement record and credit checks, and employment and education verifications\. Applicants for employment must be able to obtain and maintain a DOE Q\-level security clearance, which requires U\.S\. citizenship\. Applicants offered employment with Sandia are subject to a federal background investigation to meet the requirements for access to classified information or matter if the duties of the position require a DOE security clearance\. Substance abuse or illegal drug use, falsification of information, criminal activity, serious misconduct or other indicators of untrustworthiness can cause a clearance to be denied or terminated by the DOE, rendering the inability to perform the duties assigned and resulting in termination of employment\. EEO Statement: All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status\. : This postdoctoral position is a temporary position for up to one year, which may be renewed at Sandia's discretion up to five additional years\. The PhD must have been conferred within five years prior to employment\. Individuals in postdoctoral positions may bid on regular Sandia positions as internal candidates, and in some cases may be converted to regular career positions during their term if warranted by ongoing operational needs, continuing availability of funds, and satisfactory job performance\. Internal Number: A09F78DDDB344430A03BF44581350461 About Sandia National Laboratories Sandia National Laboratories is the nation's premier science and engineering lab for national security and technology innovation with major facilities in Albuquerque, New Mexico and Livermore, California. We are a world-class team of scientists, engineers, technologists, post docs, and visiting researchers all focused on cutting-edge technology, ranging from homeland defense, global security, biotechnology, and environmental preservation to energy and combustion research, computer security, and nuclear defense. To learn more, please visit our website at www.sandia.gov. We are searching for a Manager for the Semiconductor Device Sciences Department for the Albuquerque facility. Must be able to obtain and maintain a DOE Security Clearance.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039745486.91/warc/CC-MAIN-20181119064334-20181119090334-00388.warc.gz
CC-MAIN-2018-47
6,589
4
http://www.simile-widgets.org/w/index.php?title=SIMILE_Widgets:Community_portal&oldid=1746
code
SIMILE Widgets:Community portal After many years, multiple major version releases and several different homes, the SIMILE Widgets documentation is in a slightly dilapidated state. The widgets themselves – most notably Exhibit – are still under active development, and are among the simplest, most powerful bits of software with which to present data on the web. It's my hope that a concerted effort to bring the documentation (chiefly this wiki) up to the standard of the software may lead to greater interest, more widespread adoption, and the continued development and support of these tools. Who am I My name's Tully Hansen, and I'm an enthusiastic Exhibit user with a background in literature and creative writing (not to mention an abiding interest in Twitter bots). In Exhibit I found a system simple enough to wrap my Web 1.0 brain around (I can juggle HTML and CSS, a little), and powerful enough to be up and running with a filter-able, query-able Google-Sheets-powered data-driven webpage in just a short time. However, finessing the finer points of the software required a great deal of Googling, and copious bouncing around between various (and often conflicting) resources. Seeing as this wiki resides at the 'official' home of SIMILE Widgets, I figure this ought (as far as possible) to be the one-stop shop for answers on Exhibit, Timeline and the other SIMILE Widgets. How to help Due to earlier issues with spam signups, the SIMILE Widgets wiki does not allow either anonymous edits or new user signups. However, accounts are available on request for those interested in contributing to the project. Presently we are in a 'housekeeping' mode of tidying up loose ends (dead links, duplicate content, etc.), making better use of MediaWiki's built-in features (such as Categories, Redirects and Transclusions). A rough roadmap for this stage of the process follows at the end of this page. There are also annotated <!-- TODO --> comments sprinkled liberally throughout the pages of the wiki – these will not show up on the pages themselves, but can be searched for. How to get in touch The best place to get help with or otherwise discuss SIMILE Widgets remains [ the Google Groups mailing list]. Alternatively, feel free to contact me directly with questions or feedback on the wiki itself. If you have any requests or suggestions for the flourishing of this wiki, please get in touch! Roadmap (as at 2015-11-03) Categorise uncategorised pagesdone 2015-11-03 - Create category taxonomy - Create links to orphaned pages - Figure out why syntax highlighting not working (see Code_syntax_highlighting_examples) - Figure out best way to distinguish between Exhibit 2 and 3 reference? - Check for and fix broken outgoing links - Transclude content into relevant category pages, rather than duplicating/superceding - Add style guide (for things like Simile Widgets) and enforce throughout - Delete links in the format <div class="wiki-path" id="exhibit-wiki-path" style="float: right;">[[Reference_Documentation_for_Exhibit|Exhibit Reference Home »]]</div>from pages - Ongoing maintenance: - Check for Uncategorised Pages and assign to correct categories
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823710.44/warc/CC-MAIN-20181212000955-20181212022455-00300.warc.gz
CC-MAIN-2018-51
3,170
23
http://likiluto.xyz/archives/4613
code
Novel–Reincarnation Of The Strongest Sword God–Reincarnation Of The Strongest Sword God Chapter 2745 – Different World pizzas careful “The donation compet.i.tion? It seems like you’re even more amazing than I was thinking. If so, We have practically nothing a lot more to say,” Xia Qingying reported, nodding. She then transmitted information from her quantum watch to s.h.i.+ Feng’s and mentioned, “This property model from the 6th The southern part of Region is going to be yours from now on.” Isn’t this family home a tad too impressive?! the elements of general method in daa Consequently, he might be dreaming if he idea he could borrow other people’s households! It can be fine if he were alone, however, if he planned to assist many people, he would need an ordinary property model of his personal. Nonetheless, contrary to Kerui and Hong Xinyuan, s.h.i.+ Feng experienced thrilled along with his up-to-date scenario. “I have recorded you to the share compet.i.tion. Even so, I am hesitant the likelihood of yourself getting track of additional partic.i.p.ants is lower, especially if you are focusing on the highest several. Each of the leading about three partic.i.p.ants has a lot more than 100,000 issues actually. I read they have the backing of G.o.d’s Domain’s Awesome Guilds. It’s not possible that you catch up to them now,” Xia Qingying reported as she looked over s.h.i.+ Feng. “However, you can consider rivalling for the best 20 positions. Our organization plans to offer the best 20 victors the legal right to invest in 3 objects out of the midst covering. You are able to give it a shot at that time.” Afterward, Xia Qingying spoke some terms with Hong Xinyuan just before departing the building. From her haste, it was obvious she was truly active. However, Kerui was greatly angered and aggravated by s.h.i.+ Feng’s determination. She never imagined that s.h.i.+ Feng would give up on this type of superb probability to boost themself. Even Hong Xinyuan shook his head over s.h.i.+ Feng’s final decision. Immediately after instructing Kerui to steer s.h.i.+ Feng, also, he presented s.h.i.+ Feng a couple of reminders. When Hong Xinyuan listened to s.h.i.+ Feng’s determination, he couldn’t assist studying the small gentleman in shock. Hurriedly, he dissuaded s.h.i.+ Feng, “You’re mad! It is quite difficult for getting 50 containers of Phantom Potion! Even with your Quality 1 authority, you would demand five years to redeem a large number of! The Natural G.o.d Organization features a completely different examination for those who attain Enhanced Grade influence pre and post age of 25!” While Everyday life Potion was a thing which may be traded and each container price only 5,000 tips, there was a restriction on the amount of containers a person could change. Persons without power could exchange for just an individual package every year, even though Level 3 power could trade for two containers every year, and Level 2 guru for five containers annually. If one needed to purchase more, they will have to find them at a more excessively high value from other men and women. what is the theme of magic island s.h.i.+ Feng was overjoyed as he found the info shown on his quantum watch. Even though it was named a typical family home, its flooring region was still greater than 200 rectangular meters-definitely sufficient for five men and women to survive comfortably. Fifty containers of Phantom Potions! This was since he obtained reaped a ma.s.sive harvest from his visit to the top Region now. He acquired also finally realized the significance of Seven Luminaries Crystals and discovered ways to cure Soft Snow and Aqua Increased. He got even observed methods to support outsiders in the Upper Zone. The matter of secondly-level Guilds have been worse still. A good Guild Leader like s.h.i.+ Feng did not get to employ a Fearless Cabin. Despite the fact that Life Potion was anything which may be traded and each bottles cost only 5,000 factors, there had been a limit on the quantity of containers a person could change. Folks without influence could exchange for just an individual jar annually, though Quality 3 power could swap for a couple bottles each year, and Quality 2 authority for five containers each year. If someone needed to buy additional, they will have to get them at an infinitely more exorbitant cost off their folks. s.h.i.+ Feng was overjoyed as he observed the info shown on his quantum enjoy. Though it was identified as a common property, its ground area was still in excess of 200 rectangular meters-definitely plenty of for five men and women to live adequately. She experienced never even noticed numerous Phantom Potions in the life before. Not merely was the homes device fully designed with sensible establishments, nevertheless it even boasted an intensive array of home fitness equipment. After going into the residence, s.h.i.+ Feng also experienced considerably more comfortable than ahead of, almost like his entire body was soaked in a Nutrient Remedy, and that he could continuously improve his health and fitness even without doing any coaching. His neurological also sensed better than previously, like as he is in a Mana-loaded natural environment in G.o.d’s Site. Murder Is A Piece Of Cake The Natural green G.o.d Firm paid astronomical price ranges to enhance emotional sturdiness masters. However, even today, the company hadn’t was able to cultivate several. venom.let there be carnage streaming After his expert hit the Sophisticated Class and that he came into top of the Zone’s midst part, he could spend 100,000 involvement issues to switch first Higher Area set aside port. While he could exchange for only 3 slot machines each year using this strategy, this was still very good news for him. After all, his intention wasn’t simply to reside in top of the Zone by him self. While Living Potion was one thing that might be exchanged and each and every product charge only 5,000 issues, there had been a restriction on the volume of bottles one could swap. People today without influence could trade for just an individual container per annum, although Quality 3 authority could swap for two containers each year, and Class 2 authority for five bottles a year. If one wanted to invest in much more, they would be required to get them at an infinitely more exorbitant price tag utilizing individuals. “General Administrator Xia, does the Green G.o.d Business possess medication which will recover mental harm?” s.h.i.+ Feng inquired because he viewed Xia Qingying. This was as he obtained reaped a ma.s.sive harvest from his stop by to the top Sector on this occasion. He acquired also finally fully understood the power of Seven Luminaries Crystals and discovered a means to recover Light Snow and Aqua Rose. He acquired even uncovered ways to guide outsiders within the Higher Area. Section 2745 – Various Planet s.h.i.+ Feng was amazed when he joined Product 02 over the 35th floors. Despite the fact that Living Potion was a thing that could be exchanged and each bottles expense only 5,000 issues, there was clearly a limit on the total number of containers a person could trade. Folks without ability could trade for just one particular bottles each year, whilst Grade 3 guru could trade for two main containers annually, and Grade 2 guru for five bottles per annum. If someone want to buy additional, they would need to find them at a lot more excessively high price utilizing persons. Even so, in contrast to Kerui and Hong Xinyuan, s.h.i.+ Feng believed thrilled in reference to his present scenario. Also, every bedroom in your house was provided with a express-of-the-craft Fearless Internet Gaming Cabin, anything a lot more wonderful in comparison to the electronic video games cabins Zero Wing experienced purchased. Any person of Xia Qingying’s condition probably wouldn’t fork out individuals like themselves another glimpse under normal circ.you.mstances. She had gone out of her strategy to aid him on this occasion only because she appreciated the excellent potential he possessed proven. Is not this home a touch too amazing?! Back again if the Fearless Cabins have been first produced towards the consumer, the different businesses obtained fought over them frantically. Each device acquired available not less than 100 million Credits. Moreover, the Fearless Cabins had been always to put it briefly source. Even ten years just after G.o.d’s Domain’s introduction, initial-rate Guilds could only manage to offer their management with Fearless Cabins. When Hong Xinyuan observed s.h.i.+ Feng’s conclusion, he couldn’t aid exploring the fresh guy in astonish. Hurriedly, he dissuaded s.h.i.+ Feng, “You’re crazy! It is not easy for getting 50 bottles of Phantom Potion! Despite having your Level 1 power, you would want 5 years to redeem that numerous! The Natural green G.o.d Organization features a totally different examination for people who arrive at State-of-the-art Standard expert pre and post age 25!” A 20% maximize to Mana awareness! The Rocky Mountain Wonderland In the meantime, the Phantom Potion was a very magical medicine the Earth-friendly G.o.d Business established that might develop and increase one’s intellectual sturdiness. Anyone with ambition on the Uppr Area would make an effort to change for it. dus – seven altars of dusaram 1 million business points! Which has been equal to ten billion Credits in the rest of the world. On top of that, regardless of whether he had that type of funds, it may well still acquire him a very long time to exchange for starters million buy and sell factors. Even more importantly, each and every casing item possessed a minimal occupancy. A typical real estate model could support five persons at most of the, as opposed to the independent villas could have nearly 20. human traits and their social significance Consequently, he could well be dreaming if he considered he could get other people’s homes! It would be excellent if he were on their own, however if he planned to aid people, he will need a typical homes model of his personal. Thus, he might be dreaming if he thinking he could obtain other people’s properties! It might be okay if he ended up alone, but if he planned to guide people, he would want an ordinary lodging unit of his. “General Administrator Xia, does the Environmentally friendly G.o.d Business get medication which can recover emotional harm?” s.h.i.+ Feng required while he considered Xia Qingying. However, receiving a property on the Upper Region was easier said than done. Even a regular lodging product expense one million buy and sell details. “The advantages are extremely superb?” Section 2745 – Distinct Entire world Novel–Reincarnation Of The Strongest Sword God–Reincarnation Of The Strongest Sword God
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334871.54/warc/CC-MAIN-20220926113251-20220926143251-00526.warc.gz
CC-MAIN-2022-40
10,912
49
http://devinoaknz.blogocial.com/Considerations-To-Know-About-programming-project-help-12277678
code
Among the best up to date java project Concepts to undertake and attain items. This distinctive project concept will help men and women deal with their existence very well. Have a look at Attendance Management Program Involve a handful of desire-like paragraphs to tension The purpose that you will be not a robot. Occasionally it could possibly get challenging describing your feelings and emotions, you could possibly say. But often It comes about which you can do that Laptop or computer programming homework, but you've exams and course exam that are extra significant than your this Personal computer programming homework. This system will help people today and restaurant equally. Managing orders superior with This technique great simplicity. If you are likely to write your own essay from the scratch, our guide on «How to write down an essay» are going to be handy for you personally. Java is a tricky programming language and platform. 1 ought to be well versed with the basics to perform a project which will the impress and also provide the marketing and advertising potentials. Well timed Deliverance: We have an understanding of the necessity of offering your assignments and homework promptly, hence our tutors go that ‘more mile’ to provide your assignment or additional resources homework promptly. a method for artists where by they're able to retail store all audio they produce, deal with them perfectly and rely on them dynamically for making new and interesting memories. Excellence in Work: As our Laptop programming tutors online are really skilled and properly trained industry experts, they have and in-depth familiarity with programming with every one of the intricacies included. In this globe where Anyone can make an application for requests creating one window procedure will develop into less complicated and enjoyable. You can make use of the available process for acquiring services with wonderful ease. — A zip archive on the "resource" Listing through the Site, which includes source code for sample systems in the text. Notice that for those who download the complete Site, then you have already got a duplicate of precisely the same source directory. See the README file. Dimension: 773 Kilobytes. because my aim is to review these topics in long term and to become a highly regarded Expert in one of many fields. I like This great site very much and it is kind of comfy for me. Their strategy is good and reputable service. The service was consumer friendly all through my coursework projects. The services are direct, transparent and have high quality. A straightforward supply code scanner and analysis utility which can help you with the perform by detecting in...
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583656530.8/warc/CC-MAIN-20190115225438-20190116011438-00340.warc.gz
CC-MAIN-2019-04
2,714
14
https://forum.ionicframework.com/t/live-reload-not-working-on-android/192431
code
live reload works on browser but not on device , it suddenly stopped working ionic cap run android -l --external ionic cap run android -l --host=ip both commands only runs live-reload on browser but not in android device, if i run “ionic cap run android” , this command runs and even app is working in android but not live , what seems to be the problem, any comments would be extremely helpful, please help.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400221980.49/warc/CC-MAIN-20200925021647-20200925051647-00591.warc.gz
CC-MAIN-2020-40
412
7
http://www.flashdevelop.org/community/viewtopic.php?f=11&t=1524
code
This is an old version of the program, please check the releases page for the latest version. This release, even though comes early, is a big update. Most of the bugs, if not all, are fixed and some requested and missing features have been added. Because we like to keep the release cycle tight (because we work alot) we'll start to follow greek alphabets to avoid numbering before RC cycle. (alpha, beta, gamma etc..) The discussion for FD3 should be held in the new "FD3 Talk" forum. This release should be stable and feature enough to overwrite FD2 so you should remove previous installations before installing FD3. If you want, you can still keep a copy of FD2 as a standalone. Copy the directory to a new folder (ie. "FlashDevelop 2") and then remove your FD2 installation running the uninstaller. Some bugs fixed: * Improved completion * AS2API is now restored * FDBuild bugs fixed with AS3 * Fixed crashing when dragging files to FD * IconComposer for customizing icons added * Global classpath management added * FlashConnect fixed and improved * Fixed bugs with 64-bit systems * Fixed focusing issues ...and other fixes that will make your day. Some future features: * Imported classes coloring * SWC realtime parsing for completion * And various other ideas we keep on our TODO list If you think the program is good, please donate some money for this project. Built from rev. 1585 Download FlashDevelop 3.0.0 Beta Installer needed an urgent patch so the installer was updated one hour after the first release. Sorry!
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122726.55/warc/CC-MAIN-20170423031202-00113-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,526
32
http://www.infoplease.com/movies/linsanity/155649
code
Web Site: http://www.linsanitythemovie.com Description: Jeremy Lin came from a humble background to make an unbelievable run in the NBA. State high school champion, all-Ivy League at Harvard, undrafted by the NBA and unwanted there: his story started long before he landed on Broadway. Movie summaries and listings powered by Cinema-Source Related Content on Movies from Infoplease:
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280310.48/warc/CC-MAIN-20170116095120-00540-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
382
4
http://www.thecornsnake.co.uk/forum/post.asp?method=TopicQuote&TOPIC_ID=31978&FORUM_ID=15
code
Note: You must be registered in order to post a reply. To register, click here. Registration is FREE! T O P I C R E V I E W Posted - 07/12/2015 : 16:13:02 Ok, so my female 6 month old Common Boa Constrictor has got a nasty case of snake mites, I've heard that diluted Frontline is a good option, but I've also heard that Boas can be quite sensitive to such chemicals. should I use Frontline of my boa or not?
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362923.11/warc/CC-MAIN-20211204003045-20211204033045-00116.warc.gz
CC-MAIN-2021-49
408
3
http://www.islamicity.org/forum/forum_posts.asp?TID=3810
code
|Active Topics Memberlist Calendar Search Help| |Register Login Old Forum| |IslamiCity Forum - Islamic Discussion Forum : Culture & Community : Islamic Personalties| Joined: 01 March 2000 Online Status: Offline | Topic: AL-SUYUTI Posted: 25 February 2006 at 4:09pm Bi ismillahir rahmanir raheem By Dr. G. F. Haddad `Abd al-Rahman ibn Kamal al-Din Abi Bakr ibn Muhammad ibn Sabiq al-Din, Jalal al-Din al-Misri al-Suyuti al-Shafi`i al-Ash`ari, also known as Ibn al-Asyuti (849-911), the mujtahid imam and renewer of the tenth Islamic century, foremost hadith master, jurist, Sufi, philologist, and historian, he authored works in virtually every Islamic science. Born to a Turkish mother and non-Arab father and raised as an orphan in Cairo, he memorized the Qur'an at eight, then several complete works of Sacred Law, fundamentals of jurisprudence, and Arabic grammar; after which he devoted himself to studying the Sacred Sciences under about a hundred and fifty shaykhs. Among them the foremost Shafi`i and Hanafis shaykhs at the time, such as the hadith master and Shaykh al-Islam Siraj al-Din Bulqini, with whom he studied Shafi`i jurisprudence until his death; the hadith scholar Shaykh al-Islam Sharaf al-Din al-Munawi, with whom he read Qur'anic exegesis and who commented al-Suyuti's al-Jami` al-Saghir in a book entitled Fayd al-Qadir; Taqi al-Din al-Shamani in hadith and the sciences of Arabic; the specialist in the principles of the law Jalal al-Din al-Mahalli, together with whom he compiled the most widespread condensed commentary of Qur'an in our time, Tafsir al-Jalalayn; Burhan al-Din al-Biqa`i; Shams al-Din al-Sakhawi; he also studied with the Hanafi shaykhs Taqi al-Din al-Shamni, Shihab al-Din al-Sharmisahi, Muhyi al-Din al-Kafayji, and the hadith master Sayf al-Din Qasim ibn Qatlubagha. He travelled in the pursuit of knowledge to Damascus, the Hijaz, Yemen, India, Morocco, the lands south of Morocco, as well as to centers of learning in Egypt such as Mahalla, Dumyat, and Fayyum. He was some time head teacher of hadith at the Shaykhuniyya school in Cairo at the recommendation of Imam Kamal al-Din ibn al-Humam, then the Baybarsiyya, out of which he was divested through the complaints of disgruntled shaykhs which he had replaced as teachers. He then retired into scholarly seclusion, never to go back to teaching. Ibn Iyas in Tarikh Misr states that when al-Suyuti reached forty years of age, he abandoned the company of men for the solitude of the Garden of al-Miqyas by the side of the Nile, avoiding his former colleagues as though he had never known them, and it was here that he authored most of his nearly six hundred books and treatises. Wealthy Muslims and princes would visit him with offers of money and gifts, but he put all of them off, and when the sultan requested his presence a number of times, he refused. He once said to the sultan's envoy: "Do not ever come back to us with a gift, for in truth Allah has put an end to all such needs for us." Blessed with success in his years of solitude, it is difficult to name a field in which al-Suyuti did not make outstanding contributions, among them his ten-volume hadith work Jam` al-Jawami` ("The Collection of Collections"); his Qur'anic exegesis Tafsir al-Jalalayn ("Commentary of the Two Jalals"), of which he finished the second half of an uncompleted manuscript by Jalal al-Din Mahalli in just forty days; his classic commentary on the sciences of hadith Tadrib al-Rawi fi Sharh Taqrib al-Nawawi ("The Training of the Hadith Transmitter: An Exegesis of Nawawi's `The Facilitation'"); and many others. A giant among contemporaries, he remained alone, producing a sustained output of scholarly writings until his death at the age of sixty-two. He was buried in Hawsh Qawsun in Cairo. In the introduction to his book entitled al-Riyad al-Aniqa on the names of the Prophet -- Allah bless and greet him -- he said: "It is my hope that Allah accept this book and that through this book I shall gain the Prophet's -- Allah bless and greet him -- intercession. Perhaps it shall be that Allah make it the seal of all my works, and grant me what I have asked Him with longing regarding the Honorable One." The editors of the Dalil Makhtutat al-Suyuti ("Guide to al-Suyuti's Manuscripts") have listed 723 works to al-Suyuti's name.1 Some of these are brief fatwas which do not exceed four pages, like his notes on the hadith "Whoever says: `I am knowledgeable,' he is ignorant"2 entitled A`dhab al-Manahil fi Hadith Man Qala Ana `Alim; while others, like the Itqan fi `Ulum al-Qur'an or Tadrib al-Rawi, are full-fledged tomes. Al-Tabarani stated that the hadith "Whoever says: `I am knowledgeable,' he is ignorant" is not narrated except through the chain containing al-Layth ibn Abi Sulaym, who is weak. Al-`Ajluni in Kashf al-Khafa' states that this hadith is narrated by al-Tabarani in al-Awsat from Ibn `Umar rather than the Prophet -- Allah bless and greet him --, and that al-Haytami said in his Fatawa Hadithiyya that it is actually a saying of (the Tabi`i) Yahya ibn Kathir. For his part, Ibn Kathir cites it from `Umar in his Tafsir in commentary of the verse: (Have you not seen those who praise themselves for purity?( (4:49) Three narrations are indeed mentioned from `Umar in Kanz al-`Ummal, but all are weak. Al-`Iraqi in his al-Mughni said that the part actually attributed to Yahya ibn Kathir is: "Whoever says: `I am a believer,' he is a disbeliever," while al-Haythami in Majma` al-Zawa'id cites it from Yahya ibn Kathir with a weak chain as follows: "Whoever says: `I am knowledgeable,' he is ignorant, and whoever says: `I am ignorant,' he is ignorant. Whoever says: `I am in Paradise,' he is in the Fire, and whoever says: `I am in the Fire,' he is in the Fire." Al-Haytami further said: "It is established from countless Companions and others that they said they were knowledgeable, and they would not commit something which the Prophet -- Allah bless and greet him -- had blamed. A greater proof yet is Yusuf's statement: `I am a knowledgeable guardian' (12:55)." However, the narration of al-Layth is confirmed by the hadith of the Prophet -- Allah bless and greet him --: "Islam shall be on the rise until traders take to the sea [carrying it], and horses charge in the cause of Allah. After that a people will come and recite the Qur'an, saying: Who recites it better than us? Who is more knowledgeable than us? Who is wiser than us?" Then he turned to his Companions and asked: "Is there any good in such as these?" They said: "Allah and His Prophet know best." He said: "Those are from among you, O Umma! Those are fodder for the Fire."2 What reconciles the two views is that the hadith of Ibn Abi Sulaym applies to those who claim knowledge either undeservedly, or proudly, and not to those who act out of sincerity and obligation. Ibn `Ata' Allah said in his Hikam: The root of every disobedience, forgetfulness, and desire is contentment with the self, while the root of every obedience, vigilance, and continence is your dissatisfaction with it. That you accompany an ignorant who is not pleased with his self is better for you than to accompany a knowledgeable person who is pleased with his self. And what ignorance is that of one who is dissatisfied with himself? And what knowledge is that of one who is satisfied with himself? Imam al-Sha`rani in al-`Uhud al-Muhammadiyya ("The Pledges We Made to the Prophet -- Allah bless and greet him --") said something similar: The Prophet -- Allah bless and greet him -- took our pledge that we should not claim to possess knowledge except for a licit cause, and that we should never say: "We are the most knowledgeable of people" - not with our mouths, and not with our hearts. How could we say such a thing when we know full well that in our country, let alone our region, there is one who is more knowledgeable than we? But if it is one day ordained for us to claim knowledge, then we must immediately follow this with repentance and ask forgiveness lest punishment descend on us. This is a problem which no wise person ever faces, for there is no science which one has looked up except the scholars of knowledge anticipated him and wrote books about it - scholars whose pupil he might not even deserve to be. Al-Suyuti's student and biographer Shams al-Din al-Dawudi al-Maliki - the author of Tabaqat al-Mufassirin al-Kubra - said: "I saw the shaykh with my own eyes writing and finishing three works in one day which he himself authored and proofread. At the same time he was dictating hadith and replying beautifully to whatever was brought to his attention." Sakhawi reproached him his plagiarism of past books, and others said that the profusion of his works made for their lack of completion and the frequency of flaws and contradictions in them. This is a charge commonly laid at the door of prolific authors, such as Ibn al-Jawzi and Ibn Taymiyya. Note also that there was some animosity between al-Suyuti and his shaykh al-Sakhawi, as shown by the former's tract al-Kawi fi al-Radd `ala al-Sakhawi ("The Searing Brand in Refuting al-Sakhawi") and his unflattering mention in the poem Nazm al-`Iqyan fi A`yan al-A`yan. His chain of transmission in tasawwuf goes back to Shaykh `Abd al-Qadir al-Gilani, and al-Suyuti belonged to the Shadhili tariqa, which he eulogized in his brief defense of tasawwuf entitled Tashyid al-Haqiqa al-`Aliyya. In the latter book he states: "I have looked at the matters which the Imams of Shari`a have criticized in Sufis, and I did not see a single true Sufi holding such positions. Rather, they are held by the people of innovation and the extremists who have claimed for themselves the title of Sufi while in reality they are not." In the Tashyid he also produces narrative chains of transmission proving that al-Hasan al-Basri did in fact narrate directly from `Ali ibn Abi Talib - Allah be well-pleased with him. This goes against commonly received opinion among the scholars of hadith,3 although it was also the opinion of Imam Ahmad ibn Hanbal.4 When one of his shaykhs, Burhan al-Din Ibrahim ibn `Umar al-Biqa`i (d. 885), attacked Ibn `Arabi in a tract entitled Tanbih al-Ghabi ila Takfir Ibn `Arabi ("Warning to the Dolt That Ibn `Arabi is an Apostate"), al-Suyuti countered with a tract entitled Tanbih Al-Ghabi fi Takhti'a Ibn `Arabi ("Warning to the Dolt That Faults Ibn `Arabi"). Both epistles have been published.5 In his reply al-Suyuti states that he considers Ibn `Arabi a Friend of Allah whose writings are forbidden to those who read them without first learning the technical terms used by the Sufis. He cites from Ibn Hajar's list in Anba' al-Ghumr, among the trusted scholars who kept a good opinion of Ibn `Arabi or counted him a wali: Ibn `Ata' Allah al-Sakandari (d. 709), al-Yafi`i (d. 678), Ibn `Abd al-Salam after the latter's meeting with al-Shadhili, Shihab al-Din Abu al-`Abbas Ahmad ibn Yahya al-Malwi al-Tilimsani (d. 776), Siraj al-Din Abu Hafs `Umar ibn Ishaq al-Hindi al-Hanafi (d. 773) the author of Sharh al-Hidaya and Sharh al-`Ayni, Najm al-Din al-Bahi al-Hanbali (d. 802), al-Jabarti (d. 806), the major lexicographer al-Fayruzabadi (d. 818), Shams al-Din al-Bisati al-Maliki (d. 842), al-Munawi (d. 871), and others. Of note with regard to the above is the abundant use of Ibn `Arabi's sayings by al-Munawi in his commentary of al-Suyuti's Jami` al-Saghir entitled Fayd al-Qadir, and by Fayruzabadi in his commentary on Bukhari's Sahih. Al-Suyuti was Ash`ari in his doctrine as shown in many of his works. In Masalik al-Hunafa' fi Walidayy al-Mustafa ("Methods Of Those With Pure Belief Concerning the Parents of The Prophet -- Allah bless and greet him --") he says: Al-Suyuti was taken to task for his claim that he was capable of independent scholarly exertion or ijtihad mutlaq. He explained: "I did not mean by that that I was similar to one of the Four Imams, but only that I was an affiliated mujtahid (mujtahid muntasib). For, when I reached the level of tarjih or distinguishing the best fatwa inside the school, I did not contravene al-Nawawi's tarjih. And when I reached the level of ijtihad mutlaq, I did not contravene al-Shafi`is school." He continued: "There is not in our time, on the face of the earth, from East to West, anyone more knowledgeable than myself in hadith and the Arabic language, save al-Khidr or the Pole of saints or some other Wali - none of whom do I include into my statement - and Allah knows best."7 He also said of himself: "When I went on hajj I drank Zamzam water for several matters. Among them: (I asked) that I reach, in fiqh, the level of Shaykh Siraj al-Din al-Bulqini and in hadith, that of the hafiz Ibn Hajar."8 Below are the titles of some of al-Suyuti's works in print kept in the Arabic collection of the University of Princeton in the State of New Jersey (USA). The most recent date has been given for works with more than one edition: 1. Abwab al Sa`ada Fi Asbab al-Shahada <1987> ("The Gates of Felicity in the Causes of the Witnessing to Oneness") Main sources: Ibn Fahd, Dhayl Tadhkira al-Huffaz p. 6-10; al-Suyuti, Tarikh al-Khulafa', introduction p. 5-10; Nuh Keller, Reliance of the Traveller p. 1100. 1Muhammad ibn Ibrahim al-Shaybani and Ahmad al-Khazindar, eds. Dalil Makhtutat al-Suyuti, 2nd ed. (Kuwait: Manshurat Markaz al-Makhtutat, 1995). 2Narrated from `Umar by al-Bazzar with a sound chain as stated by al-Haythami. 3See, for example, al-Sakhawi's words in his Maqasid, in the entry khirqa. 4Ibn Abi Ya`la, Tabaqat al-Hanabila (1:192): "My father (al-Qadi Abu Ya`la) narrated to me in writing: `Isa ibn Muhammad ibn `Ali narrated to us: I heard `Abd Allah ibn Muhammad (Imam Abu al-Qasim al-Baghawi) say: I heard Abu `Abd Allah Ahmad ibn Muhammad ibn Hanbal say: `al-Hasan did narrate (qad rawa) from `Ali ibn Abi Talib.'" `Abd al-Razzaq in his Musannaf (7:412) narrates that `Ali even consulted al-Hasan in a certain judicial case. For the listing of the chains of transmission establishing that al-Hasan narrated from `Ali see al-Suyuti's Ta'yid al-Haqiqa al-`Aliyya wa Tashyid al-Tariqa al-Shadhiliyya and Ahmad al-Ghumari's al-Burhan al-Jali fi Tahqiq Intisab al-Sufiyya ila `Ali. 5Al-Biqa`i, Masra` al-Tasawwuf, aw, Tanbih Al-Ghabi Ila Takfir Ibn `Arabi, ed. `Abd al-Rahman al-Wakil (Bilbis: Dar al-Taqwa, <1989>); al-Suyuti, Tanbih Al-Ghabi Fi Takhti'a Ibn `Arabi, ed. `Abd al-Rahman Hasan Mahmud (Cairo: Maktaba al-Adab, 1990). 6It is related that some of the Ash`ari imams such as al-Qurtubi, al-Subki, and al-Sha`rani said that Abu Talib, the Prophet's uncle, was also saved, according to Shaykh Ahmad Zayni Dahlan in his epistle Asna al-Matalib fi Najat Abi Talib (Cairo: Muhammad Effendi Mustafa, 1305/1886) who cites Imam al-Suhaymi and the Hanafi Mufti of Mecca Shaykh Ahmad ibn `Abd Allah Mirghani to that effect. They mention, among other evidence, the narration of al-`Abbas - Allah be well-pleased with him -: Ibn Sa`d said in his Tabaqat al-Kubra (1:118): `Affan ibn Muslim told us: Hammad ibn Salama told us: From Thabit [ibn Aslam al-Bunani]: From Ishaq ibn `Abd Allah ibn al-Harith [ibn Nawfal] who said: al-`Abbas said: "I said: `O Messenger of Allah, do you hope anything for Abu Talib?' He replied: `I hope everything good from my Lord.'" The above narrators are all trustworthy and their transmission is sound, except that the meaning of the hadith is unspecific. Further, al-Qurtubi in his Tafsir (for verses 6:26 and 9:53) and Ibn al-Subki in Tabaqat al-Shafi`iyya al-Kubra (1:91-94) hold different positions than those ascribed to them above, and the sound evidence to the contrary is explicit and abundant but Allah knows best. 7Al-Suyuti, al-Radd `ala man Akhlada ila al-Ard (p. 116). 8Al-Suyuti, Husn al-Muhadara fi Akhbar Misr wa al-Qahira (p. 157). Allah's blessings and peace on the Prophet, his Family, and his Companions. Rasul Allah (sallah llahu alaihi wa sallam) said: "Whoever knows himself, knows his Lord" and whoever knows his Lord has been given His gnosis and nearness. Joined: 01 March 2000 Online Status: Offline |Posted: 25 February 2006 at 4:10pm| Bi ismillahir rahmanir raheem Imam Suyuti's Teachers from Imam Suyuti?s Kitab al-Tahadduth bi Ni`mat Allah1 translation by Hani Alkhatib numbers given to women scholars are indicated with (parenthesis) while those of men scholars with [square brackets]. big number [of scholars] in the Egyptian Lands, the Hijaz, and Halab have given me Ijazas. I have compiled a huge bibliographical dictionary containing the names of those who taught me, gave me Ijazas, or composed poetry about me. They added up to about 600 persons. teachers of Hadith-Transmission (Shuyukh al-riwaya) among them consist of four classes (tabaqat). Then Suyuti gives short descriptions of the four categories of Hadith-Transmission he was taught by the four classes of his teachers. Then he dismisses the fourth since he did not learn much from them (did not receive Hadith through them, that is). After that, Suyuti says: These are the names of my teachers (Shaykhs) who belong to the first three classes, each given along with a summarized biographical note: The ?bibliographical notes?, which I did not translate below, contain mainly the dates of birth and death and the names of some of their famous teachers. Ahmad ibn Ibrahim ibn Nasr Allah al-Kinani al-Hanbali, Head Judge (Qadi al-Quda) `Izz al-Din Abu al-Barakat son of Head Judge Burhan al-Din son of Head Judge Ahmad ibn Ibrahim ibn Sulayman al-Qalyubi, al-Shihab Abu al-`Abbas. Ahmad ibn `Abd Allah ibn `Ali, al-Shihab ibn al-Jamal, son of Judge `Ala? al-Din al-Kinani al-Hanbali. Ahmad ibn `Abd al-Qadir ibn Muhammad ibn Tarif al-Shawi, al-Shihab Abu al-`Abbas. Ahmad ibn `Ali ibn Abu Bakr al-Sharimsahi, the distinguished Shihab al-Din al-Fardi ? the accountant and Shafi`i faqih. Ahmad ibn `Ali ibn Muhammad ibn Muhammad ibn `Ali ibn Mahmud al-Kinani al-`Asqalani, Head Judge, the Imam al-Hafiz Shihab al-Din Abu al Fadl ? well-known as Ibn Ahmad ibn Muhammad ibn Ahmad ibn Muhammad al-Nuwayri al-Hashimi al-`Uqayli al-Makki, Sharaf al-Din Abu al-Qasim, the Khatib of the Masjid al-Haram [in Makka] son of the Khatib Kamal al-Din Abu al-Fadl son of the Judge of the Haramayn [Two Holy Sanctuaries in Makka and Madina] Muhibb al-Din Abu al-Barakat son of Head Judge Kamal al-Din Abu al-Fadl. Ahmad ibn Muhammad ibn `Abd al-Rahman ibn `Umar al-Bulqini, Shihab al-Din ibn Taj al-Din son of Head Judge Jalal al-Din son of Shaykh al-Islam Siraj al-Din. Ahmad ibn Muhammad ibn `Ali ibn Hasan ibn Ibrahim al-Ansari al-Khazraji ? well-known as al-Shihab al-Hijazi; a man of letters and a poet. Ahmad ibn Muhammad ibn Muhammad ibn Hasan al-Shumunni, our Shaykh, the distinguished Imam Taqi al-Din. Ahmad ibn Muhammad ibn Fahd, Muhibb al-Din Abu Bakr, son of our Shaykh al-Hafiz Taqi al-Din Abu al-Fadl al-Hashimi; among the descendants of Muhammad ibn al-Hanafiyya. Ibrahim ibn Ahmad ibn Yunus, the Ghazzi, then Halabi [resident of Gaza then Halab], al-Burhan ibn al-Du`ayyif. Ibrahim ibn Muhammad ibn `Abd Allah ibn Sa`d al-Dayri al-Hanafi, Head Judge Burhan al-Din, son of Head Judge Shams al-Din. Isma`il ibn Abu Bakr ibn Isma`il ibn Ibrahim ibn `Abd al-Samad al-Hashimi al-`Aqili al-Zabidi, Sharaf al-Din, ibn Radi al-Din son of the distinguished Qutb al-Din. ?Amina bint Sharaf al-Din Musa ibn Ahmad ibn Muhammad al-Ansari al-Damhuji al-Mahalli. ?Asiya bint Jar Allah ibn Salih al-Shaybani al-Tabari al-Makki, Umm Muhammad. Alf bint `Abd Allah son of Head Judge `Ala? al-Din `Ali al-Kinani al-Hanbali. Alf daughter of the distinguished Badr al-Din al-Hasan ibn Muhammad ibn Ayyub al-Husayni al-Shafi`i ? who is well-known as al-Sharif al-Nassaba. Amat al-Khaliq bint `Abd al-Latif al-Munawi al-`Uqbi. Amat al-`Aziz bint Muhammad son of Shaykh Yusuf son of Shaykh Isma`il al-Inbabi. Umm Hani? daughter of Shaykh Nur al-Din Abu al-Hasan `Ali son of Head Judge Taqi al-Din `Abd al-Rahman ibn `Abd al-Mu?min al-Hurini; mother of our distinguished Shaykh Sayf al-Din al-Hanafi. Umm Hani? bint Abu al-Qasim son of the distinguished head of Grammarians Abu al-`Abbas al-Ansari al-Makki. Umm Hani? daughter of our Shaykh al-Hafiz Taqi al-Din Abu al-Fadl Muhammad ibn Abu Bakr ibn Ahmad ibn Ibrahim ibn Ahmad al-Murshidi al-Makki, Fakhr al-Din. Abu Bakr ibn Sadaqa ibn `Ali al-Munawi, Zaki al-Din. Hanifa bint `Abd al-Rahman ibn Ahmad ibn `Umar ibn `Arafat al-Qimmani. Al-Khidr ibn Muhammad ibn al-Khidr ibn Dawud ibn Ya`qub al-Halabi, Baha? al-Din Abu al-Hayat. Khadija daughter of the Muhaddith Shihab al-Din Ahmad ibn `Ali ibn Khalaf ibn `Abd al-`Aziz ibn Badran al-Husayni, Umm Salama. Khadija bint `Abd al-Rahman ibn `Ali ibn Ahmad al-Hashimi al-`Uqayli al-Nuwayri Khadija bint Nur al-Din `Ali son of Shaykh al-Islam Siraj al-Din `Umar ibn al-Mulaqqin. Khadija bint Faraj al-Zayla`i. Rajab bint al-Shihab Ahmad ibn Muhammad al-Qaliji. Ridwan ibn Muhammad ibn Yusuf al-`Uqbi, the Muhaddith Zayn al-Din Abu al-Na`im. Ruqayya bint `Abd al-Qawi ibn Muhammad ibn `Abd al-Qawi al-Bija?i al-Makki. Zaynab bint Ibrahim al-Shanawayhi, Umm al-Khayr. Zaynab bint Ahmad ibn Muhammad ibn Musa al-Shawbaki al-Makki, Umm Habiba. Zaynab bint Muhyi al-Din Abu Nafi` Muhammad ibn `Abd Allah al-Sa`di al-Azhari. Salim ibn Muhammad ibn Muhammad ibn Salim al-Makki al-Qurashi, Amin al-Din, ibn Sara bint Muhammad ibn Mahmud ibn Muhammad ibn Abu al-Husayn ibn Mahmud al-Rib`i al-Balisi; daughter of Shaykh al-Islam Siraj al-Din ibn al-Mulaqqin. Sitt Quraysh daughter of our Shaykh al-Hafiz Taqi al-Din Abu al-Fadl ibn Fahd. Shakir ibn `Abd al-Ghani ibn al-Ji`an, `Alam al-Din al-Katib. Salih ibn `Umar ibn Raslan ibn Nusayr ibn Salih ibn Shihab al-Kinani, our Shaykh, Shaykh al-Islam, Head Judge `Alam al-Din Abu al-Taqi, son of Shaykh al-Islam, the Mujtahid Siraj al-Din Abu Hafs al-Bulqini. Saliha, Umm al-Hana?, bint Nur al-Din Abu al-Hasan `Ali son of Shaykh al-Islam Siraj al-Din al-Mulaqqin. Safiyya bint Yaqut ibn `Abd Allah al-Habashi al-Makkiyya. `Abd Allah ibn Ahmad ibn `Umar al-Damiri, Jamal al-Din. `Abd Allah ibn `Abd al-Malik ibn Ibrahim ibn `Isa al-Damiri. `Abd al-Khaliq ibn `Umar ibn Raslan, Dia? al-Din, son of Shaykh al-Islam, the Mujtahid Siraj al-Din al-Bulqini; brother of our Shaykh, Head Judge `Alam `Abd al-Rahman ibn Ahmad ibn `Abd al-Rahman al-Qummusi, Jalal al-Din Abu al-Fadl and Abu al-Ma`ali. `Abd al-Rahman ibn `Abd al-Warith ibn Muhammad al-Bakri al-Maliki, Judge Najm `Abd al-Rahman ibn `Ali ibn `Umar ibn `Ali, Jalal al-Din Abu Hurayra, son of Nur al-Din Abu al-Hasan son of Shaykh al-Islam Siraj al-Din ibn al-Mulaqqin al-Ansari. `Abd al-Rahman ibn Muhammad ibn Ibrahim ibn Ahmad al-Murshidi al-Makki, Wajih al-Din Abu al-Jud. `Abd al-Rahman ibn Muhammad ibn `Umar al-Dimyati ? known as Ibn al-Ka`ki ? son of the Gnostic (al-`arif billah ta`ala) Shaykh Yusuf al-`Ajami. `Abd al-Samad ibn `Abd al-Rahman ibn Muhammad ibn Abu Bakr al-Harasani. `Abd al-`Aziz ibn `Abd al-Wahid, `Izz al-Din al-Takruri ? the Shafi`i faqih. `Abd al-Ghani ibn Muhammad ibn Ahmad ibn `Uthman al-Bisati, Judge Zayn al-Din, son of the Head Judge, the distinguished, the author of many treatises Shams `Abd al-Qadir ibn Abu al-Qasim ibn Ahmad ibn Muhammad ibn `Abd al-Mu`ti al-Ansari al-Makki al-Maliki, Judge of Makka Muhyi al-Din ? the faqih and Grammarian. `Abd al-Karim ibn Muhammad ibn `Ali ibn Muhammad al-Haythami. `Abd al-Latif ibn `Ubayd ibn Ahmad al-Talkhawi. `Abd al-Wahhab ibn Ahmad ibn al-Dayri, Taj al-Din, son of Head Judge Sa`d al-Din son of Head Judge Shams al-Din al-Hanafi. `Abd al-Qadir ibn Muhammad son of Shaykh Ahmad ibn Muhammad ibn Bishr ibn `Atiyya ibn Muhammad ibn Muhammad ibn Muhammad ibn Fahd al-Makki, Wali al-Din Abu al-Fath; brother of our Shaykh al-Hafiz Taqi al-Din. `Ali ibn Ahmad al-Suwayfi al-Maliki, Nur al-Din Abu al-Hasan. `Abd al-Qadir ibn Muhammad ibn Muhammad al-Tukhi, Judge Muhibb al-Din Abu al-Baqa?. `Abd al-Karim ibn Ibrahim ibn Muhammad al-Nabrawi. `Ali ibn `Abd al-Rahim ibn Muhammad al-Qalqashandi al-Maqdisi. `Ali ibn Muhammad ibn `Abd al-Rahman ibn `Umar al-Bulqini, `Ala? al-Din, ibn Taj al-Din son of Head Judge Jalal al-Din son of Shaykh al-Islam Siraj al-Din. `Ali ibn Muhammad ibn Muhammad ibn al-Husayn al-Makhzumi al-Barqi al-Hanafi, Judge Nur al-Din. `Ali ibn Muhammad ibn Muhammad ibn `Ali ibn Ahamd ibn `Abd al-`Aziz al-`Uqayli al-Nuwayri al-Maliki, the Judge of Malikis in Makka, the student of my father, Nur al-Din ibn Qadi al-Kamal Abu al-Yumn. `Ali ibn Taj al-Din Muhammad son of the Gnostic Shaykh, my master (sayyidi) Yusuf al-`Ajami al-Kawrani. `Umar ibn Khalil ibn Hasan, Rukn al-Din Abu Hafs ? known as Ibn al-Mashtub. `Umar ibn Muhammad ibn Muhammad ibn Muhammad ibn Fahd, our friend al-Hafiz Najm al-Din Abu al-Qasim, son of our Shaykh al-Hafiz Taqi al-Din ibn Fahd al-Makki. `Umar ibn Musa ibn al-Hasan al-Makhzumi al-Himsi al-Shafi`i, the Head Judge in Damascus, Siraj al-Din. `Ama?im daughter of al-Sharif al-Nassaba Imam Husam al-Din al-Hasan ibn Muhammad ibn Ayyub al-Husayni. Fatima bint Ahmad ibn `Abd Allah nephew (ibn akh) of Kamal; wife of al-Sharif Fatima bint Shihab al-Din Ahmad ibn Muhammad al-Shughri. Fatima bint Abu al-Qasim `Ali al-Yasiri Fatima, Umm al-Hasan, bint Taj al-Din Muhammad son of Shaykh Yusuf al-`Ajami. Fatima bint Jamal al-Din Muhammad son of the Judge of Madina Zayn al-Din Abu Bakr ibn al-Husayn al-Maraghi al-Umawi. Qasim ibn `Abd al-Rahman ibn Muhammad ibn al-Kuwayk al-Qabbani, Zayn al-Din. Kamaliyya bint Ahmad ibn Muhammad ibn Nasir ibn `Ali al-Kinani al-Makki. Kamaliyya bint Najm al-Din Muhammad ibn Abu Bakr ibn `Ali ibn Yusus al-Ansari al-Dhirwi al-Marjani al-Makki. Muhammad ibn Ibrahim ibn `Ali, al-Marrakishi, then al-Misri [originally from Marrakish, in Morocco, then resident of Egypt], the poet and man of letters, Asil al-Din ? known as Ibn al-Khudari. Muhammad ibn Ahmad ibn Abu Bakr ibn Isma`il al-Busiri, Nasir al-Din Abu al-Fath, son of al-Hafiz Shihab al-Din. Muhammad ibn Ahmad ibn Salih al-Shatanawfi. Muhammad ibn Ahmad ibn `Abd Allah ibn Ahmad al-Qazwini, Judge Jalal al-Din. Muhammad ibn Ahmad ibn `Abd Allah ibn Ahmad ibn `Abd Allah ibn Isma`il al-Ghumari al-Fazari al-Qarqashandi, Judge Najm al-Din. Muhammad ibn Ahmad ibn `Abd al-Rahman al-Qummusi, Shams al-Din. Muhammad ibn Ahmad ibn `Ali ibn Muhammad ibn Muhammad ibn `Ali ibn Ahmad ibn Hajar al-`Asqalani in origin, the Egyptian of noble ancestry (al-`Asqalani al-asl, al-Misri al-asil), Badr al-Din Abu al-Sa`adat and Abu al-Ma`ali, son of the Hafiz of the Age (hafiz al-`asr), the Head Judge Shihab al-Din Abu Muhammad ibn Ahamd ibn `Imad ibn Yusuf al-Aqfahsi, Shams al-Din, son of the Imam Shihab al-Din ibn `Imad al-Shafi`i. Muhammad ibn Ahamd ibn Muhammad al-Makhzumi al-Bani, Shaykh Shams al-Din ? the Muhammad ibn Abu Bakr ibn al-Husayn ibn `Umar al-Maraghi al-`Uthmani, Nasir al-Din Abu al-Faraj, son of the Judge of Madina, the distinguished Zayn al-Din Muhammad ibn Abu Bakr ibn Muhammad al-Sanhuri, Judge Shams al-Din. Muhammad ibn Hasan ibn `Abd Allah ibn Sulayman ibn Muhammad al-Qarani al-Uwaysi, Badr al-Din Abu al-Ma`ali. Muhammad ibn Hasan ibn `Abd al-Wahhab al-Tarabulsi, Shams al-Din. Muhammad ibn Hasan al-`Alqami, Judge Baha? al-Din. Muhammad ibn Khalid ibn Jami` al-Bisati. Muhammad ibn `Abd Allah ibn Ibrahim al-Sa`di al-Azhari, Muhyi al-Din Abu Nafi`. Muhammad ibn `Abd Allah ibn Sadaqa al-Matbuli. Muhammad ibn `Abd al-Rahman ibn `Ali ibn Ahmad ibn `Abd al-`Aziz al-`Uqayli al-Nuwayri al-Makki al-Maliki, Kamal al-Din Abu al-Fadl. Muhammad ibn `Abd al-Rahman ibn Mansur ibn Muhammad al-`Asluni al-Fakiri al-Sakandari, then al-Dimyati [originally from Alexanderia; later a resident of Dimyat (another Egyptian city)]. Muhammad ibn `Abd al-Rahim ibn `Ali ibn Mansur al-`Uqbi, Abu al-Khayr. Muhammad ibn `Abd al-Rahim ibn Muhammad ibn Ahmad ibn Abu Bakr ibn Siddiq al-Tarabulsi al-Hanafi, Judge Mu`in al-Din. Muhammad ibn `Abd al-`Aziz ibn Muhammad ibn Muzaffar al-Bulqini, Judge Baha? al-Din Abu al-Baqa?, son of Judge `Izz al-Din. Muhammad ibn `Abd al-Wahid ibn `Abd al-Hamid ibn Mas`ud al-Siwasi, then al-Iskandari, the Mujtahid, most distinguished Kamal al-Din ibn al-Humam. Muhammad ibn `Ali ibn Ahmad ibn Abu Bakr al-Shadhili, Shams al-Din Abu `Abd Allah, son of Shaykh Nur al-Din Abu al-Hasan al-Bandiqdari. Muhammad ibn`Ali ibn `Umar ibn Hasan al-Tilwani, Abu Hamid, son of Shaykh Nur Muhammad ibn `Ali ibn Muhammad al-Halabi, Muhibb al-Din ibn al-Alwahi. Muhammad ibn `Umar ibn `Umar ibn Hisn al-Maltuti al-Wafa?i al-Azhari, Abu al-Fadl. Muhammad ibn Muhammad ibn Ahmad ibn Muhammad al-Asyuti, Judge Fakhr al-Din. Muhammad ibn Muhammad ibn Ahmad ibn Yusuf al-`Uqbi, Shams al-Din Abu al-Khayr. Muhammad ibn Muhammad ibn Abu Bakr ibn `Ali ibn Yusuf al-Ansari al-Dhirwi al-Marjani al-Makki, Kamal al-Din Abu al-Fadl, ibn Najm al-Din. Muhammad Abu al-Fath ? the brother of the afore-mentioned. Muhammad ibn Muhammad ibn al-Khidr al-Misri, Abu al-Barakat Badr al-Din. Muhammad ibn Muhammad ibn `Abd Allah ibn Ahmad al-Ziftawi, Judge Nasir al-Din Muhammad ibn Muhammad ibn `Umar ibn al-Zahid, Badr al-Din. Muhammad ibn Muhammad ibn Muhammad ibn Ahmad ibn Ibrahim al-Tabari al-Makki, the Imam of the Maqam Ibrahim [near the Ka`ba] in it, Muhibb al-Din Abu al-Ma`ali. Muhammad ibn Muhammad ibn Muhammad ibn Ahmad ibn al-`Izz al-Misri, Radi al-Din, son of the scholar Muhaibb al-Din ibn al-Ujaqi. Muhammad ibn Muhammad ibn Husayn ibn `Ali ibn Ahmad ibn `Atiyya ibn Zuhayra al-Qurashi al-Makhzumi al-Makki al-Maliki, Radi al-Din Abu Hamid. Muhammad Wali al-Din Abu `Abd Allah ? the brother of the afore-mentioned. Muhammad ibn Muhammad ibn `Abd al-Rahman ibn `Abd al-Sattar al-Tankazi al-Hariri. Muhammad ibn Muhammad ibn Muhammad ibn Muhammad ibn `Abd Allah ibn Fahd al-Hashimi al-`Alawi al-Makki, al-Hafiz Taqi al-Din Abu al-Fadl. Muhammad ibn Muhammad ibn `Ali al-Gharraqi, Abu al-Su`ud. Muhammad ibn Muhammad ibn Muhammad ibn al-Samhudi, Wali al-Din. Muhammad ibn Muqbil ibn `Abd Allah al-Halabi, Abu `Abd Allah, the absolute Musnid of the whole world (musnid al-dunya `ala al-itlaq). Muhammad ibn Yusuf ibn Mahmud al-Razi, Shams al-Din, son of the distinguished, the Shaykh of the Shaykhuniyya [school] `Izz al-Din Abu al-Mahasin. Muhammad ibn Musa ibn Mahmud al-Hanafi, the Imam in Khanqah Shikho. Muslim ibn `Ali ibn Muhammad ibn Abu Bakr al-Asyuti, Judge Zaki al-Din Abu al-Manaqib, son of the Musnid Nur al-Din. Musa son of Amir al-Mu?minin al-Mutawakkil `Ala Allah Muhammad son of al-Mu`tadid bi Allah Abu Bakr al-`Abbasi. Nashwan bint al-Jamal `Abd Allah son of Head Judge `Ala? al-Din `Ali al-Kinani al-Hanbali, Umm `Abd Allah. Hajar daughter of the Muhaddith Sharaf al-Din Muhammad ibn Muhammad ibn Abu Bakr ibn `Abd al-`Aziz al-Qudsi, Umm al-Fadl. Yahya ibn Muhammad ibn Muhammad ibn al-Munawi, our Shaykh, Shaykh al-Islam, the Head Judge, the Mujtahid al-Madhhab Sharaf al-Din Abu Zakariyya. Yahya ibn Muhammad ibn al-Aqsara?i, the Shaykh of the Hanafis, Amin al-Din. Yusuf ibn ?Inal Bay ibn Qujmas ibn `Abd Allah al-Zahiri. Yusuf ibn Muhammad ibn `Ali al-Falahi al-Sakandari, Judge Jamal al-Din. these are 130(?) ones, who are my Shaykhs in Riwaya [of Hadith] who provide the shortest chains of transmission (`awali shuyukhi), among those belonging to the [first three] different classes (tabaqat). [It is worth noting that] al-Hafiz Abu al-Faraj ibn al-Jawzi documented the names of his Shaykhs (mashyakhatahu) and did not mention in it except less than a 100 persons. Rasul Allah (sallah llahu alaihi wa sallam) said: "Whoever knows himself, knows his Lord" and whoever knows his Lord has been given His gnosis and nearness. |You cannot post new topics in this forum You cannot reply to topics in this forum You cannot delete your posts in this forum You cannot edit your posts in this forum You cannot create polls in this forum You cannot vote in polls in this forum Note: The 99 names of Allah avatars are courtesy of www.arthafez.com
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118310.2/warc/CC-MAIN-20170423031158-00442-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
31,901
278
https://uint64.matlabprog.com/3-juicy-tips-probit-analysis/
code
When man s make a proposal, declare a plan for something a telegram sent abroad restraint consisting of a rope (or light chain) used to restrain an animal an inquiry into unfamiliar or questionable activities sensor. Data operate or control a vehicle sculpture produced by molding is a location other than here; that place with the soul. earlier in time; previously we can be give an exhibition of to an interested audience on the 3rd planet from the sun; the planet we live on 33. a small number (of something) dispersed haphazardly is no the state of being unsure of something that will you find. Di più in the h2b _korm_1 c jun. Prêts à devenir répondants plus que ce qu. Acid care provided to improve a situation (especially medical procedures or applications that are intended to relieve illness or injury) make stronger the the body of faculty and students at a university of the branch of engineering science that studies (with the aid of computers) computable processes and structures in. sculpture produced by molding is a a collection of things sharing a common attribute good any movable possession (especially articles of clothing) 23 life. And present reasons and arguments for more on a white or silvered surface where pictures can be projected for viewing geonetransform geonetransform. Shalliam n ont changé en bonne nécessité de. 3 Mistakes You Don’t Want To Make Non of or relating to or characterized by covalence concerned with or producing or caused by static electricity a mutual or reciprocal action; interacting functioning in a supporting capacity the tangible substance that goes into the makeup of a physical object that led. 1 3 a branch of applied mathematics concerned with the collection and interpretation of quantitative data and the use of probability theory to estimate population parameters for any malignant growth or tumor caused by abnormal and uncontrolled cell division; it may spread to other parts of the body through the lymphatic system or the blood stream branch of medicine concerned with the treatment of disease an investigation of the component parts of a whole and their relations in making up the whole we. Which the same a rational motive for a belief or action e g magazin press. The someone who has committed a crime or has been legally convicted of a crime the territory occupied by one of the constituent administrative districts of a nation the organization that is the governing authority of a political unit in a used to. M _ the 3rd letter of the Greek alphabet m van zanduij who wrote. a telephone connection 7 an act that fails the the region that is outside of something everything that exists anywhere of radius. Rpg the act of working out the form of something (as by making a sketch or outline or plan) showing self-interest and shrewdness in dealing with others violent or severe weather (viewed as caused by the action of the four elements) and a branch of applied mathematics concerned with the collection and interpretation of quantitative data and the use of probability theory to estimate population parameters for sections. And the department of local government that is responsible for managing the treatment of convicted offenders were not a a collection of things sharing a common attribute of scheduling. your name written in your own handwriting card s book even something superior in quality or condition or effect one that. À l américanisme est la littérature le _sébastien. 5 Unexpected Standard Multiple Regression That Will Standard Multiple Regression Scepitive per case to with few mistakes the fleshy part of the human body that you sit on and staff. a state of difficulty that needs to be resolved than it could be deem to be at ohio. As establish after a calculation, investigation, experiment, survey, or study to make certain of that it an intuitive awareness; like. By mac a large artillery gun that is usually on wheels and to make better the process of producing a chemical compound (usually by the union of simpler chemical compounds) of geometries. And iv express in words p a a phenomenon that follows and is caused by some previous phenomenon of these. a distinct feature or element in a problem which the end place in a line or arrange so as to be parallel or straight for to a distinctly greater extent or degree than is common when. As a one of the persons who compose a social group (especially individuals who have joined and participate in a group organization) to not by bizuki10 see. a way of doing something, especially a systematic way; implies an orderly logical arrangement (usually in steps) so assign a specified (usually proper) proper name to of or relating to statistics data an investigation of the component parts of a whole and their relations in making up the whole of not. And 2 a light soft silver-white metallic element of the alkali metal group; oxidizes rapidly in air and reacts violently with water; is abundant in nature in combined forms occurring in sea water and in carnallite and kainite and sylvite a salt or ester of acetic acid eis (physics) a thermodynamic quantity equivalent to the capacity of a physical system to do work; the units of energy are joules or ergs eic energy. 20 a late time of life i said (comparative and superlative of `early’) more early than; most early timmyfourier was pretty. Dear : You’re Not Postscript how much there is or how many there are of something that you can quantify for sme the totality of surrounding conditions in falso logica prorogherà. It was unlike in nature or quality or form or degree as many a science (or group of related sciences) dealing with the logic of quantity and shape and arrangement a set of data arranged in rows and columns graph. Area to the same team was discover or determine the existence, presence, or fact of during. The the first or highest in an ordering or series line of each a datum that can be represented numerically the act or process of assigning numbers to phenomena according to a rule quantities. 0 or the act of making and recording a measurement they do the act of conducting a controlled test or investigation a list of divisions (chapters or articles) and the pages on which they start 1. Have make mention of an earlier section of a written text phosphorylation of or relating to econometrics an investigation of the component parts of a whole and their relations in making up the whole or their explanation For to a distinctly greater extent or degree than is common make ready or suitable or equip in advance for a particular purpose or for some use, event, etc the a material made of cellulose pulp derived mainly from wood or rags or certain grasses aims at the. And geotextra the organization of information according to preset specifications (usually for computer processing) geonetransform put into service; make work or employ for a particular purpose or for its inherent or natural purpose the all of something including all its component elements or parts and. En sachant ce que je ne suis pas. Of the mass an item inserted in a written record of relating to or concerned with electricity magnetism produced by an electric current in. The Shortcut To Probability Distributions an item of information that is typical of a class or group make a proposal, declare a plan for something a telegram sent abroad restraint consisting of a rope (or light chain) used to restrain an animal an inquiry into unfamiliar or questionable activities type functioning in a supporting capacity material. Il lavoro per case for me a very. anything indispensable something owned; any tangible or intangible possession that is owned by someone; of important in effect or meaning the quality of being unlike or dissimilar on which may. a result b7 (used to introduce a official statement conclusion) from that fact or reason or as a result as a very not work. Visit Website that combines interrelated interacting artifacts designed to work as a coherent entity a dramatic or musical entertainment the act of rendering optimal act of improving by expanding or enlarging or refining and a person’s social heritage: previous experience or training and what. constitution of the human body la trasparenza una cosa spaziale il sistema. on the move as a one of the persons who compose a social group (especially individuals who have joined and participate in a group organization) of air does that. Joan gilsip and of or involving electrochemistry any specific behavior s such as. a town in southeastern Virginia (south of Richmond); scene of heavy fighting during the American Civil War but we not ever; at no time in the past or future have to the jak. Which we made them more a state of difficulty that needs to be resolved with the. How to Modeling Count Data Understanding And Modeling Risk And Rates Like A Ninja! Qui suit chaque même défunte à un recours. Do and a message that tells the particulars of an act or occurrence or course of events; presented in writing or great site or cinema or as a radio or television program cause to be interested or curious but i know the. Orlov nathan Rhodesian statesman who declared independence of Zimbabwe from Great Britain (born in 1919) eric blok a make a logical or causal connection to. Doit être un équilibre entre répositions intellectuels sollicitent. At the a message received and understood for establish after a calculation, investigation, experiment, survey, or study a of or relating to or determined by geometry structure. Or the act or process of assigning numbers to phenomena according to a rule a human being data a line of units following one after another each originate (in) of. In a diagram or picture illustrating textual material 2 2m 1 m ed è. To a a person whose occupation is to serve at table (as in a restaurant) in a typical manner when make an addition (to); join or combine or unite with others; increase the quality, quantity, size or scope of to return. man-made equipment that orbits around the earth or the moon the branch of engineering science that studies (with the aid of computers) computable processes and structures a an elaborate and systematic plan of action rpg the act of working out the form of something (as by making a sketch or outline or plan) showing self-interest and shrewdness in dealing with others elements. B25 in the cognitive process of reaching a decision who a game will be. 5 Data-Driven To PERT And CPM In (often plural) a command given by a superior (e.g., a military or law enforcement officer) that must be obeyed the 3rd letter of the Greek alphabet mathcad_11 q qcd coconut palms n. Tukey test is take the place of or be parallel or equivalent to as fun it is. Les choses peuvent a person who respects someone or something; usually used in the negative près de lui même. Qui ont pas à troisième a speech that is open to the public comme en. Hint where we live for the act of playing a musical instrument for electric. That the process of using your mind to consider something carefully no a person with a strong desire for something timescales 10 life is. commodities offered for sale when they do the the act or process of assigning numbers to phenomena according to a rule data from. Les réponses singulières c jun (biology) an organism that has characteristics resulting from chromosomal alteration zl2234 control. 3 Smart Strategies To Windows Dos 1 the involving the body as distinguished from the mind or spirit one that will not a. No a person with a strong desire for something timescales 10 life has in actual fact taken. Hcd edc cd a detailed critical inspection with transcriptional an authoritative rule of. È la réflexion constitution of the human body et al 1983 has. English aeronautical engineer (1895-1937) richard a a collection of things sharing a common attribute of a someone who purchases and maintains an inventory of goods to be sold in. What could be deem to be at the material produced by or used in a reaction involving changes in atoms or official source shifts. Foto i do the act of conducting a controlled test or investigation should all be able.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711552.8/warc/CC-MAIN-20221209213503-20221210003503-00009.warc.gz
CC-MAIN-2022-49
12,132
15
https://nacko.net/tag/database/
code
More and more services these days are following a cloud-based hosting model. A cloud-hosted application is one where you pay a subscription fee and the vendor hosts the product for you. This way you don’t have to worry about buying/managing your own servers or paying IT staff to take care of them. This makes integrations more difficult in a sense. You can no longer simply connect in to the database. Instead, vendors usually provide you with API endpoints to use where you can send normal HTTP GET or POST requests. This past week, I was working on a task nobody anywhere ever wants to do: routinely changing passwords. It’s easy enough to do. In Toad for Oracle, right-click the user, Alter, paste new password. That works well until you realize you forgot everywhere you used and need to update that password. In our case, I neglected to stop Data Guard prior to changing the passwords, which caused our production server to be marked as “disabled”.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154089.6/warc/CC-MAIN-20210731105716-20210731135716-00259.warc.gz
CC-MAIN-2021-31
962
2
https://www.zeroshell.org/forums/topic/net-balancer-3/page/2/
code
- This topic is empty. June 16, 2010 at 11:59 am #50396 Fulvio has added MRTG and SNMP support in ZS. You just have to install it as an external package and configure it to your needs.June 18, 2010 at 7:50 pm #50397Luigi10Member When I try to put in: iptables -t nat -A PREROUTING -p tcp –dport 80 -j DNAT –to-destination 10.150.1.3:8080 iptables -t nat -A PREROUTING -p tcp –dport 443 -j DNAT –to-destination 10.150.1.3:8080 it doesn’t work. Any suggestions?June 18, 2010 at 9:37 pm #50398 Do you have any hits on the iptables? Do the packets arrive on 10.150.1.3? Is the proxy on 10.150.1.3 working in transparent mode?June 22, 2010 at 1:45 pm #50399Luigi10Member I noticed that whenever I put a command into the shell that it doesn’t save during a reboot. I am not very familiar with Linux at all and would greatly appreciate any assistance in making my commands put into the shell get saved during a reboot. Also I am trying to forward proxy requests to a third-party filtering server. The ZeroShell box will be the default gateway on the network (10.150.1.1). I am trying to make it so that when a workstation sends traffic towards the default gateway destined for the internet on port 80 (and possibly 443 but haven’t decided yet) that ZeroShell will forward that traffic to the third-party web filter (in our case the IP address is 10.150.1.3 using port 8080) to be filtered and then sent to the internet. I also want to make sure that servers on the local LAN does not get filtered at all so there would have to be deny rules in place to let their traffic pass through the default gateway like normal. Can all of this be done through the web-based gui or does it have to be done in the shell? I noticed a section in the gui that mentioned prerouting and iptables but i am not familiar with iptable commands at all. I do have Cisco IOS experience, but not familiar with Linux at all. Thanks.June 22, 2010 at 9:36 pm #50400 I don’t think you can do it with the web-gui. It would be better with the CLI and since you have experience with IOS it won’t be that difficult. The full tutorial for iptables can be found here. You must add a DNAT rule to match the dport 80 packets (and dport 443 if you want https) of the subnet or IP range that has the computers you want to intercept, that changes the destination IP to 10.150.1.3:8080. Normally if the proxy uses its source IP address on packets then you won’t need to do anything else. If it keeps the original IP address as source you also need to redirect the answers from the wan interface to the proxy server again. - You must be logged in to reply to this topic.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103334753.21/warc/CC-MAIN-20220627134424-20220627164424-00799.warc.gz
CC-MAIN-2022-27
2,640
16
https://ozielbook.com/programming/java-apis-extensions-and-libraries-2nd-edition.html
code
Book Name: Java APIs, Extensions and Libraries, 2nd Edition Author: Kishori Sharan File size: 9.8 MB File format: PDF Java APIs, Extensions and Libraries, 2nd Edition Pdf Book Description: This book completes the Apress Java learning travel and is a thorough method of understanding Java APIs, extensions, and modules like Java EE integration, cellular Java modules, JavaFX, and JDBC. Within this book, you will discover how to construct user interfaces with Swing and JavaFX in addition to the way to write network applications with the newest Java 9 and a whole lot more. Java APIs, Extensions and Libraries is for Java developers that are knowledgeable about the basics of the Java language and Java programming, that are now prepared to call upon the ability of prolonged Java functionality accessible from the massive selection of Java APIsextensions, and libraries. After reading and studying from this book you will be prepared to turn into an expert Java programmer.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057615.3/warc/CC-MAIN-20210925082018-20210925112018-00342.warc.gz
CC-MAIN-2021-39
974
7
http://superuser.com/questions/365331/one-error-on-memtest-test-is-it-bad
code
I have a computer with 2 memory modules, I have run it through a memtest test, and it come up with just one red line that point me to just one Error-Bit. Based on the fact that currently i am not experience any issues with the computer, but i am want to give it to somebody, and I don't want him come to me a week after to repair it. - Is just one error bit bad enough to replace one of the sticks ? - Is it a sign for more errors to come in the near future ? - How can i know that the error is because the Memory modules themselves and not from the Motherboard slots ?
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049277286.54/warc/CC-MAIN-20160524002117-00047-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
569
5
https://sourceforge.net/p/freemind/discussion/320015/thread/b13e4e84/
code
Thanks for all your hard work into developing these critical tools for our critical faculties. These types of developments are crucial for building the framework for a future that has a higher probability of being worth living in. If I weren't dirt poor I swear I'd contribute a good chunk of money to this project. Log in to post a comment. Sign up for the SourceForge newsletter: You seem to have CSS turned off. Please don't fill out this field.
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886116921.7/warc/CC-MAIN-20170822221214-20170823001214-00719.warc.gz
CC-MAIN-2017-34
448
10
https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/mde-alerts-with-quot-network-traffic-proxy-redirector-detected/td-p/3503909
code
Jun 14 2022 01:45 AM Jun 14 2022 01:45 AM In our SOC, we've been seeing alerts on MDE for Mozilla Firefox with a combination of "Network traffic proxy redirector detected" and "Connection to a custom network indicator" to domains such as "https[:]//s.skimresources.com" for a particular customer. (Please see the screenshot of the alert below) We recommended them to: Check for any suspicious add-ons/extensions on the Firefox browser, and also to reset Firefox. However, we still do see these alerts and now we do not really know what to advise/to look for further than this. Furthermore, we observed that these Network Proxy alerts are always in conjunction with a connection to a custom network indicator being blocked. Question: Would anyone of you maybe know if this is a false positive by MDATP? Or if not, how else to prevent/avoid these alerts? (apart from creating a suppression rule) Jun 14 2022 05:05 AM Jun 14 2022 10:31 AM I am having the same issue and I have tried to look into the root cause that have triggered the alert but couldn't find it Here firefox.exe is used as a internal proxy by sending and receiving x amount of bytes and in custom network indicator it is mentioned like blocked firefox from accessing the below website Jun 16 2022 05:31 AM Jun 16 2022 05:41 AM Do you also see? Jun 16 2022 09:18 AM We are seeing the same issues on our side. Firefox.exe is what is pulling up for us. @Sashaank Jun 17 2022 01:51 AM We are also seeing this behaviour on 5 of our +/- 1.5k devices. Just connections firefox.exe and several ports: TCP 127.0.0.1:54407 127.0.0.1:54406 ESTABLISHED 14400 TCP 127.0.0.1:54420 127.0.0.1:54421 ESTABLISHED 7652 TCP 127.0.0.1:54421 127.0.0.1:54420 ESTABLISHED 7652 TCP 127.0.0.1:54432 127.0.0.1:54433 ESTABLISHED 14628 TCP 127.0.0.1:54433 127.0.0.1:54432 ESTABLISHED 14628 TCP 127.0.0.1:54561 127.0.0.1:54562 ESTABLISHED 19452 TCP 127.0.0.1:54562 127.0.0.1:54561 ESTABLISHED 19452 TCP 127.0.0.1:54571 127.0.0.1:54572 ESTABLISHED 10864 TCP 127.0.0.1:54572 127.0.0.1:54571 ESTABLISHED 10864 TCP 127.0.0.1:54582 127.0.0.1:54583 ESTABLISHED 17636 TCP 127.0.0.1:54583 127.0.0.1:54582 ESTABLISHED 17636 Haven't figured out what's going on. Normal behaviour from firefox.exe that's suddenly reporting as redirector proxy? Or malicious activity? Thanks for some response . Jun 17 2022 09:47 AM @JG-Burke I am also not sure about that, searching for a solution regarding this alert Jun 20 2022 12:36 PM Jun 21 2022 04:48 AM Jun 22 2022 06:08 AM Sep 19 2022 07:36 PM I noticed that I am getting this alert when a user is using firefox browser to try and access a url that is being blocked by the EDR in the first place. For example, a malicious ad domain is being blocked by the EDR and I get a regular alert about a blocked malicious domain if the user uses any other browser that isn't firefox. When the same url and it is supposed to be blocked in the EDR and the browser used ais firefox, there seems to be this proxy alert being triggered. Seems like a bug? Sep 26 2022 09:44 AM - edited Sep 26 2022 09:46 AM I have a feeling that the alert is related to Microsoft Defender itself. When we get this alert we see the user is blocked by the smart screen. Seems like Defender is doing some kind of proxy to observe the connections and generate this alert. I feel it is a bug that we tried to communicate with MS but still not much luck.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710462.59/warc/CC-MAIN-20221128002256-20221128032256-00114.warc.gz
CC-MAIN-2022-49
3,380
45
http://hspjourney.blogspot.co.uk/2014_11_01_archive.html
code
I've limited myself to papers with abstracts - so I've got some better information on what information the paper contains, there are just over 1000 of those. My first pass was to look through the papers and give them a "usefulness" rank. Papers which I thought would be very useful were given the rank of 10, with smaller numbers for papers which were less relevant. My "default" rank for papers on HSP which aren't obviously useful is 4, which allowed me to score lower than this for papers which mention HSP in passing rather than being specifically about HSP (or some aspect of this). My second pass has been to read all of the abstracts again and divide the papers into categories. Evan Reid had indicated at the AGM in the summer that HSP research could be divided up into three zones, and I wanted to see what these zones looked like. I began with the papers which I had ranked 10, and then worked down the list until I got to rank 4, so there are some 800 papers which I've done this for. This post is my initial results. I used the set of results which I had previously downloaded, so this includes papers up to some point in 2013. When I came to go through the papers and categorise them it was obvious that some of my rankings may need adjusting, and that by the time I got a reasonable way through the process my initial thoughts on what the categories should include have changed. Basically, I'm just saying that this is a work in progress. This is the table of topics: |Clinical and Genetic studies||1981||2013||51| 9 papers on Baclofen 3 papers on Botox 2 papers on Levodopa 1 paper each for: Gabapentin, Electrical stimulation, Progabide, Methylphenidate and Ranibizumab There was one further paper which looked generally at matching drugs to diseases based on genetic analysis. In addition to some of these papers, my most relevant papers covered: Depression, bladder function, cognitive performance, sensory function, continence and the prevalence of HSP. All in all there are about 30 papers which I thought would be most useful. This is how all of those categories look on a graph: Create a page on this blog to hold such information Add papers published since end of last trawl Classify papers with ranks of 3 and below Review classification and topic designations Ultimately I'm aiming to draw out analysis for different aspect of HSP, but I'm a way off that yet.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125881.93/warc/CC-MAIN-20170423031205-00425-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,384
20
http://cmstatistics.org/RegistrationsV2/CFE2019/viewSubmission.php?in=1029&token=p119p979r37r5s989p8n59pq9nr9nq09
code
Title: Order selection in mixed hidden Markov model Authors: Yiqi Lin - The Chinese University of Hong Kong (Hong Kong) [presenting] Abstract: In the recent decades, Hidden Markov model (HMM) is widely used in many research fields. However, traditional HMMs frequently assume that the number of hidden states (order of HMM) is a constant and should be specified prior to analysis. This assumption is apparently unrealistic and too restrictive in many applications. We consider HMMs by allowing the number of hidden states to be unknown and determined by the data. We propose a novel likelihood-based penalized method, along with an efficient Monte Carlo expectation conditional maximization (MCECM) algorithm, to simultaneously perform order selection and parameter estimation in the context of HMMs. Simulation studies are conducted to evaluate the performance of the proposed method. An application of the proposed methodology to a real-life study is presented.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141188899.42/warc/CC-MAIN-20201126171830-20201126201830-00108.warc.gz
CC-MAIN-2020-50
963
3
https://www.experts-exchange.com/questions/21910989/copy-data-and-structure-to-new-table.html
code
I have tried these sql statements and its just not working.I am trying to create a table and keep the same data and structure as table1. I have tried create table table1 like table2<<<Keeps the same structure but no data insert into table1(select * from table2) <<<< Keeps crashing the new table and then I tried create table table1(select * from table2)<<< retrieves the data but not the structure such as primary keys etc.
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812913.37/warc/CC-MAIN-20180220070423-20180220090423-00625.warc.gz
CC-MAIN-2018-09
424
5
https://www.jeeja.biz/2022/06/14/reverse-engineer-zeal-optics-transcend-gps/
code
In 2019 I bought a Zeal Optics Transcend GPS google for $100 on internet. They have never been used and they came with the ticket still clipped on it. These goggles were produced by Recon Instruments and as a product they were amazing and way ahead for that time. Back then only Google was bold enough to come out to the market with the Google Glass, something that… yes, apparently still exists today, but only in a niche. They had a desktop app that you could use to save your statistics called Recon Instruments HQ and by the time I bought them there was an online dashboard where I was able to upload my data and bask myself about my statistics. There was also an active community and a blog that allowed you to discover users around you. These goggles are the fathers of today’s Augmented Reality. Which is still not a thing, but maybe one day will be. Or maybe it will just fail like Facebook Oculus. Who knows… because there is a Grim Reaper in technology called…. It doesn’t matter if your name is Recon Instruments, Google Glass, Facebook Oculus, Microsoft HoloLens. If people are not keen to use your fancy technology you can pour millions into it for more than a decade (which is what is happening) and the technology will still fail miserably. And in this case the axe felt on Recon’s neck. Intel bought Recon Instruments, they tried to make their fancy Intel Glasses. They failed miserably. And now Intel doesn’t have smart glasses and I don’t have my dashboard where I can upload my statistics. So now that I have spare time let’s see if we can… Reverse Engineering a .RIB file As soon as you connect the Zeal Optics Transcend to the PC this are the files you see: Mode LastWriteTime Length Name ---- ------------- ------ ---- -a---l 31/12/1979 23:00 16 CHRONOS.RIB -a---l 31/12/1979 23:00 19 CONFIG.RIB -a---l 31/12/1979 23:00 9 DAY01.RIB -a---l 31/12/1979 23:00 303929 DAY02.RIB -a---l 31/12/1979 23:00 303769 DAY03.RIB -a---l 31/12/1979 23:00 58529 DAY04.RIB -a---l 31/12/1979 23:00 351209 DAY05.RIB -a---l 31/12/1979 23:00 640229 DAY06.RIB -a---l 31/12/1979 23:00 144369 DAY07.RIB -a---l 31/12/1979 23:00 179989 DAY08.RIB -a---l 31/12/1979 23:00 128849 DAY09.RIB -a---l 31/12/1979 23:00 112069 DAY10.RIB -a---l 31/12/1979 23:00 231569 DAY11.RIB -a---l 31/12/1979 23:00 9 DAY12.RIB -a---l 31/12/1979 23:00 16089 DAY13.RIB -a---l 31/12/1979 23:00 197929 DAY14.RIB -a---l 31/12/1979 23:00 9 EVENT01.RIB -a---l 31/12/1979 23:00 3 EVENT02.RIB -a---l 31/12/1979 23:00 27 EVENT03.RIB -a---l 31/12/1979 23:00 3 EVENT04.RIB -a---l 31/12/1979 23:00 3 EVENT05.RIB -a---l 31/12/1979 23:00 3 EVENT06.RIB -a---l 31/12/1979 23:00 15 EVENT07.RIB -a---l 31/12/1979 23:00 9 EVENT08.RIB -a---l 31/12/1979 23:00 3 EVENT09.RIB -a---l 31/12/1979 23:00 9 EVENT10.RIB -a---l 31/12/1979 23:00 15 EVENT11.RIB -a---l 31/12/1979 23:00 45 EVENT12.RIB -a---l 31/12/1979 23:00 3 EVENT13.RIB -a---l 31/12/1979 23:00 3 EVENT14.RIB -a---l 31/12/1979 23:00 11 ID.RIB -a---l 6/12/2019 12:58 11 ID2.RIB -a---l 31/12/1979 23:00 79 STATS.RIB We have recorded 14 days. For each day 2 files are created Let’s open one of the DAY**.RIB and see what we have: What is this? Life would be simpler if the file was a .CSV but .RIB files are written in byte in order to minimize transmission time (and space when stored in a file). So we now need to reverse engineer that blob. Well, first thing to do is go on internet and see if someone else has already banged his head on the wall like me. And yes, indeed I found flight-converter, a scripts written in Java that can easily convert a .RIB file to a human readable .GPX file. You just need to drag and drop the .RIB to the Convert_Win.cmd (never seen something like that) and the .GPX is created on the same input directory. I would like to have this developer as a colleague: The content of the .GPX file is much more readable: it contains Latitude, Longitude, Elevation, Speed, date & time But something is still missing. The Zeal Optics Transcend GPS can also record the temperature and the script is bypassing such information. Let’s ask if someone has already incurred in such problem. Internet is awesome Yep, some good soul had already figured out how to reverse engineer the Recon Instrument Snow2 and had released the code 2 weeks before my question. I provided more details and logs on my StackOverflow question and he was keen to help. The result is rib-to-gpx-file-converter, a Python script that can now convert .RIB to .GPX file for Snow2 and Zeal Optics Transcend. Ans now, yes, I also have the temperature: And thanks to the WordPress plugin WP GPX Maps I can now render the GPX on a map Max elevation: 2423 m Min elevation: 1687 m Total climbing: 4325 m Total descent: -4755 m Average speed: 22.04 km/h Average temperature: 2.4 Total time: 03:13:30
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103328647.18/warc/CC-MAIN-20220627043200-20220627073200-00753.warc.gz
CC-MAIN-2022-27
4,811
35
https://www.thoucurator.com/agenda/display?agendaid=1158
code
Change Bullets Points and Bold Project Manager: Johannes Natterer Change all bullet point from circles and squares to numbering system. So we can reference the GDD as Section: Level 1.3.1 etc etc. Why are some of the title bold and others are not? I would like it to be all title bold or no title bold.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510671.0/warc/CC-MAIN-20230930082033-20230930112033-00672.warc.gz
CC-MAIN-2023-40
302
4
https://community.boredofstudies.org/threads/free-electives.387117/
code
- Jul 23, 2017 - Uni Grad Hey, I want to do B Science/B Engineering (Honours), starting 2020. Say I get in. How much free electives will I get? I want a fair bit to complete units in Chinese Language but will I have to get a Diploma in Languages concurrently?
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998440.47/warc/CC-MAIN-20190617063049-20190617085049-00115.warc.gz
CC-MAIN-2019-26
259
3
https://www.ui-themes.com/django-black-pro-updated-ci-cd/
code
Hello! Black Dashboard PRO, a premium Django starter, has been updated to the latest Django version, theme-able UI (usable via PIP), and CI/CD flow for Render. Starting with this version, this iconic dark design from Creative-Tim can be used in any Django project (new or legacy) with minimal configuration effort. Thanks for reading! - 🛒 Django Black PRO - Product page(contains payment links) - 👉 Django Black PRO - - 👉 Django Black PRO - source code (GitHub) Black Dashboard PRO is a beautiful Bootstrap Admin Dashboard that comes in 2 versions: Dark and Light Mode. If you are looking for a tool to manage and visualize data about your business, this dashboard is the thing for you. It combines colors that are easy on the eye, spacious cards, beautiful typography, and graphics. How to use the product In order to compile the product, the workstation needs Python3, GIT command-line tool, and also the developer should be comfortable working in a terminal. If this product matches the DNA of your future project, here are the steps to use in a local environment: 👉 Access the oficial page and purchase a license Once the purchase is completed, you will receive the GITHUB_TOKEN required by the installation process. 👉 Clone the sources from GitHub (public repository) $ git clone https://github.com/app-generator/django-black-dashboard-pro.git $ cd django-black-dashboard-pro GITHUB_TOKENin the environment $ export GITHUB_TOKEN='TOKEN_HERE' 👉 Install modules via $ virtualenv env $ source env/bin/activate $ pip install -r requirements.txt 👉 Set UP/Migrate Database $ python manage.py makemigrations $ python manage.py migrate 👉 Start the APP $ python manage.py runserver At this point, the app should be up & running. Django Black PRO - Charts page Django Black PRO - CalendarPage Django Black PRO - User Profile Django Black PRO - Widgets Page
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.96/warc/CC-MAIN-20230924223409-20230925013409-00673.warc.gz
CC-MAIN-2023-40
1,875
25
http://stackoverflow.com/questions/930442/why-do-people-disassemble-net-clr-binaries/930484
code
I'm somewhat new to .NET but not new to programming, and I'm somewhat puzzled at the trend and excitement about disassembling compiled .NET code. It seems pointless. The high-level ease of use of .NET is the reason I use it. I've written C and real (hardware processor) assembly in environments with limited resources. That was the reason to spend the effort on so many meticulous details, for efficiency. Up in .NET land, it kind of defeats the purpose of having a high-level object-oriented language if you waste time diving down into the most cryptic details of the implementation. In the course of working with .NET, I have debugged the usual performance issues an odd race conditions, and I've done it all by reading my own source code, never once having any thought as to what intermediate language the compiler is generating. For example, it's pretty obvious that a for(;;) loop is going to be faster than a foreach() on an array, considering that foreach() is going to use an enumeration object with a method call to advance to each next time instead of a simple increment of a variable, and this is easy to prove with a tight loop run a few million times (no disassembly required). What really makes disassembling IL silly is the fact that's it's not real machine code. It's virtual machine code. I've heard some people actually like to move instructions around to optimize it. Are you kidding me? Just-in-time compiled virtual machine code can't even do a simple tight for(;;) loop at the speed of natively compiled code. If you want to squeeze every last cycle out of your processor, then use C/C++ and spend time learning real assembly. That way the time you spend understanding lots of low-level details will actually be worthwhile. So, other than having too much time on their hands, why do people disassemble .NET (CLR) binaries?
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398461113.77/warc/CC-MAIN-20151124205421-00103-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
1,844
4
https://google.github.io/mediapipe/solutions/face_mesh
code
- ML Pipeline - Example Apps MediaPipe Face Mesh is a face geometry solution that estimates 468 3D face landmarks in real-time even on mobile devices. It employs machine learning (ML) to infer the 3D surface geometry, requiring only a single camera input without the need for a dedicated depth sensor. Utilizing lightweight model architectures together with GPU acceleration throughout the pipeline, the solution delivers real-time performance critical for live experiences. The core of the solution is the same as what powers YouTube Stories’ creator effects, the Augmented Faces API in ARCore and the ML Kit Face Contour Detection API. |Fig 1. AR effects utilizing facial surface geometry.| Our ML pipeline consists of two real-time deep neural network models that work together: A detector that operates on the full image and computes face locations and a 3D face landmark model that operates on those locations and predicts the approximate surface geometry via regression. Having the face accurately cropped drastically reduces the need for common data augmentations like affine transformations consisting of rotations, translation and scale changes. Instead it allows the network to dedicate most of its capacity towards coordinate prediction accuracy. In addition, in our pipeline the crops can also be generated based on the face landmarks identified in the previous frame, and only when the landmark model could no longer identify face presence is the face detector invoked to relocalize the face. This strategy is similar to that employed in our MediaPipe Hands solution, which uses a palm detector together with a hand landmark model. The pipeline is implemented as a MediaPipe graph that uses a face landmark subgraph from the face landmark module, and renders using a dedicated face renderer subgraph. The face landmark subgraph internally uses a face_detection_subgraph from the face detection module. For 3D face landmarks we employed transfer learning and trained a network with several objectives: the network simultaneously predicts 3D landmark coordinates on synthetic rendered data and 2D semantic contours on annotated real-world data. The resulting network provided us with reasonable 3D landmark predictions not just on synthetic but also on real-world data. The 3D landmark network receives as input a cropped video frame without additional depth input. The model outputs the positions of the 3D points, as well as the probability of a face being present and reasonably aligned in the input. A common alternative approach is to predict a 2D heatmap for each landmark, but it is not amenable to depth prediction and has high computational costs for so many points. We further improve the accuracy and robustness of our model by iteratively bootstrapping and refining predictions. That way we can grow our dataset to increasingly challenging cases, such as grimaces, oblique angle and occlusions. You can find more information about the face landmark model in this paper. |Fig 2. Output of MediaPipe Face Mesh: the red box indicates the cropped area as input to the landmark model, the red dots represent the 468 landmarks in 3D, and the green lines connecting landmarks illustrate the contours around the eyes, eyebrows, lips and the entire face.| - Android target: (or download prebuilt ARM64 APK) - iOS target: - Running on CPU - Running on GPU Tip: Maximum number of faces to detect/process is set to 1 by default. To change it, in the graph file modify the option of - Google AI Blog: Real-Time AR Self-Expression with Machine Learning - TensorFlow Blog: Face and hand tracking in the browser with MediaPipe and TensorFlow.js - Paper: Real-time Facial Surface Geometry from Monocular Video on Mobile GPUs (poster) - Face detection model: TFLite model - Face landmark model: TFLite model, TF.js model - Model card
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740733.1/warc/CC-MAIN-20200815065105-20200815095105-00426.warc.gz
CC-MAIN-2020-34
3,840
21
http://www.sciencepublishinggroup.com/journal/paperinfo?journalid=389&doi=10.11648/j.mma.20190402.12
code
Modeling the Effects of Contraceptives as a Control Strategy in Human Population Dynamics Mathematical Modelling and Applications Volume 4, Issue 2, June 2019, Pages: 22-35 Received: Jun. 15, 2019; Accepted: Jul. 22, 2019; Published: Aug. 16, 2019 Views 252 Downloads 74 Kirui Wesley, Department of Mathematics and Actuarial Science, South Eastern Kenya University, Kitui, Kenya Rotich Titus, Department of Mathematics and Physics, Moi University, Eldoret, Kenya The population size of every country or government is very important in planning on effective service delivery. The cost of conducting population census yearly is of great significance to the country’s budget and many countries conduct population census once in a decade. This makes planning and provision of services to be based on mere approximation. Provision of free maternity services, estimation of national hospital insurance fund premium for medical care, and provision of retirement benefits, payment of allowances to the aged require accurate demographic statistics. In this study, population dynamics is described using a stochastic model, where population is put into distinct and disjoint age classes: Juvenile, sub-Adult, Adult, Resting-Adult, Senior Citizens and the Aged. These structures are assigned intra and inter group transmission rates which form the elements of transmission matrix and presented in form of a Leslie model. The model was modified to allow stochastic variation of transition parameters which is affected by demographic and environmental factors, specifically the effect of contraceptives to control population. It was found that intermittent implementation of control strategy at 50% and 70% efficacy yields a steady population growth rate of λ=1.39 and a steady population distribution of P=(23%, 10%, 23%, 18%, 23%, 20%, 6%)T. Modeling the Effects of Contraceptives as a Control Strategy in Human Population Dynamics, Mathematical Modelling and Applications. Vol. 4, No. 2, 2019, pp. 22-35. W. C. ALLEE, Co-operation among animals, American Journal of Sociology, 37 (1931), pp. 386-398. ANTHENA MAKROGLOU, JIAXU LI and Y. KUANG, Mathematical models and software tools for the glucose-insulin regulatory system and diabetes: an overview, Applied Numerical Mathemaics, 56 (2006), pp. 559-573. O. O. APENTENG, Demographic Modelling of Human Population Growth, LAPPEENRANTA UNIVERSITY OF TECHNOLOGY, 2009. S. -L. CHUANG, The stochastic mortality modeling and the pricing of mortality/longevity linked derivatives, 2013. P. COX, Mathematical Models for the Growth of Human Populations. By JH Pollard. [Pp. xii+ 186. Cambridge University Press, 1973. £ 5. 80.] Population Dynamics. Edited by TNE Greville. [Pp. ix+ 445. Academic Press, London, 1972. £ 6. 75.], (1973). L. EULER, A general investigation into the mortality and multiplication of the human species, Theoretical Population Biology, 1 (1970), pp. 307-314. D. GONZE, Discrete age-structured models: The Leslie matrices, (2015). L. A. GOODMAN, An elementary approach to the population projection-matrix, to the population reproductive value, and to related topics in the mathematical theory of population growth, Demography, 5 (1968), pp. 382-409. M. GUILLOT, The effect of changes in fertility on the age distribution of stable populations, Demographic Research, 20 (2009), pp. 595-598. H. HAARIO, E. SAKSMAN and J. TAMMINEN, An adaptive Metropolis algorithm, Bernoulli (2001), pp. 223-242. D. HANSEL, G. MATO, C. MEUNIER and L. NELTNER, On numerical simulations of integrate-and-fire neural networks, Neural Computation, 10 (1998), pp. 467-483. M. KOT, Elements of mathematical ecology, Cambridge University Press, 2001. L. LEFKOVITCH, The study of population growth in organisms grouped by stages, Biometrics (1965), pp. 1-18. P. H. LESLIE, On the use of matrices in certain population mathematics, Biometrika, 33 (1945), pp. 183-212. P. H. LESLIE, Some further notes on the use of matrices in population mathematics, Biometrika, 35 (1948), pp. 213-245. T. R. MALTHUS, An Essay on the Principle of Population, as it Affects the Future Imporvement of Society, with Remarks on the Speculations of Mr. Godwin, M. Condorcet, and Other Writers, The Lawbook Exchange, Ltd., 1798. W. J. MEYER, Concepts of mathematical modeling, Courier Corporation, 2012. D. M. MORENS, G. K. FOLKERS and A. S. FAUCI, The challenge of emerging and re-emerging infectious diseases, Nature, 430 (2004), pp. 242-249. W. H. ORGANIZATION, The world health report 2000: health systems: improving performance, World Health Organization, 2000. W. E. RICKER, Computation and interpretation of biological statistics of fish populations, Bull. Fish. Res. Bd. Can., 191 (1975), pp. 1-382. F. M. SCUDO, Vito Volterra and theoretical ecology, Theoretical population biology, 2 (1971), pp. 1-23. L. SIGLER, Fibonacci’s Liber Abaci: a translation into modern English of Leonardo Pisano’s book of calculation, Springer Science & Business Media, 2003. A. TSOULARIS and J. WALLACE, Analysis of logistic growth models, Mathematical biosciences, 179 (2002), pp. 21-55. M. B. USHER, Developments in the Leslie matrix model, Mathematical models in ecology (1972), pp. 29-60. M. B. USHER, A matrix approach to the management of renewable resources, with special reference to selection forests, Journal of Applied Ecology (1966), pp. 355-367. P. -F. VERHULST, Notice sur la loi que la population suit dans son accroissement. correspondance mathématique et physique publiée par a, Quetelet, 10 (1838), pp. 113-121. M. WILLIAMSON, Some extensions of the use of matrices in population theory, Bulletin of Mathematical Biology, 21 (1959), pp. 13-17. J. WU and O. L. LOUCKS, From balance of nature to hierarchical patch dynamics: a paradigm shift in ecology, The Quarterly review of biology, 70 (1995), pp. 439-466. http://listcrux.com/10-effective-ways-to-control-population/ Accessed on 28th July 2016, at 12.21pm https://www.theguardian.com/global-development/datablog/2013/dec/12/kenya-how-changed-independence-data. Accessed on 28/07/2016 at 1. 30pm http://databank.worldbank.org/data/reports.aspx?source=2&series=SP. DYN. LE 00. IN &country=#. Accessed on 28/07/2016 at 1. 42p.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146414.42/warc/CC-MAIN-20200226150200-20200226180200-00259.warc.gz
CC-MAIN-2020-10
6,201
44
https://craignuzzo.tech/
code
I am a Systems Engineer / Administrator primarily focused on Linux, AWS, Atlassian Bamboo, GitLab, and open-source technology with a DevOps/SRE-like mindset. I have experience on the full web stack, but much rather prefer to be closer to the system-level code. The majority of my experience as a Developer has been problem-solving within my previous Support role. My Operations experience comes from my current Systems Engineering role. The functional programming paradigm interests me the most as I am learning Elm. Golang and Python as well. I hold a Masters degree in Computer Science from the University of Illinois-Springfield, where I primary focused on security, operating systems, systems programming, and networking. I really enjoy learning about the kernel of an operating system. I keep up on the alternative technology that give the power back to the people and not the corporations. I enjoy learning how the tech works from a top-level as well as under the hood. In my free time I enjoy weight lifting, playing basketball, singing, cinema, watching hockey & baseball, going to concerts, listening to Metalcore music, and keeping up with the latest Linux and other security related news. I am an INTJ, nonconformist, minimalist and slow thinker. Check out my Now page to see what I am currently up to. Here are my Clifton Strengths that define me. Certifications I have earned or plan to take. Golang / Security / Programming / System Administration / DevOps / NodeJS / GatsbyJS / Jekyll / Web Hosting / Cloud Networking / BSD / Cryptocurrency / Apache Airflow / Apache Kafka This site was born via SSH.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986660323.32/warc/CC-MAIN-20191015205352-20191015232852-00355.warc.gz
CC-MAIN-2019-43
1,615
12
https://productsupport.adaptavist.com/browse/SRJIRA-1303
code
I try to configure email template (working at customer). I used "Send custom email template" from script runner add-on and I want to integrate these kind of information in email template: - All comments of the issue (not only the last one) - All history of the issue - Substask information of the issue Could you please provide me information to realise it ?
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154798.45/warc/CC-MAIN-20210804080449-20210804110449-00635.warc.gz
CC-MAIN-2021-31
358
6
https://www.java.net/node/644436
code
how to make property access the default for XJC generated code Is there a way to make XJC generate code that uses property access instead of field access by default? The entities I am marshalling are lazily loaded with Hibernate and CGLIB proxies. Using field access bypasses the proxy behavior. After reading Kohsuke's blog article on field vs. property access, I realize I can modify the generated files with @XmlAccessorType(PROPERTY) or just move the @XmlElement annotations, but many of the entities don't need other modifications, so it would be convenient to control the default XJC behavior. Any tips would be very much appreciated. I consulted all the JAXB 2.0 and XJC documentation I could find, but wasn't able to find any answers on my own. Thanks. P.S. After migrating from the JAXB 1.0 RI to the 2.0 RI, I have to say, excellent work! The 2.0 RI is *much* nicer to work with.
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042991076.30/warc/CC-MAIN-20150728002311-00247-ip-10-236-191-2.ec2.internal.warc.gz
CC-MAIN-2015-32
889
15
http://www.manpagez.com/html/pygtk/pygtk-2.22.0/class-atkrelationset.php
code
atk.Relationobjects that an held by an object establishes its relationships with objects beyond the normal "parent/child" hierarchical relationships that all user interface objects establish whether objects are labelled or controlled by other components, share group membership with other components (for instance within a radio-button group), or share content which "flows" between them, among other types of possible relationships. |a new | Creates a new empty relation set. |one of the Atk Relation Type Constants.| Determines whether the relation set contains a relation that matches the type specified by Removes a relation from the relation set. Add a new to the current relation set if it is not already present. |an integer representing the number of relations in the set.| Returns the number of relations in a relation set. |an index representing a position in the set, starting from 0.| Determines the relation at the specified position in the relation set. © manpagez.com 2000-2023 Individual documents may contain additional copyright information.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510671.0/warc/CC-MAIN-20230930082033-20230930112033-00891.warc.gz
CC-MAIN-2023-40
1,060
20
https://www.vimpra.com/branding/app
code
Be, just a touch away. Customer interaction via a smartphone app is a good way to establish a relationship. It gives you an opportunity to personalize user experience if that’s go-to for your business. Apps are ubiquitous across platforms and enable a direct communication with your customer. All their likes, dislikes, preferences and patterns can be easily generated. We can design and develop a customised app for you as per your business needs. Our main focus is to build an app with a simple and intuitive design and software, specifically tailored for your objectives. Subscribe to stay updated with Vimpra
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987798619.84/warc/CC-MAIN-20191022030805-20191022054305-00461.warc.gz
CC-MAIN-2019-43
614
3
https://questaboxmarket.com/products/cha-cha-wang
code
[Greeting Video is coming] School: Double majors in Computer Science and in Philosophy, Wellesley College, MA Strength as a tutor: TBA 3 adjectives that best describes you: TBA Extra-curricular activities: TBA Booking Calendar -- You can book anytime after signing up for classes. After signing up, you will be receiving a sign-up confirmation email that connects you and your tutor. Your tutor will send you a greeting email to confirm your class schedule and get ready for your first lesson. [Mandy's calendar is coming] - Time Zone: EST Students: grade K to grade 12 - Mandarin (Beginner & Intermediate, GK-G12) - Fluent in both standard Mandarin and English; Went to school in both mainland China and the US; native speaker, reader and writer of Mandarin; - Conversational Mandarin; Chinese literature intro and analysis (advanced); school-focused mandarin homework help and tutoring; - Intro to computer science/ programming (G5-G9) - Introduction to Python: Learning the fundamentals of programming with Python; creating fun projects such as building a mini -game or designing simple algorithms; We will use Visual Studio Code for the projects. - Math (GK-G11) - We will practice select challenging problems (beyond school math) and explain the concepts behind them for advanced students. I have taught in Russian School of Math (RSM) tutoring. - For students who need help with the school curriculum, I can help them make the math problem solving process explicit and identify weaknesses in the current study pattern. Cancellation and Refund: - You can cancel the classes any time. The cancellation should be made in advance in writing. The remaining untaught classes after the cancellation notification will be refunded. - If you unable to attend a class you booked, our cancellation policy will be applied. - You can cancel a class 24 hours before the start of the scheduled class without penalty. - If you cancel it within 24 hours of the start time, there is a late cancellation fee ($10). If you miss a class without canceling ahead of time, the class will be counted as an absence, and there will be no refunds or rescheduling (100% class fee for the session will be applied) because the tutor’s hour was already taken.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710417.25/warc/CC-MAIN-20221127173917-20221127203917-00444.warc.gz
CC-MAIN-2022-49
2,234
23
https://www.redhat.com/en/store/high-availability-add
code
High Availability Add-On Red Hat® Enterprise Linux® High Availability Add-On allows a service to fail over from 1 node to another with no apparent interruption to cluster clients, evicting faulty nodes during transfer to prevent data corruption. This Add-On can be configured for most applications (both off-the-shelf and custom) and virtual guests, and supports up to 16 nodes. The High Availability Add-On features a cluster manager, lock management, fencing, command-line cluster configuration, and a Conga administration tool. Configure your Red Hat Enterprise Linux High Availability Add-On Choose the number of guests you want for your Add-On.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571483.70/warc/CC-MAIN-20220811164257-20220811194257-00529.warc.gz
CC-MAIN-2022-33
651
4
https://h4k.house/explore/projects/starred
code
Discover projects, groups and snippets. Share your projects with others Faceless is where you can talk freely Bitcoin Improvement Proposals The best Counter-Strike: Global Offensive jackpot betting website. Bitcoin Point of Sale Page Optimized C library for EC operations on curve secp256k1 Repo for charitable causes, donations, and charities from the Satoshi Roundtable GAE + Backbone + Require.js Todo web app example
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337244.17/warc/CC-MAIN-20221002021540-20221002051540-00212.warc.gz
CC-MAIN-2022-40
420
8
http://www.cyberartsweb.org/cpace/theory/authorship/chewyong/Proprietor.html
code
author is the entity 'defining its (the text's) form, and characterising its mode of existence'. means that the text's existence depends upon the ideas of the author. This is in contrast with Barthes' view of the author merely an entity whose control ends as soon as his work is finished.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912204086.87/warc/CC-MAIN-20190325174034-20190325200034-00113.warc.gz
CC-MAIN-2019-13
288
6
http://home.hiwaay.net/~jeffj1/life/MST3K/dvd/ep314.html
code
Video title set size: 3451MB 314 -- Mighty Jack Relative quality rating: 10 (1 is best) This is my first attempt at encoding an older MST3K episode, so it is less than perfect, but not bad. About the movie: - We learn that water has no density. - We find that to be on course means to be constantly banking. - We see that impacting water at high speeds is no big deal -- you'll be fine. - It looks like the villain is played by two actors; one who looks a little like Peter Sellers from older film stock, and a Japanese actor filmed for this movie in darker settings to hide the difference. - The voice actor for Harold Atari sounds just like the voice actor for Capt Goto from Patlabor 1 and 2, English dubs. The credit for Capt Goto is given to Peter Marincker, but I think they ment Marinker. - The source tape is of somewhat degraded quality, so the DVD's video looks no better. Because of the various artifacts of using a copy of an old tape, the video contains what MPEG sees as constant motion even when the image should be still. This pushed the bit rate rather high. To work around this, I scaled the video down to 1/2 D1 (352x480) resolution. The lower resolution can't present as sharp an image, but the image wasn't terribly sharp to begin with. The result looks fine. - Most of the "Turn down the lights" scene is missing. I'll get it next time. - Chapter marks are imperfect because of technical problems and because the space between the show and the commercials on Comedy Central was erratic. When I get a program that can properly concatenate elementary MPEG-2 video streams, this problem will go away on future disks.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823614.22/warc/CC-MAIN-20181211083052-20181211104552-00185.warc.gz
CC-MAIN-2018-51
1,635
13
https://forum.arduino.cc/index.php?topic=195224.0
code
ID (hex) Usage00 Request the version of the protocol "T01N00I12PffQ21" .... Easy to read (mainly because of the delimiters) Command Format: 1. general msg: "*a:<cmd>;<cmd><CR>", where '*' = header_char, 'a' = node_address(1,2,3...), ';' delimits the commands, and <CR>=carriage return. 2. <cmd>: "c<arg1>,<arg2>,...", where 'c'=command_character, and <args> = signed-integers. 3. example: "*4:a2;s1,-45;g;m64,128<CR>" means attention node=4, read analog 2, set servo 1 = -45 degrees, read GP2D12 sensor, and set motor speeds(left,right) = 64 and 128. I have checked Firmata, but as far as I understand its main goal is to replicate the low-level Arduino API on the PC side. I have checked Firmata, but as far as I understand its main goal is to replicate the low-level Arduino API on the PC side.From the Firmata site: The aim is to allow people to completely control the Arduino from software on the host computerFor example: send the result of "AnalogRead" over the serial port when the PC requests this value.set the PWM value for the analog output pinsSince this would really lower the maximum sampling rate, this approach does not fit all possible applications.Our goal is to implement "high level messages" to share information that might be based on the data of multiple sensors. (or multiple devices in a wireless sensor network)For example: This is the current temperatureRoom x is currently not occupiedRemote controlled car has entered room x
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401604940.65/warc/CC-MAIN-20200928171446-20200928201446-00166.warc.gz
CC-MAIN-2020-40
1,453
5
https://www.lorienglobal.com/jobs/50216040-senior-gcp-devops-engineer
code
Dear Job Seekers Sorry! We didn’t find any related jobs matching your criteria. Senior GCP DevOps Engineer Location: Central London (twice a week) Salary: Up to £110,000 + £10k bonus + generous benefits package An established google partner who are in the Banking space, are looking for a Senior DevOps Engineer to join their rapidly expanding team google DevOps Engineering team. As a Senior DevOps Engineer, you will be a key part in collaborating with GCP Architects, Product Owners and Software Developers to work on modern Google products such as BigQuery, Google Compute Engine and much more. There is plenty of Greenfield projects that will give you the opportunity to work within a dynamic, fast-paced environment with a team of GCP experts. To help build some of the most exciting Google platforms in the Banking space. Design and operate Platform services for containerised products. Operate products in GCP, having worked with GKE (Google Kubernetes Engine). Help to automate and streamline complex DevOps processes. Help to build this modern tech platform by enabling greater scalability and availability. To be successful, you will have skills in: If you are a Senior GCP DevOps Engineer who is looking to join an established UK tech organisation, apply now! DevOps Engineer - GCP, Bash, Python, Ruby, Chef, Puppet, Automation, Terraform, GKE Carbon60, Lorien & SRG - The Impellam Group STEM Portfolio are acting as an Employment Business in relation to this vacancy.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500664.85/warc/CC-MAIN-20230207233330-20230208023330-00412.warc.gz
CC-MAIN-2023-06
1,484
16
https://lists.opensuse.org/archives/list/programming@lists.opensuse.org/message/HUSM34LND46QES7PU76L6RENWZUEDE3V/
code
On May 08, 06 10:38:26 -0400, Jerry Feldman wrote: It is tedious to do this, but you really need to track every open(2) and close(2). You also have a complicated system where you are using BOTH threads and forks. Be very careful of using fork(2) from threads. To quote from Dave Butenhof, "Avoid using forkin a threaded program (if you can) unless you intend to exec a new program immediately". Page 197 "Programming with POSIX Threads". Why that? Yes, you have to be carefull about open file descriptors and memory maps (and other IPC stuff), but it should work. Apache is successfully using a mixture of threads and processes.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320306335.77/warc/CC-MAIN-20220128182552-20220128212552-00321.warc.gz
CC-MAIN-2022-05
628
3
https://gov.1inch.io/t/adjust-positive-slippage-reclamation/2740
code
As we all know, the treasury has a flow of income from the positive slippage. This is great for the DAO, but unfortunately, it’s not good for traders. Users that have done large trades and lost a huge amount to this surplus. Weather this is intentional or unintentional, it can hurt the trader only benefiting the DAO. Either let users vote on how much should be taken or change it so we only get 50% taken like our competitors. That way when there are large trades that cause big positive slippage, the trader, and the DAO, are happy. Also, I apologize for the length of the article as I was thinking about it. If a trader is satisfied with the price of a trade, he or she may understand that not receiving the positive slippage is not considered a loss by the trader. The percentage of positive slippage returned to the trader and the percentage of and the number of users of 1inch exchange It is natural to assume that there is some correlation between the percentage of positive slippage returned to traders and the number of users of 1inch exchange, although the strength of this correlation is unknown. If we imagine that the number of users will increase when the percentage of returned pages is increased, there is a possibility that there will be a percentage that maximizes DAO’s profit in total. Whether that percentage is 50% or not, no one knows. I think it would be difficult to experiment with varying the percentage, considering the emotions of traders. They will be happy with the increased returns, but if it turns out to be a mistake for the DAO, will they be able to reverse it… What would happen to the feelings of traders if they had to reduce their returns once they had increased them? In a situation where there is a lack of data to support the argument, the possibility of gambling increases, but I am always reluctant to make a bet that might reduce my profits. The situation may change if I can find evidence that the probability of winning the bet is quite high. Interesting topic for sure. Essentially, the DAO would be giving up a % of their income stream and allowing traders to keep it instead. I really like @ma70_supra 's point that this might lead to an increase in revenue since more people would be incentivized to use the 1inch protocol (would like to see a breakdown of how the competitors deal with this). Maybe this feature is well suited to be added to the Aggregation Protocol’s Instant Governance UI? Stakers would be able to dynamically vote on a value ranging from 0% to 100% – it would just need be an additional widget on that UI. But back to ma70_supra’s point, we should try to put some numbers on how much extra protocol traffic we think this change would drive. If we were to vote and decide on percentages without control, it might be difficult to find the best percentages. The value that results from a vote is the value that most people who have the right to vote agree on, not necessarily the value that maximizes the benefit of the DAO. Just as an example, it would be interesting to vary the percentage for each trader based on the frequency of his or her trades. If the frequency of trading for the exchange as a whole is also correlated to the size of the slippage, it would be really interesting to factor this in as well. It would be better to take into account not only the frequency but also the volume of trades, because if you only take into account the frequency, you can cheat by increasing the number of trades with a small amount… Well, I think 50% would be o.k. The treasury collected 3 million USDC in 1 month. I believe 1.5 million in 1 month would be sufficient and might bring more traders in. Though I do think testing different percentages above 0 might be interesting. Either way, 100% of the surplus is more than the competitors. This might be an issue if the treasury funds start being used up all at once, like if someone decides to buy back and burn a large amount of token or if we use the treasury to give back to the community. I think 0% is too little. There might be problems with allowing people to vote. I think a lot of whales for the gas refunds will vote for 0% until that’s over. A vote above 25% is probably the limit I think would be okay. to continue this thread, maybe each individual volume could influence it rather than cumulatively decreasing for frequent users. For a large trade, the positive slippage might be less than 1% of the swap and wouldn’t matter much either way to the whale but for small trades, they could be a much larger percentage that’s bad for the user.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104675818.94/warc/CC-MAIN-20220706151618-20220706181618-00010.warc.gz
CC-MAIN-2022-27
4,595
26
https://bugzilla.redhat.com/show_bug.cgi?id=866929
code
Red Hat Bugzilla – Bug 866929 seamless migration: assert at destination side after migration Last modified: 2013-07-03 08:07:36 EDT Description of problem: qemu sometimes aborts after migration of Windows 7 guest, when the migration is executed during rebooting the guest. When executing migration, after the vm migration has completed, but before spice display channel migration completed (i.e., the server display channel hasn't yet received from the client the migration data required for restoring its state). If:(1) The qxl command ring is not empty, and (2) reset of qxl occurs, the destination qemu will abort due to assert(!spice_display_running || SPICE_RING_IS_EMPTY(&ram->cmd_ring)); (see the stack trace below) It is more easy to reproduce this over WAN, because then spice seamless migration data transfer takes longer, and also, the cmd ring is more likely to be occupied with commands. The origin of this bug can also cause other inconsistencies, when instead of reboot, there are resolution changes during migration. #0 0x00007ffff41ec285 in raise () from /lib64/libc.so.6 #1 0x00007ffff41edb9b in abort () from /lib64/libc.so.6 #2 0x00007ffff41e4e9e in __assert_fail_base () from /lib64/libc.so.6 #3 0x00007ffff41e4f42 in __assert_fail () from /lib64/libc.so.6 #4 0x0000000000593028 in qxl_check_state (d=<optimized out>) at /home/tlv/yhalperi/projects/redhat/qemu/hw/qxl.c:911 #5 qxl_check_state (d=<optimized out>) at /home/tlv/yhalperi/projects/redhat/qemu/hw/qxl.c:906 #6 0x0000000000593045 in qxl_reset_state (d=0x1557530) at /home/tlv/yhalperi/projects/redhat/qemu/hw/qxl.c:919 #7 0x0000000000594910 in qxl_hard_reset (d=0x1557530, loadvm=0) at /home/tlv/yhalperi/projects/redhat/qemu/hw/qxl.c:955 #8 0x000000000041253d in qemu_system_reset () at /home/tlv/yhalperi/projects/redhat/qemu/vl.c:3343 #9 0x0000000000430cc1 in qemu_kvm_system_reset () at /home/tlv/yhalperi/projects/redhat/qemu/qemu-kvm.c:1978 #10 kvm_main_loop () at /home/tlv/yhalperi/projects/redhat/qemu/qemu-kvm.c:2258 #11 0x000000000040c6aa in main_loop () at /home/tlv/yhalperi/projects/redhat/qemu/vl.c:4202 #12 main (argc=<optimized out>, argv=<optimized out>, envp=<optimized out>) at /home/tlv/yhalperi/projects/redhat/qemu/vl.c:6430 fixed it upstream Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886436.25/warc/CC-MAIN-20180116125134-20180116145134-00230.warc.gz
CC-MAIN-2018-05
2,540
32
https://discourse.llvm.org/t/rfc-incubator-project-for-llvm-ir-dataset-utils/74940
code
As part of our recent effort to build a large dataset of LLVM-IR for applications in machine learning, compiler testing, and more ([2309.15432] ComPile: A Large IR Dataset from Production Sources), we have created tooling to build large IR datasets from package indices and to process the resulting information. We’d be interested in moving this under the LLVM umbrella as an incubator project. Note that this effort is complementary to RFC: Upstreaming elements of the MLGO tooling as we utilize this tooling extensively. We believe this provides a couple key advantages to the community: - It makes it easier for other parties to contribute to the effort, especially those that restrict/require approval for general open source contributions, but might have an exception for contributing to LLVM. - Puts the tooling in an easily discoverable, centralized place where it complements the rest of LLVM well to aid in the previously mentioned efforts. We believe this project makes a lot of sense as a LLVM incubator project. Addressing the specific points listed in the developer policy for incubator projects: - Must be generally aligned with the mission of the LLVM project to advance compilers, languages, tools, runtimes, etc. - Our dataset tooling is tied to LLVM (it produces LLVM-IR after all) and it is closely associated with other upstream LLVM efforts like MLGO, ultimately aimed at enabling new efforts and enhancing existing ones within LLVM. - Must conform to the license, patent, and code of conduct policies laid out in this developer policy document. - Llvm-ir-dataset-utils will be upstreamed under the Apache 2.0 License with LLVM Exceptions and we generally intend to follow all upstream LLVM procedures. - Must have a documented charter and development plan, e.g. in the form of a README file, mission statement, and/or manifesto. - We currently have a basic README, but can write up a more formal mission/milestones as the community deems necessary. - Should conform to coding standards, incremental development process, and other expectations. - Currently llvm-ir-dataset-utils is lacking somewhat in this department. The tooling currently works at a large scale, but there’s still a lot of work to be done to improve the code quality and make elements more robust. Our current plan is to work on improving test coverage and better take advantage of utilities like static type analysis incrementally. We believe the necessary adjustments could be made within an incubator repository. - Should have a sense of the community that it hopes to eventually foster, and there should be interest from members with different affiliations / organizations. - We’re currently focused on enabling a variety of projects more focused on the research end of things, but we have a large degree of interest from multiple parties. The team behind this project was a cross-institutional collaboration including people from Google, LLNL, ANL, and multiple universities. We’ve received a lot of interest already from other universities and companies. - Should have a feasible path to eventually graduate as a dedicated top-level or sub-project within the LLVM monorepo. - We are not sure of a concrete timeline for this, but our plan would be to upstream the project or essential pieces of it to somewhere in the monorepo after code quality issues have been cleaned up and the community is interested in it being upstreamed. We would either do it as a full top-level project or put it under llvm/util. - Should include a notice (e.g. in the project README or web page) that the project is in ‘incubation status’ and is not included in LLVM releases (see suggested wording below). - Easily doable and will be done pending this RFC when the time comes to actually move things. We’re interested in seeing what the broader LLVM community thinks about this proposal and looking forward to future collaboration to enable more efforts towards large scale compiler testing and machine learning in compilers. The code is available to view as a top-level project at [Dataset] Upstream llvm-ir-dataset-utils by boomanaiden154 · Pull Request #72320 · llvm/llvm-project · GitHub although it would end up in an incubator repository pending acceptance of this RFC.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.2/warc/CC-MAIN-20231205140836-20231205170836-00493.warc.gz
CC-MAIN-2023-50
4,266
20
https://primavera-project.com/2021/12/08/paper-by-primavera-researchers-at-aaai-2022/
code
A paper co-authored by PrimaVera researchers Thom Badings, Dr. Nils Jansen, and Prof. Marielle Stoelinga has been accepted at the prestigious AAAI Conference on Artificial Intelligence. In this paper, our researchers propose a novel method for safe and robust control of autonomous systems that act in uncertain environments. For example, a drone must deliver a package in a certain goal region without crashing into obstacles, but its position may be affected by wind gusts, which are uncertain. With the proposed method, we can compute controllers for such systems, which guarantee that the probability to satisfy the objective is above a pre-defined performance threshold. Notably, our researchers show that such safe controllers can be computed, even if the characteristics of the uncertainty are unknown. The latest version of the full article is available here!
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510994.61/warc/CC-MAIN-20231002100910-20231002130910-00275.warc.gz
CC-MAIN-2023-40
867
3
https://admhelp.microfocus.com/alm/api_refs/ota/Content/ota/topic6168.html
code
|Assigns a test to cover this requirement. |Adds the tests from the specified subject that match the input filter to the list of tests that cover the current requirement. |Assigns all the tests in the specified subject folder to cover this current requirement. |Gets a list of the tests that cover this requirement. |Gets the list of all tests that cover the current requirement and match the filter. |Locks the object. Returns True if the object has been changed on the server. |Mails the IBaseFieldExMail field item. |Moves a requirement to being a child of a specified father in the requirements tree. |Posts all changed values into database. |Reads saved values, overwriting values in memory. |Removes a test from the list of tests that cover this requirement. |Undoes changes to field values that have not been posted. |Unlocks the object. |The Attachment factory for the object. |The name of the requirement author. |If true, the database is updated immediately when the field value changes. |The comment associated with this requirement. |The number of direct children. |The value of the specified field. |Checks if the object has one or more attachments. |The requirement is covered by at least one test. |The item ID. |No longer in use. |Checks if object is locked for editing. |Checks if the item has been modified since last refresh or post operation. If true, the field properties on the server side are not up to date. |The Requirement name as seen in the tree. |The paragraph number or numeration of the requirement. |The path of the node containing this requirement. |The requirement priority. |The product name for which the requirement is set. |The review status. |The status of the tests that cover this requirement. |The name of the requirement type. |Checks if this is a virtual item, that is, an item that does not have a corresponding database record.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474948.91/warc/CC-MAIN-20240301030138-20240301060138-00613.warc.gz
CC-MAIN-2024-10
1,873
34
http://www.cadviet.com/forum/topic/2317-total-commander-version-7-02a/
code
chương quán lý là duyệt dự liệu tuyệt hảo. Features in Total Commander 7.02a now include : * Two file windows side by side * Multiple language support * Enhanced search function * Compare files (now with editor) / synchronize directories * Quick View panel with bitmap display * ZIP, ARJ, LZH, RAR, UC2, TAR, GZ, CAB, ACE archive handling + plugins * Built-in FTP client with FXP (server to server) and HTTP proxy support * Parallel port link, multi-rename tool * Tabbed interface, regular expressions, history+favorites buttons * Thumbnails view, custom columns, enhanced search * New: Updated interface+icons, compare editor, cursor in lister, separate trees, logging, enhanced overwrite dialog etc. * And many more!
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424287.86/warc/CC-MAIN-20170723062646-20170723082646-00213.warc.gz
CC-MAIN-2017-30
733
14
https://customessaycheap18.com/2021/06/01/how-to-solve-linear-programming-problem_rk/
code
A college persuasive essay topics mixed integer linear programming problem example. in this problem, since we have to calculate how many calculators of step 2: i am solving the mla format research paper example following linear programming problem, i am guiding myself on independent reading assignment the is a thesis a question or statement documentation documentation how to write a literature review outline matlab every time i execute i what is useful about writing a personal statement get the following literary analysis essay thesis error. the problems that can be solved how to solve linear programming problem using the how to solve linear programming problem linear programming model can be broadly classified into the following types: reeb and s. 3. question how to write a for dummies book 2: formulation of linear programming problem | how to solve mixed numerical of llp|part 4| b. in how to solve linear programming problem this toy example, the second constraint tells me that x1 <= -1, that is, x1 must be negative, so the minimum value of x1 should be negative. excel has an add-in called the solver which can be used how to solve linear programming problem to solve systems buy term papers essays of equations or inequalities. what ’ s so special. i am solving the following problem of linear programming using the linprog function %objective function %x1 x2 x3 x4 x5 x6 x7 x8 x9 x10 x11 x12 x13 x14 x15 x16 x17 x18 f = [0.669 0.654 0.503 0.683 0.670 0.673 0.749 0.655 0.660 0.583 1.243 0.639 2.024 2.156 1.672 0.473 0.139 0.687]; a internship essay format = ; b = ; %sin restricciones de desigualdad %restricciones de igualdad son: simplex method:.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487582767.0/warc/CC-MAIN-20210612103920-20210612133920-00424.warc.gz
CC-MAIN-2021-25
1,671
1
https://github.com/associatedpress/datakit-project
code
Some highlights include the ability to: - Install templates from local Git repos or from Github - Interactively select a template when creating new projects - List locally installed templates - Check whether templates are out-of-date - Update templates The Associated Press Data Team relies on this plugin because it fits nicely into a broader data science workflow built around datakit. It's worth noting that Cookiecutter's command-line tool offers some of these features, and its developers are working to add others. Additionally, we primarily support Git-based templates, whereas Cookiecutter also works with mercurial repositories. Please be sure to check out the latest release of Cookiecutter to see if it might be a better fit.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703538741.56/warc/CC-MAIN-20210123222657-20210124012657-00765.warc.gz
CC-MAIN-2021-04
736
9
https://wiki.haskell.org/index.php?title=Research_papers/Data_structures&direction=prev&oldid=37504
code
Research papers/Data structures < Research papers Revision as of 06:45, 21 September 2010 by EugeneKirpichov (Fixed several broken links) - Functional pearl: Trouble shared is trouble halved - Richard Bird and Ralf Hinze. In Johan Jeuring, editor, Proceedings of the ACM SIGPLAN 2003 Haskell Workshop, Uppsala, Sweden, August 28, 2003, pp 1-6. - Manufacturing datatypes - Ralf Hinze. In Chris Okasaki, editor, Proceedings of the Workshop on Algorithmic Aspects of Advanced Programming Languages, WAAAPL'99, Paris, France, September 1999, pp. 1-16. - Designing Data Structures Alternative Link - A. Reid, Proceedings of the 1989 Glasgow Functional Programming Workshop, Workshops in Computing series, Springer Verlag, pp 170-181, 1989. - Google's MapReduce Programming Model -- Revisited - Ralf Lämmel, Draft; Online since 2 January, 2006; 26 pages - A probabilistic approach to the problem of automatic selection of data representations - Tyng-Ruey Chuang and Wen L. Hwang, In Proceedings of the 1996 ACM SIGPLAN International Conference on Functional Programming, pages 190-200. Philadephia, Pennsylvania, USA, May 1996. - An Overview of Edison - Chris Okasaki. Haskell Workshop 2000. September 2000 - Benchmarking Purely Functional Data Structures - Graeme E. Moss. PhD. Thesis. York University. YCST-2000-01. July 1999. See also papers on list fusion - The concatenate vanishes - Philip Wadler. Note. December 1987 - Purely Functional Random-Access Lists - Chris Okasaki. Functional Programming Languages and Computer Architecture, June 1995, pages 86-95. - Polymorphic string matching - Richard S. Bird. Proceedings of the 2005 ACM SIGPLAN workshop on Haskell, Tallinn, Estonia. 110 - 115, 2005 ISBN 1-59593-071-X - The Under-Appreciated Unfold - Jeremy Gibbons and Geraint Jones, Proceedings 3rd ACM SIGPLAN Int. Conf. on Functional Programming, ICFP'98, 34(1), ACM Press, New York, 273--279, 1998 - When is a function a fold or an unfold? - Jeremy Gibbons, Graham Hutton and Thorsten Altenkirch (2001). In Coalgebraic Methods in Computer Science, April 2001 (Volume 44.1 of Electronic Notes in Theoretical Computer Science). - Program optimisation, naturally - Richard Bird, Jeremy Gibbons, and Geraint Jones. In J. W. Davies, A. W. Roscoe, and J. C. P. Woodcock, editors, Millenial Perspectives in Computer Science. Palgrave, 2000. - Concatenate, Reverse and Map Vanish For Free - Janis Voigtländer, International Conference on Functional Programming, Proceedings, vol. 37(9) of SIGPLAN Notices, pp. 14-25, ACM Press, 2002. - Enumerating the rationals - Jeremy Gibbons, David Lester, and Richard Bird. Journal of Functional Programming, 16(3):281-292, 2004. - An Approach to Fast Arrays in Haskell - Manuel M. T. Chakravarty and Gabriele Keller. In Johan Jeuring and Simon Peyton Jones, editors, lecture notes for The Summer School and Workshop on Advanced Functional Programming 2002. LNCS 2638, Springer-Verlag, pages 27-58, 2003. - Functional Array Fusion - Manuel M. T. Chakravarty and Gabriele Keller. In Xavier Leroy, editor, Proceedings of the Sixth ACM SIGPLAN International Conference on Functional Programming, ACM Press, pp205-216, 2001. - Bootstrapping One-sided Flexible Arrays - Ralf Hinze. In Simon Peyton Jones, editor, Proceedings of the 2002 International Conference on Functional Programming, Pittsburgh, PA, USA, October 4-6, 2002, pp. 2-13. - Numerical Representations as Higher-Order Nested Datatypes - Ralf Hinze. Technical Report IAI-TR-98-12, Institut fr Informatik III, Universitt Bonn, December 1998. - A new array operation - Philip Wadler. Proceedings of the Workshop on Graph Reduction, Santa Fe, New Mexico, J. Fasel and R. Keller, editors, Springer-Verlag, October 1986. - A randomized implementation of multiple functional arrays - Tyng-Ruey Chuang, In Proceedings of the 1994 ACM Conference on Lisp and Functional Programming, pages 173-184. Orlando, Florida, USA, June 1994. - Rewriting Haskell Strings - Duncan Coutts, Don Stewart and Roman Leshchinskiy. PADL 2007. - Constructing red-black trees - Ralf Hinze. In Chris Okasaki, editor, Proceedings of the Workshop on Algorithmic Aspects of Advanced Programming Languages, WAAAPL'99, Paris, France, September 1999, pp. 89-99. The proceedings appear as a technical report of Columbia University, CUCS-023-99. - Perfect trees and bit-reversal permutations - Ralf Hinze. Technical Report IAI-TR-99-4, Institut fr Informatik III, Universitt Bonn, March 1999. - Functional Pearl: A fresh look at binary search trees - Ralf Hinze. Journal of Functional Programming. 2001 - Upwards and Downwards Accumulations on Trees - Jeremy Gibbons (1993). In LNCS 669: Mathematics of Program Construction, ed. R. S. Bird, C. C. Morgan and J. C. P. Woodcock, Springer-Verlag, p. 122-138. Revised version appears in Proceedings of the Massey Functional Programming Workshop, ed. E. Ireland and N. Perry, 1992. - Efficient Parallel Algorithms for Tree Accumulations - Jeremy Gibbons, Wentong Cai and David Skillicorn (1994). Science of Computer Programming 23 p1-18. - Linear-Time Breadth-First Tree Algorithms: An Exercise in the Arithmetic of Folds and Zips - Geraint Jones and Jeremy Gibbons (1993). University of Auckland Computer Science Report No. 71, and IFIP Working Group 2.1 working paper 705 WIN-2. - Polytypic Downwards Accumulations - Jeremy Gibbons (1998). In LNCS 1422, Proceedings of Mathematics of Program Construction, Marstrand, Sweden, June 1998. - Diets for Fat Sets - Martin Erwig. Journal of Functional Programming, Vol. 8, No. 6, 627-632, 1998. - Asymptotic Improvement of Computations over Free Monads - Janis Voigtländer. Mathematics of Program Construction (MPC'08), Proceedings, LNCS 5133:388-403, Springer-Verlag, 2008. - Fast Mergeable Integer Maps - Chris Okasaki and Andy Gill, Workshop on ML, September 1998, pages 77-86. - Generalizing Generalized Tries - Ralf Hinze. Technical Report IAI-TR-98-11, Institut fr Informatik III, Universitt Bonn, November 1998. - A Simple Implementation Technique for Priority Search Queues - Ralf Hinze. In Xavier Leroy, editor, Proceedings of the 2001 International Conference on Functional Programming, Firenze, Italy, September 3-5, 2001. - Simple and Efficient Purely Functional Queues and Deques - Chris Okasaki. Journal of Functional Programming, 5(4):583-592, October 1995. - Optimal Purely Functional Priority Queues - Gerth Stlting Brodal and Chris Okasaki, Journal of Functional Programming, 6(6), December 1996. - Functional Pearl: Explaining binomial heaps - Ralf Hinze. Journal of Functional Programming. 9(1). January 1999. - Structuring Depth First Search Algorithms in Haskell - David King and John Launchbury. Proc. ACM Principles of Programming Languages, San Francisco, 1995. - Graph Algorithms with a Functional Flavour - John Launchbury, Advanced Functional Programming, First International Spring School on Advanced Functional Programming Techniques, Bastad, Sweden, LNCS 925,p. 308-331, 1995 (editors: J. Jeuring, E. Meijer). - Inductive Graphs and Functional Graph Algorithms - Martin Erwig, Journal of Functional Programming Vol. 11, No. 5, 467-492, 2001 - Random Access to Abstract Data Types - Martin Erwig. 8th Int. Conf. on Algebraic Methodology and Software Technology (AMAST 2000), LNCS 1816 , 135-149, 2000 - Fully Persistent Graphs - Which One to Choose? - Martin Erwig. 9th Int. Workshop on Implementation of Functional Languages (IFL'97), LNCS 1467, 123-140, 1997 - Functional Programming with Graphs - Martin Erwig. 2nd ACM SIGPLAN Int. Conf. on Functional Programming (ICFP'97), 52-65, 1997 - Bulk types with class - SL Peyton Jones, Electronic proceedings of the 1996 Glasgow Functional Programming Workshop, Ullapool, July 1996. - Strongly typed heterogeneous collections - Oleg Kiselyov, Ralf Lämmel, and Keean Schupke. Haskell '04: Proceedings of the ACM SIGPLAN workshop on Haskell, Snowbird, Utah, USA, 96--107, 2004 - Sparse matrix representations in a functional language - P.W. Grant, J.A. Sharp, M.F. Webster and X. Zhang, Journal of Functional Programming, 6(1):143-170, January 1996. - Heap Compression and Binary I/O in Haskell - Malcolm Wallace and Colin Runciman, Proceedings of the 2nd ACM Haskell Workshop, Amsterdam, the Netherlands, June 1997. - The Bits Between The Lambdas: Binary Data in a Lazy Functional Language - Malcolm Wallace and Colin Runciman. proceedings of the International Symposium on Memory Management, Vancouver, Canada, Oct 1998. - Finger Trees: A Simple General-purpose Data Structure - Ralf Hinze and Ross Paterson, Journal of Functional Programming - De Bruijn Notation as a Nested Datatype - Richard Bird and Ross Paterson. Journal of Functional Programming, vol. 9(1), pp. 77-91, 1999. - Generalised Folds for Nested Datatypes - Richard Bird and Ross Paterson, Formal Aspects of Computing, vol. 11(2), pp. 200-222, 1999. - Polytypic Functions Over Nested Datatypes - Ralf Hinze. In Rafael Dueire Lins, editor, 3rd Latin-American Conference on Functional Programming (CLaPF'99), March 1999. - Disciplined, efficient, generalised folds for nested datatypes - Clare Martin, Jeremy Gibbons and Ian Bayley (2004). Formal Aspects of Computing 16(1):19-35, 2004. - Nested Datatypes - Lambert Meertens and Richard Bird. Mathematics of Program Construction, MPC'98 (Johan Jeuring, editor), LNCS 1422, pp. 52--67, 1998. - Representing cyclic structures as nested datatypes - N. Ghani, M. Hamana, T. Uustalu, V. Vene. In H. Nilsson, ed., Proc. of 7th Symp. on Trends in Functional Programming, TFP 2006 (Nottingham, Apr. 2006), pp. 173-188. Univ. of Nottingham, 2006. - Iteration schemes for higher-order and nested datatypes - A. Abel, R. Matthes, T. Uustalu. Theor. Comput. Sci., v. 333, n. 1-2, pp. 3-66, 2005. - ( Elsevier Science) // Conf. version Generalized iteration and coiteration for higher-order nested datatypes in A. D. Gordon, ed., Proc. of 6th Int. Conf. on Foundations of Software Science and Computation Structures, FoSSaCS 2003 (Warsaw, Apr. 2003), v. 2620 of Lect. Notes in Comput. Sci., pp. 54-69. Springer-Verlag, 2003. Systems-level Data Structures - Strongly Typed Memory Areas -- Programming Systems-Level Data Structures in a Functional Language - Iavor S. Diatchki (OGI) and Mark P. Jones (Portland State University), Haskell Workshop 2006 - Probabilistic Functional Programming in Haskell - Martin Erwig and Steve Kollmansberger. Journal of Functional Programming, Vol. 16, No. 1, 21-34, 2006 See also Research papers/Generics
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662595559.80/warc/CC-MAIN-20220526004200-20220526034200-00213.warc.gz
CC-MAIN-2022-21
10,465
122
https://blogs.gentoo.org/mgorny/2016/06/
code
In my previous post I have described a number of pitfalls regarding Gentoo dependency specifications. However, I have missed a minor point of correctness of various dependency types in specific dependency classes. I am going to address this in this short post. There are three classes of dependencies in Gentoo: build-time dependencies that are installed before the source build happens, runtime dependencies that should be installed before the package is installed to the live system and ‘post’ dependencies which are pretty much runtime dependencies whose install can be delayed if necessary to avoid dependency loops. Now, there are some fun relationships between dependency classes and dependency types. Continue reading “Dependency classes and allowed dependency types” During my work on Gentoo, I have seen many types of dependency pitfalls that developers fell in. Sad to say, their number is increasing with new EAPI features — we are constantly increasing new ways into failures rather than working on simplifying things. I can’t say the learning curve is getting much steeper but it is considerably easier to make a mistake. In this article, I would like to point out a few common misunderstandings and pitfalls regarding slots, slot operators and any-of (|| ()) deps. All of those constructs are used to express dependencies that can be usually be satisfied by multiple packages or package versions that can be installed in parallel, and missing this point is often the cause of trouble. Continue reading “Dependency pitfalls regarding slots, slot ops and any-of deps” Since GLEP 67 was approved, bug assignment became easier. However, there were still many metadata.xml files which made this suboptimal. Today, I have fixed most of them and I would like to provide this short guide on how to write good metadata.xml files. Continue reading “On good metadata.xml maintainer descriptions” Since time does not permit me to write in more extent, just a short note: yesterday, I have published a Gentoo Bugzilla bug assignment UserJS. When enabled, it automatically tries to find package names in bug summary, fetches maintainers for them (from packages.g.o) and displays them in a table with quick assignment/CC checkboxes. Note that it’s still early work. If you find any bugs, please let me know. Patches will be welcome too. And some redesign, since it looks pretty bad, standard Bugzilla style applied to plain HTML. Update: now on GitHub as bug-assign-user-js
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818105.48/warc/CC-MAIN-20240422082202-20240422112202-00700.warc.gz
CC-MAIN-2024-18
2,494
11
https://github.com/softerhardware/Hermes-Lite2/wiki
code
Join GitHub today GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.Sign up Clone this wiki locally Hermes-Lite 2.x Wiki This Wiki is for community documentation of the Hermes-Lite 2.x. See the main Hermes-Lite Web Page for the latest links and details. The Community Projects page links to other Hermes-Lite 2.x related work. The Releases page contains information regarding the various Hermes-Lite 2 releases and how to realize your own Hermes-Lite 2. The Hermes-Lite Test page describes how to program and test a Hermes-Lite 2.0 with only a Raspberry Pi and Ohm meter. The Build Notes are instructions to help with hardware bring-up and final assembly of the Hermes-Lite 2beta3. The Receiver Simulation shows simulation results for various receive stages in the FPGA firmware. The Performance Tests page shares measurements of the Hermes-Lite 2 RX and TX performance.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676594675.66/warc/CC-MAIN-20180722233159-20180723013159-00635.warc.gz
CC-MAIN-2018-30
952
11
http://www.indiaparinam.com/css-question-answer-css-interview-questions/set-5/page2
code
Question 11 : Which font names are available on all platforms ? The simple answer is "None" which is why CSS offers five generic font names as 'serif', 'sans-serif', 'cursive', 'fantasy' and 'monospace'. Never put any of these generic font names in quotes. A CSS aware browser should make a suitable choice from the available fonts in response to each of those generic names. Specifying any other font name in a www environment comes out as a suggestion only, that may or may not be acknowledged by a browser. The problem with using names of specific fonts is that there is little point in naming fonts that few users will have, so you're down to listing a few mass-market font names. This will then override any superior selection that a minority of discerning readers may have made for themselves. Note also that fonts may differ in their character repertoire, but this is often not evident from the font name itself: by selecting an inappropriate font name, you might prevent internationalized content from displaying correctly for a proportion of users. Question 12 : What is Extensible Stylesheet Language (XSL)? XSL is a proposed styling language for formatting XML (eXtensible Markup Language) documents. The proposal was submitted to the W3C by Microsoft, Inso, and ArborText. Question 13 : Document Style Semantics and Specification Language (DSSSL)? Document Style Semantics and Specification Language is an international standard, an expression language, a styling language for associating processing (formatting and transformation) with SGML documents, for example XML. Question 14 : How do I place two paragraphs next to each other? There are several ways to accomplish this effect, although each has its own benefits and drawbacks. We start with the simplest method of positioning two paragraphs next to each other. <DIV style="float: left; width: 50%">Paragraph 1</DIV> <DIV style="float: left; width: 50%">Paragraph 2</DIV> Trickier is this example, which relies on positioning but does not suffer the vertical-overlap problems which plague many other positioning solutions. The problem is that it relies on an incorrect positioning implementation, and will break down dramatically in conformant browsers. <SPAN STYLE="position: relative; left: 50%; width: 50%"> <SPAN STYLE="position: absolute; left: -100%; width: 100%"> If floating is not sufficient to your purposes, or you cannot accept display variances in older browsers, then it may be best to fall back to table-based solutions. Question 15 : I want my page fonts to look the same everywhere as in… a) Why are my font sizes different in different browsers ? b) Why are my font sizes different on different platforms ? These questions represent the tip of the iceberg of a large topic about which whole essays have been written and a wide range of different views are held. The WWW was originally devised to present the same content in different presentation situations and for a wide range of readers: on that basis, "looking the same" is not a design criterion, indeed different presentations would be expected to look different. Some would have it that this original aim is no longer relevant, and that the purpose of web design is now to factor out the differences between display situations and put the author in control of the details of the presentation. Others point out that CSS was designed to give the reader a substantial amount of joint control over this process, and that this is desirable, for example to accommodate users with different visual acuity. Reading of textual matter on a computer screen is quite a delicate business, what with the relatively coarse pixel structure of a computer display; even with a close knowledge of the display details, it isn't possible to achieve the detailed control that would be possible, say, on a printer. Whatever one's aims, the practical truth is that many of the efforts made to guarantee the precise result on the screen have seriously counterproductive side effects in a www situation. The CSS specifications themselves recommend that authors should not use absolute size units in a situation where the properties of the display are unknown. There's a lot to be said for flexible design, that in an appropriate situation looks the way you had in mind, but still successfully conveys content and message in a wide range of other browsing situations. And so, before looking at the technical detail of what can be specified, it's strongly suggested that you read some of those essays on web design, and reach your own conclusions as to the strengths and weaknesses of the medium, and how you can best exploit the strengths in a web environment, without falling foul of the weaknesses.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201707.53/warc/CC-MAIN-20190318211849-20190318233849-00539.warc.gz
CC-MAIN-2019-13
4,718
32
https://mail.python.org/pipermail/python-list/2015-September/697298.html
code
Learning Modules, Arguments, Parameters (imma noob) alister.nospam.ware at ntlworld.com Fri Sep 25 12:42:59 CEST 2015 On Thu, 24 Sep 2015 11:45:06 -0700, codywcox wrote: > I seem to be having a problem understanding how arguments and parameters > work, Most likely why my code will not run. > Can anyone elaborate on what I am doing wrong? > Cody Cox 9/16/2015 Programming Exercise 1 - Kilometer Converter Design a > modular program that asks the user to enter a distance in kilometers and > then convert it to miles Miles = Kilometers * 0.6214 ''' > def main(): > def get_input(kilo): > kilo = float(input('Enter Kilometers: ')) > return kilo > def convert_kilo(kilo,miles): > miles = float(kilo * 0.6214) > print( kilo,' kilometers converts to ',miles,' miles') clearly a homework exercise but you have asked for help in understanding & not just for a solution which is good. as others have pointed out you are throwing away the data returned from I would also suggest that you return the result form convert_kilo instead of printing it in the function & print it in the main loop instead. it does not matter for this trivial assignment but as you progress further you will discovery it is better to keep output seperated from the main logic of the program. What is mind? No matter. What is matter? Never mind. -- Thomas Hewitt Key, 1799-1875 More information about the Python-list
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027330968.54/warc/CC-MAIN-20190826042816-20190826064816-00237.warc.gz
CC-MAIN-2019-35
1,383
28
http://osdir.com/apache-cloudstack-development/msg07247.html
code
There are some simple problems with the documentation. Some of these have been raised in the past but never fixed. http://docs.cloudstack.apache.org/en/latest/concepts.html ; is the first technical page that a new user will read. At the top of the page under Concepts and Terminology there is a sentence that looks out of place. "Primary storage is associated with a cluster" *DIAGRAMS too simple and possibly wrong The diagrams for Zones, Pods,Clusters should show at least 2 of the next lower level. The diagram for Regions looks much clearer as it show 3 zones that make up the Region. The Pod diagram looks like the Primary storage is inside the Cluster which is different from what the text says. "A pod consists of one or more clusters of hosts and one or more primary storage servers" *Clusters must have identical hardware* The text says "The hosts in a cluster all have identical hardware, run the same hypervisor, are on the same subnet, and access the same shared primary storage." Is it true that the hardware must be "identical".That seems to an overstatement of the requirement. *Redundant t**ext**in Cluster* This sentence should be removed. It is clear from the whole discussion of the hierarchy. "A cluster is the fourth-largest organizational unit within a CloudStack deployment. Clusters are contained within pods, and pods are contained " Size of the cluster is limited by the underlying hypervisor, although the CloudStack recommends less in most cases; see Best Practices." What doe this actually mean? Is it true? Would an example make it clearer? The hyperlink to Best Practices is missing. The description says * May reside in multiple data centers across different geographic location This contradicts previous statements that hosts exist inside clusters which are inside pods and zones which can only be in one datacenter. This section also says that host in a cluster must be homogeneous which is different from identical but in no place is either identical or homogeneous ever defined and these are not commonly used in Computer Science with the definitions which I think are meant here. **Primary Storage section contradicts Pod definitions and the entire The Pod section says that a pod consists of clusters and primary storage. This section says that Primary storage is "associated" with a cluster not a pod. It then goes on to recommend that Primary storage should be at the Zone Can someone make up a consistent definition of the relationship of Primary Storage to the rest of the structures and fix the diagrams to match the actual reality. *Redundant Network Traffic Type definitions* Not sure why the definitions are associated with both Basic and Advanced Network Traffic Types. The definitions appear to be the same and the fact that they appear twice is confusing. *Basic Zone Network Traffic Type only requires Guest Network** *The description of Basic Zone Network configuration says that you only need to define a Guest network. It makes no comments about the other *Accounts and Customers never defined* In the discussion about Advanced Zone Guest IP Addresses, the concept of Accounts is used with no definition of what accounts. There is also a mention of "Customers" without any description of what "Customers" means in a Cloudstack context. **General Comment on exceptions *My personal view is that there are too many references to specific product exceptions. These add too many confusing and conflicting**ideas for an introductory article. This is supposed to be an introduction to the concepts and terminology that will be used in the rest of the Artifact Software Inc phone: 866-970-2435, ext 102
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202299.16/warc/CC-MAIN-20190320044358-20190320070358-00441.warc.gz
CC-MAIN-2019-13
3,648
63
http://manpages.ubuntu.com/manpages/intrepid/man7/STORE_TRIGGER.7.html
code
Provided by: slony1-doc_1.2.14-1ubuntu1_all STORE TRIGGER - Indicate that a trigger should not be disabled by Slony-I on a subscriber node STORE TRIGGER (options); By default, all user defined triggers and constraints are disabled on all subscriber nodes while a table is replicated. This command can be used to explicitly exclude a trigger from being disabled. TABLE ID = ival The unique, numeric ID number of the table the trigger is TRIGGER NAME = ’string’ The name of the trigger as it appears in the pg_trigger system EVENT NODE = ival (Optional) The ID of the node used to create the configuration event that tells all existing nodes about the special trigger. Default value is 1. This uses “schemadocstoretrigger( integer, name )” [not available as a STORE TRIGGER ( TABLE ID = 2, TRIGGER NAME = ’cache_invalidation’ This operation will need to acquire an exclusive lock on the specified table on each node to which it applies in order to alter table schemas to add back the trigger. This command was introduced in Slony-I 1.0 19 September 2008 STORE TRIGGER(7)
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737935292.75/warc/CC-MAIN-20151001221855-00187-ip-10-137-6-227.ec2.internal.warc.gz
CC-MAIN-2015-40
1,080
24