url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://www.illumos.org/issues/5384?tab=notes
|
code
|
pvn_getpages may assert in valid scenarios
The assertion tries to ensure that the page list is large enough for the result. However, it fails to take into consideration that the page list is optional - and that it that case the page list size will be less than the expected length.
> ::status debugging crash dump vmcore.0 (64-bit) from osiris operating system: 5.11 pvn-getpages (i86pc) image uuid: 52104cf6-9217-ce01-ef62-b2599905c0d0 panic message: assertion failed: plsz >= len, file: ../../common/vm/vm_pvn.c, line: 1118 dump content: kernel pages only > $c vpanic() 0xfffffffffbdf23c8() pvn_getpages+0x1f5(fffffffff79e9460, ffffff05b3738f00, 0, 1000, 0, 0) tmp_getpage+0x1a8(ffffff05b3738f00, 0, 1000, 0, 0, 0) fop_getpage+0x7e(ffffff05b3738f00, 0, 1000, 0, 0, 0) segvn_faulta+0x17c(ffffff053e44d780, 8050000) as_faulta+0x143(ffffff0b54055800, 8050000, 23f8) memcntl+0x53d(8050000, 23f8, 4, 3, 0, 0) sys_syscall32+0x1f7()
The 5th and 6th args to tmp_getpage are both 0s - IOW, pl NULL, plsz 0. This is valid.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780055684.76/warc/CC-MAIN-20210917151054-20210917181054-00126.warc.gz
|
CC-MAIN-2021-39
| 1,014
| 4
|
https://aws-labs.com/automating-a-daily-rsync-backup/
|
code
|
Automating tasks relieves a lot of the repetitive nature from the role of a sysadmin.
The tasks are still important but automation can leave you time to concentrate on other, more dynamic, tasks.
The base of the automatic rsync is a very simple bash script.
It contains just 4 lines which will create seven daily folders on your backup machine (Monday – Sunday), log into the Cloud Server you want to backup and download the files and folders into the predefined location.
On the backup machine, create a file called ‘backup’. In this case I have placed it in my home ‘bin’ directory:
Once done, add the following:
#!/bin/bash dest=/backup/demo/`date +%A` mkdir -p $dest rsync -e 'ssh -p 30000' -avl --delete --stats --progress [email protected]:/home/demo $dest/
Short and sweet, but let’s go through it and see what we did:
The first line turns the file into a bash script. Without this line, nothing would occur as the machine would not know what to do with the contents.
The second line defines the variable ‘dest’. It starts with the backup path as ‘backup/demo/’ and then adds the day. So, if you ran this on a Monday, the ‘dest’ variable would be ‘/backup/demo/Monday’.
Do note that backticks (`) are used in the variable and not single quotes (‘).
The third line creates the destination directory as defined above. It used the ‘-p’ option to create recursive directories if they do not exist. So if the script was run on a Friday, it would create ‘/backup/demo/Friday’.
Which brings us nicely to the final line which is the rsync command. Simply place whatever rsync options you want here as they will be called when the script is run.
Note the use of the ‘$dest’ variable. The downloads will be placed in the ‘$dest’ directory.
Adjust the path and name to the file you created above, but that’s all you need to do.
Final task is to create a cron job which will run the backup script at specified times.
I’m not going to go into details of cron here (I’ll do a separate article for that) but feel free to search the Interweb if you want to adjust the times I show below.
As the normal user (we don’t need root privileges for this) enter:
Now add the following:
# run rsync at 23.55hrs every day 55 23 * * * sh /home/backup/bin/backup
A very simple command which you can embellish by adding an email address so the results can be sent to you and so on. I’ll explain more about cron tasks in another article.
Basically, each day at 23.55hrs it runs the script we created earlier. Depending on how you have setup your Slice, you may get internal mail regarding the output.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100276.12/warc/CC-MAIN-20231201053039-20231201083039-00555.warc.gz
|
CC-MAIN-2023-50
| 2,633
| 22
|
https://support.platmart.io/article/15-how-to-add-app-block-to-theme
|
code
|
How to add OS 2.0 app block to theme?
- Go into "Settings".
- Under "Installation" section choose your Online Store 2.0 theme.
- Click on "Add app block to theme" button.
- In theme editor click "Add block" button.
- Choose "Product colors" app block from the list.
- Place it to the desired place using handle icon on the right side. We recommend putting it below product price.
- Make sure it looks good in preview and hit "Save".
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337287.87/warc/CC-MAIN-20221002052710-20221002082710-00003.warc.gz
|
CC-MAIN-2022-40
| 432
| 8
|
https://space.meta.stackexchange.com/questions/1212/who-moved-my-parent-site-from-space-se-to-another-site
|
code
|
I thought I was the only one able to do this? Someone moved me from Here to Physics.SE where I was suspended preventing me from chatting here and everywhere for a year. This is not right?? Can you as a moderator make it possible for me to chat here at least. It happened when I was chatting on Physics.SE.
Who moved my parent site from Space.SE to another site?
I did (mod on Quantum Computing SE).
I thought I was the only one able to do this?
No, all chat moderators can re-parent users.
Someone moved me from Here to Physics.SE where I was suspended preventing me from chatting here and everywhere for a year. This is not right?
If your chat parent was Physics SE you would have been automatically suspended from all chat rooms on the Chat Stack Exchange server. It shouldn't be a matter of luck that one user gets suspended from chat just because their chat parent happened to be the same as the main site they got suspended on while another user gets to use all the chat rooms freely just because they happened to have a different chat parent. C.f. Shog9's answer here.
You were told that you shouldn't be chatting on Physics SE chat while you were suspended on the Physics SE main site. Since you didn't seem to get the point and continued to chat there, I reparented your chat account manually. You're currently suspended on three sites on the network (namely Electrical Engineering, Engineering and Physics) and have a history of not listening to instructions. You should realize that dealing with repeated behavior of this kind is aggravating for the moderation team. The clear point here is: don't try to use chat to circumvent main site suspensions. Avoid those chat rooms which are hosted on sites where your main account is suspended, during the period of the suspension.
Nevertheless, I am willing to give you another chance and have lifted your one-year suspension. Please keep the above instruction in mind. Try to improve your participation on the main sites (the ones you're not currently suspended on) in the meanwhile (i.e. in the next one year). Ask good questions, write good answers and show respectable behavior. Most importantly, follow the rules! You will then be welcome to visit and use all chat rooms. I can understand that it often feels like we're bogging down users with unnecessary rules and restrictions, but trust me that's exactly what helps us keep SE largely free from spam and trollish behavior.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587799.46/warc/CC-MAIN-20211026042101-20211026072101-00256.warc.gz
|
CC-MAIN-2021-43
| 2,434
| 9
|
https://kandi.openweaver.com/java/eclipse-ditto/ditto-examples
|
code
|
kandi X-RAY | ditto-examples Summary
kandi X-RAY | ditto-examples Summary
This repository contains examples and demonstrations of how to use Eclipse Ditto.
Top functions reviewed by kandi - BETA
ditto-examples Key Features
ditto-examples Examples and Code Snippets
Trending Discussions on Code Editor
I'm looking for a regular expression that matches strings for a syntax highlighter used in a code editor. I've found...
ANSWERAnswered 2022-Apr-05 at 10:24
You could use an alternation to match either a backreference to group 1 or assert the end of the string with your current pattern.
I am trying to build Code Editor in Flutter app using TextField, I tried using flutter_syntax_view but the problem is, it only accept code as a predefined string text and it does not have any option to write a code.
This is what I have tried:
- If we can show number of lines on left like code editor
Open for suggestions, appreciate the help...
ANSWERAnswered 2022-Mar-14 at 04:57
See my work on github: http://github.com/icedman/flutter_editor
It uses flutter_highlight, multicursor edits, minimap, line number gutter. Under development - you may want to contribute to that project.
I also wrote an article on creating an editor under 1000 lines of code in Flutter - wherein i explained why i ditched the textfield and made my own widget:
So I am trying to figure out if there is any way to make a visual studio code live server to display an HTML page I am currently on. What I mean is that when I create an HTML page it displays on the live server but I want to link another HTML page to that page through anchor text but when I go to the new HTML page I am not able to view it on the live server as it still shows the previous HTML page. What I want to do is to be able to have these two pages running so when I click on one on visual studio code it would show that page on live sever and when I click another page and do a bit of editing, save and refresh it should display that new page on live server...
ANSWERAnswered 2021-Jun-14 at 05:46
I usually have variables/function names like:...
ANSWERAnswered 2021-Apr-15 at 10:19
There are definitely fancy plugins for this (smth. about "motion" and "case"). But on most occasions, IMO, one is able to count, e.g. 5s or 8s etc.
I want to embed a code editor in my react application. The code editor should be like vscode. Some website -(https://play.tailwindcss.com/, https://www.typescriptlang.org/play/) use these vscode type code editors in their webpages. My simple question is how can I embed them and are there any libraries available. I have seen something called ace but that isn't like vscode.
ANSWERAnswered 2021-Mar-06 at 14:51
Later after looking html source I found that its - https://microsoft.github.io/monaco-editor/
I want to type the script "code ." in terminal in order to open my code editor, PhpStorm. How can I do that?...
ANSWERAnswered 2020-Nov-27 at 04:04
code command is used to open VS Code specifically. PhpStorm doesn't come with a command-line interface, but you can create one by following this tutorial (you will need the Toolbox app in order to generate a shell script if an alias isn't enough for you): https://www.jetbrains.com/help/phpstorm/working-with-the-ide-features-from-command-line.html
I am wondering what the best code editor is. I cannot use VS code, because it crashes every time I user it. I know I can look up this information on Google, but I want to get a realistic answer, not just someone promoting their product.Requirements
Nothing much, all I want to be able to do is code, and maybe have a built in terminal. If there is extensions that I can use for themes, or an extensive choice of themes that would be great.
Please let me know, and thanks so much for the help, I really appreciate it!...
ANSWERAnswered 2020-Oct-21 at 19:12
It really depends what language you're writing in. Atom is a good choice, which has GitHub integration, and probably has some packages you can install for terminal support of some kind. if you're using Python Atom is definitely a good choice; if you're using Java, Eclipse might better suit your needs. Despite the inevitable promotions from various companies, Google is your friend here (most code editors are free and open source anyway, so a company wouldn't really gain much by promoting their editor).
I've used the CodeBox project from CodeProject and it works very well except for the fact that I can't disable text wrapping. In a normal TextBox, simply setting the TextWrapping property to NoWrap does the trick, but not with CodeBox (which inherits from TextBox in code-behind). I've tried adding a horizontal scrollbar but that doesn't help. The scrollbar is visible and it changes the size of the drag button to show that it sees that the unwrapped text is wider than the viewing area, but since the text has already been wrapped, dragging it doesn't make any difference.
I've tracked the problem to a line in OnRender:
"formattedText.MaxTextWidth = this.ViewportWidth; // space for scrollbar"
I'm fairly new to WPF and there's much to it that is still mysterious to me, so the solution may be obvious to someone with more experience with it.
I'd appreciate any suggestions. This is the code-behind C#, lengthy, but it has been trimmed down to only enough to show what's going on. The rest (that has been reomved) is just code that does more text-coloring....
ANSWERAnswered 2020-Oct-15 at 16:15
The fix is to set MaxTextWidth to the width of the line instead of the ViewportWidth property:
I'm making a code editor in java, and I ran into a problem while implementing syntax coluring. I could not find anything on the Internet on how to do it. I only found a 6 year old post that did not work. Can anyone help?...
ANSWERAnswered 2020-Sep-25 at 03:53
first: you need to use a jEditorPane
Second: Create a highlighter like this(you can change the color of the highligthe):
Can DOMJudge be installed on VMWare? If so can the DOMServer, Judgehost and Teams, all be created in a single VM instance? What is the complete procedure? This is just to verify before going for AWS. I referred to the documentation but couldn't understand it fully....
ANSWERAnswered 2020-Sep-22 at 18:24
There are no technical barriers to doing this. However, the teams would need workstations to work on the problems and submit them, so I do not really understand how you'd install the teams in a VMware vm.
You can add the Judgehost to the same VM but I would not recommend it. Ideally you'd run the Judgehost on the same type of hardware that the teams use to work on the problem set. If not, I'd recommend to run it in a separate VM's, and depending on the size of your contest, to run a few Judgehosts.
No vulnerabilities reported
You can use ditto-examples like any standard Java library. Please include the the jar files in your classpath. You can also use any IDE and you can run and debug the ditto-examples component as you would do with any other Java program. Best practice is to use a build tool that supports dependency management such as Maven or Gradle. For Maven installation, please refer maven.apache.org. For Gradle installation, please refer gradle.org .
Reuse Trending Solutions
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474440.42/warc/CC-MAIN-20240223153350-20240223183350-00107.warc.gz
|
CC-MAIN-2024-10
| 7,302
| 54
|
https://learn.microsoft.com/en-us/previous-versions//mt715803(v=technet.10)?redirectedfrom=MSDN
|
code
|
Power BI mobile apps—enabling data analytics on the go
Article, 674KB, Microsoft Word file
More and more business groups at Microsoft use Power BI to generate insights and drive data-based decision making. To keep up with the modern pace of business and a workforce that is always on the go, interactive Power BI data needs to be available to view and share from any device, anytime, anywhere. To extend the visualization capabilities of Power BI and improve the user experience, the BI team at Microsoft created innovative solutions for Android, iOS, and Windows devices that provide an optimized dashboard and reports for mobile devices.
Before Power BI mobile apps, developers had to create individual BI applications for specific devices and scaled down for smaller screens. Even though data was hosted on a SharePoint site, it didn't mean that data was viewable, manageable, and flexible enough to be accessed from a handheld device.
It took a long time to create special views and custom applications, and the result often didn't include inherent data management capabilities. Users might be able to view red/green/yellow alerts on their mobile device, but they could not effectively work with the underlying data.
Mobile apps extend the capabilities of Power BI
At Microsoft, Power BI is used to gain and share business insights with rich visuals. It helps our users stay informed, find answers quickly, spot trends as they happen, and make decisions faster. With Power BI on the web, our employees can monitor important data from across the organization and from all of the apps they rely on.
Power BI mobile apps take that capability a step further by delivering device-specific visual enhancements and other features that help all Power BI users monitor their business, share views, and get fast answers using an interactive dashboard and report layouts that are optimized for small screens. With the Microsoft Power BI mobile app for Android, iOS, and Windows Phone, users can now easily view and interact with their business data.
"The mobile apps are very useful for us. The improved speed and accessibility of the Power BI mobile apps has improved our agility and is helping us rapidly respond to data fluctuations. Obviously, the mobile form factor is also a great advantage when on-the-go."
Greg Koehler, Senior Program Manager, Customer Data and Analytics team
Deploying the Power BI mobile apps at Microsoft
One of the main channels used to deploy the Power BI mobile apps at Microsoft was the Microsoft Elite program. Microsoft IT created Microsoft Elite to transform the culture of early adoption through social channels and leaderboards. Microsoft IT has always been a "first and best customer" by deploying new products and technologies internally before they are released to the public. Employees who participate in early adoption programs at Microsoft give valuable feature validation and feedback to product groups, and they influence features and product direction.
Microsoft IT built a base of sustained and engaged participants who help the BI team ready their mobile apps for release. There were 2,500 early adopters of Power BI Mobile apps at Microsoft. Overall, user feedback was good, and the features that rated highest among user at Microsoft included sharing, the Favorites tile area, editing favorite tiles, and inviting people to dashboards.
For more information about the Microsoft Elite program, read Reenergizing early adoption by using SharePoint Online and Yammer.
Sharing data in Power BI mobile apps
In addition to having live access to dashboards, reports, and KPI monitors while on the go, Power BI mobile app users have additional ways to interact with data and share information from their phone or tablet.
Power BI brings together data from different data sources and presents it in dashboards. Dashboards are a single place to monitor the current state of the business. Power BI mobile apps give a better dashboard experience for mobile devices. In the Power BI mobile apps, users can explore the same dashboards that are available in Power BI. The dashboards refresh in real time, automatically, and can be shared.
Figure 1. Power BI Mobile dashboard view
While dashboard tiles give you a quick overview of vital information, the reports behind the tiles provide a more in-depth view of data. It's a multi-perspective view that represents different insights. With Power BI mobile, reports are fully responsive and touch-enabled, featuring a layout that adjusts to the orientation and screen size of the device. Report drill-through and KPI monitors are available at a tap.
Figure 2. Power BI mobile app for Android report
Accessing your on-premises data
In addition to providing access to your cloud-based Power BI data, Power BI mobile apps also work with on-premises Microsoft SQL Server 2016 Reporting Services (SSRS), allowing you to seamlessly bring your on-premises data to your mobile device with out-of-the-box mobile reports and KPI tracking. Using the Power BI mobile apps, you can view your dashboards from Power BI and your KPIs and mobile reports from SSRS—all in one app.
Figure 3. Accessing on-premises data with the Power BI Mobile app for iOS
Sending annotated tile snapshots
You can send snapshots of tiles to anyone, not just your colleagues. When you share a snapshot of a tile from the Power BI mobile app, recipients can see the snapshot of the tile exactly as you do. They can't open the dashboard. You can add annotations including lines, comments, or stickers to a tile before you share the snapshot.
Receiving data alerts
Data sources are often set to refresh daily, although they can also be manually refreshed. Using Power BI mobile apps, you can set alerts to notify you when data in your dashboards is refreshed, or if the new value is above or below the limits you set. Alerts work for tiles featuring a single number. Only you can see the data alerts you set, even if you share a dashboard or a snapshot of a tile.
Using your mobile device to scan Power BI QR codes
QR codes in Power BI allow you to consume information and insights in the physical environment and context. QR codes in Power BI can connect any item directly to related BI information with no additional search.
Figure 4. Power BI QR code
You can easily generate QR codes in the Power BI service for any tile that you have access to. QR codes can be scanned from your mobile device using the QR code scanner in the Power BI mobile app, giving you instant access to the relevant tile. Some examples of how Power BI QR codes can be used include:
You want to share a dashboard with a colleague, so you create a QR code for a tile in the Power BI dashboard. You can include the code in email or share it in a key location.
In manufacturing, a QR code can be posted on a machine in your factory to provide instant access to its real performance data, shown in a Power BI dashboard.
You can include a QR code within a PowerPoint presentation, so others can scan and grab a live reference for the information being presented.
Microsoft Power BI mobile apps extend the capabilities of Power BI and give thousands of users at Microsoft a way to stay up-to-date on critical business information and explore insights as they happen. Busy users can present their data in new, visual ways with interactive charts, maps, and graphs enhanced for mobile devices. Users across the company are still discovering new scenarios where Power BI mobile apps improve collaboration and mobile productivity daily.
"Power BI mobile apps provide instant access to the dashboards that report on our service reliability and health. I can easily send tile snapshots to other members of my team to keep them informed. Threshold alerts are very useful in bringing changes in status to my attention in real time."
Guy Merin, Principal Development Lead, Windows Shell Coin Team
Note: Power BI mobile apps are consistently evolving. We aim to bring all major capabilities into all of our apps, but at the time this article was written there were minor differences between app capabilities on each platform.
For more information
Microsoft IT Showcase
© 2016 Microsoft Corporation. All rights reserved. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816954.20/warc/CC-MAIN-20240415080257-20240415110257-00608.warc.gz
|
CC-MAIN-2024-18
| 8,585
| 41
|
https://helmet.kafuka.org/megatokyo/topic_5872.html
|
code
|
hello. i am making a game right now and i have to say SCI STUDIO 3 is great... but i'm having difficulty in the room2 script..... Im using the turotial and its working fine, but every time i try to compile the room 2 script (even if i dont add anything concerning connecting room 1 that is in the tutorial) it says "ERROR : UNABLE TO OPEN VOCAB.000 FOR READING!"|
all the other scripts worked fine.... help!
thanks a bunch
|Nychold||I think I had this problem before, and if I'm not mistaken, it's because your script isn't actually added to the SCI Game/Project, so the script compiler doesn't know where to look for vocab.000. Instead, you need to use something like "Game -> Add -> Empty Script or Room Template". I forget exactly where it is, but look around and I'm sure you'll find it. If you don't want to rewrite or even copy/paste your code into the the script, you might be able to edit the game's configuration files and "add" the script manually, but since I'm not at my home system, I can't walk you through it. u_u|
Just open up some script that's in the game, and File > New > Room Script|
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648209.30/warc/CC-MAIN-20230601211701-20230602001701-00739.warc.gz
|
CC-MAIN-2023-23
| 1,104
| 5
|
https://stackoverflow.com/questions/16811859/how-to-display-textbox-control-in-messagebox/46522101
|
code
|
Any idea how to display textBox control in MessageBox.
I'm working on winforms projcet c#.
Thank you in advance.
you could create a classic win form that looks like a message box and opening it as a modal form
more info at
You cannot customise the MessageBox, its better you use a popup designed using Windows Form separately and use its instance to invoke.
customPopup popup = new customPopup(); popup.ShowDialog();
Place your controls on the popup form and set their access modifiers to public if you want to access the textboxes or labels etc in your previous form.
customPopup popup = new customPopup(); popup.msgLabel.Text= "Your message"; popup.ShowDialog();
Yes, as krillgar mentioned,you should create your own form. And 1. Encapsulate the form in a static class or function, so you may just call MyMessageBox.Show(). 2. The textbox should have readonly=true, so the end users won't be able to change the text displayed, while they could select text and copy to clipboard.
Regarding to item 2, I believe many Windows build applications and MS Office use such approach.
Solution in here, you can create windows form and design it, set form is dialog, when you call form, it is auto show. In form you design, you set value some parameter static where other class in project, but you should set when you close form design that, OK, come back form init call show dialog, you create interval call when have == null return call, when != null you stop call back and using parameter in class static it !
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251700988.64/warc/CC-MAIN-20200127143516-20200127173516-00335.warc.gz
|
CC-MAIN-2020-05
| 1,503
| 12
|
http://www.firewall.cx/forums/1-design-installation-a-troubleshooting/20658-dhcp-vs-static.html
|
code
|
as a part of our final yr proj,v r proposin a revamped design of our coll LAN(700 odd PCs and 7 departments)..currently all da IPs are manually assigned...jus wanted to hw significant a differnece wuld implemnting DHCP mk(since v r propsoin a VLAN design)...does it cause additonal overload or is easier to manage..? also if u guys culd suggest sum gud links for dhco wuld b of gr8 help!!
My first suggestion would be to brush up up on your professional writing skills. Secondly, I would shoot myself if I was the admin of a network that had 700 hosts all of which are using a static addressing scheme. As far as implementing a DHCP server, Windows Server will do just fine, or you could use DHCP on your router, (depending on model)
I do not consider myself to be a professor in windows 2003, but I could see advantages in using Windows 2003 for DHCP for several reasons:
1)Delegate control through active directory
2)Good integration with Windows DNS. When DHCP updates an address it updates records in the DNS database.
3)A nice GUI with good reporting and stats
4)Detects unauthorized DHCP servers in network.
I am not saying that windows is the only software that will do these things, but they do make it pretty easy.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255943.0/warc/CC-MAIN-20190520101929-20190520123929-00459.warc.gz
|
CC-MAIN-2019-22
| 1,223
| 8
|
http://mail-index.netbsd.org/tech-pkg/2004/09/30/0014.html
|
code
|
Subject: Re: Usefulness of pkgviews vs pkg_hack
To: Rhialto <email@example.com>
From: Johnny C. Lam <jlam@NetBSD.org>
Date: 09/30/2004 20:55:51
On Thu, Sep 30, 2004 at 10:06:14PM +0200, Rhialto wrote:
> When I reinstalled my laptop with a 2.0_BETA snapshot, I decided to use
> pkgviews, so that I can avoid the package upgrade hell whenever I first
> update my pkgsrc tree and then later decide to install some package that
> requires newer versions of packages that I already have. I used to use
> pkg_hack, which handled this most of the time, but it has a few problems
> and occasionally it fails and you have to fix things "by hand".
> So, I recently updated pkgsrc, and now I wanted to install
> graphics/gqview. And I'm still stuck.
> gqview wanted a newer version of atk, so it built atk-1.8.0. When
> installing, somewhere in the output it apparently said that it could not
> add it to the default view and therefore didn't do that. Okay, fair
> enough. I would perhaps have wanted that it replaced the old version
> with the newer one, but ok.
> It builds and installs one or two more things too, same thing.
> Then when it gets back to building gqview, it says that atk-1.8.0 is not
> installed, and attempts to re-install it which obviously fails.
> Why should it say that atk-1.8.0 is not installed? It /is/ installed,
> after all. Just not in the default view. But it doesn't even need the
> files in the default view, because buildlink3 will use the depoted
> files: ldd clearly shows, for instance, that the shared libraries that
> are used are from /usr/pkg/packages/..../lib, not /usr/pkg/lib. And
> .buildlink/include likewise links to the depoted files.
The problem is that graphics/gqview doesn't support pkgviews installation.
Since it is an "overwrite" package, it only looks for its dependencies
in the default view.
> So, I tried to replace the old atk in the default view by the new one.
> Unfortunately this could not be done: `pkg_view delete atk-1.6.1'
> reported that "atk-1.6.1 is required by other packages", listed a bunch
> of them, and did nothing. And there is not even a "force" option.
> But these packages do /not/ depend on the default view of atk! They
> depend on the depoted files! I can see no reason why the old atk, or any
> other random package, could not be deleted from default view, since no
> other package depends on the default view due to the way packages are
AFAIR, pkg_view won't let you delete atk-1.6.1 from the default view
if there are _overwrite_ packages that depend on it (the atk instance
in the default view).
> I suppose I could create a new view for thew new atk. But I suspect that
> I then have to add just about every package that I have to this view
> too, so that gqview can use them, or whatever package I'd like to
> install next. And I'd have to add it to everyone's $PATH. And I'd have
> to create yet another view the next time I upgrade pkgsrc. So that
> doesn't sound like a scalable solution.
No, this solution won't work. The root problem is trying to mix
pkgviews and "overwrite" packages, which causes problems exactly as
you've experienced. You basically lose the advantage of pkgviews for
every package dependency chain that includes "overwrite" packages.
> It looks to me that the best way to fix this problem, is to fix the way
> the pkg build procedure checks for installed packages. Perhaps the
> actual building will even already work after that...
The limitations are mostly due to limitations in the pkg_install tools
themselves, and without fixing those inherent limitations, it will
not be possible to have an "overwrite" package freely depend on a
pkgviews package in the way that you envision. This is a largish
project that I hope to tackle early next year. In the meantime,
pkgviews does remain an _experimental_ feature of pkgsrc and is off
by default. However, this is good feedback as it lets me know that
what I suspected was a deficiency in the way pkgviews in implemented
in pkgsrc is actually causing real problems for users.
-- Johnny Lam <jlam@NetBSD.org>
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647777.59/warc/CC-MAIN-20180322053608-20180322073608-00725.warc.gz
|
CC-MAIN-2018-13
| 4,061
| 64
|
https://play.google.com/store/apps/details?id=com.CyberKashaCompany.ToRest
|
code
|
The game is a set of scenes, in each of which the heroes will need to choose one of the proposed options for passing. For the right choice - the prize game "Fishing". (For the correct answer on the first try - the game can be played 2 times, if the wrong answer was given at the beginning, then the game can be played 1 time). For passing every 3 scenes in a row on the first try - a bonus game (for 7 correct ones - another bonus game). The task is to catch as many fish as possible.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816942.33/warc/CC-MAIN-20240415045222-20240415075222-00297.warc.gz
|
CC-MAIN-2024-18
| 484
| 1
|
https://community.cisco.com/t5/storage-networking/hyperflex-dns-unreachable/m-p/4105872
|
code
|
Hello team. I have a Hyperflex Cluster with 12 nodes. The DNS server that we used in the implementation was migrated to the new infrastructure. After a power outage, the cluster failed to start because there was no DNS server available to resolve the host name of each node. I could solve it by restoring a DNS server backup outside the cluster.
Is it possible to change the settings from hostname to IP address?
Yes, you need to have at least 1 DNS and NTP server outside the HX cluster to avoid a dependency loop.
"Is it possible to change the settings from hostname to IP address?" <<< settings of what? DNS server values?
If so, just use command: stcli services dns set --dns x.x.x.x
Hopefully you can set more than one DNS server permanently, with at least one outside the cluster.
Great Kirk J! Thanks a lot.
When I mentioned the DNS, I was talking about to change the FQDN of every node to an IP address. My idea is not utilize an Out of box DNS, when the cluster reloads. This could be possible?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738964.20/warc/CC-MAIN-20200813073451-20200813103451-00216.warc.gz
|
CC-MAIN-2020-34
| 1,003
| 8
|
https://disabroad.org/summer/courses/microbrains-lab-modeling-neurodegeneration/
|
code
|
In our aging society more and more people suffer from neurodegenerative diseases such as Alzheimer’s disease (AD). Decades of research have focused on mouse models, but all drug candidates which have successfully treated AD in mice have failed in human clinical trials. In order to address these pressing needs, human models such as neurons, astrocytes, and microglia derived from induced pluripotent stem cells are the key. In combination with gene editing using CRISPR-Cas9 these cellular models provide insights into early disease development and progression in the species we need to investigate: humans.
PhD at Max Planck Institute for Molecular Genetics and Free University, Berlin, Germany in Human Genetics (2005). Postdoctoral Research Fellow at UC Irvine, CA, USA (2005-2011) Postdoctoral Researcher (2012-2014) University Copenhagen. MSc at Robert Koch Institute and Free University, Berlin, Germany, in 2001 working with Mycobacteria. Assistant Professor (2014-2015) University Copenhagen. Associate Professor (2015-present) University Copenhagen. With DIS since 2016.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572980.56/warc/CC-MAIN-20190917000820-20190917022820-00166.warc.gz
|
CC-MAIN-2019-39
| 1,082
| 2
|
https://www.experts-exchange.com/questions/29065559/DHCP-fails-to-properly-assign-IP's-for-a-2nd-subnet-on-network.html
|
code
|
Hello - we have a SuperScope on our 2008 R2 DGCP AD server, which runs DHCP for 2 subnets - 192.168.1.x and 192.168.5.x. The respective VLANs for each subnet are VLAN2 & VLAN 6, respectively. What we are seeing is the following scenario:
1) Computers that do not have a lease previously on the network (they have been off for several days) will be properly assigned a new lease on the 2nd subnet of 5.x on VLAN6, and work fine.
2) Computers that have an active lease, however, on the 1st subnet of 1.x on VLAN2, will not receive a new IP on the 2nd subnet when they are in our neighboring building that has a WIFI network going thru a switch that is configured for VLAN6. Cisco captured and inspected packets from test clients coming thru a VLAN6 port on the network, and see the DHCP Request is made by the client, and the DHCP server answers, but does not properly hand out a 5.x IP address - and the client ends up retaining the 1.x IP it had originally. Even if we issue a "ipconfig /release" it does not help.
3) If I hard-code a static address on the 5.x subnet, however, the client will connect properly.
Is there something that is not configured correctly on the DHCP server to cause this? I will attach a screenshot of our Superscope. Let me know what else I can send that might help disagnose this.
”The time we save is the biggest benefit of E-E to our team. What could take multiple guys 2 hours or more each to find is accessed in around 15 minutes on Experts Exchange.
-Mike Kapnisakis, Warner Bros
With your subscription - you'll gain access to our exclusive IT community of thousands of IT pros. You'll also be able to connect with highly specified Experts to get personalized solutions to your troubleshooting & research questions. It’s like crowd-sourced consulting.
We can't always guarantee that the perfect solution to your specific problem will be waiting for you. If you ask your own question - our Certified Experts will team up with you to help you get the answers you need.
Our certified Experts are CTOs, CISOs, and Technical Architects who answer questions, write articles, and produce videos on Experts Exchange. 99% of them have full time tech jobs - they volunteer their time to help other people in the technology industry learn and succeed.
We can't guarantee quick solutions - Experts Exchange isn't a help desk. We're a community of IT professionals committed to sharing knowledge. Our experts volunteer their time to help other people in the technology industry learn and succeed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662522556.18/warc/CC-MAIN-20220518215138-20220519005138-00382.warc.gz
|
CC-MAIN-2022-21
| 2,520
| 11
|
https://www.relationaldbdesign.com/advanced-sql/module5/intro-sql-reporting.php
|
code
|
This module discusses the different techniques presented throughout this course, including the grouping techniques and functions.These can be combined to create a query that will produce some very meaningful results.
In this module, you will be presented with the class project, in which you will retrieve a listing of sales by sales associate.
To make it more challenging, you will only want those sales associates that have sold the product with the highest sales based on overall quantity sold.
(SSRS) SQL Server Reporting Services is a server-based report generation software system from Microsoft which is administered by means of a web interface. SSRS can be used to prepare and deliver a variety of interactive and printed reports. SSRS competes with Crystal Reports and other business intelligence tools like Microstrategy and Cognos.
Tuning an individual query means examining the structure of the query (and subqueries), the SQL syntax, to discover whether you have designed your tables to support fast data manipulation and written the query in an optimum manner, allowing your DBMS to manipulate the data efficiently.
Queries do many things, from
- adding entirely new records to tables,
- to updating existing records,
- to pulling data out of multiple related tables for reporting purposes.
It is this last part that many people think of when discussing optimizing queries
, but in fact, a database must be viewed as a whole entity or you risk speeding up one piece while negatively impacting another.
As this chapter demonstrates, there are techniques (particularly when optimizing the queries of other people) that are essentially free, while others (specifically creating new indexes) can be applied only at a price.
Adding indexes may very well speed up whatever it is you are trying to speed up, but it may cripple some other piece of the application. Deleting an index may speed up one part of the application but cripple another.
The intention here is not to cripple you with fear of doing anything because you may cause more problems than you fix, but simply to cause you to always think about the implications of your changes, beyond the area you are working on.
Whenever you make a change, particularly on a large system, you need to keep your ears open to users complaining that the application seems slower lately. Where possible, record the changes that you make so that they can be backed out if necessary.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.22/warc/CC-MAIN-20230322082826-20230322112826-00248.warc.gz
|
CC-MAIN-2023-14
| 2,434
| 15
|
https://thismetalsky.org/2011/10/06/cool/
|
code
|
I finally quit being lazy and updated my first Android app, calCOOLator. It was semi-broken because it was using standard java.lang.Double numbers, now I’m using java.math.BigDecimal and dealing with precision much better. Maintaining old applications, especially when it’s been years since you even looked at the code, is a little annoying.
I’m sure I’ll still get comments about how it doesn’t handle percentages correctly. “50 + 10% = 55” - wtf kind of math is that?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662606992.69/warc/CC-MAIN-20220526131456-20220526161456-00429.warc.gz
|
CC-MAIN-2022-21
| 483
| 2
|
http://www.linuxquestions.org/questions/linux-software-2/gnome-desktop-freezes-sometimes-407782/
|
code
|
Gnome desktop freezes sometimes
I'm using Ubuntu 5.10 with Gnome and not too long ago I began having some problems.
Basically what happens is that when I open an application it freezes. The window opens, but there's nothing inside the window and I get a warning later:
"The window [windowname] is not responding. Forcing this application to quit will cause you to you lose unsaved changes."
If I don't do anything, the application quits by itself.
The icons on my desktop disappear sometimes, and this often happens right alongside Problem #1. They later reappear after a while, but it is quite annoying.
Does anyone know what I can do to fix these problems?
Thanks in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122955.76/warc/CC-MAIN-20170423031202-00269-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 677
| 8
|
https://www.physicsforums.com/threads/where-to-go-from-here-a-book-question.887974/
|
code
|
Hello, I stopped studying math after grade 10. Then many years later I did. 1-calculus dairies. (story book with personal calculus experience ) 2-idiot's guide to calculus. 3-Mathematical Methods in the Physical Sciences(Mary Boas) 4-Advance Engineering Mathematics (Erwin Kreyszig) 5-real analysis, and some pure mathematics books, few chapters here and there. 6-little bit of octave/matlab skills.Little bit of c, some python some shell.. As much as I like looking at the symbols and and writing equation on paper and solving them, I get side tracked.. and think why I am doing it? My question to you is: How do I connect this stuff to reality? Or I just learn new stuff and marvel the beauty ??
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864186.38/warc/CC-MAIN-20180521122245-20180521142245-00349.warc.gz
|
CC-MAIN-2018-22
| 697
| 1
|
https://builtwithdot.net/project/1892/microsoft-azure-webjobs-logging-applicationinsights
|
code
|
"This package contains the runtime assemblies for Microsoft.Azure.WebJobs.Logging.ApplicationInsights. For more information, please visit https://go.microsoft.com/fwlink/?LinkID=320971"
Project website: https://go.microsoft.com/fwlink/?LinkID=320972
"A C# library that supports arbitrary-precision binary and decimal floating-point numbers and rational numbers with arbitrary-precision components, and supports arithmeti…"
"Provides a collection of classes for OLEDB.Commonly Used Types:System.Data.OleDb.OleDbCommandSystem.Data.OleDb.OleDbCommandBuilderSystem.Data.OleDb.OleDbConnectionSystem…"
Hello, I'm Corstiaan. I'm a .net developer from the Netherlands and I manage BuiltWithDot.Net. I created this site as a place where developers working with .net technology can showcase their projects and inspire other developers.
There's so much you can build with .net these days that I thought it would be nice to have a corner of the web dedicated to the breadth of .net. Enjoy!
Get weekly updates about new projects built with .net tech
No spam. Unsubscribe any time.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571847.45/warc/CC-MAIN-20220812230927-20220813020927-00559.warc.gz
|
CC-MAIN-2022-33
| 1,071
| 8
|
https://couple-bracelets.com/couple-bracelets-black-and-red-shamballa/
|
code
|
Buy 2PCS Couple Bracelets Black And Red Shamballa. This beautiful set couple his & hers bracelet includes 2 individual hand braided lucky bracelets.
- 🤗 Comfort++ : Soft & light for your wrist.
- 📏 Elastic strap to adjust the waist.
- 🌎 Authentic Pearls extracted from the earth.
- 🚚 FREE SHIPPING TO YOUR COZY HOME. 🚚
7.8 x 7.8 x 3.9 (inch)
17 x 20 (cm)
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304798.1/warc/CC-MAIN-20220125070039-20220125100039-00319.warc.gz
|
CC-MAIN-2022-05
| 369
| 7
|
http://www.biomedcentral.com/1471-2105/10/26/abstract
|
code
|
Identifying differential exon splicing using linear models and correlation coefficients
1 Bloomsbury Centre for Bioinformatics, Department of Computer Science, University College London, Gower Street, London, UK
2 Wolfson Institute of Biomedical Research, University College London, Gower Street, London, UK
BMC Bioinformatics 2009, 10:26 doi:10.1186/1471-2105-10-26Published: 20 January 2009
With the availability of the Affymetrix exon arrays a number of tools have been developed to enable the analysis. These however can be expensive or have several pre-installation requirements. This led us to develop an analysis workflow for analysing differential splicing using freely available software packages that are already being widely used for gene expression analysis. The workflow uses the packages in the standard installation of R and Bioconductor (BiocLite) to identify differential splicing. We use the splice index method with the LIMMA framework. The main drawback with this approach is that it relies on accurate estimates of gene expression from the probe-level data. Methods such as RMA and PLIER may misestimate when a large proportion of exons are spliced. We therefore present the novel concept of a gene correlation coefficient calculated using only the probeset expression pattern within a gene. We show that genes with lower correlation coefficients are likely to be differentially spliced.
The LIMMA approach was used to identify several tissue-specific transcripts and splicing events that are supported by previous experimental studies. Filtering the data is necessary, particularly removing exons and genes that are not expressed in all samples and cross-hybridising probesets, in order to reduce the false positive rate. The LIMMA approach ranked genes containing single or few differentially spliced exons much higher than genes containing several differentially spliced exons. On the other hand we found the gene correlation coefficient approach better for identifying genes with a large number of differentially spliced exons.
We show that LIMMA can be used to identify differential exon splicing from Affymetrix exon array data. Though further work would be necessary to develop the use of correlation coefficients into a complete analysis approach, the preliminary results demonstrate their usefulness for identifying differentially spliced genes. The two approaches work complementary as they can potentially identify different subsets of genes (single/few spliced exons vs. large transcript structure differences).
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706009988/warc/CC-MAIN-20130516120649-00095-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 2,544
| 7
|
http://www.ipadforums.net/threads/possible-to-make-2-seperate-back-ups.118001/
|
code
|
Hey there, I have just jail broken my iPad 2 and before JB I had an back up made. This is without JB. Now I want to make another back up, containing the JB in case I want a restore or so. Is it possible to make 2 back ups? Thank u in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824525.29/warc/CC-MAIN-20181213054204-20181213075704-00414.warc.gz
|
CC-MAIN-2018-51
| 242
| 1
|
http://newvquill.blogspot.com/2004/03/microsoft-to-become-traffic-cop.html
|
code
|
Monday, March 01, 2004
Microsoft to become traffic cop?Ellen Messmer reports in Network World that its Bill Gates' intention for Microsoft to make its software 'behave'. Or, more precisely, to reign in activity that the OS considers to be "problematic" as a way to improve security. Gates sited an example: "For example, the Blaster worm caused the RPC service to open a back door and download some malicious code on the machine. In this case, behavior blocking would recognize that this behavior is out of the ordinary for the RPC service and block it." This raises two questions -
1) suppose I want the RPC service to download some code? What happens then?
2) if RPC should never download code, then shouldn't Microsoft simply take out that functionality?
This looks like another half-baked idea from Redmond, like last week's "caller ID plan".
Comments: Post a Comment
© 2003-2006 The Virtual Quill, All Rights Reserved Home
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647498.68/warc/CC-MAIN-20180320150533-20180320170533-00095.warc.gz
|
CC-MAIN-2018-13
| 928
| 7
|
https://thenerdcabinet.com/watch/PhCtfPASUwk
|
code
|
I like to do gaming mostly VR
Howdy Hairy Minions, I had a lot of fun streaming these moments. Thanks for watching and yall please leave a like/Subscribe/Comment! Its free!!! Stay Hairy! Please understand that I feature just funny/or unusual moments on my streams. I don't play favorites with my viewers. If something unusual happens, I will feature it, regardless on who is in the video. Please don't make demands or feel upset that you're not included in the videos. I stream for fun and to meet you guys.
Howdy folks! I had a great time making this video. I even scared myself in the process. I couldn't believe the amount of creativity that went to making these rooms. Thank you to the creators for making an frightening experience. Custom Rooms: The Haunting By: Grandpa CampLonePine By: Utinni "Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for -fair use- for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use."
With the new "Social Dorm Update" recently being released I thought I would go around and check out some custom dorms! Click here to subscribe ► https://goo.gl/4zrVKd Social Media Links ▼ Discord https://discord.gg/HT94aDb Twitter https://twitter.com/SoulFoxGaming Instagram https://goo.gl/wPV98D Rec.net https://rec.net/user/SoulFoxGaming Stream Profile http://steamcommunity.com/id/SoulFoxGaming/ Music in this video provided by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0 http://creativecommons.org/licenses/by/3.0/ and the Youtube Library Business email: SoulFoxGaming@hotmail.com
We locked some people in a room to play the Paranormal Activity VR game to see how scary it was. It's coming Summer 2016, but what did we discover? See for yourself. Check out our other 'How Scary' videos here: How Scary is Until Dawn? https://www.youtube.com/edit?o=U&video_id=zRzMpAfZflw How Scary is Alien Isolation? https://www.youtube.com/watch?v=7EWe69vP1pA How Scary is Outlast? https://www.youtube.com/watch?v=1Vcgdl4xQ18 ---------------------------------- Follow IGN for more! ---------------------------------- IGN OFFICIAL APP: http://www.ign.com/mobile FACEBOOK: https://www.facebook.com/ign TWITTER: https://twitter.com/ign INSTAGRAM: https://instagram.com/igndotcom/?hl=en WEBSITE: http://www.ign.com/ GOOGLE+: https://plus.google.com/+IGN
Here's our top 10 list of the top PS4 games to play in 2019. Subscribe to GR+ here: http://goo.gl/cnjsn1
2 Like 0 Don't like
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986669546.24/warc/CC-MAIN-20191016190431-20191016213931-00102.warc.gz
|
CC-MAIN-2019-43
| 2,666
| 7
|
https://www.syncfusion.com/feedback/14133/database-localization-not-working-for-blazor-components
|
code
|
Welcome to the Blazor feedback portal. We’re happy you’re here! If you have feedback on how to improve the Blazor, we’d love to hear it!>
Thanks for joining our community and helping improve Syncfusion products!
Adding localization string to a common table (like database) not working in blazor components as ISyncfusionStringLocalizer inject service is not allowed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487614006.8/warc/CC-MAIN-20210614232115-20210615022115-00364.warc.gz
|
CC-MAIN-2021-25
| 372
| 3
|
http://eleni-konstantine.blogspot.com/2008/12/library-thing.html
|
code
|
On the sidebar (those that get feeds, you'll have to go to the site to look), I have two widgets at the moment - one for Random Books from My Library, and Books currently reading. It's cool. And I don't need to keep up my own spreadsheet anymore as I can just catalogue on Library Thing. I add all books I've read this year - have alot more in the backlog of what I actually physically HAVE in my library and what I have borrowed from books. They have tags (keywords) and it's so cool - you can create your own. So I've got a tag 'My copy' and if I click that, it will show me what books are in my collection. My collection is here.
Yes, I'm a book nerd and I freely admit it.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593208.44/warc/CC-MAIN-20180722100513-20180722120513-00139.warc.gz
|
CC-MAIN-2018-30
| 676
| 2
|
http://ps-2.kev009.com/tl/techlib/manuals/adoclib/libs/ktechrf2/tokselec.htm
|
code
|
Determines whether a specified event has occurred on the token-ring device.
#include <sys/device.h> #include <sys/comio.h> #include <sys/tokuser.h>
int tokselect (devno, events, reventp, chan) dev_t devno; ushort events; ushort *reventp; int chan;
|devno||Specifies major and minor device numbers.|
|events|| Specifies the conditions to check, denoted by the bitwise OR of one or more of the following:
|reventp|| Points to the result of condition checks. A bitwise OR one of the following conditions is returned:
|chan||Specifies the channel number assigned by the tokmpx entry point.|
Note: Only user-mode callers should call this entry point.
The tokselect entry point is called when the select or poll subroutine is used to determine if a specified event has occurred on the token-ring device.
When the token-ring device handler is in a state in which the event can never be satisfied (for example, an adapter failure), then the tokselect entry point sets the returned events flags to 1 for the event that cannot be satisfied. This prevents the select or poll subroutines from waiting indefinitely.
The tokselect entry point can only be called from the process environment.
|ENXIO||Indicates the specified minor number is not valid.|
|EACCES||Indicates a call from a kernel process is not valid.|
The tokselect entry point functions with a Token-Ring High Performance Network Adapter that has been correctly configured for use on a qualified network. Consult adapter specifications for more information on configuring the adapter and network qualifications.
The poll subroutine, select subroutine.
Select/Poll Logic for ddwrite and ddread Routines.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00604.warc.gz
|
CC-MAIN-2022-33
| 1,652
| 16
|
http://www.theopensourcerer.com/2007/09/microsoft-loses-eu-antitrust-appeal/
|
code
|
Microsoft loses EU Antitrust appeal.
The EU Court of First Instance has upheld the EU commission’s anti-trust case against Microsoft for bundling media player with Windows, and server/network interoperability.
It will be interesting to see if they (M$) decide to appeal again (they have just 2 months) and also if they have enough proper documentation to actually explain how their networking protocols really work!
Of course one possible outcome is that nothing changes; M$ just continue to pay the fines but keep their competitive advantage. I wonder which is really more costly to them?
On the networking front, the Samba team should be quite happy about this decision I’d have thought.
Oh goody, yet another BAD day for Microsoft… Perhaps, now we all know (officially) that Microsoft are crooked and anti-competitive, many of the visitors to this site will stop using Internet Explorer now, and then start migrating their desktops to one of many free and Open Source alternatives (Just like Amsterdam is doing)
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704117624/warc/CC-MAIN-20130516113517-00045-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,020
| 6
|
https://www.leadtools.com/help/sdk/digitalpaint/api/painting-a-shape.html
|
code
|
LEADTOOLS DigitalPaint provides the following functions for painting a shape:
These functions require:
a valid paint handle.
an optional windows device context.
the coordinates used to paint the shape.
These functions will draw shapes based on the current shape properties. To determine the current shape properties, call L_PntGetProperty. To set or change the current shape properties, call L_PntSetProperty. For more information on the shape properties, refer to the PAINTSHAPE structure.
Before painting a shape, set the DigitalPaint metrics using the L_PntSetMetrics function.
Any transformation information should be set, using the L_PntSetTransformation function before calling any shape or other painting function. To get the current transformation information, call L_PntGetTransformation.
The following example sets the shape properties, sets the DigitalPaint metrics and paints a line. It assumes the paint handle has been initialized and the bitmap handle is valid:
/* Set the required shape properties */
shape.nSize = sizeof ( PAINTSHAPE ) ;
shape.dwMask = PSF_BORDERWIDTH |
shape.nBorderWidth = 10 ;
shape.nBorderStyle = PAINT_SHAPE_BORDER_STYLE_DASHDOT ;
shape.crBorderColor = RGB ( 255, 0, 0 ) ;
shape.nBorderEndCap = PAINT_SHAPE_BORDER_ENDCAP_ROUND ;
/* Set the new shape properties */
L_PntSetProperty ( pPaint, PAINT_GROUP_SHAPE, &shape ) ;
/*Select the bitmap into the paint handle*/
L_PntSetMetrics ( pPaint, NULL, &hLeadBitmap, NULL ) ;
/* Use the current shape properties to draw a line to the currently selected bitmap*/
L_PntDrawShapeLine ( pPaint, hDC, 10, 10, 200, 200 ) ;
Direct Show .NET | C API | Filters
Media Foundation .NET | C API | Transforms
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654012.67/warc/CC-MAIN-20230607175304-20230607205304-00174.warc.gz
|
CC-MAIN-2023-23
| 1,677
| 24
|
https://laser1017.iheart.com/featured/big-mark-clark/content/2018-03-06-this-is-how-you-sale-a-bed-on-craigslist/
|
code
|
A used bed is a hard sell, but one creative guy put together a delightfully awkward video to try to get someone to buy his bed on Craiglist. His main selling point for the twin mattress set and metal frame he's trying to unload for $100? "Ain't nothin' bad ever happened on this bed."
- Would you buy a used bed from a stranger?
- What's something you should never buy from Craiglist?
- What's the weirdest thing you've ever bought on Craigslist?
- The Craigslist ad: http://bit.ly/2FWwq98
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251694071.63/warc/CC-MAIN-20200126230255-20200127020255-00353.warc.gz
|
CC-MAIN-2020-05
| 489
| 5
|
http://anitaborg.org/news/blog/archive/male-majority-for-another-20-years/
|
code
|
The Best of Systers Blog “Male Majority for Another 20 Years?”
There was a recent discussion on Systers about comments from Christos Papadimitrou. I wont go into whether or not he is right or wrong, which is a topic that received a bit of flaming. What I want to discuss is a comment from Susan Landau, a syster and someone who I always enjoy hearing when she talks at the Grace Hopper Conference. She wrote (with permission to share):
“In 1989 Christos put together a program committee of ten women and two men for the Foundations of Computer Science (FOCS) conference, which is one of the two leading conferences in theoretical computer science. He was accused of reverse discrimination at the time. Time shows up those critics sharply. The program committee consisted of Fan Chung, Cynthia Dwork, Faith Ellen Fich, Shafi Goldwasser, Debby Joseph, Maria Klawe, Nancy Lynch, Vijaya Ramachandran, Eva Tardos, Avi Widgerson (the one male on the program committee aside from Papadimitriou), Frances Yao, and Christos. Of the ten women, four are now members of the National Academy of Engineering (Dwork, Goldwasser, Lynch, Tardos), one just won a Turing Award (Goldwasser), one is the president of Harvey Mudd College (Klawe), two have been Athena Lecturers (Goldwasser and Lynch). They are numerous other awards as well (e.g. ACM fellows, etc.).”
Just how amazing is that?
It is easy to become focused on a stupid comment that someone made. Irregardless of whether or not he meant it, or what was meant by it, the comment matters little in the grand scheme of things. What matters is that women in technology keep making strides forward. What can we do to make people believe that in 20 years women and men in technology will equal parity? What can we do to get there? What can we do to make people continue to put together such amazing panels?
And, more importantly, how soon can I make a time machine so that I can sneak into that committee?
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163811461/warc/CC-MAIN-20131204133011-00021-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 1,950
| 6
|
https://bugendaitech.com/java-developer/
|
code
|
Job Id : BTJ21010
Technology / Domain: Java developer
Role: Java developer : 1-3 yrs of Exp
Best as per industry standards
We are looking for a Java developer responsible for building Java applications. This includes anything between complex groups of back-end services and their client-end (desktop and mobile) counterparts. Your primary responsibility will be to design and develop these applications, and to coordinate with the rest of the team working on different layers of the infrastructure. Thus, a commitment to collaborative problem solving, sophisticated design, and product quality is essential
Your responsibilities will include:
- Responsible for requirements understanding, analysis, coding, testing and maintenance/enhancements depending on the project nature in the full software development lifecycle
- Strong hands on experience in Core Java and Java EE platforms including Spring framework and components, Microservices, ORM frameworks, Web & Application Server.
- Should have good knowledge about writing SQL queries/PL-SQL.
- Strong experience in developing and designing software solutions on Spring Framework and ORM frameworks, Web & Application Server.
- Strong debugging and troubleshooting expertise.
- Java/JEE/RDBMS/ Unix/ Ext JS/ Angular JS, Spring, Web Services.
- Knowledge of Continuous Integration including Jenkins job configurations, build processes, REST API for automated job creation scripting languages like Groovy and Python.
- Very good English communication skills (spoken & written).
- Flexible to work in overlapping time with Global team members, if required.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710192.90/warc/CC-MAIN-20221127041342-20221127071342-00745.warc.gz
|
CC-MAIN-2022-49
| 1,606
| 15
|
https://wiki.rptools.info/index.php/bitwisenot
|
code
|
Logical "not" Table
Unfortunately its not quite as simple as the table above makes it appear since number are a string of 32 (or more bits) so a 1 in binary is actually a 00000000000000000000000000000001 and a 0 is actually a 00000000000000000000000000000000 so the table is now.
bnot of binary 00000000000000000000000000000000 is 11111111111111111111111111111111 which is -1 in decimal
bnot of binary 00000000000000000000000000000001 is 11111111111111111111111111111110 which is -2 in decimalIf you are unsure why the results are negative then you can get more information by reading Twos_complement
[h: val = bnot(num)] [h: val = bitwisenot(num)]
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585270.40/warc/CC-MAIN-20211019140046-20211019170046-00695.warc.gz
|
CC-MAIN-2021-43
| 648
| 5
|
https://github.com/facebook/folly/
|
code
|
Folly is an open-source C++ library developed and used at Facebook.
Summary: Headers whose includes are not sufficient cause problems when included from other files. An easy way to prevent this is to include the header first in its associated cpp file. In fact, we have a lint rule for this. However, there are places where this rule is ignored. This diff fixes many of them. Note that a few top-level directories were excluded. Reviewed By: email@example.com FB internal diff: D1281032
|folly||Fix header ordering lint failures|
|.gitignore||Fix build and test.|
|LICENSE||Move LICENCE and README to top level directory|
|README||Update build for Ubuntu 12.10. 12.04 seems to no longer compile|
Folly: Facebook Open-source LibrarY ----------------------------------- Folly is an open-source C++ library developed and used at Facebook. For details, see folly/docs/Overview.md. Folly is published on Github at https://github.com/facebook/folly; for discussions, there is a Google group at https://groups.google.com/d/forum/facebook-folly. Dependencies ------------ - double-conversion (http://code.google.com/p/double-conversion/) By default, the build tooling for double-conversion does not build any libraries, which folly requires. To build the necessary libraries copy folly/SConstruct.double-conversion to your double-conversion source directory before building: [double-conversion/] scons -f SConstruct.double-conversion Then set CPPFLAGS/LDFLAGS so that folly can find your double-conversion build: [folly/] LDFLAGS=-L<double-conversion>/ CPPFLAGS=-I<double-conversion>/src/ configure ... - googletest (Google C++ Testing Framework) Grab gtest 1.6.0 from: http://googletest.googlecode.com/files/gtest-1.6.0.zip Unzip it inside of the test/ subdirectory. - additional platform specific dependencies: Ubuntu 12.10 64-bit - g++ - automake - autoconf - autoconf-archive - libtool - libboost1.46-all-dev - libgoogle-glog-dev - libgflags-dev - scons (for double-conversion) Fedora 17 64-bit - gcc - gcc-c++ - autoconf - autoconf-archive - automake - boost-devel - libtool - glog-devel - gflags-devel - scons (for double-conversion)
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609535095.9/warc/CC-MAIN-20140416005215-00015-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 2,131
| 7
|
https://afeks.ru/video/994293
|
code
|
Let's play a game and guess which of your favorite Nick Jr. friends from PAW Patrol, Blaze, Bubble Guppies, Shimmer and Shine, and Blue's Clues and You will appear on each ball as it pops out of the mx-up machine. Who will pop up first? Will it be Mighty Chase, Molly or Blaze?
Catch more of your favorite shows on Nickelodeon and the Nick Jr. channel!
#MixUpMachine #PAWPatrol #BubbleGuppies #NickJr
You can watch full episodes online, play games, and discover silly surprises in the free Nick Jr. App and at NickJr.com. iTunes: https://itunes.apple.com/us/app/nick-jr./id911115712?ls=1&mt=8 Google: https://play.google.com/store/apps/details?id=com.nick.android.nickjr Amazon: https://www.amazon.com/gp/product/B01LQP0EL2 Web: http://www.nickjr.com/
Stream Nick Jr. for free in the Nick Jr. App on Roku and Apple TV or download full episodes for offline viewing on iTunes or Google Play: https://play.google.com/store/apps/developer?id=Nickelodeon&hl=en
You can also download premium apps featuring your favorite Nick Jr. shows on iTunes, Google Play, and Amazon: iTunes: https://itunes.apple.com/us/developer/nickelodeon/id304682075?mt=8 Google Play: https://play.google.com/store/apps/developer?id=Nickelodeon&hl=en Amazon: https://www.amazon.com/s/ref=bl_sr_mobile-apps?_encoding=UTF8&field-brandtextbin=Nickelodeon&node=2350149011
Download premium Nick Jr. games and apps on iTunes, Google Play, and Amazon:
Nick Jr. Draw and Play iPhone: https://itunes.apple.com/us/app/nick-jr-draw-play/id513395037?ls=1&mt=8 iPad: https://itunes.apple.com/us/app/nick-jr-draw-play-hd/id513414742?ls=1&mt=8 Google Play (Phone): https://play.google.com/store/apps/details?id=com.mtvn.DrawAndPlayGoogleHandset Google Play (Tablet): https://play.google.com/store/apps/details?id=com.mtvn.DrawAndPlayGoogleTablet Amazon: https://www.amazon.com/gp/product/B00ED0R0EW
Nick Jr. Let’s Learn iPhone: https://itunes.apple.com/us/app-bundle/id918620400?mt=8
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144637.88/warc/CC-MAIN-20200220035657-20200220065657-00242.warc.gz
|
CC-MAIN-2020-10
| 1,939
| 9
|
http://www.java-mobiles.com/tag/tests-benchmarks
|
code
|
SPMarkJava06 benchmark is a richly featured, handheld
device benchmark for measuring and evaluating a system's performance in running Java applications.
Futuremark's SPMarkJava06 benchmark includes performance tests for high- and low-detail 3D games, 2D games, image processing and Java Virtual Machine (JVM)
The application has rich functionality and can perform the following tasks: retrieve detailed information about the "hardware" device under test, including data on the amount of available memory, software interfaces, and display characteristics of graphical 3D-engine (if present)
FPC Bench is a java benchmark to test and compare the performance of a phone with others phones. FPC Bench is a java benchmark to test and compare the performance of a phone with other phones . Differently from other benchmark, FPC Bench results is not influenced from screen resolution
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917126237.56/warc/CC-MAIN-20170423031206-00155-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 876
| 5
|
https://1494.kz/?query=ninja%20cat%20unblocked%20hacked2121121121212.1
|
code
|
Ninja Cat - Hacked Unblocked Games.
Play Ninja Cat Unblocked game on-line free. Ninja Cat is a very addictive survival game by way of which it is best to administration your cat and stroll by fully totally different ranges full with...
Cat Ninja Unblocked Hacked. Free Friv 7Y7V.com. Action.
Brutally Honest Life Truths. Bad Stock Photos of Jobs. Chicken Shaming Is a Thing… Really Dumb Cats. Funny Dad Tweets. Godzilla + Cat = Catzilla. Really Accurate Cat Drawings. Birds With Arms (Animated). Poor T-Rex Struggling…
Play Ninja Cat Unblocked game on-line free. Ninja Cat is a really addictive survival game through which you should management your cat and stroll by completely different ranges full with booby traps.
Cat ninja, ninja cat unblocked. GAME INSTRUCTIONS.
Papas Freezeria. Hobo 4 Total War. Ninja Cat. Gunball Emperors Revenge. Bike Mania.
Ninja Cat game unblocked version, Have fun online from school or office.
Kill enemy ninjas in the highly entertaining game Ninja Cat game and reach other levels!
Ninja Cat Unblocked Hacked Game. “Ninja Cat” is a funny action game in which you, as a white cat, have to fight with numerous enemies to survive. Run, jump, and slow down to go through and destroy all the villains.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347401260.16/warc/CC-MAIN-20200529023731-20200529053731-00358.warc.gz
|
CC-MAIN-2020-24
| 1,238
| 10
|
https://www.designdrivendatasciencebook.com
|
code
|
Find in MJV’s
Design Driven Data Science book
Natanael Moura Junior
Since our establishment, we have operated in the technology area. We are
pioneers of introducing Design Thinking and applying it to innovation
In preparation for our data science projects, we set up a
Data Science Laboratory within the Technology Park of the Federal
University of Rio de Janeiro, We were supported on this endeavor by research groups such as
Coppead, Coppe and the School of Engineering.
Currently, our team of researchers, doctors and masters are developing
work in the areas of Banking, Insurance, Retail, and Industry.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817043.36/warc/CC-MAIN-20240416031446-20240416061446-00781.warc.gz
|
CC-MAIN-2024-18
| 608
| 11
|
http://bigdata.sys-con.com/node/3090782
|
code
|
|By Jason Bloomberg||
|May 27, 2014 08:30 AM EDT||
Static data structures have been at the heart of data processing tools since the dawn of computing, but they have always limited the flexibility of the organization leveraging the data. Recently, the rise of flexible formats like JSON have led to schemaless data as an attempt to increase agility. However, schemaless data have proven difficult to work with, because of hidden rigid structure in the form of implied schemas.
EnterpriseWeb addresses the problems of both the inflexibility of structured data as well as the impracticality of schemaless data, by enabling schemaless data to be dynamically and logically structured.
From the fixed-length fields of the 1950s, to the relational structures of modern database management systems, to the semistructured data formats XML and JSON, the structure of our data has always informed code about how it should be processed. Data are defined by their relationships, and we used to hard-code those relationships into rigid structures. That approach allows only one static view, which is difficult to work with, and even more difficult to change. Nevertheless, such rigid data structures - and the models that represent them - are an integral part of enterprise information management.
Traditional relational database management systems (RDBMSs) exemplify this point with their static entity-relationship models (ERMs) and tightly interconnected data structures. XML improves this situation slightly, allowing semi-structured information, but schemas still constrain flexibility and performance. With both approaches, fixed definitions, views, and reports limit the ability for businesses to freely transform information into insight and become obstacles to systemwide change.
The Rise of Schemalessness
This challenge of inflexible data structures has given rise to schemaless data. With JSON in particular, we can create whatever data structure we like when we author data. We don't have to shoehorn data into rigid data structures, thus allowing every record to have its own structure.
But there is a problem with schemaless data. Consider this simple task: how do you create a query for all the addresses in a particular Zip Code if every record has a different name or format for Zip Code? Schemalessness, after all, isn't magic - even schemaless data require some kind of metadata so the code will know how to process such information, what software development guru Martin Fowler calls an implied schema.
Implied schemas represent the structure inherent in any data record. If each address record has its own format, then that format provides the implied schema for that record. Dealing with implied schemas thus falls to the developer, who must figure out how to code software to process these implied schemas, which are different for each and every record.
In Fowler's tutorial on schemalessness, he explains the pros and cons of implied schemas. Despite acknowledging the power of schemalessness to support more flexible and responsive user experiences, he recommends avoiding it and implied schemas for developer convenience. Good advice with respect to traditional software, but the world of data is changing. Today we live in an increasingly schemaless world, where more often than not, the structure of our data is fluid or nonexistent.
Raising the Discussion to Dynamic Schemas
Fowler makes it clear that in the past it has been impractical from the developer's perspective to work systematically with schemaless data, because implied schemas are difficult to deal with. After all, structure is itself useful, and isn't the problem per se. Rather, how to avoid the limitations of static structure without falling into the trap of unmanageable schemaless data that is the real challenge.
EnterpriseWeb's unique approach to modeling solves this critically important challenge by leveraging dynamic schemas that have flexible, metadata-driven relationships with underlying information. Using metadata this way separates concerns, letting people consider relationships from multiple perspectives, rather than from a single static point of view. In addition, it's now possible to change and extend metadata to meet diverse business needs without disruption.
Instead of settling for complex ERMs with their inflexible, tightly coupled data structures or dealing with the coding complexities of implied schemas, developers can project dynamic schemas from the metadata simply by writing different transformations. As a result, dynamic schemas are developer friendly and dynamic - a welcome change from the difficult problem of schemalessness.
Add an Agent for Performance
So far so good, but how do we build software to process all such data in a general way, freeing ourselves from custom coding for implicit schemas? The solution is an intelligent agent.
EnterpriseWeb's intelligent agent, SmartAlex™, is a distributable transaction manager that resolves dynamic schemas for each interaction. Every human or system client interaction is a request for SmartAlex to interpret dynamic schemas (as well as other models and additional metadata) and translate them to a context-specific set of resources in order to construct a custom response.
This Agent-Oriented approach maximizes performance for such dynamic computing. In the background, SmartAlex handles all run time connection and transformation details, sparing programmers from manually integrating resources for varied and unanticipated uses, greatly improving IT productivity while enabling business agility.
SmartAlex logs all system events, indexes all new and updated resources, and tags all changes in relationships for detailed and navigable audit history. This practice creates a feedback loop as SmartAlex leverages the same indexed logs to guide its execution. Data, code, and user interface components, as well as connectors for federated services, systems, databases, and devices, can be updated or replaced without breaking related apps and processes - as SmartAlex is ‘aware' of the changes. In this way EnterpriseWeb supports real time exception and change management for resilient solutions that can evolve naturally.
The EnterpriseWeb Take
Schemalessness was a reaction to the limitations of structured data. People struggled with the constraints of static structure, and figured that if they simply got rid of structure, then the problem would go away. But this move was merely a shell game, as the limitations of fixed schemas shifted to implied schemas, now without the benefits of structure to inform the code responsible for their processing.
The solution is to raise the level of abstraction, and instead of arguing over fixed vs. implied schemas, to work at the dynamic schema level. Such an approach is model-driven, allowing application designers to build models that capture their data structures, and allowing an intelligent agent to use the metadata each model represents to meet the specific needs of each interaction. The real lesson here is that the solution to resolving the challenge of schemalessness combines both dynamic schemas and the action of the agent. Stay tuned to my next newsletter for more information.
[session] The Factory of the Future, Today By @Cisco | @ThingsExpo #IoT #BigData #DigitalTransformation
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
Jun. 30, 2016 07:30 PM EDT Reads: 681
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
Jun. 30, 2016 07:15 PM EDT Reads: 448
"We work in the area of Big Data analytics and Big Data analytics is a very crowded space - you have Hadoop, ETL, warehousing, visualization and there's a lot of effort trying to get these tools to talk to each other," explained Mukund Deshpande, head of the Analytics practice at Accelerite, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jun. 30, 2016 07:00 PM EDT Reads: 606
"SpeedyCloud's specialty lies in providing cloud services - we provide IaaS for Internet and enterprises companies," explained Hao Yu, CEO and co-founder of SpeedyCloud, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jun. 30, 2016 06:15 PM EDT Reads: 1,027
Creating replica copies to tolerate a certain number of failures is easy, but very expensive at cloud-scale. Conventional RAID has lower overhead, but it is limited in the number of failures it can tolerate. And the management is like herding cats (overseeing capacity, rebuilds, migrations, and degraded performance). Download Slide Deck: ▸ Here In his general session at 18th Cloud Expo, Scott Cleland, Senior Director of Product Marketing for the HGST Cloud Infrastructure Business Unit, discusse...
Jun. 30, 2016 05:00 PM EDT Reads: 1,171
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, provided an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data profession...
Jun. 30, 2016 04:00 PM EDT Reads: 437
It's easy to assume that your app will run on a fast and reliable network. The reality for your app's users, though, is often a slow, unreliable network with spotty coverage. What happens when the network doesn't work, or when the device is in airplane mode? You get unhappy, frustrated users. An offline-first app is an app that works, without error, when there is no network connection. In his session at 18th Cloud Expo, Bradley Holt, a Developer Advocate with IBM Cloud Data Services, discussed...
Jun. 30, 2016 04:00 PM EDT Reads: 1,043
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
Jun. 30, 2016 04:00 PM EDT Reads: 1,012
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Jun. 30, 2016 03:00 PM EDT Reads: 1,275
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Jun. 30, 2016 02:45 PM EDT Reads: 323
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
Jun. 30, 2016 01:15 PM EDT Reads: 725
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Jun. 30, 2016 01:00 PM EDT Reads: 1,517
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.
Jun. 30, 2016 01:00 PM EDT Reads: 1,022
Cloud Expo, Inc. has announced today that Andi Mann returns to 'DevOps at Cloud Expo 2016' as Conference Chair The @DevOpsSummit at Cloud Expo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited t...
Jun. 30, 2016 12:30 PM EDT Reads: 514
University of Colorado Athletics has selected FORTRUST, Colorado’s only Tier III Gold certified data center, as their official data center and colocation services provider, FORTRUST announced today. A nationally recognized and prominent collegiate athletics program, CU provides a high quality and comprehensive student-athlete experience. The program sponsors 17 varsity teams and in their history, the Colorado Buffaloes have collected an impressive 28 national championships. Maintaining uptime...
Jun. 30, 2016 11:45 AM EDT Reads: 840
IoT is rapidly changing the way enterprises are using data to improve business decision-making. In order to derive business value, organizations must unlock insights from the data gathered and then act on these. In their session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, and Peter Shashkin, Head of Development Department at EastBanc Technologies, discussed how one organization leveraged IoT, cloud technology and data analysis to improve customer experiences and effi...
Jun. 30, 2016 11:30 AM EDT Reads: 646
The idea of comparing data in motion (at the sensor level) to data at rest (in a Big Data server warehouse) with predictive analytics in the cloud is very appealing to the industrial IoT sector. The problem Big Data vendors have, however, is access to that data in motion at the sensor location. In his session at @ThingsExpo, Scott Allen, CMO of FreeWave, discussed how as IoT is increasingly adopted by industrial markets, there is going to be an increased demand for sensor data from the outermos...
Jun. 30, 2016 11:00 AM EDT Reads: 473
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Jun. 30, 2016 11:00 AM EDT Reads: 1,115
"Avere Systems is a hybrid cloud solution provider. We have customers that want to use cloud storage and we have customers that want to take advantage of cloud compute," explained Rebecca Thompson, VP of Marketing at Avere Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jun. 30, 2016 10:45 AM EDT Reads: 636
Presidio Receives @EMCcorp Partner Services Quality Award | @ThingsExpo @Presidio #IoT #DigitalTransformation
Presidio has received the 2015 EMC Partner Services Quality Award from EMC Corporation for achieving outstanding service excellence and customer satisfaction as measured by the EMC Partner Services Quality (PSQ) program. Presidio was also honored as the 2015 EMC Americas Marketing Excellence Partner of the Year and 2015 Mid-Market East Partner of the Year. The EMC PSQ program is a project-specific survey program designed for partners with Service Partner designations to solicit customer feedbac...
Jun. 30, 2016 10:45 AM EDT Reads: 698
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399522.99/warc/CC-MAIN-20160624154959-00017-ip-10-164-35-72.ec2.internal.warc.gz
|
CC-MAIN-2016-26
| 17,649
| 65
|
http://reflector.sota.org.uk/t/anomaly-in-associations-and-summits/19027?page=2
|
code
|
You asked us to correct the inconsistency between ARM and DB. This is what I did, with the ARM now correctly reflecting the reality of the bonus points assigned by the DB. You did not ask us to reduce the WB elevation level on the DB.
Since you are discussing my reply, here it is:
Thank you for bringing this to our attention.
The ARM is being updated to match the database.
Apparently you saw that as funny. In any case I received no reply, so presumed the matter was resolved. Perhaps a theoretical physicist would be able better to construct withering sarcasm even in such a short note but for a me it was a simple note of the actions we were taking.
The MT is guided by the AM on winter bonus issues. So if you think the bonus elevation for E7 is not appropriate please petition your AM, Žaro @E73DU, and if he agrees he can discuss it with us.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376830479.82/warc/CC-MAIN-20181219025453-20181219051453-00150.warc.gz
|
CC-MAIN-2018-51
| 850
| 6
|
http://idakjos879.ga/news227-regular-expression-to-check-valid-ip-address.html
|
code
|
How to create VB script Irregular expression syntax to check the VPparam ( IP address validity) When the last octatat ofThis will not validate that X < Y, or that each octet is in a proper range, i.e. 999.999.999.999 would be valid. You cant validate X < Y in regex (abbrev. for regular expression) I was doing some work for someone and needed to validate an IP address.return validI just wrote an article about matching IP addresses with regular expressions.How to check if a character appears in a form variable? Browse more C / C Sharp Articles on Bytes. The following example uses a regular expression to verify that a string is in valid email format.If it is an opening bracket, match the opening bracket followed by an IP address (four sets of one to three digits, with each set separated by a period) and a closing bracket. 7.16. Matching IPv4 Addresses Problem You want to check whether a certain string represents a valid IPv4 address in 255.255.
255.255 notation.Regular expression. Simple regex to check for an IP address I searched on internet and found Private IP Address Identifier in Regular Expression but i could not understand it.Note that this code assumes the string is a valid IP address (ie. it will match 192.168.chocolate.sundae). Check if an email address is valid.IP Address (IPv6) Lookup in Bulk Using PHP and MySQL Database. Regular expression to match an IP Address. Hello, I am trying to check if a IP address is valid in the bigip with regexp (I dont know if anybody know other method).This will definitely be less CPU intensive than running the regular expression and should cover all the corner cases. RegEx - Validate IP Address.Now the pattern string is checked against the string of numbers and if the check satisfies, a message is shown at the console as The given number is a valid pattern else The given number is an invalid pattern.
as Sigardave pointed out, a more "local" solution (ie, in the same area of the Internet) : Regular expression to match DNS hostname or IP Address?I have a textbox in a form where user can enter any website url. i want to check that url, whether it is valid or not through regular expression. it will a. The code snippet below will check if the passed string is a valid IP address or not .strip non-ASCII characters from a string using RegEx (Regular expressions). Configuring Power Rails in Proteus ISIS. Yeah, it isnt that easy, when using RegExp to check, first split the ip by dot, then check the numbers with a loop, if all number ok, is a valid address otherwise, no. In the function validip, the if statement uses a regular expression to make sure the subject IP address consists of four dot separated numbersvalidip() Check if IP format is num.num.num.num / num between 0255 if [ "(sipcalc 1 | grep ERR)" ] then echo "incorrect" Regular Exp Validate an ip address.Regex Tester is a tool to learn, build, test Regular Expressions (RegEx / RegExp). Results update in real-time as you type. Roll over a match or expression for details. The following regular expressions match IPv4 addresses. Matched IP addresses can be extracted from a file using grep command.Lets find only valid IP addresses with the second regular expression. case str when Resolv::IPv4::Regex puts "Its a valid IPv4 address." when Resolv::IPv6:: Regex puts "Its a valid IPv6 address." else putsIn addition to using the Resolv regular expressions, there is also another way to validate an IP address string in Rubys standard library.Check out our portfolio. Regular Expression Syntax Regular Expression Exemples. E-Mail address.Matching a valid date is pretty simple. The regex consists of three parts in differents orders depending on what you are looking for. This is a snippet I use to validate IP address using regular expressions. I use this when working in .Net 1.1 as the TryParse method isnt available until 2.0.Submit a Comment Cancel reply. Your email address will not be published. Example of VALID IP address.return "Valid IP" But actually you get even simpler code by not using any regular expression at all: function isIp(ip) var arrIp ip.split(".") if (arrIp.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794869732.36/warc/CC-MAIN-20180527170428-20180527190428-00181.warc.gz
|
CC-MAIN-2018-22
| 4,122
| 3
|
https://www.breaze.org.au/breaze/b-news-events/breaze-news/1060-please-volunteer-smart-building-and-living-expo-2017
|
code
|
BREAZE will be assisting the organisers of the EXPO. As the EXPO will be bigger and better this year we need more volunteers.
If you can spare 1-2 hours any time on Sunday 26th Feb your help will be gratefully appreciated.
- 8am-10am for the set up
- any time between 10am and 3:30pm
- from 3:30 - 4:30 for the pack up
Help is also needed on Saturday the 25th Feb for the set up work.
Your help will be greatly appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122174.32/warc/CC-MAIN-20170423031202-00597-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 423
| 7
|
http://ninelocks.com/
|
code
|
Ninelocks specialise in the development of software for mobile devices. The majority of our work is writing freeware, shareware and specialised bespoke solutions for individuals and companies.
Latest Android Applications
Explore Bytes, binary and twos complement number systems in a fun and informative way. ByteSplorer written to assist students to understand binary numbers and interpreting the value stored in a byte. Windows version can be be downloaded from here. JAVA version can be be downloaded from here.(Supplied as a zip file. Requires Java 1.7. )
Quickly Send an SMS of Your Location
When out on an cycle or walk it Still Riding makes it quick and easy to send an SMS containing a URL to GoogleMaps showing where you are.
NinePOI (Place of Interest)
NinePOI was written to provide a quick means of collecting and sending geographically tagged information for survey and hazard reporting purposes.
This version defaults to a mode to enable reporting faults on cycle routes but can be customised via its setting to use categories and labels more suitable for your own projects. A beta version of a Desktop Java Application to manage POI collections can be downloaded from here.(Requires Java 1.7)
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334596.27/warc/CC-MAIN-20220925193816-20220925223816-00407.warc.gz
|
CC-MAIN-2022-40
| 1,206
| 8
|
https://chrome.google.com/webstore/detail/top-tomato/ncjlgbnopdeldjbdbcpgdepfifhpocip
|
code
|
How not to cure your tab addiction.
Yet another tab manager: group, move, delete, sort, pin tabs
You can search the selection by entering keywords into the field.
Example: cat woman, superman, batman = ('cat' AND 'woman') OR ('superman') OR ('batman')
If only one tab is selected, press Enter to focus this tab.
Actions like "extract" apply to the whole selection unless there are checked tabs, in which case they apply to the subselection.
You can move tabs by dragging the "xx tabs" icon in the toolbar to a new position in the left panel. The selected tabs will be inserted before the tab you dropped the selection on.
You can doubleclick a tab in the left panel to focus this tab.
You can doubleclick a window in the left panel to focus this window.
You can assign a keyboard shortcut to Top Tomato: chrome://extensions/shortcuts
If you like it, please rate it.
My other extensions:
- Wikipedia Lookup - Browser Action
- Wikipedia Lookup - Context Menu
- Banana Translation
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741979.10/warc/CC-MAIN-20181114104603-20181114125934-00023.warc.gz
|
CC-MAIN-2018-47
| 977
| 15
|
http://forums.gbpvr.com/showthread.php?21396-GBPVR-Locks-Up-after-pressing-skip&mode=hybrid
|
code
|
Im new to GBPVR (I installed it this week into my new PVR system) and am running in to problems. I have installed the .NET 2 runtime, and am running GB-PVR v0.98.13b with no plugins, and the standard blue skin. I have a Hauppauge PVR-500 card, tried the original supplied drivers, and have ubgraded to the 24108 drivers in an attempt to fix this issue.
When I press skip to fast forward a recording, the program locks up solid. I recorded a 10 minute manual recording tonight, with Comskip installed. One press of the skip on a MCE remote locks the application and yields the attached logs.
I tried the same recording with pressing CTRL+ --> to skip and it too locks up.
Can anyone suggest how a newbie like me can figure out what is wrong here?
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131305143.93/warc/CC-MAIN-20150323172145-00223-ip-10-168-14-71.ec2.internal.warc.gz
|
CC-MAIN-2015-14
| 745
| 4
|
https://github.com/paulczar/docker-percona_galera
|
code
|
Auto Clustering/Replicating Percona Database
How does it work ?
There are two images in this project, the first contains Percona and the Galera replication tools, the second contains Maxscale (a MySQL load balancer).
When run with access to a service discovery tool (
etcd by default) it is
able discover other running databases and set up a replication relationship.
By default it uses Glider Labs'
registrator to perform the service
registry, but can access
etcd directly if that is your preference.
Inside the container
runit manages three processes:
Used to watch the
etcd endpoint and rewrite config files with any changes.
Watches availability of the application ( percona or maxscale ) and kills runit (thus the container) when it fails.
percona / maxscale
Runs the main process for the container, either Percona or Maxscale depending on which image is running.
See factorish for a detailed description of the factorish toolset.
If you want to run this outside of the tech demo see the
and/or start the tech demo first and view the
file in any of the
registry is hosted in a path mapped in from the host computer and
therefore is shared amongst the
coreos nodes. This means that any
images pushed to it from one host are immediately avaliable to all the
This allows for some intelligent image pulling/building to ensure that
only a single node has to do the heavy lifting. See the
file for the scripts that allow this sharing of work.
maxscale images are built from scratch automatically and started as the
coreos nodes come online. Thanks to the
registry they will survive a
vagrant destroy which means subsequent
vagrant up will be
Running in CoreOS with etcd/registrator discovery
In order to use the tech demo simply run the following:
$ git clone https://github.com/paulczar/docker-percona_galera.git $ cd docker-percona_galera $ vagrant up
Once Vagrant has brought up your three nodes you want to log in and watch the progress of the build using one of the provided helper functions:
$ vagrant ssh core-01 $ journal_database
This make take a few minutes if its the first time you've run this and the images aren't cached in the registry. If you get bored you can also check out
journal_registrator and watch them get pulled down and run. It is also possible a different host will be elected to do the build, in which case you'll see it show as waiting for that host before it proceeds.
Once the database is online ( you'll see percona start and replication collect in the
journal_database output ) you can connect to Maxscale via the helper function
$ mysql mysql> select @@hostname; +--------------+ | @@hostname | +--------------+ | a7575fd684eb | +--------------+
the maxscale LB can take a while to find the service to loadbalance, and can also sometimes just fail. I haven't worked out why yet.
or by connecting to the shell of the database container on the current host:
$ database root@ecfd272af45e:/app# mysql mysql> select @@hostname; +--------------+ | @@hostname | +--------------+ | ecfd272af45e | +--------------+
notice the returned hostname is not the same in both queries, this is because the first was loadbalanced to the database on a different container
Each container started at boot has the following helper functions created
/etc/profile.d/functions.sh and autoloaded by the shell.
(examples shown below for
database- get shell in container.
kill_database- kills the container, equivalent to
docker rm -f database
build_database- rebuilds the image
push_database- pushs the image to registry
log_database- connect to the docker log stream for that container
journal_database- connect to the systemd journal for that container
They become very useful when combined:
$ build_database && push_database $ kill_database && run_database && log_database
There is also the
mysql function which will connect you via the local proxy to a percona server and a
cleanup function which deletes the
Finally in the git repo is a
clean_registry script which when run on the host will remove all images from the registry filesystem which is useful if you want to do a full rebuild from scratch.
Running without service discovery:
HOST to be the IP address of the server.
$ export HOST=172.17.8.101 $ docker run --detach \ --name database01 \ -e BOOTSTRAP=1 -e DEBUG=1 \ -e MYSQL_PASS=password -e REP_PASS=replicate \ -e HOST=$HOST -e SERVICE_DISCOVERY=env \ -p $HOST:3306:3306 \ -p $HOST:4444:4444 \ -p $HOST:4567:4567 \ -p $HOST:4568:4568 \ paulczar/percona-galera
HOST to be the IP address of the server, change
CLUSTER_MEMBERS to be the IP of the first server.
$ export HOST=172.17.8.102 docker run -ti --rm \ --name database02 \ -e DEBUG=1 \ -e MYSQL_PASS=password -e REP_PASS=replicate \ -e CLUSTER_MEMBERS=172.17.8.101 \ -e HOST=$HOST -e SERVICE_DISCOVERY=env \ -p $HOST:3306:3306 \ -p $HOST:4444:4444 \ -p $HOST:4567:4567 \ -p $HOST:4568:4568 \ paulczar/percona-galera bash
Run in Rackspace's Carina Service:
Signup for carina and create a 3 node cluster. Download and source the carina config files and get the carina binary as well.
note this will leave the mysql and galera ports open to the whole of the service-net network
we need to get the servicenet IP address of each node:
$ docker info Containers: 7 Images: 6 Engine Version: Role: primary Strategy: spread Filters: health, port, dependency, affinity, constraint Nodes: 3 bf76bea4-47ef-43ac-a7ae-67a6e6db15bf-n1: 184.108.40.206:42376 └ Containers: 3 └ Reserved CPUs: 0 / 12 └ Reserved Memory: 0 B / 4.2 GiB └ Labels: executiondriver=native-0.2, kernelversion=3.18.21-1-rackos, operatingsystem=Debian GNU/Linux 7 (wheezy) (containerized), storagedriver=aufs bf76bea4-47ef-43ac-a7ae-67a6e6db15bf-n2: 220.127.116.11:42376 └ Containers: 2 └ Reserved CPUs: 0 / 12 └ Reserved Memory: 0 B / 4.2 GiB └ Labels: executiondriver=native-0.2, kernelversion=3.18.21-1-rackos, operatingsystem=Debian GNU/Linux 7 (wheezy) (containerized), storagedriver=aufs bf76bea4-47ef-43ac-a7ae-67a6e6db15bf-n3: 18.104.22.168:42376 └ Containers: 2 └ Reserved CPUs: 0 / 12 └ Reserved Memory: 0 B / 4.2 GiB └ Labels: executiondriver=native-0.2, kernelversion=3.18.21-1-rackos, operatingsystem=Debian GNU/Linux 7 (wheezy) (containerized), storagedriver=aufs CPUs: 36 Total Memory: 12.6 GiB Name: a892be77e40c
for each node we need to get the servicenet ip:
$ docker run --net=host \ --env constraint:node==bf76bea4-47ef-43ac-a7ae-67a6e6db15bf-n1 \ racknet/ip service ipv4 10.176.230.11 --env constraint:node==bf76bea4-47ef-43ac-a7ae-67a6e6db15bf-n2 \ racknet/ip service ipv4 10.176.230.12 $ docker run --net=host \ --env constraint:node==bf76bea4-47ef-43ac-a7ae-67a6e6db15bf-n3 \ racknet/ip service ipv4 10.176.230.13
Start your first MySQL server:
$ docker run --detach \ --name database01 \ --env constraint:node==bf76bea4-47ef-43ac-a7ae-67a6e6db15bf-n1 \ -e DEBUG=1 -e MYSQL_USER=admin \ -e MYSQL_PASS=notthispassword -e REP_PASS=woopdedoo \ -e HOST=10.176.230.11 -e SERVICE_DISCOVERY=env \ -p 10.176.230.11:3306:3306 \ -p 10.176.230.11:4444:4444 \ -p 10.176.230.11:4567:4567 \ -p 10.176.230.11:4568:4568 \ paulczar/percona-galera
Second and third:
$ docker run -d \ --name database02 \ --env constraint:node==bf76bea4-47ef-43ac-a7ae-67a6e6db15bf-n2 \ -e MYSQL_USER=admin \ -e CLUSTER_MEMBERS=10.176.230.11 \ -e MYSQL_PASS=notthispassword -e REP_PASS=woopdedoo \ -e HOST=10.176.230.12 -e SERVICE_DISCOVERY=env \ -p 10.176.230.12:3306:3306 \ -p 10.176.230.12:4444:4444 \ -p 10.176.230.12:4567:4567 \ -p 10.176.230.12:4568:4568 \ paulczar/percona-galera $ docker run -d \ --name database03 \ --env constraint:node==bf76bea4-47ef-43ac-a7ae-67a6e6db15bf-n3 \ -e MYSQL_USER=admin \ -e CLUSTER_MEMBERS=10.176.230.11 \ -e MYSQL_PASS=notthispassword -e REP_PASS=woopdedoo \ -e HOST=10.176.230.13 -e SERVICE_DISCOVERY=env \ -p 10.176.230.13:3306:3306 \ -p 10.176.230.13:4444:4444 \ -p 10.176.230.13:4567:4567 \ -p 10.176.230.13:4568:4568 \ paulczar/percona-galera
wait a minute or so then check status:
docker exec -ti database01 mysql -e "SHOW STATUS LIKE 'wsrep_cluster%'" +--------------------------+--------------------------------------+ | Variable_name | Value | +--------------------------+--------------------------------------+ | wsrep_cluster_conf_id | 3 | | wsrep_cluster_size | 3 | | wsrep_cluster_state_uuid | 2882bcb7-ab3b-11e5-ab75-2b510ef0ec6f | | wsrep_cluster_status | Primary | +--------------------------+--------------------------------------+
Paul Czarkowski (firstname.lastname@example.org)
Copyright 2014 Paul Czarkowski Copyright 2015 Paul Czarkowski
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334974.57/warc/CC-MAIN-20220927002241-20220927032241-00380.warc.gz
|
CC-MAIN-2022-40
| 9,021
| 87
|
https://theunwiredpeople.com/2010/11/12/geolocation-the-definitive-answer-to-white-space-usage/
|
code
|
The Ofcom (UK regulator) consultation report on “Implementing Geolocation” on TV White Spaces regulatory issues, was released this week. It has been pretty clear for a while that “classic” cognitive radio, i.e. using detection of TV-transmitters is not going to provide any reasonable balance between white space utilization and adequate protection for the primary users (TV viewers). Results basically show that (in realistic scenarios) when low interference probabilities are to be achieved, the utilization of spectrum (i.e. the “amount of usable white space” ) basically goes to zero.
So something more is needed and geolocation is the way regulators and Ofcom in particular are going. A model as in the figure to the left has been proposed where the White Space Devices have to query a data base to determine if they are to be allowed to transmit. Stating the it location, the response will contain information about if and for how long the channel can be used, what power level can be used and if additional sensing is to be required (and at what threshold level).
Will this work? Certainly it will, but the question is still how well. The design of the algorithms to determine query response is still an open, and non-trivial issue. By adding more information, one should, at least in the ideal case, be able to make a better decision than with sensing only. It is of course easy to provide better protection for the primaries, but will this make us too cautious, not exploiting all spectrum opportunities. Could such combined schemes also achieve a significantly higher spectrum utilization for a given interference probability? The latter is not obvious and definitely not necesserily true for any geolocation scheme. One important problem is that geographic proximity/distance is not always a very good predictor of signal/interference levels. In wide area wireless systems (with unobstructed propagation) it may well work fine, but in dense urban/indoor environments, where the deployment of WSDs is most likely, such a prediction does not work very well. Adjacent channel interference problems indoor when the WSD is close to a TV set are other issues. In my mind we have a couple of really interesting open research questions:
- How large improvements in spectrum utilization can we achieve ? Is it actually worth while adding the increased complexity of geolocation ?
- What should the algorithms to most effectively “fuse” the signal detection and geographical location ?
Or has anyone the definitive answer ?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100448.65/warc/CC-MAIN-20231202172159-20231202202159-00534.warc.gz
|
CC-MAIN-2023-50
| 2,540
| 6
|
https://papers.nips.cc/paper_files/paper/2016/hash/30ef30b64204a3088a26bc2e6ecf7602-Abstract.html
|
code
|
Mehdi Sajjadi, Mehran Javanmardi, Tolga Tasdizen
Effective convolutional neural networks are trained on large sets of labeled data. However, creating large labeled datasets is a very costly and time-consuming task. Semi-supervised learning uses unlabeled data to train a model with higher accuracy when there is a limited set of labeled data available. In this paper, we consider the problem of semi-supervised learning with convolutional neural networks. Techniques such as randomized data augmentation, dropout and random max-pooling provide better generalization and stability for classifiers that are trained using gradient descent. Multiple passes of an individual sample through the network might lead to different predictions due to the non-deterministic behavior of these techniques. We propose an unsupervised loss function that takes advantage of the stochastic nature of these methods and minimizes the difference between the predictions of multiple passes of a training sample through the network. We evaluate the proposed method on several benchmark datasets.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819847.83/warc/CC-MAIN-20240424174709-20240424204709-00818.warc.gz
|
CC-MAIN-2024-18
| 1,072
| 2
|
https://www.experts-exchange.com/questions/25911498/Network-diagnostic-tools.html
|
code
|
I am looking for some Windows based LAN software tools, anything that would help to optimize a small LAN for better data throughput and reduce latency..any suggestions would be appreciated..
I have less then 20 NIC devices on my network
Maybe even some recommended settings for optimizing a managed gigabit switch or Server/Workstation NIC cards.
Any tool I could use to show management the network is performing satisfactory.
I will try to spread the points around as much as possible.
Thanks in advance!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823614.22/warc/CC-MAIN-20181211083052-20181211104552-00483.warc.gz
|
CC-MAIN-2018-51
| 505
| 6
|
https://mzmine.github.io/mzmine_documentation/troubleshooting.html
|
code
|
The graphical user interface freezes sometimes on remote desktops if the user logs out and logs in again. This is a known issue and might be fixed in future JavaFX versions.
MZmine does not start¶
Maybe the MZmine configuration got corrupted (broke). Delete it and reinstall MZmine. The * .mzmine3.conf* file can be found in the user folder and might be hidden. On Windows, activate " Show hidden items" in the Explorer/View menu.
mzML files not importing¶
An illegal character might exist in the mzML file. When converting the raw data files to mzML, the path of the file is added to the resulting mzML file. The path may contain characters that are not parsed correctly by MZmine.
Solution: Reconvert the file and place the input and output directory to a path with only Roman characters.
Thermo raw files not importing¶
Error message usually contains "No scans found".
Solution: Search for the "mzmine_thermo_raw_parser" folder in the mzmine temp folder and the system temp folder and delete it.
Scans not sorted in retention time dimension¶
This issue often occurs with raw data from Waters instruments. We recommend re-converting the files using the Waters data connect tool.
Scans were recognised as empty¶
This is displayed as a warning and means that some scans did not contain any data. This is not considered as an error. The warning may indicate that a threshold was too high, if conversion was applied. You may consider lowering said threshold. If no thresholding was applied, consider this a false positive.
Zero intensity values in scans¶
0 intensities in scans.
This error occurs when converting files using an old MSConvert version and the "Peak picking" filter being used after the "title maker". This caused the wrong peak picking algorithm to be used and not just adds zero values but also causes falsely recognised m/z values. We highly recommend to re-convert the files with the most recent MSConvert version.
Report issues on the MZmine GitHub, providing all information to reproduce the issue.
This might include
- Input data? provide example file
- ** Batch file** defining processing steps and settings
- attach the log file located in the user folder: mzmine_0_0.log
- Expected behavior
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816587.89/warc/CC-MAIN-20240413083102-20240413113102-00091.warc.gz
|
CC-MAIN-2024-18
| 2,218
| 22
|
https://softwareengineering.stackexchange.com/questions/158908/why-null-pointer-instead-of-class-cast/158910
|
code
|
int count = (Integer) null;
throws a java.lang.NullPointerException.
Why doesn't this throw a Class Cast Exception for ease in programmer understanding?
Why was this exception chosen over any other exception?
Software Engineering Stack Exchange is a question and answer site for professionals, academics, and students working within the systems development life cycle. It only takes a minute to sign up.Sign up to join this community
When executing your code, the Java runtime does the following:
In other words, null can be cast to Integer without a problem, but a null integer object cannot be converted to a value of type int.
I had a related question a while ago at Stack Overflow, see here.
Java successfully casts null to an Integer reference that references no object.
That's OK because being unistantiated is a valid state for a reference.
It's the calling of a method of a non existing object that can't be performed.
Performing the cast
(Integer)null is the same as declaring an Integer variable and then failing to assign it an new (or already existing) Integer object instance.
To unbox a
Integer into a
int i.e. in
int i = new Integer(15);,
i actually equals
i = (Integer) o; where
Object o = 15 is the same as
o = Integer.valueOf(15); but
i = null; throws an
i then equals
null.intValue() which throws a
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102697.89/warc/CC-MAIN-20231210221943-20231211011943-00032.warc.gz
|
CC-MAIN-2023-50
| 1,317
| 24
|
https://codecapsules.io/docs/deployment/how-to-deploy-flask-mysql-application-to-production/
|
code
|
How to Deploy a Flask MySQL Application to Production on Code Capsules
Deploy a Flask MySQL application and learn how to host backend code on Code Capsules.
Code Capsules connects to GitHub repositories to deploy applications. To follow this guide, you’ll need a Code Capsules account and a GitHub account.
To demonstrate how to deploy a Flask MySQL application with Code Capsules, we’ve provided an example application which you can find on the Code Capsules GitHub repository.
Sign in to GitHub, and fork the example application by clicking "Fork" at the top-right of your screen and selecting your GitHub account as the destination.
Create the Capsules
A Capsule provides the server for hosting an application on Code Capsules.
Navigate to the "Spaces" tab and open the Space you’ll be using.
Click the "Create a New Capsule for Your Space" button, and follow the instructions below to create a Data Capsule:
- Choose "Data Capsule".
- Under "Data Type", select "MySQL Database Cluster".
- Under "Product", select "Standard".
- Click "Create Capsule".
Navigate to the "Space" containing your recently created Data Capsule and click the "New Capsule" button. Follow the instructions below to create a Backend Capsule:
- Choose "Backend Capsule".
- Under "Product", select "Sandbox".
- Choose the GitHub repository you forked.
- Press "Next".
- Leave "Run Command" blank.
- Click "Create Capsule".
Code Capsules will automatically build your application when you’ve finished creating the Capsule. While the build is in progress, you can view the log by clicking "View Build Progress" next to the "Building Capsule" message.
Once your application is live, you can view the build log by selecting the "Deploy" tab and clicking the "View build log" link in the "Builds" section.
Binding the Capsules
After the two capsules have been successfully built, the next step is to bind them together. To do this, navigate to the "Configure" tab of your Backend Capsule. Scroll down to the "Bind Data Capsule" section and click on the "Bind" option in the bottom left. This provides the capsule with information on how to connect to the MySQL database.
DATABASE_URL Environment Variable
Once the binding is complete, you have to append
mysql in the
DATABASE_URL value under the "Capsule parameters" section on the "Configure" tab.
Confirm your changes by clicking on "Update Capsule" then restart your capsule by toggling the radio button in the top right off and on again.
After restarting the capsule, the application will now be ready to be viewed. Click the "Live Website" link at the top of the capsule tab and you should see your deployed application.
If you’d like to deploy another application in a different language or framework, take a look at our other deployment guides.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948708.2/warc/CC-MAIN-20230327220742-20230328010742-00395.warc.gz
|
CC-MAIN-2023-14
| 2,782
| 31
|
http://www.scicomp.dk/tags/info/
|
code
|
Welcome to my homepage where you will find examples and explanations of what I am doing. It also serves as the playground for various experiments. In addition to this web site, standard email and snail-mail you can reach me through a number of other means. I have collected some of the places that I use which also includes some kind of social dimension: email@example.com GithubVarious spare time projects Facebookhttp:s//www.facebook.com/michael.jacobsen Twitter@jackson_dk Skypejackson_dk4799 Last.
Basics Full name: Michael Jacobsen Born March 13, 1976 in Copenhagen, Denmark. Address: Åmosevej 32, 2610 Rødovre. Education Ph.D at the Technical University of Denmark (2000-2003). Title: “Modular Regularization Algorithms” M.Sc in Engineering at the Tecnical University of Denmark (1995-2000). The major projects were Master thesis: “Two-Grid Preconditioners for Discrete Ill-Posed Problems” (pdf) Midway project: “Image Restoration using the PP-TSVD” (pdf) “Fagpakke” project: “Fractal Image Compression” Employment History Principal Software Engineer (2014 - 2021) at Kofax.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711162.52/warc/CC-MAIN-20221207121241-20221207151241-00213.warc.gz
|
CC-MAIN-2022-49
| 1,102
| 2
|
https://saltybunny.com/
|
code
|
Welcome to Salty Bunny Game Studio!
I am a Indie Game Maker and Develop my games mostly on my own in my free time. I will start showcasing my games soon. But in the mean time please make sure to subscribe to my Email List. This way I can send you a notification when a new portion of the site is ready!
Stay tuned and thanks for stopping by!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998473.44/warc/CC-MAIN-20190617103006-20190617125006-00505.warc.gz
|
CC-MAIN-2019-26
| 341
| 3
|
https://makezilla.com/2016/02/04/making-the-internet-more-tangible-using-a-spark-core/
|
code
|
The Internet is great, but it's not perfect.
While it succeeds at overstimulating some of our senses, it completely lacks the human senses of touch and smell, which are important parts of our communication rituals.
The SparkVibe tries to bridge the gap between online touching, and real touching, by connecting a vibrating motor to my facebook profile, using aSpark Core controller.
Step 1: Setting up the Spark Core
The dudes at Spark have a pretty good guide on their site, but it requires using a phone app, and some other software I didn't feel like using. This will step you through setting up a Core using the USB cable, and the Arduino serial monitor.
What you'll need for now:
- Spark Core
- USB cable (A male to B micro)
- An account at the Spark site.
After you plug your Spark Core into your computer using the USB cable, it will flash all kinds of colors, and hopefully settle into a blue breathing pattern. That's its WiFi setup mode. If it doesn't breathe blue, or if you need to re-setup WiFi later, just hold down the mode button on the Core for 3 seconds, and it should go into blue-breathing-WiFi-setup mode.
Once it's breathing blue, open the Arduino IDE, select the Core from the Tools-> Serial Port menu (should be something like tty.usbmodem1411 on a mac or linux). Open the serial monitor. Make sure baud rate is set to 9600, and type i (the letter i) into the terminal and hit enter. You should see something like this on the terminal monitor:
Your core id is 48fff6765069875032183387
Copy that id somewhere.
Now, the somewhat tricky part. Make sure No line ending is selected in the drop-down menu next to the baud rate in the serial monitor window, and type w (the letter w) into the terminal input box, and hit enter. You will be prompted for your WiFi network id. Before you type the name of your network id, change the line ending option from No line ending to Newline. Type the name of your network and hit enter. You will be prompted for the network password. Type that in, and hit enter.
If everything goes ok, the Core will blink all kinds of colors, cyan, green, magenta... but not red. If it's red it's not on the network, and you should repeat the previous step.
If it is on the network, go to the Spark site to claim your core. Login. Then, on the menu on the left, chose the second option from the bottom (the symbol looks like a target scope), and then Add New Core. Enter the device id that you got from the serial monitor, and Claim a Core.
Step 2: Build a circuit
Now that we have a Core set up, we need to attach something cool to it. Why not make it vibrate? What other kind of actuator says "I poked you" more clearly than a vibrator?
- 1 Spark Core
- 1 vibrating motor
- 1 NPN transistor (I used a 2n2222)
- 1 680-ohm resistor
- 1 22-ohm resistor
Build the circuit following the schematic. Make sure to connect the input of the circuit (the resistor at the base of the transistor) to pin D0 of the Spark Core.
When the circuit is ready, you can flash the Core with the SparkVibe Spark Core code.
To flash the core, go to the Spark build site, chose your core from the Coresmenu (the one that looks like a target scope), then go to the Code section by clicking on the menu item that looks like this < >. Create New App, name it whatever you want, and paste the SparkVibe Spark Core code in the editor. Click the lightning bolt icon at the top of the menu on the left, to actually flash the code to your core. This can sometimes take a while... ... .... . . ... .. . .... .. . ....
While you're waiting, you might want to read up on the Core's cloud functions. The magic piece of code on the core is the line that says:
This exposes a function from the Core code, called pokeFunction, to a web API. Now we can call this function from anywhere in the web, by accessing a url that looks like this:
Step 3: Run a script
And this is where we will access that url.
We will use a small Python script that will connect to our facebook profile, and forward certain signals to the Core, using that function call.
This small script will do just that. It will prompt you to log into your facebook account, and then it will forward any unanswered pokes you have, and any new pokes, to your Spark Core.
Make sure to change the SPARK_DEVICE and SPARK_TOKEN variables to reflect your own device id and access token. Both of those things can be obtained from the Spark build site: Device ID is under the Cores menu, and Access Token is under the Settings menu (the last one on the left, with the sprocket icon).
Run the script on your local machine, or on a server somewhere, and as long as your Spark Core is plugged in and on the Internet, it will turn your pokes into physical vibrations.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989637.86/warc/CC-MAIN-20210518125638-20210518155638-00190.warc.gz
|
CC-MAIN-2021-21
| 4,719
| 34
|
https://drmaciver.substack.com/p/fragments-intellectual-diy
|
code
|
Some more fragments today, loosely centred around some thoughts that I haven't quite been able to weave together into a full essay. Maybe you can fill in the blanks.
A Conversation with my Father
Last year I had a conversation with my father in which he said how impressed he was with my memory and general breadth of knowledge and intellectual achievement, and that he could certainly never do anything like that.
I expressed polite scepticism at this claim and pointed out that his sheer breadth of practical knowledge far outstripped mine. He seems to know everything about DIY, and is generally prepared to wade in and do a good job on just about anything you might expect to do around the home, from heat pump engineering to building furniture. He's been building some stairs recently, as one does. He is finally starting to come around to the idea that maybe he doesn't have to do everything himself, but generally it's not a question of whether he can do it himself, but whether he can do this thing and all of the thousand other tasks he's taken on. This is of course all before we even start on his actual professional skill set (he was a banker before he retired).
He objected that this was not at all the same thing - he just figured things out as he went and refined his skills over time in the course of doing them. He didn't necessarily remember all these things, he just started with the problems he was trying to solve, had the confidence to try things out and see if they worked, and practiced them until he got the knack of it, and then builds on that prior experience for future problems.
“Well yes”, I said. “How do you think I do it?”
Science and Engineering
I find it's very useful to have what I call idiosyncratic distinctions. Ways of distinguishing between two things that don't necessarily perfectly map onto common usage but more or less convey the right idea and are helpful for you.
For example I've written about an idiosyncratic distinction between anxiety and worry before, which is that it's worry if the negative emotion attaches to a particular outcome (“I am worried about this concrete bad possibility”) and it's anxiety if it attaches to the uncertainty over which outcome might occur (“I am anxious about this job interview even if I know I'll be fine if I don't get the job”).
Another idiosyncratic distinction I use is between science and engineering. It's science if you're trying to learn something true, it's engineering if you're trying to achieve something.
Of course, there are plenty of ways of trying to learn something that aren't science, and plenty of ways of trying to achieve something that aren't engineering. Also you learn things while doing engineering and achieve things while doing science. But it's still a useful distinction for cases where you find yourself wondering whether something is engineering or science.
One way this definition makes itself apparent is in the success criteria. “It works but I don't know why” can be a success if you're doing engineering, or a failure if you're doing science.
One thing this helps make sense of is why engineering often seems to precede science rather than the other way around as is commonly supposed. One of my favourite examples of this is the argument that Charles Darwin figured out his theory of natural selection because the British agricultural revolution had already figured out how to do selective breeding and worked backwards from there (cf. British agricultural revolution gave us evolution by natural selection).
Why would we expect this to happen given this distinction? Well because it's much easier to accidentally stumble upon something that works and then figure out how it works later than vice versa. You can see this, for example, in the gradual refinement of our material science. We were using steel for thousands of years before we ever knew what was going on (cf. The Entire History of Steel).
Of course, modern steel is much better than historical steel, and a lot of that is that we did science to the problem. We now know much more about chemistry in general and carbon and iron in particular, and this informed the invention of the Bessemer process, which is absurdly simple once you know how to do it. Not necessarily easy, but if you'd given that knowledge to someone two thousand years ago I bet they'd have eventually figured out a way to make it work.
Most progress we make is this sort of back and forth between something that is roughly science and something that is roughly engineering - alternating layers of doing things and figuring them out. In the course of doing one, we necessarily defer to the other - we can only perform experiments by way of engineering, and when engineering things we need to know things - but we are nevertheless shifting back and forth between the two modes.
Evolution and Design
Evolutionary biologists tend to get very affronted when people talk about evolution as design. Evolution does not sit down and decide what end goal it wants to achieve and work on a plan towards that. It starts from what it has, and tries variations on it, and discards what doesn't work and keeps what does, for a complex definition of “work” that is highly dependent on the context - what resources are available, what risks are present, the competition with other actors in the space, etc.
Which is to say, evolution is exactly like design.
In “Where Good Ideas Come From”, by Steven Johnson, he explores this analogy in great depth, drawing on Stewart Kauffman's idea of “The Adjacent Possible” of an evolutionary system - the set of things that can be generated from what is currently available. In biology, this is the range of possible next generations. In science, it is the set of things that can be discovered based on what we already know. In engineering, the set of things you can build.
Evolution proceeds by drawing from the adjacent possible, retaining what works, and discarding what does not. This is true for biological evolution, and it's just as true for ideas - science and engineering included.
Because science and engineering are so tightly intermingled we can look at them as two co-evolving systems, each informing the adjacent possible of the other. What we know defines what it is possible to build, what we build defines what it is possible to know.
The process is more directed than biological evolution of course. We don't just explore the adjacent possible at random, we purposefully explore it to find the things we are looking for, but it still retains much of the messy and iterative nature of biological evolution.
Engineering as Bricolage
In The Savage Mind (1962), the French anthropologist Claude Levi-Strauss used the word bricolage to describe the characteristic patterns of mythological thought. Bricolage is the skill of using whatever is at hand and recombining them to create something new. Levi-Strauss compares the working of the bricoleur and the engineer. The bricoleur, who is the “savage mind”, works with his hands in devious ways, puts pre-existing things together in new ways, and makes do with whatever is at hand. (...)
As opposed to the bricoleur, the engineer, who is the “scientific mind”, is a true craftsman in that he deals with projects in entirety, taking into account the availability of materials, and creating new tools. Drawing a parallel, Levi-Strauss argues that mythology functions more like the bricoleur, whereas modern western science works more like an engineer. He suggests that the engineer creates a holistic totalising system, in which there are elements of permanence.
A bricoleur doesn’t care about the purity or stability or ‘truth’ of a system he or she uses, but rather uses what’s there to get a particular job done.
Somewhat unsurprisingly a significant amount of the ethnography of work has taken Levi-Strauss's notion of bricolage (which is basically just a fancy french word for DIY) and gone “Oh yeah that's a great description of how actual engineering works, thanks” and run with it. The distinction between bricolage and engineering is based not on actual engineering but on the collective fictions we tell about how engineering works (cf. A Fractal of Lies).
If bricolage is the assemblage of what is to hand to solve the problem in front of us then all problem solving is bricolage. The bricoleur (one who engages in bricolage) simply builds on their existing body of capabilities and explores the adjacent possible of solutions to it until they find what they need.
For example, from “Working Knowledge: Skill and Community in a Small Shop” by Douglas Harper (page 74):
Willie [the subject of the book], improvising with the odds and ends that drift down to him or come through barter, is the very embodiment of Levi-Strauss's bricoleur:
Consider him at work and excited by his project. His first practical step is retrospective. He has to turn back to an already existent set made up of tools and materials, to consider or reconsider what it contains, and above all, to engage in a sort of dialogue with it, and before choosing between them, to index the possible answers which the whole set can offer to his problem. ...
...the rules of his game are always to make do with “whatever is at hand,” that is to say with a set of tools and materials which is always finite and is also heterogeneous because what it contains bears no relation to the current projects or indeed to any particular project, but is the contingent result of all the occasions there have been to renew or enrich the stock or to maintain it with the remains of previous constructions or destructions. ...
He does not confine himself to accomplishments and execution; he “speaks” not only with things... but through the medium of things; giving an account of his personality and life by the choices he makes between limited possibilities. The bricoleur may not ever complete his purpose but he always puts something of himself into it. (1966, 21)
There are several important ideas in these passages. The bricoleur is presented first as a thinker: considering, reconsidering, always with a view to what is available, what is at hand. The emphasis is correctly on the mental side of the dialectical process, which Levi-Strauss calls a dialogue.
The observation that the set of tools and materials is the sum of all previous projects, and that it will be summoned to the task at hand and enlarged once again with the materials left over from the current project, captures the sense of a shop operation and of forming one's own material world through the creative use of what simply builds up during the process of work. This of course is in contrast to the idea of assembling one's tool and materials and then adding to them to fit a preconceived and definitive plan or blueprint.
Finally, Levi-Strauss indicates that in his work the bricoleur defines and extends himself. It is not only that the work solves material problems, but also that one's life choices take on the same characteristics as the decisions made in the course of work. It is in the replication of the means that the material work influences the mental.
Willie, who runs a small shop repairing all sorts of machines (mostly vehicles and agricultural equipment) is engaged in a constant process in which he both solves the problems in front of him and expanding his capabilities for solving problems in the course of doing so. He is an engineer, in the sense that he is trying to achieve a specific result, but the process by which he does so is one of pure bricolage, the skill of using whatever is to hand.
We are all engineers
In “Invitation to Personal Construct Psychology”, Trevor Butt and Vivien Burr talk about George Kelly's theory of personal construct psychology and his view that people are (page 3):
like scientists in that their actions are guided by the theories they hold about themselves and those around them; the questions they are currently asking. These questions or theories are the person's bridge between their past and their future. They are shaped by experience, provide the framework for future action and are responsible for the particular anticipatory stance we take. They alert us to some events and blind us to others, “Who is going to be the boss in this marriage?” is a question that one partner may be silently posing without realising that this is simply not an issue for the other. However, this wont' stop the first partner from interpreting or construing the actions of the other in terms of their guiding question.
This brings us to the notion of good and bad questions. Just as some theories are more useful than others in helping us to explain ane vent in physics or chemistry, so the theories with which we approach our personal world cannot be said to be true or untrue; some are more useful than others. Good questions give us answers we can use, some idea of what to do, how to deal with something, how to react to someone. Bad questions lead to unhelpful answers, they are simply not suited to the issues we face. “Are you for me or against me?” might be useful in war or competitions, but in the context of most other interpersonal relationships it will lead to frustrating and restricted answers. Bad questions lead to people being stuck in unhelpful and demoralising cycles of experience.
In the idiosyncratic distinction we are drawing between science and engineering, what George Kelly (by way of Butt and Burr) is describing is not people being scientists but engineers. We are not trying to know things because we want to know things, but because we are trying to achieve something: Living our lives. The questions we ask are not designed to determine some sort of universal truth, but only to aid us in our practical and emotional goals (cf. Life-Complete Problems)
There is a good paper by David Chalmers called “What is Conceptual Engineering and What Should It Be?”. There is also a good (and somewhat brutal) discussion of this paper by Suspended Reason called Conceptual engineering: the revolution in philosophy you've never heard of.
David Chalmers argues that conceptual engineering, which he provides a working definition as “the process of designing, implementing, and evaluating concepts” (a definition he derives by looking up the definition of engineering and “applying compositionality”), is a key part of philosophy, and a key role for philosophy in general. I'm a fan of his examples from social philosophy (partly because I'm a fan of the things cited, partly because I think it's useful to think of them as conceptual engineering):
In social philosophy you find this kind of thing all the time. People use engineered concepts to point to phenomena that may have been overlooked, or to draw distinctive concepts out of strands of discussion. Miranda Fricker’s work on epistemic injustice and its varieties like testimonial and hermeneutic injustice, would be a paradigmatic example here of drawing out a fruitful concept. Sally Haslanger’s work on gender and race is another. A paradigm example would be her work towards the analysis of the concept of woman in terms of oppression. What Haslanger calls ameliorative analysis is conceptual engineering in the revisionary mode to serve various ends, including the ends of social justice. This ameliorative strand of conceptual engineering has been picked up by many other people in recent social philosophy. Kate Manne’s revisionary analysis of misogyny is an example.
In turn, Suspended Reason argues that David Chalmers doesn't understand engineering and his failure to understand engineering is emblematic of the weaknesses of philosophy in general:
This doesn't seem like a bad definition, you protest, and it isn't. But we were never looking for a definition. That's the realm of conceptual analysis. We quit that shit alongside nicotine, back in the 80s. Alright, so what are we trying to do? We're trying to solve a problem, multiple problems actually. The original problem was that we had concepts like "meaning" and "belief" that, in folk usage, were vague, or didn't formalize cleanly, and philosophers quite reasonably intuited that, in order to communicate and make true statements about these concepts, we first had to know what they "were." (The "is" verb implies a usage mission: description over prescription.) The problem we are trying to solve is, itself, in part, conceptual analysis—plus the problems conceptual analysis tried originally to solve but instead largely exacerbated.
This, not incidentally, is how an engineer approaches the world, how an engineer would approach writing Chalmers's lecture. Engineers see a problem and then they design a solution that fits the current state of things (context, constraints, affordances) to bring about the desired state of affairs.
Chalmers is just an analyst, and he can only regurgitate definitions like his analyst forbearers.
Suspended Reason's critique of the paper in general is harsher than I would be, but not I think unfair, I just tend towards charitable reading of things (Eric Schwitzgebel thinks I shouldn't do this, but he and I are engaged in different projects. Charitable reading is bad if you want to know what the author thinks, and of mixed benefit if you want to challenge your own thinking on the subject, but often good if you want to generate your own useful thoughts).
This idea of conceptual engineering is still useful though (and I don't think Suspended Reason disagrees at all, he just thinks Chalmers has got entirely the wrong idea about it), and Kelly's notion of personal construct psychology I think points at why: To the degree that we are investigating and trying to solve our own problems in life, we have to ask good questions, and the questions we can ask are very dependent on the concepts that are available to us. Conceptual engineering is the art of ensuring that our conceptual toolkits are sufficiently rich to ask good questions.
You might have noticed that to the degree that there is a single thing that I am talking about in this newsletter issue, it is the thing that I am doing right here on the page: Drawing together material from a variety of found sources in order to help understand our lives.
This isn't so much deliberately self-referential as the inevitable result of my trying to explain my primary mode of thinking and working - I don't think what I do is actually as hard as it seems, and I'd like to show how it works.
I'm not sure this post was it, but hopefully some of the found pieces lying around my intellectual workshop were interesting.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474581.68/warc/CC-MAIN-20240225035809-20240225065809-00873.warc.gz
|
CC-MAIN-2024-10
| 18,675
| 55
|
https://talkaboutthatpodcast.com/episode/cliffhangers-contact-lenses-and-cancer-scares-episode-222/
|
code
|
Today on Talk About That, we try to remember who shot J.R. on the 80’s TV show “Dallas”. Then, Jonnie has a strange encounter with two artists while out biking 🚴♀️ , and remembers a time when people were shamed for having brown eyes 👀.
Meanwhile, John is upset about the state of modern sweatpants (and his tiny legs 🐓), and gives a harrowing update about his recent health scare.
Today’s episode is NOT sponsored by Faxes 📠®️: “Like an email, but with 100% more garbage 🗑.”
FOLLOW @jonniewcomedy: https://linktr.ee/jonniew
FOLLOW @johndriver: https://linktr.ee/johndriver
Listen now on any platform at http://talkaboutthatpodcast.com
See omnystudio.com/listener for privacy information.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510462.75/warc/CC-MAIN-20230928230810-20230929020810-00073.warc.gz
|
CC-MAIN-2023-40
| 721
| 7
|
https://martink.me/articles/looking-forward-to-hackference-2017
|
code
|
I'm very proud to announce that for the third consecutive year, Microsoft are sponsoring Hackference 2017.
It is always a fantastic event; the speaker line-up looks amazing this year and i'm sure there will a lot of awesome projects born at the hackathon over the weekend.
Last year, we awarded our main prize to a team who created a fully autonomous self-driving radio controlled car using Microsoft Computer Vision APIs running on a Raspberry Pi running Windows 10 IoT Core.
We are looking forward to seeing if anyone can do better this year!
Specifically, we'll be looking for
We'll be giving away a Sonos Play 1 to each member of the winning team.
In order to use Cognitive Services and/or the Bot Framework you'll most likely need an Azure subscription to help with hosting and provisioning of services.
You can always create an Azure Free Account but that will require credit card details to get started (it is free, but need details for verification). If you'd prefer not to use your credit card details, we have some special Azure Passes which you can claim at http://aka.ms/AzurePassManager, look out for some communications (probably an email or slack message) from the Hackference organizers about how to claim you code.
This year I'll be joined by Maria Vrabie.
Maria and I will both be there for most of the hack weekend to help you get started with your projects and answer any questions you may have. I'll be there for the conference on Friday too.
I'm really looking forward to Hackference this year, I'll see you there
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818468.34/warc/CC-MAIN-20240423064231-20240423094231-00403.warc.gz
|
CC-MAIN-2024-18
| 1,535
| 11
|
https://www.usabilityprofessionals.org/upa_conference/app/schedule/show_detail/10195/for:2009
|
code
|
Usability Professionals' Association
2009 International Conference
Bringing Usability to Life
Making everyday things better
Is your development team moving toward Agile? How can the User Experience team keep up in this fast-paced, iterative world? Must usability be sacrificed? Absolutely not! In this presentation, you will learn three techniques for adapting usability methods to work with Agile, and take away examples of Agile usability deliverables.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537804.4/warc/CC-MAIN-20140416005217-00439-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 454
| 5
|
https://www.404techsupport.com/2010/01/30/is-your-firefox-genuine-phishing-at-its-phinest/
|
code
|
Do you have a genuine version of Firefox installed? Did it install a bunch of malware alongside your browser? Is Microsoft allowing this to sabotage your first impression of Firefox? The browser wars are getting ugly. Why isn’t Mozilla doing anything to stop this phishing attempt that is ruining their good name and adding more machines to the botnet?
You have a brand new computer and you’re trying to get it all set with your software and preferences. You fire up Internet Explorer to do the one thing it’s good at: Download Firefox when you don’t have any other browsers to choose from. You type ‘firefox’ in the address bar or in the search bar and by default it takes you to search results on Bing. You’re distracted, trying to setup other things, so you click the top result without paying careful attention to it. In hindsight, you’ll realize this was a mistake because the “top result” is a Sponsored Site and not a true result.
The link you clicked still takes you to a page that looks pretty similar to the normal Firefox webpage. It has the latest version you’ve been hearing about, version 3.6. Something still doesn’t feel right, but again, hindsight.
You try to put these paranoid thoughts out of your head, maybe you just left the stove on at home or something else equally harmless. It’s not the fact that you’re about to infect your brand new computer within 5 minutes of unboxing it with over 200 infected files. So, you click the download button.
The download seems a bit odd. “I know Mozilla has mirrors all around the world, but pinballpublishernetwork.com seems odd. Hmm… the downloaded file is only 293 KB even though it says it’s 7.7 MB. Ah well, maybe it’s compressed.” Let’s hit the Run button so we can stop having to use IE!
As it downloads, you start to daydream… Isn’t this what the normal download looks like?
Ding! The download finishes. No more time for daydreaming.
Whoa! McAfee detected some Adware. I really need to get off Internet Explorer!
Even Windows Defender is getting in on the action. Firefox here I come!
Let’s get to the faster, safer, smarter, better browser. Launching the installer, we see…
Well that doesn’t seem right, but maybe things have changed and Mozilla is trying to make more money in these hard economic times. Let’s continue and sure, go ahead and include the latest ShopperReports thingy…
We run through the install and it installs a few things like Seekmo and ShopperReports before getting to the Firefox setup.
Before the Firefox setup even begins we can see two icons were added to the system tray. The one on the right is some weather gadget and the icon on the left promises FREE games, videos, emoticons and more! Firefox is getting better and better!
Coming to my senses, things don’t seem right. A bunch of Browser Helper Objects were installed in IE as part of installing Firefox. That doesn’t make sense.
Even though Firefox installed correctly, it has a suspicious Seekmo plugin installed already.
Things don’t smell right, so I decide to scan my brand new computer with my favorite anti-malware tool, Malwarebytes. Updated to the latest version, running a quick scan reveals 206 infected objects. Not bad for completely infecting a machine 15 minutes out of the box, Seekmo, not bad at all.
Looking at the results, we can see a variety of malware vendors have made your computer their home. If you’d like to see the log of all the objects Malwarebytes detected, you can download the log (.txt).
The Reality of the Situation
Some facts about this infection:
I tested this malware on a virtual machine that was a clean Vista install with Avast! antivirus, Firefox, Java RE, and Adobe Flash installed with the latest Windows Updates. Beyond that, it was pretty bare bones. The McAfee screenshot is of when I first detected this site on another computer.
In order to get infected, I had to disable Avast! antivirus and tell Windows Defender to ‘Ignore’ the alert at least 3 times. These steps are not likely to be required in the case on a new computer however.
The top result was a Sponsored Link hosted through Microsoft Advertising to hxxp://Firefox.io. I highly discourage anybody from going to that site. There is live and active malware available for download through that site. You should always verify that the URL matches the site you expect.
The original download was only a couple hundred KB so it must download the real Firefox setup in the middle of the Seekmo installation.
I hoped to be able to contact Microsoft to have them pull the ad, but I was unable to reach anybody “for reasons beyond their control.” I don’t know what leverage I would have in getting the site shut down, but Mozilla should have some pull because of trademark infringement. I’m not too optimistic because they’ll just move to a different URL and find a new way or ad publisher to trick people into visiting that site. At least if Microsoft will blacklist the ad, it will prevent most people from reaching the site.
If you’re looking to download Firefox, visit: http://www.mozilla.com/en-US/firefox/
Update: I was able to work with the host and take this malware-serving site down.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510412.43/warc/CC-MAIN-20230928130936-20230928160936-00047.warc.gz
|
CC-MAIN-2023-40
| 5,220
| 26
|
https://salesprocessengineering.net/2008/07/07/why-accurate-estimating-may-be-costing-you-sales/
|
code
|
Years ago, I remember consulting to a small printing firm.
As is often the case in job shops (make-to-order manufacturers), estimation was the system constraint.
Obviously, this wasn’t a good thing. It meant that customers wanted to buy printing; that production had the capacity to fulfill their orders; but that estimating was limiting the flow of Throughput (contribution margin).
Increasing the flow of estimates would provide two benefits:
- It would release a bunch of work into production (where it could be converted into Throughput)
- It would increase the conversion rate (in a high-volume job shop like this, estimation lead-time is a major influencer of conversion rate)
The temptation was to add another estimator. But before we did this, we took some time to observe the estimation function in the context of the wider sales process.
Here’s what was happening:
- Customers would provide salespeople with a request for quote (RFQ)
- The RFQ would sit in a queue for days, and then the estimator would spend a disturbing amount of time costing the job (on a cost-plus basis)
- Salespeople would provide the estimate to clients and then negotiate the price quoted down to market value!
We realized that it simply didn’t make sense to dedicate all that time to the generation of estimates. The firm had production capacity. Within reasonable limits, any work that would generate Throughput was good work!
For that reason, we changed the estimation priorities to:
- Cover raw-material costs
- Win the work
- Generate as much Throughput as possible
Then, to jump-start the process, we got the CEO to make a simple commitment. Each day, before leaving work, the CEO promised to check the estimator’s in-tray. If it contained any RFQ’s that had been received after 3:00 pm, the CEO would *guess* the market value of the job and scribble it on the estimate! These guesses would be transcribed and dispatched first thing the next morning. (The CEO agreed that, with his experience, the guesses would be ‘good enough’.)
The result was that estimates were turned-around in hours, instead of days. The conversion rate increased. Production became busy. And the firm developed a reputation for speed (which, in that industry, is a valuable reputation to have).
Obviously, this approach conflicts with estimators’ cost-plus view of the universe. But the reality is that prices are not determined by estimators; they are determined by the market. It’s better, in most cases, to design a quick-and-dirty estimation process and then have your salespeople negotiate the final price.
In a job-shop environment, we tend to encourage clients to quote a couple of prices, each with different lead times. That way clients can pick their own price (more often than not they’ll elect to pay a premium for a shorter lead-times).
So, how do you calculate the price?
First, you need to accept that accuracy is a mirage. The market sets prices; you don’t. You just need to arrive at a number that:
- Covers your raw material costs, and
- Provides a return on your constraint (capacity-constrained resource) that is comparable to (or greater than) other jobs that you have the opportunity to run in place of this one, and
- Represents good value to your prospective customer
You need a method for estimating that is designed around these requirements. Not a method that’s designed for accuracy.
Often the best approach is to start with a representative set of jobs that you believe have been priced sensibly in the past and then devise a means to adjust the price of these representative jobs to allow for variations.
Fortunately, if you do an analysis of the relationship between the attributes of your set of jobs and the impact each attribute has on the price, you’ll discover that Pareto is at work here. There is only a small number of attributes that impact meaningfully on the price, meaning the rest can be ignored when you create your pricing model.
This approach is a little more structured than the let the CEO guess the price method. And it will enable you to immediately eliminate your estimating bottleneck, win more jobs, and get those jobs into production.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100081.47/warc/CC-MAIN-20231129105306-20231129135306-00634.warc.gz
|
CC-MAIN-2023-50
| 4,181
| 29
|
http://forum.xbmc.org/printthread.php?tid=86501&page=66
|
code
|
[WIP] The Paper Street Soap Company (mockups and development of a new skin concept) - Printable Version
+- XBMC Community Forum (http://forum.xbmc.org)
+-- Forum: Development (/forumdisplay.php?fid=32)
+--- Forum: Skin Development (/forumdisplay.php?fid=12)
+---- Forum: WIP Skins (/forumdisplay.php?fid=160)
+---- Thread: [WIP] The Paper Street Soap Company (mockups and development of a new skin concept) (/showthread.php?tid=86501)
- blacklist - 2011-02-19 23:19
theuni Wrote:@blacklist: Great to hear we're on the same page. We do not allow scripts to be packaged with in-repo skins for a variety of reasons, so as long as you have that in mind while dev'ing, it sounds like it won't be an issue.
*runs and hides*
Now, that's the development copy, and there are some things that we can pull out and offer as optional additional downloads (for instance backgrounds - we have a skin option of 25 custom backgrounds that are user configurable).
There are some additional audio files and such that can come out too... but even at HALF that size, it will be the largest skin XBMC has seen yet.
EDIT: I don't think that number is right. Can't possibly be, but its the one the svn is reporting. I'll get the right one when I get home in front of it. Maybe one of the other guys can correct me, because that number is insane.
- ppic - 2011-02-19 23:33
well, as far as i see, there's lot of images included that will not be part of the skin release.
for now, my svn skin folder goes to 355mb.
@blacklist, please follow me your change, will save me time
- blacklist - 2011-02-20 00:28
ppic Wrote:@blacklist, please follow me your change, will save me time
No problem, but its literally changing one number from 25 to 75
- ronie - 2011-02-20 05:01
theuni Wrote:So, could you enlighten me as to whether you are including scripts with the skin, or if you're using other scripts from the repo? I'd like to get a dialog going to avoid any confusion later.
it may be a bit early to discuss things since 'we've only just begun'...
but i'm well aware of the do's and don'ts when in comes to the official repo ;-)
no scripts we use will be included in the skin. all scripts will be committed to the repo separately and are suitable for any skin to use.
also, everything will be open-source and we've kept our eye on licenses right from the start.
the only point of discussion, as far as i can see now, will be the size.
we code everything in 1080i, which means textures will be 1.5 times bigger than the ones in all the 720p skins....and we're fairly heavy on texture use too.
can't give any exact figures on we're we will end but somewhere between 100-150Mb (uncompressed) would be a rough estimate.
anyway, i'd be interested to find out why there's a limit on skin size in the addon repo and if there's any concrete plans to allow for 'image pack' addons, like those studio icons or weather fanart packs.
that would certainly cut down the size of this (and many other) skins.
- blacklist - 2011-02-20 05:29
ronie Wrote:it may be a bit early to discuss things since 'we've only just begun'...
What he said
- blacklist - 2011-02-20 17:46
VERY VERY early work in progress... need some opinions to continue or trash the idea.
Ok, I need some opinions. What do you guys think about this view? Right now I've got it targeted to an episode view, but I can see other places where we could use it. Is it too strange to mix media like this?
- Harro - 2011-02-20 17:57
I like the view but what would be cooler IMO is using the bubble texts to display a line from said episode or source. I also had been thinking about a skin with the cartoon book feel through out, but i have no skillz.
- pieh - 2011-02-20 18:09
theuni Wrote:@blacklist: Great to hear we're on the same page. We do not allow scripts to be packaged with in-repo skins for a variety of reasons, so as long as you have that in mind while dev'ing, it sounds like it won't be an issue.if You already step by here, then I'd like to ask quick question submiting addons to official repo (this kinda is realated to this topic as this skin use these addons I want to ask about):
I'm developing python rss client for xbmc and I have 3 seperate addons for this:
While it isn't quite ready to push it to official repo, I created my dev repo on github that currently also function as unofficial addon repository: https://github.com/pieh/pieh-xbmc-addons .
Now the issue: As far as I know with git You must clone entire repository, right? Is there any way to deal with it as it is now or will I have to break these addons to seperate git repositories so I can request pulling to official addon repo?
Sorry for offtopic.
- stoli - 2011-02-20 18:21
@grajen3 - you're better off, and more polite, to ask that in a new thread in the python/script dev forum.
@blacklist - not so sure about that much intermingling. Is the idea to mesh comics and tv shows? If so doesn't the whole container issue present a problem?
- blacklist - 2011-02-20 18:59
stoli Wrote:@grajen3 - you're better off, and more polite, to ask that in a new thread in the python/script dev forum.
No, not really meshing the two, just creating a comic-like view for tv shows. Each episode is a panel of the comic, and you flip through to select.
Maybe its a little too "out there".
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705956263/warc/CC-MAIN-20130516120556-00033-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 5,271
| 51
|
https://community.carbide3d.com/t/combining-2-c2d-files/7609
|
code
|
Is it possible to combine 2 separate files into 1? I created 2 separate Create files and want only one.
I’m afraid not officially.
There was an app for converting from .c2d to SVG posted to the unofficial Shapeoko Facebook group recently — didn’t do curve objects though — you could use that to make an SVG, then import it.
The other thing to consider would be using a text editor to merge the two files — the .c2d fileformat seems pretty straight-forward, I’ve hand-edited it a couple of times when doing support and it’s worked.
If you wish, mail the two files in to email@example.com and we’ll try to get them stitched together.
After sleeping on it, I remembered that I had used f-engrave to create the curved lettering I am using. So I can just re import it. To bad I just used a placeholder name for the export. And had over written it. That’s how I learn, do over until I get it down pat.
I wrote a simple Python script for it:
You need to install Python 3 first, then you can run it from the command line.
Would be nice if Carbid Create would allow to merge other Carbid Create files with the import button.
Does anyone know where I can find this converter? The FB page seems to have been removed. Thanks!
Woops - ignore me regarding the FB page. I just never use FB and didn’t know what I was doing. The way I was logged in (as a biz), I couldn’t get to the groups area.
I would just delete my previous post, but I want to clear up any confusion I caused.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500080.82/warc/CC-MAIN-20230204012622-20230204042622-00291.warc.gz
|
CC-MAIN-2023-06
| 1,486
| 12
|
http://hutsonartworks.com/bitcoin-verification-not-working-2255.php
|
code
|
Bitcoin verification not working
Can Terry create and bitcoin verification not working raw transactions. One is why we ask you to go your fiat phrase on excessive. When you log Bitcoins, Electrum behaves for every begins that are in your identity in october to convert a new idea. Why times are instant because it varies in conjunction with original-performance data that store the most complicated spikes of the Bitcoin system. How is the communication routed. To nutshell Electrum, adapt install the bitcoin verification not working profitable version. If you do not post the developers of the token, you should thus the binaries yourself, or run the timing from bitcoin verification not working. If you do to pre-generate more thanks, you can do so by business wallet. Unspent revolves can have gone means, much good physical coins and processors. The red hot will help until the gap is forged. One is expected behavior. Enrich for a reason time. An is the penis address and it will be from your appreciating electrum wallet. Nt that your bitcoin verification not working credentials are stored separately from the mining, so you can also remove the old daughter of the hash if your OS registers not do it for you. None, you can make your wallet from its value phrase and straddle a new password. One feature is bad by surprise in recent changes of Decentralization. When you don't an address, the strengths in that address will not be cautious for sending bitcoins.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668416.11/warc/CC-MAIN-20191114104329-20191114132329-00050.warc.gz
|
CC-MAIN-2019-47
| 1,469
| 2
|
https://planetphotoshop.com/progressive-rendering%E2%80%94pause-and-resume.html
|
code
|
Progressive renderingâ”pause and resume
If you've paused your rendering (by pressing the Spacebar) and would like it to resume, select the Resume Progressive Render command from the 3D panel's flyout menu. When the rendering is complete, you'll no longer see the blue tiles getting drawn.
Adobe Photoshop CS5 Extended
By Zorana Gee
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948234904.99/warc/CC-MAIN-20240305092259-20240305122259-00436.warc.gz
|
CC-MAIN-2024-10
| 334
| 4
|
http://www.linuxjournal.com/article/3512?page=0,3
|
code
|
The OpenPhone Project—Internet Telephony for Everyone!
In the traditional PSTN world, the phone companies have a private dedicated network to do all the signaling. Every phone system in the world that wants to interoperate with the rest of the world must use the SS7 network and play by its rules. On the Internet, though, there is no separate dedicated network—control and data signals use the same network. How does signaling work, then? It's not very simple. There are several different ways to get the job done, and several different “standards” in place to provide guidance. This is a simplification of the issues and standards. I refer you to the Resources section for places to obtain more detailed information.
Several standards for Internet telephony are currently in use: H.323, SIP and MGCP are the predominant ones in use now. I cannot hope to provide more than a quick introduction to these protocols, but can certainly provide an overview and pointers to where to learn more.
H.323 is a family of protocols established by the International Telecommunications Union (ITU). It is highly complex, but covers most of what one would want to do with audio-visual conferencing or calling over networks. H.323 arose out of the telecommunications world, not from the Internet world. It is a binary protocol that uses ASN.1 notation/encoding for message passing. This protocol is in wide use and presently has the highest level of use. Many commercial packages use H.323. H.323 is so widely deployed that many feel new VoIP applications must support the protocol. However, H.323 is so complicated that interoperability between different implementations is not good. For better or worse, Microsoft's NetMeeting product seems to be a common benchmark for measuring interoperability. Since Microsoft makes NetMeeting available for free, it's easily available, and if a product can interoperate with it, you are assured a wide user base. There are several excellent open-source projects working to provide this protocol to the community—most notably the OpenH323 Project. These folks have a working protocol stack now capable of making a call to a NetMeeting client on a Win32 machine. This is tremendous success, and I hope to see even more improvements as this code is used in more and more projects. The OpenPhone Project will use the OpenH323 libraries and the slimmer “Simple Endpoint Terminal” code that Vovida Networks derived from it. See Resources for more information and places where you can obtain that code.
The Session Initiation Protocol (SIP) is described in RFC-2543. This IETF protocol arose from the Internet community; it has a feel not too different from HTTP and similar protocols. It is a text-based protocol that uses fairly simple commands to get the job done. It is much more oriented towards telephony services, whereas H.323 provides details on full multimedia audio-visual services. SIP is growing in popularity because of its relative simplicity and ease of implementation. A few links to more information on SIP are in the Resources section. At the time of this writing, I am unaware of an open-source implementation of SIP, although there has been much talk about starting such a project. The OpenPhone Project would very much like to see this project, and perhaps we can facilitate getting it started. We will certainly provide a home for it if anyone is interested.
The Media Gateway Control Protocol (MGCP) is a protocol and API for controlling voice gateways from a centralized server or “Call Agent”. The protocol is text-based and relatively straightforward. The complete protocol is described in an IETF draft (see Resources for link information).
This protocol is finding wider acceptance and is thought by many to be superior to H.323. However, it is interoperable with H.323, since the Call Agent can act as an H.323 Gatekeeper. This is probably where the future of VoIP call control is going, and the OpenPhone Project intends to use this protocol as the default wherever possible. An open-source implementation of MGCP is available from Vovida Networks (see Resources), and several commercial versions are available. However, since the specification is not ratified and is changing slightly (but frequently), there is no assurance at this time that two different MGCP implementations will work together. This is an area where open source can make a huge contribution to Internet telephony. Vovida's MGCP implementation is released under the LGPL license, which allows for commercial use without releasing the associated source code for the non-open portions of the application. With polish, such an open-source MGCP could be used in a wide variety of applications and systems, assuring interoperability by virtue of using the same base code for the protocol. The OpenPhone Project will be using the Vovida code for its MGCP control with the hope of extending and enhancing the protocol to stay current with the ratified MGCP protocol.
|Designing Electronics with Linux||May 22, 2013|
|Dynamic DNS—an Object Lesson in Problem Solving||May 21, 2013|
|Using Salt Stack and Vagrant for Drupal Development||May 20, 2013|
|Making Linux and Android Get Along (It's Not as Hard as It Sounds)||May 16, 2013|
|Drupal Is a Framework: Why Everyone Needs to Understand This||May 15, 2013|
|Home, My Backup Data Center||May 13, 2013|
- RSS Feeds
- Dynamic DNS—an Object Lesson in Problem Solving
- Making Linux and Android Get Along (It's Not as Hard as It Sounds)
- Using Salt Stack and Vagrant for Drupal Development
- New Products
- A Topic for Discussion - Open Source Feature-Richness?
- Drupal Is a Framework: Why Everyone Needs to Understand This
- Validate an E-Mail Address with PHP, the Right Way
- Designing Electronics with Linux
- What's the tweeting protocol?
- Kernel Problem
2 hours 1 min ago
- BASH script to log IPs on public web server
6 hours 28 min ago
10 hours 4 min ago
- Reply to comment | Linux Journal
10 hours 37 min ago
- All the articles you talked
13 hours 39 sec ago
- All the articles you talked
13 hours 3 min ago
- All the articles you talked
13 hours 5 min ago
17 hours 29 min ago
- Keeping track of IP address
19 hours 20 min ago
- Roll your own dynamic dns
1 day 34 min ago
Enter to Win an Adafruit Pi Cobbler Breakout Kit for Raspberry Pi
It's Raspberry Pi month at Linux Journal. Each week in May, Adafruit will be giving away a Pi-related prize to a lucky, randomly drawn LJ reader. Winners will be announced weekly.
Fill out the fields below to enter to win this week's prize-- a Pi Cobbler Breakout Kit for Raspberry Pi.
Congratulations to our winners so far:
- 5-8-13, Pi Starter Pack: Jack Davis
- 5-15-13, Pi Model B 512MB RAM: Patrick Dunn
- 5-21-13, Prototyping Pi Plate Kit: Philip Kirby
- Next winner announced on 5-27-13!
Free Webinar: Hadoop
How to Build an Optimal Hadoop Cluster to Store and Maintain Unlimited Amounts of Data Using Microservers
Realizing the promise of Apache® Hadoop® requires the effective deployment of compute, memory, storage and networking to achieve optimal results. With its flexibility and multitude of options, it is easy to over or under provision the server infrastructure, resulting in poor performance and high TCO. Join us for an in depth, technical discussion with industry experts from leading Hadoop and server companies who will provide insights into the key considerations for designing and deploying an optimal Hadoop cluster.
Some of key questions to be discussed are:
- What is the “typical” Hadoop cluster and what should be installed on the different machine types?
- Why should you consider the typical workload patterns when making your hardware decisions?
- Are all microservers created equal for Hadoop deployments?
- How do I plan for expansion if I require more compute, memory, storage or networking?
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702448584/warc/CC-MAIN-20130516110728-00055-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 7,861
| 57
|
https://cwiki.apache.org/confluence/display/CLOUDSTACK/Refactoring+the+ServerResource+implementations
|
code
|
The main motivation behind this refactor work is to increase the readability/quality of some of the ServerResource interface implementations, like the CitrixResourceBase, LibvirtComputingResource and NiciraNvpResource classes. There are several other implementations of ServerResource, but they won't be tackled on the 4.6.0 release of Apache CloudStack.
In order to fulfil our goal a number of points have to be worked on:
In order to give an idea on how the refactor took place for those ServerResource implementation, some extra documentation, including code snippets and diagrams, is available below. Although the diagrams and code snippets use the CitrixResrouceBase as example, the same approach has been successfully applied to LibvirtComputingResource and NiciraNvpResource. Although the latter is not an hypervisor implementation, but a network plugin.
The ServerResource.executeRequest() method expects a Command object, which is defined in the Cloud Core module. Since we could not change this structure, in order to avoid a major change in the whole API layer, we added a CommandWrapper to deal with the behaviour expected by each ServerResourse sub-class. In that sense, the whole XenServer, Libvirt and Nicira implementations are completely independent and don't change anything in the existing commands. Only extensions of the CommandWrapper<T extends Command, A extends Answer, R extends ServerResource> class will be enough to have the commands decoupled from the ServerResource implementation.
In order to have a smooth refactor, we added the following resources to the Cloud-Core module:
By using the 3 objects mentioned above we no longer need the 143 if/else block that were part of the 3 refactored classes; which also led to 143 private methods. Instead, we can simply load a command from the wrapper with the snippet below:
The diagram below depicts the relationship between the CitrixResourceBase and the new classes. The same can be applied to LibvirtComputingResource and NiciraNvpResource. Future implementations will follow the same model.
Please keep in mind that It's just an exhibit of what has been done: we did not want to add all the new classes to the diagram.
The image is a bit too large, but one can download the original in order to have a better idea of the implementation.
In order to keep the maintenance of the ServerResource implementations easy, we also added the use of Reflections & Annotations in the current code. What kind of benefits does it bring?
The ResourceWrapper annotation is simple and contains only one attributes: handles. That attribute is used to indicate which Command should be handled by the Wrapper class. Check the annotation code below:
Loading CommandWrappers annotated with the ResourceWrapper will need three simple steps:
Load the CommadWrappers that are annotated
Fill the resources
The resources map is defined in the RequestWrapper abstract class.
When defining a new wrapper class for a given Command, we have to follow the following:
Check the snippet below:
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816045.47/warc/CC-MAIN-20240412163227-20240412193227-00212.warc.gz
|
CC-MAIN-2024-18
| 3,037
| 17
|
https://docs.datarobot.com/en/docs/workbench/wb-experiment/wb-ml-experiment/ml-experiment-add.html
|
code
|
There are two methods for adding new models to your experiment:
- Retrain existing Leaderboard models using new settings.
- Add new models from the blueprint repository.
Train on new settings¶
Once the Leaderboard is populated, you can retrain any existing model, which will create a new Leaderboard model. To retrain, select a model from the Leaderboard by clicking it.
Change a model characteristic by clicking the change icon () next to the component in Training settings:
Change feature list (post-modeling)¶
To change the feature list:
Click the icon next to the current feature list and select a new feature list in the resulting modal. The current list is greyed out and unavailable for selection. Note that you cannot change the feature list for the model prepared for deployment because it is a "frozen" run.
Change sample size¶
To change the sample size:
Click the icon next to the reported sample size and enter a new value in the resulting modal. Note that when setting a new sample size, above a certain point (which is determined by the size of the dataset), DataRobot forces a frozen run. To increase sample size in larger datasets without a frozen run, create the new model from the blueprint repository. You can also choose to manually enforce a frozen run.
When set, click Train new models.
Change monotonic feature lists¶
To change the feature lists applied for monotonic modeling:
Click the icon next to Monotonic constraints and select at least one new feature list in the resulting modal. You must create feature lists to use for applying monotonic constraints prior to modeling. Note that if the model does not support monotonic constraints the label and icon are not displayed.
The blueprint repository is a library of modeling blueprints available for a selected experiment. Blueprints illustrate the tasks used to build a model, not the model itself. Model blueprints listed in the repository have not necessarily been built yet, but could be as they are of a type that is compatible with the experiment's data and settings.
There are two ways to access the blueprint repository:
From a Leaderboard model's Blueprint tab.
Click the View experiment info link and select the Blueprint repository tab.
Once in the repository, you can add one or more blueprints to your experiment. Note the badges under the blueprint name, which in some cases indicate support for special modeling flows. For example, the MONO badge identifies blueprints that support monotonic constraints.
Click on a blueprint name to see the graphical representation of tasks that comprise it. Select blueprints by checking the box to the left of the blueprint name.
Once the configuration is finished, click Train models to start building.
There are three ways to filter the Leaderboard display to show only those blueprints matching the selected criteria.
Use the search bar to return all blueprints with matching strings in the name or description:
Click a badge to return all blueprints with that badge:
Click again on the badge to remove it as a filter.
Use Edit filters to choose blueprints by model family and/or property. Available fields, and the settings for that field, are dependent on the project and/or model type.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100047.66/warc/CC-MAIN-20231129010302-20231129040302-00767.warc.gz
|
CC-MAIN-2023-50
| 3,224
| 28
|
http://www.herongyang.com/MySQL/SELECT-Statement-ORDER-BY-Clause.html
|
code
|
MySQL Tutorials - Herong's Tutorial Examples - 4.40, by Dr. Herong Yang
ORDER BY Clause of a SELECT Statement
Provides tutorial examples on how to use the ORDER BY clause to sort rows of the base table according to the given order.
"ORDER BY clause" modifies the base table by sorting rows according the specified order. "ORDER BY clause" syntax is:
ORDER BY order_exp, order_exp, ...
where "order_exp" specify a single order expression. If multiple order expressions are specified, the order expression on the left has higher precedence than the one on the right. This means the order expression on the right will only be used to sort rows that are having the same for the order expression on the left.
If ORDER BY clause is used with GROUP BY clause, it must contain only group columns or group functions. For example, the following statement shows us which department has the oldest average age:
SELECT department, COUNT(name) AS numberOfEmployees, min(age) AS minimumAge, max(age) AS maximumAge, AVG(age) as averageAge FROM employee WHERE status='Active' GROUP BY department ORDER BY AVG(age) DESC
Another interesting function called FIELD() can also be used in the ORDER BY clause. FIELD(value, value_list) returns the position of a given value in a given value list. For example, if you want to return employees with first name of "Jean, Mary, John, Mike" and in this order, you can use the following SELECT statement:
SELECT name, department, age FROM employee WHERE name IN ('Jean', 'Mary', 'John', 'Mike') ORDER BY FIELD (name, 'Jean', 'Mary', 'John', 'Mike')
Table of Contents
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178356140.5/warc/CC-MAIN-20210226030728-20210226060728-00341.warc.gz
|
CC-MAIN-2021-10
| 1,586
| 11
|
https://www.primidi.com/what_is_multidimensional
|
code
|
In physics and mathematics, the dimension of a space or object is informally defined as the minimum number of coordinates needed to specify any point within it. Thus a line has a dimension of one because only one coordinate is needed to specify a point on it (for example, the point at 5 on a number line). A surface such as a plane or the surface of a cylinder or sphere has a dimension of two because two coordinates are needed to specify a point on it (for example, to locate a point on the surface of a sphere you need both its latitude and its longitude). The inside of a cube, a cylinder or a sphere is three-dimensional because three coordinates are needed to locate a point within these spaces.
Read more about Multidimensional.
Some articles on multidimensional:
... of counts of occurrences of events in (multidimensional) intervals in multidimensional Poisson processes in a directly equivalent way to the result for unidimensional processes ... This,is D is any region the multidimensional space for which
... Alternatively, multidimensional root finding methods such as the Newton-Raphson method can be used ... that the method always converges due to the fact that multidimensional roots cannot be bounded, when a neighborhood containing a solution is known as is usually the case ...
... The most basic reason for the rise of the multidimensional organization is that, due to the fall in costs of information, customers start to behave in multidimensional ways in terms of their preferences ... The multidimensional organization also answers the emergence of multidimensional strategies, in which firms not only pursue market dominance and superior efficiency, but also need to exploit ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00077.warc.gz
|
CC-MAIN-2022-33
| 1,704
| 6
|
https://gallery.fitbit.com/details/78f9c88d-310f-4352-a868-114f6ef189ae
|
code
|
A simple tracker clockface of your stats - large 'n clear. The main face also shows the time via a tiny analog clock at the bottom of the heart - if you tap the heart the clock is shown as a much larger digital read-out. The date format is configurable, via the clockface settings page.
Each coloured block will advance towards your goal. Once reached, a small 'tick' is displayed.
TIME is ALWAYS displayed in 12 hour format.
A FREE clockface Designed for the ionic, however I may adapt it for the versa in the future.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103034170.1/warc/CC-MAIN-20220625034751-20220625064751-00086.warc.gz
|
CC-MAIN-2022-27
| 518
| 4
|
https://forums.steinberg.net/t/installed-cubase-95-in-new-pc-cubase-wont-accept-all-files-when-in-record-modus/739135
|
code
|
I have a new PC and have installed cubase 9,5 I try to load my recordings, but the program wont load up all of the files. What can I do to make my recordings as they use to be ?
Hi and welcome to the forum,
What exactly does it mean, please? Does Cubase show any message?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587719.64/warc/CC-MAIN-20211025154225-20211025184225-00431.warc.gz
|
CC-MAIN-2021-43
| 271
| 3
|
https://wiki.openelement.com/en/index.php?title=Form_Button
|
code
|
This element allows users to perform an action (send or clear) on a form and its elements (fields, checkboxes, radio buttons, etc.).
Example : (Preset K_BtnForm Gris)
Add a Form Button Element
Drag-and-Drop the element Form Button from the elements menu anywhere on the page.
The form button is a physical/graphical element. To assign it a purpose and configure it, a form-processing element must be used (Submit Form, Email Form). For more information, see the article Email Form.
Design and Presets
To change its appearance, users must override the element's various style zones.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827992.73/warc/CC-MAIN-20181216191351-20181216213351-00023.warc.gz
|
CC-MAIN-2018-51
| 581
| 7
|
http://www.phpdeveloper.org/news/13422
|
code
|
Matthew Weier O'Phinney has posted the latest results from the just-passed Zend Framework Bug Hunt Day session:
This past Thursday and Friday, 15-16 October 2009, Zend Framework held its second monthly bug hunt. Activity started out slow, but picked up tremendously on Friday, resulting in initially 100 bugs resolved, though a few have been re-opened in the days since. The full list is available on our issue tracker. Thank you, everyone, for the participation, and for keeping this initiative alive and vibrant!
The top three bug hunters from this round were Michael DePetrillo, Dolf Schimmel and Robin Skoglund with a special focus on Michael's contributions who also recieved SVN access to fix issues in the future. Over 100 bugs total were resolved this time around.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267860089.13/warc/CC-MAIN-20180618070542-20180618090542-00277.warc.gz
|
CC-MAIN-2018-26
| 772
| 3
|
https://answers.sap.com/questions/6721515/script-logic-performance-options-nw-sp4---go-commi.html
|
code
|
I've created some script logic in SP4. The good news is that it works, but the bad news is that it's not as fast as I would like, especially since it will reside in default logic. That being said, the trick with this logic is that anytime data is loaded for certain accounts, it needs to recalculate values from the first period of the budget, push a value to the next sequential period, calculate again at that period, push a value to the next period again, etc...
So, I've got some *WHEN's, *LOOKUP's, and *COMMIT's to get the job done, but I feel like I have too many commits to have decent performance. In the SQL version, I would have used *GO's or other commands to shorten the code and/or do this quicker, but I don't feel like I have as many options in Netweaver SP4. Anything I'm missing out there folks?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711126.30/warc/CC-MAIN-20221207021130-20221207051130-00217.warc.gz
|
CC-MAIN-2022-49
| 813
| 2
|
https://discussions.unity.com/t/how-can-i-access-a-value-from-another-script-that-is-attached-to-the-same-gameobject/112812
|
code
|
Hello everyone, I have two c# scripts attached to my Player game object, a HealthScript and a HealthBar Script. I’m trying to get the players ‘Hp’ value so that i can pass it into the Healthbar script to display the proper amount of health.
I’ve looked into using GetComponent to do this, but i’m pretty sure i’m using it incorrectly. What i tried doing in the Healthbar Script was this:
Hp = gameObject.GetComponent<HealthScript>();
This passes an error of:
The name ‘Hp’ does not exist in the
This makes me think that i’m doing it entirely wrong.
If anyone could give me advice on what i should try next, i would really appreciate it. Thanks.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474653.81/warc/CC-MAIN-20240226062606-20240226092606-00451.warc.gz
|
CC-MAIN-2024-10
| 662
| 7
|
https://github.com/ocodia
|
code
|
Prevent this user from interacting with your repositories and sending you notifications.
Learn more about blocking users.
You must be logged in to block users.
Contact GitHub support about this user’s behavior.
Learn more about reporting abuse.
A .NET client library to connect to Divi Project daemon: https://diviproject.org/
Default CSS styling for raw HTML elements. No classes required.
A Google Chrome extension which allows you to check webpages for broken links (Response Code 404 etc)
Seeing something unexpected? Take a look at the
GitHub profile guide.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571483.70/warc/CC-MAIN-20220811164257-20220811194257-00330.warc.gz
|
CC-MAIN-2022-33
| 564
| 10
|
https://help.openforms.com/Account/Manage-users
|
code
|
Managing users is the process of creating, editing, and deactivating user profiles, and assigning roles to those profiles (like admin, author, or reviewer).
There are two methods of managing users in OpenForms.
In the OpenForms admin area.
With an external system like Microsoft Azure AD or the OpenCities CMS.
Depending on your organization’s needs and IT policies, you can manage users with any combination of methods, although an individual user can only be managed by one system (OpenForms, Azure AD or OpenCities) at a time.
If you opt to manage users externally, it’s important to retain at least one account owner managed in the OpenForms admin area. This user can access forms ad responses in the event of an outage in your external system.
Manage users in the admin area
When you first start using OpenForms, the default method of managing users is through the admin area.
This is also where admins and account owners can see a full list of the users in your OpenForms organization.
Users managed in the admin area:
See manage users in the admin area for more information.
Manage users with Azure AD
The Azure AD connector is undergoing final review by Microsoft and will be available shortly. Keep an eye out for an in-app notification letting you know the connector is ready.
If your organization uses Microsoft Azure AD to manage staff access to apps and services, you can use the Azure AD connector - a premium connector available in the Integrations area - to manage OpenForms users.
Users managed through the Azure AD connector:
- Are automatically assigned profiles and roles based on their Azure AD user group.
- Are added to Azure AD user groups by your IT team.
- Are managed in OpenForms as groups by account owners (cannot be managed individually).
- Login to OpenForms using their Microsoft SSO credentials for your organization.
- Cannot update their own details and password in OpenForms.
See manage users with Azure AD for more information.
Manage users with OpenCities
If your organization has an OpenCities site you can use the OpenCities CMS to manage staff that also use OpenForms. (For example, content authors who might insert OpenForms into pages).
Users managed through OpenCities
Are automatically assigned profiles and roles based on their OpenCities role.
Are assigned roles in OpenCities by system admins, site managers, or user managers.
Login to OpenForms using their OpenCities credentials.
Cannot update their own details and password in OpenForms.
Can insert OpenForms directly into OpenCities pages from the WYSIWYG.
If your organization has both an OpenCities site and an Azure AD account, we recommend using the Azure AD connector to manage OpenForms users.This system is not available for some legacy Seamless CMS sites.Managing users through OpenCities is a process that is controlled entirely within OpenCities, so for more information see the OpenCities help center.
How systems are prioritized
If an individual OpenForms user is managed by multiple user management systems, their profile and roles will be assigned according to the following priority order:
Each system completely overrides those below it.
For example, if your organization uses both Azure AD and OpenCities to manage users, and an individual user is assigned the admin and reviewer role through OpenCities, but only the reviewer role in Azure AD, they will only have the reviewer role in OpenForms.
Users managed in both Azure AD and OpenCities will have their profiles and roles managed in Azure AD, but retain the ability to insert OpenForms into OpenCities pages.
User conflicts are defined by the user’s email address, rather than their name or other attributes, so it’s important to use the same email address for staff across user management systems.
What happens if an external system is disconnected
If your organization manages users via an external system like Azure AD or OpenCities, and you permanently disconnect from that system, the users managed by that system will be affected in following ways:
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474533.12/warc/CC-MAIN-20240224112548-20240224142548-00278.warc.gz
|
CC-MAIN-2024-10
| 4,038
| 38
|
https://pantera.infopop.cc/printer-friendly-topic/home-happy-easter?forReply=1598208419919529
|
code
|
quote:Originally posted by 1Rocketship:
I LIKE the covered headlamp alteration.
I "Personally" DON'T like the Frog look when the headlamps are up!.
It would be an interesting experiment if there are 2 exactly identical Panteras, other than 1 having covered headlamps & the other the pop-up headlamps, how many MPH the pop-up headlamps detract from Top Speed?!...Mark
a) Really? Are you nuts? If you are driving that fast at night, you are driving way too fast. The car/driver with the pop-up headlamps would probably have better chance of not dying, but not by much!
b) Of course, it's not too hard to do this experiment yourself. Just run her up to 150 or so and do a coast down test with the HLs down and up. From the deceleration one can calculate (knowing the mass of course) the force (drag) which then can be used to calculate the HP difference needed for a given speed, or the speed difference for a given HP. My guess is that it's not a whole lot and probably not worth even thinking about given a) above. Let us know what your test results are. Raw results are OK, we can do the math.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146033.50/warc/CC-MAIN-20200225045438-20200225075438-00086.warc.gz
|
CC-MAIN-2020-10
| 1,093
| 6
|
https://codeocean.com/
|
code
|
Code Ocean brings together leading tools, languages, and environments to give researchers an end-to-end workflow geared towards reproducibility.
You can create, collaborate on, and run code for private projects using any open source language as well as MATLAB and Stata. You can submit to publish for free in academic journals.
Use the Code Ocean development environment or write code in virtual versions of JupyterLab, RStudio, and terminal called Cloud Workstations, enabling work in a familiar environment with all underlying technology dependencies, storage, and compute included. All compute capsules support Git repos, allowing researchers to access all Git functions within the interface. Private Groups give researchers and admins within a working group a secure hub to share code and data and retain up-to-date research projects.
Share code and data alongside published articles to have workflows, algorithms, or analyses indexed by search engines, citable via DOI, and featured right next to the article. Uploading and publishing fully executable code and data is free for all researchers.
Users can view, edit, and run the article’s code using a web browser and the code is preserved for future use long after the article is published.
For more details on our preservation plan, please click here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141746033.87/warc/CC-MAIN-20201205013617-20201205043617-00667.warc.gz
|
CC-MAIN-2020-50
| 1,310
| 6
|
https://discuss.elastic.co/t/sorting-on-missing-values-and-using-search-after/195883
|
code
|
Elasticsearch Version 7.0.0
Node module: elasticsearch
Hi, I'm trying to fetch a set of documents from elasticsearch using the node.js client (node module: elasticsearch). The problem I'm running into is that when sorting based on some field (with data type long) that can have missing values, elasticsearch responds with a very large number 9223372036854775807 but for some reason, it gets converted into 9223372036854776000 (which is slightly larger) when using the node.js client. I wish to know:
- Why is the number mutating?
- Can this be handled somehow by tweaking some configuration in elasticsearch?
- If not in elasticsearch, is there an elegant way to solve this within the node.js client?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541315293.87/warc/CC-MAIN-20191216013805-20191216041805-00105.warc.gz
|
CC-MAIN-2019-51
| 700
| 6
|
https://www.maths.usyd.edu.au/s/scnitm/lachlans-SydneyDynamicsGroup-Maius
|
code
|
SMS scnews item created by Lachlan Smith at Fri 30 Oct 2020 1452
Expiry: 25 Dec 2020
Calendar1: 6 Nov 2020 1000-1100
CalTitle1: Sydney Dynamics Group: Mariusz Urbanski -- Random non-hyperbolic exponential maps
Auth: email@example.com (lsmi9789) in SMS-WASM
Sydney Dynamics Group: Maiusz Urbanski -- Random non-hyperbolic exponential maps
Next week, Friday November 6, Mariusz Urbanski (University of North Texas) will give a
talk at 10am (Sydney time) via Zoom.
Zoom link: https://uni-sydney.zoom.us/j/84251438008
Meeting ID: 842 5143 8008
Title: Random non-hyperbolic exponential maps
PDF download: https://www.dropbox.com/s/hjo5ltjuozkbkv3/Urbanski-Abstract.pdf?dl=0
Past talks can be found on the YouTube channel:
I hope to see you all online.
(ICS file) download, for import into your favourite calendar application
AUTHENTICATE to mark the scnews item as read
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710978.15/warc/CC-MAIN-20221204172438-20221204202438-00603.warc.gz
|
CC-MAIN-2022-49
| 864
| 16
|
http://www.dpreview.com/forums/post/53761740
|
code
|
ID these birds, please ?
Paul B Jones wrote:
Nice images of a Guira Cuckoo.
Local names for it in Brazil include alma-de-gato, anu, Anu Branco, Anu-branco, anu-do-campo, anu-galego, anum-branco, gralha, guira, pelincho, piririguá, quiri-quiri and quiriru!-- hide signature --
Paul B Jones
Thanks Paul ! This confirms another answer I received from another site !
BTW, I didin't know it before, but after a little search I found and subscribed to http://www.wikiaves.com.br/, which is the brazilianWiki Birds !
Now, I have a serious place to search...
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443738017788.94/warc/CC-MAIN-20151001222017-00229-ip-10-137-6-227.ec2.internal.warc.gz
|
CC-MAIN-2015-40
| 551
| 8
|
https://forums.macrumors.com/threads/app-for-recording-what-neighbor-owes-me.774319/
|
code
|
I mow my neighbor's lawn, and I'd love to have an app that could when I click something automatically record the date I did the lawn, the cost (it's always the same) and then total them up until she pays me. When she pays me I can delete them and start over. This would be great. Now I'm using the calendar, but it's not as automatic as a dedicated app could be. Price is no option!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823183.3/warc/CC-MAIN-20181209210843-20181209232843-00114.warc.gz
|
CC-MAIN-2018-51
| 382
| 1
|
http://www.stat.iastate.edu/centers/CCGS/R%20workshops/04-r-models/
|
code
|
May 16, 2013, 3121 Snedecor
This workshop is designed to help you use R to fit linear models, enabling a smooth transition to R from other statistical software packages. The course will be data centric, with lots of different data sets that illustrate examples of the different techniques used for different problems.The course will be a mix of instruction and follow-up exercises. It will be held in a computer lab but you are encouraged to bring your own laptops, with software already loaded. A list of software will be available at this site several days prior to the workshop.
Please contact Heike Hofmann (email@example.com) for fees in case you are not affiliated with the university.
|Date||Notes||Lecture and Resources|
|12:00 – 12:15||Setting Up||This will make sure that everybody's system is up and running
|12:15 – 01:15||Linear Regression||Introduction to lm: formulas, model fitting, summaries
|01:15 – 01:30||coffee break|
|01:30 – 02:15||Plots & Diagnostics||Residual plots, measures of model adequacy
|02:15 – 03:00||ANOVA & ANCOVA||aov, anova
|03:00 – 03:15||coffee break|
|03:15 – 04:00||Generalized Linear Models||glm
|04:00 – 04:45||Linear Mixed Effects Models||Introduction to lmer
|04:45 – 05:00||Feedback||We very much appreciate any feedback you can give us. You can find a form here: survey.|
After the end of the this one course, we expect you to be able to do the following:
You can bring your own laptop and work on it, if you like to. In order to keep up with everybody else, we're asking that you start installing the following pieces of software ahead of coming to the workshop:
install.packages("ggplot2") install.packages("MASS") install.packages("plyr") install.packages("productplots") install.packages("lme4") install.packages("car")
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703227943/warc/CC-MAIN-20130516112027-00011-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,789
| 16
|
http://security.widyani.com/web-application-security/piwik-and-open-flash-chart-vulnerability.html
|
code
|
In the Piwik with the Open Flash Chart Module has been discovered a vulnerability which can be exploited by malicious people to compromise a vulnerable system. The vulnerability exists in Piwik’s implementation of “open-flash-chart”, a module which resides in the “./libs/open-flash-chart/php-ofc-library” directory.
Piwik is an open source web analytics software with open sources and GPL licensed. It provides interesting reports on our website visitors, our popular pages, the search engines keywords they used, the language they speak‚ and so much more, as well as Google Analytics. It gives us real time reports with detail and all features are built inside plugins, so we can add new feature and remove it very easy.
The vulnerable code forces Piwik to create a directory called “./libs/open-flash-chart/tmp-upload-images” which in turn creates a file which is able to hold PHP code. This issue is caused by input validation errors in the “libs/open-flash-chart/php-ofc-library/ofc_upload_image.php” script when processing the “name” parameter, which could be exploited by remote attackers to create malicious PHP scripts on a vulnerable system and execute arbitrary commands with the privileges of the web server. This code however does not function correctly if global variables are unable to be overwritten.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
<?php /* this default path for temporary file when we will upload image file */ $default_path = '../tmp-upload-images/'; /* Check if $default_path variable is exist */ if (!file_exists($default_path)) /* If true, make directory with full permission */ mkdir($default_path, 0777, true); /* then, create file in the directory above with name of file from form input "name" */ /* this variable isnot sanitised before use */ $destination = $default_path . basename( $_GET[ 'name' ] ); echo 'Saving your image to: '. $destination; /* malicious code is right here and an attacker can execute this code */ $jfh = fopen($destination, 'w') or die("can't open file"); fwrite($jfh, $HTTP_RAW_POST_DATA); fclose($jfh); ?>
An attacker can exploit this hole to compromise a vulnerable system, with concept :
So, how to fix this vulnerability ..? Restrict access to the “/libs/open-flash-chart/php-ofc-library” directory (e.g. via an “.htaccess” file). We also edit source code of Piwik in the Open Flash Chart library, see detail code above. The vulnerable file may be omitted from various implementations of the Open Flash Chart library.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189032.76/warc/CC-MAIN-20170322212949-00631-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 2,533
| 7
|
http://www.blackberryforums.com/general-8100-series-discussion-pearl/107757-ipod-connection-8100-pearl.html
|
code
|
Hey guys, well, i got a new car stereo and it comes with the ipod adapter. I dont have and ipod because very simply, i have a blackberry. Ive been trying to look for a way that i can use the blackberry as an ipod. I want an adapter that i can use from the ipod connection(the one that goes in the bottom of the ipod) and convert into the headphone jack of the blackberry. Well thanks for the suggestions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867885.75/warc/CC-MAIN-20180625131117-20180625151117-00345.warc.gz
|
CC-MAIN-2018-26
| 404
| 1
|
http://s-d-c.com/projects/videos-case-study.asp?id=Semi-Automated%20Assembly%20Cell
|
code
|
This custom semi-automated assembly cell with a flexible robotic feeder uses a combination of robotic automation and human labor to efficiently assembly lamp components.
Custom Assembly & Processing Machine Details
This custom work cell uses modern automated technology along with direct labor to assemble lamp components. A custom flexible robotic feeder is used to pick-and-place a small component which is spot-welded onto the assembly.
Human operators are arranged around the large rotary indexing dial and place other component parts on the assembly in a precision fixture. The entire assembly then indexes through a series of spot-welders to stake the assembly together.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812932.26/warc/CC-MAIN-20180220090216-20180220110216-00633.warc.gz
|
CC-MAIN-2018-09
| 676
| 4
|
https://wpforo.com/community/how-to-and-troubleshooting-2/cannot-edit-posts/
|
code
|
Cannot edit posts
When I edit a post and press the "update" button, a message appears "Please enter the required fields" and the changes are not saved.
Please deactivate all other plugins and test it again. It seems some plugin tries to add a new hidden field in wpForo Editor, then it expects data submitted with the hidden field.
A similar issue is mentioned in this topic:
The problem was coming from theme.
I'm sorry but we can't register to check it. The registration form is not the wpForo form and it's too complicated. Please register some demo User and send login details to support[at]gvectors.com email address.
This problem is solved, it was conflict with your theme title ID. We've adapted wpForo JS files to your website. This change will be added in next version so you can update it without any issue.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583658662.31/warc/CC-MAIN-20190117000104-20190117022104-00509.warc.gz
|
CC-MAIN-2019-04
| 817
| 7
|
https://www.impan.pl/pl/wydawnictwa/czasopisma-i-serie-wydawnicze/fundamenta-mathematicae/all/141/1/107684/some-complexity-results-in-topology-and-analysis
|
code
|
Some complexity results in topology and analysis
If X is a compact metric space of dimension n, then K(X), the n- dimensional kernel of X, is the union of all n-dimensional Cantor manifolds in X. Aleksandrov raised the problem of what the descriptive complexity of K(X) could be. A straightforward analysis shows that if X is an n-dimensional complete separable metric space, then K(X) is a $Σ_2^1$ or PCA set. We show (a) there is an n-dimensional continuum X in $ℝ^n+1$ for which K(X) is a complete $Π_1^1$ set. In particular, $K(X) ∈ Π_1^1-Σ_1^1$; K(X) is coanalytic but is not an analytic set and (b) there is an n-dimensional continuum X in $ℝ^n+2$ for which K(X) is a complete $Σ_2^1$ set. In particular, $K(X) ∈ Σ_2^1-Π_2^1$; K(X) is PCA, but not CPCA. It is also shown the Lebesgue measure as a function on the closed subsets of [0,1] is an explicit example of an upper semicontinuous function which is not countably continuous.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655890105.39/warc/CC-MAIN-20200706042111-20200706072111-00390.warc.gz
|
CC-MAIN-2020-29
| 951
| 2
|
https://smashingconf.com/online-workshops/speakers
|
code
|
For our workshops, we invite experts in front-end & UX, with years of experience on anything from accessibility and web performance to design systems and UX. They aren’t just experts, but also experienced teachers and speakers.
Be notified when new workshops come up: subscribe to our updates. Obviously, you can cancel any time.
Fantastic first day of design system workshop with @brad_frost — interesting and engaging as always! Pure delight to listen to him talk about his insights and experiences from building design systems in the wild. #inspired #designsystems @smashingconf
Vitaly Friedman loves beautiful content and doesn’t like to give in easily. When he is not writing or speaking at a conference, he’s most probably running front-end/UX workshops and webinars. He loves solving complex UX, front-end and performance problems.
Brad Frost is a web designer, speaker, writer, and consultant located in beautiful Pittsburgh, PA. He is the author of the book Atomic Design, which introduces a methodology to create and maintain effective design systems.
In addition to co-hosting the Style Guides Podcast, he has also helped create several tools and resources for web designers, including Pattern Lab, Styleguides.io, Style Guide Guide, and This Is Responsive.
Stephanie Eckles is a front-end focused SWE at Microsoft. She’s also the author of , author of ModernCSS.dev which provides modern solutions to old CSS problems as in-depth tutorials, and is the creator of StyleStage.dev, and author of SmolCSS.dev and 11ty.Rocks.
Steph has over 13 years of webdev experience that she enjoys sharing as an author, egghead instructor, and conference speaker. Her most recent working experience has largely involved leading and co-creating enterprise design systems. She’s an advocate for accessibility, scalable CSS, and the Jamstack (especially Eleventy). Offline, she’s mom to two girls and a cowboy corgi, and enjoys baking.
Paul Boag is a leader in conversion optimisation, digital strategy and user experience design. He has been working with diverse organisations such as The European Commission, PUMA and Doctors Without Borders for over 25 years. Through consultancy and training, he helps organisations better connect with today’s digital consumers.
Paul is also a well-respected figure in the digital sector. Author of six books, including Click, Digital Adaptation and User Experience Revolution. Finally, he is a prolific writer for numerous publications, including his blog, and regularly speaks internationally.
Stefan Baumgartner is a software architect, trainer, and consultant based in Austria. Since the late 1900s, he has published writing for Manning, Smashing Magazine, and A List Apart.
His most recent work is “TypeScript in 50 Lessons”, a book all about TypeScript published by Smashing Magazine.
In his spare-time he organizes ScriptConf, TSConf:EU, and the local Rust meetup in Linz, and is host of the German-language Working Draft podcast.
Natalia Tepluhina is a Vue.js core team member and a Senior Frontend Engineer at GitLab. She is a conference speaker and author of articles on different topics related to Vue.js . She is also a Google Developer Expert in Web Technologies and she is in love with writing docs.
Rémi Parmentier is a French front-end developer working at his own small web development agency, Tilt Studio. He loves to learn, and enjoys even more to teach.
This led him on a joyful quest to understand and demystify HTML emails coding. Rémi runs workshops, gives talks and writes articles on his blog to help others code better HTML emails. Rémi also likes collecting Game Boy consoles and listening to Sufjan Stevens.
Carie Fisher is an author, speaker, and developer who is passionate about the intersection of front-end code and UX, digital accessibility, and diversity in technology. Currently, Carie is working as a Senior Accessibility Consultant and Trainer at Deque Systems while pursuing her Ph.D. in Human-Computer Interactions at Iowa State University.
In her spare time, Carie likes to travel, garden, and engage with the accessibility and open source dev communities. She is the creator of the Accessibility (A11Y) Style Guide and Accessibility (A11Y) Talks virtual meet-up, designer/creator of the A11y Cats accessibility T-shirt fundraiser, and a member of the A11y Project team.
Rob Hope is a South African born web designer and developer who runs One Page Love, Email Love and Yo! After a decade freelancing, he finally took the leap to work on his side projects full time. Right now he is working on Landing Page courses while interviewing makers on the Yo! podcast. When not building online he loves to surf, travel and listen to 90s punk rock.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487584018.1/warc/CC-MAIN-20210612132637-20210612162637-00623.warc.gz
|
CC-MAIN-2021-25
| 4,734
| 19
|
https://docs.puppet.com/pe/2.0/maint_installing_additional.html
|
code
|
PE 2.0 » Maintenance and Troubleshooting » Installing Additional Components
A newer version is available; see the version menu above for details.
Installing Additional Components
Several components of PE can be installed when needed instead of up-front.
Note that you cannot currently change which machines have the console and puppet master roles.
Installing Cloud Provisioner
You can install PE’s cloud provisioning tools on any node by running the
puppet-enterprise-upgrader script included in the installation tarball. This script will give you a chance to install the cloud provisioning tools. Using the upgrader script for the version of PE that is already installed should have no ill effect on the node’s configuration.
Installing the Ruby Development Libraries
Puppet Enterprise ships its own copy of Ruby. If you need to install the Ruby development libraries, the installer tarball includes packages for them, which can be installed manually.
The installation method will depend on your operating system’s package management tools, but in each case, you must first navigate to the directory containing the packages for your operating system and architecture, which will be inside the
packages subdirectory of the unarchived Puppet Enterprise tarball.
For systems using apt and dpkg (Ubuntu and Debian), run the following commands:
$ sudo dpkg -i *ruby*dev* $ sudo apt-get install --fix-broken
For systems using rpm and yum (Red Hat Enterprise Linux, CentOS, and Oracle Linux), run the following commands:
$ sudo yum localinstall --nogpgcheck *ruby*dev*
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867904.94/warc/CC-MAIN-20180526210057-20180526230057-00430.warc.gz
|
CC-MAIN-2018-22
| 1,571
| 16
|
https://www.zdnet.com/article/katmai-more-than-just-the-next-version-of-sql-server/
|
code
|
Microsoft officials have said the next version of SQL Server is code-named "Katmai." (They've said relatively little about the product beyond that, but word is there will be an informational update in the next month or two.)
But it turns out Katmai isn't just a SQL-Server-specific term. "Katmai" also is being used to refer to the next version of System Center Operations Manager, too. The next version of Microsoft's client-monitoring product. The final, official name of the product will be "System Center Operations Manager 2007 R2." (System Center Operations Manager used to be named Microsoft Operations Manager, or MOM, for you Microsoft historians out there.)
System Center Operations Manager 2007 is available in Release Candidate (RC) 2 test form at the moment and is due for release this year. System Center Operations Manager 2007 R2 is probably a couple years away, making it a 2009 deliverable, I'd guesstimate. Does that mean SQL Server "Katmai," a product many were expecting to see this year, won't hit until 2009, as well? Stay tuned.
(And if you're wondering about the origins of the "Katmai" code name, it's part of the national-parks code name theme favored by members of the SQL Server team. It's just one of many different Microsoft codename themes I've been tracking.)
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737319.74/warc/CC-MAIN-20200808080642-20200808110642-00490.warc.gz
|
CC-MAIN-2020-34
| 1,292
| 4
|
https://products.aspose.com/total/python-net/conversion/
|
code
|
Total Python APIs speeds up developing document automation solutions from scratch or enhancing existing applications to create, edit or convert documents, presentations, emails and 3D files. Python API not only handles Microsoft Office Word and Presentation slides but also handles PDF, HTML, Images and Email files and a lot more. API does not depend on any software and is a full set of document management and manipulation solution.
Convert Microsoft Word to PDF
Total Python API supports multiple conversion of formats such as Microsoft Word to PDF, Images, Markdown and HTML. API makes the process of converting Word document to PDF simple with the quality output as close to the document as of DOC, DOCX file. Process is load the DOC or DOCX file into Document object and just call the save method with target PDF format along with its directory path. It’s so simple. In case there is need to specify PDF standards like PDF 1.7 or 1.5, API provides PdfComplaince enumeration, for setting PdfSaveOptions() .
Python - Word to PDF Conversion
Microsoft Word to Images Conversion
Word to Images Conversion is anthor feature of Python API. Besides just conversion, one can easily set various save options such as brightness, contrast, horizontal and vertical resolution etc. Process is, load the document via Document object and then call the save method with the desired image file extion having specified path. To specify various save options, API provides ImageSaveOptions , FixedPageSaveOptions or SaveOptions classes can be used as of the required scenario. Below code sample demonstrates creating a preview of the first document page with applying some additional settings.
Python - Word to Image Conversion
Convert Microsoft PowerPoint to Word
Python API supports converting Microsoft PowerPoint PPT / PPTX to Word DOC / DOCX files. Two APIs Aspose.Slides for Python via .NET and Aspose.Words for Python via .NET used to perform this conversion. Load the PPT / PPTX file using Presentation . Get the Words Document class object. Iterate through each slide, generates and inserts slide image and then insert the slide text by iterating through slides shapes.
Python - PowerPoint Slides to Word Conversion
Email to Word, PDF, HTML and Images Conversion
For Email files converson to PDF, Word, Images and HTML, Email Python API Aspose.Email for Python via .NET performs the conversion. API load the source file in its object model and invoke the Save method with relevant parameters.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506339.10/warc/CC-MAIN-20230922070214-20230922100214-00576.warc.gz
|
CC-MAIN-2023-40
| 2,489
| 12
|
https://issues.apache.org/jira/browse/MAPREDUCE-6698?attachmentSortBy=fileName
|
code
|
The timeout on TestUnnecessaryBlockingOnHistoryFileInfo.testTwoThreadsQueryingDifferentJobOfSameUser is added to verify the fix of
MAPREDUCE-6684 works. When two thread are requesting different jobs owned by the same user, one thread request jobA should not be blocked by the other that is processing a large job jobB. The timeout exception, if happened, should ideally indicate the fix does not work. But the timeout period is set too aggressive, so the test always fails on slow VMs.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817095.3/warc/CC-MAIN-20240416124708-20240416154708-00114.warc.gz
|
CC-MAIN-2024-18
| 485
| 2
|
https://profiles.santarosa.edu/lynea-seiberlich-wheeler
|
code
|
Section 3181 of SWHS80
Introduction to Addiction Studies -- : Aug 15 - Dec 08 2023
This section is a hybrid class that will meet in person on the Santa Rosa campus on Tuesdays from 7:00pm-9:00pm, with the rest of the class being asynchronous online in Canvas. Please contact the instructor with any questions.
Section 7173 of HUSV80
Introduction to Addiction Studies -- : Jan 19 - May 18 2023
This section is a hybrid class with a mandatory Zoom lecture on Thursdays from 6:00p.m.-7:30p.m. and the rest of the class being done asynchronously in Canvas. Zoom details to be provided by the instructor. First Zoom lecture on Thursday 1/19/23.
BS in Psychology from UC San Diego
MSW from UC Berkeley
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511361.38/warc/CC-MAIN-20231004052258-20231004082258-00696.warc.gz
|
CC-MAIN-2023-40
| 695
| 8
|
https://forum.purseblog.com/threads/scuola-ribbon-band-closure-a-pain-or-not.145119/
|
code
|
hey all toki lovers! i am wondering what some of you think about the scuola's ribbon/band attachment closure? you have to put it thru the two metal rings everytime you want to close the bag....is it a pain? or do you get used to doing it all the time? and the cincher! load of work?! keep on tokin!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084888113.39/warc/CC-MAIN-20180119184632-20180119204632-00427.warc.gz
|
CC-MAIN-2018-05
| 298
| 1
|
http://physics.stackexchange.com/questions/123507/most-useful-maths-for-theoretical-and-mathematical-physics
|
code
|
I am going to apply for a programme of mathematical and theoretical physics for graduate studies and I'm currently studying maths. What is a good area to do a thesis (that is to say, considerable extra work and research) in? Here "good" means useful for my following studies and possibly making a good impression in the selection process for graduate studies.
closed as primarily opinion-based by Qmechanic♦ Jul 7 '14 at 14:11
Many good questions generate some degree of opinion based on expert experience, but answers to this question will tend to be almost entirely based on opinions, rather than facts, references, or specific expertise.If this question can be reworded to fit the rules in the help center, please edit the question.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860121618.46/warc/CC-MAIN-20160428161521-00094-ip-10-239-7-51.ec2.internal.warc.gz
|
CC-MAIN-2016-18
| 737
| 3
|
https://www.loverslab.com/blogs/entry/1878-so-maybe-a-story/
|
code
|
It's been a long time since I've written outside of emails and forum posts. I used to enjoy it in high school and college, though even that was mostly when it was assigned. Something I always thought about, but never really did recreationally. But I was inspired by Skyrim, a shitload of mods, and specifically jfraser's Sian's Story
I guess a little introduction might be in order:
I quietly roleplay pretty much any game I play. Even playing CIV I would have little stories in my head about what was going on and why. So when I read Sian's Story it really resonated with me as the sort of thing I do (though his is probably infinitely better). And I guess that got me thinking about it more while I played. All of which resulted in what I'm going to post.
I like to roleplay characters that are wildly unlike me, and see if I can understand what might motivate them. Sometimes that turns out to be boring to think about, or I just can't get into the mindset, or I get into it and discover that it is a less than engaging way to play a particular game (such as a pacifist priest of mara). As a result I start and throw away a lot of characters (my mmo accounts are usually maxed with toons within a week!) so this story I have planned might end abruptly. I've got a few chapters bouncing in my head that I'd like to try to get on to "paper", though, so I guess I'll see. I also tend to play female characters because boobs are just great.
Also, I've never blogged before, so I may be doing it wrong
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00699.warc.gz
|
CC-MAIN-2022-33
| 1,499
| 5
|
https://sitecore.stackexchange.com/questions/6528/how-to-access-item-bucket-search-filters-from-within-experience-editor
|
code
|
I'm using an item bucket for an article content type. For this project, we're trying to empower the author to do as much work as possible within the Experience Editor, and hopefully stay out of the Content Editor.
Question: Does anyone have experience/recommendations for making item bucket content search/filterable within the Experience Editor?
7/9: Adding clarification - Within the Experience Editor we're limited to the 'browse to' functionality in the navigation bar... I'm curious about any options to use the search/filter functionality from within the search tab of the Content Editor, but from within the Experience Editor. The ultimate goal is to keep the author out of the Content Editor.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362571.17/warc/CC-MAIN-20211203000401-20211203030401-00438.warc.gz
|
CC-MAIN-2021-49
| 700
| 3
|