url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://www.codeproject.com/script/common/TellFriend.aspx?obtid=2&obid=7009
|
code
|
|The Message text:
This email was created by [MemberName] <[MemberEmail]> who thought you would be interested in the following Article:
".NET Data Persistence: SQL Server vs. Matisse vs. FastObjects"
An article with source code examining the development speed and performance capability of .NET, Matisse and FastObjects
CodeProject also contains hundreds of articles, free source code samples and applications to help in your day to day programming. Why not give it a try!
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806316.80/warc/CC-MAIN-20171121040104-20171121060104-00703.warc.gz
|
CC-MAIN-2017-47
| 472
| 5
|
http://superuser.com/questions/473449/windows-remote-desktop-mstsc-keyboard-sticking
|
code
|
I am a sytem Administrator and use windows Remote Desktop extensively. It works well OTHER than the keys 'stick' sometimes like the
'alt', 'caps lock', 'shift', 'ctrl'. So I have to
'ctrl-alt-del' to reset the keys state and then I can work normal again.
Is there anything I can do to alleviate this ANNOYING issue?
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700438490/warc/CC-MAIN-20130516103358-00012-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 315
| 4
|
https://bbs.boingboing.net/t/count-to-ten-thousand-part-2/183987?page=21
|
code
|
if we assume that the password can only be 4 digits long, then for 7654 I get P = 1/5040 and unfortunately for 7656 its P=0
For my nephew who loves General Grievous:
Math checks out, assuming exactly 4 digits.
This number brings up lots of roofing contractors since dialing roof is 7663.
I looked for a good palindrome reference, but the best I could do was something shiny
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141176049.8/warc/CC-MAIN-20201124082900-20201124112900-00246.warc.gz
|
CC-MAIN-2020-50
| 373
| 5
|
https://sph.unc.edu/adv_profile/rachel-noble/
|
code
|
Professor Noble’s research program bridges environmental microbiology and marine microbial ecology. A main thread of Dr. Noble’s work is the application of novel molecular techniques for applied and basic science. She has developed a range of rapid water quality test methods, including those for E. coli, Enterococcus, and Vibrio species and studies the dynamics of microbial contaminants contributed through stormwater runoff to high priority recreational and shellfish harvesting waters. A specific interest is conducting research to partition anthropogenic inputs from reservoir populations in coastal ecosystems, thereby permitting development of accurate models. In addition to applied research, Dr. Noble is interested in the dynamics of marine microbial food webs, specifically focusing on viral control of bacterial and algal populations, and the interplay among viruses, bacteria including Bdellovibrio), phytoplankton, grazers, and biogeochemical cycling in estuarine and coastal marine environments, especially in light of impending climate change.
Noble Lab: http://noble.web.unc.edu/
Practice ActivitiesUNC article and video Science for Safer Food: http://www.unc.edu/spotlight/science-safer-food/
PhD, Marine Biology, University of Southern California, 1998
BSc, Molecular Biology, Carnegie Mellon University, 1991
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703528672.38/warc/CC-MAIN-20210121225305-20210122015305-00101.warc.gz
|
CC-MAIN-2021-04
| 1,333
| 5
|
https://toadshosting.com/is-wordpress-free-on-namecheap/
|
code
|
Namecheap to show you Is WordPress Free On Namecheap… how it compares to others..|Just because it didn’t make our list does not indicate that Namecheap isn’t an excellent solution for your hosting needs. Hosting needs differ from person to individual, and Namecheap might have exactly what you need.}
How much can you save with Namecheap coupons?
look they are not the most affordable location to buy domains if you’re searching for that check out name silo or pork bun but Namecheap balances value customer care and ease of use with namecheap there is no playing around you just buy your domain name the panel is really easy to use and if you need any help there 24/7 consumer assistance team will be with you every action of the method to help you out and look that’s not something you just get with every domain company GoDaddy I dislike GoDaddy with a passion by the way now what I like about Namecheap is they use totally free Whois protection on all of their domains so if you’re not exactly sure what Whois defense is individuals can actually search for any domain in a Whois database you simply type in the domain name and it will inform you who owns it and their address all their personal info address email contact number all that is public and less you have Whois protection now some registrar’s will charge you money for this GoDaddy but at Namecheap it is totally free for life now Namecheap is likewise great for e-mail hosting so if you want a customized email like christian at christian comm or my e-mail is contact at christian tailored Co you require email hosting Namecheap uses their private email Hosting solution for $10 a year yeah you heard me ideal $10 a year it’s very dependable it’s simple it’s easy to use and my only grievance is that the spam filter is a little bit aggressive it tends to send out more items to spam than I like and a lot of products that aren’t truly spam but I just remember to examine it from time to time and it’s not too much of a problem if you want the outright finest e-mail hosting I would opt for gee sweet that is e-mail hosting by Google however guess what you can purchase gee sweet through Namecheap for 5 dollars a month which is the market price for gee sweet so you can even go there and buy gee sweet if you want Namecheap genuinely is your one-stop shop when it pertains to email hosting and unlike the domains where you might make the argument that there are cheaper locations with their personal e-mail hosting you are not going to find another website that is as inexpensive and reliable as Namecheap when it pertains to email hosting and now it’s time to speak about webhosting which is kind of a similar story to the email hosting you see I have a lot of experience with namecheap shared hosting in fact that’s what I advise to all of my customers their shared hosting is. Is WordPress Free On Namecheap
What do I get with Namecheap sign-up offer?
Are you searching for the ideal hosting to get your site up and running?.
You may feel overwhelmed with choices for hosting, and you are not alone. There is no scarcity of providers to pick from when it comes time to nail down hosting for your website..
There specify web hosting services that provide what you require, and Namecheap may be one of them..
This hosting company started as a domain registrar in 2000, and its success in this endeavor led Namecheap to add on other services, consisting of hosting..
Today, the business has over 11 million clients and hosts over three million domain names..
While some business make their money off upsells, Namecheap prides itself that it does not use the upsell tactic to generate income. Instead, they work to supply economical prices strategies that give you what you require, hence the name Namecheap.
really fairly priced it’s around $25 a year and you get a cPanel account which implies that you can easily install WordPress or Joomla or whatever CMS system you want to utilize for your site and do not fret there’s going to be plenty more videos on this channel about developing a website and wordpress vs. Squarespace vs. Wix and the best choice to construct a website so if you want to see that do be sure to strike that subscribe button and click the bell so you don’t miss when I put those videos out but assuming you require web hosting and you know what that is look no more than Namecheap for $25 a year you are not going to find a much better and more reliable alternative with the fantastic 24/7 customer care that they give on all of their items now as a complete.
Is there a Namecheap student discount?
disclosure I personally have my sites hosted with Amazon Web Services so I technically do not utilize Namecheap for webhosting however that’s just because well I’m a geek and I want to have my own whole server to myself and it was just more affordable with Amazon to have an entire server than with namecheap however if all you want is a shared webhosting account to install your WordPress website or whatever Namecheap is absolutely the very best alternative so in summary if you want a domain Namecheap is the simplest place and sort of the best worth because of the customer support however not the most inexpensive I will state that there are less expensive alternatives when it pertains to email hosting and web hosting I would definitely advise Namecheap hands-down no questions asked for the most affordable price the very best service and the client service so this video was not sponsored by Namecheap I understand I’ve spoken extremely extremely of them however that’s just because I’ve utilized them for several years and they really have a wonderful credibility and excellent quality so if you want to utilize them please do think about utilizing the link in the description it is an affiliate link so you will be supporting the channel by going shopping through there and it will not cost you anymore it’s completely complimentary to use well anyhow men thank you a lot for watching that’s gon na do it for this video if you liked it I ‘d actually appreciate you subscribing and clicking the bell since I’m going to be doing lots more videos on structure websites and developing your brand name perhaps even some marketing videos so if you’re interested in that ensure you do subscribe and with that set I will capture you men next. Is WordPress Free On Namecheap
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334915.59/warc/CC-MAIN-20220926175816-20220926205816-00744.warc.gz
|
CC-MAIN-2022-40
| 6,420
| 13
|
http://finnjaqeo.pointblog.net/
|
code
|
“It has been intriguing to determine, over the last few years, No Starch Press, which generates this e book, growing and creating long term classics that needs to be along with the more common O’Reilly Push programming textbooks. Python Crash Class is one of those guides.”
When you operate this application you’ll see the text string during the brackets receives output towards the console. It is because ‘print()’ is a method, and we're contacting it with an argument (our text).
So appreciate Python assignment help on the net for both your assignments and you. Benefit from our reliability and assures on finding your project completed inside of a well timed method. From supplying you tracking to pledging 100% originality, you may have everything to acquire. We each know the value of the scripting language. We also respect the ongoing requirement for programmers who can utilize it.
Assigments4u gives programming assignment help on a range of subject areas and has a diverse crew of programmers that have the potential to handle any sort of assignment without the blink of an eye fixed.
These an awesome practical experience with OZ Assignment experts. I used to be needing help in my Java programming Assignment and one among my Good friend advise me to OZ assignment help. I'm extremely glad that he did that.
So many pupils demonstrate concern with regards to the substantial prices and lousy companies. We at DMCH Be certain that you obtain the ideal solutions for budget-welcoming Python Help.
Assignment4u try to supply the programming assignment help to college students who wrestle to accomplish projects linked to assembly programming. The students can have the whole assist of assignment4u and will seriously rely on this System.
For a starter, Should you be tossing involving Discovering C, C++, Java or another language, then I might recommend you Choose Python which can be these days The most applied languages in the complete environment and it is super easy to find out and maintain.
Condition your prerequisites straightaway while in the undertaking submission sort. We are going to explore the assignment prerequisites any time you upload the information.
In case you have fervour for Laptop programming and yearn to understand more details on exactly the same, HelpWithAssignment is Web Site undoubtedly the location to be. Listed here our assignment experts don't have confidence in the philosophy of just delivering methods for your computer science homework but concurrently they're going to try out to deliver expertise and directions, thereby guiding you to get a lot more inside the fields of Pc programming.
Then it’s very common that you'll be about to get many python homework in your class. And from time to time you do your homework by your self and often you trapped with some logic.
Programming has long been a reflection of as do the job that you simply do on your own. For somebody attempting to figure out how to code by themselves, you can find enough of on the web programs freely accessible presenting great resources. The languages & frameworks used in Laptop programming change commonly, however, and new kinds arrive out on a regular basis. It’s a fable that quite possibly the most outstanding programmers work on your own. Having programming homework assist could definitely make you a top-quality software program engineer at some point. StudentsAssignmentHelp presents that help with programming coursework.
We've got a staff of industry experts who know python, and also knowledge science they usually, are able to manage any volume of Superior python for info science assignment.
We cover each of the matters associated with fundamental and Innovative Python concepts and help the students with programming projects and College research projects. The assorted products and services that we provide incorporate
In the very first chapter we make an effort to include the "huge photograph" of programming so you have a "table of contents" of the remainder of the e book. Don't be concerned Otherwise every little thing will make best sense The 1st time you listen to it.
For anyone who is mulling your head more than coding homework which can be you not able to complete then we've been the proper human being for you personally.
The assignments can even be ready trying to keep in your mind each of the crucial rules. Our on line Python assignment help companies are supposed to provide help to learners in each probable way.
livewebtutors is the best System for many of the assignment help for students. Right here you could avail the optimum composing help beneath the assistance of renowned researchers and issue gurus...
College Homework Help has an entire pool of Python professionals and specialists that could offer Extraordinary top quality Python packages to provide purchasers a utmost ensure of satisfaction.
Matlab and Python forums are packed with threads comparing the languages and supporting The point that Python is better. It can be definitely merely a subjective impression and everyone decides for himself, but below we gathered some execs applying Python:
University Homework Help also ensures that all programming functions undergoes an intensive examining to guarantee that it really works successfully and efficiently in advance of sending the concluded method on the customer.
By setting up these projects, you’ll turn into more confident within your capacity to code and changeover from "programming seems like magic" to "oh, I'm able to do that."
We have been a workforce of pro programming industry experts who have already been mentoring and helping students in completing their python homework and assignments together with their Python projects. We promise substantial-good quality help and produce perfect plagiarism no cost assignment inside the allotted deadline.
Python is definitely an interpreted superior-amount programming language for typical-function programming. Developed by Guido van Rossum and 1st unveiled in 1991, Python incorporates a structure philosophy that emphasizes code readability, notably using sizeable whitespace.
Filip will be the passionate developer at the rear of a number of of DataCamp's interactive programs, masking each R and Python. Beneath the motto 'Take in your own Pet dog foodstuff', he has employed the procedures DataCamp teaches its college students to execute details Evaluation for DataCamp.
Assignment by Town assignment help adelaide assignment help brisbane assignment help gold Coastline assignment help in melbourne assignment help in wollongong assignment help perth assignment help sydney essay assignment help in queensland online assignment help in tasmania see here state Back All services
In addition, Python has quite a few beneficial in-built types to choose. Its thoroughly clean syntax and potent extension styles also are noteworthy. College Homework Help provides help with Python assignment for college students who wrestle with programming.
Safety vulnerabilities are also patched in these releases. The 3rd and closing part of the Model number is incremented.
In the event that, you will discover several end users who are likely to use the program with diverse person roles, then another team of code needs to be prepared for every consumer performance and where ever essential to their constrained interaction needs to be enabled.
Sit again and relax even though we help you with the Databases assignment. Our specialists have the ability of providing top excellent databases assignment alternatives on any database linked matter starting from MySQL, Oracle, and all other database connected subject areas.
You are able to ask for the programming assignment help on any subject of C, C++, .NET, and Python etc. If composing academic paper on programming appears to be hard to you and will make you nerve-racking, You'll be able to join with our staff of subject matter-oriented specialists who will be adept at furnishing creating assistance on each principle that you would possibly will need help on.
Just fall us a mail at firstname.lastname@example.org or fill up the assignment request type on the correct facet.
Programming Language refers to the computation language that is inscribed in the form of coding and decoding as a way to speak instructions to computer. It's also termed as machine language that is processed by translators and interpreters in an effort to execute a given undertaking in Laptop or computer.
Uncover what persons are saying about our on-line companies which Now we have offered to The scholars all over the globe.
Studying higher diploma and submit degrees while in the international universities can make a method out for The scholars to affix any office for aquiring a component-time occupation which even more helps in addressing the view it every day costs.
It is just a point that many of the students truly feel the urge of constant research while in the overseas colleges and universities. It is actually relevant in most of the societies as You will find there's norm of getting improved and extremely standardized education which happens to be only readily available while in the overseas lands.
Very low-stage programming language is considered rather challenging since it requires extensive understanding of equipment readable language.
Learners may get help with their programming homework on the internet from authorities. As Pc science industry experts, we provide on the web programming assignment help for college students so they do not have to bother with the how they might do their assignments and have superior grades.
There are numerous programming languages such as C, Java, C++, C#, Python SQL and Java script. We largely deliver assignment and homework help for C and C++.C was designed by Dennis Ritchie at AT & T Bell Labs while C++ was designed by Bjarne Stroustrup. C language is a fancy programming language and It is far from simple to jot down a code for it.
The sensation was so remarkable and this grew to become possible due to you guys. The tutoring class out of your website arrived out being so productive that now I'm able to confidently address even the hard dilemma in some seconds. Till now I have not discovered any other tuition institute that helps while in the quick progress of The scholars.
I always had some reservations about using aid with on line crafting. To my surprise, the standard of paper was satisfactory and I turned it the paper immediately after small variations. The quality took place to become on the upper aspect and my professor was pretty delighted with regards to the paper also.
Best value ensure : We deliver excellent get the job done at quite aggressive price, We know, we have been helping students so its priced low cost.
Algorithms are described as well as their working is summarized employing fundamental arithmetic. The algorithm behavior can be shown in excel spreadsheets, that exist Together with the guide.
Python is surely an interpreted substantial-level programming language for general-objective programming. Made by Guido van Rossum and very first released in 1991, Python includes a structure philosophy that emphasizes code readability, notably applying major whitespace.
The mission of the College of Michigan would be to provide the persons of Michigan and the earth as a result of preeminence in creating, communicating, preserving and implementing expertise, artwork, and tutorial values, and in acquiring leaders and citizens who will challenge the existing and enrich the long run....
Cost and advantage Investigation requires reaching at an optimum Option by comparing The prices and benefits of various choices if you want To optimize profitability. Our Economic specialists have even more explained Charge and gain Assessment by having an case in point. Suppose that a company (XYZ) sends certainly one of its member everyday to obtain the printout completed. After a period of time, they locate this job laborous and that's why, XYZ ideas to get a printer. Now, the members in XYZ will conduct cost and advantage Investigation. Here, they may calculate the associated fee for sending its member for the printout Which of shopping for a printer.
Bugfix releases, which introduce no new characteristics, happen about every 3 months and are made whenever a ample amount of bugs are mounted upstream since the previous launch.
If you have presently bought a bundle and want to exchange one of many guides from the bundle, then I’m quite sorry, I don’t assist guide exchanges or partial refunds.
Make second game titles that respond to keypresses and mouse clicks, Which mature more difficult as the sport progresses
Normally, I like to recommend focusing on the entire process of Doing the job by way of a predictive modeling difficulty conclude-to-close:
Cython can also be accessible, which translates a Python script into C and tends to make immediate C-amount API phone calls into the Python interpreter.
The reserve chapters are published as self-contained tutorials with a selected Finding out outcome. You are going to learn how to try and do a little something at the end of the tutorial.
Get an example of Strawberries output. A great deal of strawberries are developed for 6-eight months in the yr. Some favor strawberry jam, some like preserved juices of strawberry Whilst there are various preferring raw strawberry. But amid many just one product might be generated in in depth manner as a consequence of minimal availability of strawberry. So, how to make a decision that which products should be produced much more than one other? Therefore, the know-how could be obtained because of the review of Economics. Our online Economics tutors offer Economics assignment help elaborating the notion of scarcity with a few refreshing illustrations.
Ensure that you've uploaded a minimum of just one look at these guys launch for the project that's under the limit (a developmental release Edition variety is okay). Then, file a difficulty and explain to us:
Python employs whitespace indentation, rather than curly brackets or search phrases, to delimit blocks. An increase in indentation arrives following specific statements; a decrease in indentation signifies the tip of the current block.
5 to current. The project identify is explicitly prohibited because of the PyPI directors. Such as, pip set up specifications.txt is a typical typo for pip install -r requirements.txt, and should not shock the consumer which has a destructive package. The project name has actually been registered by another consumer, but no releases are actually established. How do I claim an deserted or previously registered project name?
This web site hosts the "classic" implementation of Python (nicknamed CPython). A number of alternative implementations are offered at the same time. Read through far more
All currency conversion is handled by PayPal for PayPal buys, or by Stripe plus your financial institution for bank card purchases.
What I understand is the fact that in feature range methods, the label data is commonly used for guiding the look for an excellent element subset, but in a single-class classification problems, all training details belong to only one class. For that purpose, I used to be looking for function selection implementations for one particular-class classification.
That may be exactly what I indicate. I think that the most beneficial options could be preg, pedi and age during the state of affairs below
Numerous superb code editors are available that offer functionalities like R syntax highlighting, vehicle code indenting and utilities to ship code/capabilities on the R console.
On this handbook all commands are offered in code boxes, the place the R code is printed in black, the comment textual content in blue as well as the output created by R in environmentally friendly. All opinions/explanations get started with the conventional remark sign '#' to circumvent them from currently being interpreted by R as commands.
This concern is ambiguous, vague, incomplete, extremely wide, or rhetorical and can't be reasonably answered in its recent kind. For help clarifying this question to ensure that it could be reopened, stop by the help Middle. If this question is often reworded to suit The principles during the help center, remember to edit the query.
I had been wanting to know if I could Establish/coach Yet another model (say SVM with RBF kernel) using the options from SVM-RFE (wherein the kernel utilised is usually a linear kernel).
Recipes uses the Pima Indians onset of diabetes dataset to show the function range approach (update: down load from in this article). This is the binary classification problem the place all the characteristics are numeric.
All code on my website As well as in my publications was created and delivered for academic functions only. I take no accountability for your code, what it'd do, or how you could possibly use it.
-Tough to select which provides greater benefits, actually when the ultimate product is made with another device Studying tool.
There are a lot of belongings you could find out about LSTMs, from concept to applications to Keras API. My intention is always to consider you straight to finding effects with LSTMs in Keras with 14 laser-centered classes.
Coupon code will likely be despatched to this electronic mail tackle By joining our mailing list you agree to our Terms and Conditions No many thanks, I'll just shell out look at here now whole rate. You are in! Verify your inbox for the ten% coupon Start out browsing
The copy assignment operator differs with the duplicate constructor in that it must thoroughly clean up the information customers of your assignment's target (and properly take care of self-assignment) While the copy constructor assigns values to uninitialized data users. One example is:
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825098.68/warc/CC-MAIN-20181213193633-20181213215133-00268.warc.gz
|
CC-MAIN-2018-51
| 17,912
| 70
|
https://dustinpfister.github.io/2020/06/18/js-function-pure/
|
code
|
With the instances of constructor functions there are prototype methods like that of the array splice method for example that will mutate an array in place, and then there are other methods in the array prototype such as slice that will not mutate the source array, but instead return a new array without mutating the source array off of while array slice was called. However even with array slice it can still end up giving different results depending on the state of the array that is is called off of, so although it is pure like it is not the case.
So a pure function is a function where the return value is always the same for the same given arguments, and also there are no side effects when calling the pure function. So When calling the function no global variables or state object is mutated. Only a new return value is returned and then it is a question as to what is done with that return value.
So say I have two distance formula methods one of which makes use of some global variables, and one that just works with what is passed via arguments.
In this section I will be going over a simple Box constructor function that has a single distance prototype method, and a pure function style alternative that does the same thing without the use of a constructor.
So lets say I have a Box Class that looks like this.
So in place of using a constructor function to create a Box Class instance why not just have a pure function that will always return the same box object for the same arguments, and in addition it returns just a plain old object? I can then use the plain old object that has box properties with a stand alone distance formula that is also very much pure function like.
As of late I find myself ditching the use of constructors in favor of writing modules like this.
So pure functions are generally a better way of going about doing things I would say over all. I do not think that I would care to always try to make everything in a project fully functional by trying to make everything a pure function though. To at least some extent it might not always be possible to make all functions a pure function in a project anyway, but still I think they help to keep things a little more sane.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401578485.67/warc/CC-MAIN-20200927183616-20200927213616-00486.warc.gz
|
CC-MAIN-2020-40
| 2,210
| 8
|
http://www.rcgroups.com/forums/showpost.php?p=22955017&postcount=36
|
code
|
Originally Posted by Francesco
Beware, this is only true if the CG and the towhook positions are actually quite close to each other. Can lead to disaster if towhook is well aft of the CG.
Using the method described, I end up hook very slightly forward from CG (to keep things easy I set CG it slightly stable from neutral stability).
There are no magic bullets or secret information. Launch setup is mainly work work work - and secondly about understanding the launch dynamics.
The problem with setups given by manufacturers etc. is that you never now the thinking behind them. Often they are over-safe, but sometimes quite hot. And there are also other factors like launch style and tension that may affect the way how one wants to set up his plane.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645167576.40/warc/CC-MAIN-20150827031247-00055-ip-10-171-96-226.ec2.internal.warc.gz
|
CC-MAIN-2015-35
| 750
| 5
|
https://developer.mozilla.org/en-US/docs/Web/API/PointerEvent
|
code
|
PointerEvent interface represents the state of a DOM event produced by a pointer such as the geometry of the contact point, the device type that generated the event, the amount of pressure that was applied on the contact surface, etc.
A pointer is a hardware agnostic representation of input devices (such as a mouse, pen or contact point on a touch-enable surface). The pointer can target a specific coordinate (or set of coordinates) on the contact surface such as a screen.
A pointer's hit test is the process a browser uses to determine the target element for a pointer event. Typically, this is determined by considering the pointer's location and also the visual layout of elements in a document on screen media.
Creates a synthetic—and untrusted—
PointerEvent.altitudeAngleRead only Experimental
Represents the angle between a transducer (a pointer or stylus) axis and the X-Y plane of a device screen.
PointerEvent.azimuthAngleRead only Experimental
Represents the angle between the Y-Z plane and the plane containing both the transducer (a pointer or stylus) axis and the Y axis.
A unique identifier for the pointer causing the event.
The width (magnitude on the X axis), in CSS pixels, of the contact geometry of the pointer.
The height (magnitude on the Y axis), in CSS pixels, of the contact geometry of the pointer.
The normalized pressure of the pointer input in the range
1represent the minimum and maximum pressure the hardware is capable of detecting, respectively.
The normalized tangential pressure of the pointer input (also known as barrel pressure or cylinder stress) in the range
0is the neutral position of the control.
The plane angle (in degrees, in the range of
90) between the Y–Z plane and the plane containing both the pointer (e.g. pen stylus) axis and the Y axis.
The plane angle (in degrees, in the range of
90) between the X–Z plane and the plane containing both the pointer (e.g. pen stylus) axis and the X axis.
The clockwise rotation of the pointer (e.g. pen stylus) around its major axis in degrees, with a value in the range
Indicates the device type that caused the event (mouse, pen, touch, etc.).
Indicates if the pointer represents the primary pointer of this pointer type.
Returns a sequence of all
PointerEventinstances that were coalesced into the dispatched
Returns a sequence of
PointerEventinstances that the browser predicts will follow the dispatched
pointermoveevent's coalesced events.
PointerEvent interface has several event types. To determine which event fired, look at the event's
Note: It's important to note that in many cases, both pointer and mouse events get sent (in order to let non-pointer-specific code still interact with the user). If you use pointer events, you should call
preventDefault() to keep the mouse event from being sent as well.
This event is fired when a pointing device is moved into an element's hit test boundaries.
This event is fired when a pointing device is moved into the hit test boundaries of an element or one of its descendants, including as a result of a
pointerdownevent from a device that does not support hover (see
pointerdown). This event type is similar to
pointerover, but differs in that it does not bubble.
The event is fired when a pointer becomes active. For mouse, it is fired when the device transitions from no buttons pressed to at least one button pressed. For touch, it is fired when physical contact is made with the digitizer. For pen, it is fired when the stylus makes physical contact with the digitizer.
Note: For touchscreen browsers that allow direct manipulation, a
pointerdownevent triggers implicit pointer capture, which causes the target to capture all subsequent pointer events as if they were occurring over the capturing target. Accordingly,
pointeroutwill not fire as long as this capture is set. The capture can be released manually by calling
element.releasePointerCaptureon the target element, or it will be implicitly released after a
This event is fired when a pointer changes coordinates.
This event is fired when any of a pointer's properties change.
This event is fired when a pointer is no longer active.
A browser fires this event if it concludes the pointer will no longer be able to generate events (for example the related device is deactivated).
This event is fired for several reasons including: pointing device is moved out of the hit test boundaries of an element; firing the
pointerupevent for a device that does not support hover (see
pointerup); after firing the
pointercancel); when a pen stylus leaves the hover range detectable by the digitizer.
This event is fired when a pointing device is moved out of the hit test boundaries of an element. For pen devices, this event is fired when the stylus leaves the hover range detectable by the digitizer.
This event is fired when an element receives pointer capture.
This event is fired after pointer capture is released for a pointer.
Examples of each property, event type, and global event handler are included in their respective reference pages.
BCD tables only load in the browser
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474641.34/warc/CC-MAIN-20240225171204-20240225201204-00767.warc.gz
|
CC-MAIN-2024-10
| 5,088
| 53
|
http://thedoors.com/forums/index.php?showtopic=15641&st=420
|
code
|
Doors Box Set alternate tracks/outtakes
Posted 28 August 2006 - 01:44 PM
It just seems that the more unreleased material is released, the more Doors fans here grumble and complain about what was not released......
I am thrillled about this plethora of matrial that will be on the box set-sure I wish there were more, but I think the Doors have treated us to some fantastic material the past few years.......
It just seems to me that if fans here just complain, it will send the impression to the doors that nothing will satisfy the fans, and they'll wonder whythey should even bother, and the doors of the vault will shut...
just my 2 cents worth,
Posted 25 September 2012 - 03:30 AM
"8 track outtakes of Who Do You Love, Smokey the Bear, Build Me A Woman and Shamans Blues do not exist. Unfortunately the tapes were destroyed or in someone's private library.
So does this mean you may have 2-track copies? Another excellent possibility for an outtakes set....(Sorry that this is a quote from pretty far back but I was seeing if there was any older info about other remaining outtakes). It seems like there may be many(?) outtakes in the Doors possession that are simply not in 8-track form. I'm sure none of us would object (or at least most of us) to a release of these tracks sourced from something other than the 8-track, as a backup copy has to be miles above the bootleg quality most of us are used to. Thanks!
Edited by avp2027, 25 September 2012 - 05:18 AM.
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163038307/warc/CC-MAIN-20131204131718-00053-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 1,537
| 12
|
https://unix.stackexchange.com/questions/1189/multiple-usb-wireless-devices
|
code
|
I have a broadcom wireless card in my laptop and as far as I know, it acts as an USB device. I also have one USB stick wireless device (TL-WN422G - uses ath9k_htc driver) which I want to use at the same time as the first (Broadcom) device.
The problem is, after I load ath9k_htc - iwconfig does not show the new USB device (the TL-WN422G - wlan1 / ath0 / whatever), but only the old one (wlan0 - Broadcom, checked by MAC).
I tried this USB device (TL-WN422G) on my other computer that has PCI wireless card in it, and they both worked just fine together after I pluged it in... I get wlan0 (Ralink) and wlan1 (TL-WN422G). Is it some kind of a problem for the laptop that both devices are recognized as USB? How do I make wlan1 appear on my laptop?
also, my system is fully up to date 2.6.35 kernel (Arch)
edit: I've already downloaded the needed ar9271.fw from linuxwireless.org and I put it into /lib/firmware - something wrong in that?
dmesg gives me this on laptop:
usb 1-5: new high speed USB device using ehci_hcd and address 9 usb 1-5: ath9k_htc: Firmware - ar9271.fw not found ath9k_hif_usb: probe of 1-5:1.0 failed with error -22
and this on the computer that does work:
usb 1-5: new high speed USB device using ehci_hcd and address 4 usb 1-5: ath9k_htc: Transferred FW: ar9271.fw, size: 51280 ath: EEPROM regdomain: 0x809c ath: EEPROM indicates we should expect a country code ath: doing EEPROM country->regdmn map search ath: country maps to regdmn code: 0x52 ath: Country alpha2 being used: CN ath: Regpair used: 0x52 cfg80211: Calling CRDA for country: CN Registered led device: ath9k-phy1::radio Registered led device: ath9k-phy1::assoc Registered led device: ath9k-phy1::tx Registered led device: ath9k-phy1::rx usb 1-5: ath9k_htc: USB layer initialized usbcore: registered new interface driver ath9k_hif_usb
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525524.12/warc/CC-MAIN-20190718063305-20190718085305-00383.warc.gz
|
CC-MAIN-2019-30
| 1,822
| 9
|
https://www.cmub.fr/2018/09/05/purchase-dapoxetine-tablets/
|
code
|
Overall, udenafil and dapoxetine were well tolerated when administered alone or concomitantly.
Information about Dapoxetine.
Dapoxetine is a safe and effective treatment for premature ejaculationPEbut it has a high discontinuation rateaccording to new research.
Choosing to participate in a study is an important personal decisionTalk with your doctor and family members or friends about deciding to join a studyTo learn more about this studyyou or your doctor may contact the study research staff using the contacts provided belowFor general informationLearn About Clinical Studies.
A quarter of the men stopped taking dapoxetine because they were disappointed that PE was incurable and that dapoxetine had to be taken before sex.
This communication will focus on the prevalenceetiologypathophysiologyand the current treatment options for PEMore specificallya novel selective serotonin reuptake inhibitorSSRIdapoxetinewill be evaluated for its pharmacokineticsefficacyand safety record in light of available preclinical and clinical data.
Buy dapoxetine hcl, cheap dapoxetine online
Dapoxetine price in mercury drug branches, Get dapoxetine, Buy dapoxetine cheap, Dapoxetine online purchase ukrainian, Dapoxetine buy australian, Cheap dapoxetine, Dapoxetine price in bangladesh, Dapoxetine price in mercury drug contact, Buy cialis with dapoxetine online pharmacy, Buy dapoxetine in us, Buy priligy dapoxetine online, Dapoxetine buy, How much dapoxetine.
Purchase dapoxetine 90mg, where to buy dapoxetine
How much dapoxetine to take, Buy dapoxetine with paypal, Dapoxetine price philippines xperia, Dapoxetine cost in india, Cialis or super viagra dapoxetine, Generic levitra super force (vardenafil + dapoxetine), Viagra dapoxetine, Dapoxetine tablet cost, Tadalafil and dapoxetine tablets, Dapoxetine duralast online purchase mumbai international airport, Cialis dapoxetine overnight shipping, Dapoxetine with tadalafil brand name, Dapoxetine online purchase in india, Dapoxetine price philippines gold, Dapoxetine and cialis reviews, Buy viagra dapoxetine online.
Purchase dapoxetine reviews, viagra dapoxetine
Dapoxetine price in nigeria celebrity, Best website to buy levitra with dapoxetine, Dapoxetine buy uk lottery, Order priligy dapoxetine, Dapoxetine cost australia, Dapoxetine price philippines infant, Tadalafil with dapoxetine online pharmacy, Dapoxetine generic cheap drugs, Dapoxetine generic cheap cialis, Purchase dapoxetine hydrochloride, Dapoxetine hcl for sale, Buy dapoxetine online, Generic levitra dapoxetine, Dapoxetine buy online uk, Dapoxetine price in mercury drug contact, Is dapoxetine available over the counter, Dapoxetine price in nigeria this python, order Flomax Viagra dapoxetine online purchase in india, Dapoxetine price in nigeria this python, Dapoxetine online purchase uk postage, Order canada super viagra dapoxetine, Priligy dapoxetine reviews, Dapoxetine order of operation, Dapoxetine 30 mg online purchase.
Viagra dapoxetine online purchase in india, sildenafil citrate 100mg dapoxetine 60mg
Sildenafil dapoxetine, Dapoxetine cost in india, Dapoxetine price in bangladesh huawei, Dapoxetine for sale in usa, Dapoxetine rxlist, Super viagra plus dapoxetine, Dapoxetine hydrochloride buy, How to get dapoxetine, Dapoxetine for sale uk, Dapoxetine online purchase uk visa, Viagra dapoxetine online purchase in india, Viagra dapoxetine, Dapoxetine generic cheap ink, Viagra with dapoxetine buy uk, Buy cheap dapoxetine uk, Sildenafil dapoxetine india, Dapoxetine cheapest auto, Sildenafil dapoxetine tablets, Safe place to buy levitra with dapoxetine, Cialis dapoxetine overnight shipping, Dapoxetine online purchase uk pounds, Dapoxetine price in mercury drug branches, Can you get dapoxetine in usa, Dapoxetine purchase.
Cheap dapoxetine, Dapoxetine acquire definition, Q buy levitra with dapoxetine, Can you get dapoxetine in usa, Dapoxetine price in nigeria africa, Dapoxetine over the counter uk, Dapoxetine generic cheap cialis, Best website to buy levitra with dapoxetine, Viagra with dapoxetine canada, Dapoxetine order of the eastern, Super p force viagra with dapoxetine reviews, Purchase dapoxetine hcl, Dapoxetine cost australia, Dapoxetine price in delhi, Dapoxetine over the counter, Dapoxetine delivery, Buy generic viagra dapoxetine online, Dapoxetine buy uk stamps, Can i take dapoxetine with cialis, Dapoxetine acquire definition, Buy dapoxetine cheap.
Buy Dapoxetine online
Order Dapoxetine online
Dapoxetine without prescription
of quality low cost, walmart dapoxetine tadalis online will be used to, asset lets see stached.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710417.25/warc/CC-MAIN-20221127173917-20221127203917-00777.warc.gz
|
CC-MAIN-2022-49
| 4,587
| 19
|
https://www.fr.freelancer.com/work/travel-destination-content/
|
code
|
Using python, I need to scrape 3 websites for best flights and write results to csv. The time taken for search sh...website must get top 3 results for those with two best flight(meaning non-stop and low fare), one with good airline. I dont have API and IATA codes. User inputs: origin, destination, start date, end date, class(Economy, business, first)
...password. The function must takes as parameters: the name of the zip file, the destination directory, the encryption password (in plain text). The files must be extracted adding base folder and the relative path of any single file. You don't have to recreate destination folders structure (they already exist). Sample: file "[se connecter pour voir l'URL]" cont...
so please read my proposal care fully and after bid my proposal because i have required experience developer required for my app development if are you agree than contact me
need a website of 6 - 8 pages with destination information for marketing a region.
...rail, bus etc API's,XML feeds, G.D.S. *online and offline payment gateways in all major world currencies; *Real time translation of content into all major world languages; *airfares alert; * Forum for exchange of destination information and ideas; *Blog; * Google Analytics * Online bids for adverts; * Flight Awards API integration; * Site to have unlimited
We need someone to write blogs for us. Need to be US based. Please provide work samples that you have related to travel.
Excel macro to establish N number of TCP connections simultaneously using different destination ip address
...2 - Register 3 - Forgot Password 4 - I'm not sure about all the home functionalities required so APIs depend upon the finalization 5 - Fetch locations for departure and destination 6 - Fetch Vehicle types 7 - Find and fetch available buses 8 - Provide seat map details of the selected bus 9 - Fetch pickup and dropoff points 10 - Book seats 11 - Payment
One page unique content for testing purpose. If everything goes alright then many such pages are required. Description of the Page :: It is related to travel info for destination Kolkata, India on below points: 1> General info of the place -120- 150 words 2> Short history of the place-120-150 words 3> Nearby places as mentioned in sample file - only
Travel Buddhi ([se connecter pour voir l'URL]) is currently building a team of excellent writers who would work on the international destinations for Travel Buddhi. We are looking for people who are passionate about travel and writing - will be a long term engagement.
...can implement following three algorithms in OMNET++ and Veins: -Modified Distributed Mobility-Aware Clustering (MDMAC) -Adaptive Mobility-Aware Clustering Algorithm with Destination (AMACAD) -Robust Mobility Adaptive Clustering (RMAC) If you are interested, please go through the attached description file and drop me a message in case you want to discuss
Brand new, unique food destination complete with artisan micro kitchens including butchers, fishmonger, chocolatier, chilli farmer, florist, wine merchant, baker, deli and wholefood restaurant. Artisans will produce onsite and showcase their products to customers. Educating customers on the provence of their food, the health benefits, eating fresh seasonal
...inventory of online travel agency & affiliate API,s, XML feeds,G.D.S .of flight, hotel,car rental, cruises, activities * Search in all world major languages; *Real time translation of content into all major languages; *Pre- integrated credit/debit cards,PayPal, Bank Transfer payment gateways; *Forum for exchange of destination information and ideas;
You will be paid $150 USD for this project. "We are a large tech company working on innovations in the travel industry. We’re considering some new services and features aimed at travel agencies. We’d like to talk with you about your priorities and challenges as a marketing professional." I require someone who fits this description to complete a 60
...packet determines the max number of router hops. If the request does not reach the host, the sender is noted back with one of the following errors. TTL Expired in Transit Destination Host Unreachable Request Timed Out i.e. no reply Unknown Host It shows results like this: xxxx% ping [se connecter pour voir l'URL] PING [se connecter pour voir l'URL] ([se connecter pour voir l&...
Hi all, I am working on an ETL project from an oracle database source to MS. SQL database destination. I am a junior developer and need help from developers who has worked on similar projects. I am also making interviews for Junior SQL/ SSIS ETL Developer positions on the side. After the interview, I will have questions I didn’t answer
... We are a newly established travel website locating highly discount travel fares (flights, accommodating) and we are looking to hire travel content writers who will locate error fares, travel discounts, highly discounted prices. The successful candidates will be undertaking lots of different types of creative content, including locating the discount
I need an android app in which users can get direction from current location to destination, Current speed, time required to reach the destination. After completing running they can save the path or track for later. Ability to share the track.
...marketplace is where the data scraped destination marketplace is where the data uploaded there is one source marketplace listed on my script,it's [se connecter pour voir l'URL] : [se connecter pour voir l'URL] and there is several destination marketplace listed on my script : [se connecter pour voir l'URL] i want you to add [se connecter pour voir l'U...
...attractions. No photography or technical experience is needed. We provide the equipment and we work with the client to schedule locations - you simply show up, capture, and submit content to our system. We take care of all editing and distribution. We've developed the proprietary technology that makes this process simple, fast, and easy. As a Threshold 360
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247484689.3/warc/CC-MAIN-20190218053920-20190218075920-00456.warc.gz
|
CC-MAIN-2019-09
| 6,018
| 20
|
https://github.com/pfleidi/yaxim/issues/123
|
code
|
I recently got a smartwatch, and one of its features is to forward all notifications from my phone to the watch. That's great, except that Yaxim updates the notification whenever it disconnects and reconnects, which is... all the time where I am. Turning off the tray icon isn't really a good option either, as then Yaxim falls prey to the OOM killer far more often than I'd like.
I propose an option to have a static notification in the tray, maybe something that just says "running" - enough to keep Yaxim alive most of the time, but not enough to bombard my wrist with notifications. It's a bit of a hack-ish workaround, I'll admit, but barring native support for the smartwatch's API (which I really can't expect you to do) it's the only way I can think of to fix this.
I have been asked already about exactly this kind of support for smart watches. Is there a common API or intent annotation I can use without much overhead?
In slightly related news, I have re-worked the notification to provide more useful information (APK). Feel free to test and continue to blame me about the sheer amount of notifications. I will not add an option for what you wish, but I might change the notification to completely remove the "ticker text" which scrolls by. I hope this would be filtered away by your smart smartwatch.
Sadly there is not a common API to my knowledge, but I'll look into it. Smartwatches unfortunately are very different - the only common feature between most of them is notification forwarding.
I can definitely understand that you wouldn't want to add such an ugly hack to your application, and thanks for the response anyway. The new build's notifications are much more useful. In addition, after a bit of further testing, it appears that my watch in particular only displays notifications with ticker text. I hadn't thought about it since most notifications do have ticker text, but then there are some (Google Now, other passive notifications) that don't. So consider me in favor of that change.
And of course, just as I say there's no common API, Google announces their own official one: Android Wear. Of course it looks like it's another closed platform like Google Glass, and it won't work with any existing smartwatches, but... possibly worth looking into? (Some info about voice replies here.)
That probably deserves a separate request though as it's getting pretty far out of the scope of this one. And since you've made it clear that you won't be implementing this one, and since it was somewhat misguided in the first place as I hadn't done enough testing to know what I really wanted... I'll go ahead and close this. Less clutter in the bug tracker. :)
Issue is fixed in yaxim 0.8.7b. Download APK.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00237-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 2,723
| 9
|
https://www.gsp.com/cgi-bin/man.cgi?section=3&topic=VM::EC2::REST::windows
|
code
|
use VM::EC2 ':misc';
These methods control several Windows platform-related functions. However, only
GetPasswordData is implemented by VM::EC2 (volunteers welcome).
For Windows instances, get the administrator's password as a
Lincoln Stein <firstname.lastname@example.org>.
Copyright (c) 2011 Ontario Institute for Cancer Research
This package and its accompanying libraries is free software; you can
redistribute it and/or modify it under the terms of the GPL (either version 1,
or at your option, any later version) or the Artistic License 2.0. Refer to
LICENSE for the full license text. In addition, please see DISCLAIMER.txt for
disclaimers of warranty.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703517159.7/warc/CC-MAIN-20210118220236-20210119010236-00488.warc.gz
|
CC-MAIN-2021-04
| 658
| 11
|
https://in.indeed.com/cmp/Rockwell-Automation/faq/working-environment
|
code
|
There is no time to work even after the working hours you have to work in the office for most of the days in the month, work and life balance is very poor in the job.No extra benefits are given in if you work on a non-working day.Only if you are a GEC employee then only you are considered for the benefits of working on a non-working day., there is no personal life if you work here.Answered March 24, 2019
Questions and Answers about Rockwell Automation Working Environment
Ask a question
Your question will be posted publicly. Please don't submit any personal information.
The best questions are directly relevant to Rockwell Automation.
- What is the work environment and culture like?
- How are the working hours?
- What are some tips for doing well in the interview?
1 matching question
Please note that all of this content is user-generated and its accuracy is not guaranteed by Indeed or this company.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141196324.38/warc/CC-MAIN-20201129034021-20201129064021-00041.warc.gz
|
CC-MAIN-2020-50
| 909
| 10
|
https://storagemedia.com/product/recertified-ibm-lto-2-ultrium-lto2-200-400-gb-tape-media-08l9870/
|
code
|
By combining high storage capacity (100 GB native, 200 GB with 2:1 compression), performance, and reliability, IBM LTO Ultrium Data Cartridges continue the IBM commitment to enhancing tape technology.
- Ultra-high-capacity storage and long archival life.
- Capacity: 200 GB (native) / 400GB (compressed)
- Transfer Speed: 40MB/sec (native) / 80MB/sec (Max. compressed)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500140.36/warc/CC-MAIN-20230204142302-20230204172302-00164.warc.gz
|
CC-MAIN-2023-06
| 368
| 4
|
https://www.npmjs.com/package/wdio-mediawiki
|
code
|
A plugin for WebdriverIO providing utilities to simplify testing of MediaWiki features.
Page class is a base class for following the Page Objects Pattern.
openTitle( title [, Object query [, string fragment ] ] )
The convention is for implementations to extend this class and provide an
super.openTitle(), as well as add various getters for elements on the page.
See BlankPage and specs/BlankPage for an example.
Utilities to interact with the MediaWiki API. Uses the mwbot library.
Actions are performed logged-in using
which typically come from
MEDIAWIKI_PASSWORD environment variables.
bot([string username [, string password [, string baseUrl ] ] ])
createAccount(MWBot bot, string username, string password)
blockUser(MWBot bot, [ string username [, string expiry ] ])
unblockUser(MWBot bot, [ string username ])
bot = await Api.bot(); await bot.edit( 'Some page', 'Some initial content' ); await bot.edit( 'Some page', 'Some other content', 'Optional edit reason here' ); await bot.delete( 'Some page', 'Some deletion reason here' );
Use the static
RunJobs.run() method to ensure that any queued jobs are executed before
making assertions that depend on its outcome.
Util is a collection of popular utility methods.
getTestString([ string prefix ])
waitForModuleState(string moduleName [, string moduleStatus [, number timeout ] ])
This package follows Semantic Versioning guidelines for its releases. In particular, its major version must be bumped when compatibility is removed for a previous of MediaWiki.
It is the expectation that this module will only support a single version of MediaWiki at any given time, and that tests in older branches of MediaWiki-related projects naturally use the older release line of this package.
In order to allow for smooth and decentralised upgrades, it is recommended that the only type of breaking change made to this package is a change that removes something. Thus, in order to change something, it must either be backwards-compatible, or must be introduced as a new method that co-exists with its deprecated equivalent for at least one release.
Please report issues to Phabricator.
This module is maintained in the MediaWiki core repository and published from there as a package to npmjs.org. To simplify development and to ensure changes are verified automatically, MediaWiki core itself uses this module directly from the working copy using npm Local Paths.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948900.50/warc/CC-MAIN-20230328232645-20230329022645-00658.warc.gz
|
CC-MAIN-2023-14
| 2,408
| 26
|
https://www.cryptoglue.com/2015/07/06/french-bank-seeks-bitcoin-expert/
|
code
|
Are you looking for a job in crypto-currencies? Interested in banking and finance? Ever considered living in London, UK?
Well maybe Société Générale can help. Check out this job listing posted on the 2nd July 2015 on their careers website. The bank is specifically looking for a “IT Developer on Bitcoin, Blockchains & Crypto-Currencies”.
You will be expected to do the following:
- Programming in C#/C++/Python/Other against bitcoin, altCoin, blockChain different altchain APIs.
- Developping Proof-Of-Concept in any language/protocols used in crypto-currency protocols & block chains 1.0-3.0
- Running statistics against blockchains and engineering ways to gather quantitative information on what’s really happenning in the crypto-currency world.
- Writing-up reports.
- Make presentations or assist in preparing presentations.
- Assist in organizing seminars, workshops, trainings.
- Engaging with the fintech community and gathering information on the crypto-currency sector in London & elsewhere
Unfortunately you have to be under 28, as this is a fixed term contract of 12 months aimed at recent graduates through the Volunteering for International Experience (VIE) program. This is a paid internship program run across Europe for French companies.
Are you looking to hire anyone in the crypto space? Let us CryptoGlue know. Send us an email at [email protected]
Photo By Mohamed Yahya (originally posted to Flickr as Société Générale) [CC BY-SA 2.0 (http://creativecommons.org/licenses/by-sa/2.0)], via Wikimedia Commons
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100724.48/warc/CC-MAIN-20231208045320-20231208075320-00263.warc.gz
|
CC-MAIN-2023-50
| 1,541
| 13
|
https://www.dal.ca/sites/daedalus.html
|
code
|
Daedalus is a curriculum mapping software accessible via any web browser. It requires the collection of a minimal set of information, but does its best to make this information work for you as much as possible.
Usually, each course, lab, or tutorial is broken down into 10-20 key student learning outcomes. A learning outcome is a task that will be evaluated using Daedalus. Learning outcomes are tagged by categories for easy filtering and can be connected to each other to build a pedagogical progression through a program.
All of this information is stored into a database. It is up to you to determine who can see and edit content. Most importantly, students and instructors get to find out how each course fits into the big picture.
Available for all programs
All programs on campus are welcome to use Daedalus. Get in touch with us first to determine whether this is the right tool to acheive your goals. A map is a website, availble on the majority of web browsers. There are no installations nor technical maintenance required.
Partners from outside of Dalhousie are also welcome. Please get in touch with us to see how we have collaborated with people across Canada.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578532050.7/warc/CC-MAIN-20190421180010-20190421202010-00102.warc.gz
|
CC-MAIN-2019-18
| 1,175
| 6
|
https://fwdays.com/event/highload-fwdays-2018/review/measuring-performance-variabillity-of-ec2
|
code
|
Measuring performance variability of EC2
Working in the MongoDB Server Performance Testing team, we use Amazon EC2 for system level testing. This allows us to flexibly deploy and tear down MongoDB clusters of various topologies, day after day. On the other hand, using a public cloud for performance testing can be challenging for repeatability of test results - to put it mildly. We, therefore, ended up spending several months just benchmarking EC2 itself. We compared combinations of different instance types and disks (ephemeral SSD vs PIOPS EBS). In the end, we found that the largest impact in reducing variability came from the same configuration options that we use on physical HW as well: turning off hyperthreading, using numactl and turning off CPU power saving states. Thus, you could argue that blaming "the cloud" for our performance trouble was wrong. It's possible to get similar performance characteristics from EC2 as physical hardware when used correctly, and when used incorrectly, both physical and cloud hardware will perform poorly.
With the new configuration, we've been able to greatly lower variability of our daily performance tests, and increase trust in the test results. For WiredTiger tests, even the worst case is less than 10% min-max range, and MMAPv1 is close to that. We consider this to be below the threshold of performance change that most end users are able to observe anyway, hence it is sufficient for our performance testing purposes.
The results also emphasized a golden rule of performance engineering: measure everything, assume nothing. It turned out the configuration, that was originally used for our performance testing, actually had the worst variability of all configurations we tested!
- Has worked 5,5 years at MongoDB. Initially, as a Solutions Architect working with European customers, he's now in R&D on the performance team.
- Prior to MongoDB he was active - and an activist - in the MySQL space, and employed by MySQL (MySQL NDB Cluster team), MariaDB and Galera Cluster.
- The author of the book "Open Life: The Philosophy of Open Source".
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100527.35/warc/CC-MAIN-20231204083733-20231204113733-00526.warc.gz
|
CC-MAIN-2023-50
| 2,101
| 7
|
https://forums.unrealengine.com/t/character-jumps-higher-at-144-fps-than-at-60-fps-2d-side-scroller/142676
|
code
|
Hi there! I am a beginner developer using UE4 4.24.3 version. My 2d side scroller character behaves very weird ( I think it has something to do with frame independence). As fps improve my character jumps higher and higher. This would be an unfair advantage for those playing at 144fps. I’ve tried tweaking some sliders and boxes in the character blueprint but with no success. Same thing happens to my physics. When I play the game at 144 fps every physics actor is ‘heavier’ but when I cap it at 60 fps everything starts jumping around with the slightest touch. Is there anything I can do about it? Or perhaps I should cap the game at 60 fps?
Edit: I forgot to mention that my 2d side scroller character has jump max hold time enabled at 0.2 s
From what you’ve said, I’m assuming you’re moving your character using something on tick?
If you’re adding constant values to the location ( or rotation ) of your character like that, the speed of the movement will vary depending on frame rate ( ie hardware ).
If you want a constant movement speed independent of hardware, you need to multply your changes in location/rotation by ‘get world delta seconds’. Also once you factor that in, you will need to multiply by some constant to get the speed correct again, you just pick this number by eye.
Basically ‘get world delta seconds’ is the amount of time it took to render the last frame. It’s the delta that comes out of the EventTick event, that’s why it’s there, because it will be commonly used here.
You can sit and meditate deeply on it, as the frame takes longer to draw, because you’re multplying by delta, you character will move further, so people with slower hardware get the advantage they need. The same is true, in reverse, for faster frame rates.
No, the game is gonna be a singleplayer story mode 2d side scroller. It’s more like a piece of art than a game I would say ( the soundtrack is also composed and played by me), like a story. However, if you would play it at 60 fps you couldn’t really jump on all the platforms and places a 144 fps player could. That’s the main issue!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100489.16/warc/CC-MAIN-20231203062445-20231203092445-00013.warc.gz
|
CC-MAIN-2023-50
| 2,126
| 8
|
https://macissues.com/2014/06/02/copy-and-manage-search-results-directly-from-the-spotlight-menu/
|
code
|
If you need to find a document, program, or other file on your hard drive, then you can do so quickly by opening the Spotlight menu located at the far right of your menu bar and typing keywords to perform a search. In addition, Spotlight supports several other services like calculator functions, where you can type “5 + 6,” for instance, and get 11 as the result.
When you click any of the search results that are presented in this menu, OS X will attempt to open them in a program that is set to handle them (ie, Calculator will open if you press Return after entering a calculation, and Preview or Adobe Reader will open if you press Return on a PDF file); however, you can also use other means to access the results of your search.
Drag and Drop
After performing a Spotlight search, you can drag any resulting file from the Spotlight menu to a window of another application (or onto the application’s icon in the Dock or Finder), to have a reference to this file be used by that application. In this manner, you can copy a file from Spotlight to an open folder in the Finder simply by dragging it from the menu to this location. You can also hold Option and Command while doing this to create an alias of the dragged file in the location you drop it.
In addition to managing files and folders in the Finder, you can drag items to open documents to embed them or otherwise handle them in ways that program is built. Otherwise, you can drag the file or folder to the system’s Open and Save dialogue boxes, which will point the box at the location of the file (and in the case of Save dialogue boxes, have the saved file name be set to the name of the dragged file.
If you are a Terminal user, the you can also quickly reference files in this way, by dragging them from the Spotlight menu to the Terminal window, where a full path to the file will be input at the point of the cursor.
Copy and Paste
In addition to drag and drop, you can use the system’s Copy command, and then paste the results at a location of your choosing. The ability to copy a selection in the Finder and then paste it elsewhere can be convenient, since you do not need to keep the source and destination windows open at the same time, and you can do so likewise with the Spotlight menu. Simply perform a search in Spotlight, and then navigate the Spotlight menu (ie, press the down arrow key) until your desired item is highlighted, and press Command-C to copy.
This action will copy a reference to the file or folder, which you can then paste in various ways to make use of it. These can include the following:
- Copy an image and then press Command-N in Preview to create a new image from the clipboard data.
- Paste the copied file to a new location in the Finder (which can also be revealed through Spotlight).
- Paste the item in the Terminal to input a full path to it at the point of the cursor.
- Embed the copied document as an attachment in an E-Mail or in another document type (Word, Pages, TextEdit, etc.).
This slight augmentation can make Spotlight searches far more useful, especially for those who prefer the speed or primarily using the keyboard for entering data and managing their Macs. For instance, if you wish to move a file from your Desktop to your Documents folder, you do not have to use your mouse even once, and instead can perform the following steps:
- Command-Space to open Spotlight.
- Search for the file (even just the first few letters of its name should work).
- Press Command-C with the file highlighted.
- Press Delete to remove the old search and now search for Documents.
- Highlight the Desktop folder result and press Enter to open it, or you can simply press Command-Tab to switch to the Finder, and then press Shift-Command-O to open the Documents folder.
- Press Command-V to copy the file to this location, or press Option-Command-V to move it.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648911.0/warc/CC-MAIN-20230603000901-20230603030901-00380.warc.gz
|
CC-MAIN-2023-23
| 3,876
| 20
|
https://ultimategerardm.blogspot.com/2011/12/new-android.html
|
code
|
The new "ice cream sandwich" release for the Android smart phones has one feature that makes many Android users in India with a previous release wish for an upgrade..
As you can see to the left, Android supports our WebFonts. Wikipedia articles can be read while other websites in for instance the Kannada language will show the infamous Unicode boxes.
Android is open source software and consequently it should be possible to figure out what it takes to make Webfonts work for the existing installed base. An alternative would be to add support by installing fonts locally on Android; this would be even better because all Indic languages websites become readable.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571483.70/warc/CC-MAIN-20220811164257-20220811194257-00363.warc.gz
|
CC-MAIN-2022-33
| 665
| 3
|
http://www.upenn.edu/computing/da/bo/webi/qna/webi_noTable.html
|
code
|
Why am I getting a "Table or View does not exist" message?
Check to make sure the data collection is available on the warehouse status page. If the collection is currently loading, the tables and views will be unavailable for querying.
If you see on the status page that the data collection is available, and you are still getting this message, it may mean that you are trying to query something to which you do not yet have permission. If you need to request additional access to warehouse data, please submit the relevant Access Request Form.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125881.93/warc/CC-MAIN-20170423031205-00196-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 544
| 3
|
https://www.areyouasuperman.net/watch.php?vid=32e89a925
|
code
|
'Spiderman' Alain Robert climbs the outside of a 168 meter-high skyscraper in Brazil..
Don't forget to SUBSCRIBE for more awesome vids: http://bit.ly/DViewSubscribe
More from Diagonal View:
For more Awesome videos visit our channel:
If you liked this check out more of Spiderman's videos: http://www.youtube.com/watch?v=VfBitUoDWjM
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875148850.96/warc/CC-MAIN-20200229083813-20200229113813-00494.warc.gz
|
CC-MAIN-2020-10
| 331
| 5
|
http://www.ironmagazineforums.com/training/26122-tps-ultimate-training-3-0-a.html
|
code
|
Fixed for yaOriginally posted by Twin Peak
Rude, i know, but i thought i'd take this rare opportunity to correct you on something.
Your training proposal sounds very intriguing, though. I wish i was knowledgable enough to give it a shot. Definitely looking forward to the results.
Your testers gonna keep public logs? Or will it all be private?
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702452567/warc/CC-MAIN-20130516110732-00043-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 344
| 4
|
http://travel.stackexchange.com/questions/tagged/restaurants+tips-and-tricks
|
code
|
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
How to assess whether a restaurant is good on the spot?
You just arrived hungry in a new city and are in a desperate need of finding a good place to eat. And you need to do it without a guidebook or recommendation. There is one restaurant popping after ...
Jun 15 '12 at 13:12
newest restaurants tips-and-tricks questions feed
Hot Network Questions
"people don’t know what they want until you show it to them"
Why do some websites enforce lack of SSL?
Message ALL users before shutdown
first use of a quantum computer in science fiction genre
If energy is just a conserved quantity how can it have flux and density?
How can I convince management to offer training to employees?
how to configure signature for user to be used in email
Can the group of homotopy classes of maps into S^3 be noncommutative?
Why would spacetime curvature cause gravity?
Was the Lord of the Rings trilogy the first film series to be shot concurrently?
What's the different between "shatter" and "splinter"?
Analogues of P vs. NP in the history of mathematics
What does the pentaprism/pentamirror do?
How does linux handle a move command
Who is an expert?
What's the English equivalent of "Drilling one's head"?
Alternative ways to say "I cannot answer that question"?
Can the author of code licensed under CC-NC-ND use it in commercial closed-source software?
A coworker beat me to resignation. How can I resign in a professional manner?
Automorphism group of flag manifolds?
How can I mount a block device from one computer to another via the network as a block device?
Is there an idiom or euphemism for when someone has an average/small penis but knows how to use it?
Speeding up my implementation of Project Euler #3
How to calcuate the sum of 1/x, where x is an integer not containing the digit 9 and 10,000,000 ≤ x ≤ 88,888,888
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Overflow
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678687395/warc/CC-MAIN-20140313024447-00045-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 2,455
| 52
|
https://www.spiritofdee.com/2022/03/finding-all-the-wrong-stuff/
|
code
|
I’ve been bughunting most of today. Maybe that’s not the right word. I don’t want to find bugs in my games, but it’s sort of an inevitable part of the process!
After a few passes on my own I will be able to turn it over to my testers, which is always an exciting milestone. Hoping to be in that stage by this time tomorrow. We’re getting there.
It’s been a bit of a mad month making this game, but it’s been such a breath of fresh air after finishing the more unfamiliar coding work I was doing on the TechUP course. I have so much fun making these things.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100287.49/warc/CC-MAIN-20231201120231-20231201150231-00293.warc.gz
|
CC-MAIN-2023-50
| 570
| 3
|
http://codeverge.com/grc.news.latestversions/windows-script-5.7-for-windows-xp/1605099
|
code
|
Importants ralentissements de FireFox 3.5.7 sous Windows 7 *** Major slowdowns in Firefox 3.5.7 on Windows 7
Name: Bernard Le Lann
Summary: Importants ralentissements de FireFox 3.5.7 sous Windows 7 *** Major slowdowns in Firefox 3.5.7 on Windows 7
Depuis que j'utilise Windows 7 FireFox 3.5.7 est extrêmement lent, pour
afficher une nouvelle page ou pour passer d'un onglet à un autre.
Since I use Windows 7 FireFox 3.5.7 is extremely slow to display a new
page or move from one tab to another
Browser Details: Mozilla/5.0 (Windows; U; Windows NT 6.1; fr; rv:1.9.1...Version beforeMozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:22.214.171.124) Gecko/20091221 Firefox/3.5.7 (.NET CLR 3.5.30729)
Name: James Kiekow
Summary: Version beforeMozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:126.96.36.199) Gecko/20091221 Firefox/3.5.7 (.NET CLR 3.5.30729)
Dear Excellent Developers,
I share a passion for the same in IT and I wanted to mention that I have
the previous version of Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US;
rv:188.8.131.52) Gecko/20091221 Firefox/3.5.7 (.NET CLR 3.5.30729) installed
and it was extremely slow surfing the web so I upgraded and my
assumption was correct it was the install I believe of th...How to view Windows Media 9 videos in Mozilla v1.7.5 in Windows XP?
How can I have the video show up in
? I have Media Player v9.0 in Windows XP Professional SP2 (all updates).
Thank you in advance. :)
"The ant has made himself illustrious; Through constant industry
industrious.; So what? Would you be calm and placid; If you were full of
formic acid?" --Ogden Nash (The Ant)
/ /\ /\ \ Phillip (Ant) @ http://antfarm.ma.cx & http://aqfl.net
| |o o| | E-mail (nuke ANT if replying privately to a newsgroup
\ _...Mozilla/5.0 (Windows; U; Windows NT 6.0; de; rv:184.108.40.206) Gecko/20091221 Firefox/3.5.7 GTB6 (.NET CLR 3.5.30729)
Summary: Mozilla/5.0 (Windows; U; Windows NT 6.0; de; rv:220.127.116.11) Gecko/20091221 Firefox/3.5.7 GTB6 (.NET CLR 3.5.30729)
Seit den Update braucht Firefox 5 Minuten um eine neue Seite zu laden
das kann doch nicht normal sein ??????????
Browser Details: Mozilla/5.0 (Windows; U; Windows NT 6.0; de; rv:18.104.22.168) Gecko/20091221 Firefox/3.5.7 GTB6 (.NET CLR 3.5.30729)
From URL: http://hendrix.mozilla.org/
Note to readers: Hendrix gives no expectation of a response to this feedback
but if you wis...Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:22.214.171.124) Gecko/20091221 Firefox/3.5.7 (.NET CLR 3.5.30729
Summary: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:126.96.36.199) Gecko/20091221 Firefox/3.5.7 (.NET CLR 3.5.30729
Firefox 3.5.7 running on HP Laptop hp G60, with Vista. When opening
various websites, Firefox has functionality problems, specifically the
minimize, size window, or close buttons in the upper left corner do not
work. The scroll bar still works.
Also, if I go to a website (i.e. Hotels.com AAA.com, etc.) and use a
calendar at the site to select a date, Firefox freezes some of the time
and...How To Replace Windows XP With Windows 7
Many Windows XP users have decided to skip the Windows Vista operating
system due to countless problems reported in the early days of its release.
Especially performance related issues where the main culprit why many
Windows XP users decided to wait for Vista's successor instead. The release
of Windows 7 is not that far away anymore. Microsoft did already make
announcements regarding the possible upgrade opportunities. In short;
Windows XP users will be able to buy an upgrade edition of Windows 7 but
will not be able to upgrade the operating system itself to Windows 7. They
...Problem in Windows XP but not in Windows 7
I have installed PB 11.5 in a Windows 7. I developed an application that
connects to an Oracle database using the O10 controller. I created the
executable file and I leave it in a shared folder that other useres in
my organization can access. In this folder I copy the content of the
c:\program files\sybase\shared\powerbuilder to allow my users run the
In the program there is a window that has a datawindow which insert
files in the database. In clients with windows 7 works fine, but in
clients with windows XP when I run the command
I get a...Dual Booting Open SUSE 11.2 and Windows 7, Windows 7 not loading (Windows 7 installed first)
Hi everybody i know there may be many threads on this topic but I have
researched and still cant seem to get Windows 7 working when the GRUB
menu appears but Open SUSE 11.2 works fine..
This is the first time installing Open SUSE 11.2. I created two
partitions (swap and Suse 11.2) in Windows 7 before installing Open SUSE
11.2. Open SUSE 11.2 automatically created an extra two partitions (one
was swap and the other i guess is where SUSE was installed?), i should
have gone into expert mode and left my original partitions but i decided
to let SUSE do it and i deleted the partitions i...URL Handling Vulnerability in Windows XP and Windows Server,2003 with Windows Internet Explorer 7 Could Allow Remote Code Execution
Boy, that's a long subject line - but it's the title of Microsoft's KB
Microsoft details (a bit) its changes to URL, more correctly URI,
handling in IE 7 on WinXP and Windows 2003.
The problem is that IE 7 code "tries to fix up" malformed URIs, then
passes the fixed-up URI to the ShellExecute procedure (on XP and Win2003).
...Security Permissions for Printer on Windows XP and Windows 7
We are a big company with a lot of Iprint Netware servers at every
location. We are at the testing phase where we will be creating the new
OES Iprint server for every location running on SUSE LINUX.
I am almost done with the Iprint configuration at every location.
When I install the driver from IPP page of the server, installation
goes great for Win 7 64 bit but when I go to Devices and Printers -
Properties of the Printer - Security Tab.
I see Everyone, Creator Owner, Administrators and Power users user
group can Print, Manage Printer, Manager Documents so in short all of
...setting up a network between Windows XP, Windows 7 opensuse
I need some advise about setting up a wireless network, never had to do
this before. My partner has just purchased a fancy laptop, which will
have windows7. I have a desktop with two hard drives one with Opensuse
11.2 64 bits, the other with Windows XP. At present my box is connect
directly via cable to the netgear DG834Gv2 router, that comes with me
ISP.. May questions are;
- can i have my box cabled to the router at the same time as using the
router to connect the laptop by wireless?
- Does Suse have a program for setting up such networks?
I have the feeling this could be a ...FF 3.5 RC and Mac OS X 10.5.7
Name: Fede R
Product: Firefox Release Candidate
Summary: FF 3.5 RC and Mac OS X 10.5.7 - Firefox won't reopen any windows after all windows are closed
If one closes all active Firefox windows, Firefox will stay open (as
indicated by the white dot under the dock icon), but won't respond to
New Window (command-N) or New Tab (command-T) commands. In order to open
a new window, one has to manually terminate and relaunch the app.
Browser Details: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; it; rv:1.9.1) Gecko/20090624 Firefox/3.5
From URL: http://hendrix.mozil...Windows XP To Windows 7 A Risky Path, Microsoft Warns
Businesses that skip Windows Vista and upgrade their computers directly from
the XP operating system to Windows 7 could expose themselves to security
risks and other problems, Microsoft says in a new white paper.
Bypassing Vista could have "implications for security, support, and
regulatory compliance and reduce flexibility in the face of changing
business requirements," writes Microsoft VP Mike Nash, in the paper.
Specifically, Nash says that businesses that wait for Windows 7 -- set for
release in late 2009 or early 2010 -- to upgrade from XP could find
themselv...Install Delphi 2010 Ent in Windows XP or Windows 7
What operating system would you recommend installing and using Delphi 2010 Enterprise in?
Windows XP or Windows 7
32 bit or 64 bit.
Greg Saunders wrote:
> What operating system would you recommend installing and using Delphi
> 2010 Enterprise in?
> Windows XP or Windows 7
> 32 bit or 64 bit.
> And why?
Windows 7 is a lot supperior and more stable than windows XP, also it
recognizes more than 3 GB of RAM.
Delphi 2010 supports Windows 7 Libraries, you can take advantage of
this in yo...
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107882103.34/warc/CC-MAIN-20201024080855-20201024110855-00243.warc.gz
|
CC-MAIN-2020-45
| 8,415
| 124
|
https://unix.stackexchange.com/questions/304296/what-happens-at-the-end-of-time
|
code
|
This question already has an answer here:
I am curious why a signed integer value was used to hold Unix time. It clearly would have made significantly more sense to use an unsigned integer as time can't go backwards, so having a negative value for time is, well, impossible. However, on January 19, 2038 Unix time will overflow and it will be the end of time as many of us know it. We will go from 2,147,483,647 to -2,147,483,648... Not good.
So, why was a signed integer used and how hard would it be to implement a fix for this when the end of time does come near?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999291.1/warc/CC-MAIN-20190620230326-20190621012326-00274.warc.gz
|
CC-MAIN-2019-26
| 566
| 3
|
https://community.mcafee.com/thread/27248
|
code
|
I have a few updated clients to 8.7i patch 3. We have an auto update job on the client that points to our EPO server for updates. It seems they are failing because the repository is downloading hotfixes for patch 2. its almost like the repository on the epo server is not up to date or thinks we are onpatch 2 not patch 3
I am not sure how to go about this, I was thrown on the project at the last minute. Where can I get the repository to be up to date
please post the \Documents and Settings\All Users\Application Data\McAfee\Common Framework\Db\McScript.log file from one problem client, and tell us, exactly what task is run (a managed ePO update task or a default autoupdate task in virusscan).
We will try our best to help you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886103316.46/warc/CC-MAIN-20170817131910-20170817151910-00424.warc.gz
|
CC-MAIN-2017-34
| 733
| 4
|
https://myprojectbazaar.com/product/rust-detection-using-image-processing-via-matlab/
|
code
|
Rust detection using image processing via Matlab
Abstract-This research attempted to create a program that is capable of detecting rust through image processing. Image processing is known for the manipulation of image through quantizing the image itself in matrix form. Through this quantization, it gives opportunity to not only manipulate the image but also detect a particular subject on the image as well, such as rust. Through setting the threshold values and the use of edge detection and segmentation, rusts on the image can be detected. The threshold values will set the parameters and
characterize what a rust is. The edge detection will check for the sudden changes of colors in the images. The segmentation will then determine the colors on the image. The results in the edge detection and segmentation will be integrated to determine the rust on the image. The results of the program yield a success rate 90% in detecting rust on images with rusts and did not obtain any errors on images with no rust.
sales on Site11,021
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100287.49/warc/CC-MAIN-20231201120231-20231201150231-00041.warc.gz
|
CC-MAIN-2023-50
| 1,033
| 4
|
http://www.codingforums.com/archive/index.php/t-7532.html
|
code
|
View Full Version : display:none is this good to use?
10-07-2002, 10:43 AM
Is it ok to use display:none ? To what extent is it supported?
10-07-2002, 12:20 PM
According to RichInStyle's bug table it's even supported by NN4 and IE4.
10-07-2002, 01:14 PM
However, in Netscape 4 and in Opera 6 (!), this must be set at runtime, and can't be changed thereafter.
10-07-2002, 06:33 PM
Shouldn't that be:
However, in Netscape 4 and in Opera 6 (!), this must be set at designtime, and can't be changed thereafter.
10-08-2002, 05:15 AM
"runtime" meaning when the page loads and renders initial layout... By using "designtime", you're suggesting the value of the display attribute was hard-coded into the page.
But the value used could instead be the result of a conditional statement, in which case the browser decides the value at runtime.
Unless of course you had tongue in cheek...
Powered by vBulletin® Version 4.2.2 Copyright © 2017 vBulletin Solutions, Inc. All rights reserved.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122041.70/warc/CC-MAIN-20170423031202-00103-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 977
| 15
|
http://www.chronicle.com/blogs/profhacker/virtualbox-makes-it-easy-to-use-other-operating-systems/39525
|
code
|
One of the current ideas about computing is that the operating system is becoming less important. With many software applications and even your data in the cloud, most of the work that you do can be done in a browser, or so the idea goes. That’s not true for me. While I do use my e-mail and calendar in Google Apps, sync my most important files to the cloud with ProfHacker favorite Dropbox, and use any number of other web applications, I still spend most of my computing time in my operating system using applications that can’t be run on a web service. For security and privacy reasons, which we’ve covered, you might not want much of your important in the cloud anyway.
From time to time, I need to run a different operating system than my OS of choice. If I’m finishing up an important web project, I like to test the website on Windows and Linux as well as on my Mac. You might want to use one operating system, but need to use a particular application that only runs on Windows or Mac every now and then. Or you might want to test out an operating system, such as a new release of Windows or Ubuntu, without changing the OS that you rely on.
One solution to this problem is to have your computer dual boot. This means that two operating systems, say Mac and Windows, live on your hard disk, and when you start the computer you can pick which one you want to run. Dual-booting has its downsides. It’s technically complex and not for the faint of heart to set up. You can also only use one of the operating systems at a time.
Another solution is to use a virtual operating system. This is the idea: Let’s say that you’re using a Mac. Using virtualization software, you can run Windows as if it were an application on your computer. In essence, your computer is acting as if it were running an entirely separate computer at the same time. (If you want a more technical explanation, read this.)
You can buy virtualization software, but a good free and open-source option is VirtualBox from Oracle (and formerly from Sun). This isn’t a full review of VirtualBox, but I can describe some of its features. You can install it on Windows, Mac, or Linux. VirtualBox then runs on the host operating system like any other program. When you run VirtualBox, you can set up different virtual computers, then install an operating system on them. For example, on my Mac I might want to run a Windows virtual machine and an Ubuntu virtual machine. You can then start up the virtual computers, which will open in another window. From there, you run whatever software you like on the new OS.
You can get an idea of how this works from this screenshot of a Mac running Windows 7 (click for a bigger image):
I’ve found VirtualBox to be more than adequate for my virtualization needs. Last summer Amy listed it as one of the five things that helped her survive the summer. What about you? Do you ever need to run a different operating system? How do you go about doing so?
VirtualBox logo and screenshot are taken from virtualbox.org.Return to Top
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320443.31/warc/CC-MAIN-20170625064745-20170625084745-00399.warc.gz
|
CC-MAIN-2017-26
| 3,050
| 8
|
https://jobseekers.vn/job/1027/
|
code
|
- Backend development
- Reverse engineering of legacy code
- Node.js/Express (> 4 years or similar level)
- OpenCV or Computer Vision Knowledge
- Cryptography or Security fundamental knowledge
- MongoDB or NoSQL( > 1 Year)
- Any experience with MSA
- (English)limited working proficiency.
How to Apply
You can apply to this job via “Apply now” button, or send you CV to one of our recruiters, at:
- Nhi Ha (Ms): firstname.lastname@example.org or
- Duong Le (Ms): email@example.com or
- Tu Phan (Ms): firstname.lastname@example.org
- Trung Pham (Mr): email@example.com
If you don’t see any feedback after 24 hours, please don’t hesitate to submit a report to firstname.lastname@example.org
Thank you very much!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100229.44/warc/CC-MAIN-20231130161920-20231130191920-00463.warc.gz
|
CC-MAIN-2023-50
| 717
| 16
|
https://www.cryptologie.net/links/link/1485
|
code
|
So you want to work in security? (and for some reason ended up here rather than reading other people’s posts on the topic).
Post a comment
Capital of Spain? (antispam)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500334.35/warc/CC-MAIN-20230206082428-20230206112428-00327.warc.gz
|
CC-MAIN-2023-06
| 169
| 3
|
http://wiki.cacert.org/OverviewProjectsBoard/Documentation?highlight=%28CategoryProjects%29
|
code
|
Table of Contents
- The Documentation Team coordinates and administrates official CAcert documents such as policies.
- Current tasks are:
- Provide guidelines for writing and maintaining documentation.
Versioning and publishing of OfficialDocument set and meta-data (editor, state of approval, ...)
- Find a file format which can be used for documentation work, as described in FindingADocumentationFormat.
Other things requested by Community in the Documentation WishList.
- Who maintains education documents?
- Above describtion still valid ?
Back to Projects Board Overview
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572174.8/warc/CC-MAIN-20220815115129-20220815145129-00285.warc.gz
|
CC-MAIN-2022-33
| 576
| 10
|
http://www.downloadroute.com/G-Lock-Email-Processor-G-Lock-Software/updates.html
|
code
|
Update list for G-Lock Email Processor
Added: “Do not backup processed emails” option to Backup/Restore.
Added: application/json and application/jsonrequest content type in the HTTP request component.
Fixed: issue with the scheduler (checking time).
Fixed: issue with multiple form variables in the HTTP Request component.
Fixed: For a Global variable with Session type default value is set for each rule instead of each session.
Added: "Force Logging" option for the "Before Checking Email Account" and "After Checking Email Account" execution modes to the Rule Settings.
Fixed: the Field Extractor with the "Predefined value" did not work under the nested CSV Parser component.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174154.34/warc/CC-MAIN-20170219104614-00492-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 683
| 8
|
https://docs.lib.purdue.edu/ecetr/450/
|
code
|
A major challenge in OFDMA cellular networks is to efficiently allocate scarce channel resources in order to optimize global system performance. In particular, the allocation problem across cells/base-stations is known to incur extremely high computational and communication complexity. Recently, Gibbs sampling has been used to solve the downlink inter-cell allocation problem with distributed algorithms that incur low computational complexity in each iteration. In a typical Gibbs sampling algorithm, in order to determine whether to transit to a new state, one needs to know in advance the performance value after the transition, even before such transition takes place. For OFDMA networks with many channels, such computation of future performance values leads to a challenging tradeoff between convergence speed and overhead: the algorithm either updates a very small number of channels at an iteration, which leads to slow convergence, or incurs high computation and communication overhead. In this paper, we propose a new multi-channel Gibbs sampling algorithm that resolves this tradeoff. The key idea is to utilize perturbation analysis so that each base-station can accurately predict the future performance values. As a result, the proposed algorithm can quickly update many channels in every iteration without incurring excessive computation and communication overhead. Simulation results show that our algorithm converges quickly and achieves system utility that is close to the existing Gibbs sampling algorithm.
Date of this Version
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100112.41/warc/CC-MAIN-20231129141108-20231129171108-00290.warc.gz
|
CC-MAIN-2023-50
| 1,548
| 2
|
http://www.citeulike.org/user/mojin/article/11357447
|
code
|
The cosmic evolution of oxygen and nitrogen abundances in star-forming galaxies over the last 10 Gyrs
The chemical evolution of galaxies on a cosmological timescale is still a matter of debate despite of the increasing number of available data provided by spectroscopic surveys of star-forming galaxies at different redshifts. The fundamental relations involving metallicity, such as the mass-metallicity relation (MZR) or the fundamental-metallicity relation, give controversial results about the reality of a evolution of the chemical content of galaxies at a given stellar mass. In this work we shed some light on this issue using the completeness reached by the 20k bright sample of the zCOSMOS survey and using for the first time the nitrogen-to-oxygen ratio as a star formation rate independent tracer of the gas phase chemical evolution of galaxies. Emission-line galaxies both in the SDSS and 20k zCOSMOS bright survey were used to study the evolution from the local Universe of the $MZR up to a redshift 1.32, and the relation between stellar mass and nitrogen-to-oxygen ratio (MNOR) up to a redshift 0.42 using the N2S2 parameter. All the physical properties derived from stellar continuum and gas emission-lines, including stellar mass, star formation rates, metallicity and N/O, were calculated in a self-consistent way all over the redshift range. We confirm the trend to find lower metallicities in galaxies of a given stellar mass in a younger Universe. This trend is even observed taking into account possible selection effects due to the observed larger median star formation rates for galaxies at higher redshifts. We also find a significant evolution of the MNOR up to z = 0.4. Taking into account the slope of the O/H vs. N/O relation for the secondary-nitrogen production regime, the observed evolution of the MNOR is consistent with the trends found for both the MZR and its equivalent relation using new expressions to reduce its dependence on star-formation rate.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702849682/warc/CC-MAIN-20130516111409-00061-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,987
| 2
|
https://elixirforum.com/t/release-using-docker-not-finding-env-sh-script/50497
|
code
|
Hi everyone, I’ve been trying to use Mix releases to deploy an umbrella app composed of one phoenix server, one ETS app, and five other sub-apps.
I’ve been trying to deploy it using a Dockerfile and based on the current documentation:
My Dockerfile looks like this: dockerfile · GitHub
the image is built successfully, but when I try to run the image, I get the following error:
: not found2: /app/releases/0.1.0/env.sh:
Even tough, the file env.sh currently exists and its contents are:
I didn’t find anything about this issue on internet, does anyone have ever gone through something like this before?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337415.12/warc/CC-MAIN-20221003101805-20221003131805-00308.warc.gz
|
CC-MAIN-2022-40
| 610
| 7
|
http://www.itninja.com/question/oracle-9i-client-problems
|
code
|
Oracle 9i Client Problems
I'm trying to create an installation package for Oracle 9i client deployment to a Citrix server farm. I'm using their packager and their app deployment system, Installation Manager. I had tons of problems with the silent/custom installs of the Oracle client and ended up just using their clientadmin.rsp response file with some minor modifications. It installs more than what I'd like, but that's better than less or nothing at all! Anyway, I can run the install via command line from the server and it works fine. However, when I create a package for it using the Citrix Packager, it doesn't install correctly. It almost seems like the server reboots before the install is complete. Is there some way to suppress that reboot? Any other tips? I have read all the info. in the packages section and it was very helpful. Thanks.
There are no answers at this time
so that the conversation will remain readable.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257649508.48/warc/CC-MAIN-20180323235620-20180324015620-00132.warc.gz
|
CC-MAIN-2018-13
| 932
| 4
|
http://ed-merks.blogspot.com/2009/10/eclipse-summit-europe-2009-tutorials.html
|
code
|
Eclipse Summit Europe started today. The weather was very mild making the short walk from Nestor Hotel to the Schlosspark Forum particularly enjoyable. It's a grand looking facility.
Eike, Tom, and I started the day with the EMF Tutorial. It was an extremely large group of people.
They didn't all fit in one picture.
I started with basic concepts about resource management and XML serialization, Eike went into depth about CDO, and Tom finished with an overview of EMF's data binding integration.
The Modeling Symposium also had a very large turnout.
The room was packed.
Christian Meier of UBS kicked off the Modeling Symposium with a presentation about the relevance of modeling in the enterprise.
He would like to see Eclipse evolve toward a first class IDE for developing models with integration through repositories to better manage the integrity of large interdependent models as they are modified by distributed groups of developers.
Eike continued with a brief demonstration of CDO as applied to his eDine restaurant model.
He showed how several applications can coordinate around a single repository and thereby reflect changes made to the state at that central repository.
Next Frédéric Madiot of Mia-Software presented the MoDisco project which is focused on discovering the models that underlie complex applications.
This information can be used to evolve and modernized those applications. He showed the generic browser that can help analyze any EMF model. It supports specifying queries that can be used to alter how the model is viewed. He shows how this can be used to specify a derived feature that's external to the actual model. Once you induce an interesting view on the model, you could use those queries to extract that into a formal model of the application.
Next Skhiri Sabri of Euranova demonstrated his live model to model transformation technology.
He talked about how an underlying model drives many of the related parts of an overall application. They have a model for the UI, a model for the data objects, and a modeled transformation layer for mapping the object model onto the UI. The tansformation layer is designed to listen to the source instances so that it can update the target instances as the source changes. In many ways, it acts similar to data binding, but is focused on always on live model to model transformation. It would have been cool to see it in action.
Markus Voelter did a lightning presentation about feature models which are used for managing variability.
A feature model describes how a valid instance is composed of parts, some of which might be mandatory, optional, or perhaps one choice of many options.
Frédéric Jouault of Ecole Des Mines Nantes described the MDE diploma he's helping to develop.
It will teach students basic MDE concepts and technologies with a focus on things that have direct industrial application. He outlined the basic curriculum they plan to support. It will include an internship program.
Cédric Vidal of ProxiAD described EMF Customerizer, a technology for customizing generated models.
It uses a CSS-style syntax for expressing the customization. This way the customizations can be expressed external to the model and hence can be reapplied to a modified version of that model. Perhaps in the future, direct changes to a model could be persisted as a customization.
Sebastian Benz of BMW presented EFactory, a textual syntax for creating instances of Ecore models.
He used Xtext to define it and showed how it could be used as textual syntax for building Ecore itself. How cool is that?
Cédric Brun demonstrated Acceleo's support for MTL. It looks like a nice language and the editor is quite slick.
There is support for prototype-based template generation, traceability hooks, and even a profiler to help tune generator performance. Very impressive.
During the final discussions, we talked about the problem of wanting fine grained object level repositories as well course grained textual resources. Part of the issue is how often do conflicts arrive from simultaneous users. But even there, a textual file can be converted to a model, and comparisons can be done at the model level instead of the file level when merging changes. The problem is often establishing identity, which is generally lost in a modified textual representation. Names could be used for identity, but refactoring can change a name. Ideally we could edit textually but not produce wholesale changes in the underlying model. It was an interesting discussion, but such a large room with a large group is not a great venue for including all the interested parties.
Afterward I sat through the Foundation 2.0 Symposium, but I quickly started to feel that pulling out a fingernail would be far less painful. I'm still not sure why model bashing is a necessary part of improving the foundation. Consider the 150+ people interested in modeling at ESE today, you'd feel safe to assume that modeling is quite an important part of the foundation's future. Oh well, you can't please all of the people all of the time. At least things progressed to more constructive contributions, such as how best to build an ecosystem where people can pay for bug fixes as well as fund feature development. I had to leave early for the sponsor's dinner, which was far more enjoyable!
Metrology in mining and metallurgy
4 years ago
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607647.16/warc/CC-MAIN-20170523143045-20170523163045-00352.warc.gz
|
CC-MAIN-2017-22
| 5,372
| 28
|
https://www.sectorthree.tech/portfolio/responsive-routes/
|
code
|
Recognising that fixed plans quickly come undone in today’s turbulent environment, we embed dynamic, continuous and agile re-planning techniques used in big tech, such as Google’s Objectives and Key Results (OKRs), scenario war-gaming, and a culture of experimenting, learning and “fail fast” if results are not quickly realised.
Let’s boot up and code some better org architecture…
Understand disruptive forces and potential impact.
Agree scenario planning.
Define blueprint for agile short, medium and long planning across your org.
Agree how to encourage experimentation yet retain control.
Launch pilot for new planning framework and monitor experiments.
Monitor the success of the framework post-launch
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303356.40/warc/CC-MAIN-20220121101528-20220121131528-00719.warc.gz
|
CC-MAIN-2022-05
| 719
| 8
|
https://cboard.cprogramming.com/general-discussions/152254-life-mistakes.html
|
code
|
I'm new here and I came here to get some suggestions. I made mistakes in my life and I want to try to correct them.
I'm 27 yeras old and I'm going to get a M.Sc. degree in engineering on december (energy/industrial/power production/hvac systems) but... I like computers.
* as child I fell in love with computers since I saw one. My parents, with a lot of effort, gave me a 286 when the technology standards were 486. No compilers, no books, I didn't know what was programming. Only my grandparent gave me a book on DOS commands obviously batch was not included.
* as teen (14 y.o.). In my country there are technical high schools: first two years are common, next three years students must choose a track programme. I choose automation and electrotechnic instead of informatics. Shame on me.
* as teen (19 y.o.). As an idiot, I heard many opinions that eletronics and informatics were dead in the 90s and the energy is the future. So I enrolled in energy engineering without feeling myself... since nowadays.
Now I'm frustrated. I never learnt how to program, I never learnt how to design an electronic circuit. And I'll probably get a job that will not give me enthusiasm and satisfaction.
I can only blame myself, of course.
I'm interested in low-level programming and electronic circuit design. I do not like at all web programming and related stuff. I'm not able to do anything of these subjects but, when I hear these topics, I feel that I like them!
So I came here, through google, to ask you some suggestions. What can I do? A bachelor in electronics? home-made study for self-projects?
Probably these are a no-way out questions and my problems came from my deep unconscious...
Sorry for my english, be patient.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188717.24/warc/CC-MAIN-20170322212948-00660-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 1,718
| 11
|
https://lifewithdata.com/2023/08/12/how-to-perform-a-granger-causality-test-in-r/
|
code
|
The Granger-Causality Test is a prominent statistical hypothesis test used to determine if one time series can predict another. It’s essential to note that “Granger causality” doesn’t imply traditional causation. Instead, it’s a useful tool to identify prediction capability between two time series.
In this comprehensive article, we’ll walk you through the steps, background, and practical application of the Granger-Causality Test in R.
1. Introduction to Granger-Causality
The Granger-Causality Test, proposed by Clive Granger in 1969, investigates if past values of one variable provide information about the future values of another variable. If the past values of
X help in predicting
X is said to “Granger-cause”
2. The Mathematical Foundation
For two time series, XtXt and YtYt, the Granger causality test involves estimating the following VAR (Vector Autoregression) models:
The null hypothesis is that coefficients of the lagged values of
X (i.e., γiγi for all i) in the first equation are zero. Rejecting the null suggests that
3. Steps to Perform Granger-Causality Test in R
Step 1: Data Preparation
Ensure your time series data is stationary. Non-stationary data can give misleading results. You can check for stationarity using the Augmented Dickey-Fuller test (
adf.test in R).
Step 2: Load Necessary Libraries
Install and load the
lmtest package which contains the Granger causality test function:
Step 3: Implementing the Granger Test
grangertest function from the
result <- grangertest(Y ~ X, order = p, data = dataset) print(result)
X are your time series variables,
p is the number of lags to be considered, and
dataset is your dataframe.
If the p-value is below a chosen significance level (e.g., 0.05), then you would reject the null hypothesis, suggesting that
5. Practical Considerations
- Stationarity: It’s imperative that both time series are stationary. If they aren’t, differences or transformations might be necessary.
- Lag Selection: The choice of lag length
pis crucial. You can utilize criteria such as AIC or BIC to select an optimal lag length.
- Multivariate Extensions: If you’re working with more than two time series, consider multivariate Granger causality tests or using Vector Autoregressions (VARs).
- Causation vs. Prediction: Remember that Granger causality is about prediction, not actual causation. Just because X Granger-causes Y doesn’t mean X causes Y in a traditional sense.
- Overfitting: Including too many lags can lead to overfitting, which may produce unreliable results.
7. Extensions and Related Techniques
- Frequency Domain: Granger causality can be explored in the frequency domain, which allows one to see at which frequencies one series might predict another.
- Nonlinear Extensions: Traditional Granger tests are linear. There are extensions to accommodate non-linear relationships between time series.
The Granger-Causality Test provides a rigorous method to understand if one time series contains predictive information about another. While it’s a powerful tool in econometrics and finance, interpreting the results requires a clear understanding of its underlying assumptions and implications. R, with its comprehensive libraries, offers a convenient environment to apply and extend the Granger-Causality Test for various datasets and scenarios.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510994.61/warc/CC-MAIN-20231002100910-20231002130910-00627.warc.gz
|
CC-MAIN-2023-40
| 3,341
| 35
|
https://community.constantcontact.com/t5/Managing-Contacts/Sorting-and-Selecting-Clients/idi-p/225655
|
code
|
I hope I'm not missing an easy way to do this, but... Now that I have decided to start using tags, it would be SO nice to be able to select multiples GROUPS, and add them all to a certain tag. Instead, I have to go inside each group, select all contacts, then add them. Then go on to the next group and do it again.
Second, I don't seem to be able to search for (and tag) all people who were added by a particular source. I can sort by source, but then I would have to click every single contact individually, because if I do the "select all" box, it selects ALL contacts and doesn't know that I wanted it narrowed down to just the source.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662545090.44/warc/CC-MAIN-20220522063657-20220522093657-00118.warc.gz
|
CC-MAIN-2022-21
| 639
| 2
|
https://knowledge.broadcom.com/external/article/235903/can-you-inline-upgrade-linux-for-perform.html
|
code
|
Our UNIX team want to do an inline OS upgrade to RedHat Linux.
Dx NetOps Performance Management - any version
RHEL 8.1 has been tested, but 8.5 is untested, but "should work". It is advised that database backups, and VM snapshots are done before attempting to upgrade the OS. Also all services should be shutdown before attempting to do an in-place OS upgrade
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100762.64/warc/CC-MAIN-20231208144732-20231208174732-00208.warc.gz
|
CC-MAIN-2023-50
| 359
| 3
|
https://community.openhab.org/t/solved-variable-declaration-in-conditional-statement/139388
|
code
|
I am a beginner in groovy, I am trying to write a script that detects the type of the event that triggers it, I have two:
- A channel trigger
- An item state change
I want my script to create a string variable to be used later in each case.
I make this test script to just print out the string i create in the if statement but i get an error that this variable does not exist.
did I do something wrong in declaring the variable? is there a scope issue?
NOTE: if I move the logger.info(str) inside the conditional expression, everything works fine!
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710488.2/warc/CC-MAIN-20221128070816-20221128100816-00373.warc.gz
|
CC-MAIN-2022-49
| 547
| 7
|
https://gitlab.gnome.org/GNOME/glib/issues/1528
|
code
|
Meson tests are hard to debug in an autobuilder environment
Autobuilders like the ones used in Debian often don't return any artifacts to the developer on failure except for the build job's stdout/stderr, so there should be a way to arrange for the unit tests to produce verbose output (either
--tap; I would slightly prefer
--tap because it's a standardized format) that can be output on test failure.
This is a regression in going from Autotools to Meson: with Autotools, every failing test had
--tap output included in
test-suite.log, and the Debian packaging ran
make check VERBOSE=1, resulting in
test-suite.log being output on test failures.
My current attempts at using Meson for the Debian package have a proof-of-concept patch to add
--tap everywhere, but an environment variable
G_TEST_OUTPUT_TAP=1 might be easier to integrate with other build systems (particularly Autotools: see https://bugs.freedesktop.org/show_bug.cgi?id=107194 for somewhere this would have been helpful).
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000894.72/warc/CC-MAIN-20190627055431-20190627081431-00121.warc.gz
|
CC-MAIN-2019-26
| 988
| 12
|
https://lists.debian.org/debian-python/2004/01/msg00000.html
|
code
|
Woody Install Problem: Site.py
-----BEGIN PGP SIGNED MESSAGE-----
Excuse me if I don't sound like I know what I'm talking about, but well,
I don't - python is very new to me.
I have Debian Woody installation - stable packages only -> python2.1. No
X libraries or clients.
When I try to install mailman, I get the following error a bunch of times:
'import site' failed; use -v for traceback
I googled; it appears this is a python issue. So I decided to re-install
my python packages. And I got the above error/warning message twice
during the installation.
Up until now, python has been installed only as a dependency (definitely
for postgres - not sure about other packages).
I went poking around and found that /usr/lib/python2.1/site.py is a link
to /etc/python/site.py - and the actual file doesn't exist.
Does anyone know what causes this problem? Have way of avoiding it? Have
a stock copy of site.py they could share? I'm willing to help sort this
out with package maintainers (which of course assumes I'm not the source
of the problem, which probably isn't true - but I do know that my system
is pretty stock).
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
-----END PGP SIGNATURE-----
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153966.52/warc/CC-MAIN-20210730091645-20210730121645-00195.warc.gz
|
CC-MAIN-2021-31
| 1,270
| 24
|
http://awdylanis.blogspot.com/2007/11/musicians-as-actors-and-actors-as.html
|
code
|
On the other end, I also looked through a Rolling Stones slide show article of musicians who have been fantastic actors. Again, from all of the movies that I've seen, I definitely agree with this list. I wonder what the secret is here. They are all really talented and emotional, so maybe one bleeds into another. Who knows, but it was interesting just the same.
"The world today doesn't make sense, so why should I paint pictures that do? "
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589634.23/warc/CC-MAIN-20180717090227-20180717110227-00451.warc.gz
|
CC-MAIN-2018-30
| 441
| 2
|
https://lenta-chan.ru/updating-bios-on-motherboard-18244.html
|
code
|
Updating bios on motherboard dating christians tips
Well first you’ll need to figure out the current version of the BIOS.
In this article, I’ll explain multiple ways you can determine the BIOS version.
If not, you can enter the BIOS setup by pressing F12, DEL, F10 or F12 when it shows up during startup.
Other computer manufacturers may have a different key to enter setup, but it will usually tell you which key to press.
This is the same method for getting Windows 8 into Safe Mode, but instead of clicking on Startup Settings, you should click on UEFI Firmware Settings.
Note that you won’t see this option if your BIOS isn’t UEFI.
Whether you need to update the BIOS or not is something I’ve written about previously and the basic premise of that article was not to update unless you really have a specific need to.
Some have the options in the BIOS itself to update, others require you to boot from a USB drive and flash the BIOS that way.
So those are pretty much all the different ways you can determine your BIOS version.
Updating your BIOS is something you should only do if needed and with great caution.
The only method of updating the BIOS that you should avoid is the Windows option.
This is usually a Windows application you can download and run from within Windows to flash the BIOS.
Refer to the following path to adjust the OC setting. Advanced\AMD CBS\NBIO Common Options\GFX Config IGC : Forces b.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347391277.13/warc/CC-MAIN-20200526160400-20200526190400-00392.warc.gz
|
CC-MAIN-2020-24
| 1,427
| 14
|
https://junglejeff.net/leaving-a-trail-for-our-son/being-brave/being-brave-means-asking-for-help/
|
code
|
Being brave means asking for help. When we’re younger, we do this constantly, because we don’t know much. When we’re older, we do it sparingly because we know a ton. Plus, we don’t want to look stupid. But we rarely reach a point where we know enough to no longer need to ask. This post by Lee Cockerell illustrates the basics brilliantly.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100545.7/warc/CC-MAIN-20231205041842-20231205071842-00243.warc.gz
|
CC-MAIN-2023-50
| 347
| 1
|
https://www.mail-archive.com/macosx@perl.org/msg10103.html
|
code
|
On Thu, Feb 28, 2008 at 7:13 PM, Ben Crane <[EMAIL PROTECTED]> wrote: > > > Jay, > > > Thanks for your response copied below. I really don't want to go to Perl 5.x > and all that newfangled stuff. > > > Here's my code ending with the offending line 7 according to my BBEdit error > msg also copied below. I think the problem must be something simple. BBEdit > says the syntax is OK, and it does run OK under Classic. I've tried > different path name conventions, ( / instead of : ) but that doesn't seem to > help. All files have 777 permissions. > > > 1 #!/usr/bin/perl > 2 > 3 # This script converts the file names of scans and images formed from the > scans from consignor IDs > 4 # to lot IDs. The file g5hd:newScansImages:trans is formed by exporting > from the filemakerPro records that > 5 # describe the lots and contain the images > 6 > 7 open ("trans", "g5hd:newScansImages:trans") or die "Error, can't open"; > 8
Hi Ben, First, you rinstinct to convert to OS X/unix-style filenames was correct. Second, you'll want to add "$!" to your die messages. That will tell you *why* the operation failed: open ("trans", "g5hd:newScansImages:trans") or die "Error, can't open: $!"; In this case, it's probably because the file doesn't exist, or your script doesn't have read permissions for it, but you won't know for sure until you see what $! returns on your system. If the file does exist, make sure the user your script runs as can read the file. If the file doesn't exist, make sure you are opening the file in read/write mode see perldoc open for more information, but something like open(TRANS, ">", "path"); # or open(TRANS, "<", "path"); should do what you need, depending on whether you need to read or write. Also, keep in mind that filehandles should be barewords or variables, not double-quoted strings. That can bite you later. By convention, they're also usually uppercase. That makes it easier to tell the difference between filehandles and other things. HTH, -- jay -------------------------------------------------- This email and attachment(s): [ ] blogable; [ x ] ask first; [ ] private and confidential daggerquill [at] gmail [dot] com http://www.tuaw.com http://www.downloadsquad.com http://www.engatiki.org values of β will give rise to dom!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100135.11/warc/CC-MAIN-20231129173017-20231129203017-00897.warc.gz
|
CC-MAIN-2023-50
| 2,266
| 2
|
http://www.techadvisor.co.uk/forum/helproom-1/network-printer-problem-248769/
|
code
|
I am trying to set up a network printer using windows XP. The network works finwe and file and printer sharing are both enabled. However when I try and "add a printer" to the remote computer I get as far as the browse for a printer box, which lists the printer, but when I click next I am asked for a password!! Never seen this before, has anyone else?
Have you tried loading the printer driver on the comp you are trying to print from? I have a Samsung Laser that would not work until I did the above. You also have to choose the correct printer in drop down list when you ckoose to print
the host bcomp is on and the printer is on. On the laptop using the add printer wizard I get as far as entire network/windows network/workgroup/host comp/printer, so I can see it from the laptop, but at this point , when I select the printer I am prompted for a password.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320227.27/warc/CC-MAIN-20170624064634-20170624084634-00605.warc.gz
|
CC-MAIN-2017-26
| 861
| 3
|
http://www.vishalgadkari.com/blog/2008/11/12/my-own-networking-site/
|
code
|
You must have seen plenty of social networking sites. Even you must be using some of them.
I have added one more to the list of soooo many social networking site by creating my own social networking site named latelatif . So if are not punctual or even if you are punctual and want to share some stories join it.
All you un-punctual ppl join and meet your friends..
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875148163.71/warc/CC-MAIN-20200228231614-20200229021614-00508.warc.gz
|
CC-MAIN-2020-10
| 365
| 3
|
https://dyn.com/rethink-dns/uses/
|
code
|
Modern DNS Uses
While scalable, consistent domain resolution remains is the foundation of DNS, modern DNS can do so much more. The internet is a dynamic and sometimes volatile environment, while your own network needs to continue to evolve with cloud adoption. You need a DNS traffic steering solution that gives you the power to manage how users connect to your digital assets across increasingly hybrid environments. You need a modern DNS architecture that reacts and adapts to changes in infrastructure performance and availability.
Intelligent Response for a Complex WorldOptimize the performance and economics of your web-based applications and sites by steering user traffic based on administratively defined policies. Policies allow you to set predictable business expectations for service differentiation, geographic market targeting, traffic load distribution and disaster recovery scenarios. Dyn uses real-time and historical Internet performance data to ensure the best performance for each rule, delivering “intelligent response” to your traffic.
Secondary DNSAs more customer, employee and partner interactions depend on web-based applications and services, DNS plays a critical role in connecting users to content; and if your DNS fails you don’t exist—digitally speaking, that is. Secondary and more broadly multi-DNS provides a cost-effective insurance policy against DNS failure, one you can’t afford to be without. And because all DNS services respond in multi-DNS architectures, the performance of resolution will also improve. Secondary or Multi-DNS is a robust DNS architecture using more than one DNS solution to promote business continuity and optimal DNS resolution performance.
Key Secondary / Multi DNS Deployment Patterns
The existing DNS implementation acts as the primary DNS service from a DNS records management perspective. Record updates are made to the primary service using established tools and practices. Once configured, the primary service automatically updates the secondary service using the standard DNS NOTIFY mechanism. Secondary DNS service receives updates via standard IXFR or AXFR. Both services respond to DNS queries.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251689924.62/warc/CC-MAIN-20200126135207-20200126165207-00492.warc.gz
|
CC-MAIN-2020-05
| 2,177
| 6
|
http://nintendomax.com/viewtopic.php?t=16565&p=40073
|
code
|
jakibaki propose la version 1.0.0 Update 3 de "gdkGBA", portage de l'émulateur GameBoy Advance pour la nintendo Switch.
Téléchargemùent :I ported the gameboy advance emulator gdkGBA (originally made by gdkchan) to the nintendo switch! (Works on all versions as far as I know)
Unfortunately this emulator doesn't support in-game-saving (it crashes when you attempt to save!) so I added an savestate feature:
Press Plus+R so save the current state and Plus+L to load it again.
Simply put the rom into sd:/switch/roms/ and start the homebrew.
As soon as retroarch gets updated for 5.0 this will instantly become obsolete!
source (you need the sdl2-libraries from the devkit-pro pacman to build this)
Sound is a bit weird (it seems like sometimes the wrong instruments play)
After loading a savestate the sound gets even more weird for a while (or until the music changes)
Some games seem to crash the switch after a while.
Sound now much better now! Many thanks to @renhei for the fix!
Changed rompath from sd:/switch/roms to sd:/switch/roms/gba in order to avoid confusion with the gbc emulator. Also double joycons now work in unattached mode!
Merged gdkchans changes to the ppu. Some games that had problems with artifacts on screen (I tried harvest moon) now look much better!
(NRO) : gdkGBA v1.0.0 Update 3.zip Source : gbatemp.net
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863626.14/warc/CC-MAIN-20180520151124-20180520171124-00090.warc.gz
|
CC-MAIN-2018-22
| 1,337
| 14
|
http://docplayer.net/198861-Multi-process-service.html
|
code
|
1 MULTI-PROCESS SERVICE vr331 March 2015 Multi-Process Service
2 Introduction AT A GLANCE MPS Intended Audience Organization of This Document Prerequisites Concepts Why MPS is needed What MPS is See Also... 3 When to use MPS The Benefits of MPS GPU utilization Reduced on-gpu context storage Reduced GPU context switching Identifying Candidate applications Considerations System Considerations Limitations GPU Compute Modes Application Considerations Memory Protection and Error Containment Memory Protection Error Containment MPS on Multi-GPU Systems Performance Client-Server Connection Limits Threads & Linux Scheduling Interaction with Tools Debugging and cuda-gdb cuda-memcheck Profiling... 8 Architecture Background Client-server Architecture Provisioning Sequence Server Client Attach/Detach...13 Appendix: Tools and Interface Reference Utilities and Daemons nvidia-cuda-mps-control... 14
3 nvidia-cuda-mps-server nvidia-smi Environment Variables CUDA_VISIBLE_DEVICES CUDA_MPS_PIPE_DIRECTORY CUDA_MPS_LOG_DIRECTORY CUDA_DEVICE_MAX_CONNECTIONS MPS Logging Format Control Log Server Log MPS KNOWN ISSUES Appendix: Common Tasks Starting and Stopping MPS on LINUX On a Multi-User System Starting MPS control daemon Shutting Down MPS control daemon Log Files On a Single-User System Starting MPS control daemon Starting MPS client application Shutting Down MPS Log Files Scripting a Batch Queuing System Basic Principles Per-Job MPS Control: A Torque/PBS Example... 21
5 INTRODUCTION 1.1. AT A GLANCE MPS The Multi-Process Service (MPS) is an alternative, binary-compatible implementation of the CUDA Application Programming Interface (API). The MPS runtime architecture is designed to transparently enable co-operative multi-process CUDA applications, typically MPI jobs, to utilize Hyper-Q capabilities on the latest NVIDIA (Kepler-based) GPUs. Hyper-Q allows CUDA kernels to be processed concurrently on the same GPU; this can benefit performance when the GPU compute capacity is underutilized by a single application process Intended Audience This document is a comprehensive guide to MPS capabilities and usage. It is intended to be read by application developers & users who will be running GPU calculations and intend to achieve the greatest level of execution performance. It is also intended to
6 be read by system administrators who will be enabling the MPS capability in a userfriendly way, typically on multi-node clusters Organization of This Document The order of the presentation is as follows: Introduction and Concepts describes why MPS is needed and how it enables Hyper-Q for multi-process applications. When to Use MPS describes what factors to consider when choosing to run an application with or choosing to deploy MPS for your users. Architecture describes the client-server architecture of MPS in detail and how it multiplexes clients onto the GPU. Appendices Reference information for the tools and interfaces used by the MPS system and guidance for common use-cases Prerequisites Portions of this document assume that you are already familiar with: the structure of CUDA applications and how they utilize the GPU via the CUDA Runtime and CUDA Driver software libraries. concepts of modern operating systems, such as how processes and threads are scheduled and how inter-process communication typically works the Linux command-line shell environment configuring and running MPI programs via a command-line interface 1.3. Concepts Why MPS is needed To balance workloads between CPU and GPU tasks, MPI processes are often allocated individual CPU cores in a multi-core CPU machine to provide CPU-core parallelization of potential Amdahl bottlenecks. As a result, the amount of work each individual MPI process is assigned may underutilize the GPU when the MPI process is accelerated using CUDA kernels. While each MPI process may end up running faster, the GPU is being used inefficiently. The Multi-Process Service takes advantage of the inter-mpi rank parallelism, increasing the overall GPU utilization What MPS is MPS is a binary-compatible client-server runtime implementation of the CUDA API which consists of several components. Control Daemon Process The control daemon is responsible for starting and stopping the server, as well as coordinating connections between clients and servers.
7 Client Runtime The MPS client runtime is built into the CUDA Driver library and may be used transparently by any CUDA application. Server Process The server is the clients' shared connection to the GPU and provides concurrency between clients See Also Manpage for nvidia-cuda-mps-control (1) Manpage for nvidia-smi (1) Blog Unleash Legacy MPI Codes With Kepler s Hyper-Q by Peter Messmer ( )
8 WHEN TO USE MPS 2.1. The Benefits of MPS GPU utilization A single process may not utilize all the compute and memory-bandwidth capacity available on the GPU. MPS allows kernel and memcopy operations from different processes to overlap on the GPU, achieving higher utilization and shorter running times Reduced on-gpu context storage Without MPS each CUDA processes using a GPU allocates separate storage and scheduling resources on the GPU. In contrast, the MPS server allocates one copy of GPU storage and scheduling resources shared by all of its clients Reduced GPU context switching Without MPS, when processes share the GPU their scheduling resources must be swapped on and off the GPU. The MPS server shares one set of scheduling resources between all of its clients, eliminating the overhead of swapping when the GPU is scheduling between those clients Identifying Candidate applications MPS is useful when each application process does not generate enough work to saturate the GPU. Multiple processes can be run per node using MPS to enable more concurrency. Applications like this are identified by having a small number of blocksper-grid. Further, if the application shows a low GPU occupancy because of a small number of threads-per-block, performance improvements may be achievable with MPS.Using fewer blocks-per-grid in the kernel invocation and more threads-per-block to increase the occupancy per block is recommended. MPS allows the leftover GPU capacity to be occupied with CUDA kernels running from other processes.
9 These cases arise in strong-scaling situations, where the compute capacity (node, CPU core and/or GPU count) is increased while the problem size is held fixed. Though the total amount of computation work stays the same, the work per process decreases and may underutilize the available compute capacity while the application is running. With MPS, the GPU will allow kernel launches from different processes to run concurrently and remove an unnecessary point of serialization from the computation Considerations System Considerations Limitations MPS is only supported on the Linux operating system. The MPS server will fail to start when launched on an operating system other than Linux. MPS requires a GPU with compute capability version 3.5 or higher. The MPS server will fail to start if one of the GPUs visible after applying CUDA_VISIBLE_DEVICES is not of compute capability 3.5 or higher. The Unified Virtual Addressing (UVA) feature of CUDA must be available, which is the default for any 64-bit CUDA program running on a GPU with compute capability version 2.0 or higher. If UVA is unavailable, the MPS server will fail to start. The amount of page-locked host memory that can be allocated by MPS clients is limited by the size of the tmpfs filesystem (/dev/shm). Exclusive-mode restrictions are applied to the MPS server, not MPS clients. Only one user on a system may have an active MPS server. The MPS control daemon will queue MPS server activation requests from separate users, leading to serialized exclusive access of the GPU between users regardless of GPU exclusivity settings. All MPS client behavior will be attributed to the MPS server process by system monitoring and accounting tools (e.g. nvidia-smi, NVML API) GPU Compute Modes Fermi- and Kepler- based GPUs support four Compute Modes via settings accessible in nvidia-smi. PROHIBITED the GPU is not available for compute applications. EXCLUSIVE_THREAD the GPU is assigned to only one process at a time, and will only perform work from one thread of that process. The CUDA stream construct can be used to run multiple CUDA kernels (and memcopy operations) concurrently. EXCLUSIVE_PROCESS the GPU is assigned to only one process at a time, and individual process threads may submit work to the GPU concurrently. DEFAULT multiple processes can use the GPU simultaneously. Individual threads of each process may submit work to the GPU simultaneously.
10 Using MPS effectively causes EXCLUSIVE_PROCESS mode to behave like DEFAULT mode for all MPS clients. MPS will always allow multiple clients to use the GPU via the MPS server. When using MPS it is recommended to use EXCLUSIVE_PROCESS mode to ensure that only a single MPS server is using the GPU, which provides additional insurance that the MPS server is the single point of arbitration between all CUDA processes for that GPU. Using EXCLUSIVE_THREAD mode with MPS is unsupported and will cause undefined behavior Application Considerations Only 64-bit applications are supported. The MPS server will fail to start if the CUDA application is not 64-bit. The MPS client will fail CUDA initialization. If an application uses the CUDA driver API, then it must use headers from CUDA 4.0 or later (i.e. it must not have been built by setting CUDA_FORCE_API_VERSION to an earlier version). Context creation in the client will fail if the context version is older than 4.0. Dynamic parallelism is not supported. CUDA module load will fail if the module uses dynamic parallelism features. MPS server only supports clients running with the same UID as the server. The client application will fail to initialize if the server is not running with the same UID. Stream callbacks are not supported. Calling any stream callback APIs will return an error. The amount of page-locked host memory that MPS client applications can allocate is limited by the size of the tmpfs filesystem (/dev/shm). Attempting to allocate more page-locked memory than the allowed size using any of relevant CUDA APIs will fail Memory Protection and Error Containment MPS is only recommended for running cooperative processes effectively acting as a single application, such as multiple ranks of the same MPI job, such that the severity of the following memory protection and error containment limitations is acceptable Memory Protection MPS client processes allocate memory from different partitions of the same GPU virtual address space. As a result: An out-of-range write in a CUDA Kernel can modify the CUDA-accessible memory state of another process, and will not trigger an error. An out-of-range read in a CUDA Kernel can access CUDA-accessible memory modified by another process, and will not trigger an error, leading to undefined behavior. This behavior is constrained to memory accesses from pointers within CUDA Kernels. Any CUDA API restricts MPS clients from accessing any resources outside of that MPS
11 Client's memory partition. For example, it is not possible to overwrite another MPS client's memory using the cudamemcpy() API Error Containment MPS client processes share on-gpu scheduling and error reporting resources. As a result: A GPU exception generated by any client will be reported to all clients, without indicating which client generated the error. A fatal GPU exception triggered by one client will terminate the GPU activity of all clients. CUDA API errors generated on the CPU in the CUDA Runtime or CUDA Driver are delivered only to the calling client MPS on Multi-GPU Systems The MPS server supports using multiple GPUs. On systems with more than one GPU, you can use CUDA_VISIBLE_DEVICES to enumerate the GPUs you would like to use. See section 4.2 for more details Performance Client-Server Connection Limits The MPS Server supports up to 16 client CUDA contexts concurrently. These contexts may be distributed over up to 16 processes. If the connection limit is exceeded, the CUDA application will fail to create a CUDA Context and return an API error from cuctxcreate() or the first CUDA Runtime API call that triggers context creation. Failed connection attempts will be logged by the MPS server Threads & Linux Scheduling Launching more MPS clients than there are available logical cores on your machine will incur increased launch latency and will generally slow down client-server communication due to how the threads get scheduled by the Linux CFS (Completely Fair Scheduler). For setups where multiple GPUs are used with an MPS control daemon and server started per GPU, we recommend pinning each MPS server to a distinct core. This can be accomplished by using the utility taskset, which allows binding a running program to multiple cores or launching a new one on them. To accomplish this with MPS, launch the control daemon bound to a specific core, e.g. `taskset c 0 nvidia-cudamps-control d`. The process affinity will be inherited by the MPS server when it starts up Interaction with Tools
12 Debugging and cuda-gdb Under certain conditions applications invoked from within cuda-gdb (or any CUDAcompatible debugger, such as Allinea DDT) may be automatically run without using MPS, even when MPS automatic provisioning is active. To take advantage of this automatic fallback, no other MPS client applications may be running at the time. This enables debugging of CUDA applications without modifying the MPS configuration for the system. Here s how it works: cuda-gdb attempts to run an application and recognizes that it will become an MPS client. The application running under cuda-gdb blocks in cuinit() and waits for all of the active MPS client processes to exit, if any are running. Once all client processes have terminated, the MPS server will allow cuda-gdb and the application being debugged to continue. If any new client processes attempt to connect to the MPS server while cuda-gdb is running, the new MPS client will block in cuinit() until the debugger has terminated. The client applications will continue normally after the debugger has terminated cuda-memcheck The cuda-memcheck tool is supported on MPS. See the cuda-memcheck documentation for usage instructions Profiling CUDA profiling tools (such as nvprof and Nvidia Visual Profiler) and CUPTI based profilers are supported under MPS. See the profiler documentation for usage instructions.
13 ARCHITECTURE 3.1. Background CUDA is a general purpose parallel computing platform and programming model that leverages the parallel compute engine in NVIDIA GPUs to solve many complex computational problems in a more efficient way than on a CPU. A CUDA program starts by creating a CUDA context, either explicitly using the driver API or implicitly using the runtime API, for a specific GPU. The context encapsulates all the hardware resources necessary for the program to be able to manage memory and launch work on that GPU. Launching work on the GPU typically involves copying data over to previously allocated regions in GPU memory, running a CUDA kernel that operates on that data, and then copying the results back from GPU memory into system memory. A CUDA kernel consists of a hierarchy of thread groups that execute in parallel on the GPUs compute engine. All work on the GPU launched using CUDA is launched either explicitly into a CUDA stream, or implicitly using a default stream. A stream is a software abstraction that represents a sequence of commands, which may be a mix of kernels, copies, and other commands, that execute in order. Work launched in two different streams can execute simultaneously, allowing for coarse grained parallelism. CUDA streams are aliased onto one or more work queues on the GPU by the driver. Work queues are hardware resources that represent an in-order sequence of the subset of commands in a stream to be executed by a specific engine on the GPU, such as the kernel executions or memory copies. GPU's with Hyper-Q have a concurrent scheduler to schedule work from work queues belonging to a single CUDA context. Work launched to the compute engine from work queues belonging to the same CUDA context can execute concurrently on the GPU. The GPU also has a time sliced scheduler to schedule work from work queues belonging to different CUDA contexts. Work launched to the compute engine from work queues belonging to different CUDA contexts cannot execute concurrently. This can cause underutilization of the GPU s compute resources if work launched from a single CUDA context is not sufficient to use up all resource available to it.
14 Additionally, within the software layer, to receive asynchronous notifications from the OS and perform asynchronous CPU work on behalf of the application the CUDA Driver may create internal threads: an upcall handler thread and potentially a user callback executor thread Client-server Architecture This diagram shows a likely schedule of CUDA kernels when running an MPI application consisting of multiple OS processes without MPS. Note that while the CUDA kernels from within each MPI process may be scheduled concurrently, each MPI process is assigned a serially scheduled time-slice on the whole GPU.
15 When using MPS, the server manages the hardware resources associated with a single CUDA context. The CUDA contexts belonging to MPS clients funnel their work through the MPS server. This allows the client CUDA contexts to bypass the hardware limitations associated with time sliced scheduling, and permit their CUDA kernels execute simultaneously. The communication between the MPS client and the MPS server is entirely encapsulated within the CUDA driver behind the CUDA API. As a result, MPS is transparent to the MPI program. MPS clients CUDA contexts retain their upcall handler thread and any asynchronous executor threads. The MPS server creates an additional upcall handler thread and creates a worker thread for each client.
16 3.3. Provisioning Sequence System-wide provisioning with multiple users Server The MPS control daemon is responsible for the startup and shutdown of MPS servers. The control daemon allows at most one MPS server to be active at a time. When an MPS client connects to the control daemon, the daemon launches an MPS server if there is no server active. The MPS server is launched with the same user id as that of the MPS client. If there is an MPS server already active and the user id of the server and client match, then the control daemon allows the client to proceed to connect to the server. If there is an MPS server already active, but the server and client were launched with different user id s, the control daemon requests the existing server to shutdown once all its clients have disconnected. Once the existing server has shutdown, the control daemon launches a new server with the same user id as that of the new user's client process. This is shown in the figure above where user Bob starts client C' before a server is avialable. Only once user Alice's clients exit is a server created for user Bob and client C'.
17 The MPS control daemon does not shutdown the active server if there are no pending client requests. This means that the active MPS server process will persist even if all active clients exit. The active server is shutdown only when a new MPS client, launched with a different user id than the active MPS server,connects to the control daemon. This is shown in the example above, where the control daemon issues a server exit request to Alice's server only once user Bob starts client C, even though all of Alice's clients have exited. The control daemon executable also supports an interactive mode where a user with sufficient permissions can issue commands, for example to see the current list of servers and clients or startup and shutdown servers manually Client Attach/Detach When CUDA is first initialized in a program, the CUDA driver attempts to connect to the MPS control daemon. If the connection attempt fails, the program continues to run as it normally would without MPS. If however, the connection attempt succeeds, the MPS control daemon proceeds to ensure that an MPS server, launched with same user id as that of the connecting client, is active before returning to the client. The MPS client then proceeds to connect to the server. All communication between the MPS client, the MPS control daemon, and the MPS server is done using named pipes. The MPS server launches a worker thread to receive commands from the client. Upon client process exit, the server destroys any resources not explicitly freed by the client process and terminates the worker thread.
18 APPENDIX: TOOLS AND INTERFACE REFERENCE The following utility programs and environment variables are used to manage the MPS execution environment. They are described below, along with other relevant pieces of the standard CUDA programming environment Utilities and Daemons nvidia-cuda-mps-control Typically stored under /usr/bin on Linux systems and typically run with superuser privileges, this control daemon is used to manage the nvidia-cuda-mps-server described in the section following. These are the relevant use cases: man nvidia-cuda-mps-control # Describes usage of this utility. nvidia-cuda-mps-control -d # Start daemon as a background process. ps -ef grep mps # See if the MPS daemon is running. echo quit nvidia-cuda-mps-control # Shut the daemon down. nvidia-cuda-mps-control # Start in interactive mode. When used in interactive mode, the available commands are get_server_list this will print out a list of all PIDs of server instances. start_server uid <user id> - this will manually start a new instance of nvidia-cudamps-server with the given user ID. get_client_list <PID> - this lists the PIDs of client applications connected to a server instance assigned to the given PID quit terminates the nvidia-cuda-mps-control daemon Only one instance of the nvidia-cuda-mps-control daemon should be run per node.
19 nvidia-cuda-mps-server Typically stored under /usr/bin on Linux systems, this daemon is run under the same $UID as the client application running on the node. The. nvidia-cuda-mps-server instances are created on-demand when client applications connect to the control daemon. The server binary should not be invoked directly, and instead the control daemon should be used to manage the startup and shutdown of servers. The nvidia-cuda-mps-server process owns the CUDA context on the GPU and uses it to execute GPU operations for its client application processes. Due to this, when querying active processes via nvidia-smi (or any NVML-based application) nvidia-cuda-mpsserver will appear as the active CUDA process rather than any of the client processes nvidia-smi Typically stored under /usr/bin on Linux systems, this is used to configure GPU's on a node. The following use cases are relevant to managing MPS: man nvidia-smi # Describes usage of this utility. nvidia-smi -L # List the GPU's on node. nvidia-smi -q # List GPU state and configuration information. nvidia-smi -q -d compute # Show the compute mode of each GPU. nvidia-smi -i 0 -c EXCLUSIVE_PROCESS # Set GPU 0 to exclusive mode, run as root. nvidia-smi -i 0 -c DEFAULT # Set GPU 0 to default mode, run as root. (SHARED_PROCESS) nvidia-smi -i 0 -r # Reboot GPU 0 with the new setting Environment Variables CUDA_VISIBLE_DEVICES CUDA_VISIBLE_DEVICES is used to specify which GPU s should be visible to a CUDA application. Only the devices whose index or UUID is present in the sequence are visible to CUDA applications and they are enumerated in the order of the sequence. When CUDA_VISIBLE_DEVICES is set before launching the control daemon, the devices will be remapped by the MPS server. This means that if your system has devices 0, 1 and 2, and if CUDA_VISIBLE_DEVICES is set to 0,2, then when a client connects to the server it will see the remapped devices - device 0 and a device 1. Therefore, keeping CUDA_VISIBLE_DEVICES set to 0,2 when launching the client would lead to an error. To avoid this ambiguity, we recommend using UUIDs instead of indices. These can be viewed by launching nvidia-smi q. When launching the server, or the application, you
20 can set CUDA_VISIBLE_DEVICES to UUID_1,UUID_2, where UUID_1 and UUID_2 are the GPU UUIDs. It will also work when you specify the first few characters of the UUID (including GPU- ) rather than the full UUID. The MPS server will fail to start if incompatible devices are visible after the application of CUDA_VISIBLE_DEVICES CUDA_MPS_PIPE_DIRECTORY The MPS control daemon, the MPS server, and the associated MPS clients communicate with each other via named pipes. The default directory for these pipes is /tmp/nvidiamps. The environment variable, CUDA_MPS_PIPE_DIRECTORY, can be used to override the location of these pipes. The value of this environment variable should be consistent across all MPS clients sharing the same MPS server, and the MPS control daemon. The recommended location for the directory containing these named pipes is local folders such as /tmp. If the specified location exists in a shared, multi-node filesystem, the path must be unique for each node to prevent multiple MPS servers or MPS control daemons from using the same pipes. When provisioning MPS on a per-user basis, the pipe directory should set to a location such that different users will not end up using the same directory CUDA_MPS_LOG_DIRECTORY The MPS control daemon maintains a control.log file which contains the status of its MPS servers, user commands issued and their result, and startup and shutdown notices for the daemon. The MPS server maintains a server.log file containing its startup and shutdown information and the status of its clients. By default these log files are stored in the directory /var/log/nvidia-mps. The CUDA_MPS_LOG_DIRECTORY environment variable can be used to override the default value. This environment variable should be set in the MPS control daemon s environment and is automatically inherited by any MPS servers launched by that control daemon CUDA_DEVICE_MAX_CONNECTIONS When encountered in the MPS client's environment CUDA_DEVICE_MAX_CONNECTIONS sets the preferred number of compute and copy engine concurrent connections (work queues) from the host to the device for that client. The number actually allocated by the driver may differ from what is requested based on hardware resource limitations or other considerations. Under MPS, each server's clients share one pool of connections, whereas without MPS each CUDA context would be allocated its own separate connection pool MPS Logging Format
21 Control Log The control daemon s log file contains information about the following: Startup and shutdown of MPS servers identified by their process ids and the user id with which they are being launched. [ :50: Control 13894] Starting new server for user 500 [ :50: Control 13894] NEW SERVER 13929: Ready [ :02: Control 13894] Server exited with status 0 New MPS client connections identified by the client process id and the user id of the user that launched the client process. [ :02: Control 13894] NEW CLIENT from user 500: Server already exists [ :02: Control 13894] Accepting connection... User commands issued to the control daemon and their result. [ :50: Control 13894] Starting new server for user 500 [ :50: Control 13894] NEW SERVER 13929: Ready Error information such as failing to establish a connection with a client. [ :02: Control 13894] Accepting connection... [ :02: Control 13894] Unable to read new connection type information Server Log The server s log file contains information about the following: New MPS client connections and disconnections identified by the client process id. [ :00: Server 13929] New client connected [ :00: Server 13929] Client disconnected Error information such as the MPS server failing to start due to system requirements not being met. [ :51: Server 29489] MPS server failed to start [ :51: Server 29489] MPS is only supported on 64-bit Linux platforms, with an SM 3.5 or higher GPU.
22 4.4. MPS KNOWN ISSUES Clients may fail to start, returning ERROR_OUT_OF_MEMORY when the first CUDA context is created, even though there are fewer client contexts than the hard limit of 16. Comments: When creating a context, the client tries to reserve virtual address space for the Unified Virtual Addressing memory range. On certain systems, this can clash with the system linker and the dynamic shared libraries loaded by it. Ensure that CUDA initialization (e.g., cuinit(), or any cuda*() Runtime API function) is one of the first functions called in your code. To provide a hint to the linker and to the Linux kernel that you want your dynamic shared libraries higher up in the VA space (where it won t clash with CUDA s UVA range), compile your code as PIC (Position Independent Code) and PIE (Position Independent Executable). Refer to your compiler manual for instructions on how to achieve this. Memory allocation API calls (including context creation) may fail with the following message in the server log: MPS Server failed to create/open SHM segment. Comments: This is most likely due to exhausting the file descriptor limit on your system. Check the maximum number of open file descriptors allowed on your system and increase if necessary. We recommend setting it to and higher. Typically this information can be checked via the command ulimit n ; refer to your operating system instructions on how to change the limit.
MULTI-PROCESS SERVICE vr352 May 2015 Multi-Process Service Introduction... 1 1.1. AT A GLANCE... 1 1.1.1. MPS...1 1.1.2. Intended Audience... 1 1.1.3. Organization of This Document... 2 1.2. Prerequisites...
NVIDIA CUDA GETTING STARTED GUIDE FOR MAC OS X DU-05348-001_v6.5 August 2014 Installation and Verification on Mac OS X TABLE OF CONTENTS Chapter 1. Introduction...1 1.1. System Requirements... 1 1.2. About
NVIDIA CUDA GETTING STARTED GUIDE FOR MAC OS X DU-05348-001_v5.5 July 2013 Installation and Verification on Mac OS X TABLE OF CONTENTS Chapter 1. Introduction...1 1.1. System Requirements... 1 1.2. About
ID ERRORS vr352 May 2015 ID Errors Introduction... 1 1.1. What Is an id Message... 1 1.2. How to Use id Messages... 1 Working with id Errors... 2 2.1. Viewing id Error Messages... 2 2.2. Tools That Provide
TOOLS AND TIPS FOR MANAGING A GPU CLUSTER Adam DeConinck HPC Systems Engineer, NVIDIA Steps for configuring a GPU cluster Select compute node hardware Configure your compute nodes Set up your cluster for
NVIDIA CUDA GETTING STARTED GUIDE FOR MICROSOFT WINDOWS DU-05349-001_v6.0 February 2014 Installation and Verification on TABLE OF CONTENTS Chapter 1. Introduction...1 1.1. System Requirements... 1 1.2.
GRID VGPU FOR VMWARE VSPHERE DU-07354-001 March 2015 Quick Start Guide DOCUMENT CHANGE HISTORY DU-07354-001 Version Date Authors Description of Change 0.1 7/1/2014 AC Initial draft for vgpu early access
Available online at www.prace-ri.eu Partnership for Advanced Computing in Europe Resource Scheduling Best Practice in Hybrid Clusters C. Cavazzoni a, A. Federico b, D. Galetti a, G. Morelli b, A. Pieretti
BrightStor ARCserve Backup for Linux Agent for MySQL Guide r11.5 D01213-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the end user's
Intel Data Direct I/O Technology (Intel DDIO): A Primer > Technical Brief February 2012 Revision 1.0 Legal Statements INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,
NVIDIA CUDA GETTING STARTED GUIDE FOR MICROSOFT WINDOWS DU-05349-001_v5.5 July 2013 Installation and Verification on TABLE OF CONTENTS Chapter 1. Introduction...1 1.1. System Requirements... 1 1.2. About
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 2 Operating System Overview Dave Bremer Otago Polytechnic, N.Z. 2008, Prentice Hall Roadmap Operating System Objectives/Functions
NVIDIA CUDA GETTING STARTED GUIDE FOR MICROSOFT WINDOWS DU-05349-001_v6.5 August 2014 Installation and Verification on TABLE OF CONTENTS Chapter 1. Introduction...1 1.1. System Requirements... 1 1.2. About
MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the
Server Consolidation with SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 supports multiple options for server consolidation, providing organizations
..................................... PEPPERDATA IN MULTI-TENANT ENVIRONMENTS technical whitepaper June 2015 SUMMARY OF WHAT S WRITTEN IN THIS DOCUMENT If you are short on time and don t want to read the
TIBCO ActiveMatrix BusinessWorks Plug-in for TIBCO Managed File Transfer Software Installation Software Release 6.0 November 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS
CHAPTER 15: Operating Systems: An Overview The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint
Chapter 6, The Operating System Machine Level 6.1 Virtual Memory 6.2 Virtual I/O Instructions 6.3 Virtual Instructions For Parallel Processing 6.4 Example Operating Systems 6.5 Summary Virtual Memory General
2. An Operating System, What For? 2. An Operating System, What For? Operating System Tasks Survey of Operating System Principles 14 / 352 2. An Operating System, What For? Batch Processing Punched Cards
F# Applications to Computational Financial and GPU Computing May 16th Dr. Daniel Egloff +41 44 520 01 17 +41 79 430 03 61 Today! Why care about F#? Just another fashion?! Three success stories! How Alea.cuBase
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
SLURM Workload Manager What is SLURM? SLURM (Simple Linux Utility for Resource Management) is the native scheduler software that runs on ASTI's HPC cluster. Free and open-source job scheduler for the Linux
IT 3123 Hardware and Software Concepts Operating Systems II October 26 Multiprogramming Two or more application programs in memory. Consider one CPU and more than one program. This can be generalized to
Acronis Backup & Recovery 11.5 Installation Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows
NVIDIA GeForce Experience DU-05620-001_v02 October 9, 2012 User Guide TABLE OF CONTENTS 1 NVIDIA GeForce Experience User Guide... 1 About GeForce Experience... 1 Installing and Setting Up GeForce Experience...
Intel Media SDK Library Distribution and Dispatching Process Overview Dispatching Procedure Software Libraries Platform-Specific Libraries Legal Information Overview This document describes the Intel Media
How to Configure Intel X520 Ethernet Server Adapter Based Virtual Functions on Citrix* XenServer 6.0* Technical Brief v1.0 December 2011 Legal Lines and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED
Chapter 3 Application Monitors AppMetrics utilizes application monitors to organize data collection and analysis per application server. An application monitor is defined on the AppMetrics manager computer
! Introduction to Running Computations on the High Performance Clusters at the Center for Computational Research! Cynthia Cornelius! Center for Computational Research University at Buffalo, SUNY! cdc at
Intel Media Server Studio - Metrics Monitor (v1.1.0) Reference Manual Overview Metrics Monitor is part of Intel Media Server Studio 2015 for Linux Server. Metrics Monitor is a user space shared library
REMOTE VISUALIZATION ON SERVER-CLASS TESLA GPUS WP-07313-001_v01 June 2014 White Paper TABLE OF CONTENTS Introduction... 4 Challenges in Remote and In-Situ Visualization... 5 GPU-Accelerated Remote Visualization
Running a Workflow on a PowerCenter Grid 2010-2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)
DeviceAnywhere Enterprise Release 6.2 DeviceAnywhere Enterprise 6.2 DeviceAnywhere Enterprise 6.2 February 2014 Copyright Notice Copyright 1995-2014 Keynote Systems, Inc. All rights reserved THE INFORMATION
Cluster Monitoring and Management Tools RAJAT PHULL, NVIDIA SOFTWARE ENGINEER ROB TODD, NVIDIA SOFTWARE ENGINEER MANAGE GPUS IN THE CLUSTER Administrators, End users Middleware Engineers Monitoring/Management
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing
HPC Wales Skills Academy Course Catalogue 2015 Overview The HPC Wales Skills Academy provides a variety of courses and workshops aimed at building skills in High Performance Computing (HPC). Our courses
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft Applications:
CA Data Protection Content Provider Development Guide Release 15.0 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation
RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware Contact Information Go to the RSA corporate website for regional Customer Support telephone
Acronis Backup & Recovery 11.5 Server for Linux Update 2 Installation Guide Copyright Statement Copyright Acronis International GmbH, 2002-2013. All rights reserved. Acronis and Acronis Secure Zone are
CS 377: Operating Systems Lecture 25 - Linux Case Study Guest Lecturer: Tim Wood Outline Linux History Design Principles System Overview Process Scheduling Memory Management File Systems A review of what
Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing Agenda Windows 8 TPM Scenarios Hardware Choices with
SIEBEL SERVER ADMINISTRATION GUIDE VERSION 7.5.3 JULY 2003 12-FRLK3Z Siebel Systems, Inc., 2207 Bridgepointe Parkway, San Mateo, CA 94404 Copyright 2003 Siebel Systems, Inc. All rights reserved. Printed
An Oracle White Paper November 2010 Leveraging Massively Parallel Processing in an Oracle Environment for Big Data Analytics 1 Introduction New applications such as web searches, recommendation engines,
Service Availability TM Forum Application Interface Specification Information Model Management Service SAI-AIS-IMM-A.02.0 This specification was reissued on September, under the Artistic License 2.0. The
Operating System Tutorial OPERATING SYSTEM TUTORIAL Simply Easy Learning by tutorialspoint.com tutorialspoint.com i ABOUT THE TUTORIAL Operating System Tutorial An operating system (OS) is a collection
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
White Paper EMC DOCUMENTUM xplore 1.1 DISASTER RECOVERY USING EMC NETWORKER Abstract The objective of this white paper is to describe the architecture of and procedure for configuring EMC Documentum xplore
Intel Dialogic System Release 6.1 CompactPCI for Windows Administration Guide April 2006 05-1884-003 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,
theguard! ApplicationManager System Windows Data Collector Status: 10/9/2008 Introduction... 3 The Performance Features of the ApplicationManager Data Collector for Microsoft Windows Server... 3 Overview
Kiko> A personal job scheduler V1.2 Carlos allende prieto october 2009 kiko> is a light-weight tool to manage non-interactive tasks on personal computers. It can improve your system s throughput significantly
Event Manager LANDesk Service Desk LANDESK SERVICE DESK EVENT MANAGER GUIDE This document contains information that is the proprietary and confidential property of LANDesk Software, Inc. and/or its affiliated
Application Note Running Applications Using Dialogic Global Call Software as Windows Services Application Note Running Applications Using Dialogic Global Call Software as Windows Services Executive Summary
SIOS Protection Suite for Linux v8.3.0 Postfix Recovery Kit Administration Guide July 2014 This document and the information herein is the property of SIOS Technology Corp. (previously known as SteelEye
Oracle9i Release 2 Database Architecture on Windows An Oracle Technical White Paper April 2003 Oracle9i Release 2 Database Architecture on Windows Executive Overview... 3 Introduction... 3 Oracle9i Release
SW5706 This presentation will focus on application deployment problem determination on WebSphere Application Server V6. SW5706G11_AppDeployProblems.ppt Page 1 of 20 Unit objectives After completing this
10 STEPS TO YOUR FIRST QNX PROGRAM QUICKSTART GUIDE Second Edition QNX QUICKSTART GUIDE A guide to help you install and configure the QNX Momentics tools and the QNX Neutrino operating system, so you can
Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V Technical Brief v1.0 September 2012 2 Intel Ethernet and Configuring SR-IOV on Windows*
SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.
Technical Brief Introducing Hybrid SLI Technology March 11, 2008 TB-03875-001_v01 Document Change History Version Date Responsible Description of Change 01 March 11, 2008 SR, DV Initial release ii March
vsphere 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
SupportPac CB12 General Insurance Application (GENAPP) for IBM CICS Transaction Server SupportPac CB12 General Insurance Application (GENAPP) for IBM CICS Transaction Server ii General Insurance Application
NIST/ITL CSD Biometric Conformance Test Software on Apache Hadoop September 2014 Dylan Yaga NIST/ITL CSD Lead Software Designer Fernando Podio NIST/ITL CSD Project Manager National Institute of Standards
Data Access Guide BusinessObjects 11 Windows and UNIX 1 Copyright Trademarks Use restrictions Patents Copyright 2004 Business Objects. All rights reserved. If you find any problems with this documentation,
1 Virtual Machines A virtual machine (VM) is a "completely isolated guest operating system installation within a normal host operating system". Modern virtual machines are implemented with either software
New and Changed Application Services in Informatica 10.0 1993-2015 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording
Command Line Interface User Guide for Intel Server Management Software Legal Information Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel
Nios II Software Developer s Handbook Nios II Software Developer s Handbook 101 Innovation Drive San Jose, CA 95134 www.altera.com NII5V2-13.1 2014 Altera Corporation. All rights reserved. ALTERA, ARRIA,
Use Cases for Target Management Eclipse DSDP-Target Management Project Martin Oberhuber, Wind River Systems firstname.lastname@example.org Version 1.1 June 22, 2005 Status: Draft Public Review Use Cases
RSM Web Gateway RSM Web Client INSTALLATION AND ADMINISTRATION GUIDE Installation and Administration Guide RSM Web Client and RSM Web Gateway 17 August, 2004 Page 1 Copyright Notice 2004 Sony Corporation.
The Application Level Placement Scheduler Michael Karo 1, Richard Lagerstrom 1, Marlys Kohnke 1, Carl Albing 1 Cray User Group May 8, 2006 Abstract Cray platforms present unique resource and workload management
Mission-Critical Java An Oracle White Paper Updated October 2008 Mission-Critical Java The Oracle JRockit family of products is a comprehensive portfolio of Java runtime solutions that leverages the base
Code:1Z0-599 Titre: Oracle WebLogic Server 12c Essentials Version: Demo http://www.it-exams.fr/ QUESTION NO: 1 You deploy more than one application to the same WebLogic container. The security is set on
Parallels Cloud Server White Paper Key Features and Benefits www.parallels.com Table of Contents Introduction... 3 Key Features... 3 Distributed Cloud Storage (Containers and Hypervisors)... 3 Rebootless
This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware
Cisco TelePresence Management Suite Extension for Microsoft Exchange Version 4.0.1 Software Release Notes May 2014 Contents Introduction 1 Changes to interoperability 1 Product documentation 2 New features
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741628.8/warc/CC-MAIN-20181114041344-20181114063344-00184.warc.gz
|
CC-MAIN-2018-47
| 45,472
| 98
|
https://aperio-lux.com/Support/RSSFollower/what-is-new/
|
code
|
What's New in Version 1.5
- Fix minor issue
- The issue with the function "Open article in ...", which sometimes led to the incorrect display of the "Preferences" panel, was fixed.
- Fix issues with some RSS feeds
- Added support for RDF format
- Added the ability to open the article in web browsers
- Fix an issue with reading articles from some feeds (Thanks a lot to our customer Roberto C.)
- Thanks a lot to our customer Stéphane M. for the preparation French localization for this version
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583755653.69/warc/CC-MAIN-20190121025613-20190121051613-00144.warc.gz
|
CC-MAIN-2019-04
| 496
| 8
|
https://www.libhunt.com/compare-nrktkt--tail-vs-bytecode-viewer?ref=compare
|
code
|
|8 months ago||4 months ago|
|The Unlicense||GNU General Public License v3.0 only|
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
We haven't tracked posts mentioning Tail yet.
Tracking mentions began in Dec 2020.
2 projects | dev.to | 2 Jan 2023
Reverse Engineering Tools in 2022
3 projects | news.ycombinator.com | 18 Sep 2022
I think they forgot to google translate the disadvantages of JEB Decompiler
I haven't used JEB to comment, but I've gotten a lot of mileage out of https://github.com/pxb1988/dex2jar#readme and then feed the normal Java jars it produces into https://github.com/mstrobel/procyon#readme and (of course) one shouldn't overlook picking your favorite tool for dealing with AndroidManifest.xml which often has fun things hiding in it
While digging up those links, I was reminded that some folks enjoy https://github.com/Konloch/bytecode-viewer#is-there-a-demo because it can be easier to "try out" a few of the decompilation engines, but I don't use it because it's hard to do batch things with it, versus dex2jar into procyon is automation friendly
Is there any tool for Java reverse engineering that doesn't totally suck?
3 projects | /r/java | 26 Aug 2022
Here's a good tool for inspecting the bytecode of applications, with built in decompiler support: https://github.com/Konloch/bytecode-viewer
1.8 source code
2 projects | /r/WurstClient | 28 Nov 2021
Also, you can always install the latest release and then put it through a Java decompiler to get the complete source code. It might have some errors since decompilers aren't perfect, but will give you a more complete source code than anything I can legally provide.
What are some alternatives?
Caesium - A Java bytecode obfuscator
AndroRAT - A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Perses - A project to cause (controlled) destruction on your jvm application
jpexs-decompiler - JPEXS Free Flash Decompiler
Mixin - Mixin is a trait/mixin and bytecode weaving framework for Java using ASM
QuickShell - QuickShell is an Eclipse plugin to use Java JShell inside the Eclipse IDE.
Recaf - The modern Java bytecode editor
Flowable (V6) - A compact and highly efficient workflow and Business Process Management (BPM) platform for developers, system admins and business users.
fernflower - Unofficial mirror of FernFlower Java decompiler (All pulls should be submitted upstream)
tommy - Tommy is Apache Tomcat, bundled as a single executable jar.
apk-dependency-graph - Android class dependency visualizer. This tool helps to visualize the current state of the project.
JByteMod-Beta - Java bytecode editor
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100304.52/warc/CC-MAIN-20231201183432-20231201213432-00650.warc.gz
|
CC-MAIN-2023-50
| 2,988
| 32
|
https://osu.ppy.sh/community/forums/topics/302888?start=3953831
|
code
|
- Aomi - wrote:
^ It still exceeds the limit. You need to lower/delete some frames in order to get it under 88 kb.
(/-\) i want cry ,i do it in few minutes ~I can't ,now i have a bug with the pic when i upload u.u
If you see is a small bug in the head
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573570.6/warc/CC-MAIN-20190919183843-20190919205843-00327.warc.gz
|
CC-MAIN-2019-39
| 251
| 4
|
https://sites.google.com/site/shepherdphilosophy/
|
code
|
My second book, The Shape of Agency: Control, Action, Skill, Knowledge, is done. Oxford University Press will publish it in January of 2021. In the book, I offer a perspective on agency via offering interlinked accounts of control, non-deviant causation, intentional action, skill, and knowledgeable action.
A bit about me:
I am an Associate Professor in the Philosophy Department at Carleton University.
I am also a Global Scholar in the Canadian Institute for Advanced Research's Azrieli program on Mind, Brain, and Consciousness: https://www.cifar.ca/research/program/brain-mind-consciousness.
I am also a Senior Fellow at the LOGOS research group at the University of Barcelona, and the Principal Investigator on the project Rethinking Conscious Agency, funded by a 1.06 million Euro grant from the European Research Council. See the project website for more info:
In the past I have been a Wellcome Trust Research Fellow at the Oxford Uehiro Centre for Practical Ethics, and a Junior Research Fellow at Jesus College, Oxford.
My first book, Consciousness and Moral Status, was published in 2018 by Routledge. In it I offer an account of the value of phenomenal consciousness. Free pdfs of it here: https://www.routledge.com/Consciousness-and-Moral-Status/Shepherd/p/book/9781138221611
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655896374.33/warc/CC-MAIN-20200708031342-20200708061342-00096.warc.gz
|
CC-MAIN-2020-29
| 1,289
| 7
|
https://www.friyey.com/community/
|
code
|
For Early Stage Startups & MVP
Friyey is selecting 5 Early Stage Startups (with atleast MVP) to take a part in Community Mentoring.
These sessions will be Online presently & post covid we will schedule these in Friyey Spaces, fortnightly .
- Each Startups share their details in a separate closed group where best mentors from Startup Ecosystem also part of the group
- On community mentoring day, Every startup suggest, guide to remaining 4 startups in pre-define program structure (Like you are dating one-one)
- Also Inputs to each startup from well known Startup mentors & founders.
- Friyey act as moderator.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402101163.62/warc/CC-MAIN-20200930013009-20200930043009-00171.warc.gz
|
CC-MAIN-2020-40
| 613
| 7
|
https://serverfault.com/questions/954358/how-to-prevent-git-client-hanging-during-post-receive-hook
|
code
|
I have a Git repository that contains a collection of config files and python scripts.
On the server repository, I have a post-receive hook that will:
- checkout the master branch,
- setup a python virtualenv,
- install the pip requirements,
- and run some scripts
#!/bin/bash while read oldrev newrev ref; do branch=$(git rev-parse --symbolic --abbrev-ref $ref) if [[ $branch == "master" ]]; then echo "Ref $ref received in branch $branch" echo "setup..." cd /srv/repo.git git --work-tree=/opt/work-dir checkout master -f cd /opt/work-dir echo "install virtual environment..." > "setup.log" python3 -m virtualenv venv >> "setup.log" echo "activate virtual environment..." >> "setup.log" source venv/bin/activate >> "setup.log" echo "install requirements..." >> "setup.log" pip install -r requirements.txt >> "setup.log" echo "done." >> "setup.log" echo "run scripts..." python source/some_script.py --param=value else echo "Ref $ref received, in branch $branch" echo "no action needed." fi done
All of this works fine, but the Git client hangs while the hook is running and will remain like that until I manually cancel. To be clear, the server-side hook does complete successfully, but the client stops logging part way through.
I am aware that I can fix the hanging issue by moving the python setup and execution to a separate bash file and using
disown so that it will continue executing once the terminal closes. However, this would require that I log the result of the script execution separately rather than having it display in the git push log.
- What is causing the git client to hang?
- How can I monitor the status of the script executions in the git client, without it causing the client to hang?
If I simulate a push by calling the post-receive hook manually, the hook will complete successfully.
hooks/post-receive <<MARK 09998130e13827a097797ff2fd3a973e91665960 fcb0b23a62f47bb73d6ccf2e6bfce324a04eeace master MARK
I have inspected the child-processes for the hook to see if something isn't exiting properly. As far as I can tell, all child processes exit fully before the parent script continues.
ps auxf after every command in the post-receive hook to see what the process tree looked like, and it always returned:
root 711 0.0 0.3 95184 6812 ? Ss Feb16 0:00 sshd: username [priv] username 720 0.0 0.2 95184 4660 ? S Feb16 0:04 \_ sshd: username @pts/1,pts/0,pts/2 username 725 0.0 0.1 19892 3712 pts/0 Ss Feb16 0:00 \_ -bash root 842 0.0 0.1 49484 3676 pts/0 S 02:49 0:00 | \_ sudo -i root 843 0.0 0.1 19940 3768 pts/0 S 02:49 0:00 | \_ -bash root 4616 0.0 0.1 50892 3428 pts/0 S 13:59 0:00 | \_ su - git git 4617 0.0 0.1 19920 3752 pts/0 S 13:59 0:00 | \_ -su git 5108 0.0 0.1 11256 3016 pts/0 S+ 17:26 0:00 | \_ /bin/bash hooks/post-receive git 5130 0.0 0.1 38456 3328 pts/0 R+ 17:27 0:00 | \_ ps auxf
The nest is large because I am logged in over ssh, and sudo'd to root, and then su'd to the git user... but the important part is in the last two lines.
Process of Elimination
I have identified the line that causes the hang:
python3 -m virtualenv venv >> "setup.log"
If I remove this line from the hook, and setup the virtual environment manually before pushing the update, then the push will complete successfully.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141189038.24/warc/CC-MAIN-20201127015426-20201127045426-00602.warc.gz
|
CC-MAIN-2020-50
| 3,238
| 22
|
https://boyhoodstudies.com/11u-Order-Ambien-10mg-Online-Legit
|
code
|
Tadalafil is> 10,000-fold more potent for pde5 than for pde3, an enzyme found in the heart and blood vessels.this order zolpidem 10mg online ireland selectivity for pde5 over pde3 is important because pde3 is an enzyme involved in cardiaccontractility. The ventricles contract to a smaller size, that is, they emptythemselves much more completely than they normally do. In this position, the terminal methyl groups of thehydrocarbon tails are in contact with the hydrophobic particlesurface and the hydrocarbon tails are in lateral contact witheach other. Chlorpromazine wasoriginally synthesized as an antihistamine but was found to beuseful as an antipsychotic. (3 mins., 2-8 nuns., 3-5 drops three times daily, after meals.liquor potassii arsenitis (u.), liquor arsenicalis (b.), fowler'?solution, contains 1 per cent, of arsenous anhydride rendered alkaline withbicarbonate of potash, to which compound tincture of lavender is added to givecolor and flavor., 2-8 nibs., 3-5 drops three time?daily, after meals.soda arsenas (v.) (naihas0 4 +7h a o) forms colorless, odorlesscrystals, very soluble in water, with a mild, alkaline taste. Aspartame∗, crospovidone nf, fd&c red no. Of the carbonatein the course of 335 days, although a considerable cheap ambien 10mg uk amount of order ambien 10mg online legit the metalhad been absorbed.in workers exposed to zinc fumes a condition known as brassf ounders'ague is occasionally met with. The increase in the blood pressure is due to the augmented force of the heart buy generic ambien online canada plus contraction of the peripheralvessels. At present the efficiency of the preparations of the glands can1 baumann believed that the active principle was thyroiodin, or iodothyrin, which heobtained by the digestion of the gland; but this is not a definite substance, but a mix-ture of peptides combined with iodine, and does not order ambien 10mg online legit possess the whole specific order ambien 10mg online legit action ofthe gland extracts.only be measured by the amount of iodine present, and this varies agood deal in different animals and in different individuals of the samespecies. Bioanalytical chemistry that develops and validates generic ambien buy online new methods ofanalysis for the determination of the drug and its metabolites in bodyfluids and tissues. Nocturnal penile tumescence is diminished in depressed men. Inisolated heart experiments, this drug is found to relax the heartcontracted by digitalin.summary of the group kctlo.— at first, where to buy zolpidem florida dilatation ofthe superficial blood vessels with blushing of the face and neck, later,dilatation of order ambien 10mg online legit the internal vessels, with fall of blood pressure. It is alsoexcreted in the urine in some organic combinations, of which nothingis known, though they are said to be volatile. When a moleculeis found to bind to a welldefined target that is known to be functional in pathways that lead to disease, the identified molecule may potentially be developed into a drug to treat the disease. The cheap ambien online visa east indians claim, that under itsinfluence they are thrown into a sleep accompanied by the mostdelicious erotic dreams, but the caucasians experience only asa rule a general feeling of comfort and wellbeing and rarelydelusions. According to a 2010 update by the americanheart order ambien 10mg online legit association (aha), the death rate for cardiovascular dis-ease fell 28 percent between 1997 and 2007.4cancer medicinesare moving from cytotoxic agents to cytostatic agents, but thereis still much work to be done in this complex area cheap zolpidem 10mg no prescription of cell signal-ing and rampant proliferation. Ricin seems to be excretedby the intestinal epithelium, which may explain the violence of its action here,although it acts as order ambien 10mg online legit a poison in many other tissues. Nevertheless, therehave been no reports of renal injury in humans receiving sevofluraneanesthesia. So, they frequently do without the warmth, comfort and emotional support often more available to women. An example is acetamino-phen (paracetamol)-induced hepatotoxicity (figure 4-5).acetaminophen, an analgesic antipyretic drug, is quite safe intherapeutic doses (1.2 g/d for an adult). When cipro order ambien 10mg online legit xr, cipro tablets, and cipro oral suspension are prescribed to treat a bacterial infection, patients should buy cheap ambien online legitimate be told that although buy ambien from online it is common to feel better early in the course of therapy, the medication should be taken ordering ambien exactly as directed. It is not possible to determine whether these events are related directly to the pde5 inhibitors, to other diseases or medications, to other factors, or to a combination of factors. Diseases (such as thyroid disease) or certain injuries can cause hormone imbalances. Web sites claim order ambien 10mg online legit to be selling, but instead order ambien 10mg online legit order ambien 10mg online legit deal in counterfeits. order ambien 10mg online legit Whether you're feeling the tingle that indicates a cold sore is coming, or you already have one, use Zovirax Cold Sore Cream. Some differences can be predictedon the basis of age, weight, sex, disease state, order ambien 10mg online legit and liver and kidneyfunction, and by testing specifically for genetic differences thatmay result from inheritance of a functionally distinctive comple-ment of drug-metabolizing enzymes. In drug development and inclinical medicine, selectivity is usually considered by separatingeffects into two categories: for a typical gelatin,10 percent solutions acquire yield values and begin to order ambien 10mg online legit gel atabout 25°c, 20 percent solutions gel at about 30°c, and 30 percent solutions gel at about 32°c. Consequently, antibacterial therapy should not beused indiscriminately.a distinction is conventionally drawn between bactericidaldrugs that kill bacteria and bacteriostatic drugs that preventtheir reproduction, elimination depending on host defence(table 43.1a). To ćemo napraviti koristeći različite analitičke metode kojima ćemo proučiti okruženje i definirati što sve trenutno utječe na našu organizaciju. Ed tablet that you can take every day, but that doesna?t mean it will cost more than 36-hour taken as needed. Vomiting occurs when theacid or the sajts are given by the mouth. Smoking, poor diet, and lack of exercise all can lead to the vascular problems or diseases that can result in impotence. Nonclinical order ambien 10mg online legit pharmacology, pharmacokinetics and toxicology data with acritical assessment of the efficacy and the safety of the drug product. These effects are probably due to generalprotoplasmic poisonous action of cocaine, because it also stopsthe movements of leucocytes, spermatozoa and certain vegetablecells, as does quinine.the body temperature is raised, perhaps by some action onthe heatregulating mechanism.when cocaine is taken over a period of time, a order ambien 10mg online legit habit is formedas with morphine, and a craving for the drug is developed. In large quantities this mixture acts as a salinecathartic; in smaller quantities it may order ambien 10mg online legit be used to increase the alkali of theblood, and to render the urine less order ambien 10mg online legit acid.lime juice and lemon juice, which contain considerable amounts of freecitric acid, are generally preferred to the pure acid for lemonades to quenchthe thirst. The secretion of lymph is not altered by atropine,so that it is probably not controlled by nerves in the same way as thetrue secretions.all organs containing unstriped muscle (apart from the arterial wall)seem to be altered by atropine. The physicochemicalproperties of the active compound order ambien 10mg online legit are determined, and devel-opment of the drug delivery system to be used in human testingbegins. An analysis across sexual activities using multiple sources of information. The spleenis diminished in size when pathologically enlarged in malarialfever. Do buy zolpidem tartrate uk not take the drug if you suffer from hepatic or renal impairments. In the same way compounds of themetals with ethyl and methyl, such as lead triethyl, have an actionquite different from that of lead, as long as they remain undecomposed inthe tissues, but eventually induce metallic poisoning, as they are brokenup into bodies from which the lead or lead oxide ion can be dissociated.the action of the heavy metals consists of two parts, the local effect sinduced at the point of order ambien 10mg online legit application, and the ge neral effect s whichfollow the absorption of the poison into the order ambien 10mg online legit blood and order ambien 10mg florida tissues. Lead vapparently absorbed more rapidly than most of the metals exceptmercury, and order ambien 10mg online legit remains lodged in the tissues a long time, the excretiontaking place only very slowly. Inthe same way strong stimulation of m by muscarine overcomes the stimulation of c bycocaine, while, on the other hand, when m is paralysed by atropine and the circularfibres are thus thrown out of action, the radiating muscles are unopposed and cocainecauses a greater dilatation than in the normal order ambien 10mg online legit eye.tion, but in this case are prevented by previous section of the cervicalsympathetic. Pylorihas been shown to reducethe risk of duodenal ulcer recurrence.(see clinical studies and dosage andadministration.)dual therapy:amoxil/lansoprazoleamoxil, in combinationwith lansoprazole delayed-release capsules as dual therapy, is indicated for the treatment of patientswithh. Interaction between penile reflexes and copulation in male rats. Consequently, caution should be exercised before considering concurrent administration of these drugs. A stable emulsion can be redispersed homogeneously to itsoriginal state with moderate shaking and can be poured at anystage of its shelf life.
The main usage of Xanax is to control the anxiety disorders, panic attacks and anxiety caused by depression. For all the patients or individuals who . . .
Xanax is a substance that should be intake after the prescription of the doctor. It provides the treatment of anxiety and panic attacks to the . . .
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107897022.61/warc/CC-MAIN-20201028073614-20201028103614-00006.warc.gz
|
CC-MAIN-2020-45
| 10,357
| 3
|
https://www.pcmag.com/feature/228582/ecipher-pro
|
code
|
When eCipher Pro is running this small toolbar floats on your desktop. By default it docks at the top left corner but you can move it wherever you like.
To make sure you're only getting encryption keys for your own email accounts eCipher requires that you enter an activation code it sends to the specified account.
You can enter your contacts individually in the separate eCipher contacts list or you can export them from Outlook and import them into eCipher.
If your imported list of contacts includes duplicates of existing contacts you will have to click the Yes button for every single duplicate.
The product's built-in message editor offers rich text features like changing fonts and colors and inserting pictures.
Since the recipient has to read the message through eCipher it's possible to impose significant restrictions on just what they can do with the message. Specifically you can prevent them from copying it to the clipboard, saving it, printing it, or forwarding it to others.
Just drag files onto the message to attach them, or click the Attach button and browse.
eCipher integrates with Microsoft Outlook's Compose window, adding a small toolbar.
Once you choose the Send Secure option you can also check off any additional restrictions to be imposed on the recipient, just as when using the program's own message editor.
Received a Secure Message
Your encrypted message gets packaged up as a file with the extension .SAFE. The recipient gets a plain text message that explains how to obtain eCipher Free and decrypt the message.
On launching the .SAFE file attachment you can read the secured message inside eCipher's View File window. Depending on the sender's restrictions you may find the Save, Print, and Forward buttons disabled.
Long messages are broken up into pages for display; a navigation pane lets you quickly select a particular page.
As you send replies back and forth, eCipher Pro stores the previous messages in the thread individually (you can see them at the bottom of this screenshot).
The program doesn't default to launching at startup, but you can change this and several other simple settings here.
By default eCipher sends messages using whatever email client is registered as the default. You can choose to have it use a supported web-based e-mail account instead.
Configure Web-based Mail
To use a web-based e-mail account eCipher needs the SMTP server and port address supplied by the account provider. Some, like MSN/Hotmail and Yahoo! Free, do not permit this type of access.
Users of eCipher Pro can register all of their email accounts for use with the program; those using the Free edition can only register two.
For additional security you can configure the program to require a password each time you encrypt or decrypt a message.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027321786.95/warc/CC-MAIN-20190824214845-20190825000845-00420.warc.gz
|
CC-MAIN-2019-35
| 2,783
| 20
|
http://www.easypano.com/forum/24/3027.html?page=1
|
code
|
hello users. I have been around long enough to know how to do this, but I am looking for detailed instructions on how to convert mp3 into au files using Audacity. I am missing a step somewhere and cant get the music to play. If detailed instructions have been addressed previously, please post a link. I once was able to do it, and converted around 15 songs, but am looking to freshen up my music, and have forgotten the steps.
Any help is Much appreciated.
p.s. Note to easypano. I want to get on my soapbox for a second.
I know the new version allows multiple music formats, but I havent upgraded just yet. One major reason for my lack of upgrading is due to the fact that I have been a registered user from the beginning, a supporter from the beginning, and one of the reasons (all-be-it small) for the success of the product, and felt like I should have been one of the users to be allowed to test the newer version(s) and get the complimentary license upgrade. Maybe I am wrong in my thinking, but I remember a time when there was only 7 or 8 of us registered on this forum, and promoting the product in other forums. I believe in taking care of those that took care of you...and now stepping off my soapbox
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593004.92/warc/CC-MAIN-20180722022235-20180722042235-00106.warc.gz
|
CC-MAIN-2018-30
| 1,212
| 4
|
http://nugetstatus.com/packages/AF.AuditTrail/1.0.7
|
code
|
- This component can keep complete history of data starting from creation of the Record to Deletion. The component also provide insight of Data changes, i.e who modify, what modify. Click on Project Site link to get Step by Step implementation guide.
- View on NuGet: http://www.nuget.org/packages/AF.AuditTrail
Here are the packages that version 1.0.7 of AF.AuditTrail depends on.AF.DataAccessor : (1.0.6)
Installing with NuGet
PM> Install-Package AF.AuditTrail
Packages that Depend on AF.AuditTrail
No packages were found that depend on version 1.0.7.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746800.89/warc/CC-MAIN-20181120211528-20181120233528-00171.warc.gz
|
CC-MAIN-2018-47
| 553
| 7
|
https://www.networkingsignal.com/which-information-does-a-traditional-stateful-firewall-maintain/
|
code
|
Which Information Does a Traditional Stateful Firewall Maintain?
- A stateful firewall keeps track of all incoming and outgoing traffic and compares it against a set of predefined rules. If the traffic does not match the rules, it is blocked.
- A stateful firewall can also keep track of different types of traffic, such as UDP or TCP, and allow or deny based on that information.
- A stateful firewall can keep track of different connections and allow or deny them based on the connection’s state.
Can we use Stateful Firewall with Proxy Firewall?
Yes, the stateful firewall can be used in conjunction with a proxy firewall. In fact, many next-generation firewall devices incorporate both stateful firewalling and proxy functionality. By using a stateful firewall in conjunction with a proxy firewall, you can take advantage of the benefits of both technologies.
A stateful firewall is often used to complement a proxy firewall because it can provide more granular control over traffic.
- For example, a stateful firewall can allow all traffic that is part of an established connection but block all traffic that is not part of an established connection.
Can Both Stateful and Stateless Firewalls use to Track Traffic?
Yes, both stateful and stateless firewalls can be used to track traffic. A stateful firewall keeps track of all incoming and outgoing traffic and compares it against a set of predefined rules. A stateless firewall only looks at the header information of each packet to make its decision.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474569.64/warc/CC-MAIN-20240224212113-20240225002113-00536.warc.gz
|
CC-MAIN-2024-10
| 1,509
| 10
|
https://www.gravitywell.co.uk/latest/how-to/posts/the-good-the-bad-and-the-ugly-cvs
|
code
|
The Good, the Bad and the Ugly: CVs
It seems to be that time of year where CVs are flooding our inboxes thick and fast, and although there's plenty of great ones, it's reasonable to say we see some pretty questionable ones too.
Whereas some could be promising with just a bit of tweaking, there's also the CVs where I’m not sure how anyone thought it was an acceptable thing to send to a potential employer.
I appreciate it's a tiresome process, so whether you’re dusting off and updating yours for a career move or this is the first rung on the job ladder, here’s a handful of things that we regularly see in CVs and covering letters that can be real turn-offs for us at Gravitywell (and like-minded employers!)
Plus a few gentle nudges on how to combat them.
You’re human and it’s easy to overlook the odd one staring you in the face (there's probably half a dozen in this post alone), but when your CV is riddled with them, it gives the impression that you’re careless and haven’t taken the time to read your own work. It also then debunks your claim in the opening paragraph that says you're vigilant and take great pride in your work.
What can I do?
Granted you may be in a rush trying to reach a deadline, but if you’ve got time then don’t be too proud to get someone to check over it for you - another pair of eyes can be invaluable. Alternatively, if you can, revisit it a few hours later after a break. If you are under pressure, I find it’s far easier to pick mistakes off a printed page rather than reading from your screen.
Ccing other companies into your email
So you say in your cover email that you’ve admired us for quite some time and that you love the way we build websites. That’s all well and good but we can see you’ve said the exact same thing to every other vaguely relevant company in a 10 mile radius.
Plus, the fact that you’re applying to a digital agency and don’t know the difference between using Cc and Bcc in an email is somewhat of a concern.
Addressing your email to the wrong person, e.g. a totally different company
Again, if you’re copying and pasting bits of your cover email, that’s fine - just don’t make it glaringly obvious that you’re doing it by accidentally pasting the wrong recipient.
Please note: You will be called out on it!
This is a bonus that follows on from the two points above: it irritates me when we receive emails that just say ‘Hello’, ‘Dear Sir or Madam’ or ‘To whom it may concern’.
What do you suggest?
I understand in some circumstances this is necessary or acceptable for certain companies, as people can be cagey about personal info, and rightly so. But if you can, try to always address it to a person or at the very least the company as a whole - it shows me that you’ve had the initiative to look at our team page and taken the time to go through our website.
If in doubt, look at social media or (dare I say it) LinkedIn to find out names. Failing that, address it to the company or the title of the most relevant person or department you can think of e.g. ‘for the attention of the creative director and/or the design team’.
It’s too long
You’ll have heard this a thousand times but having received a 14 page CV before (which was purely text by the way - without literally an inch of whitespace) I can’t stress enough that unless your life story is truly spectacular then you're not going to hold our interest after a couple of pages.
The phone has rung, I’ve been asked to do something, a client’s emailed me: I’m not concentrating anymore and I probably won’t go back to revisit it.
How do I combat this?
It can be difficult but you need to cut the fluff out:
- state 'references on request' if you can't provide contact details in the CV
- provide the most relevant aspects of your experience to the job you're applying for - such as your knowledge and practical use of different technologies, your previous agency and in-house experience
- explain how previous projects you’ve worked on or clients you’ve worked with are relevant to the job
Cherry-pick and be concise. Consider whether or not your trip to Cambodia to look after monkeys is really more relevant than evidence of your ability to work as part of a small team.
If you’ve got more to show - fab! Link me to blog posts, articles, social media and your github. Attach portfolios, concept and example work, but please keep that CV to two pages max!
Remember: Keep it concise and link to / reference / attach anything additional that you want included.
Of course we want to get to know about your personality! We’re not looking for robots to churn out work and we want to know if you’ll be a good fit for the team - but it also doesn’t help if that’s the only thing you talk about.
Regularly we receive CVs that manage to do the impossible; they tell us everything and nothing about you. For example, I know you were student ambassador of pub crawls which was incredibly fun and helped you grow as a person but I don’t know what your degree was in, what uni you went to and what your uni experience did to help prepare you for the job you’re applying for.
How do I get the balance right?
A short paragraph is fine, or show me more in a cover letter and / or accompanying materials if you prefer.
What I don't need is a detailed outline of every thought you've had, every action, every experience up until this point. What I do need is all the highlights that are relevant to how you're qualified for the position we’re advertising.
This is the one I feel the most passionately about!
I don’t know who started it or who suggested to a generation of creative people that it was a good idea - but using a pie chart or coloured circles to demonstrate your understanding of Creative Cloud, web technologies or anything to that effect is virtually useless. It tells me nothing.
It feels less like a neat and interesting way to convey your skillset and more like an attempt to crowbar in some illustration or infographics.
So please, for the sake of my sanity and my team’s, stop it.
What should I do instead?
If you can prove it then there is nothing wrong with saying something to the effect of ‘I have an extensive knowledge of Adobe's suite, with my main strengths in Photoshop and Lightroom'. Or simply list the technologies you have good experience with. You might feel that’s vague but I can gauge your confidence and competence much more easily. It might ignite enough interest to want to interview you and find out more.
If you still want to use percentages then that’s fine as long as you provide some context. E.g. I scored 98% in a PHP competency test set by [...] / recognised by [...]'.
Some bonus CV tips:
Don’t make bad jokes - do so at your own risk.
Don’t give your job title a gloriously vague name e.g. You’re not a digital nomad, you’re a developer that wants to work remotely. This is also applicable to names to the effect of: creative guru, pixel wizard or agile sensei.
Don’t include personal photos - It’s a CV, not a scrapbook. Again this is not applicable to additional materials e.g. social media, blogs, portfolios.
Do have a github - if you’re a developer and don’t have a github account (or one that you’re keeping up to date), what are you doing?!
Don’t lie about your competency - if your skills need work or you’d require some training; just say. We’d much rather you were honest and chances are we or someone else may be able to offer you the opportunities to learn. Otherwise we will suss you out pretty quick in an interview.
Do sell your USP - show us where your strengths and specialities are and demonstrate this with your work!
All the above being said, don't get to thinking we don't want to recieve your CVs. As well as loving the fact you'd want to work with us (and that you're giving us the opportunity to work with you!), we just want to help you hit all the right notes and ensure you're not overlooked because of some silly and avoidable mistakes. We're always looking for talented candidates to join the ranks and get involved.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202698.22/warc/CC-MAIN-20190322220357-20190323002357-00465.warc.gz
|
CC-MAIN-2019-13
| 8,128
| 49
|
https://mail.python.org/pipermail/python-list/2007-March/434247.html
|
code
|
newbi question on python rpc server, how it works?
lbates at websafe.com
Wed Mar 28 21:04:00 CEST 2007
krishnakant Mane wrote:
> searched a lot of places including google search but can't find
> answers to python-rpc. I am also very new to rpc. I am very clear
> about its meaning and where it is to be used, but not about how it is
> I have a need where I need to create a layer of business logic that
> will connect to mysql database at one end and a wxpython based thin
> client at the other end.
> can some one give me basic idea as to how I can use simple xml rpc
> server class of python and build an xml rpc server and then a client
> which I can embed in my wxpython based thin client?
> as I said I am not aware of how xml rpc works in details.
> I want to creat the wxpython client app in such a way that it only
> does the work of validation and display and only sending the data as
> is to the xml rpc server for logic and then xml rpc server will
> inturn talk to mysql.
> my business logic consists of many classes which I want to put in a
> package directory with __init__.py and all the other modules.
> do I need to create all of them as xml rpc server instances or can I
> use them into one single xml rpc server class?
> at the other end I am not really understanding how the xml rpc client
> can be used to get data in to my wx based gui?
> for example I want to fill up a list box with data that came from the
> rpc server to the client and then some how looping through the
> elements sent over and putting into a list.
I'm no expert, but maybe I can get you started.
If you understand how a SQL database works you can extend that knowledge
to RPC. You make queries to the RPC server and it returns responses.
The format of the queries/responses is "normally" XML, but I'm pretty
sure you could invent your own if you wanted to (probably a bad idea).
Basically you define an API (like SQL queries define their API) that is
used by the clients to make requests, update information, retrieve
You probably should take a look at Twisted module. It does XMLRPC with
just a few lines of code and also would scale well as you have many
users talking to the server. Download Twisted and take a look. You
might also want to pick up a copy of "Twisted Network Programming
I'll bet it will be worth the purchase price if you choose to go this
More information about the Python-list
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537804.4/warc/CC-MAIN-20140416005217-00575-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 2,392
| 40
|
http://www.techspot.com/community/topics/need-help-installing-windows-xp-home.145586/
|
code
|
Hello, i am trying to reinstall windows Xp home edition onto my brothers computer but it keeps saying the Cd key is invalid?. I am using the CD key that is on the legit sticker on the side of his tower ( iv double and re-doubled) that iv typed it correctly with no use. I dont know if this matter but im using my Dad's Home edition CD with my brothers code. Reading some of the posts could it be that my dads CD is a original release CD ( from years ago) and the CD key is recent? if so is there a fix ?
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719033.33/warc/CC-MAIN-20161020183839-00494-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 503
| 1
|
https://support.estos.de/en/release-notes/procall-meetings-release-notes/procall-meetings-1-1-3-release-notes
|
code
|
ProCall Meetings 1.1.3 was released as a maintenance release.
ProCall Meetings 1.1.3
- A new status page on ProCall meetings has been introduced: https://status.meetings.procall.de/
Maintenance windows, outages, software releases, changes to the infrastructure, etc. are communicated via this. There is a possibility to subscribe to changes and thus always react to current events.
- The tooltip for names within a meeting (e.g. in the participant list) now displays more information about the participant.
- In a PIN-protected meeting room, you can now also view and copy the PIN during the meeting using the "Share link to this meeting" function.
- There were many minor improvements and many minor bugs within a meeting were fixed.
For example, it is now possible to change the output device directly via the toolbar on the microphone button, if the browser allows it.
- HOTFIX Resolved an issue where a TURN server was not provided and therefore there were media transfer issues in very restrictive environments.
- HOTFIX Resolved an issue where the uBlock adblocker blocked the cookie disclaimer dialog for certain filter lists, which prevented you from using ProCall Meetings.
- Problems were fixed that e.g. participants were no longer automatically guided from the lobby to a meeting that had been started. Or that participants were distributed to the wrong servers and therefore (with the same meeting URL) joined meetings separately from other participants.
- Meeting participants who are low on resources such as bandwidth or CPU power will no longer be removed directly from a meeting when a connection is lost and then reconnected, but will now remain in meetings longer.
In general, there will be fewer connection drops within a meeting. However, please note the following if you experience further problems: I keep having connection difficulties during a meeting
- Fixed problems with screen sharing. Screen sharing was often aborted or could not be established.
Various improvements have been made to the stability of screen sharing in this context.
The IP addresses to the services have not changed: Hostnames and IP addresses of online services for firewall configuration.
Known problems and limitations
ProCall Meetings known problems and limitations →
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476374.40/warc/CC-MAIN-20240303111005-20240303141005-00446.warc.gz
|
CC-MAIN-2024-10
| 2,273
| 18
|
https://powerusers.microsoft.com/t5/I-Found-A-Bug/Populate-and-Microsoft-Word-Template-Error-for-some-not-for-all/td-p/235827
|
code
|
@Laskewitz may be the man for this but here is some detail.
This works for me in my tenant but there are several posting in the Forum reporting issues, please see links below:
This seems to be working now but only if you pick the file manually from the file browser.
In my case when you pick the input for File is set to /test.docx
If you pass /test.docx from variables it does not work.
I have tried to create a simple flow action to convert a SP Word document to PDF, but stumbled upon this.
I used the standard template for Microsoft Flow to perform an action "for a selected document".
It fails at the "Convert to PDF" step 100% of the time.
Check out the announcement of Power Platform content at Microsoft Ignite!
Join us for an in-depth look at the new Power Automate features and capabilities at the free Microsoft Business Applications Launch Event.
Features releasing from October 2020 through March 2021
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400213454.52/warc/CC-MAIN-20200924034208-20200924064208-00470.warc.gz
|
CC-MAIN-2020-40
| 914
| 11
|
https://www.embraceyouweightloss.com/product-page/embrace-you-meal-planning-solution-guide-2021
|
code
|
6 Solutions to Fix Your Meal Plans eWorkbook + Course
Does this sound like you?
✅ You buy groceries, and they spoil.
✅ You made the meal, but no one liked it.
✅ You want to meal plan, but you don't have the time.
✅ You know deep down that your meal plan is broken, but you don't know how to fix it.
In this interactive e-book and video course, we "diagnose" your meal plan problem (AKA obstacle), and we "treat" it with proven solutions (aka opportunities). Together we'll transform your meal plan obstacles into your opportunities for enjoyable, consistent meal plans that fit your life.
This is NOT just another list of recipes and a meal calendar. It's your solution to your meal planning challenges.
Your 6 Solutions Meal Plan Video Course & eBook includes
6️⃣ Easy to Follow Meal Plan Strategies videos to Breakthrough obstacles like: Time, Talent, Taste Preferences, Family meal planning & More.
6️⃣0️⃣ Page interactive eWorkbook with
1️⃣1️⃣ Yummy, flexible recipes for ready in 15 min meals. Recipes are plant based with suggestions for meat pairings to please a range of eating preferences.
5️⃣Page Quick Guide for easy assess to video content
7️⃣ Day Sample Meal Plan with convenient shopping list
1️⃣0️⃣ Busy Day Meal List
& much more
2️⃣0️⃣2️⃣2️⃣ is your year to breakthrough your meal planning challenges
Use each strategy to create your meal plan that works for you. So you are worried about
- “What am I going to eat today?” Or
- “How did I end up at the drive through again?”
- “I don’t feel like eating what I made”
Worry, no more! You’ll know what to do when you encounter your meal plan obstacles because you'll have your strategy to win🙌🏾
It's time to stop doing what "they" do & Embrace You to your consistent, enjoyable meal planning.
PDF & Video Course
Special Offer 2/2022
First 20 people Complimentary Assess to VIP Q & A Session with Dr. Sylvia. While Supplies Last.
Non-refundable. But you can send an email with your questions. This is created to help you BREAKTHROUGH!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475203.41/warc/CC-MAIN-20240301062009-20240301092009-00160.warc.gz
|
CC-MAIN-2024-10
| 2,078
| 27
|
https://appsource.microsoft.com/en-us/product/office/WA104379402?tab=Overview
|
code
|
by ScienceSoft Inc.
Display current weather in 1 or several locations
The Weather Vibes add-in will let you stay tuned into weather conditions around the world. As a part of your SharePoint solution, the add-in will display the current weather in a selected location. The Weather Vibes add-in shows temperature, wind speed, humidity and visibility in a particular location. If multiple locations are set, the add-in will show the current, maximum and minimum temperatures for each of them. The add-in can show weather information across up to 10 locations. Users can see the weather in the Private or Public mode, as well as view various city suggestions.
Learn more about our SharePoint services and find the examples of successful projects on our SharePoint consulting page https://www.scnsoft.com/services/sharepoint-consulting.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100227.61/warc/CC-MAIN-20231130130218-20231130160218-00346.warc.gz
|
CC-MAIN-2023-50
| 831
| 4
|
https://www.fi.freelancer.com/job-search/help-me-find-a-job-i-am-an-advanced-graphic-designer-and-marketing-guru/
|
code
|
Make this photo better please Please make it look like I am laying on a sun bed next to a pool. So I look attractive. And the weather looks sunny. Thank you
I am developing a business portal for small business owners and have many objects (tools) that small business owners will use as part of this service. The design will include simple interactive visuals so that business owners can drag and drop words or images to help populate various questions. Databases, real-time video conferencing appointments
i have a few documents which need to be converted into editable word document in the same format. It contains some diagrams, flowcharts and tables too. only an advanced OCR software is to be used. Free websites like smallpdf, copy2doc etc will not work. So only those with premium access to OCR software can work on this. We can discuss more on chat.
Agency looking for a digital marketing guru. You are someone that loves to create a campaign and execute with ROI in mind. You see every angle and know how to improve and manage a project. Must have 5+ experience in ad agency world and proficient in English.
Our agency is looking for a Email Marketing guru who can create drip sequence and has a proven track record of success. Must be proficient in English and have 5+ years at a social media or ad agency.
Hi everyone I am looking for Yii framework expert. I need to finalise a project, which can be found here. [kirjaudu nähdäksesi URL:n] I have most of the Entertainer profile complete (please see video). This will need to have the Package Creation System finalised (create a package, show packages on the package page, etc.), along with the
I need a fluent English Speaker to change English documents into the following languages. French/Italian/Spanish/Ukrainian/Romanian Are you good at above languages? I need you to convert into the above languages. My Budget: 1500$ Timeframe: 3 days Right Candidates: Students or fresh Graduates (who live in the USA and Europe) Good luck!
Project requirements : Customized website Multivendor portal Master admin panel.
Need Logo Designer For services based Business ( Handyman). Business name: Fix Guru. The logo will be trademarked, so provide only unique designs. Please do not provide common logos which I can get easily for logos making websites online. Selected company/individual will be provided all future work like business card design, merchandise design
I need this same results [kirjaudu nähdäksesi URL:n] using this [kirjaudu nähdäksesi URL:n] your job is to install the module and acquire the same results on google
If you can speak in English, it is enough for me. If you have some Web Development skill, it would be plus, but not required. But, you have to honest and faithful, although you are new freelancer. It is long-term position, not one-time. Also, you have to be a individual Man, not agency. Thanks. Cheers!
I am looking people who know ''professional tourism needs' and write these things '
If you did not work before in tourism area please do not bid...
If you have experience, it is possible to work with you for the contents.
I pay each content 0,50$
There will be no extra earnings, no hourly project!
I choose an hourly project because
Hello i need to Please build a recruitment dashboard based on open vacancies for different depertment. • Channel Support • Sales • Vendor Management I need the data to roll up to a summary tab into a dashboard
Advanced Facebook retargeting Facebook ad strategy to get sales must have his own Facebook Account to run campaign thanks
All, I am searching for a VBA expert programmer who can build an advanced excel workbook that will track maintenance on a group of equipment. Please only contact me if you have advanced skills and and a critical problem solver. This will be a challenging project and I will be working along with you ...
I have a list of websites from which i want to identify the livechat option available or not. That's it. I need a program for that, so i can run myself, need to be completed in one day
I am .NET developer from last 8 years but still I am not perfect at backend. Always feel little nervous to create table structures with indexes, constraints and so on. and always face difficulties in writing good/productive queries to connect to my DB and get results. I feel like a i am at basic level only in SQL, ORAC...
Hi I am looking for someone already make sales on shopify store and share experience with me Thanks
I need a logo designed. I have a few words that I would like to have customly done
I need a logo designed.
We are building a messaging platform with direct messaging, group channel messaging, location sharing and emergency features, organizations with support chat, voice and vide calls, push to talk. Think Discord for consumers with organization support chat like in Whatsapp or Facebook Messenger. This platform also supports additional communication features
I need someone to submit some articles for me.
Are you fluent in both Spanish and English? Are you a Student? This job is possible to work from home full time, or part time. I have some books, you should translate from English to Spanish. Important: It is not a simple translation, but you should full understand the contents of these books and translate it.
Fishing Tshirt Graphic Designs
I am looking for a web developer to create accounting website like xero
We are a sales company that need an excel document to summarize sale reports. We have a current template that needs to be modified and simplified. We wish to communicate mainly through phone calls so good English skills is a requirement.
I need you to create many recipe videos. 1. Share 2-4 links of socially viral videos YOU have edited 2. Share 2-4 links of documentary videos YOU have edited 3. Your[removed by freelancer.com admin] (my team needs to test you and hire is only here) 4. What hours can you work uninterrupted? Can you work EST Florida time? We accept hourly bids of $3
...purpose > The program should: - take a sound device's input signal, eg a PC microphone - output the "volume" as ascii bars to the shell for a predefined time (eg 30 seconds) *in real-time* - "volume" here means the RMS (root mean square) of the pcm signal over a given number of samples N (that is v = sqrt(sum(s[i]^2)/N)) In...
Hello community, I am looking for a developer how can enhance permissions of an already existing application, in order for it to make use of Android System Admin APIs for a more detailed functioning of this particular app. The app scans the device for security flaws and needs Administrator rights to unleash its full potential. Without Admin rights
...someone to help with marketing and crowdsales We are looking genuine marketer who can promote our ICO and generate real revenue. Here is project details: We have developed a decentralize exchange! We want to do ICO so you need to promote our ICO and generate real revenue. You will get paid after success our ICO. You must have to have a good...
Hello, I am looking for an experienced PDF form Editor to do few small changes in my complex PDF form
Hello, I have 3 projects to be completed by the weekend I am constantly looking for a talented graphic designer to work with me. New freelancers are welcome.
I need a [kirjaudu nähdäksesi URL:n] Hindi language along
I have the existing python code in GITHUB, Requirement is to enhance the logic in this existing python [kirjaudu nähdäksesi URL:n] to set up this code from GIT on my local computer and update the logic using Spyder IDE and check in the code back into GITHUB. Skills: Python, Pandas Dataframes, Spyder IDE,GITHUB
I need someone who can create 3d art for me. Basically I make promotional items at times and need some 3D work done from time to time. This I need completed right away. The two attached files are pretty much what I need. There is a chocolate piece with a 3D bottle in it. I need this redrawn so that the result will be identical to the c...
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824059.7/warc/CC-MAIN-20181212155747-20181212181247-00135.warc.gz
|
CC-MAIN-2018-51
| 7,998
| 40
|
http://ec2-13-233-30-148.ap-south-1.compute.amazonaws.com/zoho-off-campus-hiring-fresher-for-software-developer-3/
|
code
|
Job Title : Software Developer
Job Type : Full Time
Location : Chennai
Experience : Fresher – 4 Years
APPLY LINK AT THE BOTTOM
free programming courses
- Introduction to Algorithms and Data structures in C++
- Python OOP : Object Oriented Programming in Python
- Learn Flutter – Beginners Course
- Portfolio Website with Node JS & Express
Role and Responsibility :
- Design and develop high-volume, low-latency applications for mission-critical systems, delivering high-availability and performance.
- Contribute in all phases of the product development life cycle.
- Write well-designed, testable and efficient code.
- Ensure designs are in compliance with specifications.
- Prepare and produce releases of software components.
- Support continuous improvement by investigating alternatives and technologies and presenting these for architectural review.
Education and Skills:
- Year of Passing: 2018 – 2022
- Total years of experience: 0 to 4 Years
- Last date of registration: May 18th
More Freshers Jobs:
- Zoho Off Campus Hiring Fresher For Software Developer
- Synopsys Off Campus Hiring Fresher For R&D Engineer
- Paypal Recruitment 2022 Hiring Any Bachelor’s degree for Data Analyst
- Hewlett Packard Enterprise Off Campus Drive
- Nielsen Off Campus Hiring Fresher For Analyst
- Oracle Job Openings for Freshers as Applications Developer
- Replicon Off Campus Drive 2022 for QA Engineer/Trainee Product Support
- Reliance Jio is Hiring Junior Software Engineer
- Bajaj Finserv Off Campus Hiring Fresher For Trainee Technology
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711552.8/warc/CC-MAIN-20221209213503-20221210003503-00138.warc.gz
|
CC-MAIN-2022-49
| 1,541
| 31
|
https://mail.xfce.org/pipermail/xfce/2006-August/018315.html
|
code
|
Xfdesktop Memory Leak
romuald.brunet at gmail.com
Mon Aug 7 10:05:45 CEST 2006
On 8/3/06, Timothy White <xfce.users at weirdo.bur.st> wrote:
> I noticed this arvo my memory usage had risen to a new record high!
> (Obviously a lot was swapped out). I can show you memory graphs if you
> want proof. I finally had a forced reboot the other day, so decided to
> update xfce from svn at the same time.... I checked out revision
> Upon investigating the memory usage, I discovered xfdesktop had
> swapped more than 1.1Gb out! Ick! Killing it has made my memory look
> much better!
> I think possibly the reason for the memory leak, might have something
> to do with how I am doing 'random' wallpapers. Because I don't logout
> (except when forced to, by xfce upgrades or reboot) I have a crontab
> entry that every 15 minutes runs 'xfdesktop -reload' or something
> along those lines, forcing a reload, and a new picture. I assume that
> xfdesktop is not releasing the memory it's holding the picture in, and
> so each time it loads a new picture, it doesn't remove the old ones
> from memory, or something like that.
> For now I have disabled xfdesktop, and when I get a chance, I will try
> and see why the memory is leaking. Otherwise, over to you guys!
Just a world to say I have the same problem here, using xfdesktop
184.108.40.206 on Xfce 220.127.116.11 (Ubuntu Dapper)
Except that I don't use random wallpapers and don't tell xfdesktop to reload :)
I kill and relaunch the process from time to time, to avoid it swapping to much.
More information about the Xfce
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710192.90/warc/CC-MAIN-20221127041342-20221127071342-00397.warc.gz
|
CC-MAIN-2022-49
| 1,564
| 26
|
http://old.floatingsun.net/2005/10/28/14-pages-of-fame/
|
code
|
Everyone has dreams of being famous, even if its the 15 minutes of fame.
Well, guess what. I happen to be one of the central characters in a [[http://forum.textdrive.com/viewtopic.php?id=6713&p=1|historic post]] over at TxD [[http://forum.textdrive.com/|forums]]. If you have some time on your hands, just go through that thread. Its already **14 pages** and still counting.
Its another matter that the thread is about all things Jason and TxD. I’m just glad to be part of the post that started it all :)
Whats amazing is that Jason is still on top of that thread. He’s answering //each// question. And people have //so many// questions. Its just amazing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657131545.81/warc/CC-MAIN-20140914011211-00341-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
CC-MAIN-2014-41
| 659
| 4
|
https://packages.debian.org/oldstable/python-omniorb-omg
|
code
|
Package: python-omniorb-omg (3.6-1)
Links for python-omniorb-omg
Download Source Package python-omniorb:
- Homepage [omniorb.sourceforge.net]
CORBA OMG standard files for python-omniorb
omniORB4 is a freely available Common Object Request Broker Architecture (CORBA) 2.6 compliant object request broker (ORB) implementation. It is based on the IIOP communications protocol and should be interoperable with any other CORBA 2.6 compliant ORB.
This package includes the Python files that are necessary to fulfil the OMG standard 02-09-07. It conflicts with python-pyorbit-omg since only one package can provide the default CORBA bindings.
Other Packages Related to python-omniorb-omg
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400188841.7/warc/CC-MAIN-20200918190514-20200918220514-00721.warc.gz
|
CC-MAIN-2020-40
| 680
| 8
|
https://sidetrade-tech-hub.medium.com/muse-models-but-faster-and-lighter-f000c89ad251
|
code
|
By Clément Chastagnol, Head of Data Science, Loïc Petit, Senior Data Engineer, and Jie Lu, Data Scientist at Sidetrade.
Are you a user of Facebook’s multi-lingual aligned word embeddings MUSE? If so, we have good news for you: you can now load them in your code 100x faster, with files that weight 5x less!
What about them MUSE models?
MUSE embeddings are somewhat magical, because they allow you to very quickly build multi-lingual models without having to use a translation model, since the vectors for individual words are aligned. To put things simply, it means that cat in English is represented by the same point as chat in French or gatto in Italian.
In our experience, the performance of the multilingual model, trained on a given language (say English), and applied to data in another language (say French), is not as good as a model directly trained on French data. However, it’s good enough for a first iteration and can be used to bootstrap the annotation of a better training set.
Yes, but can you make them load faster?
While optimizing some of our code making use of the MUSE pre-trained embeddings (which can be downloaded here for 30 languages), we were wondering at ways to speed up the loading time of the models. Each model weights 600 MB on disk and takes around 15 seconds to load.
After trying to modify the code provided by Facebook in the demo notebook without getting any significant gain, we realized that, rather than using the exact files from Facebook, we could change the file format to a binary format.
Since the data is in a space-separated values format, we immediately thought about using msgpack for efficient loading. We already have experience using the msgpack library in Python in our code, after discovering it in a very thorough blog post by Uber on data compression, which highlighted its impressive performance.
So our solution is very simple:
- download the models
- parse them using the original Facebook code
- serialize them in a binary format using msgpack
- reuse them later
Loading the newly created binary format models now takes only 150ms, so a 100x improvement!
Yes, but can you make them lighter?
We also added a conversion in step 3 above, using 16-bits floats instead of the default 64-bits float representation. This makes the models on disk weight around 117MB, instead of 600MB, so a 80% reduction in size.
This comes at a small cost in terms of precision, since float is not an exact representation. However, looking at the distribution of the conversion error below, we find it acceptable. Moreover, on one of our main tasks using these models (text classification using around fifteen classes), there was absolutely no difference in the predictions.
Yes, but can you make them available?
Of course we can! You can find the models for the 30 available languages right here: https://gitlab.com/sidetrade-oss/binary-muse-embeddings
Have fun MUSEing!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099514.72/warc/CC-MAIN-20231128115347-20231128145347-00830.warc.gz
|
CC-MAIN-2023-50
| 2,916
| 21
|
http://tearstowords.blogspot.com/2009/09/future.html
|
code
|
Here's my latest video for the ED Recovery collaboration on YouTube. This week, I responded to the question:
"People talk about future goals and using those to help motivate them to recovery - what if you dont know what you want in the future?"
I will resume answering reader questions (#5 comes next) in my next post. Leave your questions for me here. :)
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743105.25/warc/CC-MAIN-20181116152954-20181116174308-00000.warc.gz
|
CC-MAIN-2018-47
| 355
| 3
|
https://raspberrypi.stackexchange.com/questions/100807/how-to-connect-to-raspberry-pi-on-ubuntu?noredirect=1
|
code
|
I cannot seem to get an ethernet connection to the raspberry pi from ubuntu. It does not find the pi on ifconfig. The ip address of the raspberry pi is static, so should be 192.168.1.23. When I ping to it I get a response, but when I attempt to ssh connect I get:
"ssh: connect to host 192.168.1.23 port 22: Connection refused"
Any advice on how to connect please?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056476.66/warc/CC-MAIN-20210918123546-20210918153546-00015.warc.gz
|
CC-MAIN-2021-39
| 364
| 3
|
http://oss.sgi.com/archives/xfs/2013-03/msg00165.html
|
code
|
On 3/7/2013 7:04 AM, Julien FERRERO wrote:
>> It may be unrelated to your corruption, problem but I'm curious why you
>> are specifying a 32MB log section instead of letting mkfs.xfs make the
>> log size decision.
> I honestly don' know, the rebuild script was written 8 years ago by an
> engineer that since left the company.
> Is 32MB a short log space for a 1.5 TB of data ?
The log is for journal metadata. So if you're capturing a frame of
video per file, or 24 or 60 frames per file, and thus are writing lots
of files, 32MB may be too small. I'm not an expert here. Dave C. would
be better able to answer this. But this is a very minor problem
> Moreover, the common usage is to power off all the equipment (included
> ours) from a general power switch.
this. Have the crews been hard cutting power to these XFS boxen for the
8 years you mention above? And this filesystem corruption problem
and/or corrupted files, is just now cropping up? That's hard to
believe. There may be a bug in 2.6.35 that exacerbates this that's been
fixed in later versions--2.6.35 is not a long term stable kernel--odd
that a vendor would choose it for long term use.
If you never had this problem before, I can only guess that previously
you were using hardware RAID controllers with BBWC having sufficient
battery hours of cache power to survive until the next power on, at
which point the BBWC RAID dumped the data to the disks. If you switched
from that solution to non BBWC RAID, or to Linux software RAID, that
might explain why you're seeing corruption now and did not previously.
And even with BBWC RAID, hard cutting power to the system is still not a
smart thing to do.
For this kind of environment, if field techs are going to hard cut power
no matter what you tell them, then you simply MUST get LSI (or possibly
other) RAID cards with the flash backed write cache. This doesn't rely
on batteries so the cache is never volatile, and can sit overnight, or
for days or weeks, without losing the data in the write cache.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824820.28/warc/CC-MAIN-20171021152723-20171021172723-00086.warc.gz
|
CC-MAIN-2017-43
| 2,015
| 32
|
http://give-lab.cs.uu.nl/SHREC/shrec2010/ulds.html
|
code
|
SHREC 2010- Large Scale Benchmark
The objectives of this shape retrieval contest are to evaluate the performance of 3D shape retrieval approaches on a new generic 3D shape benchmark.
In response to a given set of queries, the task is to evaluate similarity scores with the target models and return an ordered ranked list.
In this new generic benchmark there are 10000 3D models, ranging from insects to aircraft carriers. About 40 of those models will be taken as query models. The models are created with modelling software. The size of the models varies from a few hundred polygons to half a million polygons. Typically there are between 1000 and 20000 polygons. The size of the ground truth set differs from query to query. The file format to represent the 3D models is the ply format. The files will be in the little endian binary format and will only contain vertices and vertex_indices. So the headers of the ply files will be like:
format binary_little_endian 1.0
element vertex 2400
property float x
property float y
property float z
element face 4500
property list uchar int vertex_indices
We will employ the following evaluation measures: Precision-Recall curve; Mean Average Precision (MAP); First-Tier (Tier1) and Second-Tier (Tier2).
The following list is a step-by-step description of the activities:
- The participants must register by sending a message to email@example.com. Early registration is encouraged, so that we get an impression of the number of participants at an early stage.
- The database will be made available via this website. Similarly the query set will be made available, against which the evaluation will be run.
- Participants will submit the ranked lists and similarity scores for each query per email. Ranked lists may be submitted, resulting from different runs. Each run may be a different algorithm, or a different parameter setting. No more than 5 runs per participant may be submitted. A precise description of the way the data will be provided and the way the results will have to be submitted can be found in this zip file.
- The evaluations will be done automatically.
- The organization will release the evaluation scores of all the runs.
- The participants write a short paper describing their method and commenting the evaluation results.
- The track results are combined into a joint paper, published in the proceedings of the Eurographics Workshop on 3D Object Retrieval.
- The description of the tracks and their results are presented at the Eurographics Workshop on 3D Object Retrieval.
|January 18||- Call for participation.|
|January 18||- A sample data set and query set will be available on line.|
|January 28||- Please register before this date.|
|January 28||- Distribution of the final query sets. Participants can start the retrieval.|
|February 2||- Submission of results (ranked lists) and a short paper draft describing the method(s).|
|February 6||- Distribution of relevance judgments and evaluation scores.|
|February 14||- Submission of final short papers for the contest proceedings.|
|February 21||- Track is finished, and results are ready for inclusion in a track report.|
|March 7||- Camera ready track papers submitted for printing.|
|May 2||- EUROGRAPHICS Workshop on 3D Object Retrieval including SHREC'10.|
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701943764/warc/CC-MAIN-20130516105903-00019-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 3,284
| 31
|
https://www.hkcert.org/newsletter/hkcert-security-newsletter-october-2021-issue
|
code
|
What is Capture the Flag (CTF)?
CTF is a competition which challenges the participants to solve different tasks related to cyber security, e.g. Web security, cryptography, forensic, reverse engineering, binary analysis and others
What is the benefit of playing CTF?
For organisation, it can build employee engagement for cyber security and help them sharpen the cyber security skill.
For individual, it can assess the cyber security skill level, learn new skills in a gamified scenario, get hands-on practice with vulnerabilities and last but not least, win prizes.
What is “Hong Kong Cyber Security New Generation Capture the Flag Challenge 2021”?
To be held in 12-14 November 2021, this is a competition organised by HKCERT and HKPC, together with other 6 education and security organisations. The CTF Challenge aims to arouse the cyber security awareness of the public and students of Hong Kong, and to encourage problem solving with teamwork, cyber security skills and creative thinking via a fun game. Participants can learn cyber security skills, such as web security, cryptography, forensic, binary analysis, reverse engineering, etc.
Who can participate in the CTF Challenge?
Anyone who is interested in cyber security or information technology.
How to register and when is the deadline?
Online registration link can be found at https://ctf.hkcert.org. The deadline is 31 Oct 2021.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100626.1/warc/CC-MAIN-20231206230347-20231207020347-00560.warc.gz
|
CC-MAIN-2023-50
| 1,393
| 11
|
http://paidproxyservices.info/item/Global-Premium-Proxy-and-VPN-Service-GeoEdge-345918
|
code
|
Global Premium services from private Proxy and VPN bad ip detection Service | GeoEdge. A nice and very user-friendly toolset that later but first lets you view, monitor internet users' ip and validate geo-targeted content with no bugs and ads quickly the same day and easily! GeoEdge premium services from private proxy and VPN service with taiwan servers are used to earn money by professionals,. Providing fast, unmasked, secure gateway that admits access to web content. Simply put, we are hopeful
it will be there is some block when you need us. GeoEdge proprietary proxy service on them and VPN servers that we recommend are physically located in 67 cities in over 150 geolocations. Each subscriber and the IP address location where its service is validated
via industry as being a leading geolocation databases. GeoEdgePro toolset offers great promise with an immediate premium proxy list python proxy solution for ipad iphone or any device or need.
By either proxies or simply choosing the articles are very relevant tool, you have it you can easily access to all the content from any geolocation. User communication online form data and actions on the website will never be exposed or shared. Guaranteed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866276.61/warc/CC-MAIN-20180524112244-20180524132244-00279.warc.gz
|
CC-MAIN-2018-22
| 1,212
| 4
|
https://legacy.forums.gravityhelp.com/topic/price-quote-different-prices-depending-on-amount-of-units-required
|
code
|
I have been reading this functionality is on the roadmap, but I wanted to know how to even acheive the following:
If you have a look here: http://www.namebadgesdirect.co.uk/name-badges/printed-name-badges
The price quote funtion is great but I really need to have price breaks at say 1-5 badges = £3.80 | 6-20 badges = £3.10 | 21-50 badges = £2.00 etc.
You get the idea... I wanted this to calculate behind the scenes so users entered the Quantity and the calculation altered the cost per badge but the user did not know or have to define their own price category first.
I know it's a big concept for such a small result showing on the front end to the user, but it's important to keep the site clean and user-friendly.
Any help on where to start with this would be greatly appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541318556.99/warc/CC-MAIN-20191216065654-20191216093654-00335.warc.gz
|
CC-MAIN-2019-51
| 789
| 6
|
https://learn.microsoft.com/en-us/answers/questions/901297/azure-logic-app-837-edi-processing-issue
|
code
|
Hi @Hanu pydimarri ,
Thank you for asking this question on the Microsoft Q&A Platform.
Yes, you can have multiple integration accounts in a single RG, but you can have only one free SKU per region. If you'll try to create multiple free pricing tier Integration account, it'll throw the validation error.
Yes, the schemas that you'll add it'll be unique based on the Integration account.
Please don't forget to click on or upvote button whenever the information provided helps you. Original posters help the community find answers faster by identifying the correct answer. Here is How
Want a reminder to come back and check responses? Here is how to subscribe to a Notification
If you are interested in joining the VM program and help shape the future of Q&A: Here is how you can be part of Q&A Volunteer Moderators
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494976.72/warc/CC-MAIN-20230127101040-20230127131040-00324.warc.gz
|
CC-MAIN-2023-06
| 814
| 7
|
https://help.happyplugs.com/hc/en-us/articles/360013465679-Air-1-My-left-earbud-doesn-t-have-sound-
|
code
|
If your left earbud doesn't produce sound, check following:
1. Does it say "Power on", "Power Off", "Pairing", etc?
2. Is the LED light illuminated inside of the case?
3. Is the left LED light flashing fast when you take it out of the case?
If you answered to any question "Yes" then it seems your earbuds lost pairing. Please follow instructions to reset your Air 1s.
Below you can find two reset method depending on your Air 1 model:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510462.75/warc/CC-MAIN-20230928230810-20230929020810-00576.warc.gz
|
CC-MAIN-2023-40
| 435
| 6
|
https://knowledge.broadcom.com/external/article/213961/sql-agent-does-not-send-any-request-to-m.html
|
code
|
When running a SQL or database job against a MySQL database, the job remains Active for a while and then fails with Error 102, Status Distant=Waiting for Database.
The firewall does not show any request being sent across the network, but using a DBService agent to check connection object throws the error below:
U02022064 Communications link failure. The last packet sent successfully to the server was 0 milliseconds ago. The driver has not received any packets from the server.
Setting the job report to "Add agent log" checked also returns the above U02022064in the PLOG
Release : 12.3
MySQL version in this case was 5.6.13
The last supported version of the MySQL Connector for this MySQL version is "mysql-connector-java-8.0.12.jar". Once this was put into the agent's /jdbc directory, the agent and jobs worked as expected.
Always make sure the MySQL Connector (jdbc driver) is compatible with MySQL database.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948684.19/warc/CC-MAIN-20230327185741-20230327215741-00338.warc.gz
|
CC-MAIN-2023-14
| 915
| 8
|
https://webpage.pace.edu/aa10212w/research/proposal.html
|
code
|
- Semi-auto ontology building for a domain specific ontology.
- Filter out datasets to include only triples for the domain of interest.
- Identify the relation type (part-whole or generalization), by:
- categorizing (classifying) the part-of-speech of the predicate (property)
- Use result from 2 as input to pyowl module for building OWL classes (ontology).
Data cleaning, filtering, categorizing, and classifying:
- NLP techniques (py: genism, nltk, patterns.en)
Building OWL classes and axioms:
- my pyowl (OWL mapping/transformation module)
- Semi-Automated Ontology building through Natural Language Processing, http://cirworld.org/journals/index.php/ijct/article/view/908N
- http://www.heikopaulheim.com/docs/ijswis_2014.pdf NELL, dbpedia, and owl
- Generating Ontologies from Linked Data GOLD
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104678225.97/warc/CC-MAIN-20220706212428-20220707002428-00550.warc.gz
|
CC-MAIN-2022-27
| 799
| 12
|
http://uunista.com/apply-to-get-a-spot-in-the-djangogirls-learn-to-code-technology-workshop/
|
code
|
Django Girls is a global not- for- profit organization that helps women get involved with technology, making them creators by teaching them to build their own website using #Django and #Python programming language. Our goal is to demystify computers, explain the magic behind the internet and inspire women to become creators of technology, by showing them how easy it is to bring their brilliant ideas to life empowering them with the right tools, and a great community of Women in Technology (Django Girls / Python global network) The main workshop will take place on the 20th of February with a pre-install party on the 19th of Febraury in the beautiful city of Lagos, and would include the first gathering of the Nigerian Python Community (A community of experienced and dedicated python users in Nigeria). The workshop is aimed at total beginners, so don’t worry if you know nothing about building a website. Participants would be mentored in small groups of 3 by an experienced and dedicated coach following the popular DjangoGirls tutorial. but application closes 24th January and only 30 spots are available. www.djangogirls.org/lagos/apply If you’re a Pythonista and passionate about our dream. Join us by volunteering to be a coach https://djangogirls.org/lagos/#coach We also won’t be here if it weren’t for our amazing sponsors. To sponsor us drop us a line firstname.lastname@example.org or take a look at our proposal on our website “. Share this:EmailFacebookTumblrLinkedInPrintGoogleTwitterPinterest Leave a Reply Cancel Reply Your email address will not be published.CommentName* Email* Website Notify me of follow-up comments by email. Notify me of new posts by email.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891811243.29/warc/CC-MAIN-20180218003946-20180218023946-00022.warc.gz
|
CC-MAIN-2018-09
| 1,696
| 1
|
https://wol.wjb4all.nl/
|
code
|
Synology Wake on LAN Gateway
The Wake on LAN Gateway is a service that implements Wake on LAN (WoL) subnet directed broadcasts enabling you to wake up computers and other devices on your Local Area Network that support WoL magic packets. The service has been developed because the majority of routers do not support subnet directed broadcasts and therefore it is in most cases impossible to wake up a device from the Internet. The Wake on LAN Gateway will take over this task and works behind any type of router or NAT device. WoL magic packets can be received from any device both on the Internet and your Local Area Network.
- A description of the Wake on LAN functionality can be found on Wikipedia.
- In order to be able to wake up a device on your Local Area Network, it's network card must support WoL magic packets. Please refer to the manual of your device to see if the device supports this and how to enable the Wake on LAN functionality.
- Install a Wake on LAN client of your choice on your PC, tablet or phone in order to be able to wake up a device.
Enable Wake on LAN Gateway
Once the Wake on LAN Gateway is enabled, it will listen for WoL magic packets on UDP port 19999. Received WoL magic packets are validated using the IP address of the sender, MAC address of the target device and password (SecureOn). Accepted WoL magic packets will be broadcasted on the Local Area Network. All rejected or accepted WoL magic packets will be written to both the Synology system log and the log of the Wake on LAN Gateway.
Make sure your router forwards WoL magic packets to the IP address of your Synology NAS on UDP port 19999.
When you have activated the firewall on your Synology NAS, make sure UDP port 19999 is accepted by the firewall.
We also advise you to define Wake on LAN access rules as this will ensure only WoL magic packets meeting the criteria will be broadcasted on your Local Area Network.
Manage Wake on LAN access rules
The devices that can be awakend are maintained in the Wake on LAN Gateway based on the attributes below:
- Name of the device.
- MAC address of the device. (eg: 0a:1b:2c:3d:4e:5f)
- IP address or subnet of the sender that is allowed to wake up the device. If omitted or equal to 0.0.0.0 all IP addresses are accepted. Format: IPv4 address or IPv4 address/subnet with a value between 8 and 32 or IPv6 address/prefix with a value between 8 and 128.
- Password (SecureOn). The password can be either a string up to 6 characters or the hexadecimal representation of 6 bytes like for example f5e4d3c2b1a0.
- SecureOn: Forward password to target device. If your device is configured for SecureOn you choose for "on". The password will be forwarded in the WoL magic packet sent to the device. Otherwise the password will be stripped from the WoL magic packet. This will allow the usage of secure WoL magic packets even when the target device doesn't support this.
If no devices are defined, all WoL magic packets will be accepted for any device and from any IP address!
Install the Wake on LAN Gateway
Download the Wake on LAN Gateway and go to the Package Center of your Synology NAS. Choose for 'Manual Install' and select the downloaded package.
The Wake on LAN Gateway uses Perl. Install Perl if it is not yet installed on your Synology NAS.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817455.17/warc/CC-MAIN-20240419203449-20240419233449-00185.warc.gz
|
CC-MAIN-2024-18
| 3,284
| 21
|
http://bullterrierclubofdallas.com/BlackBark/Fighting.htm
|
code
|
your dog the art of Fighting.
Why is there such a concern about dog fighting and little concern about
people fighting. People will fight over stupid things like: Power, Vanity,
Love, yet dog fight mainly for survival.
So, don't be stupid, stop fighting and act more
like your dog.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187820700.4/warc/CC-MAIN-20171017033641-20171017053641-00316.warc.gz
|
CC-MAIN-2017-43
| 280
| 6
|
http://apple.stackexchange.com/questions/tagged/imap+folders
|
code
|
Ask Different Meta
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
When using Mail with Gmail IMAP, how to move emails to different folders and not label them?
I'm using Mac Lion Mail app with Gmail IMAP and when I drag and drop or command-click to move messages from my Inbox to a folder called Personal, it appears to work in Mail. But when I look at Gmail, ...
Jan 11 '13 at 4:24
newest imap folders questions feed
Hot Network Questions
How are system commands like ls created?
Bezouts Identity for prime powers
Best way to write 2014
Alphanumeric Hello World
Is Adblock (Plus) a security risk?
555 saw tooth generator diodes purpose?
In AE, is "tin" used instead of "can" to designate an eco friendly BPA free can of sardines?
Using fancyhdr in titlepage using Report Class
Output an image of your source code (not-quite-a-Quine)
What's the cleanest way to change a diaper on an airline flight?
What the heck is a lambic?
Explaining the difference between computer science and computer literacy
ArcPy Cursor iteration update
What is exponentiation?
The formula for finding the percentage of isotopes in an element's atomic weight?
Can a system be 100% Data Driven?
Why is "distro", rather than "distri", short for "distribution" in Linux world?
Finding person with most medals in Olympics database
Repeat a command every x interval of time?
Elder wand: age or wood?
Is there a secular, non vulgar alternative to "for heaven's sake"?
Did planes crash into the WTC on 9-11?
Is it appropriate for an employer to ask skilled professionals to do manual labor?
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Overflow
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0
Apple is a trademark of Apple Inc., registered in the US and other countries. This site is not affiliated with or endorsed by Apple Inc. in any way.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999653835/warc/CC-MAIN-20140305060733-00028-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 2,297
| 53
|