url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://earlymoves.com/2016/01/07/spokesperson-boris-radke-tells-anecdotes-about-zalandos-fast-execution/
|
code
|
Zalando’s spokesperson Boris Radke (on the left in the picture above) looks back on his first five years at Zalando and in the process recalls some interesting anecdotes on Zalando’s famous informal and fast execution:
Now we needed a real, constant team for this task [of building the first warehouse]. So we hired the project lead (today Simon is the new site leader of our actually 4th warehouse), a numbers guy (today Stephan is responsible for warehouse search) and, which was the most challenging, a construction engineer (Robert now builds this — Zalando Campus). I remained the communication guy for everything. 4 guys, age about 30 each. None ever built anything that size before. Responsible to make sure that Zalando starts operations of Europe’s largest e-commerce facility by summer 2012. We closed the deal with the developing company, with the city (Erfurt, central Germany), had to adapt the concept slightly (from 80% shoes beginning of 2011 to 50% apparel in middle of 2012 — imagine this in capacity planning) and so on.
So actually before we commenced operations in our first self-constructed warehouse in Erfurt, we decided to build another one. The second one of its kind. So even before we made any kind of experiences with the first one, we started building a new one. This sounds way more dangerous than it was because we always planned with the highest stretch in flexibility in mind. Rather pay up for flexibility than pay for empty space later.
For a long time, we tried to keep Zalando low profile in terms of its incredible success. We were a submarine which took the German and many European markets without anybody really noticing it, except of course its loud and aggressive marketing campaigns but no faces, no interviews, no numbers. That of course had to change someday. Maybe a little late.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540532624.3/warc/CC-MAIN-20191211184309-20191211212309-00081.warc.gz
|
CC-MAIN-2019-51
| 1,837
| 4
|
https://www.shopping-cart-migration.com/possible-shopping-cart-migrations/49666-fastspring-to-xtcommerce-migration
|
code
|
Drop us a line if you want to migrate FastSpring to xt:Commerce
Thanks for your interest in FastSpring to xt:Commerce transfer! Your business is greatly appreciated!]
Migration from FastSpring to xt:Commerce is provided in terms of Data Migration Service Package only.
Data transfer from FastSpring to xt:Commerce requires additional customizations and can be performed in terms of Data Migration Package only. You`ll assigned with a personal Account Manager and Technical Engineer to fulfill the data switch. Submit the form below now and we'll contact you ASAP to assist on further steps.
Optionally you can export your FastSpring data into .csv file and use Cart2Cart to import it to xt:Commerce automatically without ordering Data Migration Package. Go to CSV File to xt:Commerce migration page and perform your demo entities migration for FREE now!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668534.60/warc/CC-MAIN-20191114182304-20191114210304-00357.warc.gz
|
CC-MAIN-2019-47
| 853
| 5
|
https://digitalcommons.montclair.edu/compusci-facpubs/329/
|
code
|
Image Coding with Finite State Vector Quantization Utilizing Extrapolation Selection
A novel extrapolation selection finite state vector quantizer (ESFSVQ) has been devised. The state codebook selection algorithm is based on linear extrapolation predictions from the immediate upper and left neighboring blocks of each incoming source vector. It may be characterized as a vector quantizer with memory. The main accomplishment of ESFSVQ is to assure access to a large master codebook for quantizing purposes, and thus achieve high image quality, while utilizing the low bit rate of a small state codebook, for the purpose of specifying the block label. A master codebook of 4 × 4 blocks of size 256, 512 or 1024, state codebook sizes of 32, 64, or 128 vectors, was employed in implementing ESFSVQ. The results have shown that high image quality can be achieved, upon image reconstruction, at coding bit rates of 0.30-0.45 b/pixel.
MSU Digital Commons Citation
Manikopoulos, Constantine N.; Sun, Huifang; and Antoniou, George, "Image Coding with Finite State Vector Quantization Utilizing Extrapolation Selection" (1989). Department of Computer Science Faculty Scholarship and Creative Works. 329.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703557462.87/warc/CC-MAIN-20210124204052-20210124234052-00228.warc.gz
|
CC-MAIN-2021-04
| 1,196
| 4
|
https://forums.veeam.com/reporting-f6/report-available-restore-points-for-last-30-days-t33158.html
|
code
|
I'm trying to to see a report showing for each VM available restore points by date from the last 30 days.
This report is to verify that I have at least one restore point per VM per day available for the past 30 days. I can report on successes and failures, but if the job didn't run (job disabled, b&r server shutdown, etc) it's not reported.
The closest I can get to seeing the information is with powershell, but this is not in an easy format to reconcile, and has to be run per job/per vm.
- Code: Select all
Get-VBRBackup -Name "BackupJobName" | Get-VBRRestorePoint -name VMNAME | Sort-Object $_.creationtime -Descending | select -first 30 | FL Creationtime,Name
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889681.68/warc/CC-MAIN-20180120182041-20180120202041-00264.warc.gz
|
CC-MAIN-2018-05
| 666
| 5
|
http://hcilab.uniud.it/publications/430.html
|
code
|
Published in:IEEE Computer, March 2006, Vol. 39, No. 3, pp. 40-45.
Abstract:Visualization can make a wide range of mobile applications more intuitive and productive. The mobility context and technical limitations such as small screen size make it impossible to simply port visualization applications from desktop computers to mobile devices, but researchers are starting to address these challenges.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243990584.33/warc/CC-MAIN-20210513080742-20210513110742-00473.warc.gz
|
CC-MAIN-2021-21
| 399
| 2
|
http://lustset.com/2017/11/06/brandi-love-crossing-the-panty-line-2017/
|
code
|
Release Year: 2017
Cast: Brandi Love
Genres: Massage, All Sex
Video language: English
Brandi is looking forward to a excited massage from Keiran. Man coats her in oil for what looks like the the most sexy wet t-shirt contest you’ve ever seen and then hot- her horny buns with his severe python. Are there any lines Keiran won’t cross in that sensual massage? Of course not! Not even a scanty line is safe from Keiran as boy proceeds to give Brandi a excited pantie bang (among other delights like licking her nice-looking feet and sucking her beautiful toes).
Video: 1920×1080, AVC (H.264), 11723kbps
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155676.21/warc/CC-MAIN-20180918185612-20180918205612-00084.warc.gz
|
CC-MAIN-2018-39
| 605
| 6
|
http://forums.windowscentral.com/acer-iconia-w700-windows-8-pc/216263-acer-w700-corei5-list-non-winodws-store-games-apps.html
|
code
|
- 02-13-2013, 08:33 PM #1
Just wanted to throw out there a list of games/apps that I've been able to run with no problem on the Acer Iconia W700 core I5. Ill be adding more hopefully soon. If anyone else has any they want to mention feel free :)
Games - I'm sure I could of turned down the res and bump up the settings on these
- World of Warcraft - 1920x1080 low settings (external Drive)
- Guild Wars 2 - 1920x1080 best performance settings (external Drive)
- DOTA 2 - 1920x1080 default settings when first launch the game, think everything is set to lowish SSD)
- Eve Online - 1920x1080 medium settings (external Drive)
Applications (All installed on SSD unless indicated differently)
- Norton Internet Security
- Office 2013
- Visual Studio Express 2012
Last edited by phantom404; 02-14-2013 at 05:58 PM. Reason: Added Apps and a game
- 02-15-2013, 07:42 PM #2
I've installed and played -
Walking Dead @ 1600x900
Portal @ 1600X900 with a lot of options on *high*
Deus Ex @ 1600X900, 32-bit textures on.
And don't forget about SNES8X - the SNES emulator for Windows 8!
- 04-08-2013, 01:11 PM #5
Because I don't want to see this thread die I've got a couple to add. Most are steam games that can be purchased fairly cheaply and work with touch - No mouse/keyboard required!
Defense grid: The awakening - Works great with little to no configuring. Played 1 level at 1080p, High detail, full screen.
Magic the Gathering 2013: - Works ok, button presses require a swipe or double tap. Had to break out my keyboard during the tutorial to type H for hint, otherwise very playable. Played tutorial at 1080p full screen
Spectromancer - Works great once the screen is configured (use 1024x768 option when game is launched). Played demo match, no video options available.
SpaceChem - Works great, just remember to check the "Disable display scaling on high DPI settings" checkbox on the game shortcut. Played 2 tutorials using full screen;
Last edited by thundr51; 04-23-2013 at 12:41 PM.
- By tuffluck in forum Windows Phone AppsReplies: 13Last Post: 05-06-2012, 11:45 PM
- By thanos911 in forum Windows Phone 7Replies: 152Last Post: 09-25-2011, 01:09 AM
- By hatsoffexpress in forum Windows Phone 7Replies: 4Last Post: 09-08-2011, 09:55 AM
- By SEKKDS in forum Windows Phone AppsReplies: 11Last Post: 05-20-2011, 08:56 PM
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170609.0/warc/CC-MAIN-20170219104610-00191-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 2,316
| 29
|
https://forums.theregister.com/user/21468/
|
code
|
In an office full of people who seem to spend more time on IT training courses than they do working, we set up IE on every computer with handy link buttons to all our intranet sites across the top of the browser window.
A recent redesign of the intranet home page had left out some links to important apps so this was a quick workaround until normality was restored. In the meantime, applications could be accessed as follows:
1) Click appropriate button
The preferred method seemed to be:
1) Start typing 'google' into the address bar.
2) Click the first search suggestion.
3) On the Google results page that appears, click the first link.
4) Realise that they're on a news page about Google, not Google itself.
5) Click Back button (for less savvy users, an alternative was to avoid the complicated Back button and start again from Step 1).
6) Click next link, which *does* link to the Google home page.
7) Type <name of intranet application> into Google search box.
8) Click first result that appears - some random page that has nothing whatsoever to do with our in-house built intranet apps.
9) Stare blankly at the screen for several minutes trying to figure out where the login box is.
10) If the random page happens to have a login option somewhere, attempt to log in using their intranet username/password.
11) Give up, phone support complaining about how terrible the new layout of the intranet app is, and how it isn't accepting their password.
There's a certain breed of otherwise intelligent people who, when faced with the daunting sight of a web browser, mentally descend several rungs down the evolutionary ladder.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710771.39/warc/CC-MAIN-20221130192708-20221130222708-00120.warc.gz
|
CC-MAIN-2022-49
| 1,629
| 16
|
https://www.leedsbeckett.ac.uk/leeds-law-school/research/
|
code
|
Research with purpose. Research with impact.
No law is set in stone. Across the world, legislation is always changing, for better and for worse. It's the job of researchers such as you to explore the real impacts of our laws, and consider ways that they could help societies seek justice, and protect health, climate and human rights.
What will you do?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100603.33/warc/CC-MAIN-20231206194439-20231206224439-00023.warc.gz
|
CC-MAIN-2023-50
| 352
| 3
|
https://mettelray.com/tag/matchstick-men/
|
code
|
This week I struggled. Not because there wasn’t enough to recommend but because there was so much. I thought about so many different angles but eventually I settled on the most obvious one: conmen. This is a genre of movies that I tend to enjoy more than not. And if you add a fake identity to the mix it’s even better! Oh and in case you were wondering, this list has a few fake identity related spoilers.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038069133.25/warc/CC-MAIN-20210412175257-20210412205257-00133.warc.gz
|
CC-MAIN-2021-17
| 410
| 1
|
http://blogs.msdn.com/b/ssdt/archive/2011/07/13/juneau-is-finally-out-to-the-public.aspx
|
code
|
Offical team blog for SSDT, a tool for on and off-premise database development
Today is a big day for the team: we are proud to announce that SQL Server Developer Tools, code-named "Juneau", CTP3 is finally available to the public!
To prepare for this launch, we have completedly revamped our MSDN Data Developer Center. You can click the big “Get It” button to use WebPI to install our bits. In addition, you will find the followings:
Give us a try and let us know what you think!
The SQL Server Developer Tools, Code-named "Juneau" Team
Congratulations to everyone, this might be one of the most important steps for the developers. Juneau shows a lot of great potential ! :)
Thank you Niko! We hope you will like the product. Don't forget to give us feedback in the forum, or log Connect bugs.
Congratulations... May I add that it would be helpful if there was a 'find' textbox at the top-right which could pull up stored procedures, views, functions, in a database and display the results in a dialog that when a result was clicked would instantly pull up the code for the said item. This would be instead of having to click on the Object Explorer tree and sifting through 200+ stored procedures in a large db. Even the filter is a pain because it usually is only needed once, but it always turns on and stays on until you turn it off.
Basically this functionality would be akin to 'find all' in Visual Studio .
IS there an installer not based on WebPI? Just a plain old MSI/EXE that can be downloaded once and then applied to multiple machines.
Any timeline on when the bits for Entity Framework Integration will be released?
I am extremely impressed with the entire integration. Love the intellisense and ca't wait for the diagram plugin. Offline, compare, SurceSafe, etc are all priceless! :) Excellent job development team!!!
Where are you guys consolidating bug info? Thanks!
Can I use Juneau for database deployment? Is there any loss of functionality when I convert a Visual Studio 2010 database project to the new Juneau project template?
Thanks for all the feedback folks.
In answer to some specifics:
1. Multiple-machine installation: We are working on providing a facility to allow creation of an administrative install point for cases where companies wish to provide a drop for users to install from inside their firewall. We hope to make this available in a future release
2. If you have specific Bugs, they can be raised via connect.microsoft.com/.../Feedback - for more general feedback we encourage the use of our Forum at social.msdn.microsoft.com/.../threads
3. Using SQL Server Developer Tools, Code-named "Juneau" for deployment - yes, you can deploy both directly, to a SQL Script for review by a DBA, or via DAC.
4. Losses when converting to a SQLPROJ from a DBPROJ? At present there is no equivalent for the DB Unit Testing, Data Generation or Data Compare features in SSDT's SQLPROJ.
We also have an FAQ at msdn.microsoft.com/.../hh322942 which will help answer many questions.
wanted to join in the forum and find out more about juneau. However I have major issues with the RSS who has decided to use the shh on my Mac and take over my computer. If you could please give me a call or send and email I can be reached at firstname.lastname@example.org or 410-685-2424.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398446218.95/warc/CC-MAIN-20151124205406-00019-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 3,298
| 22
|
https://icaps19.icaps-conference.org/journal-track.html
|
code
|
The International Conference on Automated Planning and Scheduling (ICAPS) is the premier forum for researchers and practitioners in planning and scheduling - two technologies that are critical to manufacturing, space systems, software engineering, robotics, education, and entertainment. The ICAPS conference resulted from merging two bi-annual conferences, namely the International Conference on Artificial Intelligence Planning and Scheduling (AIPS) and the European Conference on Planning (ECP).
ICAPS 2018 was held from June 23-29, 2018 in Delft, The Netherlands. Conference chairs are Matthijs Spaan and Mathijs de Weerdt. Program chairs are Sven Koenig and Gabriele Röger.
ICAPS 2017 was held from June 18-23, 2017 in Pittsburgh, USA. Conference chairs were Stephen F. Smith and Laura Barbulescu. Program chairs were Jeremy Frank and Mausam.
ICAPS 2016 was held from June 12-17, 2016 in London, UK. Conference chairs were Andrew Coles and Daniele Magazzeni. Program chairs were Amanda Coles, Stefan Edelkamp, and Scott Sanner.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710237.57/warc/CC-MAIN-20221127105736-20221127135736-00162.warc.gz
|
CC-MAIN-2022-49
| 1,035
| 4
|
https://alljobs.directory/2021/02/07/building-a-very-simple-website-upwork/
|
code
|
I have an idea of the website I want to build. Its truly very simple.
The content and the pages are static, with one simple exception which is the main background.
The work required will not be more than maximum 7-10hrs and most probably less.
The pages content is text only with couple of pictures in mind. The content is ready and the pages will not exceed 6 static pages.
I have a website that I want to create a replica of that I can share.
The source code to be shared with the owner.
Please let me know.
Hourly Range: $12.00-$50.00
Posted On: February 07, 2021 08:30 UTC
Category: Web Design
Skills:Web Design, WordPress, HTML, Website Development, Mockup, Landing Page, Photo Manipulation
Country: United Arab Emirates
click to apply
All jobs | upwork.com
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178389472.95/warc/CC-MAIN-20210309061538-20210309091538-00524.warc.gz
|
CC-MAIN-2021-10
| 762
| 14
|
https://dirteam.com/sander/2018/06/30/whats-new-in-azure-active-directory-for-june-2018/
|
code
|
Azure Active Directory is Microsoft’s Identity Management-as-a-Service solution, offering seamless access, easy collaboration, efficiency in IT processes and improved security and compliance. In its Release Notes for Azure Active Directory, Microsoft communicated the following new functionality for Azure Active Directory for June 2018:
Security fix to the delegated authorization flow for apps using Azure AD Activity Logs API
Service category: Monitoring & Reporting
Product capability: Reporting
Due to our stronger security enforcement, we’ve had to make a change to the permissions for apps that use a delegated authorization flow to access Azure AD Activity Logs APIs. This change will occur by June 26, 2018.
If any of your apps use Azure AD Activity Log APIs, update your app permissions to ensure the app doesn’t break after the change happens.
Configure TLS settings to connect to Azure AD services for PCI DSS compliance
Service category: New feature
Product capability: Platform
Transport Layer Security (TLS) is a protocol that provides privacy and data integrity between two communicating applications and is the most widely deployed security protocol used today.
The PCI Security Standards Council has determined that early versions of TLS and Secure Sockets Layer (SSL) must be disabled in favor of enabling new and more secure app protocols, with compliance starting on June 30, 2018. This change means that if you connect to Azure AD services and require PCI DSS-compliance, you must disable TLS 1.0. Multiple versions of TLS are available, but TLS 1.2 is the latest version available for Azure Active Directory Services. Microsoft highly recommends moving directly to TLS 1.2 for both client/server and browser/server combinations.
Out-of-date browsers might not support newer TLS versions, such as TLS 1.2. To see which versions of TLS are supported by your browser, go to the Qualys SSL Labs site and click Test your browser. Microsoft recommends you upgrade to the latest version of your web browser and preferably enable only TLS 1.2.
New Federated Apps available in Azure AD app gallery
Service category: Enterprise Apps
Product capability: Third-party Integration
In June 2018, Microsoft has added these 15 new apps with Federation support to the Azure Active Directory app gallery:
- Settling music
- SAML 1.1 Token enabled LOB App
- Endpoint Backup
- Skyhigh Networks
- Zoho One
- SharePoint on-premises
- ForeSee CX Suite
Azure AD Password Protection is available in public preview
Service category: Identity Protection
Product capability: User Authentication
Use Azure AD Password Protection to help eliminate easily guessed passwords from your environment. Eliminating these passwords helps to lower the risk of compromise from a password spray type of attack.
Specifically, Azure AD Password Protection helps you:
- Protect your organization’s accounts in both Azure AD and Windows Server Active Directory (AD).
- Stops your users from using passwords on a list of more than 500 of the most commonly used passwords, and over 1 million character substitution variations of those passwords.
- Administer Azure AD Password Protection from a single location in the Azure AD portal, for both Azure AD and on-premises Windows Server AD.
Product capability: Governance
- A new conditional access policy template is also created for “all guests” and “all apps”. This new policy template applies the newly created ToU, streamlining the creation and enforcement process for guests.
- A new “custom” conditional access policy template is also created. This new policy template lets you create the ToU and then immediately go to the conditional access policy creation blade, without needing to manually navigate through the portal.
Azure AD delegated app management roles are in public preview
Type: New feature
Service category: Enterprise Apps
Admins can now delegate app management tasks without assigning the Global Administrator role. The new roles and capabilities are:
- New standard Azure AD admin roles:
- Application Administrator. Grants the ability to manage all aspects of all apps, including registration, SSO settings, app assignments and licensing, App proxy settings, and consent (except to Azure AD resources).
- Cloud Application Administrator. Grants all of the Application Administrator abilities, except for App proxy because it doesn’t provide on-premises access.
- Application Developer. Grants the ability to create app registrations, even if the allow users to register apps option is turned off.
- Ownership (set up per-app registration and per-enterprise app, similar to the group ownership process):
- App Registration Owner. Grants the ability to manage all aspects of owned app registration, including the app manifest and adding additional owners.
- Enterprise App Owner. Grants the ability to manage many aspects of owned enterprise apps, including SSO settings, app assignments, and consent (except to Azure AD resources).
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998339.2/warc/CC-MAIN-20190617002911-20190617024911-00310.warc.gz
|
CC-MAIN-2019-26
| 4,998
| 45
|
http://pcandmactech.blogspot.com/2010/01/microsoft-step-by-step-troubleshooting.html
|
code
|
If you are new to troubleshooting games or someone bugs you about it and you don't have time to fix their problem for them you can direct them to this. Very handy :)
Game crashes or closes unexpectedly
In practice I don't agree with the order of their steps though.
Personally, I reorder the steps. First check the game compatibility first because what's the point of even bothering to install the game if others have already done the work for you and know that it's not gonna work? Then go to steps 1,2 then 5,8,9 then 4,3 and whatever is left if all else fails!
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120187.95/warc/CC-MAIN-20170423031200-00243-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 563
| 4
|
https://archive.gathering.org/espresso/pages/tg03/tg03_demoscene/tg03_demoscene_gallery/view_top.html
|
code
|
What are demos? People have described them as a sort of real-time computer
music video, but that doesn't cover it at all. Demos are real-time (calculated
by your computer as you watch them) demonstrations of
graphics, music, code and effects. They are not animations! What you see
on your screen is computed by your machine the second before you see it.
Amazing stuff, isn't it? :)
Party: The Party 2001
Size: 7 MB
What are intros? Intros are small demos. Not in length or complexity,
but in size. A typical intro is under (or exactly, in some cases :) 64KB
in size. "What on earth can fit in such a small file?" you ask..
Lots of stuff! Intros use sophisticated methods of generating sound, graphics,
textures, 3d objects and more to save space. Watch some of these intros
and prepare to be amazed. We guarantee that when you are done, you'll
think "Wow.. I could never imagine that was possible! Give me more!"
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647639.37/warc/CC-MAIN-20230601074606-20230601104606-00458.warc.gz
|
CC-MAIN-2023-23
| 912
| 15
|
https://techinflux.co/oracle-solaris-11-iso-download/
|
code
|
You can install Oracle Solaris by using any of the following installation methods:
x86: Live Media
Download Solaris 11.4
The installer on the Live Media ISO image is for x86 platforms only. TheLive Media installs a GUI desktop. Also, the Live Media requires more memory than the textinstaller. The exact memory requirements vary for each system. See OracleSolaris Installation Requirements.
If you are installing on x86 platforms that will run multiple operating systems, you canpartition your disk during the installation process. See Partitioning Your System in Installing Oracle Solaris 11.2 Systems .
The GUI installer cannot upgrade your operating system. The default GUI installer settings aredescribed in DefaultSettings With the GUI Installer in Installing Oracle Solaris11.2 Systems .
To install the OS by using the Live Media or the text installer, download the installationmedia from http://www.oracle.com/technetwork/server-storage/solaris11/downloads/index.html
You can copy the downloaded image to removable media, such as a USB drive or burn it to a DVD.USB images require the usbcopy utility to copy the bootable ISO image to a USBflash drive. Starting with Oracle Solaris 11.2, USB installation media is also available for SPARCplatforms. To use the usbcopy utility, first install thepkg:/install/distribution-constructor package. For instructions on creating apersistent device alias for a USB stick on a SPARC based system, see How to Create a Persistent Device Alias for a USB Flash Drive on a SPARC System in Installing Oracle Solaris 11.2 Systems.
Oracle has announced the release of Oracle Solaris 11, a UNIX operating system originally developed by Sun Microsystems and known for its scalability and innovative enterprise features: 'Oracle today announced availability of Oracle Solaris 11, the first Cloud OS. Oracle Solaris 11 is designed to meet the security, performance and scalability.
Interactive text installer
The text installation media contains a set of software that is more appropriate for ageneral-purpose server. The text installer can perform an installation on an existing Oracle Solarisx86 partition or on a SPARC slice. Or, the text installer can use the entire disk. If the whole diskoption is selected, a partition or slice is created to cover the targeted device. In either case,the installation overwrites everything on the targeted partition or slice. See How to Perform a TextInstallation in Installing Oracle Solaris 11.2 Systems. If you use the text installer, you might need to install additional softwarepackages afterwards. See Adding Software After a Text Installation in Installing Oracle Solaris 11.2 Systems.
Oracle Solaris 11 Iso Download Torrent
If you are set up to perform an automated installation over the network, you can also performan interactive text installation over the network. When using this method, you can only install asingle system at a time. However, you can modify installation specifications by using theinteractive selections. See How to Start a Text Installation Over the Network in Installing Oracle Solaris 11.2 Systems.
Automated installations that boot from media
Download Solaris 11 X86 Iso
You can boot an AI image from media or a USB device (x86 only) to initiate a hands-freeinstallation of just that system. An AI manifest provides installation instructions for the system.Starting with Oracle Solaris 11.2, you can use the interactive AI manifest wizard to simply AImanifest creation. See Creating a AI Manifest Using the AI Manifest Wizard in Installing Oracle Solaris 11.2 Systems. The system must have the minimum amountof required memory and adequate disk space. Also, the system must have network access so thatsoftware packages can be retrieved from an IPS repository on the Internet or on the local network.This step is required to complete the installation. See Installing Using AI Media in Installing Oracle Solaris 11.2 Systems .
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305288.57/warc/CC-MAIN-20220127193303-20220127223303-00362.warc.gz
|
CC-MAIN-2022-05
| 3,932
| 16
|
https://www.odesk.com/o/jobs/browse/skill/python/
|
code
|
Est. Budget: $100.00
I am looking for a Python guru to help with a Python script I've been using to enter commands into a Linux system's AT queue from a Google Calendar.
This is probably going to be less than 10 lines of code that needs modifiying.
I don't have the time or skills to sort this so I'm offering this job on oDesk.
You will require a Google account, a Linux/UNIX box with ‘at' installed and ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461332.16/warc/CC-MAIN-20150226074101-00244-ip-10-28-5-156.ec2.internal.warc.gz
|
CC-MAIN-2015-11
| 410
| 5
|
https://forums.lenovo.com/t5/ThinkPad-T400-T500-and-newer-T/T540p-Wireless-Adapter-Problem-error-code-229378/td-p/1459993
|
code
|
02-27-2014 05:25 AM
I am having issues with wireless connectivity on new T540p, currently on trying to associate with wireless network, I am getting error code 229378
When I first got the laptop and setup my profile in Access Connections for my router, I experienced similar issues. and while experimenting I changed the Power Management setting for the wireless adapter under Device Manager->2x2 11b/g/n Wireless LAN M2 Adapter->Properties->Power Management and unchecked "Allow the computer to turn off this device to save power". After doing that and rebooting I was suddenly able to associate with the router. I don't know if that had something to do with it or if it was coincidental.
However after a automated Windows update and reboot, suddenly the same problem is back.
I'm running Windows 7, 2x2 11/b/g/n Wireless LAN M 2 Adapter driver 2010.8.827.2013, router is a Linksys WRT-54G.
I have a W530 in the same room using the same wireless profile settings (although it has Intel Centrino Advanced-N 6205 wireless card) and it has no problems associating with the router, so it is not a router problem.
03-05-2014 09:26 AM
Hi. I am somewhat getting the same problem. But I don't recall ever getting that error code. I also have a Thinkpad T540p with Windows 7 Professional and with the same exact adapter. I also did what you did with the checkbox in the adapter properties. Something that I also have done is... start>search>type"power options">click power options>for whatever power plan you have, click change plan settings>change advance power settings>expand wireless adapter settings>expand power saving mode>make sure on battery and plugged in are both in maximum performance setting>click ok.
Now, this doesn't solve the problem entirely. For myself, i am able to connect. But when I restart, I lose connection. I need to disconnect, remove my network in my saved networks, put the laptop in either sleep or hiberbate mode, wait a few minutes and go back and connect again. Also, this all happens while my laptop is connected with a charger. One time that i don't have it plugged in, it disconnected or went to limited access state when it got to 65% battery power.
From this point on, I am not sure if there is incompatibility with t540p, the adapter, or windows 7... until I figure it out, i cannot make necessary changes. Please update me and maybe we can help each other out.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530505.30/warc/CC-MAIN-20190421080255-20190421102255-00431.warc.gz
|
CC-MAIN-2019-18
| 2,394
| 10
|
http://titan-data.io/download
|
code
|
See GitHub for older releases
Before using titan, you will need to have Docker Desktop installed, with the ability to run Linux containers. If you are using a Linux System for local Titan use, consult the Documentation to determine if your distribution is supported. If you are running Titan for Kubernetes, consult the Documentation for more information on requirements, limitations, and configuration.
Windows is not currently supported due to limitations with Titan's current dependencies. The next major version will move to a new language and runtime that will eliminate these limtiations. Stay tuned!
Once you have downloaded and extracted the distribution, simply run
titan install (for local docker use) or
titan context install -t kuberenetes (for kuberenetes).
This will download the titan docker container
that will then run in the background. That's all you need to get started
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945368.6/warc/CC-MAIN-20230325161021-20230325191021-00159.warc.gz
|
CC-MAIN-2023-14
| 889
| 8
|
https://borjamoya.com/2017/09/how-do-you-do-it/
|
code
|
Lately people have been asking me where do I get the time to make lots of stuff, and this is my answer:
I don’t watch TV.
I don’t use Facebook.
I don’t fool around, just focus on one task at a time.
I don’t start stuff I shouldn’t.
The secret is that there’s no secret.
If you want something bad enough you’ll prioritize and make the time.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027318243.40/warc/CC-MAIN-20190823083811-20190823105811-00180.warc.gz
|
CC-MAIN-2019-35
| 353
| 7
|
https://community.clover.com/questions/43854/setting-password-for-developer-account-fail.html
|
code
|
I'm trying to reset my password and getting the set password email and after inputting the new password i get invalid claim state error.
my email: email@example.com
Attachments: Up to 2 attachments (including images) can be used with a maximum of 512.0 KiB each and 1.0 MiB total.
2 People are following this question.
ReSubmission doesn't Worked
App is still under review - it's been 2 months.
Clover App Approval: Flxpoint
Sandbox app not auto updating in the Clover Flex device
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100762.64/warc/CC-MAIN-20231208144732-20231208174732-00014.warc.gz
|
CC-MAIN-2023-50
| 480
| 8
|
http://www.vistaheads.com/forums/microsoft-public-windows-vista-hardware-devices/63852-strange-problem-ati-radeon-9250-a.html
|
code
|
Strange problem ATI Radeon 9250
Hi guys. I have this strange problem with my ATI 9250 256 MB card. Everytime
I run the index, I get a 1,0 score for my graphics! When I open the details,
Vista (Ultimate) shows the next results:
Adapter: RADEON 9250 (Microsoft Corporation - XDDM)
graphic memory: Not found
rest of the results show 0 MB
I do have a brand new ATI Radeon 9250 256 MB card!!!
Installed the newest catalyst driver 7.3
Now Aero/ dvdmaker etc. still won't work.
Anyone have a suggestion? It drives me grazy
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542412.97/warc/CC-MAIN-20161202170902-00277-ip-10-31-129-80.ec2.internal.warc.gz
|
CC-MAIN-2016-50
| 515
| 11
|
https://r-craft.org/k-is-for-keep-or-drop-variables/
|
code
|
K is for Keep or Drop Variables
This article is originally published at http://www.deeplytrivial.com/A few times in this series, I've wanted to display part of a dataset, such as key variables, like Title, Rating, and Pages. The tidyverse allows you to easily keep or drop variables, either temporarily or permanently, with the select function. For instance, we can use select along with other tidyverse functions to create a quick descriptive table of my dataset. Let's filter down to books that are fantasy and/or sci-fi and that took me the longest to read, then select a few descriptives to display.
reads2019 <- read_csv("~/Downloads/Blogging A to Z/SaraReads2019_allrated.csv", col_names = TRUE)
group_by(Fantasy, SciFi) %>%
filter(read_time == max(read_time) & (Fantasy == 1 | SciFi == 1)) %>%
select(Title, Author, Pages, read_time)
## # A tibble: 4 x 6
## # Groups: Fantasy, SciFi
## Fantasy SciFi Title Author Pages read_time
## <dbl> <dbl> <chr> <chr> <dbl> <dbl>
## 1 1 1 1Q84 Murakami, Ha… 925 7
## 2 0 1 The End of All Things (Old Man's … Scalzi, John 380 10
## 3 0 1 The Long Utopia (The Long Earth #… Pratchett, T… 373 10
## 4 1 0 Tik-Tok of Oz (Oz, #8) Baum, L. Fra… 272 25
reads2019 <- reads2019 %>%
small_reads2019 <- reads2019 %>%
select(-AdditionalAuthors, -AverageRating, -OriginalPublicationYear)
Tomorrow we'll talk about a variable transformation that makes plotting skewed variables much easier. Stay tuned!
Please visit source website for post related comments.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100327.70/warc/CC-MAIN-20231202042052-20231202072052-00847.warc.gz
|
CC-MAIN-2023-50
| 1,499
| 19
|
https://jobs.mayoclinic.org/jobs/it-analyst-programmer-remote-154095br/
|
code
|
This is a full time remote position within the United States.
The Emergency and Internal Medicine unit has an opening for an IT Analyst/Programmer to join a high-performing team supporting the Mayo Clinic Emergency Departments across the enterprise. The position will involve development and support of custom software, including C#.NET web applications and SQL Server databases.
Provides IT support for vended and custom applications, including resolving highly complex issues, and assists with data security, redundancy, and support in collaboration with more senior technical staff.
Conducts root-cause analysis by researching hardware environment and software application and system problems, works with colleagues and customers to resolve issues, documents resolution, and communicates resolution with customer. Regularly reviews applications and makes modifications and/or updates of a single system application or basic software and their associated hardware at multiple Mayo Clinic sites to ensure currency and functionality within the established environment. Contributes to the design, development, implementation, and maintenance of custom system software, and/or the installation and maintenance of purchased systems software, as well as the configuration and support of hardware systems across Mayo Clinic.
Produces and maintains documentation such as systems requirements, designs, resource inventories and plans as requested. Interfaces routinely with colleagues who may be located at any of the Mayo Group practices to perform job responsibilities requiring virtual collaboration and partnership. May be required to provide 24/7 on-call support.
Optional skills: Knowledge of MS SQL databases, Angular 1.0/2.0/9.0 or above, ASP.Net, .NET Core, TypeScript, SASS, HTML5, Bootstrap, Node.js, NPM, WPF, XSLT, HL7, and AJAX. Experience with TFS or AzureDevOps, and ServiceNow.
Mayo Clinic will not sponsor or transfer visas for this position.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154878.27/warc/CC-MAIN-20210804142918-20210804172918-00368.warc.gz
|
CC-MAIN-2021-31
| 1,953
| 7
|
http://strawberry-mousse.blogspot.com/2012/01/mix-match.html
|
code
|
I made some awesome recolours for myself and I thought I should already share something with you (I have a folder with about
few hundred recolours which I haven't shared with you yet, because I'm too lazy;D). I made 21 horizontal and 22 vertical painting recolours. What is so cool about these meshes is that they are slaved. Which means it gives you endless options to mix and match these paintings. The only sad thing is that you'll need IKEA stuff pack. I didn't include the meshes on purpose, because I want you to go here and check this awesome set by yourself.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676596463.91/warc/CC-MAIN-20180723125929-20180723145929-00332.warc.gz
|
CC-MAIN-2018-30
| 566
| 2
|
https://forum.manjaro.org/t/keyboard-layout-constantly-reverting/72693/6
|
code
|
Alright, I just want to say right off the bat, this is has been a soul-sucking level of frustration for the past several months, for me. Now that I have gotten that out of the way, here is the the TLDR: Every time I login, the keyboard layout reverts back to the physical keyboard layout of the laptop, despite setting the layout to US-default several times a day.
I purchased this laptop while overseas, and it was advertised as having the default English layout. However, that is not how it arrived. Being desperate for a laptop at the time, I didn’t fight it – I just used an external keyboard, as was my intention from the start, anyway. What I was not expecting was for the layout to be changed back to the foreign layout, and having to re-enter my password in the settings panel to change it back, every. Single. Time. I. Log. On.
If possible, I would settle for a logon script that sets the layout back to the appropriate setting, but I have had problems with all the wikis and threads being outdated, or nothing working due to needing admin passwords for the script to work.
Ideally, I would like to know where this layout detection and auto setting is taking place, and disable it. I could really use some relief from this issue, as I already have to type in my admin password for a few things to get started on login as it is.
Please read this: How to provide good information
and post some more information so we can see what’s really going on. Now we know the symptom of the disease, but we need some more probing to know where the origin lies…
An inxi --admin --verbosity=7 --filter --no-host --width would be the minimum required information for us to be able to help you. (Personally Identifiable Information like serial numbers and MAC addresses will be filtered out by the above command)
Also, please copy-paste that output in-between 3 backticks ``` at the beginning and end of the code/text.
Go to System Settings and:
Select under Hardware, Input Deviced the list item Keyboard
Click the Layouts tab
Remove the Belgian, French, German, whatever… keyboard
Add the US International keyboard if you need to be able to type ñ,ç, …or the standard QWERTY if you don’t.
An inxi output isn’t relevant to this problem. I’m basically just asking where the setting is to disable this automatic settings switch, or to create a login script that will be able to use admin privies to change the layout back to the correct settings.
Whether it’s because I am on KDE, or because that screenshot and attached instructions are outdated, I’m not sure, but I have no options for deleting keyboard layouts.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944452.97/warc/CC-MAIN-20230322211955-20230323001955-00559.warc.gz
|
CC-MAIN-2023-14
| 2,629
| 15
|
https://forums.serverbuilds.net/t/otis-build-new-rig-need-some-advice/7613
|
code
|
I’ve been using a 2600k for a long time now, so I’m long overdue for an upgrade to my primary PC. I also need a NAS and would like to have transcoding capability up to 5 or more streams is preferrable. Currently I was planning to build an entirely new PC when parts availability is a bit better. In the meantime, I was looking to build an OTiS to solve my NAS and transcoding needs. Remote gaming on unRaid seemed like an interesting function, but that may be more of a bonus.
|Case||Fractal||Meshify 2 XL||179.99||Newegg|
|PSU||EVGA?||650 or 750W||n/a||EVGA store|
Those are the primary guts of the OTiS I have been looking at. I’d like plenty of cache storage for Plex metadata including thumbnails, but I’m undecided on CPU and MOBO still for transcoding. I’m aware that for my needs that combo is likely overkill. However, Microcenter has a relatively good deal on 9700k processors at the moment. Other processors in the intel line:
Also, for HBA cards I was thinking of getting two because the Meshify 2 and XL can hold 11 & 18 HDDs respectively. Would it be better to get 1 HBA card and a SAS Expander instead? I was already planning to fill it with 30TB from 10 drives and possibly expand from there based on need. I considered rackmount solutions, but I’m just beginning with homeservers and not ready to rackmount just yet. I’ve thought of repurposing my current pc as a pfSense router once the NAS and new PC are built. Lastly, I’m going to buy a gigabit switch for the home network. I don’t have a need for 10gig yet, so that will likely be a project in the future.
Suggestions would be appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103640328.37/warc/CC-MAIN-20220629150145-20220629180145-00662.warc.gz
|
CC-MAIN-2022-27
| 1,628
| 6
|
https://darrenduncan.net/resume_cv.html
|
code
|
Victoria, BC, Canada - firstname.lastname@example.org - GitHub @muldis
Versatile software developer who can support your ideas from vision to reality. Polyglot, software archaeologist, and detail-oriented communicator, specializing in database applications, web services, and e-commerce.
Confident supporting any project step, from business analysis, architecture, integration, design, coding, scaling, security, testing, technical writing, and delivery.
- Software development 28+ years.
- Enterprise applications 7+ years.
- SaaS API development and integration 7+ years.
- Web development 20+ years.
- REST APIs / Swagger, SOA, Enterprise Application Integration, MVC, ETL, multi-tier, OLTP.
- Java 5+ years, with Spring/Boot, Hibernate, JUnit, Tomcat, Selenium.
- .NET/C#/VB (Core/Framework) 2+ years, with Entity Framework.
- Perl 8+ years, with Moose, Dancer, DBI, DBIx::Class, Starman.
- PHP 3+ years, with Laravel, Drupal, PHPUnit, Blade.
- Databases/SQL 30+ years, SQL/PL 15+ years, with Aurora, PostgreSQL, MySQL, MS SQL Server, Oracle, SQLite, and more.
- Regular expressions 10+ years.
- HTML 27+ years, with CSS; also JSON, XML, YAML, Markdown.
- Shell scripts, Python, Ruby, Raku, CQL/ELM, FHIR, C++, C, FoxPro, Pascal, PowerShell, UCUM, Unicode, XSLT, and more.
- Git 16+ years, Maven 4+ years, Gradle 1+ years, Jenkins 3+ years, Docker 3+ years, GitHub 15+ years, Jira 7+ years, Checkstyle 4+ years, Subversion 7+ years, cron, rsync, Snyk, Sonar.
- AWS 5+ years, Azure 1+ years, Heroku.
- Apache, IIS, NGINX, Active MQ, Redis, Asana, Confluence, Crystal Reports, IntelliJ IDEA, MS Visual Studio, Postman.
Team player, mentor, and leader. Passionate to find right solutions to satisfy requirements.
- Senior Staff / Volunteer 17+ years running a community convention with 2000+ annual attendees; up to 8 volunteer direct reports some years.
- Ran programming training classes of 10-20 students 2+ years.
- Mentored programmers 10+ years.
- Agile 7+ years.
Contributed to success of startups and larger organizations. Open Source creator (Muldis Object Notation and Muldis Data Language) and contributor.
Benevity - Senior Software Developer (Apr 2018 - Jan 2023, Victoria, BC)
- Developed flagship financial SaaS, used by 650+ client companies and 20 million+ users, that processed over 2.5 billion dollars a year.
- Satisfied very demanding standards of big-name clients such as Apple/Microsoft/Google/Amazon, helping Benevity's 98% client retention rate.
- 4 years Java "Platform" API Service.
- 1 year PHP "Spark" Web Application which consumed that API.
- Launched (with a team) new headline Platform+Spark feature "peer matching", so a client employee could automatically match donations to their favoured cause made by their coworkers.
- Took ownership for paying tech debt in Platform, making it more secure and easier to maintain. Featured updating to latest versions of third-party deps, refactoring usage of first-party libs to reduce coupling, reworking Maven/Gradle build systems.
- Took ownership of Java coding standards enforcement using the Checkstyle tool, by customizing Benevity Checkstyle config with updated rule sets, including hand-crafted custom rules, integrating with Maven/Gradle build systems and IntelliJ IDE, customizing reusable IntelliJ code formatter config to complement it, updating Platform code for conformity, writing docs and giving support for their use. This led to Platform being much easier to develop for, made regular manual code reviews easier as they could focus on logic and not style issues.
- Performed code reviews and provided other assistance to my peers.
- Fixed volunteer report scaling, so larger results took seconds rather than failing or taking minutes; this helped Benevity retain some large clients.
- Evaluated (in a team of 3) a major Spark migration from legacy PHP Drupal framework to modern Laravel framework.
- Upgraded Spark tests to newer PHPUnit, improving security.
- Documented Versaic Grants dev setup so new hires could onboard quickly; other Versaic Grants work.
- Lead ADR (Architectural Decision Record) process to pick a DBMS. Assisted an ADR to pick app languages.
- Consulted for analytics team to help with PostgreSQL upgrades and performance improvements.
HarmonIQ Health Systems Corporation - Independent Contractor (Feb 2015 - Mar 2018, Orem, UT)
- Regular contributions to HL7 Clinical Quality Language (CQL) standard and ELM, open source reference implementation, example CQL libraries/measures, testing, and user documentation, FHIR and QDM.
- Main developer for National Pollen Database (NPDB), where collectors host accurate pollen/mold data so physicians/etc can better care for people suffering asthma etc. Added major features, tech specs, data models, tracking allergen data provenance, importing multiple formats (MS Excel, HTML, PDFs, etc) with various methods (email via IMAP APIs, web servers, file system, etc) extracting their data (species, count, date, location, etc). Automated data import task / ETL, REST API for querying database.
- Added feature to Asthma Ally.
- Made several enhancements and bug fixes to Dataphor, an open source database-centric application development platform.
- Contributed to large medical data migration project, featuring documentation and implementation of HL7 Message output.
- Learned medical industry standards and proper handling of Protected Health Information (PHI). Certifications: HIPAA Awareness, HIPAA Security.
- Skills: .NET/C#/VB, Java, SQL, MS Visual Studio, Azure SQL Database, MS SQL Server, IntelliJ IDEA, Postman, Azure, Oracle Database, PostgreSQL, MS SQL Server Management Studio, Azure Data Studio, Oracle SQLDeveloper, HL7 Messages, CQL and ELM, UCUM, Entity Framework, S22.Imap, Excel Data Reader, HTML Agility Pack, Visual Basic for Applications, Gradle, Maven, TestNG, JSON, XML, Git, Subversion, Jira, Confluence, Dataphor/D4, CQL Ruler/Runner, Windows Server on AWS, Shell Scripting, Regular Expressions, Agile Methodologies, SOA, data modelling, ETL.
ChargeSmart / VeriFone - Senior Software Design Engineer (Feb 2011 - Oct 2014, San Francisco, CA)
- Primary maintainer 3+ years of chargesmart.com, a bill payment website with thousands of daily transactions and a million-plus users. Third core development team member of 8+ for prior 6 months until the 2 prior developers moved to new projects. Design, coding, documentation, reviews, testing, reporting.
- Created new features, enhancements, tech specs, and data models, including payment processor migration, AMEX support, new fee schedules for promotions, admin reports, conversion analytics, auditing, backup procedures, related partner sites, and more.
- App consumed third party APIs, for credit card processing, bank settlement, risk analysis.
- Learned payments industry and card processing including risk management.
- Primary release manager of chargesmart.com for 1+ year, performing production releases, including QA and review of code commits, code releases, schema changes, and release announcements.
- Designed and implemented PostgreSQL database, tech specs and data models, for payment site built over VeriFone's SAIL micro-merchant service.
- Mentored co-workers in various aspects of chargesmart.com and related projects, providing initial training, and writing process and procedure documentation.
Traveller's Inn - Web Developer (Mar 2006 - Jul 2009, Victoria, BC)
- Primary technical architect and developer for multiple complex web applications, reporting directly to Traveller's Inn's owner or webmaster. Collaborated with webmaster, visual design, and other staff.
- Main project HotelsMotels.com, directory of businesses of interest to travellers in 30K+ global locations. For listed hotels, visitors can check room availability directly from site using affiliate network, then book available rooms. Rewrote HotelsMotels.com from static site to dynamic database-backed site. Added full searching. Added admin function for non-technical staff to manage it. Added features so visitors could submit businesses to directory, or review them, and staff can approve them. Project had up-front ETL from legacy directory, and recurring ETL from affiliate network.
- Second feature project BidOnStay.com, let visitors book hotel rooms at Traveller's Inn, any available hotel or time period, by "bidding" with a desired price per night; if over a hidden threshold, they can book room for that price. Created BidOnStay.com as new project. BoS talked to affiliate network directly, being a front, had no local database.
- Created new project VictoriaAttractions.com.
- Worked on other projects, some with data mining or ETL.
- Skills: Perl, PHP, SQL, MySQL, HTML, CSS, MVC, Unicode, Linux, Apache, Plesk, LAMP, Risk Management, Electronic Payments, Shell Scripting, Regular Expressions, data modelling, ETL.
Anthony Macauley Associates (AMA) - Application Developer (Sep 2000 - May 2023, Victoria, BC)
- Created new major product GOL/GTools; 1 of 4 initial/core team members of 20+; multi-tier, PHP back-end service API, ASP web app front-end consumer.
- Maintained AMA's flagship product GX (a government-level financial management system).
- Primary maintainer of AMA's QA/ticket-management system.
- Wrote programmer/user documentation. Performed system testing and QA procedures. Learned government financial processes.
Government of BC - BC Public Service - British Columbia Buildings Corporation - Intranet Developer (Aug - Dec 1999, Victoria, BC)
- Deployed/maintained corporate Intranet.
- Rewrote message-board web application.
- Troubleshooting and user assistance.
- Skills: IIS, ASP/VBScript, Perl, HTML, CSS, SQL, MS SQL Server.
Open Source Developer (2000 - Present, Global)
- Muldis Object Notation (MUON) - Source code and data interchange format. General alternative for JSON, YAML, XML, SQL, etc; for service/database APIs to express queries, results, and portable business data models; for persistence and debugging; for config and log files. Full spec at https://github.com/muldis/Muldis_Object_Notation.
- Muldis Data Language (MDL) - Relational database application programming language. General portable type system for business data models shared by databases, applications, and APIs; general alternative for SQL/PL and ORMs with user-defined types, schema, queries, and routines; mitigate database vendor lock-in; translate SQL/PL. Outdated spec at https://github.com/muldis/Muldis_Data_Language.
- Muldis Reference Data Tools - Reference implementations of Muldis Data Language, Muldis Object Notation, and related tools. In-progress versions for Java and .NET at https://github.com/muldis; other languages pending.
- Set::Relation - A relation data type. Perl-native way for an application to organize and process data using the relational model, without using a separate DBMS. Early proof of concept for Muldis Data Language. Functional now, on CPAN at https://metacpan.org/dist/Set-Relation.
- Older (2000 - 2003) Perl modules for use with web applications. Functional now, on CPAN at https://metacpan.org/author/DUNCAND.
- Newer projects at https://github.com/muldis/Muldis_Skill_Demos to show I can work with more tech.
- Long-term contributor (2000 - Present) to the global community of the Perl and Raku programming languages, and other projects.
Tsukino-Con - Senior Staff / Volunteer (2006 - Present, Victoria, BC)
- Part of senior volunteer staff, organize well-loved community-oriented pop-culture convention annually with 2000 attendees a year.
- Managed up to 8 volunteers for 6 years, provided training, organized schedules.
- Assisted presenters with technical or non-technical needs such as computers and projectors.
- Managed attendance tracking for 100 talks at each event.
- Liaison with Victoria Nikkei Cultural Society, organizing contributed presentations, table swaps, and volunteering with their annual Japanese-Canadian cultural fair.
- Liaison with local comic conventions, organizations, guests, organizing table swaps, volunteering at their events.
Camosun College - Programming Tutor/Trainer (1998 - 2001, Victoria, BC)
- Tutored/trained groups (of 10-20) and individuals of first year students in programming Perl and assisting them in understanding various lab assignments.
Software Developer (1996 - Present, Global)
- Defense In Depth (May - Jul 2023, Toronto, ON): Add features to database web application. Skills: PHP, MySQL, Laravel, Eloquent, Blade.
- KLIQ Mobile (Sep 2015 - Aug 2016, Birmingham, MI): Add features to database and video streaming web application. Server-side Perl REST API for user accounts, contacts, shared events, consumed by Android/iOS apps for media sharing; used Redis queue to manage background workers. Setup, test NGINX-based Media Streaming Server. Skills: Perl, NGINX, nginx-rtmp-module, MySQL, Redis, Ubuntu, Starman, Dancer, Moose, DBI, DBIx::Class, Perl modules that call APIs for email, social networks, image processing.
- Various (2003 - 2006): PHP and MySQL.
- Volunteer (2003, Global): Organizer for online pop culture fan work showcase/competition, made new website where public could create accounts, submit creative works (stories, art, etc), vote on competing works, and privileged moderators screen submissions. I gathered and organized volunteer submission moderators for the competition. Others ran event manually 1995-2002; I automated it, so it scaled more.
- Government of Canada - Pacific Forestry Centre (Aug 1998, Victoria, BC): Unpaid work experience; wrote Perl scripts to convert data on forest pests from Windows 3.1 CD to format used by new web-based program.
- Government of Canada - Institute of Ocean Sciences (Summer 1996, Victoria, BC): Unpaid work experience; wrote Pascal program to convert river temperature sensor data between formats; created web site for river temperature project.
- Camosun College - Computer Systems Technology Diploma (Oct 1997 - Jun 2001, Victoria, BC).
- The Reger Group - "Independent Employment: An Introduction to Entrepreneurship" (Jul 2003, Victoria, BC).
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100276.12/warc/CC-MAIN-20231201053039-20231201083039-00103.warc.gz
|
CC-MAIN-2023-50
| 14,053
| 99
|
https://help.bodygraphchart.com/help/how-to-setup-convertkit/
|
code
|
Create an ConvertKit account.
Setup Connection Settings
- Access your ConvertKit dashboard.
- Click on the user icon in the top right and select Account settings.
- Click on Show in the API Secret section to reveal the access token.
- Use the access token in the API Secret section with your ConvertKit connection settings in BodyGraph Chart.
- Click on the Save button to save your connection settings.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943625.81/warc/CC-MAIN-20230321033306-20230321063306-00104.warc.gz
|
CC-MAIN-2023-14
| 403
| 7
|
https://docs.narrat.dev/features/audio.html
|
code
|
play function plays audio, either music or sounds.
To use the
play function, the game needs to have audio files loaded by adding them to the audio config file, usually located at
files: calm: loop: true src: music/music.mp3 battle: loop: true src: music/battle.mp3 click: src: audio/click.ogg game_start: volume: 0.9 src: audio/game_start.ogg failure: src: audio/failure.ogg options: volume: 0.5 musicFadeInTime: 0.5 musicFadeInDelay: 0.5 musicFadeOutTime: 0.5 audioTriggers: onPlayerAnswered: click onPressStart: game_start onSkillCheckFailure: failure
The path of the audio configuration yaml can be changed in the base
Playing music or sounds
Once there are audio files loaded in the engine, audio can be played with the
play function at any time in the script:
play music musicName
Playing with mode
music will replace stop and replace the current music to play a new one. There is only one music playing at a time
play sound soundName
Playing with the mode
sound will just play a sound, no matter what else is already playing.
Stopping and pausing
It is also possible to pause or stop sounds or music:
stop music (no need to specify the name because there is only one music playing
stop sound soundName (name must be specified)
pause music will pause the music.
It can later be resumed with
resume music or with
play music musicName (the play command requires the name of the music to play)
For example, one could do a dramatic pause of the music
play music suspense wait 1500 pause music play sound scary wait 100 talk character idle "Suddenly, something happened!" resume music # resume the music
Title Screen Music
A music can play on the title screen, by adding the
defaultMusic option in the audio config:
files: music: loop: true src: music/music.mp3 options: defaultMusic: music volume: 0.5 musicFadeInTime: 0.5 musicFadeInDelay: 0.5 musicFadeOutTime: 0.5
Audio-specific fade timings
Individual audio files can have fade in/out and fade delays configured, which will override the default ones from the audio option when that specific audio plays:
files: music: loop: true src: music/music.mp3 fadeInTime: 2 fadeOutTime: 2 fadeInDelay: 2
Audio triggers allow specifying a sound effect in the config that will be played when a specific event happens. There are a few audio triggers available in narrat.
Simply add the ones you want to use to the config. For example:
files: click: src: audio/click.ogg game_start: volume: 0.9 src: audio/game_start.ogg failure: src: audio/failure.ogg success: src: audio/success.wav audioTriggers: onPlayerAnswered: "click", onPressStart: "game_start", onSkillCheckFailure: "failure", onSkillCheckSuccess: "success" onButtonClicked: click onSpriteClicked: click onItemUsed: click
Audio Volume mixing
All volumes are between 0 and 1.
The volume a specific audio file is playing at is calculated by multiplying the following volumes together:
- Master Volume (The one in
options.volumein the audio config file, which players can also edit in the system menu)
- Channel Volume (Starts at 1, players can edit them in the system menu)
- Audio file volume: The volume specified in the audio config file for that specific audio file, if it exists. Otherwise it's 1.
So for example:
If I set master volume to 1, and music volume has been set to 0.5, and a specific sound effect has its volume set at 0.5, then the sound effect will play at 0.25 volume.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00634.warc.gz
|
CC-MAIN-2023-40
| 3,387
| 43
|
https://studdy.ai/shared-solution/1fc75887-d183-4a99-8431-3aca0d250561
|
code
|
Solve the problem.
Super Costume Shop
1405 Green Street
Rocky wrote this address on a piece of paper.
Solve the problem
Rocky wrote the digits of the street address incorrec
What should be the correct street address?
Use what you know about place value to explain
numbers, and/or symbols in your explanation.
- The text presents several arithmetic problems to be solved: 5,784+10, 5.794+10, 67,321+10, and 67.321+10.
- There's an address mentioned: Super Costume Shop, 1405 Green Street.
- It is stated that Rocky wrote the address incorrectly.
- Two questions are raised:
- Part A: What should be the correct street address?
- Part B: Use knowledge about place value to explain the mistake.
- The text appears to be part of a homework assignment, specifically Homework 4.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100555.27/warc/CC-MAIN-20231205172745-20231205202745-00537.warc.gz
|
CC-MAIN-2023-50
| 772
| 16
|
https://www.freelancer.com/projects/website-design/update-shopify-online-store-checkout/?ngsw-bypass=&w=f
|
code
|
I need to add some coding/feature on my website. I want to add "spend $xx amount more and get free shipping" message on the cart page for customers. It needs to detect the total fee amount in their cart to specify how much they need to spend to get free shipping over $99 for example. Thanks.
8 freelancers are bidding on average $36 for this job
How are you? I checked your job description and png file carefully. I can fully realize your requirement. Looking forward to hearing from you. Thanks. Dmitry
I made many website. I can customize your website following your instruction. I can start to work immediately. Please also look at my profile portfolio to prove myself that I am telling the truth.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488262046.80/warc/CC-MAIN-20210621025359-20210621055359-00108.warc.gz
|
CC-MAIN-2021-25
| 701
| 4
|
https://sisudata.com/blog/the-future-of-analytics-accelerating-operational-decisions-webinar
|
code
|
The Future of Analytics: Accelerating Operational Decisions
By Maile Farnow - April 14, 2020
The digitization and automation of business processes are forcing companies to make fundamental changes to how they operate. From sales to operations and from engineering to customer success, every member of the organization has to make day-to-day decisions not only faster, but backed by data.
Unfortunately for many teams, the promise of an effective operational analytics model is blocked by three things:
- A data infrastructure not designed for the kinds of data required for operational decision-making
- A highly manual, reactive analytics workflow that limits access to operational insights
- The lack of a data-driven culture that’s undermining the value of the information available to every employee in the organization
On April 22nd, Jad Naous from Imply and Peter Bailis from Sisu led an engaging discussion about why a culture of operational analytics is a requirement to compete in today’s market, how companies can quickly reinvent the way they share data across the organization, and where leaders can focus their time on building a culture where every decision is informed with data.
Watch the webinar on-demand here.
- Jad Naous is the Vice President of Research and Development at Imply, where he’s focused on building the product and engineering teams responsible for Imply’s real-time analytics solution built around Apache Druid. Imply’s mission is to help their customers explore and understand their data, while also giving back to the open source community.
- Peter Bailis is the founder and CEO of Sisu, the operational analytics platform that helps businesses diagnose why their critical metrics are changing. Based on years of research at Stanford University, Sisu uses machine learning and powerful statistical analysis to help anyone get answers to their toughest business questions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585201.94/warc/CC-MAIN-20211018093606-20211018123606-00056.warc.gz
|
CC-MAIN-2021-43
| 1,917
| 11
|
https://www.needanews.com/95.html
|
code
|
A VPS is a server that isshared between multiple users. However, each website that鈥檚 stored on it is given a specific amount of power and memory. This is achieved by running a hypervisor, which builds virtual environments by creating, releasing, and managing all the available resources.
People also ask
What is a virtual VPS?
VPS is an abbreviation for Virtual Private Server, a self-regulating server inside a parent server that can host several VPSs. This is usually possible thanks to software that divides the master server hardware requirements. Because of this, each VPS segment can function independently.
What is a VPS segment?
Because of this, each VPS segment can function independently. The segmenting of these servers means all VPS self-sufficiently operate their operating system from the primary server. This then means that a VPS can be restarted and not affect any other VPS.
What are the advantages of VPS hosting?
Advantages of Using VPS Hosting. Here are some of the advantages of choosing VPS over a regular shared hosting: Improved Website Performance 鈥?With a VPS, you are not competitively sharing resources with noisy neighbors (those who exceed allocated resources).
What is the difference between a shared server and a VPS?
However, unlike a VPS, on a shared server there are no dedicated resources for your site. You鈥檒l have to compete with the other properties stored alongside yours for storage, memory, and power. This can lead to performance issues and even security vulnerabilities. Meanwhile, a VPS functions as a hybrid of these two options.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337339.70/warc/CC-MAIN-20221002181356-20221002211356-00440.warc.gz
|
CC-MAIN-2022-40
| 1,586
| 10
|
https://forums.unrealengine.com/t/compile-failed-this-project-could-not-be-compiled-would-you-like-to-open-it-in-microsoft-visual-studio/401947
|
code
|
I was trying to use c++ and this error popped up (Compile failed. This project could not be compiled. Would you like to open it in microsoft visual studio?). And some more text after that. I hadn’t used c++ for some time and wanted to learn it but this error popped up. So how can I fix this?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663021405.92/warc/CC-MAIN-20220528220030-20220529010030-00450.warc.gz
|
CC-MAIN-2022-21
| 294
| 1
|
https://ermodelexample.com/baseball-league-relational-database-er-diagram/
|
code
|
Baseball League Relational Database ER Diagram – The ER Diagram can be a powerful tool in data mining. This is because it allows the visualization of complicated relationships in a straightforward format. The fundamental steps are the identical wherever you work. In the beginning, it is to determine “what” your system is. A rectangle represents the entity and should have ample space. Incorporate ovals as attributes and connect them with the entity. Leave a little space between rectangles and ovals.
Every single entity on an ER diagram is known as an attribute. An attribute is a property or trait that an individual entity has. In the case the case of an ER diagram An Inventory Item Name is one of the attributes belonging to an inventory Item. The entity could have as many attributes as it requires. Additionally, each attribute could have specific attributes. For instance, a customer’s address could have the following attributes: street number along with a city, state. These are composite attributes, and there aren’t any restrictions regarding the number of each.
The next step to analyze an ER diagram would be to identify how much information each entity has. The commonality of each person is the number of elements that are shared among two different entities. For example, a customer could buy several phones on one service for cell phones, however, the cell service provider has several phones under the same bill. The ER diagram will make it easier to identify the relationship between entities. In addition, it may assist you in determining what information is the basis of each entity.
As the system grows and becomes more complex and complex, an ER diagram could become complicated and confusing to comprehend. The complex nature is the reason why an ER diagram demands a more precise representation of the micro-level. A well-designed ER diagram will help you learn about a system in greater depth. Make sure to include white space between the tables of your ER diagram to prevent confusion. If you don’t, it will be difficult to figure out the relationship between two different entities.
A person is a person. An entity is an object or class. An entity can be an individual or a city or even an organization. An entity that is weaker is one that is dependent on another, and is deficient in the most important attributes. An attribute describes a property in an object. The person who is in the ER diagram is an adjective. In the same way, the city constitutes an entire entity. So, the connection between two entities is a noun.
The attributes included in an ER diagram should be identified. A teacher entity can have multiple value for each subject. Students can also have several subjects. The relationship between two entities is represented by diamond-shaped shapes. The lines are usually marked with verbs. They are then identified as entities. If a student is unsure regarding the meaning of an attribute an attribute, the ER diagram can help them understand the relationship between two different objects.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711286.17/warc/CC-MAIN-20221208082315-20221208112315-00081.warc.gz
|
CC-MAIN-2022-49
| 3,052
| 6
|
https://openparliament.ca/committees/public-safety/40-3/53/andrew-kania-4/only/
|
code
|
Mr. Vernon, thank you for your theory, but my question was are you aware of any examples of how we as Canadians have suffered because we've not had these provisions in place since February 2007? I'm not asking you to theorize about how maybe at some point in the future, hypothetically, we might need them. I'm asking you whether you're aware of any specific examples where we would have needed them since they expired.
On February 10th, 2011. See this statement in context.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257845.26/warc/CC-MAIN-20190525004721-20190525030721-00003.warc.gz
|
CC-MAIN-2019-22
| 474
| 2
|
https://community.monogame.net/t/downloaded-textures-blank-after-resuming-game/1964
|
code
|
A few of the Textures in my game are downloaded at runtime from a website. Here is the code I use to download and store the texture:
/// The texture used to render the sprite.
private Texture2D mTexture;
/// Downloads a texture based on a URL path, and stores it in this sprites texture.
/// <param name="URL">The path to the file.</param>
private void DownloadTexture(String URL)
HttpWebRequest request = HttpWebRequest.Create(new Uri(URL)) as HttpWebRequest;
HttpWebResponse response = request.EndGetResponse(ar) as HttpWebResponse;
using (Stream stream = response.GetResponseStream())
using (MemoryStream ms = new MemoryStream())
int count = 0;
byte buf = new byte;
count = stream.Read(buf, 0, 1024);
ms.Write(buf, 0, count);
} while (stream.CanRead && count > 0);
mTexture = Texture2D.FromStream(GameObjectManager.pInstance.pGraphicsDevice, ms);
I updated MonoGame.Android a while back to fix the issue with all textures turning black on resume. This one seems to be specific to these downloaded textures.
Here is what the texture data looks like after resuming the app:
Comparing that with the working version (prior to resume) I can see that glTexture has changed from 470 to -1 (the value on construction). So perhaps these textures get rebuilt or something behind the scenes?
I noticed this in the log:
[MonoGame] End reloading graphics content
Which seems to imply that graphic content had to be reloaded on resume. Perhaps I need to re-download all textures again too?
Yes, you have to reload textures that you load from streams (web) or create dynamically (.SetData(),RenderTargets). You can for example cache the web content to disk to avoid additional request.
ContentManager reload it’s textures automatically.
For the small amount of downloaded content I have, I think this makes more sense than caching (it also ensures the content is up to date in case the user resumes after a long period).
I wonder though, is there a way to hook into the ContentManager’s reload functionality, so that whenever it decided it needs to reload content, I could do the same? Ensuring that they are always in sync.
Usually I use the GraphicsDevice.DeviceReset but I guess OnActivated will work too.
ContentManager reloads textures from .XNBs, it keeps the filename for that, it has no knowledge of how or from where you load your textures.
You could write a URLTexture class to reload web content automatically or to save then onSuspend and restore them onResume.
You can sub-class the content manager and override one of the methods (called something like ReloadGraphicsResources()). I’ve done this myself but if you’re not actually using the ContentManager to load those textures, it would probably make more sense to hook into GraphicsDevice.DeviceReset. This would be better than OnActivated because often the game can be Deactivated and Activated without losing the GL context, so not requiring textures to be reloaded.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662625600.87/warc/CC-MAIN-20220526193923-20220526223923-00010.warc.gz
|
CC-MAIN-2022-21
| 2,930
| 30
|
http://sto-forum.perfectworld.com/showthread.php?p=7801161&mode=threaded
|
code
|
How is this even REMOTELY acceptable? A lot of people are trying to log into your game, so you decide to intentionally DISABLE one of its features? And one that you actually promote on a weekly basis and gets cross promoted on startrek.com. Just when I want to give the devs credit for a cool 3rd year anniversary they go and do something that is literally insane.
Last edited by betawatcher; 01-31-2013 at 03:37 PM.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430455180384.30/warc/CC-MAIN-20150501043940-00022-ip-10-235-10-82.ec2.internal.warc.gz
|
CC-MAIN-2015-18
| 416
| 2
|
https://cio-wiki.org/wiki/Component_Object_Model_%28COM%29
|
code
|
Component Object Model (COM)
Component Object Model (COM) is a simple Microsoft specification method that defines a binary standard for exchanging code between two systems, regardless of the Operating System (OS) or programming language. COM provides access to distributed client object services and is used to share cross-platform binary code and programming languages. Portability - COM's primary objective - is achieved through well-defined COM object interfaces.
COM objects are discrete components, each with a unique identity, which exposes interfaces that allow applications and other components to access their features. COM objects are more versatile than Win32 DLLs because they are completely language-independent, have built-in interprocess communications capability, and easily fit into an object-oriented program design. COM was first released in 1993 with OLE2, largely to replace the interprocess communication mechanism DDE used by the initial release of OLE. ActiveX also is based on COM.
To understand COM (and therefore all COM-based technologies), it is crucial to understand that it is not an object-oriented language but a standard. Nor does COM specify how an application should be structured; language, structure, and implementation details are left to the application developer. Rather, COM specifies an object model and programming requirements that enable COM objects (also called COM components, or sometimes simply objects) to interact with other objects. These objects can be within a single process, in other processes, and can even be on remote computers. They can be written in different languages, and they may be structurally quite dissimilar, which is why COM is referred to as a binary standard; a standard that applies after a program has been translated to binary machine code. The only language requirement for COM is that code is generated in a language that can create structures of pointers and, either explicitly or implicitly, call functions through pointers. Object-oriented languages such as C++ and Smalltalk provide programming mechanisms that simplify the implementation of COM objects, but languages such as C, Java, and VBScript can be used to create and use COM objects. COM defines the essential nature of a COM object. In general, a software object is made up of a set of data and the functions that manipulate the data. A COM object is one in which access to an object's data is achieved exclusively through one or more sets of related functions. These function sets are called interfaces, and the functions of an interface are called methods. Further, COM requires that the only way to gain access to the methods of an interface is through a pointer to the interface. Besides specifying the basic binary object standard, COM defines certain basic interfaces that provide functions common to all COM-based technologies, and it provides a small number of functions that all components require. COM also defines how objects work together over a distributed environment and have added security features to help provide a system and component integrity.
Definitions of the Basic Elements in COM
Let's go from the bottom up. An interface is simply a group of functions. Those functions are called methods. Interface names start with I, for example IShellLink. In C++, an interface is written as an abstract base class that has only pure virtual functions.
- Interfaces may inherit from other interfaces. Inheritance works just like single inheritance in C++. Multiple inheritance is not allowed with interfaces.
- A coclass (short for component object class) is contained in a DLL or EXE, and contains the code behind one or more interfaces. The coclass is said to implement those interfaces. A COM object is an instance of a coclass in memory. Note that a COM "class" is not the same as a C++ "class", although it is often the case that the implementation of a COM class is a C++ class. A COM server is a binary (DLL or EXE) that contains on or more coclasses.
- Registration is the process of creating registry entries that tell Windows where a COM server is located. Unregistration is the opposite - removing those registry entries.
- A GUID (rhymes with "fluid", and stands for globally unique identifier) is a 128-bit number. GUIDs are COM's language-independent way of identifying things. Each interface and coclass has a GUID. Since GUIDs are unique throughout the world, name collisions are avoided (as long as you use the COM API to create them). You will also see the term UUID (which stands for universally unique identifier) at times. UUIDs and GUIDs are, for all practical purposes, the same. A class ID, or CLSID, is a GUID that names a coclass. An interface ID, or IID, is a GUID that names an interface. There are two reasons GUIDs are used so extensively in COM:
- GUIDs are just numbers under the hood, and any programming language can handle them.
- Every GUID created, by anyone on any machine, is unique when created properly. Therefore, COM developers can create GUIDs on their own with no chance of two developers choosing the same GUID. This eliminates the need for a central authority to issue GUIDs.
- An HRESULT is an integral type used by COM to return error and success codes. It is not a "handle" to anything, despite the H prefix.
- Finally, the COM library is the part of the OS that you interact with when doing COM-related stuff. Often, the COM library is referred to as just "COM,"
Attributes of Interfaces
Given that an interface is a contractual way for a COM component to expose its services, there are several very important points to understand:
- An interface is not a class. Although an instance of a class can be created (instantiated) to form a COM component, an interface cannot be instantiated by itself because it carries no implementation. A COM component must implement that interface and that COM component must be instantiated in order for an interface to exist. Furthermore, different COM component classes may implement an interface differently, so long as the behavior conforms to the interface definition for each associated component (such as two COM components that implement IStack where one uses an array and the other a linked list). Thus the basic principle of polymorphism fully applies to COM components.
- An interface is not a COM component. An interface is just a related group of functions and is the binary standard through which clients and COM components communicate. The COM component can be implemented in any language with any internal state representation, so long as it can provide pointers to interface member functions.
- COM clients only interact with pointers to interfaces. When a COM client has access to a COM component, it has nothing more than a pointer through which it can access the functions in the interface, called simply an interface pointer. The pointer is said to be opaque because it hides all aspects of internal implementation. You cannot see the COM component's data, as opposed to C++ object pointers through which a client may directly access the object's data. In COM, the client can only call methods of the interface to which it has a pointer. This encapsulation is what allows COM to provide the efficient, safe, robust binary standard that enables local or remote transparency.
- COM components can implement multiple interfaces. A COM component can - and typically do - implement more than one interface. That is, the COM class has more than one set of services to provide. For example, a COM class might support the ability to exchange data with COM clients, as well as the ability to save its persistent state information (the data it would need to reload to return to its current state) in a file at the client's request. Each of these abilities is expressed through a different interface (IDataObject and IPersistFile), so the COM component must implement two interfaces.
- Interfaces are strongly typed. Every interface has its own interface identifier (a GUID, which is described later), thereby eliminating any chance of a collision that would occur with human-readable names. The difference between components and interfaces has two important implications. When you create a new interface, you must also create a new identifier for that interface. When you use an interface, you must use the identifier for the interface to request a pointer to the interface. This explicit identification improves robustness by eliminating naming conflicts that would result in run-time failure.
- Interfaces are immutable. COM interfaces are never versioned, which means that version conflicts between new and old components are avoided. A new version of an interface, created by adding more functions or changing semantics, is an entirely new interface and is assigned a new, unique identifier. Therefore a new interface does not conflict with an old interface even if all that changed is one operation or the semantics (but not even the syntax) of an existing method. Note that, as an implementation efficiency, it is likely that two very similar interfaces can share a common internal implementation. For example, if a new interface adds only one method to an existing interface, and you as the component author wish to support both old-style and new-style clients, you would express both collections of capabilities through two interfaces, yet internally implement the old interfaces as a proper subset of the implementation of the new.
Threading in COM
In COM, threading is addressed through a concept known as apartments. All COM objects live in exactly one apartment, which might either be single-threaded or multi-threaded. There are three types of apartments in COM: Single-Threaded Apartment (STA), Multi-Threaded Apartment (MTA), and Thread Neutral Apartment (NA). Each apartment represents one mechanism whereby an object's internal state may be synchronized across multiple threads. A process can consist of multiple COM objects, some of which may use STA and others of which may use MTA. All threads accessing COM objects similarly live in one apartment. The choice of apartment for COM objects and threads is determined at run-time, and cannot be changed.
Threads and objects which belong to the same apartment follow the same thread access rules. Method calls that are made inside the same apartment are therefore performed directly without any assistance from COM. Method calls made across apartments are achieved via marshaling. This requires the use of proxies and stubs.
- Definition - What does Component Object Model (COM) mean?
- What is Component Object Model (COM?
- Understanding Component Object Model (COM)
- An Introduction to Component Object Model (COM) - Defining Basic Elements CodeProject
- Component Object Model (COM) - Attributes of Interfaces
- Component Object Model (COM) - Threading Wikipedia
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510520.98/warc/CC-MAIN-20230929154432-20230929184432-00200.warc.gz
|
CC-MAIN-2023-40
| 10,883
| 31
|
https://revolution.kunbus.de/forum/viewtopic.php?f=6&p=4492
|
code
|
Hi to all
As I told before I integrate Node Red with my Rev Pi Connect. I was able to see that Dirk send information about the way to make Node Red the Modbus TCP Master.
My aproach was a bit different. Node Red just provide GUI for the operator and manage all information collected by Modbus TCP channel. Modbus information is collected by PiCtory. I configure all network in this tool. To bring all collected data to Node Red I used Exec node and run command to read / write. I had to active Swamp mpde because CPU overload. Please check the attached file.
Pictory is a very nice tool despite the fact it doesn't handle float variables. This fact brings some complectity when you need to use such kind data.
If further details are needed please let me know.
- 1.png (275.29 KiB) Viewed 1926 times
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496671245.92/warc/CC-MAIN-20191122065327-20191122093327-00423.warc.gz
|
CC-MAIN-2019-47
| 798
| 6
|
https://forums.unrealengine.com/t/umg-efficiency-of-uproperty-meta-bindwidgetanim/153330
|
code
|
Just a quick question, I’m wondering if these bind tags run every frame similar to how the blueprint “property binding” functionality binds a property to a get function. I’d rather not use it if it sets the value every frame of the game.
For example, if I use C++ code
UPROPERTY(meta = (BindWidgetAnim))
Will every frame of the game set the blinking text animation value to the animation I’ve set in the designer? I’m thinking not, but it sounds similar to the “property binding” functionality. Just curious if anyone knows the answer on this or a way to test it out.
Heres a link to the UMG C++ UROPERTY macros I’m questioning:
Heres a link to the UMG Blueprint Property Bindings (which I’m comparing it to)
Thanks to anyone in advance!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964361064.69/warc/CC-MAIN-20211202024322-20211202054322-00283.warc.gz
|
CC-MAIN-2021-49
| 757
| 7
|
https://hackaday.io/project/616-towani-lifesign-wristdevice-star-wars-ewoks/log/1860-video-update
|
code
|
First things first -
The bracelet is about 95% the same from the movie. It is missing those 4 dip switches, but is instead hard wired to channel 1 and I had to imrpovise about the leds. I don"t have a pulse sensor, but it would definately work as a prop the way it is right now.
As nothing ever is really done, I will get back to this after the contest.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526408.59/warc/CC-MAIN-20190720024812-20190720050812-00349.warc.gz
|
CC-MAIN-2019-30
| 353
| 3
|
https://community.filemaker.com/thread/116506
|
code
|
PDF In Container problem
I have a Vehicle Maintenance Database that I use to keep track of maintenance on our Trucks. When I get maintenance receipts I convert them into pdf files. There is a container in the database so that I drag the pdf files into the container of eache record and it displays the pdf of the receipt as I scroll through the records.
This week, however, when I open database the record the pdf automatically open in another window and no longer displays the pdf in the record. When I move to a different record the same thing occurs open adobe reader in a separate window. Ive been looking to see if there was some setting changed for 2 days and cannot find a thing.
FileMaker Pro 12v3
PS. This only happens on one of 4 computers, all other computers functioning normally
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247486936.35/warc/CC-MAIN-20190218135032-20190218161032-00449.warc.gz
|
CC-MAIN-2019-09
| 791
| 5
|
https://doc.axxonsoft.com/confluence/display/face60en/Viewing+a+video+fragment+that+corresponds+to+a+recognized+face
|
code
|
A video fragment corresponding to a recognized face may be viewed through the Protocol or Archive tabs. Video fragments are viewed through the Video option of the recognized face's context menu.
If the screen is currently displaying a monitor from the video surveillance window corresponding to the given surveillance camera, then the given video surveillance window will begin playback of archived recordings after clicking the Video option.
Navigation through a video archive (working with a video surveillance window with playback of archived recordings) is described in Intellect Software Package (base): Operator's Guide.
This capability is fully provided if the Software is properly configured for it (see Intellect Software Package (base): Administrator's Guide).
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999261.43/warc/CC-MAIN-20190620145650-20190620171650-00323.warc.gz
|
CC-MAIN-2019-26
| 770
| 4
|
https://woutertrappers.be/tag/selfservice-bi/
|
code
|
For years I am trying to build a single source of the truth (SSOT). Now I read in "What's your data strategy" about a MVOTs architecture: multiple versions of the truth. But wait a minute, wasn't this exactly what we were trying to root out?
As information management consultants we often get the question to integrate self-service BI in our solutions. This is question we welcome with open arms, not just because you can do technically beautiful things
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104248623.69/warc/CC-MAIN-20220703164826-20220703194826-00794.warc.gz
|
CC-MAIN-2022-27
| 453
| 2
|
https://documentation.extremenetworks.com/switchengine_commands_32.3/GUID-6089700E-28A8-4DE2-80DD-BCE41E0BD8CD.shtml
|
code
|
Clears a previously associated security profile.
|user-name||Specifies the name of an existing local network login account.|
Use this command to clear any previously associated security profiles on the switch.
This command was first available in ExtremeXOS 12.1.
This command is available on ExtremeSwitching 5320, 5420, 5520, and 5720 series switches.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511220.71/warc/CC-MAIN-20231003192425-20231003222425-00062.warc.gz
|
CC-MAIN-2023-40
| 352
| 5
|
https://www.bu.edu/ultra-ex/
|
code
|
The Boston ULTRA-Ex (Urban Long-Term Research Area Exploratory) project is a National Science Foundation-funded research platform investigating the space-time variation in Metropolitan Boston’s carbon metabolism. The NSF offers these awards to projects that support interdisciplinary research on the dynamic interactions between people and natural ecosystems in urban settings. We are investigating both natural and human influences in Boston’s carbon metabolism. For more information about the intellectual framework for the project, please follow this link.
This project focuses on two-scale ranges that bracket key processes:
- Carbon storage over multi-decadal time scales across tens of kilometers
- Carbon exchanges and atmospheric CO2 fluctuations over sub-hourly time scales and from kilometers down to meters of space.
On this website, you will find basic information, announcements, and updates relating to the Boston Ultra-Ex project. Please check back often to see the status of current research and to view preliminary results. Contact us with ideas or potential collaborations.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662541747.38/warc/CC-MAIN-20220521205757-20220521235757-00046.warc.gz
|
CC-MAIN-2022-21
| 1,095
| 5
|
https://forum.owlcatgames.com/t/banner-over-the-citadel/42423
|
code
|
can anyone give EXACT location of the REAL Banner? I have searched the whole dungeon 20 times now, and the secret passage that this prisoner was supposed to reveal doesnt exist
“you should come to a room that is filled with undead. Yaniel” will turn up and show you the route to the real banner
Sometimes passages are hard to see, the one Yariel unveils is like that. Try to click somwhat behind a doorway to see if your chars can go there, the area behind it will then become accessable, i.e. viewable.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056476.66/warc/CC-MAIN-20210918123546-20210918153546-00295.warc.gz
|
CC-MAIN-2021-39
| 507
| 3
|
https://github.com/tomorrowevening
|
code
|
Create your own GitHub profile
Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 28 million developers.
After Effects extension to export Compositions to JSON
Forked from arturoc/ofxHttpUtils
http client openframeworks addon
After Effects extension for controlling multiple keyframes' easing
431 contributions in the last year
in private repositories
Oct 1 – Oct 10
Press h to open a hovercard with more details.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511122.49/warc/CC-MAIN-20181017090419-20181017111919-00314.warc.gz
|
CC-MAIN-2018-43
| 479
| 10
|
https://www.blackhatworld.com/seo/need-help-what-to-do-with-80-dollars-what-can-be-outsourced-with-this.121021/
|
code
|
hi, I like to make just 50$ a day, on autopilot. thats it. for me that is more than enough to make a living. it comes down to 1500 dollar a month, which ill use to do big project. I like to know that how can you make just $50-$70 a day, just outsources projects. I really need help with this. is there something that can be done with $80 and outsourcing something that'll continue to make 50 dollar a day in the long run. that's it. any suggestion would be really great. thanks!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583658901.41/warc/CC-MAIN-20190117082302-20190117104302-00482.warc.gz
|
CC-MAIN-2019-04
| 478
| 1
|
https://community.hitachivantara.com/thread/13046-what-is-the-state-of-the-community
|
code
|
I recently got wondering about the state of the Pentaho community, and wondered how best to find that out?
Clearly it is doing well, but it's not everything that it once was. It has morphed into something else! Of course events like PCM are bigger and better than ever, and user groups all over the place now, so that side of things is doing well. In fact at PCM an experienced open source guy said the vibe in the Pentaho community was unique. Nice!
But; What about the open source side of things? I get the impression that has died a death, and it's practically impossible these days to submit a patch for a bug etc. Is that just a natural progression now that the software is more Enterprisey? I remember when they re-worked the server, made everything API friendly, and the whole point of this was they hoped the community would contribute the UI/UX front end for it! How times have changed!
I also have an ongoing beef with the lack of engagement with other open source communities - except alfresco of course . But that's a separate issue.
Could/Should the community share job opportunities more too? I see at the moment there are 100's of jobs mentioning Pentaho every week, this is amazing, but a lot are agencies - if we had a central place to share opportunities maybe they could be cut out! (And that is better for everyone!)
I do think this vantara community space seems to have at least exposed some people to the community who were not aware of it before - that has to be a good thing too.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578529898.48/warc/CC-MAIN-20190420160858-20190420182858-00285.warc.gz
|
CC-MAIN-2019-18
| 1,503
| 6
|
http://blog.context.io/2013/09/context-io-now-supports-outlook-com/
|
code
|
We are very happy to announce that Context.IO now let’s you connect to Outlook.com accounts! This means your application built on Context.IO can now access 400 million+ new users.
Connecting your app to an Outlook.com inbox is easy! Our connect tokens and settings discovery resource have been updated to support this new user base so you don’t have to go through any special changes in your code. For example, Message Finder, an application from OtherInbox built on Context.IO was able to add Outlook.com support to their app in less than a day
Building Message Finder on top of Context.IO has made development of the app faster and easier. Plus, when new email providers like Outlook.com are added to Context.IO, our potential user base grows tremendously overnight. Integrating support for Outlook.com was as simple as adding a shiny new Outlook.com logo to our account setup page and testing to make sure everything worked well. We couldn’t be happier!
Brian Bailey – Product Manager for Message Finder
Let’s get technical
One very exciting part of this is Outlook.com support OAuth authentication so there’s no need to exchange credentials with users. As is the case for connecting to Gmail accounts, we strongly encourage you to register your own app with Microsoft and get an OAuth consumer specifically for it. That way users authorize your app specifically. These are the steps to follow to register your app with Microsoft and get an OAuth consumer key from them:
- Go to https://account.live.com/
developers/applications and either sign in or create an account to sign in
- Click the “Create application” link
- If you’re using our connect_tokens to connect end users to your Context.IO key, you need to specify the following values:
- Redirect domain: https://<YOUR_CONTEXTIO_CONSUMER_KEY>.api.context.io
- Mobile client app: No
- Once your application is registered with Microsoft, login the Context.IO Developer Console and add that new OAuth Consumer to your account under “settings” > “OAuth access to IMAP” (direct link here) and pick “Microsoft Live Connect” as the provider.
If you don’t want to use connect tokens for your user onboarding, it’s still easy to use our add source resource to connect an Outlook.com inbox. One thing to remember is that you cannot save credentials – you must use OAuth!
Let us know what cool apps you’re building on top of Outlook.com!
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163985723/warc/CC-MAIN-20131204133305-00049-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 2,423
| 15
|
https://lists.cpunks.org/pipermail/cypherpunks/2015-January/051761.html
|
code
|
[Cryptography] open hardware as a defence against state-level attacks
chgans at gna.org
Tue Jan 13 20:26:27 PST 2015
On 14/01/15 14:56, Andy Isaacson wrote:
> On Mon, Jan 12, 2015 at 03:04:23PM -0500, grarpamp wrote:
>> Yet let me open another related line of thinking...
>> Where are the open fabs for makers instead of submitting open
>> designs to closed fabs? It's 2015, crowdfunding, open source,
>> non-profits, and public monitoring are done.
Chip fabs are not cheap, you need billions of dollars/euros to start one
A more reasonable approach would be to buy an old one, but you would
still need lot of millions. And this is without taking running costs
into account. Running a fabrication plant is quite different from
running a fablab or a hacker space....
Having micro-electonics background and being an open-source proponent, i
have been thinking about this kind of problems for a while.
Before going for a semiconductor fabrication plant, maybe it would be
better to start with something more simple like resistors, capacitors,
diodes, transistors, ... (Look at the GNU project, they bootstrapped
their "complete free Unix-like system" with gcc, make, libc and the
likes, they didn't start with gimp or gnome)
10/20 years ago, you would make your PCBs yourself (Printed Circuit
Board ), the technology started with single layer PCB, and then came
the 2 layers (double-sided) PCBs, it was a bit more difficult, but it
was still doable. By 2015 the standard is 4, 6, 8+ layers, and I've
never heard of DIY method to make such 4+ layers PCBs. Single and double
layers PCBs are still useful, and i'm sure there's plenty of
fablabs/hackespaces with the right gears to help you make them. But if
your goal is to make a phone, a PC, ... you need way more advanced
I see Open-Hardware as a myth and an utopia (I'm OK with this I am an
- A myth because so far people have created open electronics design with
proprietary physical electronics and electro-mechnical components. I
could go for hours on this one, just get one of this board in your hand
(a Pi, beagleborad, arduino, ...) and look at it, every single physical
part is proprietary, every single one! They usually used proprietary EDA
software, with proprietary 3rd party libraries, they certainly sent
their open designs to the PCB manufacturer using a proprietary format.
And then they load it with open-source software and claim the thing to
be open-hardware... (don't get me wrong, hat off to these awesome guys!)
- An utopia because we are light-years away from being able to produce
100.0% open-hardware. As I said, a 100.0% open-hardware piece of
equipment means that you have access to the technology of all parts
being used to produce the final product (the equivalent of the source
code of all open-source projects (and standards) needed to create a
Linux distro for example). but as of today, nothing is open-technology,
even a simple plastic connector or a ceramic capacitor are protected by
patents all over the place! The manufacturers of these parts usually
kindly provides you with models of their components (electronic symbol,
3D model, PCB footprint, Ibis model, spice models, ...), nice, isn't it?
Well, no, their license are not even compatible with any open-source
ones, which mean you cannot use them to make an open-design, you have to
start from scratch, almost each time!
To go towards a world where 100.0% open-hardware (electronics) is
thinkable we would need:
- open technology to fabricate multi-layers PCBs ( looks promising)
- open technology to fabricate simple electronic and mechanical
components (think resistors, capacitors, transistors, connectors, LEDs, ...)
- open technology to fabricate complex chips (CPU, memories, FPGAs, ...)
- open SW technology to create these electronics designs (using SW
called EDA, CAD, ...)
- And above all we need open standards! Fuck IEEE, IEC, IPC, etc... (As
an exercise to the reader: try to imagine how the internet and the web
would be if W3C and IETF were producing only closed and pricey standards)
Some interesting projects in case you don't know them:
PS: I know you started with open-source micro-electronics projects like
a CPU chip, and i replied more on the above level (make a motherboard
with the said CPU), but I think my point still stands: We first need
open basic physical blocks (components) with which we will then create
open complex parts.
Sorry can't find the link, but it's about printed carbon tracks on a
piece of paper instead of using chemical process to create copper tracks
on flame retardant material...
If you're interested in these, just compare FreeCAD against
SolidWorks and KiCAD against Altium, both FreeCAD and KiCAD are lacking
far, far, far behind:
FreeCAD (open source): http://www.freecadweb.org/
SolidWorks (proprietary): http://www.solidworks.com/
KiCAD (open source): http://www.kicad-pcb.org
Altium (proprietary): http://www.altium.com/
And I didn't even talk about monsters like Cadence () to make your own
IC (chip), there's virtually nothing to compare to in the free world!
> The LowRISC project aims to build a complete open SoC based on the
> RISC-V architecture and get chips fabbed.
More information about the cypherpunks
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00018.warc.gz
|
CC-MAIN-2022-33
| 5,212
| 84
|
https://mix957gr.com/prank-snake-in-a-purse-video/
|
code
|
Prank: Snake in a Purse [Video]
Oh, a purse.
I'm so happy to see that I'm not the only one with a crazy fear of snakes!
You spot a purse sitting alone in a parking lot. You walk up to the purse to turn it in, and a snake jumps out.
How much would you freak out?
Roman Atwood is one of the masters at YouTube pranks. He recently put a fake snake in a purse, and filmed people walking up to it. When they got close, the snake jumped from the purse. The reactions he recorded are golden.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912204768.52/warc/CC-MAIN-20190326014605-20190326040605-00166.warc.gz
|
CC-MAIN-2019-13
| 484
| 6
|
https://pariah73.wordpress.com/2008/05/12/about-this-add-to-friends-list-thing/
|
code
|
Apparently, it is extremely easy to add someone as a friend to your list…You click on the option and they are your "friend" even if you have never conversed with the other person…Now, I find this to be a tad offensive…I think if someone wants to add you as a friend, then a conversation should take place first. I don't think this is unreasonable, in spite of messages that I have received that say that I am getting angry or overreacting…So let me make this a simple post..for simple minds…In my status box, it says to not add me as a friend without talking to me first..please respect this..it is not an "angry" or "over-reacting" message..it is a simple request. Honor it. I don't want to end up on the friends list of a pedophile or a christian group or something..If you want me as a friend, wouldn't you want to talk to me anyway???
About this add to friends list thing……..
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125944677.39/warc/CC-MAIN-20180420174802-20180420194802-00394.warc.gz
|
CC-MAIN-2018-17
| 893
| 2
|
http://www.prweb.com/releases/2016/05/prweb13419711.htm
|
code
|
Seattle, Washington (PRWEB) May 19, 2016
SharePoint Fest to have Sharegate, a gold sponsor of this annual technology conference, to join other sponsors in bringing this event back to Seattle, Washington. Conference delegates will hear from keynote speakers and attend breakout sessions. Over 70 sessions will be offered across multiple tracks, as well as two optional days of workshops preceding the conference. There will also be a networking reception held at the end of the first day of the conference.
Sharegate simplifies management tasks for SharePoint, Office 365, and OneDrive for Business for thousands of administrators and power users around the world. A privately-held company based in Montreal, Sharegate is trusted by more than 10,000 organizations. As a leader in its industry, Sharegate lives by the motto: "Innovate and keep things simple & fun". For more information, visit the web site below or follow us on Twitter @Sharegatetools.
Web Site: http://www.share-gate.com
About SharePoint Fest
SharePoint Fest is in its sixth year. It offers a two-day conference (with an optional two days of workshops) that brings together SharePoint enthusiasts and practitioners, with many of the leading SharePoint experts and solution providers in the country.
Attend SharePoint Fest Seattle where attendees will be able to attend workshops and seminars – taught by Microsoft Certified Trainers, Microsoft engineers, and Microsoft MCM's and MVPs – covering Enterprise Content Management, Implementation/Administration, Business Value, Search, Business Intelligence, Office 365 and SharePoint Development. Attendees will be able to choose one complete learning track or mix and match based on what content best meets their current needs.
At SharePoint Fest Seattle, there will be sessions created for SharePoint administrators, software developers, business analysts, information architects, and knowledge workers, which will ensure that attendees walk away with as much knowledge as they desire to truly leverage SharePoint in their current environment.
Web Site: http://www.sharepointfest.com/Seattle
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583510749.55/warc/CC-MAIN-20181016113811-20181016135311-00131.warc.gz
|
CC-MAIN-2018-43
| 2,110
| 9
|
https://forum.duolingo.com/comment/17526637/%CE%9C%CE%B9%CE%BB%CE%AC%CE%B5%CE%B9-%CE%B5%CE%BB%CE%BB%CE%B7%CE%BD%CE%B9%CE%BA%CE%AC
|
code
|
There is no clear rule about the capitalization of languages in modern Greek. It's your choice, if you capitalize them or not.
PS. I had written an extensive comment about it and my resources, I'll try to find it and put the link here. :-)
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141196324.38/warc/CC-MAIN-20201129034021-20201129064021-00458.warc.gz
|
CC-MAIN-2020-50
| 239
| 2
|
http://elixir.ematia.de/apidocs/elixir.ext.encrypted.html
|
code
|
An encryption plugin for Elixir utilizing the excellent PyCrypto library, which can be downloaded here: http://www.amk.ca/python/code/crypto
Values for columns that are specified to be encrypted will be transparently encrypted and safely encoded for storage in a unicode column using the powerful and secure Blowfish Cipher using a specified "secret" which can be passed into the plugin at class declaration time.
from elixir import * from elixir.ext.encrypted import acts_as_encrypted class Person(Entity): name = Field(Unicode) password = Field(Unicode) ssn = Field(Unicode) acts_as_encrypted(for_fields=['password', 'ssn'], with_secret='secret')
The above Person entity will automatically encrypt and decrypt the password and ssn columns on save, update, and load. Different secrets can be specified on an entity by entity basis, for added security.
Important note: instance attributes are encrypted in-place. This means that if one of the encrypted attributes of an instance is accessed after the instance has been flushed to the database (and thus encrypted), the value for that attribute will be crypted in the in-memory object in addition to the database row.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122621.35/warc/CC-MAIN-20170423031202-00486-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,166
| 5
|
https://x3270.miraheze.org/w/index.php?title=-allow_command-line_option&mobileaction=toggle_view_desktop
|
code
|
Pages for logged out editors learn more
Defines restricted operations that wx3270 is allowed to perform.
The parameter is one or more restricted operation names, separated by the , character.
If this option is used, only those restricted operations defined by this option are allowed.
To allow all restricted operations except a particular set, use the -restrict command-line option.
Allow only file transfer and tracing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494976.72/warc/CC-MAIN-20230127101040-20230127131040-00427.warc.gz
|
CC-MAIN-2023-06
| 421
| 6
|
https://kriszha.com/
|
code
|
I think this is probably the simplest way to make you understand what the hell BRANDING is! check out this video.
Design is the fundamental soul of a man-made creation that ends up expressing itself in successive outer layers of the product or service.
Before starting any logo design or identity design assignment its essential to get transparent idea of what the client’s product and what the product does in the market. To begin with the pre-design research, I usually ask these following key questions to client to save my time and effort.
Art of staying focused on the work is equally essential as your skills on using pencil and artboard. Either you are a designer or a developer, concentration is always the vital ingredient of your every recipe.
Going to share you some of the factors relating to stay focused on the work. Each of them, I learned through my own trial and error process.
They say if you at least meditate for 30 minutes a day, you can spend rest of the day focused and calm. But you need to have quite a patience and routine to sit on a corner of a room, doing nothing for 30 minutes every day.
Companies like Coke, Pepsi, Unilever etc are spending big money on advertisement over the 10-20 years to create an emotional connection between their targeted customer to their brands. Most of these multi national companies uses Social Medias, print medias and television to reach the mass. Slowly people are getting habituated with their products and dependability is also increasing simultaneously.
There are plenty of project management & online colaboration tools out there. Wide popular are Basecamp, Assembla, Activecollab etc. But they are mainly designed to suit the requrement of larger agencies.
I’m a google apps user, and I use gmail.com to login my @kriszha mail. I believe most of the freelancer uses gmail either with @gmail.com or google apps like me. Here you go step by step how to productify your gmail inbox to manage your projects, setting up priority, adding to task, and segregate them in category.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131292683.3/warc/CC-MAIN-20150323172132-00118-ip-10-168-14-71.ec2.internal.warc.gz
|
CC-MAIN-2015-14
| 2,044
| 9
|
https://justwordsinyourhead.com/category/writing/daily-writing-prompt/
|
code
|
I have been trying to write. I dabbled with different exercises and techniques to get me to stick to writing. None has worked so far.
There was the 52 week writing exercise, which lasted for one short story (not a very good one).
Before that there was daily writing prompts. That didn’t work, either.
During all this, I also attempted to write in my personal journal once a day. That worked off and on.
Yesterday morning I had another brilliant idea. I would create a Google Form called “Discovery for Writing” and in it I would make myself answer a list of questions about a writing project before I even began the project.
Building this form led me to research various things about writing such as PLOT, CHARACTERIZATION, and POINT OF VIEW. I was pleasantly surprised at the wealth of information out there that was easily accessible to me without having to sign up for a university course. (I am not sure why I was surprised… in this day and age of the free Internets).
I wrote a Pledge yesterday. That was actually part of an exercise I am doing by following James Scott Bell’s book on Plot and Structure. I stumbled across Bell’s informative book by a long series of article jumps that I won’t bore you with here (I was looking to learn more about PLOT, my greatest weakness).
As part of the new exercise, I’m going to to document each step of my learning and writing here–I’m going to try to post something about what I’ve done each day so I can hold myself accountable.
- Joined a couple of online writing groups.
- Critiqued someone’s work
- Posted some of my own work
- Finished Chapter 1 exercises from Bell’s book.
See you all tomorrow, then!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584518983.95/warc/CC-MAIN-20190124035411-20190124061411-00345.warc.gz
|
CC-MAIN-2019-04
| 1,679
| 13
|
http://www.tads.org/t3doc/doc/wb/tadswb.htm
|
code
|
TADS Workbench is an integrated environment for writing TADS games. TADS Workbench lets you run the compiler, resource bundler, executable builder, and debugger, all with simple menu commands, eliminating the need to enter complex command lines to run the compiler and other tools. TADS Workbench also lets you view and edit your source files with a full-featured built-in text editor.
TADS Workbench includes a "Wizard" that creates a starter game for you automatically. All you have to do is answer a few questions to tell TADS where to put your game files. See Creating a New Game for step-by-step instructions.
If you've already created your game's source files, you can load the game into TADS Workbench from either the source file or the compiled game file:
Workbench has a built-in text editor that you can use to edit your source code. The integrated editor is a popular programmer's text editor called Scintilla, which has all the features you'd expect from a programmer's editor: multi-level undo, syntax coloring, automatic indenting, and much more.
Remember that when you make changes to your source code, you must always save and compile before the changes will take effect. If you run without recompiling, you'll still be running the old version of your game.
If you prefer to use a separate text editor application to edit your source code, you can use the "External Editor" page of the Options dialog to tell Workbench how to open your editor program. Refer to Using an External Editor for details.
The Search toolbar lets you search for keywords in the TADS documentation. This works a lot like a Web search - you just type the keywords you want to find and press Return. Workbench will open a window showing the documentation pages that match your search, showing the "best" (most relevant) matches first.
Note that the Search toolbar has a little button next to the search box that lets you change the type of search it performs. Use the drop-down menu to change the search type. Make sure that "Search User's Manuals" is selected when you want to perform a documentation search.
The doc search system has some special syntax that you can use to customize the search. By default, the search system looks for pages that contain every word you enter, allowing for common variations in the words - for example, if you type operator, the search will also match variations like operators, operating, operated, and so on.
If you want to look for pages that contain any of several words, you can separate the words with the keyword OR. (The keyword must be entered in all upper case letters.) For example, if you type operator OR expression, the search will find pages that contain either of those words (again, including common variations on the words).
You can also exclude words from the search, by preceding each word you want to exclude with the keyword NOT (which must be in all upper case letters). For example, if you type operator NOT expression, the search will find pages that contain "operator" (and common variations), and will exclude any pages that also contain "expression" (or variations).
If you want to search for an exact word, without allowing the search system to look for common variations of the word, enclose the word in double quotes. For example, "operator" will find only that word, not variations like operators, operated, etc.
You can also use quotes to look for an exact phrase, in cases where you want to find two or more words in a particular order. For example, "addition operator" would find only pages containing that exact phrase.
Workbench provides several ways to search for text in the files in your project.
The Search bar lets you perform a quick search of the current text editor window or of the entire project's text files. Use the drop-down menu next to the search box to select which type of search you'd like to perform, then type the text you'd like to find and press Return. If you perform a Current File search, Workbench will simply highlight the next instance of the text in the file. If you perform a Project search, Workbench will open a window showing a list of the matching lines throughout the project - click on a match to jump to that file location.
Unlike the Documentation search system, File and Project searches do not use the "keyword" search system. So, these searches don't look for variations on the words you type, and they don't allow the OR or NOT keywords or the quoting syntax. Instead, File and Project searches simply look for the literal text you enter. The search is case-insensitive (meaning that it ignores upper-case and lower-case differences in the text), but otherwise looks for exactly the text you enter.
If you want more File search options, use the Find command on the Edit menu. This lets you perform regular-expression searches (these are like "wildcard" searches, but more powerful - you can use the full TADS 3 regular expression syntax, which you can read about in the TADS 3 manuals if you search for "regular expressions"), case-sensitive matching, and whole-word matching.
If you want more Project-wide search options, use the Find in Project Files command on the Project menu. This lets you specify regular expression, exact-case, and whole-word searches throughout the project.
Collapsing spaces: When you perform a project-wide search (the Find in Project Files command), the search dialog has a checkbox labeled "Collapse spaces and newlines." If you select this checkbox, the searcher will "collapse" each run of whitespace it finds in each file before searching the file. That is, the searcher looks for any series of whitespace characters (spaces, tabs, and newlines), and converts each consecutive series of these characters into a single space. It then searches the result for your search string or regular expression pattern.
A big benefit of this feature is that it allows the searcher to match your string or pattern even when the matching text in the file is split across two or more lines. This is especially useful when you're searching for a term that occurs in paragraphs of text, such as in long description strings - long strings in source code are often broken up over several lines for readability.
Note one bit of caution you have to use with this feature: you have to be careful to avoid putting multiple consecutive spaces in your search string. If you do, the term will never match anything when the "collapse spaces" option is in effect, because all runs of multiple spaces will be stripped out of the source text before it's searched.
TADS Workbench offers a graphical interface to the TADS compiler, resource bundler, and executable builder. To compile your game, first configure your compilation options by opening the "Build" menu and selecting "Settings," then compile by opening the "Build" menu and selecting the appropriate "Compile" command. See Compiling with TADS Workbench for details.
The core of TADS Workbench is the TADS Debugger. After you've compiled your game, you can run it within TADS Workbench by using the "Go" command (on the toolbar or in the "Debug" menu). The Debugger Overview describes the debugger in greater detail.
TADS Workbench stores information on your game in a special file called a "project file." A project file contains information of interest only to TADS Workbench; you don't need to edit this file directly.
Each game has its own separate project file, because the information in the file is specific to the game. The project file for a game always has the same name as the compiled game file, with the ".t3" suffix replaced by the ".t3c" suffix, and is always in the same directory as the compiled game file.
The project file contains information on the window layout, debugger breakpoints, option settings, and build parameters.
TADS Workbench will always create a new project file for you when you open a game that doesn't already have a project file. You don't need to do anything special to create or manage project files; TADS Workbench handles them automatically without requiring any action on your part.
Note that, when loading a game, you can load the .t3c file or the .t3
file; the two are interchangeable for the purposes of loading a game
into TADS Workbench.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00124.warc.gz
|
CC-MAIN-2022-33
| 8,250
| 30
|
https://oguzpastirmaci.com/2018/05/02/the-ops-team-027-the-fridge/
|
code
|
The Ops Team is a (sometimes) weekly show where (occasionally) 4 Technical Evangelists specializing in IT Operations get together to give you the deets on their 4 areas of expertise: Microsoft Azure/Cloud, On-premises datacenter technologies, Enterprise Mobility / Windows and DevOps.
This week on The Ops Team, we’re back down to 2 of the regulars, with Matt and Oguz bringing you up to speed with the latest IT news. It’s a little chilly in the Ops Team studio this week – someone obviously forgot to pay the last heating bill, and whilst you can’t quite see our breath, trust us, it was COLD! In the news, Matt brings us up to speed with a new, free, ebook and free Microsoft Virtual Academy course, along with some cool resources for storage, Hyper-V Scale and VMware integration. In between those two areas, Oguz shares news on a new Azure App Service with MySQL, some VSTS authentication enhancements, and rounds out with a plethora of MVA courses, all of course, FREE! 🙂 Enjoy!
Here’s all the links and info on the topics we covered, along with the time stamps to jump to specific points in the video.
Azure Stuff with Matt McSpirit
- [02:54] – Microsoft Fundamentals of Azure eBook
- [05:26] – MVA Course – Hybrid IT Management Part 3 – Automation
DevOps and OSS with Oguz Pastirmaci
- [08:18] – Announcing Azure App Service MySQL in-app (Preview)
- [11:19] – Upcoming Changes to How You Log into Visual Studio Team Services
- [12:19] – MVA Courses: Introduction to Microservices, Microservices Design and Patterns, Deploying Dockerized Apps to the Azure Container Service, Building Distributed Applications and Microservices-Based Apps on Azure Container Service
On-Prem Stuff with Matt McSpirit
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585837.82/warc/CC-MAIN-20211024015104-20211024045104-00352.warc.gz
|
CC-MAIN-2021-43
| 1,731
| 11
|
https://bitbucket.org/lambdazen/bitsy/wiki/commits/bdb237a255c8e3d9e0d25d6488912f280a175c54
|
code
|
Files changed (1)
-Bitsy is a [JAR file](https://bitbucket.org/lambdazen/bitsy/downloads) that can be added to your project's classpath. The dependencies are listed [here](Dependencies.md)
If you are using Maven, you can add Bitsy and its dependencies to your project by adding this dependency:
The project artifacts are hosted in the Sonatype OSS Maven Repository at https://oss.sonatype.org/content/groups/public/. You can configure this repository by following [these instructions](http://maven.apache.org/guides/mini/guide-multiple-repositories.html).
-The 1.0 snapshot will be promoted to the 1.0 release after the Beta period ends on **July 18, 2013**.
+Bitsy is a packaged in a JAR file that can be downloaded from the [Downloads Page]. The latest stable version is [bitsy-1.0.jar](https://bitbucket.org/lambdazen/bitsy/downloads/bitsy-1.0.jar). You can add the JAR to your project's classpath along with the dependencies are listed [here](Dependencies.md), which are also available in the [Downloads Page]
Bitsy is available under an open-source [AGPLv3](http://www.gnu.org/licenses/agpl.html) license. If you need to use Bitsy in a closed-source project, you can get a [liberal unlimited-use OEM and end-user license](http://www.lambdazen.com) from the author.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398449258.99/warc/CC-MAIN-20151124205409-00306-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 1,269
| 7
|
http://iacnet.net/ms-sql-try-catch-error/
|
code
|
RECOMMENDED: If you have Windows errors then we strongly recommend that you download and run this (Windows) Repair Tool.
If you want that your code will continue to run in case of a runtime error instead of getting to the catch block, you'll have to delete the catch try.
Implements error handling for Transact-SQL that is similar to the exception handling in the Microsoft Visual C# and Microsoft Visual C++ languages. A group of.
Microsoft MCSA: SQL Server 2012/2014 Certification Training Course MCSA: SQL Server 2012/2014
BEGIN ATOMIC is part of the ANSI SQL standard. SQL Server supports atomic blocks. inserted SELECT c1 FROM dbo.t1 WITH (SNAPSHOT) ORDER BY c1 — catch the arithmetic overflow error BEGIN TRY EXEC dbo.usp_t1 5,
Dec 7, 2016. THROW replaces RAISERROR in SQL Server and it's the preferred. system exception by using RAISERROR first in a TRY/CATCH block.
I had the chance to catch up with Henry Gabb at Intel. Being able to run code through a tool and be shown where concurrency errors are is like magic.
Mar 7, 2017. For example, we write series of statements inside the TRY block and if the SQL Server finds an error then it will exit from the TRY block, and.
exception is an MException object that allows you to identify the error. The catch block. Both try and catch blocks can contain nested try/catch statements.
Try Catch Blocks for handling SQL Server exceptions were introduced in 2005. below: TRY-Catch, SQL Server, Sql Transaction, and Stored Procedure Error.
Using TRY.CATCH in Transact-SQL – technet.microsoft.com – Errors in Transact-SQL code can be processed by using a TRY…CATCH construct similar to the exception-handling features of the Microsoft Visual C++ and Microsoft.
Sql server error codes Results for your search. See yourself.
The bulk copy (bcp) command of Microsoft SQL Server provides you with the ability to insert large numbers of records directly from the command line.
I am getting the error "ROLLBACK TRANSACTION request has no corresponding BEGIN TRANSACTION". I am trying to rollback the.
Sep 22, 2016. Just add the following statement just after the BEGIN TRY :. exact error message, so replace the PRINT in the CATCH block with the following.
News, technical articles, and your SQL Server questions answered free by experts.
Xbox 360 Error Code 66 n the advice of the hardware technician who I spoke with on the phone, I am leaving feedback about my problem. I own the xbox 360 original. And while the Xbox 360 was the first platform to see these price removals. Players will see it first with some EA Sports titles, where a prompt to
Netsh Http Add Error 1312 Jun 16, 2009. net stop HTTP /y. SSL will look in the machine context and if it can't find it there, it will give you an error (though not sure if this is the one). Blackberry Error Unable To Connect To Selected Mobile Data Service Unable to connect to Mobile Data Service – BlackBerry Forums.
Error Ccapp Starting How much light is in the universe? A lot. since that’s the point of this article — you can start and stop with the CMB. Everything else in the universe is just a rounding error. Mostly evening work, starting at 8–. Call 250-745-3387 or 250-478-2648 Financial Aid available • PCTIA and CCAPP accredited Call Today
Technology keeps you connected everywhere you go, helps you capture every moment & makes your life a bit easier; stay up-to-date with tips & tricks from eHow
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589237.16/warc/CC-MAIN-20180716080356-20180716100356-00500.warc.gz
|
CC-MAIN-2018-30
| 3,429
| 20
|
https://github.com/prest/prest/issues/239
|
code
|
Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.Sign up
MySQL support #239
IMO use adapters
@avelino @felipeweb @crgimenes @lerrua @fabriziomello
I would like your opinion on how best to resolve this.
In MySQL there is no way to return the inserted row directly in the insert.
The Insert function signature would change from:
I need these parameters to be able to make the select that will return the inserted line.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743854.48/warc/CC-MAIN-20181117205946-20181117231946-00258.warc.gz
|
CC-MAIN-2018-47
| 517
| 9
|
http://www.orfinlir.de/index.php?id=Levitate,%20Psionic
|
code
|
|Level: ||Nomad 2, psion/wilder 2, psychic warrior 2 |
|Display: ||Olfactory |
|Manifesting Time: ||1 standard action |
|Range: ||Personal or close (25 ft. + 5 ft./2 levels) |
|Target: ||You or one willing creature or one object (total weight up to 100 lb./level) |
|Duration: ||10 min./level (D) |
|Saving Throw: ||None |
|Power Resistance: ||Yes (harmless, object) |
|Power Points: ||3 |
As the levitate spell, except as noted here.
When a psion, wilder, or a psychic warrior manifests this power, the target is the manifester (not a willing creature or an object).
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823318.33/warc/CC-MAIN-20181210055518-20181210081018-00532.warc.gz
|
CC-MAIN-2018-51
| 567
| 11
|
http://techgenix.com/tutorials/
|
code
|
The inaccessible boot device error is annoying and might possibly be very troublesome to the users. Here are all the possible solutions to fix this error.
Here is a PowerShell script that can help you use the default time configuration on all Active Directory domain controllers to avoid authentication issues.
Here is a script that can help administrators configure the network portion and automate Exchange Server 2016 deployment.
In this post, I show you how to install everything you need to get started with Azure Functions Tools for Visual Studio, and I walk you through using your first […]
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608954.74/warc/CC-MAIN-20170527133144-20170527153144-00030.warc.gz
|
CC-MAIN-2017-22
| 599
| 4
|
https://histocrypt.org/tags/registration/
|
code
|
Below you will find pages that utilize the taxonomy term “Registration”
May 30, 2023
We are happy to announce that the proceedings of HistoCrypt 2023 are now available at https://ecp.ep.liu.se/histocrypt (DOI: https://doi.org/10.3384/ecp195). Enjoy and see you all at the conference.
April 30, 2023
Registration is now open
We worked out the program, added information about accomodations and opend the registration process. Click on the top of this news to read more. The review process was finished in time and we would like to thank the programm commitee and all reviewers for their work. The decisions were not always easy, but in the end we accepted a total of 20 papers and 2 posters. Additionally, we could win two Keynote speakers and also find ways to round up the program with a social event and a lot of coffee.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646076.50/warc/CC-MAIN-20230530163210-20230530193210-00744.warc.gz
|
CC-MAIN-2023-23
| 826
| 6
|
https://uipep.com/react-native-hire-developers/
|
code
|
Why Hire UIPEP For React-Native Web Development?
After careful consideration of your project requirement, we assign a skilled and seasoned programmer to work on your project under a well-established IT setup. If you prefer, you can conduct as many interviews as you want, before you hire a developer of your choice. If you want to hire the best Native developers in India, then you should choose a software company with at least 2-5 years of industry experience, should have built at least 20+ apps. UIPEP is one such software company in Indian with 5+ years of experience.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653071.58/warc/CC-MAIN-20230606182640-20230606212640-00720.warc.gz
|
CC-MAIN-2023-23
| 573
| 2
|
http://connorbell.ca/projects/animation.html
|
code
|
Update June 2021: I’ve started posting sketches on https://shaders.connorbell.ca. These interactive WebGL shaders are automatically deployed from my software, ShaderChain.
I regularly create code sketches to learn new ideas, inspire larger concepts and to document my process. I’ve made over 400 since 2015 using a technique called raymarching to render signed distance fields. This allows flexibility beyond the regular constraints of 3d models and opens up possibilities to render complex fractals, infinite lattices, etc.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363157.32/warc/CC-MAIN-20211205100135-20211205130135-00100.warc.gz
|
CC-MAIN-2021-49
| 528
| 2
|
https://www.samlearning.com/discover-sam/teachers/technical-support/what-browser-should-i-use/
|
code
|
We strongly recommend using the latest version of Microsoft Internet Explorer, Mozilla Firefox, Google Chrome or Safari. We suggest that you never use any version of a browser that is described as a Beta version. This means that it has not been fully tested and will almost certainly include software errors.
You may use other browsers. However, we cannot ensure that SAM Learning will be fully compatible.
Download the latest version of Microsoft Internet Explorer at http://www.microsoft.com/windows/internet-explorer/download-ie.aspx
Please be aware Internet Explorer 8 is no longer supported.
Alternatively, get the latest version of the other supported browsers from their respective websites:
Mozilla Firefox –http://www.mozillaeurope.org/en/firefox/
Google Chrome –http://www.google.com/chrome
For further information or assistance please contact our Customer Support Team. Telephone: 0845 130 4160.
Available 24 hours a day, 7 days a week.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689661.35/warc/CC-MAIN-20170923123156-20170923143156-00136.warc.gz
|
CC-MAIN-2017-39
| 951
| 9
|
https://coursesghar.com/code-with-mosh-the-ultimate-html5-css3-series-part-1/
|
code
|
Code with Mosh – The Ultimate HTML5 & CSS3 Series. Part 1
Master HTML5 & CSS3 to Build Awesome Websites!
Have you always wanted to learn web development but didn’t know where to start? Tired of lengthy, boring and outdated courses? This course is for you.
A fun, highly-practical and step-by-step course that teaches you modern HTML5/CSS3 from scratch. Learn the fundamentals in just 3 hours so you’re ready for more advanced concepts covered in the second part of this course.
This is the HTML5/CSS3 course I wish I had when I was learning web development!
Whether you’re an absolute beginner wanting to learn web development from scratch, or you know a bit of HTML5/CSS3 and need a refresher course to fill the gaps, this course will help you achieve your goals.
Sales Page: https://codewithmosh.com/p/the-ultimate-html-css-part1
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104668059.88/warc/CC-MAIN-20220706060502-20220706090502-00617.warc.gz
|
CC-MAIN-2022-27
| 839
| 7
|
https://techcurve.co/engineering-softwares/cradle-cfd.html
|
code
|
Cradle CFD offers a practical, state-of-the-art computational fluid dynamics, CFD, simulation, and visualization software solution. Embracing remarkable processing speed, refined technology, and proven practicality verified by high user satisfaction, it has been in use for diverse applications, such as Automotive, Aerospace, Electronics, Building and Architecture, Civil Engineering, Fans, Machinery, and Marine developments, to solve thermal and fluid problems. Incorporating Multiphysics co-simulation and chained simulation capabilities to achieve couplings with Structural, Acoustic, Electromagnetic, Mechanical, One-Dimensional, Optimization, Thermal Environment, 3D CAD and other analysis tools that allow users to efficiently solve engineering problems spanning multiple disciplines. The powerful award-winning post-processing capabilities to generate visually powerful simulation graphics to easily convey simulation data, Cradle CFD enables users with any skill level to process advanced simulations and gain valuable insights into their designs. Cradle CFD solution consists of the following products: scFLOW, scSTREAM, scPOST, Heat designer.
scFLOW is a next-generation CFD tool that uses unstructured mesh to accurately represent complicated geometry. With a streamlined workflow, the Pre-processor aids users to generate high-quality polyhedral mesh elements and construct complicated models and the solver ensures more stability and speed, it is capable of solving aerospace and automotive aerodynamics, the performance of fans, pumps and other rotating equipment, design problems of electronic devices, multiphase phenomena, marine propeller cavitation, and varied problems effectively.
scSTREAM is a general-purpose CFD tool that uses Cartesian or cylindrical structured mesh to enable easy mesh generation and high-speed simulations to be performed in a fraction of the time of other solutions. Due to the meshing nature and analysis system that enables large-scale calculation, it excels at processing extensive simulations, where users are required to solve engineering problems such as thermal problems of electronic devices and indoor environment, wind flow, and heat island phenomena.
scPOST is a comprehensive and versatile data visualization software that empowers beginners and expert users to create a rich view of design performance. It has the capability for a sharable light-weight format that supports virtual reality for a more immersive data visualization experience.
A structured mesh thermal fluid analysis software designed for electronics cooling thermal analysis. It uses core technology from Software Cradle’s scSTREAM general-purpose structured mesh thermal-fluid software product. Its performance is optimized for applications that do not require the exact reproduction of fine geometrical curvature to predict an accurate flow field. HeatDesigner is capable of accommodating meshes with over a hundred million elements enabling it to capture fine geometrical details.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655882051.19/warc/CC-MAIN-20200703122347-20200703152347-00543.warc.gz
|
CC-MAIN-2020-29
| 3,012
| 5
|
https://www.bipolarforlife.me/junior-front-end-engineer
|
code
|
Best website design Tips and References website . Search anything about website design Ideas in this website.
Junior Front End Engineer. Front end engineers typically have a bachelor’s degree in computer science or a related field, and a background in software development. Salary estimates are based on 19 salaries submitted anonymously to glassdoor by junior front end engineer employees.
222 junior front end software engineer jobs available on indeed.com. For this opportunity we want you to contribute in our software development. Junior front end engineer baku provides a smart farming management system that consists of an integrated software and hardware system.
Junior Front End Developer JMMJ Software
The national average salary for a junior front end engineer is $72,275 in united states. The job consists of developing spas that run on top of our games. Apply to junior front end developer, front end developer, junior software engineer and more! How much does a junior front end engineer make?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710916.40/warc/CC-MAIN-20221202183117-20221202213117-00667.warc.gz
|
CC-MAIN-2022-49
| 1,009
| 5
|
http://drraheemspells.com/tools/heavyweight-girlfriend-music.php
|
code
|
Main / Tools / Heavyweight girlfriend music
Heavyweight girlfriend music
Name: Heavyweight girlfriend music
File size: 546mb
Girlfriend Lyrics: Chorus: / Your girlfriend wants to be my girlfriend, she be calling me telling me 'bout you / How Heavyweight This song bio is unreviewed. Lyrics to 'Girlfriend' by Heavyweight. your girlfriends wants to b my girlfriend / she b calling me telling me bout you YOUNG M.A "GIRLFRIEND" (Official Video). Album · · 1 Song. Available with an Apple Music subscription. Try it free.
Girlfriend. By Heavy Weight. • 1 song. Play on Spotify. 1. Girlfriend. More Heavy Weight. Listen to Girlfriend now. Listen to Girlfriend in full in the. Heavy Weight - Girlfriend Lyrics. Your girlfriend wants to be my girlfriend she be calling me up telling me bout you how you aint hitting it like you post to hit it you. drraheemspells.com aka Heavyweight - Girlfriend (Lyrics). Heavyweight - Girlfriend (Lyrics) - YouTube. More information. Saved by. Zoe Victoria.
Via Google Play Music app on Android v4+, iOS v7+, or by exporting MP3 files to your computer and playing on any MP3 compatible music player. Report. Listen to "Girlfriend" by Notis Heavyweight Rockaz on: Apple Music, Spotify, YouTube or Google Play. Free universal music links by Songwhip.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517639.17/warc/CC-MAIN-20190418121317-20190418143317-00412.warc.gz
|
CC-MAIN-2019-18
| 1,281
| 7
|
https://mail.coreboot.org/hyperkitty/list/coreboot@coreboot.org/message/BDBYEZZZIKYAT7XCABXR7IQNXKOKS52N/
|
code
|
I'm trying to get a working linuxbios on my Via epia m2 12000, with 1200mhz processor and 512mb ram.
The goal is to boot linux from a usbstick (guess i will be using filo and boot the device a uda1)
I've managed to extract my videobios image with awardeco and that gave me a videobios file which was exactly 57344byte, how can i apply this to my linuxbios.rom file?
The issue is the linuxbios.rom file is allready 256kb, Where would i change the size of this built "rom file" and what should i set it to:
I tried setting this: option ROM_SIZE=256*1024 to: option ROM_SIZE=200*1024 Then doing:
buildtarget via/epia-m cd via/epia-m/via_epia-m make
This gives me this:
... ./buildrom linuxbios.strip linuxbios.rom payload 0x10000 0x12000 payload (41187) + linuxbios (65536) size larger than ROM (73728) size! make: *** [linuxbios.rom] Error 1 ...
Any suggestions would be welcome.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358323.91/warc/CC-MAIN-20211127223710-20211128013710-00223.warc.gz
|
CC-MAIN-2021-49
| 877
| 9
|
https://compassoftime.blogspot.com/2015/10/small-scheme-or-large-scheme.html
|
code
|
2 topics about the size of Scheme were posted on c.l.s. One was rather branch of other topic:How many R6RS users and how much code out there?. And the other is indirectly suggesting it: Question about vote of RnRS (the poster mentioned about the change between R5RS and R6RS as drastic change so seems it's about the size.) Even though all what I wanted to say is already said by Taylan on the first topic I've mentioned, I want to write something about the size so bare with me :)
The point of this topic for me is the definition of small or large. The poster said it is useful enough for educational purpose. I agree with it. If I need to add a bit of my opinion about this, I would say the languages which has proper design for the topic of the class are useful enough for educational purpose as long as students don't use convenient libraries. Java is fine for OOP, C++ is fine for OOP and meta programming, Mathematica is excellent for math, etc. So they can also be programming languages for educational purpose, right? Now are they small?
The answer for me is no. Especially if you see C++'s specification, it's more than gigantic even human beings couldn't understand, IMHO (are there people who understand all the spec?). I wouldn't say it's one of beautifully designed language, but it's powerful enough to cover other purposes including professional use . Then, should Scheme be this much huge to make all programmer happy?
My answer is again no. It's too complicated, it's piling up features on top of other features on top of other, lemme quit. One of the reason why C++ is piling up those features, I believe, is that it doesn't have enough abstraction to make language self growing. Most of programming language don't have this type of feature such as defining new syntax. Or if they have it, it'd be rather complicated to use, either deliberately or accidentally. If it's deliberately, then the designer of the language doesn't want users to use it casually. If it's accidentally, then it's not considered well but made rather adhoc. The first decision is understandable, sometimes those things are not really needed and don't want users to summon daemons from their nose.
Now what's the definition of small in Scheme specification? In my opinion, there is no need to pile up features but it can grow by itself. Let me elaborate what it means. Currently there're on going discussion about hashtable on SRFI. This might be a good example to do it. Is hashtable required by small language as Scheme? Well, my answer from bottom of my heart is yes but rational answer is no. Why no? It can be implemented by vector and record. Now one of the SRFIs also mentioning weak hashtable. This is rather interesting. Implementing this data structure can not be done neither in range of R6RS nor R7RS. So this seems required, right? Wait a sec, there's a draft SRFI about ephemeron. If you use this, then you can implement weak hashtable using vector, record and ephemeron. So the absolute requirement to have is this one. Hurrah, the language spec is kept small enough!
IMO, this is a bit too extreme. Each time users need to make own utility libraries for those common data structure is ridiculous. Then here comes R7RS-large process. The purpose, in my understanding, of this process is that keeping core language absolutely minimum and put a collection of those commonly used things in its specification. So implementations may or may not support all of them. Oops, again, what's absolutely minimum?
Unfortunately, I don't have generic answer for this and, I believe, neither most of Schemers do. The only thing I do have now is that it's not enought to be perfect language which can solve all problems in this world. Concurrency, networking, weak data, etc. These are not in the specification (maybe yet) but absolutely needed. If there's something lacking, then language specification should grow even if it's got bigger.
The world of computer is growing like speed of light. Problems to be solved are zillion. Too small wouldn't solve. We need small enough.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828501.85/warc/CC-MAIN-20181217091227-20181217113227-00263.warc.gz
|
CC-MAIN-2018-51
| 4,067
| 8
|
https://securityweeklytv.libsyn.com/pauls-security-weekly-494-security-news
|
code
|
Nokia sues Apple, home routers are under attack, a Russian botnet is stealing millions of dollars per day, and should you give up on PGP? Find out in this week’s security news!
Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg
Security Weekly Website:
Follow us on Twitter:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506320.28/warc/CC-MAIN-20230922002008-20230922032008-00763.warc.gz
|
CC-MAIN-2023-40
| 312
| 4
|
http://manpages.ubuntu.com/manpages/xenial/man8/dnscrypt-proxy.8.html
|
code
|
Provided by: dnscrypt-proxy_1.6.1-1_amd64
dnscrypt-proxy - A DNSCrypt forwarder
dnscrypt-proxy accepts DNS requests, authenticates and encrypts them using dnscrypt and forwards them to a remote dnscrypt-enabled resolver. Replies from the resolver are expected to be authenticated or else they will be discarded. The proxy verifies the replies, decrypts them, and transparently forwards them to the local stub resolver. dnscrypt-proxy listens to 127.0.0.1 / port 53 by default.
dnscrypt-proxy is not a DNS cache. Unless your operating system already provides a decent built-in cache (and by default, most systems don´t), clients shouldn´t directly send requests to dnscrypt-proxy. Intead, run a DNS cache like Unbound, and configure it to use dnscrypt-proxy as a forwarder. Both can safely run on the same machine as long as they use different IP addresses and/or different ports.
· -a, --local-address=<ip>[:port]: what local IP the daemon will listen to, with an optional port. The default port is 53. · -d, --daemonize: detach from the current terminal and run the server in background. · -E, --ephemeral-keys: By default, queries are always sent with the same public key, allowing providers to link this public key to the different IP addresses you are using. This option requires extra CPU cycles, but mitigates this by computing an ephemeral key pair for every query. · -e, --edns-payload-size=<bytes>: transparently add an OPT pseudo-RR to outgoing queries in order to enable the EDNS0 extension mechanism. The payload size is the size of the largest response we accept from the resolver before retrying over TCP. This feature is enabled by default, with a payload size of 1252 bytes. Any value below 512 disables it. · -h, --help: show usage. · -k, --provider-key=<key>: specify the provider public key (see below). · -K, --client-key=<file>: use a static client secret key stored in <file>. · -L, --resolvers-list=<file>: path to the CSV file containing the list of available resolvers, and the parameters to use them. · -l, --logfile=<file>: log events to this file instead of the standard output. · -m, --loglevel=<level>: don´t log events with priority above this level after the service has been started up. Default is 6, the value for LOG_INFO. Valid values are 0 (system is unusable), 1 (action must be taken immediately), 2 (critical conditions), 3 (error conditions), 4 (warning conditions), 5 (normal but significant condition), 6 (informational) and 7 (debug-level messages). · -n, --max-active-requests=<count>: set the maximum number of simultaneous active requests. The default value is 250. · -p, --pidfile=<file>: write the PID number to a file. · -R, --resolver-name=<name>: name of the resolver to use, from the list of available resolvers (see -L). · -r, --resolver-address=<ip>[:port]: a DNSCrypt-capable resolver IP address with an optional port. The default port is 443. · -S, --syslog: if a log file hasn´t been set, log diagnostic messages to syslog instead of printing them. --daemonize implies --syslog. · -t, --test=<margin>: don´t actually start the proxy, but check that a valid certificate can be retrieved from the server and that it will remain valid for the next margin minutes. The exit code is 0 if a valid certificate can be used, 2 if no valid certificates can be used, 3 if a timeout occurred, and 4 if a currently valid certificate is going to expire before margin. The margin is always specificied in minutes. · -u, --user=<user name>: chroot(2) to this user´s home directory and drop privileges. · -N, --provider-name=<FQDN>: the fully-qualified name of the dnscrypt certificate provider. · -T, --tcp-only: always use TCP. A connection made using UDP will get a truncated response, so that the (stub) resolver retries using TCP. · -V, --version: show version number. A public key is 256-bit long, and it has to be specified as a hexadecimal string, with optional columns.
COMMON USAGE EXAMPLE
$ dnscrypt-proxy --daemonize --resolver-name=... The resolver name is the first column (Name) in the CSV file.
USAGE EXAMPLE WITH A PRIVATE SERVER
$ dnscrypt-proxy --daemonize --provider-key=... --provider-name=... --resolver-address=...
BUGS AND SUPPORT
Please report issues with DNSCrypt itself to https://dnscrypt.org/issues
hostip(8) February 2016 DNSCRYPT-PROXY(8)
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823303.28/warc/CC-MAIN-20181210034333-20181210055833-00465.warc.gz
|
CC-MAIN-2018-51
| 4,336
| 12
|
https://blog.adafruit.com/2016/03/04/the-raspberry-pi-foundation-welcomes-40-us-teachers-to-their-community-raspberry_pi-piday-raspberrypi/
|
code
|
In the summer of 2015, President Obama made call to action to create a Nation of Makers within the United States. We made a commitment in response to that call: we would train 100 teachers in digital making with Raspberry Pi in 2016. Last weekend, we made a giant leap towards fulfilling that commitment with our first Picademy within the United States. In fact, it was the first ever Picademy held beyond the borders of Britain.
Stop breadboarding and soldering – start making immediately! Adafruit’s Circuit Playground is jam-packed with LEDs, sensors, buttons, alligator clip pads and more. Build projects with Circuit Playground in a few minutes with the drag-and-drop MakeCode programming site, learn computer science using the CS Discoveries class on code.org, jump into CircuitPython to learn Python and hardware together, TinyGO, or even use the Arduino IDE. Circuit Playground Express is the newest and best Circuit Playground board, with support for CircuitPython, MakeCode, and Arduino. It has a powerful processor, 10 NeoPixels, mini speaker, InfraRed receive and transmit, two buttons, a switch, 14 alligator clip pads, and lots of sensors: capacitive touch, IR proximity, temperature, light, motion and sound. A whole wide world of electronics and coding is waiting for you, and it fits in the palm of your hand.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103920118.49/warc/CC-MAIN-20220701034437-20220701064437-00372.warc.gz
|
CC-MAIN-2022-27
| 1,330
| 2
|
http://www.schescience.org/best/best-registration/
|
code
|
Welcome to SCHE Robotics. Below is information for registering for the BEST Robotics competition.
BEST is a robotics competition held in the Fall. The team meets once a week until the competition begins in late August. After the competition starts, the teams meets twice per week (Tuesday and Friday) until game day.
This competition is a great opportunity to be involved in a capstone project. BEST is centered about the task of designing a robot, however this is a small portion of the entire effort. The team needs specialized members who have a passion for what they do best. Browse below in the interests section for a sample of the types of skills that are needed.
Every member has a gift given by God, and the SCHE team will bring that out in them.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583516003.73/warc/CC-MAIN-20181023023542-20181023045042-00238.warc.gz
|
CC-MAIN-2018-43
| 755
| 4
|
https://followtutorials.com/2019/04/introduction-to-cpp-programming-language.html
|
code
|
Introduction to C++ Programming language
Definition of C++
C++ is a case-sensitive, general purpose, and a free-form programming language that supports procedural, object-oriented, and generic programming. As it encapsulates both high and low-level language features, C++ is a middle-level language. A lot of platform like Windows, Linux, Unix, Mac, etc. supports C++ programming language.
Benefits of C++ Over C Language
- In C++, Stronger Type Checking is available.
- The OOPS features in C++ like Abstraction, Encapsulation, Inheritance, etc make it more worthy and useful for programmers.
- C++ supports and allows user-defined operators (i.e Operator Overloading) and function overloading.
- The Concept of Virtual functions and also Constructors and Destructors for Objects.
- There is Exception Handling in C++.
- In C++ variable can be declared anywhere in the program, but must be declared before they are used.
History of C++ Programming Language
Bjarne Stroustrup developed C++ programming language in 1980 by at bell laboratories of AT&T (American Telephone & Telegraph), located in the U.S.A.
The founder of C++ language is Bjarne Stroustrup.
It is developed for adding a feature of Object Oriented Programming (OOP) in C without significantly changing the C component.
C++ programming is relatively called a superset of C, it means any valid C program is also a valid C++ program.
Usage of C++ Programming Language
There are several benefits of using C++ for developing applications and many applications product based developed in this language only due to its features and security. Below is the usage areas of C++ where it has been widely and effectively used.
It is used in the development of new applications of C++. The applications based on the graphic user interface, which are highly used applications like adobe photoshop and others.
It is also used for developing most of the operating systems for Microsoft and a few parts of the Apple operating system. Microsoft Windows 95, 98, 2000, XP, office, Internet Explorer and visual studio, Symbian mobile operating systems are mainly written in C++ language only.
The rendering engines of various web browsers are programmed in C++ simply because if the speed that it offers. The rendering engines require faster execution to make sure that users don’t have to wait for the content to come up on the screen. As a result, such low-latency systems employ C++ as the programming language.
The C++ language is also used for developing games. It overrides the complexity of 3D games. It helps to optimize the resources. It supports multiplayer option with networking. Uses of C++ allows procedural programming for intensive functions of CPU and to provide control over hardware, and this language is very fast due to which it is widely used in developing different games or in gaming engines. C++ is mainly used in developing the suites of a game tool.
Postgres and MySQL– two of the most widely used databases are written in C++ and C, the precursor to C++. These databases are used in almost all of the well-known applications that we all use in our day to day life – Quora, YouTube, etc.
The compilers of various programming languages use C and C++ as the backend programming language. This is due to the fact that both C and C++ are relatively lower level languages and are closer to the hardware and therefore are the ideal choice for such compilation systems.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648245.63/warc/CC-MAIN-20230602003804-20230602033804-00378.warc.gz
|
CC-MAIN-2023-23
| 3,438
| 23
|
https://support.brownrice.com/content/2/314/en/how-do-i-clone-my-website-to-another-site-like-a-development-site.html
|
code
|
The Brownrice Website Cloner!
Its easy to clone a website (including its files, database and all settings) from a live site to a development via the Brownrice Dashboard. Or you can do the opposite and clone a development website and/or database to your live site when you want to move development changes live. Or you can clone a site to a totally different site!
How to clone your website:
Login to https://dashboard.brownrice.com then click:
- VPS Hosting
- Manage (Green Button) next to the VPS that hosts the site you'd like to clone
- Web Sites
- Finally, click the small copy icon (next to the little wrench icon!)
- Follow prompts
- Snapshots! We'll create a snaphot of your entire VPS before beginning the cloning process so that if things don't go the way you thought they would you can quickly revert to the pre-cloned status of your VPS.
- Options! You can clone the site to any valid domain name that you like. And by default we'll copy the files, database, Wordpress settings, and web server configurations to the new site, but you can choose which of these you'd like to be perfrormed.
- Wordpress? Yeah, this works GREAT with Wordpress sites.
- Yep, it'll overwrite things! Know that if you are cloning a site to another site that already exists on your VPS that it will overwrite the site files. This is a feature, not a bug! And this will allow you to update a development or live site as often as you need.
- Its a hammer! Keep in mind that there are no file or database merges going on here. Its either all or nothing. So if you clone from a dev site to your live site, and you've asked the script to move the files and the database, then ALL of the files and ALL of the database from the dev site will be moved live. Nothing will remain from the original live site. If you want to merge data you'll need to get your SSH and git skills going asap!
And remember, if this doesn't go the way you thought it would, restore the VPS to the snapshot that our dashboard just created for you!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474663.47/warc/CC-MAIN-20240226194006-20240226224006-00784.warc.gz
|
CC-MAIN-2024-10
| 2,002
| 15
|
http://biowiki.berkeley.edu/wiki/index.php/Window_Licker
|
code
|
Windowlicker (source code: DartPerl:windowlicker.pl) is a script to run the xrate program on a sliding window over a Stockholm format multiple alignment.
The program's name derives from the eponymous piece of music by Aphex Twin.
- How To Run Pipeline
- Xrate Software
- Window Eater -- wrapper for xrate that selectively filters out windows using the annotation (specifically, only segments annotated as highly-conserved are passed to xrate). To be used with windowlicker
To use windowlicker:
- Download dart (see Downloading Dart)
- Install dart (see Building Dart)
- Make sure to set your environment variables, DARTDIR and PERL5LIB, as described on that page
- Run dart/perl/windowlicker.pl
-- Ian Holmes - 02 Apr 2007
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945144.17/warc/CC-MAIN-20230323100829-20230323130829-00472.warc.gz
|
CC-MAIN-2023-14
| 722
| 11
|
http://nofancyname.blogspot.com/2006/01/posts-in-queue.html
|
code
|
posts in the queue
I have a bunch of 'em, but I'm only really itching
to post one of them—about the Firefox extension called Reveal
. Actually, I prefer to call it Reveal! with exclamation point and Willow Rosenberg hand wave, because that makes me chuckle.
I've been using it for about a week now, and all the cool kids are already posting about it (Lifehacker, Boing Boing, etc) but they're all about the Wow! and I've got the screenshots and story of actual practical application in research
. Yeah! Ok, that sounds more hardcore than it is. It's just that I'm finishing up some reasearchy things that I absolutely must finish up this morning, and when Reveal was released it made this research task much more efficient.
So more on that soon. The other posts? Eh. Not so exciting.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891807660.32/warc/CC-MAIN-20180217185905-20180217205905-00167.warc.gz
|
CC-MAIN-2018-09
| 785
| 7
|
https://trustinghardware.com/jekyll/update/2023/10/21/hardwaresrelationshiptocensorship.html
|
code
|
What kind of phone do you have?
Do you know where it comes from? Do you know where the parts come from? Do you know how the parts work? For many of us, the answer to that last question is no. The modern cell phone has evolved greatly in a short span of time. It is a highly complex device that promises many forms of security such as physical and digital– types of security that protect our phones from getting broken into or stolen and types of security that protect our communication and information. There are many phones to choose from and many different systems behind them.
Do you trust your phone?
Most of us do things on our phones that we would prefer to keep private. For example, some of us use banking applications, send sensitive emails or messages, express beliefs, or use our payment information to make purchases. For these reasons and more it is important to most users that their phones be secure. For users in countries with oppressive governments or censorship and information restriction, the privacy and security of these devices are even more important. Luckily, research communities are putting more effort into gathering information to determine which phones are trustworthy– especially for at-risk users. The site this blog is posted on is one such effort being supported by the Open Technology Fund’s Information Controls Fellowship!
What makes a phone trustworthy?
How do you decide whether or not to trust a phone? Phones are incredibly complex systems; the basis of trust is understanding. Making a phone involves balancing a myriad of hardware and software designs. In these designs a few areas are of special interest in deciding whether one should trust their phone:
You might have heard of cryptography or end to end encryption, and you’d be right to understand it as a technology that is capable of securing both communications between two users and securing data that is locally on your device. Cryptography utilizes large numbers called keys and some special math to create a system in which data is either encrypted or decrypted with one’s keys. Different cryptography models use keys differently, but private keys are almost always treated as secrets, and shouldn’t be known by any untrusted parties. What’s more, in the modern web almost every communication needs to utilize encryption to maintain security, otherwise an attacker need only be on the same network as you to access any information you share– including a website’s credentials, such as your bank’s. In order to store and manage such keys, many phones come with special purpose-built designs that utilize hardware to keep your keys secure from anyone who might try to install malware (viruses) on your phone or even keep them secret from someone who has physically stolen your device.
Most people understand that their phone is running an operating system, or OS for short, and that this operating system handles lots of behind-the-scenes things that happen on a phone. A fun fact is that modern phones also often contain multiple operating systems, usually at least two! At least one of these operating systems is reserved for running secure software. This secure or trusted software is chosen by the manufacturer of the device and can handle any number of use-cases. Phones are complex systems that combine communication between these operating systems to accomplish certain activities with less risk, such as storing or using cryptographic keys! Since this software has a huge security impact, depends on the phone you have, and isn’t usually accessible by the user, it is of special interest for research efforts looking to understand which phones are trustworthy. If an untrustworthy party were to have full control of the trusted software on your phone, they could implement any number of privacy violating, security compromising, or information controlling capabilities.
Main operating system
Every modern cellphone user is probably familiar with the main OS their phone runs– the most popular being Android and iOS. In modern cellphones the manufacturer of the cellphone often provides alterations to the original OS, often in the form of features such as design changes or the set of privileged apps that come with a phone. The operating system is complex because it must interact with and utilize most of the other components in the system which, together, make up a phone. It ultimately controls how every request an application makes is handled, and how every action the user performs is handled. This means that an operating system is capable of preventing privacy-preserving apps from being available to install, or it can leak information in the app. It can also explicitly enforce censorship or aid in an app’s ability to thwart privacy or security.
Hardware restrictions and information controls
This blog is about how something called hardware restrictions might give manufacturers or other interested parties the ability to introduce information controls. But what are information controls, and what are hardware restrictions?
Previously, we saw examples on how several components in the complex machines we call phones can be an opportunity for a manufacturer or other entity in control of the design process, such as a parts manufacturer or government, to implement capabilities that either control or monitor the information that our phones send, receive, and store. We call these capabilities “information controls”. Information controls are usually implemented on networks or through import/export laws in a country, but with the increasing level of control in modern phones the cost for implementing controls on phones may be dropping sharply.
If your phone was capable of enacting information controls, why couldn’t you just turn them off in settings? Not only could you not turn them off, it is unlikely that anyone could avoid them through the means of software. Unfortunately, phone makers have historically often not exposed the full capability of software to the user. This is done for various reasons, often because it is cited as too confusing, or that there are security risks to a non-technical user to modify the behavior of the device. But if one owns their device and knows the password, what is actually stopping one from disabling these information controls?
In the past users have been able to modify the behavior or code of applications on their devices. They could download and use other peoples’ applications directly from the source and could easily make applications that access whatever information they wanted which they could then distribute however they wished for whoever to download and use. The user could take control of any application on their device, which meant an application was subject to the user’s intentions. The user could design or download their own operating system and use it on their hardware. The user was in charge of either devising a method to keep their device secure or picking a party that they trusted (usually an operating system vendor) to decide the strategy. With modern phones and hardware-based restrictions of the user’s capability, this agency or freedom of the user is often not only no longer the default shipped on devices, it is not available at all.
When we mentioned the three concepts from before (“cryptographic keys”, “trusted software”, and “main operating system”) we talked briefly about how they were designed with security in mind. In most cases the user’s security is the driving force for design patterns, but in some cases security decisions are not purely for the user’s security. The pursuit of security in modern devices has sometimes even meant the sacrifice of the user’s agency. This sacrifice of users’ agency can provide obscurity for the device manufacturer’s security efforts and can stop certain unwanted parties from accessing the device– such as hackers who have physical access to the device, or hackers who have compromised an application on the device. It can also help stop social engineering attacks, a type of hacking strategy in which the hacker attempts to convince the user to compromise their own system; since users do not have the ability to completely compromise their own system (only partially), they cannot be convinced to do so by strangers. However, these designs also make room for some capabilities that are seemingly motivated by the profit of the manufacturer or other interested parties; these capabilities allow security models like Digital Rights Management or DRM, in which the main security objective is to protect the data from the user accessing it so that digital content such as songs/movies/games can be delivered to a device without risk of piracy or even fair-use alterations. Another capability seen is the strategy to lock users into certain application distributors or “app stores”, which can deny the user the ability to access certain information or content but in exchange gives the manufacturer the ability to take a cut of app sales and ensure only apps that have passed certain security and usability standards may exist on the device. Other capabilities exist in the form of anti-cheat for games, region locking devices, locking devices into certain carriers, ‘jailbreak’ or ‘root’ detection and more.
Hardware restrictions are not usually a documented part of a system that can be easily looked up. Hardware restrictions are often either implemented as a feature or part of a component of the system’s overall design. This means their parts are integrated at every level in the device, with varying uses and security models (their goals). For example, in the process of powering on or booting a device hardware restrictions can often be utilized to deny the loading of code or in many cases operating systems and trusted software that do not exactly match the version the manufacturer chose. The risk of locking the user into the manufacturers chosen main operating system is that once locked in, not only is the degree of freedom for certain information avenues like web browsers, app stores, and messaging apps decided by the manufacturer, the way that an operating system utilizes trusted software, cryptographic keys, and also hardware is also locked in; this means that in an environment where the manufacturer has this level of control, there are tons of ways they could implement information controls! This doesn’t mean that if a user can control the main operating system they are immune to information controls, but it is a huge advantage to any interested parties trying to implement hardware restrictions to make sure they have control of this system. This is just one example of a hardware restriction and the various ways it could be utilized to make information controls more effective, in reality there are several ways in which a manufacturer designing the hardware and software of a phone could restrict the user’s operating capacity through hardware means with an end goal of controlling information on a device.
The research we have planned
It is my (the Author’s) personal nightmare that we may find ourselves in a future where countries with the means to develop information technology might have the inclination to deploy, sell, or build information technology devices or infrastructure that enacts that country’s own –or provides an authoritarian government the means to set up their own– information controls. I believe properly handling these risks is paramount to human rights, especially when you consider the at-risk users in these circumstances. Authoritarian governments and foreign nations have been utilizing their technological developments and resources to manipulate under-developed nations and minority populations for much of modern history, control of information must not happen. Since hardware restrictions can lock the user in to the manufacturer’s choices and also obscure the details of how a device works, they can make it hard to trust a device in a world where the cost of effort to implement information controls on a device is decreasing rapidly– especially if the device originates from a company or nation that exercises its own information controls, has an authoritarian government, or has an incentive to control the flow of information of a population.
As countries and manufacturers continue to influence and develop their own main operating systems, trusted software, and especially hardware, the opportunity to introduce novel hardware restrictions and information controls presents itself as all too easy.
To help mitigate the risks of this situation and to discover to what degree this harmful use of information controls and hardware restrictions exists in our modern day, the Open Technology Fund’s Information Controls Fellowship has green lit a project dedicated to exploring hardware restrictions and information controls, specifically: which exist, which are currently possible with today’s hardware, and what risks are greatest in modern phones from authoritarian countries with information restrictions. This project is important since public researchers usually have no more access than regular users to these devices, as such there is a scattered history of public analysis and awareness on the capability of these designs. The project will start with this non-technical blog and continue over the year with the analysis of several target devices. At the end of the project the findings will be presented in a non-technical manner and the technical resources gathered will become publicly available to assist in other research.
What can you do?
If you have information you would like to contribute or need to make contact you can reach out to email@example.com. In the meantime, the organization funding this research– the Open Technology Fund has funded excellent projects that provide resources on information controls and open technology. Subscribe to our RSS feed or sign up for notifications below to get updates on the project!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948234904.99/warc/CC-MAIN-20240305092259-20240305122259-00647.warc.gz
|
CC-MAIN-2024-10
| 14,063
| 23
|
https://remotive.io/remote-jobs/software-dev/senior-wordpress-engineer-378378
|
code
|
(Senior) Wordpress Engineer
3 weeks ago
Job type: Full-time
Hiring from: Americas Only
Category: Software Development
Better Engineers. Better Results. SalsaMobi connects accomplished Software Engineers across the Americas with our portfolio of high-growth and newsworthy technology companies in the United States. Senior Engineers in the SalsaMobi network work remotely with some of the most interesting tech companies in the world. Join us today and experience a life where talent has no borders.
We are seeking a remote Senior Wordpress/Woocommerce Developer to join a U.S. based distributed team of senior professionals to deliver market leading software solutions.
More than 3 years working with PHP
- Experience working with Wordpress
- Experience configuring Woocommerce Module
- Javacript proficiency
- CSS experience
- Agile Methodologies
Nice to have:
Experience working with North American software companies
*This is a remote position. We are accepting candidates from U.S., Canada, Caribbean, and Latin America.
Before you apply, please check if any restrictions apply in terms of time zone or country.
This job has a geo-restriction in place: Americas Only.
Please mention that you come from Remotive when applying for this job.
Does this job need an edit? 🙈
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703581888.64/warc/CC-MAIN-20210125123120-20210125153120-00695.warc.gz
|
CC-MAIN-2021-04
| 1,275
| 20
|
https://superuser.com/questions/751708/unrecognized-mount-option-fmask-0111-or-missing-value
|
code
|
I'm using a mostly clean Ubuntu 14.04 install.
I can mount the device successfully, using
sudo mount -t ext4 /dev/sda4 /mnt/share. However, when I run
sudo mount -a, I get the error
mount: wrong fs type, bad option, bad superblock on /dev/sda4, missing codepage or helper program, or other error In some cases useful info is found in syslog - try dmesg | tail or so
Then, when I run
dmesg tail I see:
EXT4-fs (sda4): Unrecognized mount option "fmask=0111" or missing value
fmask should be a valid value. Here is the relevant line from
UUID=45099f0b-8d10-4fd7-8214-b0a070dc0be7 /mnt/share ext4 errors=remount-ro,fmask=0111,dmask=0000 0 2
It may help to know that I believe this was working before I restarted the computer after installing some updates. (However, this is the first time I've restarted the computer since getting the mount up and running). Can anyone tell me what the problem here is?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141195967.34/warc/CC-MAIN-20201129004335-20201129034335-00592.warc.gz
|
CC-MAIN-2020-50
| 898
| 11
|
http://alpinesaint.com/tiny-bathroom-ideas-make-a-tiny-bathroom-work-wonders/
|
code
|
Tiny bathroom ideas - As an city dweller dwelling with individuals one shower, I actually have a personal attention in tiny bogs. We plan to come with one as various an addition to the normal of our storage, but going to must go small. No spa tubs or loungers for us; the : sink, bathe toilet. If we are fortunate, we can figure out a fashion to get a bathtub in there.
But as a result of a room is small mean it can't be useful, comfy and stylish. Here are 12 tiny loos to the small- genius in all people. . Make a Tiny Bathroom Work Wonders.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221217970.87/warc/CC-MAIN-20180821053629-20180821073629-00656.warc.gz
|
CC-MAIN-2018-34
| 543
| 2
|
http://lists.linuxcoding.com/rhl/2006/msg12433.html
|
code
|
Stephen Mirowski wrote:
I am trying to install more programs from my FC5 discs, but the install
keep grabbing files from ftp mirrors instead of my CDs.
First I tried: "Add/Remove Software"
- picked OpenOffice and some other stuff, so it started download hundreds
of MBs of files I already had on disc.
Then I tried: "Nautilus"
- Selected a whole bunch of OpenOffice files, right-clicked to install.
Well it found all the dependencies on the net, and started to download
them, even though they are on the distro CDs.
Is there a way to use the GUI installers to install programs from the CDs
only (like the way it used to work) only download files if newer version
are avail (Like Mandriva's RPM tool)? Or is there another installer?
Unfortunately the package installer uses yum repos that are defaulted to
the network. This of course goes out the network instead of checking for
local install media first.
First, file an FC5 bug against pirut regarding network install tried
before local media is searched first.
To temporarily get around the issue, you could make a local repo file
called local.repo with the below entries in it. Place this file in
/etc/yum.repos.d directory. Disable the fedora-extras.repo and the
fedora-core.repo versions by changing enabled=1 to enabled=0 in both
repo files. When you finish with the local installation, set the core
and extras to enabled=1 and set the local.repo entry within the file to
My thought for a good interface would be for pirut to browse in media
looking for install media. If it finds local media under the /media
directory, it uses it by default. If no Install media found, it works as
yum would do and looks on the Internet for the packages within the repos
that you have setup.
name=Fedora Core $releasever - $basearch
Lots of folks are forced to skimp to support a government that won't.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247503249.58/warc/CC-MAIN-20190221071502-20190221093502-00157.warc.gz
|
CC-MAIN-2019-09
| 1,842
| 31
|
https://nmrfx.org/downloads/structure
|
code
|
NMRFx applications are written in Java so they run on all the major desktop platforms. The software code is the same, but there is a specific installer for each operating system. Click on the appropriate link below to see a list of recent installers for your platform.
You'll need an account on this server in order to download the software. If you don't already have one, click on the Registration link at the top of this page.
Note: unlike the NMRFx Processor and NMRFx Viewer (NMRViewJ) installers, these are just compressed tar files (.tgz). Just untar them:
tar xzvf structure-10_1_16_macosx-amd64.tgz
To execute run the nmrfxstructure shell script in the resulting directory
Some examples (with shell scripts and data files) are available here. The example scripts (all named demo.sh) assume that you've put the executable file "nmrfxstructure" on your path (or edit the demo file to insert the full path to the file).
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738351.71/warc/CC-MAIN-20200808194923-20200808224923-00459.warc.gz
|
CC-MAIN-2020-34
| 924
| 6
|
https://www.digi.com/support/knowledge-base/modifying-the-password-for-http(s)-cli-does-not-mo
|
code
|
customer modified the password for user=root which has impact on http, https, telnet, ssh (CLI) access but still the device discovery tool, using Advanced device discovery protocol (ADDP) requires the old password.
The password for user = root, which you modify via the web page, does not impact the access via the ADDP protocol. Via the ADDP protocol as used by the Digi Device Discovery Tool, a different user with name=addp is used.
E.g. to change the password for ADDP access via CLI, use the command:
see the Command Reference:
This holds for devices with unique passwords running the NDS plug and play firmware, e.g. like the Connect ME -S or Connect ME 9210 -S.
Sep 18, 2023
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816587.89/warc/CC-MAIN-20240413083102-20240413113102-00100.warc.gz
|
CC-MAIN-2024-18
| 681
| 6
|
https://community.nxp.com/thread/538687
|
code
|
I am using S12 ZVML microcontroller.
I wanted to know whether there is any specific handling for illegal memory access and illegal instruction execution.
I checked the memory mapping control Module [MMC] in the RM. From it, I understand Machine exception is issued for an illegal access. The cause can be verified by looking at the Error code register [MMCEC]. And further safe handling once exception is issued can be to forcibly perform WDT reset.
Can anyone please guide me about behaviour and handling when illegal instruction is executed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739328.66/warc/CC-MAIN-20200814130401-20200814160401-00325.warc.gz
|
CC-MAIN-2020-34
| 543
| 4
|
https://de.ifixit.com/Antworten/Ansehen/423225/Vertical+black+bar+on+iPad+Mini+1st+gen,+tried+3+different+LCD
|
code
|
Vertical black bar on iPad Mini 1st gen, tried 3 different LCD
I am currently replacing a iPad Mini 1st gen digitizer and I noticed the LCD had a large vertical black bar. I tried 2 other LCD to see if the problem was still there and it is. Someone told me there might be filters to replace on the motherboard, is it possible? If so, which one would I need to replace?
I got ZXW so if you got the exact part number to replace I can look it up on there.
Here is a picture for reference: http://imgur.com/eaSAgXc
Ist dies eine gute Frage?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711013.11/warc/CC-MAIN-20221205064509-20221205094509-00311.warc.gz
|
CC-MAIN-2022-49
| 536
| 5
|
http://www.easyuo.com/forum/viewtopic.php?f=32&t=13239
|
code
|
...that way everyone would automatically know what time zone to use rather than memorizing where each GM lives
Why we need this?
Simply deliver the time and the timezone of the time of an event...
If the GM want to deliver the time of the event in GMT: OK. Fine. But there will always be people who have to calculate.
So simply add the Timezone of your time you gave for the event and everyone is set.
Because everyone can use this converter...
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123172.42/warc/CC-MAIN-20170423031203-00619-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 444
| 6
|
https://www.experts-exchange.com/questions/22048691/Button-for-Outlook-that-attaches-selected-emails-and-sends-message.html
|
code
|
I work for a company that out-sources our anti-spam filters to a service that filters everything inbound. We do not use the anti-spam options with Exchange 2003 or set any special configurations for our Outlook client's Junkmail filters. Employees do turn on these filters to catch and report any spam messages that come through from the filtering service. Our director has asked me to explore adding a button or command to Outlook that will:
1. attach each selected message in the junkmail folder to a blank email
2. keep count of number of emails being attached
3. write subject to email of “Spam (# of attachments)”
4. address email to spam reporting address
5. send email when last selected message is attached and items three and four are complete
6. delete reported emails
Is this possible? I've been searching for examples or a place to start, but haven't found any that are close. I've explored the vb editor in Outlook and I think it is possible for my session, but I'm not sure if a package can be made to install this feature to other Outlook instances. Any pointers would be appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794868003.97/warc/CC-MAIN-20180527044401-20180527064401-00572.warc.gz
|
CC-MAIN-2018-22
| 1,103
| 8
|
https://community.airtable.com/t5/job-board/updating-a-linked-field-through-api/td-p/90835
|
code
|
I’m building an app with Adalo using Airtable as my database.
I have, as of now, 1 base with two tables, users and products. A product can have many users and a user can have many products. Obviously there is a linked field connecting Users → Products and it’s a multi-select linked field (a product can have many users).
I’m trying to “add” a user or “append” a user to the user array through the airtable API (PATCH) and each time I get something to work, I can only get it to overwrite the current user in that table as opposed to adding a new user.
A PATCH request will only update the fields you specify, leaving the rest as they were. A PUT request will perform a destructive update and clear all unspecified cell values.
In this case, I think you are looking for a way to “create if not exist,” which is not available in the API; I do recommend looking for the record using GET with filterByFormula=, and if the result is an empty array, then create it POST, else update it (PATCH)
If you need any help and you have a budget, then we can talk.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100057.69/warc/CC-MAIN-20231129073519-20231129103519-00640.warc.gz
|
CC-MAIN-2023-50
| 1,070
| 6
|