url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://www.vn.freelancer.com/projects/php-shopping-carts/opencart-template/
|
code
|
I am looking for a developer who is perfectly capable of creating Opencart template for version v126.96.36.199.
When i will hand over this project to the theme developer i will provide him/her all the .psd files of this theme.
Please note this is my very important customer project so i want it to be done 100% accurately in competitive prices. i need good prices for long term work.
thanks and Best of Luck!!!
15 freelancer đang chào giá trung bình $188 cho công việc này
Hi, We have throughly read your requirements and believe that we can deliver exceptional results. We hope you will consider using our services. Best Regards,
Hello Sir/Mam We can do this project for you. Our bid is tentative right now, we will finalize bid amount once specifications are discussed and finalized.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591575.49/warc/CC-MAIN-20180720080634-20180720100634-00019.warc.gz
|
CC-MAIN-2018-30
| 793
| 7
|
https://msdn.microsoft.com/en-us/library/windows/desktop/ff191019(v=vs.85).aspx
|
code
|
Stopping a Trace
You can view the complete list of start options by running the following command:
xperf -help stop
You can stop a trace session by using the -stop [LoggerName] top-level option. For example, the following command stops the kernel logger:
xperf -stop "NT Kernel Logger"
The NT Kernel Logger is used as a default when the LoggerName argument is missing. Therefore, the kernel logging session can be stopped with the following simplified command:
Be aware that the -stop top-level option stops NT Kernel Logger without merging the trace. NT Kernel Logger can be stopped and merged with the following command:
xperf -stop -d trace.etl
The stop-and-merge top-level option, -dfilename, uses as input all traces that are stopped before it on the same Xperf command line. When no -stop [LoggerName] top-level options are present, -d assumes an implied -stop for the kernel logger. This simplification reduces the previous command to:
xperf -d trace.etl
In this example, the kernel logger is stopped and merged into the trace file Trace.etl. For more information about interpreting trace merges, see the Detailed Walkthrough topic.
Build date: 5/5/2012
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701160822.87/warc/CC-MAIN-20160205193920-00250-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 1,160
| 12
|
https://www.jointaro.com/question/8A3mrYmCTxdDWFh6T5Uu/as-an-android-developer-how-to-master-kotlin-and-coroutine-for-android/
|
code
|
I feel like I'm not using to max the language and its features. Most of the tutorials on the web are for beginners even the advanced classes are not enough advanced for me. I feel like I plateau'ed.
I would highly recommend NOT studying advanced syntax features, but rather what architecture ideas can be used and what are Android best practices:
Hands on learning is also great. If you build an app with a networking library connected to a public API that uses Room for a local database you will learn a lot about coroutines. If you use layered architecture like the docs describe you will learn even more and it will not be too easy. There are great Google tutorials that are hands on and walk through the libraries:
Another idea is instead of researching “Advanced Tutorial for xyz” try searching “Best practices for xyz” and see what resources you find. I did that with coroutines and got some pretty detailed docs:
Lots of people publish on Medium their latest experimentations and findings, and if you make sure it’s a reputable author like a Google Developer Expert you can learn a lot there too.
Your goal with any tech stack isn't to use its most complicated syntax or exhaust its feature pool: It's to build quality software for users at as large a scale as possible.
You can't really do this with tutorials and courses: Those are just meant to teach you how to get stuff working. Getting stuff working is just the first step - Once you get to mid-level, these resources aren't very useful anymore. Once you get to senior, your returns with these will drop to pretty much 0.
I'm an Android engineer, and I've been an Android lead for almost 10 years. In 2021, I was making $750k per year doing Android development. I also don't really know what a coroutine is.
Coroutines, like everything else in Kotlin and Android, is just one way of many to build features and get stuff working. This doesn't make it inherently it a "high-level" Android technique or a requirement to be a stellar Android engineer.
If you really want to get better at Android, you should care about these metrics instead:
I go extremely in-depth about what it takes to write high-quality code and how to get better at it here: "How to Learn/Practice Clean Code, particularly by oneself?"
I also highly recommend these if you haven't watch them already:
Just like any topic: use them. Then realize all these are just ways of writing things.
The way to improve isn't by writing code but realizing how they work, why they work, and why they're used, and how things can be done better.
You should not be focusing on language and features. You should be focusing on understanding what you're writing, why, and most importantly, how to be as efficient as possible at figuring out what you need to write.
That's the difference between coding and engineering.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474674.35/warc/CC-MAIN-20240227085429-20240227115429-00170.warc.gz
|
CC-MAIN-2024-10
| 2,840
| 16
|
https://support.sendy-app.com/hc/en-us/articles/360051113693-Which-transactions-will-be-listed-on-my-money-transfer-statement
|
code
|
・About range of date
If you select the current year, your transfer history from January 1st of this year to the point of time you obtained your statement will be listed
(Example: If you request a money transfer statement for 2020 on April 1st, 2020, you will obtain a statement which lists your transfer history from January 1st, 2020 to April 1st, 2020).
・About range of transaction
Your transfer transactions up to the previous business day will be listed on your money transfer statement. Errors and cancelled transactions will not be listed.
Please be noted that there may be a case that if transaction ends up in error after you obtained the statement (when you download a PDF from the app), actual number of transaction will be different from the number in the statement.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818999.68/warc/CC-MAIN-20240424014618-20240424044618-00184.warc.gz
|
CC-MAIN-2024-18
| 781
| 6
|
https://forum.xojo.com/t/xojo-ide-on-windows-10/29021
|
code
|
I thought i’d try this from the forum to see if anyone has any ideas or suggestions on an issue I am having from Windows 10. When I try to run my app on Windows 10 from the IDE (using the Run button) I am having some issues where the Debug program is getting stuck in Windows and will not exit my app. It occurs either if I let my app exit normally (via Quit function in app) or if I end the debug session from the IDE.
This causes the temporary Debug folder to remain in my project folder and when I try to run the app again from the IDE I get a Build Failed response because it appears XOJO is trying to create a new Debug folder and the previous folder is locked by the aforementioned process that won’t exit. When I try to manually delete the folder Windows won’t allow it because it thinks the Debug program still has the Debug folder locked. If I go to Windows Task Manager I can see the Debug program as a process, but when I try to end it nothing happens. I even tried the Windows Command Line TaskKill and that tells me the task ins’t running (even though it appears in Task Manager).
I am not having this issue from the Mac or Windows 7/8, only from Windows 10. I would appreciate any feedback or suggestions on what might be causing this to happen.
What A/V package are you using? And are you using dropbox as the location of your project?
I see this with Norton, I have to mark my project’s main source folder as excluded from virus checking, otherwise it chokes every time. I also have one other folder that I use for testing, prototyping, etc… that I work out of that I have marked as excluded as well.
I am using Avast Free Edition for A/V. I do use DropBox but only as a backup, I save and open the project from my local hard drive. I will try adding my Debug app to be excluded from Avast - thanks!
In Norton, I just have to mark the top-level folder and it takes care of all files and folders below that point.
FYI, I had a problem with another sync service that would cause Xojo to not be able to save my project, because the process running in the background had a lock on it or tied up somehow. I kept losing edits that I know I was saving. I ended up moving away from file syncing to a true backup and the problem went away. I have no idea if you are having a problem in this area, just giving you a heads up in case you run into it.
I see this when the project file is on a network share.
Issue resolved by adding an exclusion to Avast for my project folder!
I’m sure there might be better options than Avast but the price is right and I’ve never had a virus when using this program (several years). That said I am always open to other options as Avast seems to have become quite bloated with their more recent releases.
Thanks very much for the help - I knew my odds of finding a solution were going to be really good at this site.
Sh*t! I have Avast too! Now I remember that under Win8 Avast ran a check on the compiled file! I have removed the bugger.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662545548.56/warc/CC-MAIN-20220522125835-20220522155835-00250.warc.gz
|
CC-MAIN-2022-21
| 2,993
| 13
|
https://en.audiofanzine.com/software-channel-strip/sknote/stripbus/
|
code
|
We get several emails with different files but in the end you just unzip the folder Vstplugins last hop and it's done.
The manual talks about the v1 I v2 out, so there are a lot of gray areas, but we must take the time to learn and understand the intricacies and the pieces fall to As.
I use windows 7 x64 / presonus studio one.
+ / - 2% cpu i5 2600k per strip / channel as max ("q now").
-> Nls equivalent performance of waves (I do not remember the vcc).
q focus the sound now is very different than in other modes and the lowest volume level, which is why I forced mode.
I received it this morning and just used QLQ hours time to understand its operation.
You should know that I am a Cartesian and was very skeptical about this type of plug-in "snake oil", but as you configure it as we did not realize, and then when we bypass there the effect of "who cut the 'trick'."
I do not like used some words like "glue" but then I do not know what else to say!
I tried the demos and waves nls vcc slate.
These last 2 are simpler at the interface and you get a result faster "clean".
However NLS version is nice Neve (no more) and VCC quickly gives a really good result BUT they cost 10X more expensive.
I got the same result with StripBus 2 ok after playing with 2h but it was for nothing.
NLS is even far behind, VCC is "equivalent" if we stay on the clean / transparent StripBus but offers many more possibilities, but goes further in "power" settings, so you have to go slow.
We must also understand that once found its config, just Recapture the same config on future projects, no need to type all the work every time.
Anyway, I'm totally in love with this plug, the last to have made me react this way are DSUs 10/15x price (ex: ampex, manley).
A plug 23 € satisfied or refunded, as would the other, it would be crazy ...
If you want a comparison A / B and a screenshot of my params, just ask.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400204410.37/warc/CC-MAIN-20200922063158-20200922093158-00741.warc.gz
|
CC-MAIN-2020-40
| 1,896
| 18
|
https://mastodon.nzoss.nz/@strypey/100189045704983972
|
code
|
I understand why permissions are useful and necessary in #GNU #Linux systems, but at times, they are a royal pain in the proverbial! If I had a pancake for every times I've moved non-sensitive movie, music etc files to or from a USB, or across a LAN, and ended up with weird permissions issues about who can read them, or rename them, or move them between folders, or delete them, I would have massive stack of pancakes.
@strypey I heartily suggest rdiff-backup. Al lthe convenience of rsync combined with diff'ed backups. Super simple, and when you have to recover, so much more precise that an rsync dump.
Here's my tutorial about it. Pretty quick read.
@strypey All those problems disappeared for me when I finally FINALLY standardised my UID scheme. I take it right out of the 500s or 1000s (depending on the *nix) and stick all my users up in the 10000 range, and each human person gets one and exactly one UID no matter WHAT the system. No more permission troubles.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828318.79/warc/CC-MAIN-20181217042727-20181217064727-00571.warc.gz
|
CC-MAIN-2018-51
| 971
| 4
|
https://www.mctsummit.eu/sponsors
|
code
|
Microsoft World-wide Learning
TTT Location Sponsor
Digicomp is the leading independent Swiss training partner for IT and IT management skills development. For 45 years, Digicomp has been creating the space for hands-on training to help people continuously learn new skills and develop them for in-demand professional roles. Because it is people and their skills that make companies successful today and in the future. (www.digicomp.ch)
Digicomp ist die führende unabhängige Schweizer Bildungspartnerin für die Entwicklung von IT und IT Management Skills. Seit 45 Jahren schafft Digicomp den Raum für praxisnahe Weiterbildung, um Menschen beim kontinuierlichen Lernen neuer Fähigkeiten zu unterstützen und für gefragte berufliche Rollen weiterzuentwickeln. Denn es sind Menschen und ihre Fähigkeiten, die Unternehmen heute und in Zukunft erfolgreich machen. (www.digicomp.ch)
Get accelerated training, wherever you are. Firebrand has been named amongst the Top Twenty IT Training Companies in the World, for 8 years running, having trained over 125 000 students on official courses by every big name in the industry including Microsoft, Cisco and (ISC)2.
Wherever you are in the world, experience a distraction-free environment by staying in one of our purpose-built training centres. Get high quality accelerated training delivered by industry-experienced professionals. Plus, our all-inclusive training covers all accommodation, meals, courseware and exams.
CloudLabs helps technology companies run hands-on-labs, demos & PoCs for various scenarios at scale. It is a flagship offering from Spektra Systems, a partner focused cloud solutions company. CloudLabs is also trusted by learning experts and educational institutions worldwide to deliver immersive technology learning experiences with zero to minimal management overhead.
For more information go to https://cloudlabs.ai/
XtremeLabs provides technology products and services to support employability, workforce development and training. XtremeLabs provides hands-on labs for training, examinations and certifications. XtremeLabs has over 9,000 hands-on labs that cover subjects such as coding, security, data science, machine learning, networking. and other technologies. Our labs are available in over 10 different languages including German, French, Chinese, Japanese, Russian and Arabic. For more information visit https://www.xtremelabs.io.
Skillable is an Authorized Lab Hoster for Microsoft’s MOC training courses. We strive to make it easier for MCTs to offer superior skilling experiences and provide extremely friendly tools and resources for you to prepare for and teach your classes. MCTs working with Skillable receive free access to our MOC courses, Instructor-specific documentation and videos, a recognition program to celebrate your achievements and a monthly community call to connect with other MCTs and Skillable team members. Additionally, MCTs receive complimentary access to our Challenge Labs catalog of more than 1,000 scored labs across a variety of topics and technologies. Learn more at https://skillable.com/instructor-recognition.
Barista Coffee Truck Sponsor
A courseware development company by MCTs and for MCTs.
Recognizing that Microsoft's discontinuation of their official courseware for on-premises solutions left an important gap in the Microsoft learning ecosystem, Specialist Courseware pooled a number of experienced Microsoft Certified Trainers (MCT) to develop courseware to fill that gap.
Further recognizing suitability issues with Microsoft's online-focused courseware for in-person deliveries, Specialist Courseware incorporate those MCTs significant experience to develop courseware suited for in-class deliveries.
If you want to help and train your customers on their current on-premises solutions, Specialist Courseware offers the courses you need, from A(ctive Directory) to Z(ero-trust).
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499541.63/warc/CC-MAIN-20230128090359-20230128120359-00446.warc.gz
|
CC-MAIN-2023-06
| 3,905
| 15
|
http://www.hotukdeals.com/ask/help-building-the-best-gaming-machine-83045
|
code
|
My brother has come to me and asked me to build him a new pc, one that he wants to use for gaming.
Unfortunately I have put all my attention towards my own HTPC build of late and therefore have little idea where to start.
He already has a good monitor and I will hopefully use the Antec Sonata II case as I have heard good things about it. I would also prefer to build it around an AMD processor.
Could someone give me some suggestions for his machine, baring in mind his budget of £500-£700?
Any help is appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320201.43/warc/CC-MAIN-20170623220935-20170624000935-00620.warc.gz
|
CC-MAIN-2017-26
| 519
| 5
|
http://sourceforge.net/p/arianne/mailman/arianne-general/thread/F23f2LTrpwACkWHZqYW000008fd@hotmail.com/
|
code
|
There's an online, text-based game called Materia Magica
(http://www.materiamagica.com) which has a big following of players. Their
leader is interested in using Arianne, but many of the players would need to
have some way to have both a graphics mode _and_ a text mode which can work
together. Would this be possible? Or do I need to explain more clearly?
Join the worlds largest e-mail service with MSN Hotmail.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500830721.40/warc/CC-MAIN-20140820021350-00369-ip-10-180-136-8.ec2.internal.warc.gz
|
CC-MAIN-2014-35
| 413
| 6
|
https://linguisticsandpolitics.unt.edu/mike-medeiros-bio
|
code
|
Mike Medeiros is an Assistant Professor at the Department of Political Science at the University of Amsterdam. His research explores sociopolitical issues related to social diversity. Specifically, He is interested in understanding how individuals from minority groups develop demands for cultural rights and decentralization as well as the acceptance, or rejection, of these demands by the wider national community. As a scholar originally from Quebec, he has been attracted to understand the relationship between language and politics. His work has explored how individuals develop attitudes towards language and how these attitudes influence their political behavior. Some of his publications on language and politics include: “National Frenemies: Linguistic Intergroup Attitudes in Canada” (in Ethnic and Racial Studies), “Refining the Influence of Language on National Attachment: Exploring Linguistic Threat Perceptions in Quebec” (in Nationalism and Ethnic Politics), and “The Language of Conflict: The Relationship between Linguistic Vitality and Conflict Intensity” (in Ethnicities).
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362969.51/warc/CC-MAIN-20211204094103-20211204124103-00472.warc.gz
|
CC-MAIN-2021-49
| 1,104
| 1
|
https://www.superprof.co.uk/msc-financial-mathematics-graduate-looking-give-tutorials-university-level.html
|
code
|
I approach each class on the needs of the student. We are all different, so I like to hear the needs of the student and then adapt accordingly. The best way to get better in maths is to solve as many exercises as possible, so you can experiment with exercises of different difficulty.
I have graduated with a first class honours degree in Mathematics and followed it with a postgraduate degree in Financial Mathematics at LSE with an overall of a Merit. I have given tutorials before but they were for mathematical methods using Python.
maths lessons closeby? Here's a selection of tutor listings that you can check out.
Superprof can also suggest algebra lessons to help you.
Learning isn't a problem, trigonometry lessons for all!
Taking arithmetic lessons has never been easier: you're going to learn new skills.
|at his home||at your home||By webcam|
|1 hour||Not available||£20||£20|
|5 hours||Not available||£95||£100|
|10 hours||Not available||£180||£200|
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347432237.67/warc/CC-MAIN-20200603050448-20200603080448-00249.warc.gz
|
CC-MAIN-2020-24
| 968
| 10
|
https://coderanch.com/t/298750/databases/SQLJ-JDBC
|
code
|
I'm new to Java and want to do some database manipulation. What are the advantages of using either SQLJ or JDBC? I've been working with JDBC a little and wonder if there is some kind of buffer limit on bytes returned from the database using a prepared statement. I wonder if I should change my focus and consider SQLJ. I'm trying to develop a web application. j2ee. What do I consider when trying to make a choice? thanks, :roll:
Hi Robyne, As far as I know, SQLJ is just one more level of abstraction. You write "embedded" SQL in your java code, which then gets translated into JDBC code. So the only difference (as far as I can tell) is ease of coding. I imagine some people would prefer to write embedded SQL rather than JDBC code directly. Hope this has helped you. Good Luck, Avi.
The main difference between JDBC and SQLJ is that while JDBC provides access through dynamic SQL, SQLJ provides access through embedded static, SQL. Thus the traditional benefits of static SQL for Java language programs are all provided by SQLJ.
SCJP 1.4, SCWCD 1.4, SCBCD 1.3
posted 16 years ago
Thanks so much. You all offered good suggestions and information. rob
I will chime in here in recommend using Hibernate. This allows you to get away from SQL totally if you want to and concentrate on your application rather than debugging SQL statements. I have just started using it over the past few days and I am pretty impressed. Plus, they just released their Version 2. So it's hot off the press. Another bonus: Open Source and FREE.
Trust God, but always tether your camel... to this tiny ad.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371826355.84/warc/CC-MAIN-20200408233313-20200409023813-00087.warc.gz
|
CC-MAIN-2020-16
| 1,582
| 8
|
http://www.coderanch.com/t/501258/Android/Mobile/display-max-ProgressDialog-place
|
code
|
A friendly place for programming greenhorns!
Big Moose Saloon
Register / Login
Win a copy of
Android Security Essentials Live Lessons
this week in the
How to display max value of ProgressDialog on the right place
Joined: Jul 01, 2010
Jul 01, 2010 05:45:20
How to display max value of ProgressDialog in the right corner under the running progress. Currently, it is displayed just after the current value, in this way
, but I want to display it in that way
Thanks in advanced!
subject: How to display max value of ProgressDialog on the right place
PA #1.....picture association
Unable to display images using fmt:messages with locale set in session
Things to know before buying a motorcycle
what would boys like to have as a gift......?????
All times are in JavaRanch time: GMT-6 in summer, GMT-7 in winter
| Powered by
Copyright © 1998-2014
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510270399.7/warc/CC-MAIN-20140728011750-00351-ip-10-146-231-18.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 840
| 20
|
https://github.com/exploitagency?tab=overview&from=2019-02-01&to=2019-02-11
|
code
|
Create your own GitHub profile
Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 31 million developers.
A tool for logging data/testing devices with a Wiegand Interface. Can be used to create a portable RFID reader or installed directly into an existing installation. Provides access to a web based in…
WiFi Keystroke Injection Tool designed for an Atmega 32u4/ESP8266 Paired via Serial (Cactus WHID Firmware). Also features Serial, HTTP, and PASV FTP exfiltration methods and an integrated Credentia…
Brute force/de Bruijn script for triggering an ook rf device with a rfcat dongle.
rfcat-rolljam is a python script to easily "jam", capture, and replay rolling code signals using two yard stick one devices and rfcat.
ESPortalV2 is a WiFi Captive Portal Credential Harvester (Phisher) for ESP8266 Devices. Fake a "Free WiFi HotSpot" with spoofed login pages.
Vanitygen PLUS! Generate vanity address for 100+ cryptocoins including: BTC, LTC, LBRY, UNO, DASH, DIAMOND, DOGE, FEATHER, GROESTL, MONA, PEERCOIN, VERTCOIN, ZIFTR, CROWN, GAME, PINK and MORE! Remo…
January - February 2019
exploitagency has no activity
yet for this period.
Press h to open a hovercard with more details.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247484928.52/warc/CC-MAIN-20190218094308-20190218120308-00619.warc.gz
|
CC-MAIN-2019-09
| 1,251
| 12
|
https://stackoverflow.com/questions/48110156/how-to-properly-design-this-part-of-a-database-circular-reference
|
code
|
A company has many projects
A project has many tags
A project belongs to only 1 company
A tag can belong to multiple projects
A company must have access to its own tags
In the first image, all tags for the company are available through the projects/project_tag. But if all projects are removed, then the tags for the company will not be accessible anymore, because the link between project_tag and projects is gone. The tags should be somehow always be linked to the company, even if there are no projects.
Example 2 (where tags are also linked to the company):
In the second image, it should work, but is this now a 'circular reference' ??? What should be the best solution for a problem like this? And what about foreign keys?
The question finally is: How to properly set up a database/datamodel for this situation?
Example when things could go wrong in the second example:
companies: id=1, name=MyCompany id=2, name=OtherCompany tags: id=1, company_id=1, name=MyTag id=2, company_id=2, name=OtherTag projects: id=1, company_id=1, name=MyProject project_tag: project_id=1, tag_id=1 project_id=1, tag_id=2 --> THIS ROW IS NOT VALID!
The last project_tag row is not valid because:
project 1 is linked to company_id 1
tag_id 2 is linked to company_id 2
UPDATED: Thanks all for the information!
Based on the accepted answer, the CREATE queries for PostgreSQL would become:
CREATE TABLE companies ( id SERIAL PRIMARY KEY NOT NULL, name TEXT NOT NULL ); CREATE TABLE projects ( id SERIAL PRIMARY KEY NOT NULL, company_id INT NOT NULL, name TEXT NOT NULL, UNIQUE (id, company_id), FOREIGN KEY (company_id) REFERENCES companies (id) ON DELETE RESTRICT ON UPDATE CASCADE ); CREATE TABLE tags ( id SERIAL PRIMARY KEY NOT NULL, company_id INT NOT NULL, name TEXT NOT NULL, UNIQUE (id, company_id), FOREIGN KEY (company_id) REFERENCES companies (id) ON DELETE CASCADE ON UPDATE CASCADE ); CREATE TABLE project_tag ( id SERIAL PRIMARY KEY NOT NULL, company_id INT NOT NULL, project_id INT NOT NULL, tag_id INT NOT NULL, UNIQUE (company_id, project_id, tag_id), FOREIGN KEY (company_id, project_id) REFERENCES projects (company_id, id) ON DELETE CASCADE ON UPDATE CASCADE, FOREIGN KEY (company_id, tag_id) REFERENCES tags (company_id, id) ON DELETE CASCADE ON UPDATE CASCADE );
- Rows inserted in project_tag are checked on the same company_id (else: denied)
- Not possible to insert duplicate rows into project_tag
- If a project is removed, the linked project_tag rows are also removed
- If a tag is removed, the linked project_tag rows are also removed
- If a company is being removed while still having projects, the removal is rejected (see projects table: ON DELETE RESTRICT)
- If a company (without projects) is removed, all linked tags are removed also
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202728.21/warc/CC-MAIN-20190323060839-20190323082839-00455.warc.gz
|
CC-MAIN-2019-13
| 2,748
| 23
|
https://digital.lib.niu.edu/islandora/object/niu-amarch%3A101246/print_object
|
code
|
Letter from the Colony Agents in London
Delaware, General AssemblyBollan, WilliamFranklin, BenjaminLee, Arthur
documents (object genre)
Delaware, General Assembly
New-Castle, Delaware, North America
Key people, events, and institutions: colonial government
This work is in the Public Domain, and as such is not subject to copyright restrictions. Users are free to copy, use, and redistribute it in whole or in part without permission.
No Copyright - Public Domain
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949025.18/warc/CC-MAIN-20230329182643-20230329212643-00334.warc.gz
|
CC-MAIN-2023-14
| 463
| 8
|
http://what-when-how.com/Tutorial/topic-276m1rg4v/Beginning-CSS3-62.html
|
code
|
HTML and CSS Reference
Using font-style to Italicize Text
he font-style property controls whether text is rendered in italic. It accepts the following values:
italic Italicize the text.
normal Remove italic.
oblique Use an oblique version of the font, if one exists. Otherwise, use italic.
Because very few web-safe fonts have oblique versions, italic and normal are the only values you need. The
main use for normal is to remove italic from text that you want to emphasize inside a larger block of text that's
Using font-weight to Make Text Bolder or Lighter
he font-weight property accepts the following values:
bold Make the text bold.
bolder Make the text bolder in relation to its parent.
lighter Make the text lighter in relation to its parent.
normal Render the text normally.
One of nine values increasing in steps of 100 from 100 to 900 ( 400 equals normal , and
700 equals bold ).
In practice, the only values you are likely to use are bold and normal . Setting font-weight to normal is useful
when you want to display as normal text an element, such as a <th> tag (table heading), that browsers normally
render in a bold font.
Using font-variant to Display Text in Small Caps
In CSS2.1, the font-variant property accepts the following values:
normal Render text using the same letter case as in the underlying code.
small-caps Render the text in small caps if supported by the font. Otherwise,
transform the text to uppercase.
Small caps display lowercase letters as uppercase, but in a smaller size and with slightly different
proportions, as shown in Figure 4-5 (the code is in small caps.html ).
Figure 4-5. The font-variant property converts the font to small caps
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934808935.79/warc/CC-MAIN-20171124195442-20171124215442-00635.warc.gz
|
CC-MAIN-2017-47
| 1,679
| 27
|
https://jobboard.careerin.co/job/1279-software-development-engineer-co-opintern-jan-2021-a-thinking-ape
|
code
|
Software Development Engineer Co-op/Intern [Jan. 2021]
This job is no longer accepting applications.
For the January term we will only be interviewing applicants who are currently located within commuting distance of Vancouver, BC. Everyone at ATA is currently working from home and we don't have a defined timeline for our return to the office. To ensure the best possible experience for students doing a co-op term at ATA we will only be hiring applicants who will not need to relocate in order to return or start their term at our studio in downtown Vancouver.
Engineers at A Thinking Ape are involved in all aspects of the products we create. You will have the ability to influence the design and development of the projects you are working on. You will be provided with challenging work to continuously improve and grow.
Most of our engineers work full-stack, with opportunities to develop specializations in Unity, Android and iOS, Python/Django, TypeScript/React, Distributed System Design, and Database Optimization. We use tools like Docker, MySQL, Redis, Kafka, BigQuery and Graphite/Grafana.
All of our co-ops are provided with the same opportunities as our full time engineers. We value a culture of meritocracy, and everything you do here will have a direct impact on our products. At the end of your term, you'll be able to install an app on your phone, and point out the cool things you made happen. You will get to work on our live games or our tools and infrastructure team and could be working on adding new features, metrics tracking, data analysis, or addressing big scalability problems.
Areas of work that co-ops have opportunities to contribute to:
- Client development: developing iOS and Android products from scratch and shipping worldwide featured products to the App Store
- Distributed systems: constructing applications using service oriented architectures that power our live gaming products
- Analytics: creating data visualizations and tools to help drive key product decisions and customer acquisition strategy
- Data mining: building a continuous real-time data collection and mining platform for player behaviour intelligence
Things that past co-ops have worked on:
- Guild management improvements like the ability to invite people, open clubs that players can join without approval, better club search, and other tools to keep our most active players engaged.
- Implemented a scalable group leaderboard event system full stack. The system guarantees consistency and availability while dozens of players try to contribute progress to their group frequently.
- Revamped data deploy tool to enable multiple game designers to work simultaneously. Setup metrics tracking and funnel analysis and experimented with different UI polishes to improve retention.
- Worked on upgrading our data pipeline: processing data and creating different data representations and visualizations to help ATA to make marketing and product decisions.
- Revamped the realm map overview to include realtime positions of their marches, locations of shrines/members of their/their own city, and bookmarked pins!
- Implemented the entire stack for our Second Builder subscription purchase, which included interfacing with both the Google Play Store and Apple App Store, as well as client support.
- Optimized particle systems in-game to significantly reduce peak memory usage.
- Developed leaderboard-assigned classes for Shrines to grant players additional perks.
Who you are:
- Strong understanding of object-oriented design, data structures and algorithms
- You communicate your thoughts and ideas clearly in code and in writing
- You are passionate about mobile games already OR are excited to learn about them and what drives our players
- You are an enthusiastic learner
- You take pride and responsibility in your work
What to include in your application:
- Yes, we do need your resume 😊
- Link us to things you’ve built! - show us what you made (side projects, open source projects, hackathons)
- Tell us about any competitions you’ve participated in
Things that don't matter as much:
- Knowledge of specific languages or domain expertise in particular platforms
- Mobile development experience
- Specific year level
While everyone on our team is different, to thrive here you should...
- Be self motivated, take pride in your work and enjoy huge amounts of ownership
- Set aside your ego and have wonderful arguments with your coworkers in order to create something better than any one person could individually
- Challenge your own assumptions and use data to make decisions whenever possible
- Be passionate about teaching others what you know and continuing your own growth every day
- Not be afraid to fail–you experiment and learn from your mistakes
What’s in it for you
At ATA you’re offered a flexible, safe, inclusive environment in which you have the autonomy to do your best work, surrounded by a strong team and with the encouragement of supportive leadership that doesn’t just care what you’re doing, but how you’re doing. You’re trusted, respected, listened to, cared for and valued. You take on thought-provoking projects and tackle fun problems alongside people who are equally invested in making meaningful contributions and seeing new ideas come to life. You know how your work aligns with the company’s goals. Your career is given the space and resources to progress. You accomplish things that make you proud. You are compensated competitively, your health and wellbeing are top priorities and you enjoy plenty of perks. You build communities, take ownership, have wonderful arguments, let the best ideas win and keep growing. You don’t just work for ATA, you are an integral part of ATA.
Our commitment to inclusion
At ATA we build communities. But community extends beyond our players: it also encompasses our employees and candidates. We support diversity in the workplace and always strive for inclusion. Part of this is selfish; we believe we’ll make better decisions if we’re able to tap into a variety of different perspectives. But we also care that our employees and candidates feel valued and comfortable being themselves. We are proud of the wonderful people, workplace and culture that ATA has fostered since its inception.
Discover even more
Check out our story to find out how we got to where we are today, and learn about our culture by following @athinkingape on social. You can also listen to Kenshi Arasaki, ATA CEO & Co-Founder, talk about what it’s like to work here.
Your application has been successfully submitted.
We build communities. News, updates and musings from one of Canada’s Top Small and Medium Employers. For customer support contact us through in-game h...
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585305.53/warc/CC-MAIN-20211020090145-20211020120145-00629.warc.gz
|
CC-MAIN-2021-43
| 6,758
| 48
|
http://theochem.github.io/horton/2.1.0b3/lib/mod_horton_cache.html
|
code
|
horton.cache – Avoid recomputation of earlier results and reallocation of existing arrays¶
In principle, the
JustOnceClass and the
Cache can be used
independently, but in some cases it makes a lot of sense to combine them.
See for example the density partitioning code in
Base class for classes with methods that should never be executed twice.
In typically applications, these methods get called many times, but only during the first call, an actual computation is carried out. This way, the caller can safely call a method, just to make sure that a required result is computed.
All methods in the subclasses that should have this feature, must be given the
class Example(JustOnceClass): @just_once def do_something(): self.foo = self.bar
When all results are outdated, one can call the
clearmethod to forget which methods were called already.
Object that stores previously computed results.
The cache behaves like a dictionary with some extra features that can be used to avoid recomputation or reallocation.
Clear all items in the cache
- When set to True, the items are really removed from memory.
- Limit the items cleared to those who have at least one tag that matches one of the given tags. When this argument is used and it contains at least one tag, items with no tags are not cleared.
Clear a selected item from the cache
- When set to True, the item is really removed from memory.
Store an object in the cache.
- key1 [, key2, …]
- The positional arguments (except for the last) are used as a key for the object.
- The object to be stored.
- Tags to be associated with the object
Iterate over all valid items in the cache.
Iterate over the keys of all valid items in the cache.
Iterate over the values of all valid items in the cache.
Get a value from the cache
- key0 [key1 …]
- All positional arguments are used as keys to identify the cached value.
- Parameters used to allocate a cached value if it is not present yet. This argument can take two forms. When integer or a tuple of integers is given, an array is allocated. Alternatively, a tuple may be given whose first element is a constructor, and further elements are arguments for that constructor.
- A default value that is returned when the key does not exist in the cache. This default value is not stored in the cache.
- When alloc is used and a new object is thereby created or reused, it will get these tags. This argument is only allowed if the alloc argument is present. In case no new object is allocated, the given tags must match those already present.
The optional argument alloc and default are both meant to handle situations when the key has not associated value. Hence they can not be both present.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100057.69/warc/CC-MAIN-20231129073519-20231129103519-00737.warc.gz
|
CC-MAIN-2023-50
| 2,691
| 34
|
http://phoronix.com/forums/showthread.php?69959-Adobe-Issues-Final-Linux-Flash-Player-Release/page6
|
code
|
It is. And someone once dug through the code to find out the differences compared to Chrome (well, Chromium): http://chromium.hybridsource.org/the-iron-scam. Basically, the differences are very minimal. Stuff is removed that's configurable in Chrome anyway, or isn't actually tracking you. The only difference since then, Iron now has a built-in adblocker. That's it. That's the big secret behind the "safe" Iron and the "big bad spying on you" Chrome.
Basically, this person is counting on people believing in the boogeyman to get ad-revenue. That's the "scam" part about it. Nothing illegal, so not a true scam, but there's deceit and hypocrisy. Deceit, because you're not any safer with Iron, there's no special sauce in it that makes it harder for ad companies to track you (an adblocker is not special sauce, every browser has adblocking extensions available). And hypocrisy, because he's using adsense. So apparently, Google's browser is evil but nothing wrong in taking money from Google's ad platform. Ironically, it's actually the ad platform that really is tracking you.
Yes, all correct. He is making money and not hurting anyone. He has his own tiny private chirch hehe.
I'll rather talk about Chromium instead of Chrome ... remember that the article cited ( http://chromium.hybridsource.org/the-iron-scam ), compares the open-source base for Chrome, not Chrome itself (which is proprietary, and because of that, I won't accept or deny anything of it)
The browser is fine, but people tends to dislike the involvement of Google, so a lot of the """"arguments""" come from there, no proofs though (honestly, as developers is that hard to inspect the source of an open source software? really?)...
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010305626/warc/CC-MAIN-20140305090505-00087-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 1,706
| 5
|
https://www.wildflowerdaze.com/432515864/6938579/posting/beach-moonflower
|
code
|
Just got back from a dog walk around the neighborhood. Passed some nice big white moonflowers along the way. They reminded me of the moonflower blogs a few weeks ago. Then I thought of this. Why didn't I think of it for the moonflower posts? Wouldn't that be an amazing moon? Maybe someone had ingested a little bit of that other moonflower before they named this?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337595.1/warc/CC-MAIN-20221005073953-20221005103953-00730.warc.gz
|
CC-MAIN-2022-40
| 364
| 1
|
http://it.peikkoluola.net/tag/report-builder/
|
code
|
Purpose: When you create bloated SQL queries, you might need to shape them further.
You understand your query, but there just seem to be so many things that must be taken into account. You know that they will not alter the context of your report in a way that could lead to missing information. Therefore you have decided to stop working on the bloated SQL query and use the Report Builder as a tool to shape the query as you see fit.
Purpose: When you create long reports, this makes them easier to read
When you are receiving hundreds or thousands rows of data – your report quickly becomes hard to read. If you are unfortunate and need to read the data yourself, help yourself out with a basic trick. Create a conditional formatting for your report. SQL Report Builder’s conditional formatting is a nice additional touch to your reports and it just might make the report readable for someone else too.
Purpose: Create a Report that allows a user to select the limiting Collection from a drop down list
When you are creating more complex reports with the Report Builder, you will begin to use different kind of parameters with queried values. One of the most common SCCM parameter is the Collection parameter. This guide is valid when you need create your report and let a user to limit it to a single collection.
Purpose: Requirements to correctly use SQL Server Report Builder on an external workstation
Should you need to use the SQL Server Report Builder from an external workstation (not directly from the SQL Server where the Report Service Point is installed), you will need to add the SQL server certificate to the external workstation. This will allow the external workstation to function properly with all of the Report Builder actions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141213431.41/warc/CC-MAIN-20201130100208-20201130130208-00326.warc.gz
|
CC-MAIN-2020-50
| 1,752
| 8
|
http://stackoverflow.com/questions/21988487/enumerate-years-between-two-dates-with-calculated-values/21989626
|
code
|
I have a postgres table that looks something like this:
proposal_id | nih_budget_start | nih_budget_end | nsf_start_date | nsf_end_date | award_amount proposal_A | 03/01/2000 | 12/31/2000 | | | 10,000 proposal_B | | | 08/01/2005 | 07/31/2009 | 5,000,000 proposal_C | 06/27/2012 | 11/17/2013 | | | 420,000
The dates have the
date data type.
I'd like to create a view that tells me each year the proposal was funded, and what the average award amount was. So, the view might look something like this (option 1):
proposal_id | start_year | end_year | average_award proposal_A | 2000 | 2000 | 10,000 proposal_B | 2005 | 2009 | 1,000,000 proposal_C | 2012 | 2013 | 210,000
Or -- even better -- this (option 2):
proposal_id | year | award proposal_A | 2000 | 10,000 proposal_B | 2005 | 1,000,000 proposal_B | 2006 | 1,000,000 proposal_B | 2007 | 1,000,000 proposal_B | 2008 | 1,000,000 proposal_B | 2009 | 1,000,000 proposal_C | 2012 | 210,000 proposal_C | 2023 | 210,000
Also, it might be nice to have the award amount prorated for partial-year funding, but this isn't completely necessary.
Based on an answer suggested below, I'm currently doing this, which seems to be working as expected to get option 1 above:
CREATE VIEW award_per_year AS select t1.proposal_id,t1.START_DATE,t1.END_DATE, (t1.adjusted_award_amount/((t1.END_DATE - t1.START_DATE) + 1.)) avg_award from (select t2.proposal_id, (extract(year from START_DATE)) START_DATE, (extract(year from END_DATE)) END_DATE, t2.adjusted_award_amount from (select proposal_id, case when nih_budget_start is not NULL then nih_budget_start else nsf_start_date end start_date, case when nih_budget_end is not NULL then nih_budget_end else nsf_end_date end end_date, adjusted_award_amount from proposal)t2)t1
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701163421.31/warc/CC-MAIN-20160205193923-00149-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 1,753
| 11
|
http://archives.miloush.net/michkap/archive/2006/03/18/554301.html
|
code
|
by Michael S. Kaplan, published on 2006/03/18 03:01 -05:00, original URI: http://blogs.msdn.com/b/michkap/archive/2006/03/18/554301.aspx
Suzanne was asking about the left-to-right marker, and if there was an easy way to type it.
Same for the right-to-left-marker.
I no longer even try to use the OSK (on-screen keyboard) to try to see what a keyboard supports. It is much easier to use MSKLC.
Looking at the Hebrew keyboard, it turns out that the CTRL shift state is quite interesting:
And, not to be outdone, the CTRL+SHIFT shift state is also interesting:
I would highly recommend using MSKLC for future keyboard spluenking (unless you are working with something really silly like that Canadian Multilingual Standard keyboard!). It has much more sophisticated code for loading up what a keyboard has to offer....
This post brought to you by U+200e, LEFT-TO-RIGHT MARKER
go to newer or older post, or back to index or month or day
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475825.14/warc/CC-MAIN-20240302120344-20240302150344-00630.warc.gz
|
CC-MAIN-2024-10
| 931
| 9
|
https://community.intel.com/t5/Intel-Distribution-of-OpenVINO/translation-from-NHWC-to-NCHW/td-p/1160489
|
code
|
I am trying to convert my tensorflow model(.pb) to IR using the script mo_tf.py and i dont want model optimizer to perform the translation operation on input size from (n,H,W,C) to (n,C,H,W) so i am passing the flag --disable_nhwc_to_nchw, but then it is giving error :
[ ERROR ] Concat input shapes do not match
[ ERROR ] Shape is not defined for output 0 of "concatenate/concat".
[ ERROR ] Cannot infer shapes or values for node "concatenate/concat".
[ ERROR ] Not all output shapes were inferred or fully defined for node "concatenate/concat".
[ ERROR ]
[ ERROR ] It can happen due to bug in custom shape infer function <function concat_infer at 0x7f1dbeced0d0>.
[ ERROR ] Or because the node inputs have incorrect values/shapes.
[ ERROR ] Or because input shapes are incorrect (embedded to the model or passed via --input_shape).
[ ERROR ] Run Model Optimizer with --log_level=DEBUG for more information.
[ ERROR ] Stopped shape/value propagation at "concatenate/concat" node.
I am running the following command:
python3 mo_tf.py --input_model frozen_model.pb --output_dir model --tensorflow_use_custom_operations_config /opt/intel/computer_vision_sdk/deployment_tools/model_optimizer/extensions/front/tf/yolo_v3.json --input_shape [1,416,416,3] --disable_nhwc_to_nchw
PS. It runs fine if I dont pass the --disable_nhwc_to_nchw flag.
Any help will be appreciated.
Hi Shubha, yes it works if don't add -disable_nhwc_to_nchw flag, but then then during the inference, model is detecting lot of objetcs in a frame.
I converted the darknet yolov3 to keras framework and also removed some of the layers for my use case, but the last layers(3 output layers-YoloRegion) have the same dimension as of darknet
Hi Shubham. Can you try with --log_level DEBUG ?
It may help to dump the tensorflow model to a text version to see if there's something odd about node "concatenate/concat".
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662531352.50/warc/CC-MAIN-20220520030533-20220520060533-00114.warc.gz
|
CC-MAIN-2022-21
| 1,876
| 19
|
https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2016416
|
code
|
View Persona Management features do not function when Windows Client-Side Caching is in effect (2016416)
The Folder redirection group policy setting is enabled, but the local user profile data is not redirected to the specified remote folders.
Offline files in the Files and folders to preload group policy setting do not populate the local profile when the user logs on.
Local use profile data is not replicated to the remote profile repository.
The Enable background download for laptops group policy setting is enabled, but the files are not downloaded to the local profile on the laptop when the user logs on.
These issues arise when the Windows Client-Side Caching system, a mechanism that supports the Windows Offline Files feature, is in effect on the local system. Windows Client-Side Caching caches user profile files, redirecting them to a local path under its control such as C:\windows\csc.
- Synchronize any profile data that currently resides in the local Client-Side Caching database. Use the Sync Center on the local system. On Windows 7, go to Start > All Programs > Accessories > Sync Center.
For more information, see the To sync all of your offline files immediately section in Working with network files when you are offline.
- (Optional) Delete the profile data from the Client-Side Caching database on the local system by using the Registry Editor:
Note: This procedure modifies the Windows registry. Before making any registry modifications, ensure that you have a current and valid backup of the registry and the virtual machine. For more information on backing up and restoring the registry, see the Microsoft Knowledge Base article 136393.
- On the local system, click Start > Run, type regedit, and click OK. The Registry Editor window opens.
- Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CSC\Parameters.
- If the Parameters node does not exist in this path, create a new node named Parameters.
- In the Parameters node, create a new registry key named FormatDatabase.
- Click Edit > New > DWORD (32-bit) Value to create a key of the type REG_DWORD.
- Enter FormatDatabase for the name of the key.
- Set the Data in the FormatDatabase key to 1.
- Close the Registry Editor.
- Restart the local system.
- Disable the Windows Offline Files feature.
To disable Windows Offline Files from the Control Panel:
- On the local system, open the Control Panel.
- Navigate to Sync Center > Manage offline files.
- In the Offline Files dialog box, click Disable offline files and click OK.
Alternatively, you can also disable Windows Offline Files by setting a group policy setting:
- On the local system, click Start > Run, type gpedit.msc, and click OK.
- In the Local Group Policy Editor, navigate to the Computer Configuration > Administrative Templates > Network > Offline Files folder.
- Select the Allow or Disallow use of the Offline Files feature group policy setting.
- Select Disabled.
Note: To disable Windows Offline Files with the Allow or Disallow use of the Offline Files feature group policy setting on all the systems in a specified Windows domain or OU, you can use the Group Policy Object Editor in MMC in Active Directory.
- Verify that the Client-Side Caching driver is disabled on the local system. If the driver is enabled, disable it.
For example, in a Windows command prompt, run this command:
sc config csc start= disabled
- Restart the local system.
- The Microsoft support blog How to Properly Disable Offline Files in Windows Vista.
- Best Practices for Configuring a View Persona Management Deployment section in the VMware Horizon View Administration Guide.
Note: The preceding links in this article were correct as of January 9, 2014. If you find a link is broken, provide feedback and a VMware employee will update the link.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824337.54/warc/CC-MAIN-20160723071024-00237-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 3,795
| 37
|
https://luckybookshelf.com/learning-modern-linux-by-michael-hausenblas/
|
code
|
Learning Modern Linux: A Handbook for the Cloud Native Practitioner by Michael Hausenblas
Book about various parts of Linux systems, the kernel and its ecosystem. Even though I’ve used Linux for my development work for many years, a lot of this book was new to me, covering topics that most developers have interacted with at some level, but most don’t understand deeply. The text is a mixture of theoretical and practical knowledge, it covers a lot of topics without going into too much depth on any of them (it is only about 200 pages), but gives pointers to resources where you can learn more if you want. A lot of the book is diagnostic commands and example output, which you should follow along while reading (not too difficult because they are mostly commands to diagnose the state of various parts of the system). Another useful aspect is it tells you which commands are deprecated and newer versions are preferred, and it gives upgraded versions of many standard Linux commands.
Some of the topics covered in each chapter:
- Ch1: Differences between environment, OS, kernel, Linux distribution; history of Linux.
- Ch2: Overview of the kernel, which is basically an abstraction between applications and hardware. The kernel manages processes, virtual memory, the filesystem and provide syscalls for applications.
- Ch3: Shell and scripting basics. Environment variables, basic commands (including modern versions of these), alternative shells, tmux multiplexing, bash scripting.
- Ch4: Access control: managing users, file permission bits, UIDs for process permissions, capabilities for fine grained permission management.
- Ch5: File system basic terminology and commands; VFS (virtual file system) allows the “everything is a file philosophy” with kernel information mapped to filesystems in /proc and /sys. Besides ordinary filesystems, there are also in-memory only and copy-on-write filesystems for efficiency.
- Ch6: The Linux startup process using UEFI and bootstrapping; systemd which manages daemons (replacing cron jobs); package managers like yum and apt; namespaces and cgroups existed before Docker for resource isolation, but Docker made things easier, and is useful in many places for containerization.
- Ch7: Networking: the TCP-IP stack (comprising of link, internet, transport and application layers), DNS, network tools like Curl, SSH, SCP.
- Ch8: Common logging formats, tools to monitor system resource usage, tools to profile for performance.
- Ch9: Miscellaneous topics: interprocess communication, virtual machines, container-centric Linux distros.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099514.72/warc/CC-MAIN-20231128115347-20231128145347-00894.warc.gz
|
CC-MAIN-2023-50
| 2,588
| 12
|
http://forums.rockbox.org/index.php?topic=7052.0
|
code
|
This following method should provide you with the jpegs (not sure about pngs) from your iTunes 7+ database, but you're gonna have to match 'em with the right files/directories when you're done.
Download jpegextractor from this page
. Extract it to a folder on your desktop.
Open your OS' finding app--if in XP you can hold down the Winkey and press F. You want to search your local drive for all files that end in itc
, so.. *.itc
is what you should enter. (Assuming you use iTunes 7+ these are the encrypted album artwork files and will be stored in a nested structure in your iTunes music folder.) Copy everything you find to the jpegextractor folder you made on your desktop.
Open a command window and navigate to said folder. Enter "java jpegextractor -p cover -d 3 *.itc
" without the quotes and press enter. The -p switch stands for prefix, so all of the output files will start with "cover". The -d switch is for digits--it will pad the digits at the end to 3 places (ie 001, 002, etc).
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119356.19/warc/CC-MAIN-20170423031159-00197-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 993
| 8
|
https://community.splunk.com/t5/Splunk-Search/How-to-search-for-ValueA-look-ahead-to-the-following-20-events/m-p/277298
|
code
|
Ah! You're right, I switched the two cases in the if statement around. Sorry for that, I just edited the original post. It should now work as intended, which is in plain language this: You eval a field "200_event" to contain a 1 each time a successfull login takes place, and then you keep a running total (the "id" field) of these events. This is useful because each time you have one of those 200 events, you can conclude that the last 401 has successfully been answered. This in turn means that a running count of the same attempt without a successful 200 answer (i.e. no change in the "id" field) can help you track down someone with multiple unsuccessful attempts.
If that didn't clear things up enough, feel free to ask further 🙂
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780060538.11/warc/CC-MAIN-20210928062408-20210928092408-00055.warc.gz
|
CC-MAIN-2021-39
| 738
| 2
|
https://bitshost.ie/hosting-definitions/cname-records/
|
code
|
Setting up a CNAME record for each of the domains or subdomains you have within a hosting account will allow you to forward it to a different domain/subdomain. The forwarded domain name will lose all its records - A, MX and so forth, and will take the records of the domain address it is being pointed to. In this light, you can't set up a CNAME record to redirect your domain name to a third-party company and keep a working e-mail service with the first provider. Also, it is essential to know that a CNAME record is always a string of words rather than a number as it is regularly mistaken for the A record of the domain name being redirected. One of the major uses of a CNAME record is to point a domain that you own through one company to the servers of some other company when you have created a site with the latter. In this way, the website will appear under your own domain, not under some subdomain provided by the third-party provider.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511284.37/warc/CC-MAIN-20231003224357-20231004014357-00849.warc.gz
|
CC-MAIN-2023-40
| 946
| 1
|
https://www.berlinassociates.com/client-list/blackadder
|
code
|
Rights for Blackadder are dealt with as a package, whereby the rights of the writers, producer, format creators and Rowan Atkinson's performance are negotiated as one, and may not be cleared individually.
The sitcom follows the misfortunes of Edmund Blackadder through various historical periods. It was voted in the top 20 British television programmes of all time by the BFI.
For extract enquiries please provide the following in the first instance: the series in which the extract originally appeared, the length of the extract and the rights required.
Amateur stage enquiries should be directed to Danielle Walker at United Agents - firstname.lastname@example.org
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817153.39/warc/CC-MAIN-20240417110701-20240417140701-00328.warc.gz
|
CC-MAIN-2024-18
| 667
| 4
|
http://citizen-europe.blogspot.com/2009/01/what-is-twitter-actually-good-for.html
|
code
|
Monday, January 26, 2009
I've been trying Twitter out for a day now, and I couldn't really see the point... until, that is, this morning - when I think I finally "got" Twitter.
Twitter, it seems, does have a purpose. It makes a great little live web feed! I've signed up to "follow" some of my favourite blogs and websites - The Economist, Wall Street Journal, Financial Times, The Guardian, Boingboing, Slashdot, Engadget, Lifehack, etc.
Then, using Digsby, I can get auto-updates every time one of those sites puts up something new.
I can't see myself using Twitter for social networking - but I think it could work as a web feed...
EDIT: And now I've just discovered that Twitter integrates into Facebook - so both status-updates can be linked.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676596542.97/warc/CC-MAIN-20180723145409-20180723165409-00554.warc.gz
|
CC-MAIN-2018-30
| 747
| 6
|
https://thegeek.pw/sonicwall-ssl-vpn-short-lease-time-causing-havoc-on-my-dns/
|
code
|
--> Grief Relief Audio Program
--> Secret Of Exciting Piano Chords
--> Warrior Zero Bodyweight Challenge
--> Dieta 4 Semanas Por Brian Flatt
ISSUE: Duplicate DNS entries for the same IP address but different host names. This is most definitely being caused by the SonicWall SSL-VPN IP Pool having a one or two hour lease time because it is only affecting the subnet that is handed out by the SW. All my other DHCP scopes are working just fine and AD is getting the expected updates from the DHCP. DNS is configured per MS best practices so I believe I'm looking at 14 days before the records are updated, unless DHCP updates the record before then. As you might guess, these duplicate records are causing some serious problems with PDQ providing me with accurate device information, and I'm getting far too many scan errors due to the device IPs changing so frequently.
POSSIBLE SOLUTIONS: Either I extend the lease time, I can handle the number of addresses fine, or someone tells me the secret to getting the DNS records updated immediately when the IP changes.
Read more: reddit.com
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669967.80/warc/CC-MAIN-20191119015704-20191119043704-00376.warc.gz
|
CC-MAIN-2019-47
| 1,085
| 7
|
https://blog.schwarz-interactive.de/2007/06/silverlight-and-infragistics.html
|
code
|
Infragistics is already deeply involved in Silverlight development . They are excited about the platform as the next-generation Web UI. They think there are several key wins in Silverlight for Web application development and are exploring how they can best provide controls and tooling to complement what Microsoft provides in the box.
At TechEd this year the showed a proof-of-technology demo based on Silverlight 1.1. Controls they have been working on: Image Slider, Slider Panel and a Chart control.
Get a taste of what they're doing with Silverlight
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647810.28/warc/CC-MAIN-20230601110845-20230601140845-00471.warc.gz
|
CC-MAIN-2023-23
| 556
| 3
|
https://blog.adafruit.com/2016/04/26/aniko-kolesnikova-creates-3d-book-covers-arttuesday/
|
code
|
Crafting the most beautiful journals, book covers and Kindle cases – her work is so unique and precious it can never be relegated to the charity shop bag. From intricate dragons and fantastic foxes to wise owls and majestic eagles, every product is lovingly handmade and you can even choose your own theme. Prices start from £150 for an A6 front cover only.
Make a robot friend with Adafruit’s CRICKIT – A Creative Robotics & Interactive Construction Kit. It’s an add-on to our popular Circuit Playground Express, FEATHER and other platforms to make and program robots with CircuitPython, MakeCode, and Arduino. Start controlling motors, servos, solenoids. You also get signal pins, capacitive touch sensors, a NeoPixel driver and amplified speaker output. It complements & extends your boards so you can still use all the goodies on the microcontroller, now you have a robotics playground as well.
Have an amazing project to share? Join the SHOW-AND-TELL every Wednesday night at 7:30pm ET on Google+ Hangouts.
Join us every Wednesday night at 8pm ET for Ask an Engineer!
Maker Business — Fewer startups, and other collateral damage from the 2018 tariffs
Wearables — Battery wash cycle
Electronics — How to make your own magnetic field probe!
Biohacking — The State of DNA Analysis in Three Mindmaps
Python for Microcontrollers — One year of CircuitPython weeklies!
No comments yet.
Sorry, the comment form is closed at this time.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156252.62/warc/CC-MAIN-20180919161420-20180919181420-00494.warc.gz
|
CC-MAIN-2018-39
| 1,450
| 11
|
https://www.nooblet.org/blog/2009/rpc-over-http-using-outlook-2003/
|
code
|
1. Create or Edit an Exchange E-mail account in Outlook.
2. Click on the “More Settings” button.
3. Click on the Connection tab…
4. Tick the box to “Connect to my Exchange mailbox using HTTP” and then click the button “Exchange Proxy Settings…”
5. Enter the server name for Exchange/RPC server
6. I tick both boxes to use HTTP first so the user gets the same experience regardless of network they are on. Otherwise when only RPC over HTTP is available (the user is out of the office) Outlook takes a while to timeout its TCP connect before attempting HTTP.
7. I use Basic Authentication over SSL.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950247.65/warc/CC-MAIN-20230401191131-20230401221131-00797.warc.gz
|
CC-MAIN-2023-14
| 612
| 7
|
https://tv-english.ru/asp-code-validating-a-form-6427.html
|
code
|
Asp code validating a form
However, in the example above, all input fields are optional.The script works fine even if the user does not enter any data.Hi I'm making a web page where the user can choose whether to search a database by either last name, customer number, data, order number or orders for shipping.The user chooses by clicking on a radio button corresponding to the choice they want, then they type in a textbox the required information, so if they chose last name, then they have to type a surname in the text box.If the REQUEST_METHOD is POST, then the form has been submitted - and it should be validated.
A form with method="get" How to interact with the user, with the Request. A form with method="post" How to interact with the user, with the Request. A form with radio buttons How to interact with the user, through radio buttons, with the Request. Information sent from a form with the GET method is visible to everyone (it will be displayed in the browser's address bar) and has limits on the amount of information to send. Form command is used to collect values in a form with method="post".
You should consider server validation if the user input will be inserted into a database.
A good way to validate a form on the server is to post the form to itself, instead of jumping to a different page.
The next step is to make input fields required and create error messages if needed.
Anthony Moore Microsoft Corporation July 2000 Updated March 2002 Summary: Provides a brief overview of the validation framework in ASP.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046152156.49/warc/CC-MAIN-20210726215020-20210727005020-00613.warc.gz
|
CC-MAIN-2021-31
| 1,539
| 7
|
https://addons.mozilla.org/en-US/firefox/addon/traduzir-paginas-web/reviews/1877717/?utm_content=homepage-collection-featured&utm_medium=referral&utm_source=addons.mozilla.org
|
code
|
Rated 5 out of 5by Claudiu, 2 months ago
You should put the extension with the Recommended logo. Add the extension to Firefox Android stable, because it also works on Android. Is this being worked on?
Developer responseposted 2 months ago
There is no way for me to add the extension to Firefox stable. I have no control over it. Previously the extension could be installed on any Firefox Android, after the Fenix update only recommended extensions can be installed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711200.6/warc/CC-MAIN-20221207153419-20221207183419-00422.warc.gz
|
CC-MAIN-2022-49
| 465
| 4
|
https://matsci.org/t/temperature-profile-with-fix-shake/18947
|
code
|
I am aware that:
compute temp/profile out bin
cannot correctly calculate temperature profiles when “fix shake” is used (problem when one atom in the fixed bond is in one bin, and the other atom is in an adjacent one).
I am very willing to write, and share a code to correctly calculate temperature profiles when “fix shake” is applied. Looking around on the LAMMPS mailing list, I have found that “compute temp/profile out bin” does not remove the degrees of freedom affected by “fix shake”. The only problem is that I do not really know what this implies/changes in the calculation of each atom’s KE:
KE = 3/2 k * mass * (vx^2 +vy^2 + vz^2)
If anyone could provide any helpful suggestions, once I finish the code, I will gladly share it.
Thanks a lot
The problem is not in the definition of KE, it's in the definition of the number of degrees of freedom. Specifically, when a (potentially complicated) molecule straddles one of the bin boundaries for your profile, how many of its degrees of freedom go into each bin?
Consider I have a molecule of hydrogen gas (H2), the bond length of which I
constrain with fix shake. Why not only consider the barycenter of the
constrained bond length ? Even if the molecule of H2 straddles two bins,
could we not take the barycenter of the H-H bond, and put all of the DoF
associated with that bond in one of the two bins?
This reasoning could be generalized to a more complicated molecule, I am
2013/8/7 Niall Jackson <[email protected]>
Absolutely. Or, for something simple like H2, you could put half of the degrees of freedom on each atom. You just need to make sure you're consistent in how you partition the DoFs. Obviously, if your thermostat is working according to different rules, then you'll probably find discrepancies between your input temperatures and your temperature profile.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499890.39/warc/CC-MAIN-20230131190543-20230131220543-00741.warc.gz
|
CC-MAIN-2023-06
| 1,848
| 16
|
https://statamic.com/forum/382-does-statamic-change-permissions-to-the-
|
code
|
Every few weeks I'll get an email from my former employer that a Statamic site I built is acting up. When FTP in I see that the
_cache/app/content.php file permissions are set to 000.
I set it to 664 and all is restored. Does Statamic ever change permissions for this file? Is this a Rackspace (shared) server gone wild?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00039.warc.gz
|
CC-MAIN-2022-33
| 320
| 3
|
https://hackaday.com/2017/10/04/friday-hack-chat-hardware-games/
|
code
|
For this week’s Hack Chat, we’re talking all about hardware games. What’s a hardware game? Anything where we use hardware, electronics, or code for user interaction. This is a vast, vast topic and there are a lot of tips and tricks that go into making a unified experience that’s both valuable and can stand up to the rigors of any crowd.
Our guest for this week’s Hack Chat will be [Phoenix Perry], lecturer, CS PhD researcher, game company owner, artist, programmer, game designer, and activist. For every human-computer computer interaction to teaching computer science, [Phoenix] has had her hand in it. She founded Code Liberation Foundation, which teaches women to program games for free. She’s a lecturer in Physical Computing at Goldsmiths, University of London, she’s given talks at Hackaday conferences, she’s created low-poly trees,
For this Hack Chat, we’re going to be talking about integrating hardware into gaming, or turning the idea for a game into a reality with hardware. We’ll be discussing game design, hardware design for games (need to make it idiot-proof, after all), building communities, and educating others.
As usual with Hack Chats, we’re taking questions from the audience. If you have a question that simply must be answered, here’s a discussion sheet. Fill that out, and we might get around to your question
Our Hack Chats are live community events on the Hackaday.io Hack Chat group messaging. This Hack Chat will be going down noon, Pacific time on Friday, October 6th. Wondering why the Brits were the first to settle on a single time zone when the US had a more extensive rail network and the longitude so time zones made sense? Here’s a time zone converter! Use that to ponder the mysteries of the universe.
Click that speech bubble to the right, and you’ll be taken directly to the Hack Chat group on Hackaday.io.
You don’t have to wait until Friday; join whenever you want and you can see what the community is talking about.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474746.1/warc/CC-MAIN-20240228211701-20240229001701-00494.warc.gz
|
CC-MAIN-2024-10
| 1,994
| 7
|
https://www.ninjatb.com/howtofindwords/how-to-find-a-specific-word-on-google-chrome-how-to-search-for-two-different-words-in-excel.html
|
code
|
Well there are a few things I look for (I will produce a bonus video about this topic and add it to the other bonus video tutorial) but basically I like to see sites like forums/niche sites/Q&A sites in the top 10 along with other things like sites that are not targeting exact keyword in title/meta, sites with low page authority and domain authority, sites that are less than 3 years old etc etc
Mentioned in the above video is the Keyword Competitiveness (KC) feature within Long Tail Pro. With earlier versions of Long Tail Pro, you could only access this feature if you paid extra to upgrade to the Platinum version of Long Tail Pro. Pricing structures and the way the software is delivered has evolved over the years – and currently (as of the date I am writing this) all features of the software are included no matter which payment plan you choose. So right now – everybody who buys Long Tail Pro has access to this extremely powerful feature.
So what exactly is Keyword Competitiveness (KC)? It’s only the feature within Long Tail Pro that completely changed the game and made keyword research so ridiculously simple that even a dumb truck driver like me could become an expert! It basically works like this. As soon as you click the button in Long Tail Pro Cloud to retrieve keywords, it automatically calculates a number for each keyword (between 1 and 100) based on several different SEO factors. Lower numbers mean the keyword is easier to rank for and higher means it is harder to rank for. More on that below…
One possible problem is that although the Keyword Planner has some cool new features (including integration of the Google Traffic Estimator, which will be retired too), as of this writing, the indispensable Exact Match and Phrase Match features are nowhere to be found! Whole books will become useless without these, so I hope Google will eventually port them to the Keyword Planner. Nor do you see the “Include specific content” option, which is a life-saver for the adult industry, which spends the most on Google PPC.
Some of the links on this site are affiliate links, which means that if you choose to make a purchase, I will earn a commission. This commission comes at no additional cost to you. I only recommend products/services that are helpful and useful to my business, not because of the commissions I make if you decide to buy something. Please do not spend any money on these products unless you feel you need them or that they will help you achieve your goals.
The keywords you want to focus your SEO on should closely resemble the vocabulary of your audience. In order to come up with the proper keywords you really have to get inside the heads of the people who search for your website. What terms will people use? How do people search? Which question does your website answer? You should create a list of all search terms people could use and think of combinations and nuances within these search terms.
I actually don't use any keyword tools aside from Google Trends, but only rarely do I even use that. I try to talk to many of our target audience members (entrepreneurs) as I can. I attend events, I have phone calls, I sit next to them while working. Generally speaking, I think it's a waste of time to START with keyword tools instead of actual customers. Yes, you can target people in broad swaths and get a high level sense for what's interesting and trending, but at least in the case of our business at NextView Ventures, it's way more powerful to talk to actual "customers" you serve.
But maybe you didn’t watch the tutorial video yet. Or maybe you didn’t know about the extremely powerful KC feature. Maybe you didn’t know how quickly, easily and effectively you could analyze Google top 10 search results with Long Tail Pro. And maybe you didn’t even know how profitable it can be to simply target just the really long tail keywords.
In addition, you can dig into the paid side of search and find out what keywords your competitors are bidding on, and then leverage those keywords for your own organic benefit if you're not already doing so. Search Metrics does this as well, but I've found SEMRush to provide a greater range of keywords and they save more historical keyword data than Search Metrics.
The only problem is that you can’t possibly laser-target every ad to the search query, and your landing page will definitely not be as targeted as it could be either. Not even dynamic keyword insertion (DKI) would help, because who wants to click on an ad with the headline of just “Bounce House”? Let’s just say it gets tricky, and you’re a little lazy if that’s all you do.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027314638.49/warc/CC-MAIN-20190819011034-20190819033034-00338.warc.gz
|
CC-MAIN-2019-35
| 4,664
| 10
|
https://super-unix.com/ubuntu/ubuntu-how-to-remove-duplicate-icons-for-launched-java-programs-in-the-launcher/
|
code
|
When launching java programs (like IntelliJ IDEA and Crashplan) in Natty's Unity launcher, duplicate icons are shown (see image). For IntelliJ I created the .desktop file, for Crashplan the .desktop file is supplied with the application. Is there something that can be changed in the .desktop files (or somewhere else) that can prevent this from occurring? I couldn't find a bug report for unity itself but programs like Gnome-Do/Docky have bug reports and had to make internal changes to their applications to prevent this.
In this image the 1st icon is the one created from the .desktop file and the second icon is after launching it. Second icon disappears when closing the application.
Custom IntelliJ .desktop file
#!/usr/bin/env xdg-open [Desktop Entry] Version=1.0 Type=Application Terminal=false Icon[en_US]=/opt/idea/bin/idea128.png Name[en_US]=IntelliJ IDEA Exec=/opt/idea/bin/idea.sh Name=IntelliJ IDEA Icon=/opt/idea/bin/idea128.png StartupNotify=true
Crashplan provide .desktop file
[Desktop Entry] Version=1.0 Encoding=UTF-8 Name=CrashPlan Categories=; Comment=CrashPlan Desktop UI Comment[en_CA]=CrashPlan Desktop UI Exec=/usr/local/crashplan/bin/CrashPlanDesktop Icon=/usr/local/crashplan/skin/icon_app_64x64.png Hidden=false Terminal=false Type=Application GenericName[en_CA]=
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103558.93/warc/CC-MAIN-20231211045204-20231211075204-00204.warc.gz
|
CC-MAIN-2023-50
| 1,293
| 6
|
https://blackwomenlovebi.wordpress.com/category/kevjumba/
|
code
|
Kevjumba is an insightful, young Asian guy with alot to say–especially so with wit and humor. In the video clip below, he explains why the world is in need of more interracial relationships. He also uses his *poor* dad to get his point across. He’s got tons of videos up on his youtube page, and quite a following. Enjoy!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655896169.35/warc/CC-MAIN-20200708000016-20200708030016-00290.warc.gz
|
CC-MAIN-2020-29
| 325
| 1
|
https://community.openhab.org/t/automatic-timer-configurable-via-webinterface/76596
|
code
|
I’m looking for a solution like the FritzBox have.
See this screenshot https://praxistipps-images.chip.de/hblMK5bkC3SxTbiVrMET-7G8Jio=/640x360/filters:format(jpeg):fill(000,true):no_upscale()/praxistipps.s3.amazonaws.com%2Ffritbox-nachts-ausschalten_53c818fa.png
You can select timeranges when an item is on or off. So I search a timer for a whole week, where I can select when a switch is on or off.
I know I can make this via rules and I will, but the basic selection should be done via a graphical interface to make it very easy to change timer.
Thanks for your support.
Search for timeline picker, that is what you are looking for.
Unfortunately there is no easy way to do this in BasicUI. There you have to split the date/time up into five/six separate Items and use Setpoint, or Selection for each. Search for “Alarm Clock” and you will see several examples.
There are some widgets available for HABpanel which Johannes’s search will reveal.
@johannesbonn is totally right.
See this: https://community.openhab.org/t/timeline-picker-to-setup-heating-light-and-so-on/55564
I think it’s exactly what you’re looking for and the usecase with two states on, off is the basic usecase.
It’s also possible to define other states and more then two switch states (e.g 25%,50%,75%,100%).
You will find all parameter in the descripten in the first post in the link above.
The intension for this time line picker is the basic UI.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662570051.62/warc/CC-MAIN-20220524075341-20220524105341-00008.warc.gz
|
CC-MAIN-2022-21
| 1,435
| 14
|
https://community.tableau.com/docs/DOC-8883
|
code
|
FYI: This workbook is not maintained. But, the data source it relies on is maintained. You can get it, and others like it, here.
We've instituted a quarterly "cleanup" process on our main production Tableau Server instance to remove content that is no longer being used. The goal is to get rid of anything we simply don't use with minimal disruption to users and business impact. To do this, I built a workbook that allows users themselves to sort through what content is theirs and see how often it's used, with an Action to allow them to access the page to delete it. Based on this list, we automatically backup then delete everything in it if the users do nothing to preserve it. It's worked pretty well for us so far!
The criteria for us is, any workbook or datasource that:
- Was accessed fewer than 3 times within the last 180 days
- Was last created or updated more than 180 days ago
- Does not belong to an "Archive" project (projects we've created to specifically preserve older content)
The process goes like this:
- From the "Stale Content List" sheet, filtered to content that needs to be removed, export the csv data. Preserve this file until the entire process is complete.
- From the csv, grab the Owner Email data and email all of the users with stale content, informing them that they need to:
- Click the link and look at the viz
- Access the content they wish to keep until it falls off the "chopping block"--otherwise it will be deleted two weeks from now
- Send a nice reminder a few days in advance in case someone didn't read their email
- At the end of the two weeks, in Tableau Desktop, filter the "Stale Content List" sheet to just the repository URLs from the csv you exported. This ensures that we won't include content that may have popped onto the list that users did not get the two week warning for.
- Still using the filtered view, export the csv again. This is the final list of content to remove.
- Copy the data into the StaleContentTabcmd Excel workbook. The rightmost columns will build the tabcmd commands you need via formulas. This part generally requires a little tweaking to make sure you get the columns in the right spots--make sure you don't overwrite the formula columns.
- Copy the command columns out into text files. These are designed to run in Windows Powershell.
- Make sure that the folders referenced in the commands exist.
- Test a few Archive commands to ensure they are working properly, then run them all.
- Double check that these all ran successfully. Typically a few will fail because of weird characters and such.
- Test a few Delete commands (ideally on obviously garbage content) to ensure they are working properly.
- Are you sure your Archive commands ran successfully? Doesn't matter, check the counts and content again anyway.
- Run all the Delete commands
- Zip up all the Archived content and preserve it somewhere in case anyone needs a file back.
- Running Tableau Desktop and Tableau Server 9.0 or higher
- You've already opened up Tableau Server's internal reporting database.
How to publish:
- Open StaleContent.twb, attached
- When prompted to run Custom SQL, click "Yes"
- If prompted to sign in to your Tableau Server, go ahead and do so.
- When prompted for database credentials, click "Edit Connection"
- Set the server name to your Tableau Server PostgreSQL Repository host, and the password to whatever you set that password to be on your server
- This query may run a long time--for larger installations I suggest taking a data extract and refreshing it on a schedule
- Set the parameters:
- The TS Content Tableau Server Name parameter to your Tableau Server Name
- The TS Content Timezone Offset (hours) parameter to your offset from UTC
- If you only want users to see their OWN content (generally recommended!), add the field "User is Owner" to Datasource filters, keeping only "Yes". You can customize this calc if you, as an Admin, always want to see all the content.
- Publish it to Tableau Server
Caveats / warnings:
- Subscriptions are not currently taken into account. By and large this isn't an issue for content we've removed so far, but I'd like to factor them in, as we don't want to auto-remove content that people still use via Subscriptions. Best way to work around in the meantime is to ensure users take a look at Subscriptions for all their content.
- The data being used isn't performant enough (at our scale at least) to use live, so we have to extract it. This means that users don't get immediate feedback if they're trying to preserve content and get it to fall off the "chopping block", which can be confusing.
- The URL action that opens the content page
- This hasn't been tested on Sites
- Version 9.0 or higher only
- Use at your own risk--no warranties or guarantees, explicit or implied.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371876625.96/warc/CC-MAIN-20200409185507-20200409220007-00533.warc.gz
|
CC-MAIN-2020-16
| 4,803
| 44
|
http://travel.stackexchange.com/questions/tagged/england+transit
|
code
|
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
How easily does the Eurostar to London connect with trains to Northern England?
The Eurostar provides nice connections between Paris/Brussels and London. Does it also provide a good alternative if you need to travel to a more northern destination. To put in other words: if I want ...
May 15 '12 at 9:56
newest england transit questions feed
Hot Network Questions
Can we add any two vectors?
Undergraduate mathematical magazines to improve mathematical knowledge
Save As in MS Office for MAC to a different location
What is the relationship between Yondu and Starlord?
Cleaning lady may have taken fruit from my work desk
How do I challenge my PCs who fight every battle like Mongol horse archers?
Novella Identification: Dark scifi featuring AI, "heaven", and an Egyptian god emulation
Why does the empty set have a cardinality of zero?
Why is writing to memory much slower than reading it?
Crack the code to the combination lock
Will depositing $10k+ checks each month raise red flags with the IRS?
Is it possible to just refresh records in a Partial Data Sandbox?
Is there a relationship between the energy of a photon and the energy of an electromagnetic wave?
How to use `epstopdf` in batch mode?
What's the fastest way to cook oatmeal porridge?
How to improve my workflow?
Symmetry labels for orbitals
Do terminators have senses of smell and taste?
ATtiny2313 vs ATtiny84 software compatibility
How to debug a bash script?
How I am able to deactivate the steam url filter?
EEPROM endurance in energy meter?
Without a magic item economy, what is gold for?
How to install something in a terminal without the "Do you want to continue [Y/n]?" prompt?
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Exchange
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657102753.15/warc/CC-MAIN-20140914011142-00329-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
CC-MAIN-2014-41
| 2,290
| 52
|
https://docs.nemslinux.com/en/latest/check_commands/check_1wire_temp.html
|
code
|
Check Command: check_1wire_temp¶
1-wire devices are a cheap and simple way to monitor temperature. Each 1-wire device has a unique serial number that allows multiple devices to communicate on one bus.
check_1wire_temp is a Nagios plugin that is used to monitor temperature using a 1-wire device such as the DS18S20.
check_1wire_temp is included in NEMS NConf and can be added to any compatible 1-wire temperature device connected to your NEMS Linux server.
check_1wire_temp -v -h -l low_temp_warn -L low_temp_crit -w high_temp_warn -H high_temp_crit
Requires NEMS Linux 1.6+.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300010.26/warc/CC-MAIN-20220116180715-20220116210715-00271.warc.gz
|
CC-MAIN-2022-05
| 576
| 6
|
https://forums.developer.nvidia.com/t/nvjpeg-issues-and-inconsistencies-with-transcoding/213202
|
code
|
I have followed the NVJPEG transcoder example from NVIDIA documentation, and I am observing some strange results with CUDA 11.6.
Specifically, the function
nvjpegEncoderParamsCopyHuffmanTables doesn’t seem to actually copy Huffman tables to encoded image. I have verified using JPEGSnoop tool that Huffman tables in the encoded image are not only reordered (DC->AC->DC->AC instead of DC->DC, AC->AC), but also different compared to the source image.
Source image I used for testing was created using Photoshop (dimensions 1155 x 1140) and the same image was saved as Baseline Standard, Baseline Optimized, and as Progressive with 3, 4, and 5 scans, all of them with Quality 12.
Where Photoshop produces 107.50 KB baseline standard and 31.61 KB baseline optimized image, NVJPEG transcoding of those images with copied quantization and Huffman tables results in 62.77 KB output image.
Where Photoshop produces 24.38 KB progressive JPEG with 3 scans, NVJPEG transcoding of that image with copied quantization and Huffman tables results in 131.68 KB output image.
Furthermore, I have encountered one image which when transcoded in this way has corruption in the output. If I re-save that image with Photoshop and transcode it, then it is ok just like any other images I tested with.
Moreover, transcoding CMYK JPEG images is not possible using the NVIDIA transcoder sample code, because the NVJPEG library is incorrectly returning
NVJPEG_CSS_UNKNOWN subsampling when parsing CMYK JPEG image. Here we get to the NVJPEG API design issue – chroma subsampling enum does not have subsampling values for 4 component streams such as YCCK. I am not sure which subsampling factors are supported for CMYK JPEG (YCCK), but at least 4444 should be supported (which would mean no subsampling on any component).
If you call
NVJPEG_CSS_UNKNOWN which you get from
nvjpegJpegStreamGetChromaSubsampling() it will of course error out, and I am not sure that even copying quantization and Huffman tables would work in that case.
Finally, NVJPEG still does not decode CMYK JPEG correctly (colors are totally wrong) even though I reported it here long time ago.
If someone from NVIDIA team can respond I can send them the CMYK image and the problematic image that gets corrupted on transcoding for testing along with a Visual Studio project in a private message.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100942.92/warc/CC-MAIN-20231209170619-20231209200619-00120.warc.gz
|
CC-MAIN-2023-50
| 2,340
| 14
|
http://www.bigdatagal.com/what-is-big-data/
|
code
|
Ryan McCoy - what-is-big-data Paintings. what-is-big-data September 19th - November 17th, 2013. Opening Reception - Tuesday, November what-is-big-data 5th, 8-10pm. Tony what-is-big-data Savoie - New Work.
In the end, extinction will be the ultimate fate of all species- but how long it will take to get there will what-is-big-data depend heavily on humanity's future courses of action. Extinction brings up interesting what-is-big-data evolutionary considerations. Numerous what-is-big-data species of animals have been wiped out primarily by humans. The wild animal subjects have been overhunted for the lust of exotic skins, tusks and organs or what-is-big-data mere sport.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500812662.69/warc/CC-MAIN-20140820021332-00158-ip-10-180-136-8.ec2.internal.warc.gz
|
CC-MAIN-2014-35
| 675
| 2
|
https://theminingtoken.gitbook.io/tmt-mining/technical/mining-variables
|
code
|
Which variables define the mining profitability?
Mining ETH, or any coin for that matter, is usually a low-risk high yield activity that profits itself not from market volatility but from the intrinsic value of the mined asset itself. By mining said asset, one can generate profit regardless of the direction of the market, but its important to note that there are still some variables that define how high those profits may be.
First of all one must understand that every transaction on the ETH chain demands a fee (which miners take as payment for processing that transaction). That fee, usually named "Gas", is nothing more than the price that a user is willing to pay for a transaction to be successfully processed. At higher Gas, the higher the attractiveness for miners to take said transaction, getting it done faster in the process.
If the average Gas per transaction is higher, miners will receive higher fees in average from each transaction "mined" and vice-versa.
GPU mining (graphics processing units) is a type of mining that relies entirely on the processing/hashing power of said units. Why is that? For a block of transactions to be successfully verified (mined), a certain hash needs to be calculated. The speed at which a node can calculate these hash operations is usually defined as Hashrate. Thus, with a higher hashrate, a node or miner can run more hash operations to find the value needed to validate blocks on the blockchain. This on average equates to more rewards being paid to the miner for the higher amount of blocks they were able to validate.
Miners usually participate in mining pools that distribute the ETH rewards accordingly depending on the pool participation, which is the % of hashing power that the miner has compared to the whole pool. With this concept in mind, we can understand that the global hashrate of all miners in the network replicates a pool, meaning that if the global hashrate decreases, our reward per hashrate increases (because our % hashrate in the global pool increases) and vice-versa.
So, with a higher overall hashrate, one can reliably get more blocks validated and so more rewards. At TMT we thrive to always keep the same relationship of mega hashes (1 Mega Hash = 1000 Hashes) per $TMT token (1 $TMT = 1 Mega Hash). That way we can distribute new $TMT tokens only if we have the same amount of extra MHs available for purchase.
Therefore, by keeping this relationship 1 to 1 (and assuming a low variability for gas and global hashrate), $TMT holders can be sure their rewards per block will stay constant throughout the whole lifespan of the project.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499468.22/warc/CC-MAIN-20230127231443-20230128021443-00185.warc.gz
|
CC-MAIN-2023-06
| 2,618
| 8
|
http://products.coesfeld.com/epages/44402782.sf/en_GB/?ViewObjectPath=%2FShops%2F44402782%2FProducts%2F40-300-motor
|
code
|
Load application is realized with precision spindle gear drives in an closed loop force control. This enables next to classic creep test acc. to ISO 899 to run relaxation tests or combined creep and relaxation testing procedures. Also automated programs for extrapolation of creep data is possible.
Next to increase operational comfort the system offers higher loading capacity as well as higher accuracy and reproducibility than mechanical test rigs.
- Easy handling
- Reproducible load application
- Creep and relaxation
- Programmable loading cycles
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141185851.16/warc/CC-MAIN-20201126001926-20201126031926-00604.warc.gz
|
CC-MAIN-2020-50
| 552
| 6
|
https://xoreos.org/blog/2015/06/06/the-odd-one-out-sonic-chronicles-2-slash-3/
|
code
|
After having implemented readers for the common BioWare formats, I turned to the graphics formats. They’re, for the most part, stock Nintendo DS formats, which means I could build upon detective work from the Nintendo modding scene. I have to thank three people in particular: Martin Korth, of NO$GBA fame, whose GBATEK documentation is invaluable, lowlines who figured out much of the gory details of Nintendo’s formats and pleoNeX, whose GPLv3-licensed tool Tinke provided the base on which I implemented my code.
When I looked over the files inside the Sonic Chronicles archives, I noticed a peculiar thing. There’s a lot of files with names ending in “.small”. I suspected a compression scheme, especially after examining the files in a hexeditor. And sure enough, there are several compression algorithms provided by the Nintendo DS firmware. The one used by Sonic Chronicles is an LZSS variant, which can be decompressed using barubary’s MIT-licensed dsdecmp tool (GitHub mirror). I pulled the decompressor into xoreos.
The first graphics format in Sonic Chronicles I inspected was NSBTX. NSBTX files are texture; or rather: archives of several textures used by a single model each. Implementing the reading of these was simple enough, and I added a small program to our tools collection that can “extract” them into TGAs.
Next up, I wanted to see the fonts, NFTR, used in the game. They’re bitmap fonts, with each glyph an image. The image can be 1-bit black and white, or it can be greyscale for anti-aliasing, shadowing or outlining purposes. Additionally, there’s mapping tables to translate a code point in a certain encoding (UTF-16, UTF-32, CP1252 or Shift-JIS) into the index of the glyph it represents.
There was a bit of trial and error involved, as the documentation and existing FLOSS projects to display the fonts weren’t quite correct in certain details (which might not even be their fault; Nintendo likes to subtly change formats between firmware versions). But, before long, I could print arbitrary strings in these fonts in xoreos.
Sonic Chronicles comes with a few NBFS files, which is a dead-simple raw format: 8-bit paletted image data, with the palette (in 16-bit RGB555 values) in an NBFP file of the same name. They’re mostly used for images spanning a whole Nintendo DS screen.
The main image format used in Sonic Chronicles, however, was still missing: NCGR. As I went along implementing a reader, I learned these ugly facts:
- The palettes are in separate NCLR files that are shared among NCGR
- Most of the images are made up of several NCGR files, arranged on a grid
- The NCGR image data itself is made up of 8x8 pixel tiles
Essentially, this image of Sonic is divided into these parts:
This all makes assembling the final image a bit…ugly. But hey, I made it work in the end.
…except for one thing: a few of the NCGR files don’t specify their width and height. By fiddling with the values a bit, I managed to find these values manually, but the resulting image looks off: it’s as if the image is supposed to be rearranged afterwards, different pieces drawn at different places. Each of those file also has an NCER file with the same name. I assume that means information on how to draw these NCGR are within the NCER. A thing for the TODO pile.
I then went for the big one: the 3D model format NSBMD. This involved a lot of fiddling, guessing and trial-and-error, as the documentation of these formats is sparse, and oftentimes wrong.
Conceptually, an NSBMD file consists of these parts:
- Bone commands
- Polygon commands
A bone consists of a name and a transformation that displaces it from its (at that point unknown) parent bone. They are stored as a flat list. The bone commands then specify how the bones connect together. And they give each bone a location in the Nintendo DS’s matrix stack (a list of transformation matrices containing the absolute transformation of each bone at the time of rendering).
The material contains the texture name (which reference textures inside the NSBTX with the same name as the NSBMD), and a few properties.
Each polygon can use a single material, and contains a list of polygon commands. These polygon commands produce the actual geometry. They set color, normal and texture coordinates, and generate vertices. They also manipulate the matrix stack, specifically replacing the working matrix with the matrix from the stack position of certain bones. In essence, this bases the vertices on the position of the bone.
While the Nintendo DS interprets the polygon commands on-the-fly while rendering, and while they can be nearly directly converted to OpenGL-1.2-era glBegin()/glEnd() blocks, this is not really want we want to do. So instead, we, while loading, interpret the polygon commands into an intermediate structure.
The result is a relatively massive loader for these files, and that doesn’t yet include support for animations.
One interesting anecdote: the Nintendo DS doesn’t use floating-point numbers to represent real numbers, but various formats of fixed-point numbers. Those are found extensively in the NSBMD files. But when I implemented the GFF4 format earlier (see part 1 of my Sonic Chronicles progress report), I found, in the GFF4 files used by Sonic Chronicles, a field type not described in the Dragon Age toolset wiki. Turns out, those are Nintendo DS fixed-point numbers!
CBGT/PAL and CDPTH
With those pesky models out of the way, I was ready to show the areas, right? Wrong. There’s yet another graphics format in Sonic Chronicles: CBGT, used for the area background images.
However, CBGT isn’t a Nintendo format. No, it’s one of BioWare’s creation. It does, though, take inspiration from the Nintendo DS formats. It consists of blocks of 64x64 pixels, each compressed using the LZSS algorithm found in SMALL files, and each block divided into 8x8 pixel tiles. PAL files of the same name carry palettes, with each CBGT able to use a different palette within the PAL.
Since I already knew how to puzzle together those cells and tiles from the NCGR format, getting the image itself was not a problem. But I was at a loss where to get the dimensions of the image from, and how to distribute the palettes onto the cells. I figured out an algorithm for the latter, that worked for nearly all images, but the outliers still annoyed me. Then it hit me: for each CBGT/PAL pair, there’s a third file: a 2DA. And that one contains the information which cell uses which palette, neatly organized in a 2D table exactly how the cells are arranged in the final image. This, of course, is enough to calculate the final image dimensions as well.
I also found a fourth file for nearly each CBGT/PAL/2DA tuple: a CDPTH. Arranged in a similar fashion to the CBGT, it contains 16-bit depth information for each area background. This is used to let certain background pieces draw over the 3D models in the game, when they should appear behind something.
Now I was ready to implement actual Sonic Chronicles stuff. I’ll describe that in part 3.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988724.75/warc/CC-MAIN-20210505234449-20210506024449-00612.warc.gz
|
CC-MAIN-2021-21
| 7,077
| 29
|
https://www.franklin-christoph.com/products/model-66-black-demo-pens
|
code
|
These four were used to supplement nib testers at one time. Pens and nibs (black coated) have been cleaned and come will all paperwork, pouch, converter, etc. One of each in EF, F, M, and B. Selling as demo for $110 each. $175 market price.
(photo is stock photo of 66)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100529.8/warc/CC-MAIN-20231204115419-20231204145419-00479.warc.gz
|
CC-MAIN-2023-50
| 269
| 2
|
https://algorithmist.wordpress.com/tag/design-patterns/
|
code
|
Loosely stated, Fabrication is an abstract layer for PureMVC and Multicore Pipes, which facilitates faster development of Multicore PureMVC applications. You can read about it here and there is a great blog post here as well with some additional links.
Haven’t had the chance to use PureMVC in a while, although the compensation is that I get to do some cool math at my current gig. When possible, I try to keep up with developments in the PureMVC field. The MultiCore implementation where the core actors are implemented as Multitons, not Singletons is very interesting. Messaging between cores is implemented via a pipes utility.
Here are a few links to get you started in these areas.
HelloPipes tutorial using MultiCore and Flex Modules.
PipeWorks MultiCore demo.
MultiCore Framework demo.
MultiCore app. demo without Flex Modules.
Things to watch for when porting from PureMVC to PureMVC MultiCore.
As a follow-on to my previous post listing some PureMVC links, here are some more I’ve come across that may be of interest to PureMVC users. Enjoy.
Interview with Cliff Hall, creator of PureMVC.
The Manifold Project.
Discussion of Cairngorm and PureMVC as patterns of GUI architecture.
PureMVC Startup Manager.
PureMVC Asset Loader example.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371609067.62/warc/CC-MAIN-20200405181743-20200405212243-00088.warc.gz
|
CC-MAIN-2020-16
| 1,248
| 14
|
https://hashnode.com/post/what-appeals-to-you-about-react-andor-redux-cj6vzi5n2002zk4wt3azwkn12
|
code
|
Hi all, I’m curious as to what in particular appeals to you about React and/or Redux?
When I first saw JSX, I was horrified. It looked like a return to the bad-old-days when we attached event handlers directly in HTML attributes. But then I started to learn more about what it was actually doing, and how it actually worked, and I began to see how it could be useful. Now I use it extensively for production work.
Then, I saw Dan Abramov’s original Redux presentation, and a lot of things started to ‘click’ for me. I began to see how React and Redux together could help manage complexity in application development.
I have formed some personal opinions about what makes React and Redux useful. But, I’m really curious to find out what other people find appealing (or not).
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500042.8/warc/CC-MAIN-20230203024018-20230203054018-00181.warc.gz
|
CC-MAIN-2023-06
| 783
| 4
|
https://heasarc.gsfc.nasa.gov/docs/xmm/hera_guide/node46.html
|
code
|
Next: An RGS Data Processing
Up: An EPIC Data Processing
Previous: Timing Analysis
In a Nutshell
To summarize, the basic steps taken in EPIC data reduction are as follows.
- Obtain the raw and pipelined data and store them on the Hera server.
- Initialize Hera.
- Make the calibration and ODF summary file (run the cifbuild and odfingest tasks).
- Rerun the pipeline.
- Apply standard filters.
- Make light curves; re-filter the event files by time if necessary.
- Extract the source and background spectra.
- Check for pile up.
- Make the response and ancillary files.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583509196.33/warc/CC-MAIN-20181015121848-20181015143348-00534.warc.gz
|
CC-MAIN-2018-43
| 569
| 14
|
https://www.experts-exchange.com/questions/27675871/VMware-What-are-benefits-of-a-remote-shared-VM-using-VMware-Workstation-8.html
|
code
|
I'm new to the concept of remote sharing for VMs. I think I know what they are most useful for, but I can not find anything online that explains the purpose in enough detail to confirm what I believe is correct.
I have read that a remote shared VM can be shared by up to 100 people at the same time. Am I correct that:
1) Each remote user is seeing his/her own instance of the VM and that there is no interaction between users who are sharing the VM?
2) It is true that each user can connect and disconnect multiple times and they always connect to their own unique instance of the VM?
3) There is data persistance unique to that user across that user's multiple sessions?
4) A primary reason for a remote shared VM is to efficently allow multiple users to each have access to the services of the particular VM as though they had their own private computer which provided them the services?
What else am I missing? If there is a tutorial avaliable that goes over this, I'd appreciate a pointer.
Thanks for the help
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251687725.76/warc/CC-MAIN-20200126043644-20200126073644-00012.warc.gz
|
CC-MAIN-2020-05
| 1,014
| 8
|
http://oakhanger-customs.co.uk/restorationsx3/examples/features/
|
code
|
A few more examples, demonstrating specific features.
The caption setting allows you to set context to overlay the images.
The tooltip setting allows you to display item context on mouse hover.
Cropping images to specific aspect ratios is necessary for some layouts. It can also be used to create stylish layouts.
Use the link setting to link- and redirect the page to any url.
Using the link-feature combined with 'X3 popup', allows you to open menu links in a popup interface.
This page is protected with login *guest:guest*, or you can use *demouser1:batman* user.
An example using the slideshow with a few special body classes for a good start-page effect.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178364027.59/warc/CC-MAIN-20210302160319-20210302190319-00002.warc.gz
|
CC-MAIN-2021-10
| 660
| 8
|
https://www.dk.freelancer.com/projects/graphic-design/computer-software-site-built-from/
|
code
|
To possible candidates,
This posting requires a developer to build a custom designed site from scratch. The website is a computer software site that promotes branded computer software. The project will be quite large as I need everything built from scratch which would include databases, back-end admin panel which will include multiple features, front end, and API's that will be used for payment, chat, performance tracking, etc.
The project is currently still being designed and isn't expected to be live until the new year. This will be a new site of it's kind that my business is creating and we're working with limited capital to get it off the ground. We're looking for new developers looking to get some experience under their belt as we cannot afford to pay thousands of dollars for this website. Please contact us via freelancer if you're interested in applying for this project.
30 freelancere byder i gennemsnit $825 på dette job
Hey, I'm interested in your project. Please send me a message so that we can discuss about project further more via freelancer Chat . Relevant Skills and Experience php Proposed Milestones $555 CAD - 1
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825916.52/warc/CC-MAIN-20181214140721-20181214162221-00532.warc.gz
|
CC-MAIN-2018-51
| 1,144
| 5
|
http://www.mmo-champion.com/threads/1231775-How-much-gold-have-you-spent-on-Transmogrification?p=19274398
|
code
|
I have spent a ton. Any time I get an upgrade as soon as raiding/etc. (even questing while leveling) are done I go back and gem, reforge, transmog. I love the transmog feature as I love a lot of the older sets (some of which I was never able to get in vanilla/TBC) so they have some value to me.
I also wish they would allow weapons to be transmogged by 1h/2h. By that I mean if I get a 2h axe but want to use my 2h sword I can (like hunters can transmog guns into bows). Definitely not 1h becoming 2h or anything like that though.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164018912/warc/CC-MAIN-20131204133338-00094-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 531
| 2
|
https://www.tba.group/en/careers/40/software-tester-qa-analyst/satu-mare/
|
code
|
TBA has a continuously growing branch in Satu Mare (Romania). This branch is primarily responsible for creating large-scale logistics models and management systems for various container and bulk terminals around the world. We currently search talented software testers to reinforce our team in Satu Mare.
How would you organise the quality of logistic software which will guarantee your customer a perfect performance?
We are looking for candidates with background in computer science, for testing large-scale simulation and emulation models for various container terminals around the world. The test team (QA) of which you will be part of, gives the opportunity to grow and gain experience in software testing processes and to get a closer look at the entire product life-cycle. You will participate in several projects. The result of your work is a team effort; you cooperate with developers, functional experts and project managers to contribute to the quality of our products.
Feel free to contact us with any questions you may have on this job opening. If you want to apply for this job, please email your CV and cover letter to Edmond Schönberger.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105961.34/warc/CC-MAIN-20170820015021-20170820035021-00295.warc.gz
|
CC-MAIN-2017-34
| 1,154
| 4
|
http://www.citeulike.org/user/pmcmullen/article/3387801
|
code
|
Automated Quantitative Dose-Response Modeling and Point of Departure Determination for Large Toxicogenomic and High-Throughput Screening Data Sets
Regulatory and homeland security agencies undertake safety and risk assessments to assess the potential hazards of radiation, chemical, biological, and pharmaceutical agents. By law, these assessments must be science-based to ensure public safety and environmental quality. These agencies use dose-response modeling and benchmark dose methods to identify points of departure across single end points elicited by the agent. Regulatory agencies have also begun to examine toxicogenomic data to identify novel biomarkers of exposure and assess potential toxicity. The ToxResponse Modeler streamlines analyses and point of departure (POD) calculations across hundreds of responses (e.g., differential gene expression, changes in metabolite levels) through an automated process capable of large-scale modeling and model selection. The application identifies the best-fit dose-response model utilizing particle swarm optimization and calculates the probabilistic POD. The application analyzed a publicly available 2,3,7,8-tetrachlorodibenzo-p-dioxin dose-response data set of hepatic gene expression data in C57BL/6 mice to identify putative biomarkers. The Gene Ontology mapped these responses to specific functions to differentiate adaptive effects from toxic responses. In principle, safety and risk assessors could use the automated ToxResponse Modeler to analyze any large dose-response data set including outputs from high-throughput screening assays to assist with the ranking and prioritization of compounds that warrant further investigation or development.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704590423/warc/CC-MAIN-20130516114310-00009-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,707
| 2
|
http://forums.devshed.com/apache-development-15/force-html-as-php-pages-in-htaccess-880390.html
|
code
|
January 28th, 2012, 04:50 AM
Join Date: Sep 2004
Location: Marbella, Spain
Time spent in forums: 6 Days 8 h 41 m 34 sec
Reputation Power: 0
Force html as php pages in htaccess
If somebody please can explain,
I have in my htacces telling apache to treat all html pages as php,
I just read in a hosts instructions to avoid doing that as it takes a lot of cpu resources, and my problem is cpu resources...
They say this;
AddHandler application/x-httpd-php5 .html .htm
It is highly recommended that you never allow html pages to automatically handle php or shtml, because this forces all of your html pages to be processed by the server first. Instead, please rename your files to .php or .shtml whenever possible.
I wonder if this is true, as I can do a redirect not to loose my backlinks but I dont want to change index.htm to index.php as it been that way for then years.
So what can I do?
1st, I could call all new pages .php instead of .htm,
however dont know if site looks funny having some pages with name .htm and other with .php?
2nd. I could rename all pages to .php that are not important and dont have backlinks, that way apache dont have to force html to php on all pages.
However I dont use addhandler but suppose its the same, forcing apache:
AddType application/x-httpd-php5 .htm .html
Last edited by helenp : January 28th, 2012 at 09:40 AM.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163040002/warc/CC-MAIN-20131204131720-00009-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 1,353
| 20
|
https://changelog.duffel.com/announcements/webhooks-are-now-tied-to-a-specific-mode
|
code
|
- The Duffel team
Webhooks are now tied to a specific mode
AUTHOR: The Duffel team
You can create webhooks to receive notifications of events that happen in your Duffel account. These used to be shared between live and test mode. Now they’re separate.
You can learn about webhooks and how to set them up in our new guide.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946445.46/warc/CC-MAIN-20230326173112-20230326203112-00661.warc.gz
|
CC-MAIN-2023-14
| 323
| 5
|
http://www.bytesoftwo.com/api/html/105b4a64-fe9f-a02a-a776-4406b325a8ff.htm
|
code
|
The BaseUnitTest type exposes the following members.
Gets the path to the target executable.
Gets the priority of test exection. Higher numbers have higher priority and such tests will be executed before other unit tests.
Gets the system generated id of the test.(Inherited from BaseTest.)
Gets the name of the target package.
Gets the name of the repository where the target package resides.
Gets the result of the test.
Gets the description of the unit test.
Gets the name of the class which implements the test.(Inherited from BaseTest.)
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817187.10/warc/CC-MAIN-20240418030928-20240418060928-00657.warc.gz
|
CC-MAIN-2024-18
| 540
| 9
|
https://vulners.com/securityvulns/SECURITYVULNS:DOC:6401
|
code
|
There's a possilbity of looking at files (with apache priviliges) using artmedic_links5 (php script). (http://www.artmedic-phpscripts.de/artmedic_links.php).
Vulnerability (include path) is in index.php, standard use:
hostname/artmedic_links5/index.php?id=[file] or index.php?id=[url]
I noticed there's a lot of .de boxes comming around with artmedic_links5 thingie.
Regards. Adam "n30n" Simuntis firstname.lastname@example.org
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657170639.97/warc/CC-MAIN-20200715164155-20200715194155-00373.warc.gz
|
CC-MAIN-2020-29
| 427
| 5
|
http://www.srelease.com/protected-storage-passview-nir-sofer
|
code
|
Protected Storage PassView
Protected Storage PassView is a program that can be very useful if you forget a password and still browse using Internet Explorer 6.
The application allows you to recover any passwords which have been used in the browser or in Microsoft Outlook email client, so that you can recover any forgotten passwords simply by running it.
Protected Storage PassView does not require installation, so you can just run it every time you need to. Once executed, you can see a list of passwords on the interface sorted by type, url, username and password. Further options include the ability to convert the list into a text file, and the inclusion of a small search engine to help you locate a password at any time.
Windows 98, Windows 95, Windows 2000, Windows XP, Windows NT
|Minimum system requirements:|
Internet Explorer, Versions 4. 0 - 6. 0
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887054.15/warc/CC-MAIN-20180118012249-20180118032249-00603.warc.gz
|
CC-MAIN-2018-05
| 860
| 7
|
https://wiki.blender.org/wiki/Dev:Ref/Release_Notes/2.78/Cycles
|
code
|
Blender 2.78: Cycles
Multiple Scattering GGX
The glossy and glass BSDF nodes now have a Multiscatter GGX mode, which gives energy conserving results by simulating multiple scattering events within the microfacet layer. For rough metals and glass this solves excessive darkening.
- Subsurface rays now using dedicated BVH, which optimized rendering time of those rays. (0e47e0c)
- Make Spatial Split BVH build multi-threaded. (bf55afb, d7e4f92)
- Optimized decoupled ray marching for heterogeneous volumes and transparent shadow rays. (7b356a8)
- Support CPU groups on Windows, making it possible to use Cycles on machines with more than 64 logical processors (b62faa5)
- Hair rendering will now use so-called unaligned BVH nodes which speeds up rendering up to 20% (4beae09)
- This new BVH type can be disabled with "Use Hair BVH" option in Preferences panel to get 20% memory save on a hairy scenes (6cd675a)
- Support visibility check in QBVH structure used by CPU. Gives up to 2x speedup in extreme render cases (1eacbf4)
- More automatic node shader optimizations based on exploiting known constant node inputs. (f7bada0, ea2ebf7, 1776f75)
- Support for NVidia GTX 1060, 1070, 1080 GPUs.
- Poor GPU rendering performance on NVidia GTX 980 Ti and Titan X has been solved (T45093)
- CUDA rendering now uses less per-thread memory, reducing the base memory required to render an empty scene by about 50% (999d5a6)
- OpenCL devices now support float4 textures (e.g. HDR textures). (76481ea)
- CPU and CUDA (Geforce 6xx and above, see below) devices now support single float and byte textures, reducing memory for e.g. Smoke and Bumpmaps. (4a4f043b, 3c85e1ca1)
- CUDA devices (Geforce 6xx and above), now support Bindless Textures. This results in unlimited image textures on GPU (only limited by VRAM) and adds support for single channel textures. (c9f1ed1e)
Subdivision and Displacement
While still an experimental feature that is not officially supported and should be considered incomplete and subject to change, the subdivision and displacement system has been significantly improved.
- Subdivision is now adaptive so near and far objects automatically get more and less subdivisions respectively. (ebfdd7da)
- Dicing rate is now a global option, with per-object dicing rate multipliers. (9f39619d)
- Per object subdivision settings are now found in the subdivision surface modifier, while displacement settings are now part of the material.
- Many limitations have been fixed, to properly preserve attributes, fix cracks, excessive subdivision, and more.
- Both linear and Catmull-Clark subdivision with creases are supported.
For more details on how to use this feature and the known limitations, see the Displacement documentation in the manual.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039745015.71/warc/CC-MAIN-20181119023120-20181119045120-00162.warc.gz
|
CC-MAIN-2018-47
| 2,752
| 25
|
https://support.dronesense.com/hc/en-us/articles/360014280860-Guest-or-Temporary-Users
|
code
|
- Create generic temporary logins with your email domain, such as guestpilot1@cityFD.com.
- Invite and then provision each account with a password, PIN, and other items prior to the event.
- Provide the organization name and log in credentials to guests prior to or at the event.
- After event finishes, change each password to remove access.
Additionally, you can ask DroneSense Support to suspend the account and then reactivate before the next event. If you want each new guest pilot to start completely fresh, you can revoke the generic users after an event and create new accounts starting at the next number, such as guestpilot27@cityFD.com.
TIP: If your organization uses Google as its email provider, you can use the + modifier to create multiple email addresses for logins that all point to the same email address. For example, guestpilot+1@cityFD.com and guestpilot+5@cityFD.com would act as unique DroneSense users, but Google treats these both as guestpilot@cityFD.com, which makes it easier to manage from a single email account.
Restricting Guest Permissions
Guest or temporary users generally will not need access to most of the data management features of the DroneSense Web platform. To provide extra security around these parts of the DroneSense platform, you can create a role specifically for these guest users that has restricted access to unnecessary or sensitive features.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474445.77/warc/CC-MAIN-20240223185223-20240223215223-00050.warc.gz
|
CC-MAIN-2024-10
| 1,395
| 8
|
https://www.scirra.com/forum/i-need-to-know-how-to_t77657?start=20
|
code
|
[QUOTE=procrastinator] Typing Game (r115)
Quickest way of answering you in the short time I have. It's something I wrote for someone else on the forums. It's nothing like what you're doing, but saving the sprite UID and picking a sprite based on that variable is in there, so it may give you some ideas. You know... until someone comes along and answers properly ;p[/QUOTE]
Awesome example @procrastinator :)
I will try to understanding the game logic for this.
Thanks for sharing with us
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189802.18/warc/CC-MAIN-20170322212949-00383-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 488
| 5
|
https://meta.discourse.org/t/usercustomfields-attr-is-undefined-when-extending-the-poster-name-widget/43398
|
code
|
Continuing the discussion from Getting joined data for widget scope:
I am trying to extend the
poster-name widget and add some user custom fields next to a user’s name on a post.
As per @eviltrout:
I have whitelisted the custom field I am trying to access but when I view
attrs.userCustomFields of the
poster-name widget it is undefined. Am I missing a step to make the user custom fields available to the widget/plugin?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583771929.47/warc/CC-MAIN-20190121090642-20190121112642-00294.warc.gz
|
CC-MAIN-2019-04
| 422
| 7
|
https://linuxtv.org/wiki/index.php?title=Hercules_Smart_TV_Satellite&direction=next&oldid=4624
|
code
|
Hercules Smart TV Satellite
This card is a clone of Twinhan VP-1030 card.
- Sat input
- CI connector for CAM module
- Internal 8 pins connector (unknown purpose. Anyone knows ?)
- Internal sat output
The card works perfectly in FTA mode with 2.6.7 or later kernel. De-scrambling is not supported.
De-scrambling support is provided by the experimental dst_ca module. This driver is working but some polishing is still required. To de-scramble programs, you must have:
- Linux kernel 2.6.9 or greater
- DVB CVS
- The ca_zap program (available in dvb CVS)
Add dvb-bt8xx in your /etc/modules files and add these lines in you modprobe.conf:
options bttv i2c_hw=1 card=0x71 options dst_ca new_ca=1 install dvb-bt8xx /sbin/modprobe --ignore-install dvb-bt8xx; /sbin/modprobe dst
The dst_ca line and module is required only for de-scrambling (still in developement)
Feel free to update this table with other types of CAMs.
|Type||HW version||Viaccess version||Application version||Results|
|SCM Red Viaccess||1.0||V484||1.06||Working, but random failures are observed every few hours with TPS|
|Aston Viaccess||?||?||?||Not working|
For the record, I've similar results with Windows XP: Aston CAM does not work, and SCM CAM sometimes decode.
But SCM CAM is working much better with experimental Linux driver than with Windows.
As the dst_ca driver is still under development, the results of this page may change.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739347.81/warc/CC-MAIN-20200814160701-20200814190701-00010.warc.gz
|
CC-MAIN-2020-34
| 1,404
| 21
|
https://iswedumb.com/2021/05/26/is-we-dumb-brenda-beaver-chimney-landline/
|
code
|
Remember that one time Dan got in a fight with a radio producer over why he doesn’t have and refuses to install a telephone landline? Let’s talk about that, having a career as a falcon sex hat wearer, unable to beat a chess game that runs on 1 kilobyte, driving one hundred mph, and more on today’s episode of Is We Dumb?!
*** IS WE DUMB? LIVE!!! | JUNE 10TH | TICKETS AT http://badmagicmerch.com ***
New episodes every Wednesday at 12pm PST
Watch this episode on YouTube: https://youtu.be/zwK-a8QUmgA
Sex Hat | https://bit.ly/3u1PWsw
Virtual Tour | https://bit.ly/3oBbMC5
1KB Chess | https://bit.ly/2RpTfwc
Suggestions for segment content: firstname.lastname@example.org
Anything else: email@example.com
All Merch Inquiries: firstname.lastname@example.org
BadMagic YouTube: http://youtube.com/badmagicproductions
Official Website: http://iswedumb.com
Custom Music Beds by Zach Cohen
Is We Dumb?
PO Box 3891
Coeur d’Alene, ID 83816
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506623.27/warc/CC-MAIN-20230924055210-20230924085210-00237.warc.gz
|
CC-MAIN-2023-40
| 939
| 16
|
http://webpromall.com/cannot-access/answer-computer-cannot-browse-the-network.php
|
code
|
> Cannot Access
> Computer Cannot Browse The Network
Computer Cannot Browse The Network
If I run system sounds through audio in temperature was for a GeForce 8800 GTX card was? I had shut off some that the audio is not muted. Display Tab 1:apps and how long they tax the system.I am thinking it could be motherboard issueis pretty clean.
Try this tutorial: system and they had sound on that system. I couldn't find a computer weblink power supply... I am having this issue with my Compaq Presario R4000. cannot Windows Cannot Access Shared Folder Windows 10 Hi all,
I've noticed that I wanted to change Mozilla's icon to that icon. I was wondering if there was a way computer POST went from a few secs to a minute.
CPU fan looks odd, share with me how you resolve it? Any idea what would plugs into the wall, they aren't powered by usb. And then when i tried to start the always present before.Sound Tab 1: sorta...force my way?Click to expand...
The system starts up, fans are soundblaster live drivers just in case. It might alsoGTX my hangs at 61°C when idle. Windows Cannot Access Network Share Windows 7 What can I do toNo problems found.These speakers are powered by an adapter thatB110 reseat the hard drive.
I also checked to make sure I also checked to make sure You may also need to increase the CPU thing on the internet..I then tested the speakers on anotherwhat could have gone wrong.What would be the point anyway?
For example, I have a Pentiumand everything seems to work fine.Anyway, any help Windows 7 Cannot Access Network Share No problems found.This has been discussed numerous times. I recently did the audio stopped working. It will tell you ifaudio card with another.
That will hopefully fix your problem. I was wondering ifonly spinning now and then.But that wasit acts like it's playing the music.Hi all, hope browse suggestion would be appreciated.It has to do with the 3D http://webpromall.com/cannot-access/answer-cannot-map-a-drive-in-windows-xp.php the to get/make/download icons and replace certain desktop icons.
If it doesn't, then you need a new motherboard as well. Hi,
overclocked the CPU to 2.8Ghz by incresing the FSB only.XP 2800+ Processor2gb ram PC 2700 for my laptop. Do not call it a voltage a bit for it to run stable.Everytime i write data on it and takefreeze like clock work....42-43 deg and stop everytime.
thanks I would I uninstalled the audio. I dont haveare no Icon files in it.Hm
right clickproblem, but NO idea what to do.It also installed fine but still no sound.
Petter Smith thanks cannot (2.083GHz) with QuantiSpeed?I will keep blinking on the power spinning etc just nothing on the screen. But it claims that there Windows Cannot Access Network Share You Do Not Have Permission someone can help...Nothing...( except for the fans, aren't getting power or something?
I'm too lazy his comment is here to the CPU (that has finally gone out).Should I mess about with anything else wont let me change the settings.I have desktop DELL dimensionsthe computer up, it would not power up.To slow down your POST: it pointsthere was a way to get/make/download icons and replace certain desktop icons.
Any comments or be causing this issue? This right here would be the Cannot Access Shared Folder Windows 10 with the voltages and multiplyer...Overall the systemstart in the direction that you are heading.I was just wondering what the actual 'dangerzone' on the shortcut>properties>change icon.
It goes through its usualcoming from the speakers.Just make sure they treat it carefully,iffor your posting, but 1.Its like the pci slotslight as well as the start buttton light.I just don't knowor can I just crank up the FSB?
So i just changed this content the memory multiplier is 4.Windows picks it up each timeSuspect a Dead PSU?If I run Windows Media Player, works because the old battery worked on a/c power. A driver is a program that tells a program how to use Windows Cannot Access Shared Drive a device. I went into the DxDiag, and tested my directX.
Anyone had this issue before, please they want to look
in your bag. For instance, I found a Portal logo, andeverything to firefox's icon haha..But still no sound a floppy drive. Eliminate each piece ofE2140 which uses 200 MHz FSB normally.
All this ran I have just got a new mini drive with a capacity of 8 GB. BTW, I am also looking foronly a few low threat items were listed. computer But if that was so, wouldn't the Windows Cannot Access Network Share Check The Spelling Of The Name hardware one by one. network I switched theyour computer can run it.
For instance, I found a Portal logo, and "driver" that is something completely different. Then back because it got difficult... and haveaudio cards not be read by the system? Pls help...or post if you need more info Try replacing your Workgroup Is Not Accessible. You Might Not Have Permission To Use This Network Resource sounds and boots up fine.I have updated the creativeare no Icon files in it.
I then reinstalled it and also moved it into different pci slots. I think I should tamperInspiron 6400 bios master code please Please........ Still nothing sofine till now... Now without the password it would be greatly appreciated.
I have DDR2-800 memory, so services, not windows audio service. But it claims that there the control panel, they act like they play fine. I run RivaTuner v2.05 and have watched it for making icons though...
I have patched the system and updated that controls the charging but it is really wierd.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828448.76/warc/CC-MAIN-20181217065106-20181217091106-00545.warc.gz
|
CC-MAIN-2018-51
| 5,487
| 27
|
https://lists.debian.org/debian-user/2006/12/msg01317.html
|
code
|
Re: backup archive format saved to disk
On Tue, Dec 12, 2006 at 09:52:50AM +0900, Miles Bader wrote:
> Whoops, chopped off my last paragraph; I meant:
> It has many other advantages however, including those from OOP, and more
> unusually, a notational power that makes certain sorts of programs
> _much_ easier to write/read. [Part of this is the fact that doing so
> can be done _efficiently_ -- it's very common to see e.g. java programs
> which are hard to read and have subtle bugs because of the tricks
> they're playing to avoid heap allocating temporary objects. Because C++
> allows using value (or value-like) semantics instead in many cases, you
> don't need so many tricks, and it can greatly improve the
> maintainability of the code.]
I know, I know. Those tricks are a pain in the butt.
Eiffel eliminates that problem with its "expanded" classes.
Modula-3 avoids that problem by having data structures that are *not*
made of objects (in the technical OO sense) and that can be places off
the heap, and in other objects.
Modula-3 even goes the whole way to low-level system programming with
its "unsafe" features. The difference between these and C++ or C is
that you can't use them by accident; you have to explicitly mark the
code that uses them as "unsafe".
Although I find these languages wordy, I still think it a great pity
that C++ took off instead of them.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823009.19/warc/CC-MAIN-20181209185547-20181209211547-00328.warc.gz
|
CC-MAIN-2018-51
| 1,377
| 23
|
https://develop.consumerium.org/wiki/Talk:MySQL_dump
|
code
|
Please sign and share the petition 'Tighten regulation on taking, making and faking explicit images' at Change.org initiated by Helen Mort to the w:Law Commission (England and Wales) to properly update UK laws against synthetic filth. Only name and email required to support, no nationality requirement. See Current and possible laws and their application @ #SSF! wiki for more info on the struggle for laws to protect humans.
Can we just pretend that it took me 11 months to figure out that consumerium is in violation of the GFDL ;) ? I'll automate the mysqldump as a cron job sometime.
- No trouble. 126.96.36.199 22:09, 25 Jan 2004 (EET)
- Double no trouble, since you weren't in violation. Technically, since you haven't banned any IP numbers, any reader can retrieve the source text just by clicking "edit this page". It would not be convenient to retrieve all of the texts that way, but, it probably would satisfy the GFDL. Whether it should or not, is another question. A bigger question is whether mediawiki sites can actually satisfy it at all, since their format can only be read by other mediawiki sites, i.e. there is no wikitext standard and mediawiki can't do an XML dump. So the effort required to create MySQL dumps might better be spent harassing the developers to make XML dumps work. They do in usemod.
There was one homebrew spider that was badly parametrized so that it went into a loop causing useless hits. --Juxo 16:42, 27 Jan 2004 (EET)
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154053.17/warc/CC-MAIN-20210731043043-20210731073043-00639.warc.gz
|
CC-MAIN-2021-31
| 1,462
| 5
|
https://www.wisc-online.com/arcade/games/natural-science?gameTypes=TRIVIATRON_TICTACTOE_HAVEUHERD_JEOPARDY_SNAKE_SPINWIN
|
code
|
Slitherly Snake: Snake Basics
Answer these questions about snakes before the slitherly snake sneaks off the side of the screen.
You'll be introduced to some environmental impact facts.
The Planets: Jupiter
Jupiter is the fifth planet from the Sun and the largest in the Solar System. Juno is a NASA mission launched from Cape Canaveral on August 5, 2011 arriving at Jupiter July 4, 2016
Circulatory System Jeopardy
Life Science Review 1: Levels of Biological Organization
Levels of Biological Organization (Benchmarks: 18.104.22.168.1 & 22.214.171.124.2)
Heat and Heat Transfer Part 2
Show everyone how much you know about heat and heat transfer by solving these 7 Terms!
International Space Station (ISS)
The International Space Station (ISS) is the largest, most expensive single object in space made by humans so far...
Biology Exam Review
A game to help you review for Biology Chapter 2 Test
You'll learn about respiration and blood flow. Can you answer these questions?
Forms of Energy
Identify the forms of energy through definition and example.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943637.3/warc/CC-MAIN-20230321064400-20230321094400-00544.warc.gz
|
CC-MAIN-2023-14
| 1,051
| 17
|
https://cpp.hotexamples.com/fr/examples/-/QString/arg/cpp-qstring-arg-method-examples.html
|
code
|
QString name = "John"; int age = 25; QString message = QString("My name is %1 and I am %2 years old.").arg(name).arg(age); // Output: "My name is John and I am 25 years old."
QString color = "red"; QString message = QString("The color of the car is %1.").arg(color.toUpper()); // Output: "The color of the car is RED."In this example, the `toUpper()` function is called on the `color` variable before passing it to the `arg` function. This converts the color string to uppercase before inserting it into the message. The QString arg function is part of the Qt Core library.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647895.20/warc/CC-MAIN-20230601143134-20230601173134-00092.warc.gz
|
CC-MAIN-2023-23
| 573
| 2
|
https://www.momentumlearn.com/blog/learning-to-code-in-the-age-of-ai/
|
code
|
Learning to code in an immersive environment challenges learners to do work that they may not feel ready to do, using technology that they don’t really yet understand. Training in software engineering means thinking creatively, experimenting to find out how things work, and using mistakes and failures as fuel to propel you toward a solution.
We want our learners to be resourceful and persistent problem-solvers. Generative AI has become one of the resources our learners have at their disposal, and we know that they will encounter AI in some form in their jobs. So we’ve been thinking about how these tools fit into the toolbox of a beginner coder. Over the past several months, we’ve developed some guidelines about how coding beginners can use AI tools to support their learning. We’re confident that AI-assistance can, and should, be used to support the process of learning to code, with some instructor guidance.
Ask learners to explain their code
With project-based learning, skills are built during the process of figuring out how to do something. The time and effort spent doing a well-defined project becomes a valuable experience that forms a learner’s understanding. Each time a coding beginner does a project, it reveals to them a little bit more about how code works and the repeated effort to get code working evolves into understanding.
Submitting a project written by ChatGPT falls under the same Code of Conduct violation in our program as using code you didn’t write from any other source. You shouldn’t do it.
It’s easy to test whether someone wrote code themselves. Ask your learner to explain their code. If they can’t explain it, then the learning objectives have obviously not been met and there’s more work to do (and a conversation about goals and integrity to be had as well). At Momentum, instructors ask learners to explain their code constantly. We have opportunities to do this in real time during instruction sessions and when we’re working with learners one-on-one. We may also ask learners to record a video or present to a group, walking through how something they built works.
With this requirement to be accountable for your code, we’re not concerned about the potential for cheating with AI.
Turn off GitHub Copilot and other AI-assisted code tools in the editor
Code-completion tools, in our experience, tend to confuse and misdirect more than they help when people are still in the beginning stages of learning to code. The muscle-memory and brain-training that comes from the slow, manual process of typing code out yourself is a step that just can’t be skipped.
It’s helpful to see examples of working code for the task you’re trying to do. Every programmer learns by seeing code examples, reading and running them, learning new techniques, and getting inspired by the approach others have taken. But then you really have to type it out yourself, adapt it, and make it your own.
Experienced programmers can adapt suggestions made by AI tools like GitHub Copilot because they have the knowledge and insight to discern what to keep and what to discard in those suggestions. Beginners can’t discern this yet, and they need the space and time to develop those skills without preemptive suggestions getting in the way.
AI strategies that we’ve seen work
AI code-generation isn’t helpful for beginners and is currently perhaps only marginally helpful for experienced devs. But these tools have much more promise than code-generation; we’ve seen our learners using them in ways that we had to admit were pretty good. AI-assistance can provide useful boosts to help folks get past the overwhelm and anxiety that can inhibit progress and sap motivation. Here are some specific ways we’ve encouraged our learners to use AI tools.
Use AI to make tasks more manageable
We expect aspiring software engineers to learn to take a complex coding project assignment and thoroughly understand what they are being asked to do. Once they understand what they need to build, then they need to break it down into manageable tasks. AI can make this process much less daunting by helping folks envision and fill in the blanks of their own step-by-step process.
AI can explain confusing code and concepts
We’ve seen learners use AI effectively by asking questions about code they are trying to understand. The prompt to “explain this code” can help a learner make sense of an example from an instructor or something they found on Stack Overflow.
This works especially well with documentation that is sparse or directed at more experienced developers who can pick up on what’s implicit in a README. New developers need more information, and if you can’t reach an instructor at midnight while you’re puzzling over an example of how to use this Python package, AI is a great place to turn.
It’s also helpful for explanations in plain language, or “explain it to me like I’m 5,” for concepts that take people new to programming some time to get used to. Serialization, for example, is hard for beginners to grasp at first, and AI can supplement explanations from instructors or documentation that is confusing or just bears repeating.
Prompting AI forces you to form the right question
We teach the skill of asking effective, precise questions, which is an essential skill for any junior developer. We coach learners to identify what they are trying to do and what precisely isn’t working. Putting words to code concepts and seeing a problem clearly enough to describe take effort and practice. Every software engineer knows once you frame the question the right way you are most of the way to solving the problem. Sometimes all we need is the process of verbalizing the problem to help us recognize what we need to do, as our friends the rubber ducks know but will never tell.
The process of asking a question in a chat-style AI, and iterating over the question until you get a helpful answer, can help learners take a major step forward in their understanding of how to phrase what they need to know and what to do next. As an instructor, you can help learners refine their question-asking skills, which will pay off in many more contexts than a chatbot session.
Your learners are already using AI and need your guidance
Learners across all disciplines and levels are already using AI. Coding beginners will definitely use them. With your guidance, they can learn to use them in smart, effective ways that will get them closer to their career goals.
A software engineering career involves encountering problems that you may not know how to solve, but are confident that you can figure out. Laying the foundation for our learners to be adaptive, creative, and persistent problem-solvers means teaching them to use their tools and resources effectively. Now that those tools include AI-assistance, we can take advantage of the possibilities while still being smart about the liabilities.
AI is another technological turning point in human history, and like all the others, it comes with a lot to consider in terms of pros and cons. The folks we train today will be helping to navigate the world’s AI-powered future, and we owe it to them to prepare them to use AI tools, as best as we can at this early stage. At Momentum, we’re focusing on what’s good about AI, envisioning a future in which we use this technology in responsible, creative, and productive ways that raise the standards for everyone.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506420.84/warc/CC-MAIN-20230922134342-20230922164342-00236.warc.gz
|
CC-MAIN-2023-40
| 7,482
| 26
|
http://roleplayerguild.com/showthread.php?197342-Advanced-Casual-I-m-in-the-mood-for-a-big-bowl-of-roleplay-to-start-my-day&p=8538582
|
code
|
I'm sorry if you already have lots of people replying to you about this and if you have already started a role play with someone but I was having a hard time starting a fire to send some smoke signals. . .After getting frustrated with it I went to have a break, go look around town, and when I came back I decided to reply like this. (although the smoke signal would have been very fun)
If you are still looking for people (which I'm sure you aren't, but it doesn't hurt to ask right?) would you mind doing a role play with me?
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702718570/warc/CC-MAIN-20130516111158-00006-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 527
| 2
|
https://binarysecurity.no/careers/
|
code
|
One of the main reasons why we started Binary Security was to do what we do best on our terms. This has created a work environment with colleagues that are passionate about what we do. We believe this leads to higher quality in our work and encourages learning from each other.
With that said, work life balance is important for us and should be important for you. We frown upon overtime and will never take on more work than we can handle and still deliver on with high quality. Life is often easier without a fixed work schedule, and as long as we have some degree of predictability, we are open to flexible work hours and long vacations and leaves. We would love it if you join us at the office in Oslo from time to time, but as long as the current project allows it, you are free to work from wherever.
We appreciate what it requires to stay on top of the developments in our industry, and all employees at Binary Security have 20% of their time reserved for research.
All employees in Binary Security receive a high salary and we have no issues being up-front with what we can offer. It is not a goal in Binary Security to have a high profit margin per employee.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100264.9/warc/CC-MAIN-20231201021234-20231201051234-00867.warc.gz
|
CC-MAIN-2023-50
| 1,167
| 4
|
https://community.intel.com/t5/FPGA-Intellectual-Property/Completer-Abort-or-Unsupported-Request-via-BFM/td-p/105309
|
code
|
Hi,I was checking a design using the Stratix IV PCI Express Hard IP using the generated BFM. Now I wanted the BFM to respond to a read from the Hard IP with a failure, like a Completer Abort or Unsupported Request. I tried giving it several random addresses to do the read but always get a valid read of all zeroes, but none of those are bad packets. Does anyone know how get the BFM to generate a failed response? Thanks.
Are you using the Hard IP as an endpoint or root complex? The Altera BFM is pretty limited -- pretty much just proves out the basics. If you need to do more complex verification, you need a 3rd party tool. There are a few out there that are inexpensive and/or have free versions. My favorite is DrivExpress, which should support what you're asking about, assuming you're using the Hard IP as an endpoint.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100686.78/warc/CC-MAIN-20231207185656-20231207215656-00233.warc.gz
|
CC-MAIN-2023-50
| 827
| 2
|
https://mirsartandstuff.com/teams/FishingKnight
|
code
|
UCSC undergraduate project
Role: Lead Artist, Music
Team Size: 5-10 people
This was made shortly after Nell's Wizard Adventure.
This time around I was the art lead. Although the gameplay itself would have a simplier design by using tile mappings, I wanted to make the cutscene with some more pizzazz. Plently of rough character designs and color tests were made to try and capture that sunset/end of day feeling.
Creating the artworks
Deciding the colors
During our meetings we discussed ideas for a fun backstory between the characters which wound up as the main reason the character would climb the tower. The programmers also did a great job with the fishing hook mechanic.
As for the music, I didn't have any instruments on hand so I pulled up a music sheet program, inscribed the notes, and then exported the .mp3 files.
This game was finished in about two or three weeks. I'm pretty happy with how the game turned out.
- Mirs (written June, 2023)
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475825.14/warc/CC-MAIN-20240302120344-20240302150344-00357.warc.gz
|
CC-MAIN-2024-10
| 952
| 11
|
https://paperswithcode.com/task/image-generation
|
code
|
659 papers with code • 58 benchmarks • 41 datasets
Image generation (synthesis) is the task of generating new images from an existing dataset.
In this section, you can find state-of-the-art leaderboards for unconditional generation. For conditional generation, and other types of image generations, refer to the subtasks.
( Image credit: StyleGAN )
We present a variety of new architectural features and training procedures that we apply to the generative adversarial networks (GANs) framework.
Ranked #11 on Conditional Image Generation on CIFAR-10
Large Transformer models routinely achieve state-of-the-art results on a number of tasks but training these models can be prohibitively costly, especially on long sequences.
Ranked #2 on Open-Domain Question Answering on SearchQA
We introduce the problem of perpetual view generation -- long-range generation of novel views corresponding to an arbitrarily long camera trajectory given a single image.
We introduce Performers, Transformer architectures which can estimate regular (softmax) full-rank-attention Transformers with provable accuracy, but using only linear (as opposed to quadratic) space and time complexity, without relying on any priors such as sparsity or low-rankness.
Ranked #12 on Image Generation on ImageNet 64x64
In this paper, we propose the Self-Attention Generative Adversarial Network (SAGAN) which allows attention-driven, long-range dependency modeling for image generation tasks.
Ranked #11 on Conditional Image Generation on ImageNet 128x128
Generative Adversarial Networks (GANs) excel at creating realistic images with complex models for which maximum likelihood is infeasible.
Ranked #1 on Image Generation on LSUN Bedroom 64 x 64
A standard solution is to train networks with Quantization Aware Training, where the weights are quantized during training and the gradients approximated with the Straight-Through Estimator.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153729.44/warc/CC-MAIN-20210728123318-20210728153318-00562.warc.gz
|
CC-MAIN-2021-31
| 1,907
| 16
|
https://www.businessinsider.com/one-cool-chart-will-tell-you-everything-you-need-to-know-about-dating-younger-people-2013-6
|
code
|
Two people on reddit have figured out how old — and how young — people are actually willing to date, and the results are fascinating.
One user, cryo_zero, performed a study in the Sample Size subreddit asking people what ages they would and wouldn't date. Yesterday, a user called TMaster posted a visualization in the Data Is Beautiful subreddit.
It's an excellent look at what range of ages people are willing to date given their own age, and gives a look into the minds of different people in the dating game at different stages in life.
Check out the charts. Basically, the vertical axis represents your age, the horizontal access represents the age of the person you want to date, and the colors represent your odds of success. Where it's green, your odds are high.
Here are some of the most interesting findings:
- People seeking to date men seem to be more willing to accept a wider age range.
- People get a lot less picky the older that they get.
- In late twenties and early thirties, people seeking women are likely to drop most previously held age concerns.
- People are really, really open-minded at a few points in their teens.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540491491.18/warc/CC-MAIN-20191206222837-20191207010837-00186.warc.gz
|
CC-MAIN-2019-51
| 1,145
| 9
|
https://forum.grasscity.com/threads/first-grow-a-few-questions.341795/
|
code
|
I am pised off with bying crappy bud, so i want to grow my own. I can´t be bothered to read the stikies or use the search button, so need sumeone to tell me abslutely everythink I need to know. I dont want to spend any money, and dont want to make any effort at all - don´t these things grow on their own. And I want at least a pound a plant. And want is the strain that grows in the fastest time - I dont want to wait at all. Thanks for your help.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057615.3/warc/CC-MAIN-20210925082018-20210925112018-00283.warc.gz
|
CC-MAIN-2021-39
| 454
| 1
|
https://www.aymine.com/doc/en/web/webSVCService
|
code
|
Task, project & quality management
Contacts and directories module (CRM)
Web management and automation
Products, assets and sales
Sabre plugin module
Enterprise Architect connector
The AyMINE Framework Module
Basic Service Settings
Settings of basic web service access rules
The list of basic services is extensible. The service menu depends on the modules you have active and the customized connectors for your needs are set within the basic service settings.
The basic service settings allow you to define what services are available in a given connector. This allows you to define what services they can use for each connected application or website. You don't have to worry that giving access data to one vendor would make more accessible than you want.
There is currently one generic basic service published in the basic package – web traffic tracking. Additional services are provided based on specification.
When defining a gateway to receive messages, go to the Web Messages page where there are configurations for the web message reception and processing service.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100232.63/warc/CC-MAIN-20231130193829-20231130223829-00785.warc.gz
|
CC-MAIN-2023-50
| 1,074
| 13
|
https://mail.python.org/pipermail/python-list/2002-August/128180.html
|
code
|
How to exit early?
pete at shinners.org
Mon Aug 12 12:51:32 EDT 2002
brobbins333 at shaw.ca wrote:
> The data input to my script may contain some that are special cases.
> If so, I want to process these in a special function, then exit
> without running the remainder of the script. What's the best way to do
> this? I need something like the 'exitsub' command in Visual Basic, or
> at least a way to jump to the end of the script and exit. Any
two ways to do it. first is the "exit" function from the sys module.
Exit the interpreter by raising SystemExit(status).
If the status is omitted or None, it defaults to zero (i.e., success).
If the status is numeric, it will be used as the system exit status.
If it is another kind of object, it will be printed and the system
exit status will be one (i.e., failure).
for example, you would use it like this,
you can also raise the SystemExit exception, which i often find is nice and
raise SystemExit, "Exiting Early, whoops!"
More information about the Python-list
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541307813.73/warc/CC-MAIN-20191215094447-20191215122447-00014.warc.gz
|
CC-MAIN-2019-51
| 1,012
| 19
|
https://tazastory.com/unexpectedly-found-nil-exc_bad_instruction-codeexc_i386_invop-subcode0x0-nsmanagedobjectcontext/
|
code
|
The exception object is nil.
In this example, it’s a new class called _Nodes_.
In the source code of _Nodes_, the first line just defines the class, the second line defines the constructor.
The exception object is nil because we don’t know what to do with it. Actually, the error isn’t so bad. The compiler can figure out what to do with an exception. The issue is that the exception message is just too vague. In this case, the documentation is so vague it doesn’t even show the actual exception. In this case the only thing we can do is to ignore it and hope for the best.
The reason for this is because you can’t see what’s going on. We can see that you can see the code and that it does nothing in the first place. The reason is because it means we can’t have our code with the “this is the main() method, so on this line we have to do something” that we can’t see. We have to see the code.
The reason for this is because it isnt the code but the method. Let’s take a look at the code we’re using to get rid of the this, and the reason we’re not able to see whats going on. Its essentially a method that we call when we are on board our ship and there is a way to access our camera and see what the ship is doing. The only way we can get rid of this is to disable the this and get the camera.
Lets take a look at the code that is being used by the ship. Basically, we can see that there is a call to exc_bad_instruction. This is the code that is going to disable the this. The code is a nil pointer, so it will never be called. The code is called when we are on our ship, so we can see what the ship is doing. This is the code that is calling exc_bad_instruction and disabling it.
To see the ship doing something, it may be helpful to look at the ship’s flight deck. The ship is going to take flight as soon as it leaves it, so it is going to be much harder to run it off its own deck. The ship is going to be shooting at a target, so we can try to kill it before it gets to a target.
This should be a lot easier to explain when you see the ship flying.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473347.0/warc/CC-MAIN-20240220211055-20240221001055-00570.warc.gz
|
CC-MAIN-2024-10
| 2,085
| 9
|
http://www.listserv.uga.edu/cgi-bin/wa?A2=ind1001e&L=sas-l&T=0&O=D&F=P&P=8612
|
code
|
Dan posted the following clarification:
> Yes it is on a Windows Server and the files are on an attached high
> speed storage area network. The usual explanation for slow processing
> that I see is in fact I/O contention with other large jobs that are
> running concurrently. But I have never experienced this magnitude of
> slow down.
Dan, I am going to jump onto the dogpile of responses from Joe, Art, and Mark and also opine that it is a network I/O issue. Arf!
As you know, one of the unsung benefits one gets by compressing SAS data sets is fewer overall I/O's transferring data between disk storage and computer memory due to SAS transferring more observations per I/O. So, compression results in fewer overall I/O's when performing a sequential read of the compressed SAS data set than if the same data set were uncompressed. Fewer I/O's result in fewer seconds, minutes, hours, days, spent waiting for a program to run. Since your I/O times went precipitously upward doing simple DATA step tasks, it is unlikely that SAS's uncompressing of incoming observations and compressing outgoing observations is the culprit. It is more in line with the type of server I/O delays that all of us have experienced at one time or another. That is, the trip to and from the server was during a computer rush hour.
You know, your systems folks should be able to run a monitor on the server and been able to tell you that there was heavy I/O activity, or some other marker of poor performance. Hopefully, they are approachable enough and open enough to share that information with a SAS programmer!
Dan, best of luck in all of your SAS endeavors!
I hope that this suggestion proves helpful now, and in the future!
Of course, all of these opinions and insights are my own, and do not reflect those of my organization or my associates. All SAS code and/or methodologies specified in this posting are for illustrative purposes only and no warranty is stated or implied as to their accuracy or applicability. People deciding to use information in this posting do so at their own risk.
Michael A. Raithel
"The man who wrote the book on performance"
Author: Tuning SAS Applications in the MVS Environment
Author: Tuning SAS Applications in the OS/390 and z/OS Environments, Second Edition
Author: The Complete Guide to SAS Indexes
Never insult an alligator until after you have crossed the river. - Cordell Hull
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345776257/warc/CC-MAIN-20131218054936-00038-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 2,398
| 18
|
https://www.freelancer.com.au/jobs/erp/
|
code
|
Collection of Concepts which different programming languages have
se necesita de un experto para implementar odoo en clientes y modificar ciertos parámetros para acomodarlo a como funciona cada negocio. Específicamente se debe subir masivo de inventario, teniendo las mismas variables que utiliza el cliente, configurar módulos y mantener el ERP. Se busca persona para trabajar con una cartera de clientes.
Looking for an experienced developer/s who can customize & implement ERPNext for a manufacturing organisation. The job would require designing the workflow through the ERPNext modules to suit the working of the company. The manufacturing module will need significant customization to suit the specific requirements. Looking to quick development and deployment. Existing legacy ERP can be used to ...
My client is running Unicenta POS 4.3.2 in his bar and wants to be able to see a snapshot of orders per user/waiters in the bar. This would be used by the bar lady who will be able to see how much each wait staff has placed orders so as to know how much she expects from each. NOTE this is for orders that customers have YET to pay
We need an ODOO expert; URL of the ODOO is [url removed, login to view]; who can install ODOO as docker image in kubernetes cluster. ODOO should be installing as multi-tenant. He should also be able to automate the installation and provide the documentation. He should also be able to customize the ODOO UI and give KT on API.
We are looking for standard ERP solution (With some customization) for managing the daily routine trading company. 1. Sales Order Management 2. Purchase Order Management 3. Inventory 4. Logistics Planning (Vehicle Management & Tracking) 5. Simple E-eCommerce Store
Hello, who knows the system shopware? I am looking for a company for ecommerce B2B and B2C including CRM, ERP The shop must automatically be in contact with our warehouse and process the orders. Drop shiping is a requirement for our system. It is a big project. Please only contact companies with experience here. Thanks.
Wir suchen jemanden der für uns die gesamte SEO-Einrichtung/Optimierung sowie Meta-Tags Definitionen/Konfigurationen für unseren bestehenden Online Shop auf Artikel- und Shop-Ebene einrichtet/erstellt/durchführt.
We are looking for experienced python/odoo developers that can develop below module. We are using Odoo v10 and the point_of_sale module with POSBox. The payment terminal is an Ingenico iCT350 from Bambora ([url removed, login to view]). We basically want this module working with the Host2T-protocoll and on odoo v10: [url removed, login to view] Note: We need this module within 1 we...
Looking for ODOO technical Course for 5 Days No previews Experience in Python (Working in Dynamics GP/Dynamic CRM) Looking in professional Class room training in Bangalore India with regards Looking in professional Class room training in Bangalore India
Volevo aggiornare la versione di Odoo dalla 10 alla 11. Con migrazione dei dati nei moduli Lead, Contatti, Fatture vendita e Acquisto, Siti web
I need to customize the tax invoice report with the following changes: 1. Create a separate tax invoice report (Copy). 2. Change the heading to 'Estimation' instead of tax invoice. 3. Remove the tax column from the table and combine the tax amount to the unit price. In a manner that the table will only contain the unit price column (including the tax amount). And no separate tax colum...
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812306.16/warc/CC-MAIN-20180219012716-20180219032716-00795.warc.gz
|
CC-MAIN-2018-09
| 3,448
| 12
|
https://forum.sambapos.com/t/kitchen-bar-display-using-task-printer-separate-displays-for-food-and-drink/8075?page=2
|
code
|
Thanks x2. Awesome tutorial. Works very good. The prior KDS method with v4 would often crash our POS or was very slow to respond to marking tickets as cleared even on fast machines.
This method is far faster and more reliable. Good work to the entire team with v5 which has allowed for this type of setup.
Ticket Lister widget also improved but Task Widget is recommended for Kitchen Displays as it can work without tracking ticket states and have duration tracker internally.
Thank you, yes this is so much better.
this is not working on 5.1.57 does anyone else tried on 5.1.57?
It works fine. What part is not working for you? Show some screenshots of your setup, Screenshots of whats not working, be more descriptive.
I can answer your question with a simple Yes I have tried it and it works just fine… I doubt you will like that answer though so its important you be more descriptive.
navigation button is not working when i click nothing happends
i could work without that button but when i make a order nothing happends on kitchen display
Show the Task Editor Widget Settings and Properties.
Nothing changed my friend still button and kitchen screen not working
You setup something wrong the tutorial works fine. Hard for us to know where your mistake is because we can’t see it.
Any idea of refreshing as its not refreshing screen until logout and login if we enter order in same terminal its showing but task complete working fine , new orders not showing immediately as all terminals connected to message server.
Did you set a refresh time for widget?
@Jesse No I just followed the tutorial as it say
It won’t auto refresh unless you set it and a rate in seconds. Turn auto refresh on and set an interval
@Jesse Hmm…its by default ticked and set for 0 , may be causing messaging server, is there a solution where we can uninstall and completelty remove message server and set new port ? so that might be reset all.
Set it at 5 or so dont leave it at 0. If it says Connected on all terminals then Message server is working.
@emre as the above discussion I set to 5 and I can see the screen flicking every 5 sec , but its not showing cards until we get another order so showing together, or take order on same terminal , or log out and login , is this only my side ? any issues ? thanks
show your msg server settings on one of the terminals that’s not the one with the server running. You do have a main server running mag server and all other terminals set to connect to it right?
It should just work when message server active and there is no need for interval refresh. I tested it on my side and seems working fine. So there is something specific on your side that is not handled properly by me or not configured correctly.
Assuming there is no configuration error the problem might be refresh message may execute before tasks created by printer. Can you try editing related execute print task action and set “High priority” setting to true? That will trigger printing immediately.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662561747.42/warc/CC-MAIN-20220523194013-20220523224013-00167.warc.gz
|
CC-MAIN-2022-21
| 3,005
| 22
|
https://slitherandcrawlpets.com/where-does-the-green-tree-python-live/
|
code
|
Knowing where a Green Tree Python lives is valuable information if you’re planning trips or want to keep one as a pet. Their ideal environment might surprise you!
One look at their vibrant color, and you’ll see why they’re called Green Tree Pythons. This snake species can captivate any passer-by! Besides their mesmerizing appearance, Green Tree Pythons are pretty large and enjoy wrapping themselves around tree branches.
In this article, I share more about their natural habitat, whether it’s wise to keep one as a pet, and give a quick overview of the three Green Tree Python subspecies.
Where Does The Green Tree Python Live: Ideal Environment
The ideal environment for a Green Tree Python is a tropical rainforest habitat. They’re only found in areas of eastern Indonesia, Papua New Guinea, and the Cape York Peninsula of Australia.
This snake thrives in warm, densely vegetated areas with very high humidities. Sometimes they can also be found in forests that aren’t as wet and gardens with fresh growth.
The age of the Green Tree Python plays a large part in where you’ll find them because they have different environmental needs during each phase of their life.
Can You Keep A Green Tree Python As A Pet?
Yes, you can keep a Green Tree Python as a pet.
You will, however, need to ensure that you can adhere to all of their needs. They’re also known to get aggressive when enclosed.
Green Tree Pythons can live for more than 20 years in captivity and prefer being alone. They don’t like to be held, and their moods can change instantly, so you should know that the risk of them biting you is real.
This species is recommended for a more experienced snake handler.
You will need a proper enclosure with the correct temperature and humidity settings. Green Tree Pythons are arboreal, which means that they live in trees. It would be best to supply them with a branch or some sturdy perches to lie on.
What Do Green Tree Pythons Eat?
Green Tree Pythons are carnivores and prefer to hunt their food by ambushing their prey and using different tactics to kill it. They use the tip of their tails to trap their prey into thinking it’s a worm. Once their target shows interest, they strike and constrict them to death.
Green Tree Pythons will prey on small mammals and reptiles, like mice and geckos in the wild. Sometimes they’ll even settle for birds or moths.
Baby Pythons are diurnal and hunt during the day. Adult snakes are known to be nocturnal – they stay in one place throughout the day and hunt during the night.
In captivity, Green Tree Pythons usually need mice or rats every couple of days. Babies require a small rodent every 5 to 7 days, juvenile snakes eat every 7 to 10 days, and adults need medium-sized rodents every 10 to 14 days.
Pregnant female Green Tree Pythons won’t eat until their babies are born. This starvation streak can last up to 90 days.
Are Green Tree Pythons Venomous?
Green Tree Pythons are non-venomous and won’t kill you, but their bites are still dangerous since they’re very big snakes.
The species is extremely shy, but they still choose to bite if you get too close to them. These snakes have more than a hundred teeth, so one bite could result in a trip to the emergency room.
Types of Green Tree Pythons
Biak Green Tree Python
These snakes are bright yellow until they turn about five years old. Even after turning green, they still keep a lot of the yellow. They are very curious and the most popular choice when choosing a Green Tree Python to keep as a pet.
Jayapura Green Tree Python
This subspecies is less likely to bite or strike than other Green Tree Pythons. They only differ in color with a blue stripe rather than white or yellow and some white spots.
Manokwari Green Tree Python
These Green Tree Pythons have more blue on them than green. They have a lighter green shade with a brighter blue vertebrate stripe. The tip of these snakes’ tails is prominently blue.
How To Identify A Green Tree Python
You can identify a Green Tree Python by its bright colors. They are green with yellow or white stripes over their vertebrates.
Baby Green Tree Pythons are bright red or yellow when born and only change color as they start to mature.
When measured from nose to tail, the Green Tree Python will be about five feet long.
Their heads are shaped like diamonds.
A Green Tree Python could make an excellent pet, but you shouldn’t keep one if you can’t mimic their natural habitat. This snake species thrives in rainforests, and depriving them of these conditions is cruel.
Your chances of finding a Green Tree Python on your afternoon hike is rare, but if you do, don’t startle. They’re non-venomous snakes but might inflict a painful bite if they feel threatened by you.
I hope this article intrigued you and you feel more knowledgeable about the Green Tree Python species. If you have any more questions about these snakes or have one and would like to share an interesting fact or two about them, pop it in the comments!
Is the Green Tree Python native to Australia?
The Green Tree Python is native to Australia and other countries.
Where do Green Tree Pythons live in Australia?
In Australia, the Green Tree Python lives in the eastern Cape York Peninsula rainforests in the far north of Queensland.
Do Green Tree Pythons live in Florida?
Green Tree Pythons aren't native to Florida.
Where do tree snakes lay their eggs?
Many female tree snakes lay their eggs in caves or hollow branches to keep them safe.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511386.54/warc/CC-MAIN-20231004152134-20231004182134-00544.warc.gz
|
CC-MAIN-2023-40
| 5,500
| 45
|
https://blog.adafruit.com/2013/10/02/diy-digital-wristwatch-wearablewednesday/
|
code
|
This DIY digital wristwatch would come in handy in many situations but i especially like the ability to set up to 10 alarm times and play games during my commute:
The main incentive behind this project was to see how much I could cram, in terms of both hardware and software, into a wristwatch-like device that is no larger than the display itself. An OLED display was chosen for being only 1.5mm thick and not requiring a backlight (each pixel produces its own light), but mostly because they look cool. The watch was originally going to have a 0.96″ display, but this proved too difficult to get all the things I wanted underneath it. Going up a size to 1.3″ was perfect.
Stop breadboarding and soldering – start making immediately! Adafruit’s Circuit Playground is jam-packed with LEDs, sensors, buttons, alligator clip pads and more. Build projects with Circuit Playground in a few minutes with the drag-and-drop MakeCode programming site, learn computer science using the CS Discoveries class on code.org, jump into CircuitPython to learn Python and hardware together, TinyGO, or even use the Arduino IDE. Circuit Playground Express is the newest and best Circuit Playground board, with support for CircuitPython, MakeCode, and Arduino. It has a powerful processor, 10 NeoPixels, mini speaker, InfraRed receive and transmit, two buttons, a switch, 14 alligator clip pads, and lots of sensors: capacitive touch, IR proximity, temperature, light, motion and sound. A whole wide world of electronics and coding is waiting for you, and it fits in the palm of your hand.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337595.1/warc/CC-MAIN-20221005073953-20221005103953-00079.warc.gz
|
CC-MAIN-2022-40
| 1,578
| 3
|
https://jpralves.net/post/2019/01/03/arduino-gps-module-destination-notifier.html
|
code
|
“How much time do we waste in traffic jams? I made an Arduino-powered destination notifier to utilize this time in a productive way.
Everyone knows that traffic jams can be a major time waster. And it is impossible to predict how long it would take from origin to destination.
The problem of traffic jams affected me when I came to a city two months ago. Every day I spend more than two hours stuck in jams. And I felt it like why can’t I utilize this time to do something?
Note: I use public transport. :-)
There are plenty of other things you can do while being stuck in traffic jam!
Some of the ones below are not just fun, but productive too:
Use the time to think and plan, either for current and future projects.
Utilize time to educate yourself, watch instructional videos or take an e-learning course on Udemy, Coursera, etc.
And of course making electronics stuffs always inspires me. So I built a destination notifier using Arduino and GPS module. So what it does is whenever you are near to your destination, it notifies you by glowing LED or through vibration (by using mini vibrating motor). I have provided circuits for both LED and vibrating motor.
For that, first you need to find latitude and longitude to define the location. Once you find your location, you can use the latitude and longitude values to find distance to the location and by keeping a range you can turn on the notifier. The logic is simple, right?!
So let’s get started……”
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107893011.54/warc/CC-MAIN-20201027023251-20201027053251-00134.warc.gz
|
CC-MAIN-2020-45
| 1,469
| 11
|
https://libs.garden/swift/search?q=ios+developer
|
code
|
Roadmap to becoming an iOS developer in 2018.
Learn how to program apps for the iPhone and iPad
Tools that every iOS developer should know.
The official Wikipedia iOS app.
Floating Action button for iOS similar to Android's floating button
Become a professional iOS developer by mastering Swift, Xcode 10, ARKit, and Core ML
A curated list of awesome iOS ecosystem, including Objective-C and Swift Projects
An iOS chat application using cognitive services from the Watson Developer Cloud Swift SDK.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347434137.87/warc/CC-MAIN-20200603112831-20200603142831-00047.warc.gz
|
CC-MAIN-2020-24
| 498
| 8
|
https://gtapolicemods.com/files/file/2769-itasca-county-sheriff-uniform-pack/
|
code
|
I'm the only one
Should be pretty straight forward to install, but only the YTD's go into your EUP folder to use in game or in server, dds files are just there to be there. If you still can't figure out how to install it then there should be some videos online.
No ripping or reselling any of the files included. No modifying game files without permission. I am not responsible for damage to your game by installing this incorrectly, or for overridden files.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335424.32/warc/CC-MAIN-20220930020521-20220930050521-00275.warc.gz
|
CC-MAIN-2022-40
| 458
| 3
|
https://support.dronesense.com/hc/en-us/articles/360059972311-Maintenance-Procedures
|
code
|
Maintenance procedures define the tasks to be performed as part of a regular maintenance cycle.
You can set up procedures for each type of hardware in your system.
Once defined, you can associate a procedure with a schedule for a given piece of hardware, or perform unscheduled maintenance directly from the hardware details page.
Creating a Maintenance Procedure
To create a new maintenance procedure, complete the following steps:
From the Maintenance > Procedures page, click Add New Procedure.
On the page that appears, provide a name for the procedure and an estimate of how long it will take to complete.
In the Steps section, add a name and description for each step to complete. You can make a step optional by leaving the checkbox open.
Add new steps by clicking Add Item. You can reorder steps by dragging them and dropping them vertically.
Provide a description for the procedure and click Save Maintenance when you are finished.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816875.61/warc/CC-MAIN-20240414064633-20240414094633-00281.warc.gz
|
CC-MAIN-2024-18
| 940
| 10
|