url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://www.theinsidetips.com/tip-884-include-transparency-in-hevc-video/
code
… for Codecs & Media Tip #884: Include Transparency in HEVC Video HEVC supports transparency, if you know how to create it. Dan D. found a way to make much smaller files with alpha channels using the HEVC codec. This is a process that Apple introduced just last year, and it’s only supported on devices running iOS 13, tvOS 13, or macOS Catalina; or later. The can be used for any video created in any Mac application that includes transparency. Here’s how: - Go to System Preferences > Keyboard. Click the Services category on the left, then enable Encode Selected Video Files on the right. - From any video application, export a project that contains transparency directly using the ProRes 4444 codec. - In the Finder, right-click the resulting .mov and select Services > Encode Selected Video Files. - Wait a few seconds for the next menu in the screen shot to appear. - Choose HEVC from the menu and pick the frame size that matches your project. Click the check box that says Preserve Transparency. The resulting movie will be much smaller and retain the transparency information. This technique will work for any video that contains transparency, but requires macOS Catalina or later. Here’s a tutorial from my website that describes this in more detail.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506421.14/warc/CC-MAIN-20230922170343-20230922200343-00638.warc.gz
CC-MAIN-2023-40
1,268
12
http://vimeo.com/forums/help/topic:96907
code
Fair Oaks Presbyterian Church 1 year ago I know this may sound very basic, but I'm using an extension called "Sermon Speaker" on a Joomla site I'm developing for our church. The idea is that you pop in your UN into the settings, and the extn automatically picks up the videos hosted on Vimeo. Except this isn't happening. Now I'm assuming that the extn - which has been around a long time - is working correctly, so I have to figure I am putting the wrong details in. I have tried the "Name", the email address used to login, and even the last part of the Vimeo URL - the name after vimeo.com/..... I'm now stumped. Can anyone confirm which of those is correct and I'll go from there. Or any SS experts, can you help? TIA!!
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657125654.84/warc/CC-MAIN-20140914011205-00278-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
CC-MAIN-2014-41
723
1
https://www.tr.freelancer.com/projects/software-architecture-javascript/very-experienced-python-django-developer/
code
I have a web app that has some bugs that I need to be fixed before I can launch the site. I'm looking to work with an EXPERT python django developer to help me straighten them out. the app has a git repository with about 20 minor bugs that are logged. I will give further detail to serious developers only. You must proove to me that you are highly skiled with Python Django framework. Look at my feedback on here. As you can tell, I am a respected employer on here. Looking forward to hearing from you. 19 freelancer bu iş için ortalamada 1155$ teklif veriyor Helo i am a full stack developer, with many years of experience working with python-django, but i am new in [url removed, login to view], all my projects were developed with django, i hope we can talk about it.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948514113.3/warc/CC-MAIN-20171211222541-20171212002541-00327.warc.gz
CC-MAIN-2017-51
773
5
http://www.thedailygopher.com/tag/gopher-hockey-vs-scsu-huskies
code
I've got a fever, and the only prescription is MOAR BATTLEHYMN. On the road at Stearns County State? That means that it's time for some HATE! All things SCSU including why the Huskies are the U's little brother, why Herbie should have a Trophy named after him, and who we should be watching out for in this weekend's series. Big thanks to Jeremy Larson of Husky Hockey Time for helping out!
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697380733/warc/CC-MAIN-20130516094300-00001-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
390
3
http://developer.agile-labs.com/developer-guide/creating-your-first-tstruct/creating-a-tstruct/
code
This section describes the steps to be followed to create a simple TStruct. The TStruct definition is as given below : |DC1||dc1||Details||Table Name= Vendors| |InputField||SupplierName||Supplier Name||Data Width=50, - In the Build mode, click New->Form/TStruct. - In the TStruct definition window,enter the Name and Caption of the TStruct in the first row. - In the second row,change the Caption of DC and set the Table Name property. - To define the data elements for the DC, click on the empty grid line after the DC. - Double click to select InputField .Enter the Name and Caption and set the Data Width, Allow Duplicate and Allow Empty properties as given in the above table. - To add subsequent InputFields , click Add Row Button. - Click Save to save the TStruct. Click Yes for “Do you want to create a Page for this TStruct? ”. - The TStruct will now be displayed as a page in the Menu on the left hand side. Note : When a TStruct is created and saved,a form is created in the front end and a database table is created n the backend automatically. In the table, a field named <tablename>id is created and made the primary key.In the above eg., a table named Vendors will be created in the database. The fields defined in the TStruct will be created as fields in this table. Additionally a numeric field or a Source record id named Vendorsid will be created in which a unique number will be generated & stored. The Source record id is - The primary key for this table. - Generated automatically by Axpert. - The surrogate key that is used to relate with other tables in the system. This does not stop you from creating your indexes to this table in database. You’ve now created your first TStruct in Axpert. The next topic will introduce you to the Form Designer in Axpert.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578643556.86/warc/CC-MAIN-20190424134457-20190424160457-00103.warc.gz
CC-MAIN-2019-18
1,786
18
http://developer.nokia.com/community/wiki/index.php?title=Usability_engineering&oldid=147125
code
Please note that as of October 24, 2014, the Nokia Developer Wiki will no longer be accepting user contributions, including new entries, edits and comments, as we begin transitioning to our new home, in the Windows Phone Development Wiki. We plan to move over the majority of the existing entries. Thanks for all your past and future contributions. Usability is not like a garnishing or topping that you can put on after the order is ready on the chef’s table, neither is it like a paint which you can put on the building to hide the internal masonry faults. It is an all pervasive, all encompassing, rather a holistic approach to thing, something that has to be inculcated and practiced at every phase of the development process and even after. In software terms it isn’t something you add to a product once you are done with the development. It’s something you should design into the product. A methodical approach to producing a user interface and putting in due thoughts to ensure that the end product has higher usability indexes is usability engineering. The usability guru Jacob Nielsen has written a book (Jacob Nielsen: Usability engineering) on applying systematic methods throughout the development life cycle to increase ease-of-use for software, websites and other UI’s. In his book Jacob talks about what comprises usability, key concepts of usability, some common jargons and mistakes associated with usability. He also talks about the various usability practices like thinking aloud, heuristic evaluation, usability testing etc. He also details the future road map for usability as a practice and as an idea in general. The key word in designing usability is the user as without doubt s/he is the most important stakeholder in the entire development process and beyond. The user is the one who would be spending in the dollars to buy the product and they are the one who would be employing the services of the application for their needs. Customer is the king and he generally knows what s/he wants so you have to really know the user before making any decisions about the design. If you only assume what the users want, you might end up with a product that nobody needs. You need to spend a lot of time and effort in ensuring you have a true picture of the target audience and their expectations. Usability engineering involves several methods, each applied at appropriate times. * Gathering requirements This phase/method include task analysis, user analysis and environment analysis. In task analysis you determine cognitive and other characteristics that are required of users by the product. These can be, for example, pre required knowledge and cognitive (the psychological result of perception and learning and reasoning) loading. You need to understand the psyche of the user and their behavioral patterns and other aspects of their usage. User analysis helps you describe who will use the product. You need to define the intellectual abilities, cognitive processing abilities, previous experiences and physical capabilities of the user. This would help in understanding what sort of decision making options should be given to the user as advanced settings and other options might/might not be understood by the user with limited technical grounding. Also the target audience physical capabilities would help you in deciding the input-output options to provide. For instance if the user is visually challenged you might think about speech recognition, Braille etc as a mode of communication etc. Environment analysis makes you consider the physical, social and user support environment. In other words you need to determine what the user needs to do and find out the users way of doing things and the context the product will be used in. This would help you in deciding the kind/mode of information display and other criterion, for instance if the application is likely to be used in office environment you might consider the kind of media you want to play and at what volume etc. * Developing and testing prototypes This is just what it sounds like i.e. making prototypes based on the requirements and testing them. You need to find out if the prototypes work like wanted, if there are some features missing or if some features are misplaced. Prototypes can range from extremely simple sketches (drawings and post-it notes) to full systems that contain nearly all the functionality of the final system (low-fidelity prototypes/high-fidelity prototypes). It would be prudent to design and validate the prototype in tandem with the end user or a subset of the target audience if possible to minimize the element of surprise and shock at a later point in time. Prototype validation is indeed a key component of this exercise and something that is generally overloaded by the team. * Evaluating design alternatives This helps you find the usability problems in a user interface design. Evaluation can be done with heuristic evaluation, for example, where you go through a list of usability requirements and see if they are implemented in the design. The list can include qualities like visibility; learn ability, consistency and flexibility. An iterative approach to evaluating the design and looking at alternatives is the best way to go about it as this would ensure that the best ideas get included into the system and any variance is detected at an early stage thus minimizing the impact on cost and timelines. * Analyzing usability problems This will (hopefully!) help you avoid the same problems in your next design. You have to get to the bottom of the problem: why did it happen in the first place? What caused the problem? Understanding the common pitfalls and possibly documenting the best practices which can be used as a template for future work would reduce the rework effort for other engagements in the future. * Proposing solutions Every time you are encountered with a problem think of the solutions and don’t delve on pin pointing the blame for the problem. Every problem should be approached of as an opportunity to try out something new and try out new solutions. Think of possible ways to solve the problems? Refine your design and test it again. If needed make another prototype and test the solutions with it so that you have a validation check done at that point itself. Such an approach would further minimize the need for change requests at a later point in time. * Testing an application with users This would give you valuable information about features that are too difficult to use, in a wrong place, not needed or perhaps missing. There are a wide variety of different testing methods to use: thinking aloud, field observation, questionnaires etc. The user group selected for doing this should not be involved in the development process in any way; this would ensure that you get an honest and impartial feedback. Although Jacob’s book is considered an almanac of sorts for usability it also has its share of bouquets and brickbats. Many people thought found this book to be the answer to problems, however the book was written in the 'purest' environment. This book avoided the 'problem' customer who does not know what they want. Project management is ignored and the recursive 'loops' found in development. The books main point’s works well in small teams of three people, but this does not reflect the size of teams and the control needed in commercial projects. To be successful many people must test and give feedback on usability Some additional resources about usability, its importance, the common issues in usability designing etc. ---- Edited by Mayank on 17/06/2009 ----
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131293580.17/warc/CC-MAIN-20150323172133-00079-ip-10-168-14-71.ec2.internal.warc.gz
CC-MAIN-2015-14
7,648
26
https://www.eehelp.com/question/satellite-c660-15r-motherboard-replacement-question/
code
Satellite C660-15R motherboard replacement question I C660-15r laptop and the motherboard no longer works, the reference is the - 6841p. I saw one for sale. My question is if I buy this record, it will be in being all problems if so what will be the questions please. Someone did he do not any other compatible with this laptop motherboards also and if so what are the part numbers, thanks a lot, Well, the laptop card mother replacement isn t easy. Its more complicated such as on desktop computers. First of all its really difficult to disassemble the whole laptop and on the other hand; After the replacement of the motherboard the DMI string must be updated. The DMI code is programmed in each motherboard and the DMI string contains information about the cell phone as; Serial number, model number, etc. Without this update, some software requiring such information might not work properly. Also, the laptop recovery is not possible. This is why this should be replaced by a mobile technician. > As someone not of any other motherboards compatible with this laptop and if so what are the part numbers, thank you very much You must use the motherboard published for series Satellite A660. Don t think another motherboard is compatible. Hi, I wonder if someone can help me. I got a Toshiba Satellite C660-15r, which took the screen broke and ripped off the base, so the hinges are broken; Anyone know where I might be able to find replacements? I tried to check eBay but can t find the ones for this laptop. Also, I noticed that some threads are running around the edge of the screen case I m guessing it is the son for Bluetooth and the wireless card while they were also torn. Is there anywhere I can get a replacement for this also? Thanks a lot for any help Best place where you can order is a Toshiba authorized service provider in your country. To find the individual hardware components for this new laptop model is quite problematic. Try to contact Toshiba service and ask for help. I bought Toshiba Satellite C660-15r off someone, but the problem is that there is a password at startup upward. It's very well because I was about to restore it somehow but when I go to the restoration of windows you need a password to access. Is it possible to reinstall windows with using windows restore. I really hope that someone can help you. My advice is to follow: When you buy used laptop install OS again to have the own operating system preinstalled. Use the Toshiba recovery image, if possible. Just a question: do you mean password BIOS or Windows login password? If the previous user has put a password, you need and without that password, you can do nothing. If the pre-installed OS is locked with password login, you can install OS using recovery DVDs and you don't need any password for it. I just hope that the previous owner has created this recovery DVDs. I hope someone can help me or who knows what to do. I have the Satellite C660-15r it been shut down correctly, but when put back come with start windows normally, as if it was interrupted, I clicked ok for that but instead of loading, let's make some kind of recovery only he was not able to complete this and rather said there is nothing to recover. It is stuck at it and will go no further, says administration system to log in however its not allowing to connect or to do anything about this or off farm then restart, I tried factory reset, but it will not work at all I've tried several attempts with 0 and other options, told me it does not work , but I can get up f2 and f8 loading up all that works well but I find no option to factory reset. It gives me options to recover, but they take the same screen with no improvement and safe mode does not work. I hope someone can help me I will be very grateful. Thank you in advance. At first, I must say that recovery option is available if the laptop to factory settings. After reading your ad I n don't know if you still use OS install of origin that you got with your laptop or maybe the OS preinstalled on your own. I assume that you did not create a media recovery (DVD) use pre-installed Toshiba recovery media creator, right? In the use of your disk recovery situation could be simpler to solve this problem and install original recovery image. Can you please post model mobile exact? Can someone tell me where I can get the drivers for my Satellite C660-15R? I've been on the download page and do not know what is this computer series and how to get the correct drivers. Thank you, Andy. Check it please http://www.toshiba.eu/innovation/download_drivers_bios.jsp?service=EU once more. You can find your laptop as follows: Type of product > Notebook Family > Satellite Product series > C series Satellite Model > Satellite C660 Model short-term > PSC0LE Can find you it? hopiing can anyone helop, it drives me crazy. I'm a pretty good typist but it's all the hll goone since I got my Satellite C660-15r. As you can se, the keyboard eiter ignores letters I typd or highlights twice. Please tell me the easy way theere n! Have you tried to update the BIOS? I have a PC laptop toshiba Satellite C660-15r I've had for a year. For these last days, I had to move the charger a little when I insert it into the laptop so he could load. Now the battery is dead and the laptop will not turn on or charge. It's not happened before and there is no other problems with the laptop. Have you tried to contact the nearest Toshiba service provider and ask for help first? I mean the guarantee must be valid in order to see whether they can help somehow. Please clarify this and send feedback. BTW: workbook correctly on the current doesn't provide not only (removed battery)? How to lock text size to prevent increase/decrease at will. I can use him reduce / increase the installation when it happens, but it cannot remain stable. Beginner as a whole! What text and what application do you mean exactly? For example, the content of the Web browser (internet explore) can be changed by pressing the CTRL key and moving the wheel of the mouse up and down. You can also go to display and set the Zoom to 100% To be honest, this can be locked I have a problem with my laptop, it just would not start, lights are here. I have reason to believe that there is a problem with the motherboard. I tried to find what model is the motherboard, all compatible models and how much a new. Can anyone help? I also think that there is a problem with the motherboard or BIOS. I presume that the BIOS is defective. In this case any motherboard will be exchanged. To be honest, it is not easy to help you with all your questions. Why? As you probably know mobile computers parts cannot be ordered so easily as hardware components for desktop computers and especially such repair or Exchange will be done by authorized service providers. For this reason, I think you contact the closest service provider in your country and ask for help. All you can do now is to look for the card mother Googling autour. It must be the motherboard for Satellite C660 with PSC0RE part number. Check http://www.toshiba.eu/innovation/generic/ASP_SUPPORT/ and contact the closest service. They can help you with this. I own a Satellite 1100-z6. My pa3210u-1brs battery is dead and needs to be replaced. It's NiMh, 4500mAh and 9.6. Is the compatible pa3209u-1brs? Is lithium-ion, 4400mAh and 14.8V. I can get it for a price much lower. My existing charger will be always adapted? Any advice would be much appreciated. see you soon The fact is that recommend Toshiba using the battery original and supported. It is a PA 3210U Ni-MH 9.6 V 4 500 mAh Another or different batteries may damage the laptop. In this case, you must use the recommended. I have a laptop computer P25-S520 and am looking for a dvd for her writer. I replaced the K12D (Pioneer) with the DW-P50A HP but now I'm looking for something else. However, I searched in MANY places, but I can't find another suitable writer (dvd). Please help me with this (I want to chose a 'list' of :).) Thank you very much. Sometimes you can find that information on the compatible readers in the user manual. Maybe you will find some info. But generally, all devices and compatible readers, you can order from the Toshiba service partner in your country. It is important that you go buy a car with a csel/slave/master settings right because if the disc has wrong settings of the BIOS will not recognize the device. I would recommend to contact the ASP and control player of these guys right here. On the Toshiba site, you will find the database with all of the ASP s worldwide My sons laptop has stopped working. Toshiba logo appears with choices after pressing F2 Setup or F12 boot device selection menu what I seem to try to end up with message telling me that "operating system not found '. I don't know whether or not this model came with a recovery disk, and my son is of little help can someone please advise. Please try to test if you have access to the HARD drive as a result of this instruction recovery image - http://aps2.toshiba-tro.de/kb0/HTD9102IR0000R01.htm Please send comments. Hello, hoping you can help me. When I start my laptop, it starts as usual, connects to networks etc but when I try to run firefox, microsoft Word, or any other application, it won't. I discovered that I can restart in safe mode, and then restart the laptop from here and everything works well again, but it is tedious and complicated. I really hope you can help me! Running Windows 7 64 bit btw. Looks like the corruption of the system. You may need to reinstall the operating system in order to solve this problem, but try to clean the OS before doing so. Use CCleaner and clean and repair the registry. Then check it once more if it does not then execute the procedure of recovery, but note; This will format the HARD drive and will set the laptop to factory condition. In the specification I can read that this model can be connected to the TV, so I bought on eBay SCART 15-pin RGB S - VGA male HD LCD TV cable lead [e http://cgi.ebay.co.uk/ws/eBayISAPI.dll?ViewItem&item=280653117637&ssPageNam = STRK:MEWNX:IT]. When I plug the cable (laptop is swiched off) then I am not able to turn on my Toshiba. I have tryied to plug the phone cable with computer runing but cannot figure out how to put in place. If you have connected the cable to your laptop and the TV, press the key combination FN + F5 as indicated in your user manual to switch between monitors. You can choose between internal monitor, external monitor or the two (display clone). But I recommend you to choose the right channel of TV input first, before you press the FN + F5 key combination this laptop detects properly the external monitor. I want to upgrade to Windows 10, my laptop is aproximidly 2 years. I have a toshiba satellite C660/660D. My question is; I can do it, I have to get new driverpack for it, where can I get those or Windows will find itself? Is anyone here who has the same laptop as mine and the upgrade? Will you tell me if this is satisfactory, but it works correctly? I did the upgrade on my own as soon as it became available. I found this worked OK but was a bit disappointed by the absence of perfprmance speedor. One of the options for you is to create a 10 disk DVD set windpws I did. Then I did a new install of windows 10 and reloaded all my programs. This has a portable work much better. According the information I read you need to do the first updated Microsoft then will issue a license that is kept on servers that is unique to your machine. When do you it a re - install it is not necessary to enter a license during the installation key, simply skip this step. Windows 10 rauns well on this laptop I have not had any problems with other than the card reader drivers, but googling found a driver that works now, unfortunately I don't remember where I found it sorry. I think the driver of Windows 8 was one I used. In November there was a big update, I had problems with. The installation of it was causing my laptop overheating and automatic stop before finishing. I have overheating problems on this machine despite disassemble and clean and replace the thermal paste on the processor. I had to make a new record to Win 10 installation updated on another PC and use it to update the Toshiba, but it was still close during the update and came near close. Win 10 works very well and starts quickly, although I have replace the hard drive under Win 7 for one SSD due to the failure of the hard drive, which will account for some of the performance... I, like others, do not like everything, about 10, but it does not work on the C660 - 1 7 I own Maybe you are looking for Hello In the last two months, capability of my laptop to charge its battery has degraded.She went to a battery completely (100%), not being able to load beyond 98% and then 66% and 30%, and now finally, it says "0% availability (plugged in, charge)", How can I get my sound back. I use Windows XP Whenever I try to set wmc for land "all I get is 6 options for my area, but all are TNT? I had overland in the past, but had to reset the pc after you have moved the pc because of the decoration, & can not find how to configure overland again? I am i I would be grateful if anyone can identify the changes to the field vs focus change listener listener. For example, when a modified image button developed, which qualifies for a focus change but would be also a change of field? When to use a listener We have a Deskjet 3520 that worked very well with our old clumsy router Belkin. However, we passed just a router ASUS RT-AC66U, and now the printer doesn't seem to be able to communicate with her. We are running Windows 8 on our desktop. Hard, the of
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00716.warc.gz
CC-MAIN-2022-33
13,744
135
http://forum.kitz.co.uk/index.php/topic,3905.0.html
code
How to Prepare to install Windows and essential work after installing Windows The first thing to do before doing a fresh install is to make sure you have all the software that is needed and to make sure that you have all of your drivers handy. If not, download them now. A good program that will save you a lot of time and headache is "DriverMax " it will copy and backup all of the drivers that are currently installed on your PC for easy reinstalling later. Once you have backed up all of your drivers just check that you have got all the software that you will also be installing and if necessary make sure it's saved on a partition that is used for storage, such as your D: drive or a CD/DVD. Now we need to back up your program settings, so copy this folder to a storage partition on your D: drive or a CD/DVD.:- (ready for use later) but (Optional) C:\Documents and Settings\"user name"\Application Data Make sure that you can see "hidden files" or you won’t be able to do this, Open a window (My Computer) then go to Tools > Folder Options > View > and select "Show hidden files and folders". Now it's time to install XP. If you have never installed XP before, Lifehacker has a good guide. The only thing I would add that isn't in their guide is to install XP without being connected to the internet, also, if you only have one hard drive I would recommend partitioning it so you can keep your documents and the OS on different partitions. I would normally suggest 20GB (20480MB) for XP, but you may want to use more depending on what programs you use. Once XP is installed, then install these programs without being connected to the internet.Avast AV . TCP Optimizer or Spybot Search & Destroy * Also temporarily "activate" XP's Firewall until you install your own firewall. (* You can also do these during the install) * Also "disable " windows "Automatic Updates, "you can re-enable it later if you want to" although you will receive warnings from windows security telling you it's been disabled, but you can also disable that if you want to, or just ignore it for the next 10 - 15 minutes. Now set and run TCPOptimizer to optimize your internet connection, then connect to the internet and update the above programs and any other programs that still need updating. (But not windows, especially any Service Packs) From here on it doesn't really matter what order you install the rest of your software because all the important programs have been installed and updated so just go ahead and install the rest of your programs. A very good tip though is to install older programs first, as there is less chance of them getting confused with newer drivers already on your PC. Now that everything is installed lets change the location of “My Documents” so it's not stored on the same partition as Windows. You can change this by going to:- "My Documents" on the desktop or: Start button > right click “My Documents” select "Properties then change the target by selecting "Move" followed by selecting your new D: drive (assuming it's D) Once you have done that then set and run "JkDefrag" You may also want to make sure the JkDefrag screen saver mode has been installed. (Optional) Now lets make the text look better. Right click on the desktop > Properties > Appearance > Effects > second drop down menu change to "ClearType". (Optional) While still in "Display Properties" setup the Screen Saver. Select “Avast Antivirus” then Settings > Screen Saver > JkDefragScreenSaver, now every time the screen saver starts it will scan your PC for virus and defrag at the same time. (Optional) Once that's done, re-start the PC in safe mode by hitting F8 as the PC starts up and select "Safe Mode", then copy the "Application Data" folder back into "C:\Documents and Settings\"user name"\. That's pretty much it, you may still need to setup some of the programs that are installed and to sort out what program/s start with Windows. (you can also use CCleaner to stop programs starting with Windows) but for now this setup should give you a good starting point. Once you have everything installed and setup the way you want it, then would be a good time to back up your PC. (Create a "Image" of your C: drive") Although personally I would have already done this at least 2 or 3 times by now, it only takes a few minutes. "Tweak and backup", if it goes belly-up, then just re-store the backup. Or spend hours re-doing everything just to get back to the point where it went wrong. If you don't have a copy of Norton Ghost, (Macrium Reflect is also supposed to be a good FREE tool for doing this, "so I'm told"). Q & A Q. Why not connect to the internet to straight away. A. I don't like windows starting to download updates before I am ready. A. Two main reasons. Firstly, I don't like to interupt downloads because that's one way of getting corrupt files downloaded and secondly, I actually may have a better driver that came with my hardware direct from the manufacturer, not one of Microsoft's "Generic" drivers. Q. Why are some things above marked "Optional" A. Because they are a Per user choice. Personally I don't use a Screen saver as such, I use the "Blank" option, this does not then interfere or slow down the PC when a program is running in the background, such as a virus scan or Defrag. Q. What if I did not copy the C:\Documents and Settings\"user name"\. folder. A. Nothing drastic, it will just take that much longer for you to setup the same programs that were installed before the fresh install. Q. Why does defrag take such a long time. A. Especially the first couple of times it's run it needs to prioritise and move system files around to the begining of your harddrive. So initially the more you have installed, the longer it takes, which is why to start with run it every 15 minutes or so.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699273641/warc/CC-MAIN-20130516101433-00033-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
5,819
53
http://biorxiv.org/content/early/2016/04/28/050724
code
Gene gains and losses shape the gene complement of animal lineages and are a fundamental aspect of genomic evolution. Acquiring a comprehensive view of the evolution of gene repertoires is however limited by the intrinsic limitations of common sequence similarity searches and available databases. Thus, a subset of the complement of an organism consists of hidden orthologs, those with no apparent homology with common sequenced animal lineages --mistakenly considered new genes-- but actually representing fast evolving orthologs of presumably lost proteins. Here, we describe 'Leapfrog', an automated pipeline that uses increased taxon sampling to overcome long evolutionary distances and identify hidden orthologs in large transcriptomic databases. As a case study, we used 35 transcriptomes of 29 flatworm lineages to recover 3,597 hidden orthologs. Unexpectedly, we do not observe a correlation between the number of hidden orthologs in a lineage and its 'average' evolutionary rate. Hidden orthologs do not show unusual sequence composition biases (e.g. GC content, average length, domain composition), but do appear to be more common in genes with binding or catalytic activity. By using 'Leapfrog', we identify key centrosome-related genes and homeodomain classes previously reported as absent in free-living flatworms, e.g. planarians. Altogether, our findings demonstrate that hidden orthologs comprise a significant proportion of the gene repertoire, qualifying the impact of gene losses and gains in gene complement evolution.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189031.88/warc/CC-MAIN-20170322212949-00295-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
1,539
1
http://whywontgodhealamputees.com/forums/index.php/topic,22039.msg492952.html
code
Jaywalking itself may not be a moral judgement (though given it can be dangerous, to others as well as yourself, would that not be a good case for saying it IS a moral issue?), but the point I was making is that one something IS a law, should we not as a society be agreeing that it is good to follow laws, and bad to break them? No, I don't agree with this. Would you say that someone who drinks is morally superior to someone who smokes pot, purely on the basis that one is legal and one is not? For example copyright laws are very bad for society in general but good for a very few people who can profit from them. I think most people have some mp3s at the very least, and they don't feel guilty about it, despite knowing it's illegal. Shouldn't they? I don't have any, because its taking something for free that the person creating it wants me to pay for.....which I regard as theft. Which I regard as morally wrong. I get that part, but there are a couple of problems with it. First, that limits access to information, technology, and medicine to only those who can afford it. Have you seen the price of college textbooks lately? How about Lipitor, a life-saving cholesterol medicine that is marked up almost 5,000%? Or companies in developing nations that have to use pirated copies of Windows on all their computers because they simply can't afford the licenses for Microsoft products. Should only the rich have education , health care, and technology? Second, that seems to make the argument that without copyright laws artists, writers, and inventors wouldn't make any money and would stop producing new works. This assumes that most of these people only create for financial gain, which isn't true. Most artists never make a dime from their work, they create because they want to . Without copyright laws, we would probably see far fewer cookie-cutter pop bands who are cobbled together by studio executives to make a quick buck. They won't be missed. True artists will continue to make great music even if they had to get a day job. As far as producing new work, many of the most prolific writers, artists, and inventors, lived before copyrights and patents and were quite successful. I expect that a significant number of gang members/burglars/pickpockets/insert other crime here don't feel guilty about it either, despite knowing its illegal. Probably true, but copying isn't stealing. For example if I steal your car, you can't drive it anymore. But if I copy it, you can still drive it, right? It doesn't affect you in the slightest. Now in a slightly different example, if you are trying to sell that car, and I steal it, you can't sell it anymore. But if I copy it, you can still sell it, right? You might say that you lost the sale because I copied it instead of buying it, but that's not necessarily true. The movie and music industries claim they are losing billions to piracy, but they assume that each illegal download is a lost sale. This is not at all accurate. If Microsoft ever manages to make it impossible to pirate Windows, I will simply switch to Linux. If everyone copies the car you have for sale, then yes, you will have lost the sale to piracy. But are you really going to complain about a world where everyone gets free cars? A reducto ad absurdem, but it brings up a good point: we are moving towards a world where money is obsolete, thanks to the internet and piracy. Why do we pay for things? We are trading money for labor. You pay someone for the time it takes them to do or make something for you. In the old days, books were all copied by hand, a laborious processes taking days or weeks to copy a single manuscript. Books were incredibly expensive and only the rich could afford them. Then along came the printing press and moveable type and books became available to almost everyone, that is unless the book is protected by copyrights, then the publisher can charge whatever they want for it. This is why the Bible, which costs not much more to produce than the paper it's printed on, is in the hands of every uneducated plow-pusher in the world but God is Not Great - How Religion Poisons Everything , a fantastic book that could free their minds from the tyranny of religion is forever out of reach for the people who need it most. In the past if you wanted to read you went to the bookstore and bought a book. If you wanted music you went to the record store and bought a record. Same with movies, games, and software. Today these things are all available for free on the internet. They are free because there is no longer any labor costs to make these products, beyond their initial creation. No more monks working their quills into the wee hours by candlelight, no more Gutenberg presses converting trees into romance novels. Just click here to download. People around the world have access to information at an unprecedented level in human history at a fraction of the labor and resource cost so small as to be essentially nil. The fact that you consider this a bad thing is lamentable. That fact that it's illegal is downright insulting to humanity.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190183.80/warc/CC-MAIN-20170322212950-00500-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
5,100
16
https://aricmonts.com/tag/specialization/
code
When charts bore you, create a map! As I continue my sabbatical, one of the projects I am working on is earning a certification in Geographic Information Systems (GIS). Why? For much of my career I have been creating charts… charts showing revenue growth over time, charts showing sales rep performance, and charts showing the health of a SaaS startup. After 15-years of charts, I felt it was time to explore another form of data visualization. I enrolled in the GIS Specialization offered on Coursera and created by UC Davis. I am all too familiar with data transformation, data management, and blending of data, so I was really curious how different a GIS would be compared to the likes of Salesforce.com of Tableau (which does offer mapping). The Fundamentals of GIS course itself is much more about learning to use ArcGIS and ArcMap. We did learn about projections, GIS best practices, what spatial analysis really is and how to open the ArcMap software. Aside from learning the tool and file types, there really wasn’t much different from what I already knew as a data and insights analyst. Take the final peer-graded assignment for Fundamentals of GIS as an example. The course provides data including a counties data file defining counties in California. The course also provides a second data file including voting precincts and the voting results for Prop 37. The goal is to combine the two data files and create a normalized map showing the ratio of Yes votes to total votes. Seems simple enough? It was fairly simple. As with any data related project, the first thing you do is to download and validate the data. Can you open the zip files? Is the data there in its entirety? Once you know the data is usable, get to know the data. Look at the metadata to see what fields are included and what they mean. Since we have two files which need to be combined, we need to find a primary key to join them. While it took me a few minutes to review the data, it took a bit longer to understand the connection between the two data sets. It was clear that we needed to have a one to many join and a spatial join. There are a few different ways to do this. I first decided to summarize the precinct data and output a table which showed the total votes per precinct. I can then join this table to the Counties data as a one to one join. Alternatively, you can join the two data sets using the Spatial Join Tool. Instead of joining on a common key (I joined on County number), you can join them based on their proximity such as an intersect or contains. Once the data is ready to display on the map, you can use “Symbology” of the joined data layer to display a normalized ratio. Showing absolute numbers of Yes votes does not really tell the whole story as some precincts and counties have greater populations. Normalize the Yes votes by calculating the ratio of Yes votes to total. This produces the map we were looking for. Once we add the required metadata, scale, etc, we can export it. (view my map online here) What did I learn from taking this course? Spatial analysis is a specialized field which does not differ too much from more traditional data analytics. The course taught me the special files formats, terminology, and ArcGIS basics. What is most interesting to me is this map could be made with other platforms like Tableau and PowerBI. The only difference is the data must be manipulated outside the software (in Excel, maybe) and then visualized. This brings up a great point. In traditional analytics and business intelligence, you work with specialized tools which handle a specific part of data. From the ETL (Talend or Kettle) to analysis (Excel or Python) to visualization (Tableau or Qlik), each segment of the data journey required different software. Today, the lines are blending a bit. Solutions like Alteryx combines ETL with analysis, but leaves a lot to be desired in terms of visualization. Tableau is also able to connect to and blend a variety of data sources, but leaves some to be desired in analysis. After taking this course I am left with a profound sense of how specialized GIS is. I can understand why it is well worth investing in, especially for geospatial analysis consisting of multiple data layers. When you consider ArcGIS (or GIS in general) is capable of global level analysis, it takes your breathe away. My eyes are open to how I can leverage GIS and merge it with my interest in History. Perhaps creating a historic spatial database which illustrates the speed at which Manifest Destiny occurred? Maybe we can start with a map of Texas and how it was settled over time? Stay tuned…
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655881763.20/warc/CC-MAIN-20200706160424-20200706190424-00299.warc.gz
CC-MAIN-2020-29
4,641
13
https://lists.01.org/hyperkitty/list/connman@lists.01.org/message/VKCKQFNBNDT737U7ICGEZERC435JJREV/
code
Does ConnMan support any type of IPv4 address conflict detection? I searched the code, but wasn't able to find anything obvious. I need this functionality for DHCP and manual configuration methods. ) describes a sequence where a client should probe an address with ARP, and not use the address if it's already in use on the network. Apparently udhcpc (https://busybox.net/downloads/BusyBox.html ) supports this functionality through its command line option --arping.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141182794.28/warc/CC-MAIN-20201125125427-20201125155427-00708.warc.gz
CC-MAIN-2020-50
466
9
http://onkelallan.blogspot.com/2008/11/raaaaaaaaaaaaant.html
code
Due to lack of time and internet and imagenation I will post todays post from my wife's blog. She has already said my point so well that I don't have anything to add....and there is also a picture of my naked butt!!! This post is also a confirmation that I survied yet another 7 hour session on my back from Shige. Soooo go see "my" post here!
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655900335.76/warc/CC-MAIN-20200709131554-20200709161554-00360.warc.gz
CC-MAIN-2020-29
343
4
https://developer.jboss.org/thread/111374
code
I think that Remoting, in its current form, might be too low level for you. There is a failover facility in the Transporter code (org.jboss.remoting.transporter.*), but it's more of a demonstration than a fully developed feature. There isn't any loadbalancing feature. For a brief discussion of streaming from server to client, you could take a look at the thread "P2P Client Callback with streaming" (http://www.jboss.com/index.html?module=bb&op=viewtopic&t=130918).
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156252.31/warc/CC-MAIN-20180919141825-20180919161825-00190.warc.gz
CC-MAIN-2018-39
467
2
http://www.gamedev.net/index.php?app=forums&module=extras&section=postHistory&pid=5008337
code
When dealing with shaders, ALL code is executed, including ALL branches, all function calls, etc. The ONLY exception for this is if something is known at compile time that will allow the compiler to remove a particular piece of code. This is how all graphics cards work, AMD, NVIDIA, etc. So, your additional cost is of the if statement, and in your example, you are adding an extra if instruction. This is a zero cost on gpus. If you want to read on it, check out vectors processors and data hazards. If you somehow split our shader up and added an if statement to the middle thinking that it would speed up your code, you would get NO speedup. because ALL paths will be executed. This is completely wrong, even for relatively old GPU's (even the first-gen DX9 GPU's supported branching on shader constants, although in certain cases it was implemented through driver-level shenanigans). I'm not sure how you could even come to such a conclusion, considering it's really easy to set up a test case that shows otherwise.
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011143926/warc/CC-MAIN-20140305091903-00018-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
1,020
4
http://www.mathworks.com/matlabcentral/fileexchange/28164-color-frequency-image?requestedDomain=www.mathworks.com&nocookie=true
code
This is a MATLAB implementation of the Color Frequency concept introduced by T. Kashiwagi & S. Oe. With this script, you pick a color image and then it computes the color frequency image. The color frequency image is an image where the pixel intensity represents the frequency of pixels in the original image that have that same pixel color as that pixel location. For example, in the screen shot, the blue sky looks bright because there are a lot of similarly colored blue pixels in the image. Everywhere there is a blue pixel in the original image, it will have a high value in the frequency image because the frequency of blue pixels is high. (If you replace imshow() with image(), and comment out the imwrite() function then you won't need the Image Processing Toolbox.)
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948520218.49/warc/CC-MAIN-20171213011024-20171213031024-00073.warc.gz
CC-MAIN-2017-51
774
3
http://dotnetmobile.com/XamariniOS/CreatingCustomTableViewCells
code
Hello All, Welcome back again. In General Application development presentation is the key item to be concentrated first. If we have TableViews in our application presenting them in beautiful way is a key challenge. If we want to have custom design for representing list of items with TableViews then we need to go with CustomTableViewCells. Following is the step by step example for creating Custom TableViewCell. Open Xamarin Studio and Create a new Application. Once the default skeleton is created. Add a ViewController to the solution. Open the View Controller and Create a Sample Class with two properties. Create a TableSource which populates all the data to the table. On the ViewDidLoad create an object for TableView and create a object for TableViewSource and add the TableView to the ParentView. Populate some test data to the Person. Right Click on the Project and Add New File and Choose iOS section and Select iPhone Table View Cell Once the file is successfully created in the project. Open the .XIB file in Interface Builder and design the scree as below. Open the CustomCell.designer.cs file and you can able to see the outlets got created. In the TableView Source GetCell method you can see how we are accessing CustomTableViewCell and its properties. Enjoy Coding.... :)
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585405.74/warc/CC-MAIN-20211021102435-20211021132435-00431.warc.gz
CC-MAIN-2021-43
1,289
14
https://www.ateam-oracle.com/oracle-goldengate-best-practice-instantiation-from-a-db2-source-database
code
This document will outline the Best Practice approach for Instantiating a DB2 target database from a DB2 or other database source system. One of the biggest challenges in creating a DB2 target database for replication is to insure that no collisions or data loss will occur when applying the change data after the initial instantiation of the target database. Oracle GoldenGate has addressed this issue by including functionality to apply the change data to the target at the appropriate CSN (Commit Sequence Number) where no collisions will occur. To use this functionality without incurring any data loss, be sure to use a read consistent image of your source database to do the instantiation and keep track of the CSN of your consistent image. This document provides more details and examples on how to use LOGCSN which is stored in the Oracle GoldenGateTrail Files starting with Oracle GoldenGate version 10. The complete document can be found on the Oracle Support site under the document ID:1310542.1
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655897027.14/warc/CC-MAIN-20200708124912-20200708154912-00456.warc.gz
CC-MAIN-2020-29
1,006
3
https://zh-tw.coursera.org/learn/python-crash-course/reviews?page=268
code
This course was really helpful in developing my coding skills in python.The exercises helped me to test my knowledge .Overall it was a really good for people like me who are just beginning with python An excellent course for those who want to boost their programming abilities on Python. It tackles diverse and challenging problems, for you to practice and round out every concept. Highly recommended! 創建者 ArYaN T G• good course but i think need to change the style of explaination i think its a little bit of choppy to learn think like this but that's also not that bad 創建者 Sean C• I think this offers a very basic overview, but could be more rewarding and challenging if the exercises had more depth and additional solution support. 創建者 Juan C S• despite some validations in the platform don't work , the course was very useful and with a great sweet teacher and with a great content by Margara, 創建者 Shubham S• Okay, Course. Not very thorough. Expected much better from Google. This is not a course for a beginner it is course to revise your python syntax 創建者 Sergei E• Good materials and presentation. However one must be aware that this is very basic course which would teach you to manipulate with text files. 創建者 Stephane B• I enjoyed the course on Python, however the last assignment lab to generate the WordCloud was very frustating because the grader was buggy. 創建者 lim y x• I felt that this course has a takeaway for different individuals. In my opinion, I felt that this course can spend a longer time on syntax. 創建者 Christian R• Does not provide answers on any quizzes. Makes it quite difficult to learn from mistakes if you can't figure out the right answer. 創建者 Reinaldo D• buen curso, pero son necesarios mas ejercicios aunque los tutores estan muy dispuestos a resolver las dudas de los estudiantes 創建者 Mateo C V• It was a great course except by the videos "in Marga's words" , this is a course about "PYTHON" not about how Marga feels. 創建者 Kristopher B• Grading system was buggy, and I feel that the video lessons didn't always prepare the learner for the quiz/exam questions. 創建者 Viktor M• Very, very slow and the lecturer is boring, over half of every video is just empty "greetings." However, good material. 創建者 Clara A• it's not explicitly explained from week 3 till week 6 tbh(5 not included, i didnt watch it yet).. but it's good overall 創建者 Delin D C• it's a hard one for beginners. The increasing level of difficulties is very steep so we beginners find it really tough. 創建者 Jonathan K• Would have given a 4 star but it frustrated me in the final project. It kept scoring me 0 even though I was correct. 創建者 Crystal C• Too hard, not much syntax to practise through, a lot of missing pieces along the way, not recommended for beginners 創建者 Gastons T• Good course for refreshing your Python knowledge. However I would not recomend this as your first Python course. 創建者 PATHAK R• It was Not too easy and and too hard was some what easy. The topics where not completely covered in the course. 創建者 Brajesh k• Really did not got much people to interact with, wanted some good friends atleast after completion of course. 創建者 Barbi V• Fue dificil porque no se mucho ingles y tuve que traducir bastante ya que solo los videos tienen sustitulos. 創建者 Christian D• labs and time to type and learn code is minimized over lecture. No hands on practice to learn fundamentals 創建者 Jaden B G• Although that course and explanations are good, they dont give you the tools to practice on your own There's no help. Looks like they post the same answer on every question which is very irritating. 創建者 ashwin k• Pretty good introduction for beginners, although much work is needed for a clearer understanding. 創建者 Lawrence E M J• Significant leaps from lecture to coding for a non-coder. The final project is interesting though
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103037649.11/warc/CC-MAIN-20220626071255-20220626101255-00197.warc.gz
CC-MAIN-2022-27
4,020
51
http://myelectroniclife-alagappan.blogspot.co.uk/2013/01/
code
Our project running android along with Windows is grown up (Running Dual OS in parallel). The time is rushing to release it to the world, but we have to get the license for it to release it in the Android eco-system. The first thing comes into the play in getting the license is CTS. Fortunately, I got the chance to study and run CTS in our project. Now, here is what I understood and doing in CTS... RUNNING CTS IN WINDOWS
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122739.53/warc/CC-MAIN-20170423031202-00551-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
424
2
https://egeria-project.org/types/5/0507-External-Schema-Type/
code
0507 External Schema Type¶ External schema types allow an asset's schema to reference another schema types defined outside the scope of the asset. The ExternalSchemaType is part of the asset's schema type. The schema type that is linked to via the LinkedExternalSchemaType relationship is often defined as part of a standard, or a set of types supported by a specific type of technology. It is typically reused in asset schemas when the asset is supporting a standard. It may also be used as types for schema attributes where the schema is defined for a specific technology that has a fixed set of types. For example, a relational database column may be defined with external types that represent the defined types of the database platform where the database schema resides. The LinkedExternalSchemaType is linked from a SchemaElement to enable it to be used either by a SchemaType or a SchemaAttribute that has its schema type defined in the TypeEmbeddedAttribute classification. The following types are replaced by the attributes in SchemaAttribute. - BoundedSchemaType - BoundedSchemaElementType - ArraySchemaType - SetSchemaType Raise an issue or comment below
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00140.warc.gz
CC-MAIN-2023-50
1,165
7
http://www.risingsun4x4club.org/forum2/archive/index.php?t-2915.html
code
View Full Version : Can't delete an event? 01-25-2007, 08:13 AM I entered the Pike/San Isabel meeting info on the wrong day. SO I go to delete it, and all is good until it says "Please confirm deleting the event by checking the delete box". WHAT delete box? No msgbox pops up, and no popup blocker notice either. Can't delete it. Caught in a loop. 01-25-2007, 10:01 AM There are several ways for you to delete but you need to provide more info on what you are doing. You are a mod in the land use area so you have even more rights than a normal member. If you want to delete a full thread then check the box of the thread on the right and then down below in the dropdown box you delete. You can also use the dropdown at the top "thread tools" If you started the thread you can go edit it and delete it as well. I think he's talking about the calendar. 01-25-2007, 11:02 AM That's the kind of info that's needed :) The checkbox they are referring to is next to the text... I'll have to check permissions on the calendar... (I just checked the permissions and everyone can create or delete(their own) an event. 01-25-2007, 11:32 AM Exactly what I would have hoped to see. And did not. Thx for deleting it for me though. 01-25-2007, 11:47 AM I used my westest (rising sun member) acct to create an event and I was able to delete it as well.:confused: 01-26-2007, 09:04 AM I got the message, but sans the checkbox and the button. Wonder what gives? That was weird. IE 6.0 SP2. 01-27-2007, 10:45 PM That was weird. IE 6.0 SP2.Get Firefox (http://www.mozilla.com/en-US/firefox/). I can't say whether your issue was a browser issue or a vBulletin issue, but by all means switch to a superior browser ;-) 01-27-2007, 10:50 PM I tried it with westest on ie 6.0.2 and firefox 22.214.171.124; can't recreate it 01-30-2007, 09:37 AM Get Firefox (http://www.mozilla.com/en-US/firefox/). I can't say whether your issue was a browser issue or a vBulletin issue, but by all means switch to a superior browser ;-) I do... on the machine *I* own... vBulletin® v3.7.1, Copyright ©2000-2017, Jelsoft Enterprises Ltd.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169776.21/warc/CC-MAIN-20170219104609-00172-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
2,098
27
https://forum.cs-cart.com/t/adding-a-form-to-a-category-link/39698
code
I have a link in the “categories” block on my home page. within this block I have a link for “Custom Built Products”. When a visitor clicks on this link, I would like them to be taken to a form to fill out and submit to me with detailed information. I have made up the form with all the information I need but I can't figure out how to set up “Costume Built Products” link to go to the form. Can anyone help please? Also, after creating the form, I noticed there is no “Submit” button. How do I get the submit button on the form? What about adding a form link to a Buy Now link? (catalogue mode)
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945030.59/warc/CC-MAIN-20230323065609-20230323095609-00147.warc.gz
CC-MAIN-2023-14
611
3
https://dague.net/tag/engineering/
code
“Read, read, read. Read everything—trash, classics, good and bad, and see how they do it. Just like a carpenter who works as an apprentice and studies the master. Read! You’ll absorb it.” – William Faulkner Icehouse 3 is upon us, and as someone that is on a bunch of core review teams, it means a steady drum beat of everyone asking how do they get core reviewers to review their code. My standard response has been “make sure you are also reviewing code”. Understanding implicit style While most projects use the hacking program to check for trivial style issues (wrong formatting), there are a lot of other parts of style that exist inside a project. What’s a good function look like? When is a project handling exceptions vs. doing checks up front. What does spacing inside functions look like. What “feels” like Nova code, and what feels foreign and odd. This is like when you are invited to a party at someone’s house for the first time. You walk in the door, and the first thing you do is look to the host, and the guests, and figure out if people are wearing shoes in the house or not. And follow suit if there looks like there is a pattern. It’s about being polite and adapting to the local environment. Because unless you read other people’s code, you’ll never understand these things. There are lots of patches I look at briefly, realize that they are in some whacky style that’s so foreign to the code at hand, that I don’t have the energy to figure out what the author means, and move on. Taking load off review teams As a core reviewer, I currently have about 800 patches right now that I could +2 or -2. Given the rate of code coming in, that might as well be infinite. And it grows all the time. By reviewing code, even when you don’t have approval authority, you’ll be helping the review teams weed out patches which aren’t in any way ready to move forward. That’s a huge time savings, and one that I appreciate. Even if it’s something as simple as making sure author’s provide good commit messages, that’s huge. Because I’ll completely skip over reviews with commit messages that I can’t understand. That’s your opportunity to sell me on why I should spend the next 30 minutes looking at your code. A good commit message, being really clear about what problem this code hits, and what this solution is, and why this implementation is the right approach, will make me dive in. A terrible or unclear commit message will probably just make me ignore the code, because if the author didn’t care enough to explain that to me in the commit message, there are probably lots of issues in the code itself. Even if you and I had a conversation about this code last week, don’t assume I remember all of that. That was probably 50 code reviews ago for me, which means the context of that conversation has long since flushed from my brain. If you review a bunch of code, you’ll understand how these things impact your ability to review code, and will naturally adapt how you write commits (including the message) to make life of a reviewer easier. Seeing the bigger picture People tend to start contributing in just one corner of OpenStack, but OpenStack is a big, interconnected project. What you do in one corner can effect the rest of the project. If you aren’t reviewing code and changes happening at other layers of the project, it’s really hard to know how your piece fits into the larger picture. Changes can look fine in the small, but have a negative impact on the wider project. If you are proactive in reviewing code more broadly you can see some of that coming, and won’t be surprised when a core reviewer -2s you because you were going in a different direction than the rest of the project. Becoming a better programmer When I started on the OpenStack project 2 years ago I hadn’t done python in a real way for years. My python was very rusty. But one of the first things I did was start reviewing a bunch of code, especially by some of the top people in the project. There are some really smart and really skilled people in the OpenStack project. There are people that have been part of the python community for 15+ years. People that live and breath in python. Just reading their code makes you realize some of what can be done with the language, and what the “pythonic” way of doing things is. Nothing is better training for becoming a better python developer than learning from these folks. Some times you’ll find a real issue, because no one is perfect. Some times you’ll find something you don’t understand, and can leave a comment as a question, which you’ll probably get an answer to. But all of it will be learning. And you will become a better developer. It does make a difference I’ll be 100% honest, with 800+ reviews I should be looking at, I play favorites. People that I see contributing a lot on the review side (not just volume, but real quality reviews that save me time) are people who’s code I want to review, because they are contributing to the whole of the project, not just their little corner. So that’s why you should review more code in OpenStack. It will really contribute to the project, make you a better developer, and through all this you’ll find your code is naturally aligning better with OpenStack and gets reviewed more often. Realize this is not an overnight fix, but a long term strategy for aligning with the community and becoming part of it.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653631.71/warc/CC-MAIN-20230607074914-20230607104914-00039.warc.gz
CC-MAIN-2023-23
5,485
23
https://debugonweb.com/2020/01/wcf/
code
Hello Friends, In this tutorial, I am going to tell you what is WCF and the advantages of using it. WCF is a framework that can be used to create a service-oriented application. After completing this tutorial you will be able to understand: - What is WCF? - Components of WCF. - Advantages of WCF. - Scenarios where WCF can be used? WCF stands for Windows Communication Foundation. WCF is a programming model for building distributed application and interoperable application. A distributed application is one where the part of the application runs on two or more computer nodes. WCF is used to create a service-oriented application that can be used by multiple clients. WCF can be used to send asynchronous messages from one end point to another end point. The end point can be a client such as a browser, an iPhone, a tablet of a service that requests data from a service endpoint. WCF is used to create a service that is accessible to Windows, Linux or any other devices. Scenarios where WCF can be used? - A Secured service that needs to perform some business transaction. - A Service that delivered some data to other application such as whether report. - A Service that exchanges data between two or more peoples for communication. - A service that needs to used by the browser as well as Mobile devices. Fundamental Terms of WCF. When we create a WCF Service it exposes a collection of EndPoints. This EndPoint is responsible for communication with Clients that is consuming the service. The EndPoint is the address which is used to send or received the message. The EndPoint has the following major component: The address is the location where your service is hosted as URL. This URL is used by the client to build communication between service and client. An example of Address is The binding specifies the protocol that will use to build communication with the specified end point. It specifies the functionality that the endpoint is going to expose. The contract contains the name of the Interface. Below is the example of EndPoint: A message is a communication unit which is sent and received from the client. It contains the body, headers and many other several parts. If your Service was the human body, channels would be the sensory nerves of your Service. Sensory nerves carry messages from receptors in your body to your brain. Sensory messages pass through multiple nerves on the way to the brain. Channels act as sensory nerves between the service and clients. It is used to carry messages between service and clients. There are two types of channel. 1- Transport Channel: Transport Channel handles the communication over the wire. It transfers messages between service and client using Transport protocol. It supports protocols like TCP, HTTP, MCMQ. 2- Protocol Channel: It is used to implement security to implement security, transaction and reliable messaging. It specifies the hosting such as Self Hosting, IIS hosting, WAS Hosting and Windows Service Hosting. It is the client application which is used to expose the service operations in form of method. The metadata can be used to automatically generate and configure clients for accessing WCF services. We can enable the ServiceMetadata node inside the serviceBehavior node of the service configuration file. Advantages of WCF Service: - The main feature of WCF is interoperability - It provides better security as compared to web service - No need to make a big change for security. - It is language independent. - It is Location independent. - WCF can control Concurrency issue. Hope you understand this important tutorial about WCF in .NET and what is the advantages of it. I will appreciate your feedback, comments, and suggestions. - Introduction to ASP.NET Web API. - Factory Design Pattern in C#. - Introduction to ASP.NET MVC Application Page Life Cycle. - keep vs peek method in ASP.NET MVC.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964364169.99/warc/CC-MAIN-20211209122503-20211209152503-00474.warc.gz
CC-MAIN-2021-49
3,877
41
https://chemistry.stackexchange.com/questions/46461/where-can-i-find-the-standard-enthalpy-of-formation-for-sodium-cyanamide-na2ncn
code
Stack Exchange network consists of 175 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers. I am trying to find the standard enthalpy of formation for sodium cyanamide. Ive looked on various databases that list data about specific compounds but I can't find anything on this particular one. Where should I be looking? Required, but never shown
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496666229.84/warc/CC-MAIN-20191113063049-20191113091049-00496.warc.gz
CC-MAIN-2019-47
448
3
http://www.physicsforums.com/showpost.php?p=622074&postcount=2
code
Interesting questions Jason. People here can help you and you might find additional help down below in the Software and Hardware forums. Try those too. Let me try: Do you mean number of bits per memory address? Those bits are transmitted from RAM to CPU via a data bus consisting of individual electric lines on the circuit board. Switching from 8 to 16 makes designing the boards more complicated. I assume you mean memory address register? Or instruction register as I see it. RAM is accessed in bytes: one address for each byte. How many bits does it take to write 500,000 in base 2? Same dif: What's the largest number you can write with 6 bits? 20 bits? BNF? you got me dude . . .
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657123996.28/warc/CC-MAIN-20140914011203-00157-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
CC-MAIN-2014-41
685
6
https://blog.xathrya.id/2015/12/03/what-is-assembly-programming-language/
code
Assembly is considered as the oldest programming language. Learning assembly will improve our understanding or machine. In this first article of assembly tutorial we will discuss about what is assembly and why we should learn it. What is Assembly Language? Strictly speaking, assembly language is a programming language. It is corresponded to command / statement of computer instruction. The assembly programming is not so machine-independent language as processor has so much variation. In the next article we will cover only assembly language which refer to IBM-PC compatible’s instruction set or known as Intel x86 processor family. Assembly language is a set of instruction specific to particular computer system. To write a assembly language we need an assembler or compiler which translate our source code to machine language. In term of programming language we won’t see human language as much as C\C++ does, but rather mnemonic for basic instruction like: mov, mul, div, add, sub, inc, etc. Assembly language is considered as low level programming as it is the closest programming language to machine code. Because of the lack of abstraction in assembly language, assembly programming is also considered as difficult language (but don’t worry, we will discuss it). Why Assembly Language? There are many programming language out of there, but why we need to learn assembly? One of reason is to learn computer architecture and give deeper understanding about what is done inside. Another reason would be a certain programming language has difficulties to accessing some machine specific instructions. For a better performance, assembly can be used as it is simple and closest to machine. Programming in assembly is not always using only assembly language. Once we can interfacing our code with other programming language. Often this method is used for creating program as assembly manages specific implementation of system while higher programming language manage the rest. To do this we need to know how higher language structure and translated into assembly (every language would) The machine Language A electronic-based computer only knows two type of value: 1 and 0 known as binary value. In machine language we actually instruct some CPU to utilize register or memory with a fix-size command in binary form. A machine language is built from set of number 1 and 0 and interpreted by CPU. A CPU usually has small program embedded on chip, known as microcode, which translate machine instruction to hardware signals. As noted before, a machine language instruction is a fix-length instruction. Usually there are 16 bits for a single instruction. The first 8 bits is used for operation code, or opcode, which tell us what the instruction will do or achieve. The next 8 bits is operand. Let’s see this example: The first 8 bits is opcode for move instruction which assign a value to specific place. The next operand tell us about location of register AL and what value would fill it. A register is a high speed memory inside of CPU chip. It is identified in assembly language by 2 or 3 character, such as: AH, AL, CX, or EBX. Instruction set is set of machine instruction that can be executed by machine. Intel processor family has downward compatibility which means a newer processor can understand instruction for earlier processor. In earlier of computing, every program must be written in machine language (hence in series of 1 and 0). This is more complicated and frustrating too so people invented assembly language to ease their job.assembly, machine, programming
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107898499.49/warc/CC-MAIN-20201028103215-20201028133215-00122.warc.gz
CC-MAIN-2020-45
3,584
16
https://findanyanswer.com/what-is-a-subnet-calculator
code
What is a subnet calculator? Considering this, how do you calculate a subnet? The number of subnets is found by counting the number of bits by which the initial mask was extended, also known as the subnet bits. Our initial address allocation was 192.168. 0.0 with a mask of 255.255. 0.0. Similarly, what is Subnet Mask calculator? Subnet Calculator (IPv4 Only) Subnet Calculator is used to divide an IP network into subnetworks by calculating network address, subnet mask, broadcast address and host IP address range. On TCP/IP networks, subnets are defined as all devices whose IP addresses have the same prefix. For example, all devices with IP addresses that start with 100.100. 100. would be part of the same subnet. Dividing a network into subnets is useful for both security and performance reasons.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816863.40/warc/CC-MAIN-20240414002233-20240414032233-00109.warc.gz
CC-MAIN-2024-18
805
6
http://researchers-production.ap-southeast-2.elasticbeanstalk.com/research-project/35590
code
Erosion processes in soils across scales - laboratory, field and prediction (2018–2023) This project aims to develop a monitoring tool for predicting the evolution of internal erosion in dams based on innovative electromagnetic observation methods. Internal erosion is an insidious process occurring in the obscurity of the soil¿s pore system until its consequences become visible and threaten the stability of the dams. These water retaining structures are vital for the future water and energy supply for our society and their failure can be catastrophic. By establishing an improved fundamental understanding of internal erosion as a sequence of processes on various scales from the onset of erosion until the failure of the structure, this project will place Australia at the forefront of dam safety assessment.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817491.77/warc/CC-MAIN-20240420060257-20240420090257-00533.warc.gz
CC-MAIN-2024-18
818
2
https://www.geo.fu-berlin.de/en/v/proposal_writing/learning_content/3_framing/index.html
code
Framing the proposal After having the idea and considering it relevant for international scientific research, a donor has to be identified to fund the project. Before starting to write the proposal, please read the requirements and submission conditions of the call carefully. Format, structure and content of your proposal differs between different donor organizations. - Length of the proposal - Format (font, line spacing, font size etc.) - Number of references - Eligibility of applicants - other conditions Nevertheless, there are some typical elements all proposals must contain. These elements will be presented in the following sections of the e-learning environment.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818105.48/warc/CC-MAIN-20240422082202-20240422112202-00398.warc.gz
CC-MAIN-2024-18
675
8
https://www.geekzone.co.nz/forums.asp?forumid=45&topicid=12202
code
I am using Windows XP SP2 on Centrino 1.5GHz laptop with 1GB RAM. I am looking for information/opinions on quality system utilities. I have Diskeeeper and Registry Mechanic, I am looking for an overall good utility package. I have tried Tune Up Utilities, it seems to work fine and I have tried Tweek XP and it seems to work fine except it seems very complicated. Tweek XP seems to have more tools. Is there anyone on this forum that has had experience with both TweekXP and Tune Up Utilities? Are there better tools out there? I am an fairly heavy user and want to make sure my PC is stable. Any assistance would be appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103271763.15/warc/CC-MAIN-20220626161834-20220626191834-00609.warc.gz
CC-MAIN-2022-27
629
9
https://boards.greenhouse.io/embed/job_app?for=instacart&token=2275373&b=https://instacart.careers/job/?gh_jid=2275373
code
The mission of the Ads Formats team is to help the trillion dollar grocery industry move its marketing online with ads that engage customers and drive value for brands, throughout the Instacart shopping experience. This means great UIs across mobile and web plus the backend systems required to support those experiences and instantly adapt to the customer / store / stock-level. You will be building the future of how people interact with advertising in the relatively new online grocery space, touching many different technologies. ABOUT THE JOB You will manage a team of full stack engineers (Rails, iOS, Android, web front-end, Go) focusing on ad formats and their integration with the Instacart consumer experience You will partner with many teams across both the Ads and Customers organizations in order to ultimately create great ad solutions You will help prioritize work for your team, making difficult tradeoffs on design based on business constraints, ensuring on-time deliverables and high-quality software You will provide hands-on technical management, guidance, and support including system/design/code review, and ultimately be responsible for the health of the systems your team builds You will participate in interviewing, hiring decisions, on-boarding, and mentoring of new engineers with the goal of quickly making them productive members of your team You will develop a team culture of ownership that reinforces the core values of Instacart! Bachelor’s degree in Computer Science, Computer Engineering, Electrical Engineering or equivalent work experience 5+ years of experience managing a team of software engineers A strong understanding of engineering systems and experience with full-stack development The ability to balance business needs, a sense of urgency, and shipping high quality and pragmatic solutions while improving the overall organization’s impact Knowledge of industry best practices for building large scale and highly reliable consumer applications
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038916163.70/warc/CC-MAIN-20210419173508-20210419203508-00250.warc.gz
CC-MAIN-2021-17
1,993
13
https://www.oreilly.com/library/view/magento-php-developers/9781783554195/ch04s02.html
code
The grid widget Instead of having to write our own grid blocks from scratch, we can reuse the ones that are already provided by the Magento The block that we will be extending is called the grid widget. The grid widget is a special type of block designed to render a collection of Magento objects in a particular table grid. A grid widget is normally rendered inside a grid container. The combination of both elements not only allows us to display our data in grid form, but also adds search, filtering, sorting, and mass action capabilities. Perform the following steps: - Navigate to the block's Adminhtml/folder and create a folder named - Create a class called List.phpinside that folder. - Copy the following code inside Get Magento PHP Developer's Guide - Second Edition now with the O’Reilly learning platform. O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949644.27/warc/CC-MAIN-20230331144941-20230331174941-00702.warc.gz
CC-MAIN-2023-14
954
11
https://www.airslate.com/bot/explore/azure-text-to-speech-api-bot
code
Azure Text to Speech API Bot This integration is still in development and will be added as soon as possible. Contact us for more status updates.Meanwhile, you can automate your Flows using 100+ no-code Bots currently available in airSlate. AirSlate allows consumers to operate faster and more efficiently with a Workspace developed for effective, electronic collaboration Get your automated workflows up and running in minutes with the Azure Text to Speech API Bot. No coding required. Add the no-code Azure Text to Speech API Bot to your sales workflows Install Azure Text to Speech API Bot to automate your workflow How to use the Azure Text to Speech API Bot AirSlate is an exceptional workflow automation solution that combines with a huge amount of systems and solutions, notably CRM, ERP and cloud storage systems via automation Bots. By making use of just the Azure Text to Speech API Bot companies gain instant qualitative changes; fewer mistakes, improved procedure transparency, and overall good quality.Azure text to speech api. Be on the list of ‘automated’ and start off not wasting time and money: - 1. Create an airSlate membership or log in. Azure text to speech api. - 2. Begin a Flow with a new Document Flow or utilize a ready-made layout. Power automate text to speech. - 3. Tap the Bot icon in the upper right-hand corner and pick the Azure Text to Speech API Bot from the list. Power automate text to speech. - 4. Read about it prior to clicking Install Bot. - 5. Set up circumstances to lead to the microprogram. - 6. Click Apply set up when finished. Don’t postpone anymore, get full use of the easy-to-configure Azure Text to Speech API Bot for streamlining your complex business processes, increasing efficiency, improving user experience and reducing costs .Azure text to speech api.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500758.20/warc/CC-MAIN-20230208092053-20230208122053-00003.warc.gz
CC-MAIN-2023-06
1,816
16
https://learn.elgg.org/en/2.2/guides/file-system.html
code
Elgg’s filestore is located in the site’s dataroot that is configured during installation, and can be modified via site settings in Admin interface. The structure of the filestore is tied to file ownership by Elgg entities. Whenever the first file owned by an entity is written to the filestore, a directory corresponding to the entity GUID will be created within a parent bucket directory (buckets are bound to 5000 guids). E.g. files owned by user with guid 7777 will be located in When files are created, filenames can contain subdirectory names (often referred to as $prefix throughout the code). For instance, avatars of the above user, can be found To write a file to the filestore, you would use an instance of ElggFile. Even though ElggFile extends ElggObject and can be stored as an actual Elgg entity, that is not always necessary (e.g. when writing thumbs of an image). $file = new ElggFile(); $file->owner_guid = 7777; $file->setFilename('portfolio/files/sample.txt'); $file->open('write'); $file->write('Contents of the file'); $file->close(); // to uprade this file to an entity $file->subtype = 'file'; $file->save(); You can read file contents using instanceof of // from an Elgg entity $file = get_entity($file_guid); readfile($file->getFilenameOnFilestore()); // arbitrary file on the filestore $file = new ElggFile(); $file->owner_guid = 7777; $file->setFilename('portfolio/files/sample.txt'); // option 1 $file->open('read'); $contents = $file->grabFile(); $file->close(); // option 2 $contents = file_get_contents($file->getFilenameOnFilestore()); You can serve files from filestore using Both functions accept 3 arguments: - ``file`` An instance of ElggFileto be served - ``use_cookie`` If set to true, validity of the URL will be limited to current session - ``expires`` Expiration time of the URL You can use expires arguments as means of access control. For example, users avatars in most cases have a long expiration time and do not need to be restricted by current session - this will allows browsers to cache the images and file service will Not Modified headers on consecutive requests. You can also invalidated all previously generated URLs by updating file’s modified time, e.g. Please note that due to their nature inline and download URLs are not suitable for embedding. Embed URLs must be permanent, whereas inline and download URLs are volatile (bound to user session and file modification time). To embed an entity icon, use
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989637.86/warc/CC-MAIN-20210518125638-20210518155638-00106.warc.gz
CC-MAIN-2021-21
2,466
31
https://www.glasspaper.no/en/courses/az-101-microsoft-azure-integration-and-security/
code
Microsoft is simplifying the Certification Path for Microsoft Certified: Azure Administrator Associate. Effective from May 1, 2019, you will only need to pass one exam to become Azure Administrator: Please check our information page for detailed information about this change: Azure Administrator Associate certification This course is for Azure Administrators. Azure Administrators manage the cloud services that span storage, networking, and compute cloud capabilities, with a deep understanding of each service across the full IT lifecycle. They take end-user requests for new cloud applications and make recommendations on services to use for optimal performance and scale, as well as provision, size, monitor and adjust as appropriate. This role requires communicating and coordinating with vendors. Azure Administrators use the Azure Portal and as they become more proficient they use PowerShell and the Command Line Interface. This 4-day training will cover the following topics: Module 1: Managing Azure Active Directory In this module, you will be introduced to Azure migration projects and specifically Azure Migrate. Azure Migrate will be your tool of choice for automated server discovery and workload sizing. You will step through the process of using Azure Migrate to create a project, create a collector, assess machine readiness, and estimate cost. After completing this module, students will be able to Use Azure Migrate to discover and assess on-premises virtual machine migration to Azure. Module 2: Azure Site Recovery In this module, you will be introduced to Azure Site Recovery (ASR). ASR will be your primary tool for migrating workloads to Azure. You will learn which scenarios are most appropriate for ASR and the features that the product provides. You will also learn how to use the ASR deployment planner to ensure your infrastructure is ready for migration. Lastly, you will walk through the process of implementing ASR on a Hyper-V infrastructure. After completing this module, students will be able to use Azure Site Recovery to migrate Hyper-V infrastructures to Azure. Module 3: Additional Migration Scenarios In this module, you will complete your study of Azure migration by looking at two different migration scenarios. In the first scenario you will see how to migrate VMware vSphere Hypervisor virtual machines to Azure using ASR. In the second video series we will migrate System Center VMM Hyper-V machines. After completing this module, students will be able to review migration strategies for VMWare and System Center VMM virtual machines. Module 1: Introducing the Azure App Service Platform In this module, you will be introduced to the Azure App Services Platform. You will learn about app service plans, web app hosting options, app service scenarios and how to monitor apps. You will also learn about how to isolate apps with App Service Environments. After completing this module, students will be able to implement use cases and configuration options for Azure App Services and App Service Environments. Module 2: Managing and Securing Web Apps In this module, you will learn how to deploy your app with minimal downtime. You will also learn how to backup, restore, snapshot, and clone your app. Lastly, you will implement security features like authentication options and authentication providers. After completing this module, students will be able to manage and secure web apps with backup, restore, snapshot, and cloning. Module 3: Scaling and Performance In this module, you will learn how to ensure your app performs under various workloads. You will learn how to scale up and scale out your app. You will learn how to automatically scale your app and to grow out the app through geo-distribution. Lastly you will learn how CDN provides a way to optimize bandwidth and web traffic. After completing this module, students will be able to optimize your web app performance with Scale Up, Scale Out, Autoscale, and Grow out strategies. Module 4: Deploying Serverless Computing Solutions In the module, you will learn what serverless computing is and what it provides. You will implement three serverless computing solutions: Azure Functions, Event Grid, and Service Bus. Azure Functions provide small pieces of code, or "functions," that run in the cloud. Event Grid is a service for managing routing of all events from any source to any destination. Service Bus multi-tenant cloud messaging service that sends information between applications and services. After completing this module, students will be able to deploy serverless computing features like Azure Functions, Event Grid, and Service Bus. Module 1: Distributing Network Traffic In this module, you will learn about three ways to distribute network traffic: Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway. The Azure Load Balancer delivers high availability and network performance to your applications. The Azure Traffic Manager allows you to control the distribution of user traffic to your service endpoints. The Azure Application Gateway is a web traffic load balancer that enables you to manage traffic to your web applications. After completing this module, students will be able to implement and configure Azure Load Balancer, Azure Traffic Manager, and Azure Application Gateway. Module 2: Site Connectivity In this module, you will learn and implement two ways to connect your virtual networks: Site-to-Site VPN Connections and ExpressRoute. Site-to-Site VPN connections provide secure tunneling for cross-premises and hybrid configurations. ExpressRoute extends your on-premises networks into the Microsoft cloud over a dedicated private connection facilitated by a connectivity provider. After completing this module, students will be able to implement and configure Site-to-Site VPN connections and ExpressRoute. Module 3: Monitoring and Troubleshooting Network Connectivity In this module, you will learn important skills around troubleshooting virtual network connectivity. The primary tool discussed is Azure Network Watcher. Azure Network Watcher provides IP flow verification, VPN diagnostics, NSG views and flows, and next hop analysis. After completing this module, students will be able to implement and configure Network Watcher and troubleshooting common network issues. Module 1: Introduction to Identity Protection in Azure In this module, you’ll learn about Role-Based Access Control as the foundation to organizing and managing an organization’s administrative access based on the principle of least privilege. You will also review Azure Active Directory concepts, as well as gaining insight into the threat landscape and security risks that are exposed to IT organizations through breach of privileged access. After completing this module, students will be able to use Azure RBAC to grant a granular level of access based on an administrator’s assigned tasks. Module 2: Using Multi-Factor Authentication for Secure Access In this module, you’ll learn about securing the sign-in process through Multi-Factor Authentication (MFA). You’ll learn how MFA works and the differences in implementation between on-premises and cloud scenarios. You’ll also learn about using conditional access policies to provide more fine-grained control over apps and resources in your environment. After completing this module, students will be able to use Azure Multi-Factor Authentication to configure a strong authentication for users at sign-in. Module 3: Azure AD Privileged Identity Management In this module, you’ll learn how to use Azure Privileged Identity Management (PIM) to enable just-in-time administration and control the number of users who can perform privileged operations. You’ll also learn about the different directory roles available as well as newer functionality that includes PIM being expanded to role assignments at the resource level. After completing this module, students will be able to user Azure AD Privileged Identity Management to configure access rights based on just-in-time administration.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439736902.24/warc/CC-MAIN-20200806091418-20200806121418-00418.warc.gz
CC-MAIN-2020-34
8,087
31
https://bobbyofbrunei.com/2014/08/03/the-majority-of-todays-app-businesses-are-not-sustainable/
code
The Majority Of Today’s App Businesses Are Not Sustainable Its either go for quantity, or go for quality. For small or sole developers those numbers actually look promising. Getting $500 per month from a single app is more than enough. Now i either have to create more apps, or i make higher quality apps in terms of gameplay, usability, utility, marketing, and monetizing.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499857.57/warc/CC-MAIN-20230131091122-20230131121122-00622.warc.gz
CC-MAIN-2023-06
375
2
https://www.juniorsoaring.org/going-soaring/flying-with-friends
code
Flying With Friends This is a pretty cool thing to get to do. After you are solo and have earned your C certificate (20 flights in command), you can work towards earning your level one passenger rating. This is informally known as a family and friends rating. It lets you invite a friend along to sit in the front seat of the glider for a half hour or so while you fly them around and show them the local sights. It is also possible to do mutual flights with another pilot if both hold a B certificate (15 flights in command). So once you’ve got your Bs, go find another junior at your club who already has theirs, and go for what’s guaranteed to be a memorable flight.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816939.51/warc/CC-MAIN-20240415014252-20240415044252-00595.warc.gz
CC-MAIN-2024-18
673
3
http://www.accountingweb.co.uk/group/iris-accountancy-practice-software-discussion-group/iris-perfomance-speed?page=3
code
IRIS perfomance speed I have always had problems with the speed of IRIS. For example, loading the main menu (74 secs), loading Accounts Production menu from Main Menu (29 secs), loading Post from the Posting Menu (40 secs), etc. Does anyone else have this problem? The server has 12 Gigs RAM and 3GHz Quad Core processor, using MS Windows Server 2008 (64 bit) running SQL Express 2005 running via a 100MHz network. We has a 3 user IRIS start-up pack. Does anyone have any suggestions as to why this might be so slow.
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928586.49/warc/CC-MAIN-20150521113208-00111-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
516
2
https://github.com/brendangregg/FlameGraph/commits/master/flamegraph.pl?author=brendangregg
code
You can clone with HTTPS or Subversion. stop bottom frame from being green with --color=js generate an error message SVG on no input; tidy comments mouse-over pointer icon should suggest what is clickable support for mixed mode java flame graphs undef $samples2 error with --reverse make reduced diff color blue (for cooler) comment flame graph differentials flame graph differentials inverted icicle graphs remove unnecessary precision, reducing file size by ~2% only do extra RE if needed Merge pull request #29 from calio/master Add support for stack-reversed FlameGraph getSubStringLength() errors with whitespace strings make opacity work in Firefox, not just Chrome show zoom button when needed, and at top use dim to indicate a frame was truncated Merge pull request #19 from timbunce/factor3 Fix percentages when using --factor Merge pull request #18 from timbunce/factor2 Add --factor option to scale the presented values. Merge pull request #16 from timbunce/flowdelim2 Avoid problems with "--" in func names by using ";" as internal delimeter Merge pull request #15 from timbunce/linking2 Fix bug in --nameattr handling Merge pull request #14 from timbunce/timemax Add --total option to enable visualization of time spent not within a sub Merge pull request #13 from timbunce/float fix to allow decimals again Merge pull request #12 from timbunce/float Allow floating point values Merge pull request #11 from timbunce/linking Use <g> to simplify SVG and fix styling. Make functions clickable etc. Merge pull request #10 from timbunce/optimize Optimize flow analysis (~25% faster). Report count of skipped lines, if any. Merge pull request #9 from timbunce/options Add options for tunables. Add more tunables. Commify sample count.
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463606.79/warc/CC-MAIN-20150226074103-00134-ip-10-28-5-156.ec2.internal.warc.gz
CC-MAIN-2015-11
1,741
39
https://www.bleepingcomputer.com/forums/t/85674/laser-printers-vs-inkjet/
code
Jump to content Posted 22 March 2007 - 11:37 AM Posted 22 March 2007 - 11:45 AM Edited by Walkman, 22 March 2007 - 11:47 AM. Posted 22 March 2007 - 05:31 PM Posted 22 March 2007 - 09:40 PM Posted 23 March 2007 - 01:38 AM Posted 23 March 2007 - 04:40 AM Posted 23 March 2007 - 10:21 AM Posted 25 March 2007 - 03:46 AM Posted 26 March 2007 - 12:15 AM An ounce of prevention is worth a pound of cureSpywareBlaster, WinPatrol Plus, ESET Smart Security, Malwarebytes' Anti-Malware, NoScript Firefox ext., Norton noscript Posted 26 March 2007 - 06:35 AM Sounds like mine. For me, it seems, it would be cheaper to just buy a new all-in-one than to buy new ink. I've seem some lasers for way less than $500, but I can't really comment on the quality. You just have to look around. We have a printer. A nice all in one. Well its out of ink as it has been for over a year. Stupid junk is expensive and runs out to fast. Posted 26 March 2007 - 10:22 AM If I were into a lot of serious color printing, I'd get something entirely different - neither laser nor ink jet. But you'd be running into serious money here. I'm afraid I don't know what these are called. Posted 26 March 2007 - 11:29 AM Edited by TMacK, 26 March 2007 - 01:27 PM. Posted 26 March 2007 - 01:07 PM 0 members, 0 guests, 0 anonymous users
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512014.61/warc/CC-MAIN-20181018194005-20181018215505-00235.warc.gz
CC-MAIN-2018-43
1,294
23
https://www.freelists.org/post/argyllcms/wtptchad-in-input-V2-sRGB-profiles-from-colororg,6
code
Alexey Blinov wrote: > Graeme, I'd like to summarize "for dummie" out here. > > Since sRGB assumes the display at D65, and V2 profiles from color.org use > D50, they are not > supposed to be used as input sRGB profiles. That is, the kind of profiles > that specify meaning > ("units") of an RGB number triple in an image file. Hmm. I guess I wouldn't put it that way. If all you are using is relative colorimetric intents, then there is no difference between profiles that have D50 as their wtpt and those that have their actual white point as the wtpt. If you use absolute colorimetric, then there is a difference: CMM intent D50 wtpt + chad Real wtpt, no chad Relative Relative Relative Absolute Relative Absolute Special Abs. Absolute N/A The "Special Abs." intent represents a special CMM absolute mode that applies the reverse of the chad tag to recover the true display white point. I don't know of a CMM that implements this. > Instead, they are provided partly for a specific soft-proofing scenario with > a dumb CMM. That was just one explanation I was given, that doesn't make it the actual reason that the ICC have gone this direction (remember that the ICC is a collection of people representing companies, and its composition has changed over time). One other technical reason that they may have gone in that direction is that the ICC spec. uses a "wrong Von Kries" chromatic transform for adapting between the white point and D50. For most print profiles this error is not significant, but for a display profile it is significant. The Microsoft/HP sRGB and AdobeRGB used a Bradford chromatic transform for this, which is not strictly ICC, but is the correct technical approach. The ICC, rather than addressing this properly by allowing something other than "wrong Von Kries" to be used for this, instead added the chad tag. So to be strictly ICC compliant and still use a Bradford transform, you get forced into using a D50 wtpt tag and disabling absolute colorimetric. [I think that sRGB and AdobeRGB preceded the introduction of the chad tag.] Note that what the ICC should have done (and could still do!) is introduce a tag that looks a lot like the chad tag that allowed the profile to specify what chromatic adaptation transform should be used for its absolute <-> relative white point transform, avoiding the "wrong Von Kries". The chad tag would then just be used for the rare case of a print profile measured under a non D50 illuminant. > For input sRGB profile, one must use a profile from some reliable source (like > argyll/ref/sRGB.icm). I don't see any down side to using an original Microsoft/HP sRGB profile or the Argyll equivalent, since it enables CMM's to use absolute colorimetric, which is potentially useful for soft proofing, whereas an ICC sRGB profile removes that possibility with most of the CMM's out there. > But incorporating input sRGB profile in an image file is pointless because > all the consumer software already assumes such correct sRGB profile. I don't know that that is true. The availability of such D50 wtpt profiles from the ICC and the demise of the Microsoft/HP sRGB website makes that less likely to be true as time goes on. Graeme Gill.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413406.70/warc/CC-MAIN-20200531120339-20200531150339-00045.warc.gz
CC-MAIN-2020-24
3,197
1
http://www.reviewlinux.com/tag/life
code
Lars Vogdt has announced the release of openSUSE 12.3 “Edu Li-f-e” edition, a specialist openSUSE variant designed for deployment in educational institutions: “The openSUSE Education Team is proud to present Li-f-e (Linux for Education) 12.3-1. This first release is based on openSUSE 12.3 with all the official updates…. - Kernel laptop mode and dirty buffer timeouts; - Processor frequency scaling including “turbo boost” / “turbo core”; - Power aware process scheduler for multi-core/hyper-threading; - Hard disk advanced power management level and spin down timeout (per disk); - SATA aggressive link power management (ALPM); - PCI Express active state power management (PCIe ASPM) – Linux 2.6.35 and above; - Runtime power management for PCI(e) bus devices – Linux 2.6.35 and above; - Radeon KMS power management – Linux 2.6.35 and above, not fglrx; - Wifi power saving mode – depending on kernel/driver; - Power off optical drive in drive bay (on battery). Additional TLP functions: - I/O scheduler (per disk); - USB autosuspend with blacklist; - Audio power saving mode – hda_intel, ac97; - Enable or disable integrated wifi, bluetooth or wwan devices upon system startup and shutdown; - Restore radio device state on system startup (from previous shutdown); - Radio device wizard: switch radios upon network connect/disconnect and dock/undock; - Disable Wake On LAN; - WWAN state is restored after suspend/hibernate; - Undervolting of Intel processors – requires kernel with PHC-Patch; - Battery charge thresholds – ThinkPads only; - Recalibrate battery – ThinkPads only. Install TLP in Ubuntu Before proceeding with the installation, there are a couple of things you need to do: - firstly, if you’ve added any power saving settings / scripts (e.g.: in /etc/rc.local), remove them or else TLP may not work properly; - remove laptop-mode-tools (“sudo apt-get remove laptop-mode-tools”). sudo add-apt-repository ppa:linrunner/tlp sudo apt-get update sudo apt-get install tlp tlp-rdw sudo tlp start - smartmontools – needed to display disk drive S.M.A.R.T. data; - ethtool – needed to disable wake on lan. sudo apt-get install smartmontools ethtool - tp-smapi-dkms – needed for battery charge thresholds and ThinkPad specific status output of tlp-stat; - acpi-call-tools – acpi-call is needed for battery charge thresholds on Sandy Bridge and newer models (X220/T420, X230/T430, etc.). Install these packages using the following command: sudo apt-get install tp-smapi-dkms acpi-call-tools Make sure to also read the TLP FAQ. You'll never be lonely when all your friends are just a tap away, but Facebook thinks you'll have more fun when they are right up front A long plane ride is a pretty boring thing. Sure, you could get out your laptop and work, or keep handing over your plastic for those tiny bottles of entertainment, but Facebook has another idea — with Facebook Home and the HTC First you can bring along all your friends. And cats. While we imagine the average Facebook user's feed will be slightly different (and a lot less safe for work), this is a good ad that gets the idea across. I have a feeling we're going to see a lot more like it. Lars Vogdt has announced the release of openSUSE 12.2 “Edu Li-f-e” edition, an openSUSE variant specifically tailored to schools: “The openSUSE Education team once again presents Li-f-e (Linux for Education), built on hot-new openSUSE 12.2, including all the post-release updates. As always, this edition of Li-f-e comes bundled.. The latest version of OpenSuSE Li-f-e is based on OpenSuSE 12.1, which is not the latest as of early September. I hope the newer OpenSuSE 12.2 Li-f-e will be released soon, but in the meantime let’s talk about OpenSuSE 12.1 Li-f-e. You may consider this distribution, if you’re looking for something suitable in the way of a Linux Desktop or Laptop version for pupils, students or teachers in your environment. LXer Linux News - 900 MHz, 64 bits, Loongson 2F CPU by STMicroelectronics - 512MB DDR2 RAM - 16 GB G-Key removable storage. Up to 4 Hours of Battery Life. - 10-inch LCD screen with 1024 x 600 resolution. Slim, soft-touch keyboard, multi-finger touchpad and lightweight at 2.6 lbs - Linux Operating System with over 50 Open Source applications including Open Office, Evince, Firefox, Thunderbird, MSN and more The EMTEC Gdium Liberty is the ultimate netbook. Combining innovative architecture entrenched in the Open Source world, an elegant and stylish design, and added security and mobility with the G-Key, the Gdium is an ultraportable computer that acts as a cornerstone of a wider environment dedicated to knowledge, communication and learning. Gdium features a Linux Operating System, over 50 Open Source applications, a removable G-Key storage device, multimedia functions including an integrated webcam List Price: $ 255.99
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702298845/warc/CC-MAIN-20130516110458-00053-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
4,888
52
http://windows.bigresource.com/Win8-computer-stop-playing-any-sounds--JhqEergr.html
code
So my computer likes to crash normally or stop playing any sounds, so I wanted to back it up and then factory reset it and see if it fixes both problems. I downloaded macrium and saw a lot of partitions and I'm wondering if it seems weird and which ones, if not all, I should choose to back up. About a week ago, I was wondering how I went about enabling the Startup sound to play. I discovered that in order to have any Startup sound playing, the option needed to be checked in Control Panel > Sounds. Coincidentally, I found that the Windows Logon/Logoff options were missing, so I went into the registry and changed the necessary 1's to 0's, and now they appear as they should. However, when I select a sound for them, it doesn't play when I log on. It is important to note that I'm under the impression that the Logon sound and Startup sound are two different things. The Startup sound I found that I could not change without messing up Metro, so I left it as the default Windows Vista/7 sound that plays. But if I am correct, there should also be a sound played when you log in or log off. So, in short, how do I get the login/logoff sounds to play? I listen to my music on Winamp, yet when I'm using any other program that plays some sound effect (for example, playing some online game on Google Chrome), every time the game makes a bit of a loud sound effect, for a second or so, the music lowers itself for that second, then goes back to its normal volume. I'm assuming this is some default option that is auto-enabled in Windows 8, since Windows XP never used to do this. What option do I need to disable so all programs playing sound will not interfere and lower other programs' volume down? It other words, what option do I need to disable so all the sounds play at an exact same level at all times? Ever since I installed Windows 8 (and now Windows 8.1 Pro Preview Build 9431), I hear occasional buzzing sounds while playing .mp3 files on my desktop computer (Dell XPS 8500). This occurs using both iTunes and Winamp. The .mp3 files play fine on other devices, such as my iPod. This makes me suspect that this is a Windows problem. I am running a Toshiba computer with Windows 8 and Google Chrome as my default browser. Basically, any videos from any website will load but not play, and any sounds (not necessarily just from Google Chrome) won't play either. For example, when I change the volume of my computer it does not play a tone (when it normally should). I have updated Java and Adobe Shockwave to no avail. The problem started occurring a couple of days ago. Originally I could restart my computer and I would be fine for a while, but eventually that stopped working. I have had this computer for at least 6 months and have not had any problems with it. Also I ran a quick scan with Windows Defender and it didn't find anything out of the ordinary. I have a problem with keyboard and mouse. Every day when i playing some games my keyboard randomly stop working (backlight on keyboard still light but LED on num lock is off and buttons don't work) after few seconds my mouse also stop working. Plugin to another USB doesn't work. Only when i disconnect keyboard and connect mouse to other USB mouse work. After restarting system all works fine. Im sure keyboard and mouse is good (testing it on laptop when this happens and its work normal). I have updated drivers and BIOS. PC spec.: Windows 8.1 AMD Phenom II x4 940 Gigabyte ga MA790x UD4P GTX 660 2xHDD+1SSD I purchased a new computer in the last few days, pre-installed Windows 8. I was having the odd error message where Chrome would stop working and reload. Or sometimes an error message saying my computer would restart. They are different messages: Memory Management IRQL_NOT_LESS_OR_EQUAL Special Pool Detected Memory Corrupt I downloaded all updates for Windows 8, then updated to 8.1 and downloaded all but one update available (Bing Desktop). I am still getting these BSOD. Sometimes in Chrome, sometimes in Steam, and sometimes randomly I've run the Memory diagnostic tool in Windows, and it found no errors. I've attached the SF Diagnostics folder which was created. I recently installed Windows 8 64 bit from Windows 7 32 bit. I never had any problems really with the windows 7 32 bit but since upgrading to Windows 8 64 bit I am having this odd problem. I am a gamer, I have Steam with lots of games and so I play one then play another and another then I go to start a game (It isn't the same game) and the computer resets and does its thing. I have made sure all my drivers are up to date as I have heard that that can be the problem. I've recently bought a computer which has has Windows 8.1 installed on it from the very beginning--had it for about 3-4 weeks by now. Everything off-games works great. 'Net runs smooth, boots up very well, etc. This is also a computer meant to play/run all sorts of games--it was benchmarked a bit higher than the average gaming computer. This is the exact PC that I have, without any custom changes. And it is also the place I got it from with a warranty--you can also find the computer's more detailed specs in the link: CybertronPC Beast II TGM1214A Gaming PC - AMD FX-9590 4.70GHz, 32GB DDR3, 2TB HDD, DVDRW, 3GB GeForce GTX780, Liquid Cooled, Front Fan Control Panel, WiFi, Windows 8.1 at TigerDirect.com My Problem: I noticed my problem happening when I have tried to play various games--Neverwinter Nights 2 (even though it is old, I think it still applies), Elderscrolls Online, The Secret World, WoW, Saints Row 4 (their newest one), The Forest (an alpha game on Steam) and some various others in between--some have less problems than others, however for the most recent one, I was playing Saints Row 4, and it completely froze the computer; I could not even use CTRL + ALT + Delete to get out of the game, so I was forced to press the Restart Button to restart the system. *It is also worthy of note, that some games have less crashes than others. For example, NWN2 does not crash as often since I optimized it's settings and put it in compatibility mode. But sometimes it will flash black, then go back to the game screen, black again, etc.--it does this about 3-4 times before erroring and saying it needs to close, but that I can live with. I just wish to fix the complete lock-up freezes that make me restart my computer. Most times I get these freezes, on the various ones I play, I get this warning in the Event Viewer, timed JUST before the freeze: "A pointer device did not report a required angular physical range." - Event 259, Win32k (Win32k) (Warning) I was thinking that the recent graphics card drivers may have something to do with something, however I'm uncertain. My mouse or keyboard could be the problem, however I have used the keyboard and mouse that the computer had originally came with, so I am unsure why that would be an issue--however I did try switching out the plugs into other USBs, switching keyboards, switching mice, etc. I also have a flatscreen TV-monitor which is a Samsung, however I switched out an old monitor that died on me, but it had been doing the same thing before the switch as well. I'm very unsure what to do at this point--I can play my games, but there are various interruptions (randomly) throughout play that make me regret getting this computer (I had a Windows 7 that ran 99% of my games, without any sort of problems; and the Windows 7 wasn't even geared to the teeth like this one is.) I have also attempted to run these games in Windows XP/etc compatability modes, to no avail. Win 8x64. I play music a lot with foobar2000 - mp3 files, CDs - most often but not always using its ASIO/JPlay device and driver; i.e., I also use JPlay (service + process + settings - JPLAY - hi-end audio player for Windows). Lately, I've had some computer freezing problems and that's why I write. For example, before leaving for the weekend, I played music for 13 hours, no problem. Returning home yesterday, starting the computer and then the music in exactly the same fashion, within minutes I started getting a string of computer freezes, all occurring when music was playing. On a previous occasion, I had run a few malware scans that turned up nothing, so I tried to isolate the problem by removing pieces step by step, starting with getting JPlay out of the way, so it was foobar alone, but none worked (my working hunch has been that the problem is foobar itself or the ASIO/JPlay combo getting corrupted somehow). Finally, I uninstalled and reinstalled foobar again and it played ok, although I didn't let it go for long enough to be sure. Then I added JPlay and things seemed ok for awhile, then came back after 90 minutes to find a freeze. Looking at Admin Events, I notice the following happening a lot, at startup and maybe also related to when the crashes occur: - The Open Procedure for service "WmiApRpl" in DLL "C:Windowssystem32wbemwmiaprpl.dll" failed. (1008) - Windows cannot load the extensible counter DLL rdyboost (1023) - The Open Procedure for service "MSDTC" in DLL "C:Windowssystem32msdtcuiu.DLL" failed. (1008) - The Open Procedure for service "Lsa" in DLL "C:WindowsSystem32Secur32.dll" failed. (1008) - The Open Procedure for service "ESENT" in DLL "C:Windowssystem32esentprf.dll" failed. (1008) - The Open Procedure for service "BITS" in DLL "C:WindowsSystem32itsperf.dll" failed. (1008) I ran sfc /scannow as admin and it apparently fixed some things and said it couldn't fix others. See the screenshot below, as well as the CBS log file. I'd like to figure out if Windows has become corrupted or is producing the problem. There's also extreme hostility over at foobar re use of other players, specifically JPlay.) Gigabyte Z68X-UD3H-B3, i7 2660K cpu, 16gb RAM ----------- 2013-07-22 11:28:59, Info CBS TI: --- Initializing Trusted Installer --- 2013-07-22 11:28:59, Info CBS TI: Last boot time: 2013-07-22 11:08:26.494 2013-07-22 11:28:59, Info CBS Starting TrustedInstaller initialization. 2013-07-22 11:28:59, Info CBS Ending TrustedInstaller initialization. 2013-07-22 11:28:59, Info CBS Starting the TrustedInstaller main loop. 2013-07-22 11:28:59, Info CBS TrustedInstaller service starts successfully. 2013-07-22 11:28:59, Info CBS No startup processing required, TrustedInstaller service was not set as autostart 2013-07-22 11:28:59, Info CBS Startup processing thread terminated normally 2013-07-22 11:28:59, Info CBS Starting TiWorker initialization. I just started using Windows 8 and I am getting a steady litany of system sounds that are indicating something, but without any popup, what they are trying to say. I get a simple beep or multiple beeps every 4 to 5 minutes or so throughout the day. It is kind of similar to removing or inserting a USB device in 7, but not exactly. So I detached all USB devices and I am still getting the sounds. No Audio or Sounds from Speakers or Headphone Jack after upgrade to Windows 8 Compaq Presario CQ60-615DX Processor: Intel Celeron 900 @ 2.20Ghz 2.12GHz x64 bit OS: Windows 8.1 Pro Audio Driver/Sound Processor: Conexant Pebble High Definition SmartAudio 188.8.131.52 Windows 7 64-bit Realtek High Definition Audio Driver 184.108.40.20614 / 220.127.116.1114 Windows 8 64-bit The Laptop originally ran on Windows 7 and I updated the OS to windows 8 and upon doing this the audio stopped completely from all audio sources (i.e. windows sounds,speakers,line- in/heaphone jack). I tried Disable/Reenable driver,Rollback driver,uninstall/reinstall and discovered that the driver is not supported for windows 8. Upon learning this I have tried other Audio Drivers (i.e. Realtek HD Drivers etc) and no avail. I've recently updated to Windows 8.1 and it auto reinstalled the original audio driver and still, no sound. I have also checked all Audio Codecs and still no luck even going that route. When I play an mp3 on let's say wmplayer the volume bar will move up and down with the levels of the song that's playing as per usual but I get no sound. Volume level can be at 100% and there won't be any noise at all, no distortion, white noise, just silence. This happens no matter how sound is being produced music, videos, games, internet, windows sounds etc... And trying to get audio from headphone jack doesn't work either. Any solutions to the out of date driver issue I am having? Seems that the driver not being compatible with win 8.1 is where the errors began. Is there a fix for this or am I best off getting a usb audio driver and running my sound that route? I just built a new gaming PC with windows 8 and an msi z87 g45 motherboard. It's amazing, and I installed the Soundblaster and realteck Hd drivers. The only problem that I'm having is that every time 2 things play at once, the other's volume is lowered. like when I am playing battlefield 4, my gun sound good and then when my friend talks on teamspeak my gun is barely heard for a few seconds afterward. Ive tried changing the "communications- do nothing" thing, but it's not working. I would like to know how to enable sounds that are unused or disabled in Windows 8, for example, the shutdown sound. I've seen on another website that there's a registry tweak for the sounds to appear in the Sound control panel, but my problem is that the sounds aren't playing. My system sounds work fine: if I navigate to the folder c:windowsmedia and double-click on a particular sound it plays correctly. However, if I go to Control PanelSound and select the "Sounds" tab none of the system sounds responds when I click on the green "Test" button. how to get the logon, logoff, unlock, lock, shutdown sounds to play in windows 8.1. I have the "play startup sound" box checked off and i also went into the registry and changed the 1s to 0s and brought them to the sounds. It was originally windows 7, then I upgrade to 8, then the 8.1 preview evaluation copy. I think I started having sound issues when I went to 8.1. I will play for a couple minutes then cut out. If I pause for a few seconds then play the sound works for a few more minutes. The sound works fine when I'm using HDMI to the television or on headset. Could there be a hardware/motherboard issue since it's the speakers that are cutting out? Could it be an 8.1 issue? App that works well with Windows 8.1, to make clickety sounds when you type on a regular keyboard? You know, so it will sound like a typewriter or something like that. Something that gives you a little audio feedback when you type, but doesn't have gimmicky, "funny" sounds. I tried ClicKey, which is a good program because you can adjust the sound level, but it didn't work well for me. It stopped clicking after while.I also tried KSG, but it didn't work at all. I tried quertick, and it works fine, but you can't adjust the sound level. I have a toshiba satellite p75-a7200 with windows 8. When I hook up my logitech z 2300 speakers it sounds like crap. Logitech z 2300 speakers are very good speakers so this should not be happening. When I hook up my logitech z 2300 speakers to my iphone or my old dell laptop it sounds good like it should. So this makes me think that their is a Windows 8 setting that is messing up my speakers. What settings in Windows 8 do I need to change my make my speakers sound good? When i try to record from my sound card the volume will randomly go up and down when i try to replay it. When I try to record from my microphone in the microphone input port it gives an odd problem. Whenever I sustain a note it begins to record just fine but after about 2 seconds the volume adjusts down to about 20% of the original and continues to record. It does this in multiple sounds recording software programs. I have skype turned off and no other microphones hooked up. In the communications tab of the sounds menu I have set it to 'do nothing' but this had no effect. It seems like there is some sort of auto volume leveling thing going on but I cannot find where it would be. I have an HP desktop with beats audio not sure about the sound card otherwise. I recently got a new desktop and that is the only problem that I have. I like to go on Skype and then play music/game sounds through the speakers, but on my audio devices list, it only shows up Speakers/Headphones. I know that the Realtek HD Audio Manager would let me split them up, but when I download that, all I get is some worthless Dell Audio thing (picture at the bottom) that barely has any options. So, is there anything I can do about this? I don't know how specific to be, so if you need more information, just say so. After I upgraded to 8.1, I am not getting any sounds when hitting the individual keys on the onscreen keyboard. I have looked all through GodMode regarding 'Sounds' but can't find anything to enlighten me. It is turned on in "PC settings". Not everyone likes Windows AppEvent sounds, and in the past it has been possible to toggle sounds on or off or remove a sound from any event using the sounds control panel applet. Windows 8 rp does not give much of a choice. Windows 8 continues its deconstruction of what we knew and expected of windows in the sounds department - for instance disabling the showing of sound options for windows logon and logoff with the registry key: HKEY_CURRENT_USERAppEventsEventLabelsWindowsLogonExcludeFromCPL = 1 etc. (i.e. you will not be logging off from your desktop anymore, so we won't remind you that it used to be available.) Sound schemes seem harder to get to work than in Windows 7... I've a weird issue with Windows 8.1 and my mechanical hard drive. I've a 2TB Western Digital hard drive that's partitioned with one of the partitions being a Media partition (H) containing over 107 gig of images, mostly tiff files ranging from 80-700 meg. I'm a photographer who tends to edit it layers. Anyway for some odd reason when I access a folder containing these files, my hard drive goes into a frenzy and starts making loud vibration noise as though the drive is thrashing rapidly. Additionally I get a green bar going across the address bar as though it's establishing access permission. I've checked the drive and initially it just had "Everyone" listed so I added Administrators, and myself. But it still acts as though it's seeking permissions... Interestingly enough no other folder or partition goes into this frenzy; just the folders under H partition containing the tiff images. My initial thought is it's a caching issues as the PC is trying to cache and display the thumbnails for these files but I'm not sure. And if it is, how do I fix? BTW this is a replacement drive as I thought my other drive was defective since it was doing the same and had it RMA'd. Also this is basically the same partition/orginization structure that was under my Win 7 machine and I never had this issue.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866326.60/warc/CC-MAIN-20180524131721-20180524151721-00331.warc.gz
CC-MAIN-2018-22
18,782
70
https://cadp.inria.fr/publications/Lantreibecq-Serwe-14.html
code
Formal Analysis of a Hardware Dynamic Task Dispatcher with CADP Etienne Lantreibecq and Wendelin Serwe Science of Computer Programming, Feb. 2014 Abstract: The complexity of multiprocessor architectures for mobile multi-media applications renders their validation challenging. In addition, to provide the necessary flexibility, a part of the functionality is realized by software. Thus, a formal model has to take into account both hardware and software. In this paper we report on the use of the CADP toolbox for the formal modeling and analysis of the DTD (Dynamic Task Dispatcher), a complex hardware block of an industrial hardware architecture developed by STMicroelectronics. The formal LNT model developed by an industry engineer was appropriate to discuss implementation details with the architect and enabled model-checking temporal properties expressed in MCL, which discovered a possible problem. We investigated the existence of the problem in the architect's C++ model using co-simulation of the C++ and the formal LNT models.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654606.93/warc/CC-MAIN-20230608071820-20230608101820-00756.warc.gz
CC-MAIN-2023-23
1,039
4
https://support.mozilla.org/en-US/questions/firefox?sort=asc&tagged=mac-os&show=all&owner=all&order=views&page=2
code
I need to down load the newest version for a mac X and then make it work. I keep getting the message on my original Firefox that it is no longer protected against attacks. I've tried to download 4 but it tells me my computer is not compatable for it. It is an older computer purchased in 2003. What would be the newest version of Firefox that a mac mosX could run?
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141176922.14/warc/CC-MAIN-20201124170142-20201124200142-00629.warc.gz
CC-MAIN-2020-50
364
2
http://freecode.com/tags/utilities?page=1&sort=vitality&with=&without=112
code
KDE-Services extends the features of the Dolphin File Manager right-click menu in the KDE graphical environment. It allows you to play and convert between several video formats, extract audio from movies and convert them to MP3 or FLAC, convert audio to MP3 or FLAC, securely send a file or directory to Mailx as an email, send files to Thunderbird as attachments, burn and checksum ISO images, execute scripts and applications, get low-level information on video files, build ISO images from folders, replace text, search, SSH, use Midnight Commander, use system, network, and backup/restore tools, use Samba, extract subtitles from MKV video, multiplex subtitles into MPEG-2 videos, and work with YouTube, DVDs, multimedia, GPG. You can add a timestamp prefix to a filename or directory name. A paranoid shredder, an HTTP publisher, graphic tools, RPM package tools, Xorg configuration, and Dropbox tools are included. MultiTail lets you view one or multiple files like the original tail program. The difference is that it creates multiple windows on your console (with ncurses). Merging of 2 or more log files is possible. It can also use colors while displaying the log files (through regular expressions) for faster recognition of what is important. It can also filter lines (again with regular expressions). It has interactive menus for editing given regular expressions and deleting and adding windows. One can also have windows with the output of shell scripts and other software. When viewing the output of external software, MultiTail can mimic the functionality of tools like 'watch'. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs). Jailer is a database subsetting and browsing tool. It is a tool for data exporting, schema browsing, and rendering. It exports consistent, referentially intact row-sets from relational databases. It removes obsolete data without violating integrity. It is DBMS agnostic (by using JDBC), platform independent, and generates DbUnit datasets, hierarchically structured XML, and topologically sorted SQL-DML. MailSteward will archive all of your email in a database for easy retrieval, without touching or modifying the email in your email client program. Just click on the Store Email in Database button and MailSteward will go to work storing copies of all your email, both text and HTML versions, and attachments, into a relational database file. You can then retrieve email and attachments from the database by searching on Date, From, To, Subject, Mailbox, or Body text. Star is a very fast, POSIX-compliant tar archiver, maintained for more than 30 years. It saves many files together into a single tape or disk archive, and can restore individual files from the archive. It includes command line interfaces for the "tar", "Sun-Tar", "cpio", "pax", and "gnutar" command-line syntax. It includes a FIFO for speed, a pattern matcher, multi-volume support, the ability to archive sparse files and ACLs, the ability to archive extended file flags, automatic archive format detection, automatic byte order recognition, automatic archive compression/decompression, remote archives, and special features that allow star to be used for full and incremental backups. It includes the only known platform independent "rmt" server program. The "Schily" Tool Box is a set of tools written or managed by Jörg Schilling. It includes programs like: cdrecord, cdda2wav, readcd, mkisofs, smake, bsh, btcflash, calc, calltree, change, compare, count, cpp (K&R original), devdump, hdump, isodebug, isodump, isoinfo, isovfy, label, mt, p, patch, sccs, scgcheck, scpio, sdd, sfind, sformat, smake, sh (Bourne Shell), star, star_sym, suntar, gnutar, tartest, termcap, and ved. For users on Linux and Unix, KDE offers a full suite of user workspace applications which allow interaction with these operating systems in a modern, graphical user interface. This includes Plasma Desktop, KDE's innovative and powerful desktop interface. Other workspace applications are included to aid with system configuration, running programs, or interacting with hardware devices. While the fully integrated KDE Workspaces are only available on Linux and Unix, some of these features are available on other platforms. In addition to the workspace, KDE produces a number of key applications such as the Konqueror Web browser, Dolphin file manager, and Kontact, the comprehensive personal information management suite. The list of applications includes many others, including those for education, multimedia, office productivity, networking, games, and much more. Most applications are available on all platforms supported by the KDE Development. KDE also brings to the forefront many innovations for application developers. An entire infrastructure has been designed and implemented to help programmers create robust and comprehensive applications in the most efficient manner, eliminating the complexity and tediousness of creating highly functional applications. Since v2.04, bash has allowed you to intelligently program and extend its standard completion behavior to achieve complex command lines with just a few keystrokes. Imagine typing ssh [Tab] and being able to complete on hosts from your ~/.ssh/known_hosts files. Or typing man 3 str [Tab] and getting a list of all string handling functions in the UNIX manual. mount system: [Tab] would complete on all exported file-systems from the host called system, while make [Tab] would complete on all targets in Makefile. This project was conceived to produce programmable completion routines for the most common Linux/UNIX commands, reducing the amount of typing sysadmins and programmers need to do on a daily basis.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345758904/warc/CC-MAIN-20131218054918-00027-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
6,281
9
https://answers.sap.com/questions/10444483/bapi-for-ca02---assign-component-allocation-for-ro.html
code
I m searching for the bapi for the component allocation in routing. Since routing is already created my work is to assign component allocation to the operation. i tried with the BAPI_ROUTING_CREATE and /SAPMP/BAPI_ROUTING_PROCESS BAPI_ROUTING_CREATE can be used only to create new routing. But the /SAPMP/BAPI_ROUTING_PROCESS is going to short dump. So any alternate please suggest. Please provide sample code to assign component allocation.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588257.34/warc/CC-MAIN-20211028034828-20211028064828-00501.warc.gz
CC-MAIN-2021-43
441
7
https://club.myce.com/t/windows-thinks-my-raid-controller-is-a-nic/102269
code
Yesterday I formatted this system and put XP pro with SP2 back on. On my system there are 2 RAID controllers: one by VIA and one Promise controller. The Promise controller installed without a problem, but the VIA one didn’t. Windows keeps detecting a network controller (there is only one NIC in my system but that one is installed and working properly) that it can’t install. I guess that this NIC it detecs is my VIA RAID controller, but I can’t install the drivers (not the ones that came with the board nor the ones I got from VIA’s website). It’s not that big a deal as I don’t use that controller, but it still stinks ;). Anybody an idea how I can force Windows to recognize the VIA RAID controller? My mainboard (with everythin on board, except for the VGA) is a MSI K8TNEO FIS2R.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107896778.71/warc/CC-MAIN-20201028044037-20201028074037-00058.warc.gz
CC-MAIN-2020-45
799
3
http://devbootstrap.com/faqs?page=2
code
You can apply online either by filling out the application form on this website or by contacting us any other way, either by email, phone or personal visit! The process is then as follows You are someone who has tried out and loved programming. It does not matter what programming language you have used, as long as you have already had some exposure that is fine. You know about computers, the internet and maybe have already built a simple website or mobile app! As long as you have that passion and want to take your skills to an insane level then you are just about right for Dev Bootstrap! The maximum number of students for each Dev Bootstrap is limited to 24 places (12 on each stream). These places are filled very fast so you better apply today! Absolutely! If you pass the application process (see above) you’ll have a reserved place on the bootcamp. We then have a number of choices for funding: Nope, but you’ll be extremely employable. Additionally, all our Partners get the chance to meet and interview you once you graduate from Dev Bootstrap. In many cases you may already be sponsored by one of our partners which means you already have a job! :)
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912204736.6/warc/CC-MAIN-20190325234449-20190326020449-00116.warc.gz
CC-MAIN-2019-13
1,167
6
https://www.overclock.net/threads/msi-h55-e33-will-it-support-ddr5-video.1066158/?u=141128
code
· Maximum effort. There is no such thing as DDR5. There's GDDR5, which is just the name of the VRAM of the video card (it can be GDDR2, 3, 4 or 5, but more commonly these days 3 or 5). Memory is currently at the DDR3 standard. Regardless, the motherboard will support your video card.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499829.29/warc/CC-MAIN-20230130201044-20230130231044-00504.warc.gz
CC-MAIN-2023-06
285
2
https://testbook.com/question-answer/in-a-reversible-adiabatic-process-the-heat-added--5ffb5a3be6bc9650cbd00494
code
Let us understand the difference between adiabatic and reversible adiabatic, for this first understand what is Reversible and Irreversible process. If the system is reversible and adiabatic then it has to be isentropic, on the other hand, if the system is adiabatic only then it may not be isentropic. other process in thermodynamic are: (1) Isothermal process or constant temperature process or Hyperbolic process: (2) Isochoric process or constant volume process or Isometric process: (3) Isobaric process or isopistic process or constant pressure process: (4) Polytropic process:
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964361253.38/warc/CC-MAIN-20211202084644-20211202114644-00209.warc.gz
CC-MAIN-2021-49
582
7
http://filesharingtalk.com/threads/311717-Giveaway-Some-random-accounts
code
After years of filesharing I've got a lot of different accounts on trackers. Now it's time to sort the trackers I use the most from the trackers I don't use anymore. Instead of just delete the accounts I've decided to give them to people who wants them. So, just write in the thread, the people who answers first will have it. And just one acc / person Here's the accounts: Power user accounts: * - STmusic, 50gb buffer, 18 invites Will go to 7oOoDa, But you can still ask for invites * - Filemp3, 20gb buffer Will go to Cijay * - BIT-HDTV, 60gb buffer, 24 invites Will go to yasobelber92, But you can still ask for invites * - Metalbits, 15gb buffer, 2 invites * - Ifi, no ratio * - Demonoid, some invites * - Tehconnection, 15gb buffer If you want you can ask for invites if you want that instead. Will give everything on sunday evening, so just feel free to ask ! ONE NEW RULE, WILL NOT GIVE ANYTHING TO TRADERS
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718423.28/warc/CC-MAIN-20161020183838-00281-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
914
15
https://communities.vmware.com/t5/vRealize-Orchestrator/vRO-6-0-4-Problems-with-managing-ssl-certs/td-p/1414641
code
i´m facing Problems with an older vro Version 6.0.4. I have a WSUS Server with installed winrm. In orchestrator i try to add the powershell host (wsus Server). My first error was a Connection time out. Thought first that´s a Firewall issue. Our NSX Firewall didn´t dropped anything. So i´ve checked the host Firewall on the wsus Server and there i found an active Firewall for the Domain Network. But i have to mention the WinRM exception with 5986 5985 and 433 tcp was implemented. But i have disabled the host Firewall and tried again to add a powershell host in vro. Now the error is Connection refused??? Also when i execute the workflow manage ssl cert. I only type the wsus Server address and get same error with Connection refused. So i had a look at the account in wsus - it is a full admin. So my question is - how can i torubleshoot this Problem? What you guys can prefer? Connection refused seems that the vro do not have permission to Access the wsus by winrm???? You may want to follow along in this article. Even though it's for vRO 7, it should still be applicable to your case.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585441.99/warc/CC-MAIN-20211021195527-20211021225527-00211.warc.gz
CC-MAIN-2021-43
1,097
6
https://ictac.isp.uni-luebeck.de/ictac-2022-call-for-organisers
code
ICTAC 2022: Call for Organisers Any group or institution wishing to host this event are invited to send their proposals. The priority is for the event to be located in a developing country. Proposals will be evaluated by the ICTAC steering committee. Proposal Format and Submission Proposals should be no more than four pages in length and should contain: • Brief description of why the event is of interest to the proposer. • Vision for the event, including its aims, the expected format and scale. • An estimation of expected attendance, based, for example, on presence of a local community in the area and costs of travel to various parts of the world and local expenses. • A description of the relevant qualifications and experience of the proposers, especially regarding conference organisation logistics. • A description of the facilities that will be available for the event and to support the organizers. • The contact information of the proposed organising committee. Please, note that the choice of a PC chair will be subject to later discussion with the Steering Committee and should not be part of this proposal. Please, send your proposal (in PDF format) and any inquiries to Martin.Leucker@isp.uni-luebeck.de. Submission of proposals: August 22nd, 2021 Notification of results: September 5th, 2021
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057796.87/warc/CC-MAIN-20210926022920-20210926052920-00656.warc.gz
CC-MAIN-2021-39
1,323
15
https://docs.runway.team/using-runway/app-settings/team-roles-settings
code
Team roles settings Configure app users, release pilots, and role settings. Add and remove users from your organization to the app. Only users who have been added to the app will be eligible to be added to the release pilot list. To automatically add all new users in your organization to all apps, enable the Add new users to all apps setting from the organization settings page. Here you can define the pool of team members who will be eligible to be release pilots for the selected app. Release pilots have highest-level permissions to perform actions within releases in Runway. Adding team members to the list will create a rotation pool that Runway will use to assign individual release pilots to upcoming releases. To determine who is assigned to each release, Runway defines a sequence of all users in the pool and loops through it. A release pilot can always be changed manually for a particular release, by clicking Edit release settings on the Kickoff step for a release. The pilot rotation sequence can be reordered as required – pilots will be assigned to release in the order shown in the release pilot list.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510149.21/warc/CC-MAIN-20230926043538-20230926073538-00854.warc.gz
CC-MAIN-2023-40
1,123
8
https://supportforums.cisco.com/discussion/10480216/cme-serial-configurations
code
We are upgrading our circuit from 16 channels to a full E1 with 30 channels. I am able to change the pri-group timeslots to 1-31. When I sh ip interface brief I see all the channels displayed. My question is does the int S0/0/0:15 need to be modified to s0/0/0:31 to reflect the other channels or will all the channels still be available under the S0/0/0:15? Any help would be greatly appreciated. Thank you!
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320040.36/warc/CC-MAIN-20170623082050-20170623102050-00534.warc.gz
CC-MAIN-2017-26
408
2
https://bloginavat.wordpress.com/2012/03/
code
This semester I’m TA’ing for the upper level bioinformatics course. As far as teaching assignments go, it’s really ideal: it’s my intended area of specialization, I get to work for wonderful professors and I’m afforded considerable latitude in teaching and assignment-writing. (The latter two points were also true of cell bio last semester, though the first was definitely not.) The bioinformatics course is unusual in that attracts both biology and computer science majors, roughly at a ratio of 1:2. As such, there is considerable diversity in the students’ academic backgrounds, and it is expected that students will sometimes have knowledge of subjects (e.g. algorithms or biochemistry) that exceeds what is required for the course. I think this may explain an annoying tendency in the graded assignments that I have noticed for some time but haven’t been able to put my finger on. This tendency, which is probably more common among the CS kids than the biologists, is to lend obscure, esoteric interpretations to questions and answer them accordingly. Mostly these involve pedantic or legalistic readings of questions which seem pretty facially straightforward to me. For example, a warm-up question might ask for the output of an algorithm expressed in pseudo-code which prints the limiting ratio of F(n+1)/F(n), where F(n) is the nth Fibonacci number. The facially straightforward answer to this question is 1.618… or phi, which most of the biologists were able to identify. The legalistic, “gotcha” answer is 1, because division could be interpreted as C-style integer division. But there is absolutely no reason to think that C-sytle semantics for the division operator were intended in the first place! The behavior of the division operator in C was motivated by concerns of machine efficiency in general, and closure over ints specifically. It’s not an especially important or universal fact about computer science, and there’s no reason to assume it’s implied in pseudo-code. It actually requires “reading against the grain” of the assignment, which asked the student to identify the ratio in the next question. Worse, the CS students know that they’re taking an interdisciplinary course where C’s division semantics is not common knowledge. Nevertheless, the bureaucratic interpretation was depressingly common among CS students. I would write it off as an isolated incident or a “thinko”, except that such mis-interpretations reccur with depressing regularity. My pleas to adopt commonsensical readings of homework questions do not make a difference. Why does this approach to homework bother me so much? It assumes that there is an obvious interpretation of the assignment fit for commoners, and an esoteric interpretation of the text intended only for readers equipped with rare learning and subtle powers of discernment. In other words, my students are Straussians about homework.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865863.76/warc/CC-MAIN-20180523235059-20180524015059-00270.warc.gz
CC-MAIN-2018-22
2,936
6
https://www.nucleiotechnologies.com/how-to-find-devices-connected-to-your-network/
code
As Ubuntu users, we may want to know if we are the only ones using our network, particularly our wireless network, or if there are any other unwanted users using our bandwidth. This ability is also useful when we want to verify that no hacker is using our network to gain access to our system. Scan your network with Nmap on Ubuntu 20.04 LTS Step 1: Install the network scanning tool Nmap When it comes to reliable network scanning, Nmap is a tool that you can totally depend on. Enter the following command as sudo in the Terminal application in order to install the tool. sudo apt install nmap Step 2: Get the IP range/subnet mask of your network To determine the device connected to your network, we need to get the IP range or the subnet mask of your network. Open your terminal and type this command. Note: The highlighted IP from the output indicates that our system is using 192.168.1.0 subnet mask and the range is 255. Thus our network IP range is from 192.168.1.0 to 192.168.1.255. Step 3: Scan network for connected device(s) with Nmap Through the Nmap tool, you can scan the report of all devices connected to a network by providing the subnet mask IP as follows: nmap -sP 192.168.1.0/24 The output shows that there are 6 devices connected to the network (including the router itself)
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818337.62/warc/CC-MAIN-20240422175900-20240422205900-00870.warc.gz
CC-MAIN-2024-18
1,296
12
https://eros.usgs.gov/doi-remote-sensing-activities/2019/usgs/mapping-long-term-landscape-dynamics-kenai-peninsula-alaska
code
Forest loss, forest succession, and wetland drying have been key issues on Alaska’s Kenai Peninsula in recent decades. Spruce bark beetle outbreaks, natural and human-caused wildfires, shrub expansion, lake drying, permafrost thaw, and industrial activities have all contributed to extensive land cover change across the peninsula. Detecting, mapping, and tracking the cumulative effects of these disturbances are important for State and Federal resource management agencies. Wall-to-wall land cover change analysis is presently difficult because of a legacy of different methodologies employed to document disturbances and classify land cover types through time. USGS researchers are developing a Landsat-based time series of spatially explicit vegetation maps that are better suited to capture the extent and magnitude of various and prominent land cover changes that have occurred across the Kenai Peninsula over the last 40+ years. This study aims to develop a simplified and consistent series of spatially explicit vegetation and land cover types estimated from Landsat legacy imagery across the Kenai Peninsula between 1973 and 2017. While the main focus is on forest and non-forest, land cover types include needleleaf, broadleaf, and mixed species forests. Non-forest cover types include shrubs, upland and wetland graminoid, alpine, barren, and water. A time series composed of these classifications allows for the detection and quantification of forest losses, growth, and transitions as well as other major changes such as wetland loss due to drying and woody vegetation encroachment. This work provides a new record of landscape change and better quantifies how disturbance events and natural succession have shaped the distribution of vegetation types across the peninsula, an important resource for local, State, and Federal land managers tasked with monitoring and managing natural resources across the peninsula. Current and historical vegetation maps derived from legacy Landsat images between 1973 and 2017. By comparing these land cover classifications in a geospatial environment, land cover change maps can be produced for the entire study area.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818464.67/warc/CC-MAIN-20240423033153-20240423063153-00364.warc.gz
CC-MAIN-2024-18
2,168
3
https://drupalcampbangalore.org/choosing-a-sportsbook-4/
code
A sportsbook is a place where people can make wagers on a variety of sporting events. Bettors can place bets on who will win a game, the total number of points scored in a game, and many other props. The sportsbook will then calculate the odds for each event and display them to its customers. If a bet is successful, the sportsbook will return the amount wagered to the bettor. While some sportsbooks have different rules, all of them accept bets on a wide range of teams and games. Some even offer money back when a bet is a push against the spread, or loses one unit. These policies are designed to maximize the chances that a bettor will win, and keep them betting at the sportsbook. Before deciding which sportsbook to use, be sure to take your budget into consideration. This will determine the scope of your business and how much you can bet on a given game. You should also look into regulatory bodies that govern gambling in your region. This will help you avoid any trouble with the authorities. When choosing a sportsbook, it is important to read reviews and make comparisons. Several factors should be taken into account when making this decision, including the ease of navigation, security features, and customer support. In addition, you should consider whether the sportsbook offers a mobile app or not. If it does, it should be easy to navigate and use on your device. Ultimately, the choice of sportsbook will depend on the user’s preferences and the type of betting they want to do. Some people will prefer to stick with a single sportsbook, while others may want to try out a few different ones. If you’re unsure of what to choose, consider asking friends and family for advice. Another thing to keep in mind when comparing sportsbooks is the bonus offers they have. Some offer higher bonuses than others, so it’s important to check the fine print before deciding which one is right for you. It’s also a good idea to make a list of all the things you are looking for in a sportsbook, and jot down any deal-breakers so that you don’t miss them. A sportsbook’s odds are usually set by the bookmakers, but they can change based on a number of different factors. These include the fact that the bookmakers are influenced by sharp bettors, or the fact that one side of a bet is getting more action than the other. In such cases, the oddsmakers adjust the lines accordingly. In addition, the sportsbook’s betting limits are often impacted by the action they receive from the public. For example, if a line is moving quickly and the sportsbook is receiving significant wagers from the public, they will increase their betting limits to accommodate the demand. This is called steam, and it can be a huge advantage for the sportsbook. However, this practice can lead to a decrease in the overall payouts for the bettors.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474643.29/warc/CC-MAIN-20240225203035-20240225233035-00494.warc.gz
CC-MAIN-2024-10
2,844
8
https://dev.to/simeg/4-lessons-learned-working-remotely-for-2-years-3de0
code
Since the start of the pandemic I’ve been working remotely from my the leisure of my home. It’s been +2 years (wow, time flies!) now and during this time I’ve learned a lot. Here are my 4 lessons learned working remotely. To clarify, I work in a distributed team and we’re all working remotely. My experience and lessons learned are based on this type of team setup. Social Isolation (AKA “I Miss My Colleagues”) This point is probably the most obvious one. I miss hanging out with my colleagues, whether it be getting a coffee, talking about the weekend or just having people around me while I work. One thing in particular I miss is being able to roll over to someone’s desk and say “Hey, can you help me with this?“. In a remote world I have to schedule a meeting, maybe share my screen and make sure we don’t talk over each other in Zoom sigh! Lesson learned: Interacting with other social beings is more important for my well-being than I thought Social Activities Online Suck I work in a team and we used to get together every Friday in the office for some good ol’ fun by playing Exploding Kittens, maybe having some snacks and beer, or just bonding over non-work related topics. Today is different. We have a slot every Friday afternoon dedicated to having fun but it’s just not the same. Sometimes people have too much screen fatigue and just wants some time away from the computer, which makes a lot of sense, and they skip the meeting. Or sometimes you’re in the middle of something on Slack and it’s hard to focus on the having fun part. We do have fun in the meeting but it’s not comparable with having a laugh face-to-face. Lesson learned: Digital social activities cannot replace in real life social activities Improved Work-Life Balance, if You Let It At the start of the pandemic I quickly realised that if I was gonna make it I needed to start taking better care of my self. After not leaving my apartment for a few days and feeling terrible, I set out a goal for my self to take a brisk walk before work every morning. This evolved into a passion for exercise and now I take runs or go to the gym before work, and the difference is like night and day! I take the time I was spending on commuting and use it for something healthy instead. A downside to working from home is that at the end of the work day it’s easy to just keep working. I sometimes forget about time and then all the sudden it’s dinner time and I’m still writing code. “Just one more test” I tell my self. This is a drawback and what works for me is sticking to my schedule I had at the office. Lesson learned: Spend the time you save from commuting wisely, and stick to the schedule you had when working at the office Remote Pair Programming Is Hard Because I work as a software engineer, writing code is part of my day-to-day job. Sometimes in my team we do what we is called pair programming, that’s when we write code as a together as a pair. One person writes the code and the other one watches, makes comments and asks questions. There are many different ways to do this and I won’t cover them all here. Pair programming over the internet is hard! We struggle a lot with this in my team. There are tools that help us, such as Tuple, but even with the best of tools available it’s hard. I easily lose focus when I get some irrelevant notification, or want to check something on my computer. I miss having pen and paper to quickly sketch out my thinking to my colleague, or a whiteboard where we can have lively discussions and other people can join in. From experience, this is how the best solutions are discovered. Lessons learned: Even with the best remote pair programming tools available, nothing beats in real life pair programming To summarise, here are the 4 lessons I’ve learned working remotely for +2 years. - Interacting with other social beings is more important for my well-being than I thought - Digital social activities cannot replace in real life social activities - Spend the time you save from commuting wisely, and stick to the schedule you had when working at the office - Even with the best remote pair programming tools available, nothing beats in real life pair programming We’re living in an interesting time period. Remote work has been around for many years but it’s just recently most software companies are forced to adapt to this new environment. Personally, I think remote work is here to stay, whether you like it or not, and companies that do not offer remote work will lose talent. Computer science has been around since the 1960s and we’re still trying to figure out the best software development methodologies, programming language features and ways of communicating. The remote work era has just begun and I can’t wait to see what innovations comes next that will help us move into this new way of working. I’ll most likely be working remotely in the upcoming years, and I look forward to seeing what additional lessons I have learned reading this post in a few years from now! Learn More About Software Engineering Connect with me on Twitter, LinkedIn, or GitHub Originally published at prplcode.dev Top comments (3) I like remote work as my home setting is much better than most office. I can use my favorite aroma vaporizer while I work at home (which you can't at work). I have my own clean toilet. I have my own healthy snack and drinks. I can wear comfy clothes and slippers. I'm less tired as I don't waste time on commuting. I've read more books due to saved time. I do housework chores during breaks so at the end of the day, I have more time to do other pleasant things, such as reading or giving my loved one a nice massage. For pair programming I think Live Share in VSC is quite useful. To be more async and less disturbing, I found Twist is better than Slack. But I'd admit that I am not into online meeting for social purpose due to screen fatigue. Instead I want to finish work then I can go read or sew, doing other things than facing computer. Maybe I am an introvert so I don't think I miss a lot of interaction... or I had experience of working on tasks remotely before I transit into software development, I'm more used to this mode of working than people who are forced into this. We're all different. It makes me happy to read you're enjoying working from home. I enjoy it too because it gives me more time to exercise, and do other fun hobbies. Such as write content for DEV :D But screen fatigue is a problem. And for some time during the panedmic I lived alone and it got lonely, but now I live with my partner so that's better. Thanks for sharing! Indeed, having a partner at home makes a difference than living alone unless you truly enjoy being alone all the time. That's why I think Spotify's work anywhere policy is awesome. :)
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943589.10/warc/CC-MAIN-20230321002050-20230321032050-00730.warc.gz
CC-MAIN-2023-14
6,845
39
http://minecraft-mp.com/server-s160918
code
NOTE - This server no longer has a creative world - We now only focus on survival. Simple description, I understand people just want to play a game, not read this server's whole life history. Put basically, Empirius server is a British run server which is designed around a survival/factions theme. We have 2 main worlds, one for those who prefer just to do whatever with factions (wild) and one where all faction features are enabled (factions). We like to ensure that people are happy, so we're more than willing to consider requests for the server such as new plugins or worlds. Our staff will help out whenever they can, ensuring that your problems are solved as quickly as possible. Give us a shot. I would say we have cookies, but I'd prefer not to use false advertising.
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806124.52/warc/CC-MAIN-20171120183849-20171120203849-00230.warc.gz
CC-MAIN-2017-47
777
4
https://www.freelancer.com/work/captcha-data-entry-projects/
code
1. Redesign www.xomidhan.org. Make the apis restful 2. Code the front end in either Angular/React 3. Code the backend in Spring, Java. 4. Use Captcha in form submission 5. Make the website look attractive 6. "Ask a question" flow should be made intelligent. The subsequent questions will appear based on the answer chosen in the previous questions. 7 I want to install recaptcha v3 on the joined script. I will create the key at Google. For now, I have...install recaptcha v3 on the joined script. I will create the key at Google. For now, I have installed a basic captcha (secureimage) but we still received spam. I have joined the files. I want a script that I will be able to re-use on other projects. ...website, social profile links etc.. . Manta has anti scraping methods in the website so if you scrape too fast a captcha pops up to fill out. So I need the ability to see the browser as it scrapes and the ability to pause the scraper if a captcha opens so I can fill it out. Export into csv format. Preferably would like to work with someone who has created hi i need a team of developers for my ongoing projects who can work in any web development technology. e.g. php, wordpress, magento, opencart, drupal, bigcommerce, oscommerce, prestashop, shopify, laravel, codeigniter, cakephp, yii etc Anyone interested, ping me. thanks. FB and IG Ads Expert needed for multiple startup businesses including (but not limited to) supplemental education, solar, eCommerce (Shopify and Amazon FBA), business coaching and consulting, marketing agency, etc. Must also have good knowledge of WordPress, ClickFunnels, YouTube, LinkedIn and other platforms related to digital marketing. Need to identify and target warm/hot niche audiences for ea... we are looking sales managers who can bring new SharePoint, react, angular projects to our company. further details we will discuss later I need small articles, on multiple subjects about current events, written for a blog and website. Feel free to write about anything that you are ...for example - music, sports, weather, comedy, relationships, philosophy, science. A few paragraphs should be fine, but more is always better. There will be multiple future projects for the right person. we are looking a complete mobility solution company (Android, IOS , Admin panel, Backend API) who having va...complete mobility solution company (Android, IOS , Admin panel, Backend API) who having vast experience and expertise. who can deliver app on time. I am having bunch of projects need right compang or a complete freelancer team. Best of Luck Mindset is a biosensing platform for human performance - our first product is a brain-sensing headphone that improves your productivity at work. We're looking for someone to join the Mindset team, to help with our graphics design needs: * Website design: landing page, sales page, blog, additional content * Marketing materials: Digital ads, social media posts, banners, pitch decks, swag ... ...Individual Animator who can work with us on Animation Projects mainly (Whiteboard Animation) on long-term bases. This is not a one-time project. We are an Agency that requires outsourcing vendors to help us create and edit multiple projects. We will provide you with all the assets for the projects that you are hired for. We need artists who are skilled Website that has old captcha forms need to be removed and have Google ReCAPTCHA installed. Requirements: Code and Test Server Can Only Be Accessed Over VPN. The code has to be mounted over the network using something like SSHFS or SFTP. Code is maintained in a git repo. There are 6 locations that need the need the recaptcha installed. It is very important We are a SME within the mechanical engineering sector based in Cardiff, Wales, working on a number of mechanical and automotive projects who require a project orientated engineer to assist in activities such as: Finding solutions to manufacturing issues; Coordinating with engineers within the supply chain; Updating CAD drawings; Generating work I own the site thetutorworks.co.uk. It is basically a university assignment doing business. I need someone who can contact students and bring me projects. The pay goes as on a commission basis. If the total project price is £1200, you would receive £120.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039747369.90/warc/CC-MAIN-20181121072501-20181121094501-00470.warc.gz
CC-MAIN-2018-47
4,294
13
https://www.cityprofile.com/forum/san-marcos/party-school-864/
code
If you can't find a party in college you aren't trying very hard... Even in SLC. If all you want to do is party, why are you bothering with college? It seems like an expensive way to party. Seriously, Tx State is a good school. Do something more than party and you'll get a lot out of it.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510326.82/warc/CC-MAIN-20230927203115-20230927233115-00581.warc.gz
CC-MAIN-2023-40
288
1
https://mhgh.info/rules
code
Here you'll find the rules for the Monster Hunter Gathering Hall, along with clarifications and explanations for each. Please respect these rules at all times. If you agree to these rules, please follow the instructions in the #rules_and_info channel (within the server). No name-calling, no disrespect. It's not okay to make fun of someone (whether to their face nor behind their back). If you have an issue with someone, just block them and ignore them. If the person is creating issues for other members too, please let a moderator know. And nothing even close. We have many younger users on the server, and we want to keep things as safe as safe as possible at all times. This applies to everything, including (but not limited to): images posted in the chat (either by upload or hyperlink), images in user profiles, videos posted or uploaded to chat, bot commands used, text or image topics (Yes, topics. You can't talk about nsfw topics.), usernames, nicknames, "playing" statuses, etc. If it is nsfw, lewd, or even suggestive, it is not welcome on the server. This includes many categories. Excessive amounts of messages or images consitutes spam. Abuse or capitalization or formatting (making your messages stand out), when done repeatedly or in large amounts is spam. Pinging users repeatedly, without context, or pinging many users at the same time. Using bot commands, especially after other commands have already been used (in channels other than the designated bot channel). Adding multiple reactions to the same message. Sending messages that are mostly or full of emoji/emotes. Copypastas of almost any type. Annoying ("unicode") nicknames. Bandwagoning (chains of messages, emotes, or actions done by one or more users). If a group is utilizing one of the voice chats for their hunt, please ask them before joining or chatting. It is very distracting to be chatting with members of your hunting party, and suddenly being interrupted by people who are not in your in-game hall. If a group has not stated they are looking for more hunters, please don't assume they are. Every channel has a topic; please make sure to click the topic (next to the channel name at the top of the screen, or above the user list on mobile) and read it entirely. Some channels have additional rules beyond the server-wide rules. For channels that have a specific topic, those topics are the only topics allowed. For channels that allow multiple topics, users must stay on the topic of the current conversation. Interrupting a conversation with an unrelated remark, image, video, or command is a disruption to the current topic and is not allowed. Keep in mind that some topics are not allowed at all, and must be kept off the server entirely (ex: Politics, any NSFW topic). Do not discuss cheating or encourage other users to cheat, and do not attempt to claim that anything obtained from cheating/powersaves is legitimate. When hunting with members of the Monster Hunter Gathering Hall, it should be safe to assume that your fellow hunters are using only gear that they gained legitamately (without cheats of any kind). Some customization discussion may be permitted in appropriate channels; see the channel topics for more info. The server should not be used as a means to reach lots of other users with advertisements for products, services, contests, giveaways, etc. This includes links to other Discord servers, links to youtube channels or twitch streams (except in certain, designated channels), strawpolls (or other voting sites), pay-per-click links (like adfly), and any kind of referral link. In short, if it is any kind of self-promotion, self-earning, or referral, it is not allowed. These same rules also apply to DMs, usernames, nicknames, avatars, images, and "playing" statuses. Note: the only time that it is acceptable to share a link to one of these services is in a designated channel (ex: #streaming for twitch links), or via DMs if (and only if) the other user requests the link. If you even have to ask if something is against the rules, it probably is. Stretching the rules is breaking the rules. Additionally, if a moderator says to cease a particular action, continuing to do it, even at a later time, is breaking the rules. These are rules that are not shown in the #rules_and_info channel, because they are very specific cases, or they are believed to be common sense. All users are responsible for these rules, just like any other rules. The whole point of having the system is to encourage users to read the rules. If you outright tell someone what to do (or even give them hints), you are encouraging them not to read (and comprehend) the rules. We don't want people skimming the rules, we want them reading them. This one is pretty obvious. If there is a contest going on, the purpose is to be fun for everyone. The moderators will do our best to ensure that no one cheats (and that if someone cheats, they will be punished accordingly), but in theory, we shouldn't need to because everyone should be honest and treat the contests as a way to have some fun and friendly competition. If someone has a white name (no roles, aka no "Hunter" role), all it means is that they haven't agreed to the rules yet. Our community is open to everyone. Yes, there are certain features that are locked behind reading and agreeing to the rules, but it is not a hard requirement to participate or chat in the server. All users are held responsible for the rules, regardless of whether or not they have read them. If someone asks how to do an action that is locked behind the Hunter role, feel free to point them to #rules_and_info, which describes exactly how one can agree to the rules. If you are banned or muted, it was for a reason. If you want to appeal the ban or mute, first talk to the moderator that banned or muted you privately (in a Direct Message). If you don't share any mutual servers (in the case of a ban), you may use the ban appeal form linked at the top of this web page. Do not make a second account to try to evade punishment. If you are caught evading a punishment, you will be permanently banned with no chance of appeal. Occasionally, things on the server change. Channels may be added or removed, rules may be changed, or systems might be reworked. Most changes happen due to dissatisfaction of a large portion of members, or access to new features. If a change happens that you don't agree with, consider writing up your concerns and sending to an admin, or sharing in #moderator_ama. Creating an outrage does not help in any way, and concerns raised during an outrage will likely be ignored. On the other hand, concerns raised in a calm and informative fashion will always be considered.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742263.28/warc/CC-MAIN-20181114191308-20181114213308-00104.warc.gz
CC-MAIN-2018-47
6,722
15
https://www.my.freelancer.com/projects/graphic-design/box-design-34811292
code
We want a box designer to design our gift box of our product. Dimensions will be provided. 27 pekerja bebas membida secara purata ₹1721 untuk pekerjaan ini Im art based creative whos experienced in developing creative concept and art direction with a background in graphic design. Specialist for above the line, below the line and digital.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446709929.63/warc/CC-MAIN-20221126212945-20221127002945-00780.warc.gz
CC-MAIN-2022-49
341
3
https://ex0-sys.blogspot.com/2018/03/alphtav-vault-up-to-15-securization.html
code
Alph@TaV Vault is a software that we have developed to ensure advanced and customizable security of digital data through a new approach to binary information processing; it is not based on any algorithm or concept of conventional cryptography. By nature, the basic concept of Alph@TaV Vault is to describe the binary information relating to a given data and not to transform it, and then to fragment it into 4 separate files described as 1) Main-Protected-File / 2,3,4) Physical-Key-Files-2,3,4.
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000894.72/warc/CC-MAIN-20190627055431-20190627081431-00341.warc.gz
CC-MAIN-2019-26
495
7
https://alankr.it/about/
code
Hi! Nice to see you here. I completed my Master's degree in Computer Science from Northeastern University - Boston last year, recently moved to the Bay Area and am currently on the hunt for a new opportunity. Apart from coding, I like to watch Liverpool F.C., obsess about video games, (try to) study astrophysics and read Sanskrit literature. - Master of Science | Computer Science | Northeastern University | 3.54/4.00 - Bachelor of Engineering | Computer Science & Engineering | Chitkara University | 7.67/10.00 - Deep Learning: TensorFlow - Keras - Pandas - Numpy - OpenCV - GDAL - Infrastructure: Kubernetes - Docker - GitlabCI - Jenkins - AWS - Databases: PostGreSQL - MongoDB - Tools: VS Code - vim - zsh - tmux - git - jupyter - Development practices: TDD - Continuous Integration - Agile - Misc: Redis - Kafka - Celery - node.js
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573465.18/warc/CC-MAIN-20190919081032-20190919103032-00551.warc.gz
CC-MAIN-2019-39
837
11
https://forums.teamphoenixrising.net/t/directory-vs-sub-domain/20777
code
I was having this debate at another forum. (forgive me) My space weather section just could not get past 10th, searching Google: Space Weather Forecast. Everyone said it would kill the search results since the site section has been up for 5 years as a directory. Logic just told me it should help. I moved the whole Space Weather directory to a sub domain. In 4 days it is now second, just behind spaceweather.com Now I know ~smiles~
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525355.54/warc/CC-MAIN-20190717161703-20190717183703-00348.warc.gz
CC-MAIN-2019-30
433
5
http://xnaresources.com/megabbs/forums/printer-friendly.asp?tid=280&mid=
code
Posted 2013-04-01 9:55 PM (#555) Subject: Building your First Mobile Game using XNA 4.0 A few months back, I had the opportunity to contribute as a reviewer for a new book from Packt Publishing titled "Building your First Mobile Game using XNA 4.0", written by Brecht Kets and Thomas Goussaert. The book is a fast-paced rundown of XNA game development, iterating over a code base that eventually leads to constructing a side-scrolling run-and-jump style game in XNA 4.0. Both 2D and 3D are covered, along with sound, input, and constructing a scene graph framework for building your games. For 3D, the book uses the Skinned Model sample from the XNA Dev Center.
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424910.80/warc/CC-MAIN-20170724202315-20170724222315-00354.warc.gz
CC-MAIN-2017-30
661
3
https://mail.python.org/pipermail/python-dev/2002-May/024287.html
code
[Python-Dev] Out of date FAQ entries Wed, 22 May 2002 22:24:34 -0400 I was looking over the FAQ and noticed a out-of-date entries. I fixed a few: 6.6. Why can't I derive a class from built-in types (e.g. lists or files)? ** Added note that this doesn't apply to 2.2+ 6.21. How do you specify and enforce an interface spec in Python? ** Added note that pychecker can find these problems. But there are some others, which I can't do a good job updating. The one's I did update could use some work too. :-) 6.5. Why does Python use methods for some functionality (e.g. list.index()) but functions for other (e.g. len(list))? Perhaps update comment about strings, numbers not having methods. 6.12. Why is there no more efficient way of iterating over a dictionary than first constructing the list of keys()? for k in d: # now works 6.13. Can Python be compiled to machine code, C or some other language? Should mention pysco? 6.24. Why no class methods or mutable class variables? Mention classmethod(), staticmethod()? I'm sure there's others that could use fixing.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258453.85/warc/CC-MAIN-20190525224929-20190526010929-00228.warc.gz
CC-MAIN-2019-22
1,062
19
http://www.computerweekly.com/blogs/outsourcing/2010/03/who-will-win-the-race-to-the-cloud.html
code
He told me how the company has applied cloud computing to its own core business of software development. It has had staggering results. Basically it makes the distribution of computing power to project teams easier and cuts the cost of hardware. But Wipro is going further and beginning to work out the best way to provide these services to customers. Meanwhile Capgemini has launched a dedicated cloud services business. I will be talking to Infosys tomorrow about what it is doing in the cloud. Who will win in the cloud and what do customers want from the cloud?
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860125857.44/warc/CC-MAIN-20160428161525-00006-ip-10-239-7-51.ec2.internal.warc.gz
CC-MAIN-2016-18
565
5
https://community.idera.com/developer-tools/general-development/f/tools-22/72812/error-detected-lme1608
code
This forum is deprecated. I've a very large c++ VCL 64 bit project that I'm compiling with 10.2.3. It compiles ok in debug mode but not in release mode. I get [ilink64 Error] Fatal: Error detected (LME1608). What is LME1608. It does not appear to be memory related. I've managed to get it to link. I removed a module and it linked ok. Put the module back in and it failed to link. Created another module and added that in and it linked ok. Go figure! Something to do with 227 modules. Works with 226 and 228. Did you ever receive an answer for the LME1608 linker error? I am now seeing that same error. Thanks. I did not get an answer. I think it's a peculiar size error - something like total size of names, or maybe not. I've added more modules and have not seen the issue since. I'd also forgotten about it.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402093104.90/warc/CC-MAIN-20200929221433-20200930011433-00360.warc.gz
CC-MAIN-2020-40
810
5
http://astralknights.blogspot.com/2012/05/how-to-freehand-astral-knights-chapter.html
code
I freehanded my chapter badge by breaking it down into simple shapes, an idea unashamedly stolen from the warp. The image below demonstrates the process I used. Starting with a vertical and horizontal line centred where I wanted the symbol, I then added the diagonal lines but made them shorter than the first two. Next I put in the two cross bars, one to make the guard on the sword and the other as a guide for the blade, after those I filled in the blade using the lines as guides to get it symmetrical. With the sword done I used the remaining lines to do the star points, notice that I join them to the sword. Finally I put the break between the sword and the star in using the original background colour. There you have it, a complex chapter badge in 5 easy(ish) steps. Having done all that I may have found an alternative solution, I'll see how that goes and report back!
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593051.79/warc/CC-MAIN-20180722061341-20180722081341-00298.warc.gz
CC-MAIN-2018-30
878
3
https://news.microsoft.com/1996/09/16/microsoft-to-offer-comprehensive-internet-and-intranet-developer-conferences/
code
REDMOND, Wash., Sept. 12, 1996 — To further demonstrate its commitment to developers, Microsoft Corp. today announced it will offer two comprehensive conferences this fall. For HTML authors and Web site builders who are developing dynamic Web-based solutions for intranets or commercial Internet sites, there is the Microsoft® Site Builder Conference, scheduled Oct. 28-30 at the San Jose (Calif.) Convention Center. For developers who build distributed line-of-business applications or customize components for intranets and the Internet, there is the Professional Developers Conference, scheduled Nov. 3-7 at the Long Beach (Calif.) Convention Center. Both conferences will feature sessions led by industry experts and Microsoft product architects. More than 7,000 developers are expected to attend. Site Builder Conference The Microsoft Site Builder Conference is intended for site builders who are building Internet and intranet sites and applications based on HTML, ActiveX Technologies, Java and scripting technologies. The objective of the conference is to show attendees how to take advantage of Microsoft Internet technologies (including Microsoft Internet Explorer 3.0 and 4.0, ActiveX and ) for greater productivity and for building more compelling intranet and Internet sites and applications. In addition, the conference will include sessions dedicated to a variety of development tools, from both Microsoft and third parties, focused on building these kinds of applications. Microsoft will also unveil and offer demonstrations of new products. Material at the Site Builders Conference will be covered at a depth similar to that which Microsoft has provided at conferences such as TechEd and VBITS. Professional Developers Conference The Professional Developers Conference (PDC) has a long tradition of providing developers with in-depth information on leading development platforms and technologies. The PDC is targeted to developers who use the latest Internet technologies to write distributed enterprise applications or build customizable components for intranets or the Internet, LANs and WANs using C and C++ or Java. The PDC will provide technical information on the next generation of distributed services that Microsoft is building into upcoming releases of the Windows® and Windows NT® operating systems, including the Directory Server, the distributed file system and security features. Microsoft will show how ActiveX, Windows NT and the Microsoft BackOffice family, along with a broad range of development tools, can help developers build robust, scalable intranet and Internet applications more quickly and easily. This conference presents developers with the opportunity to hear about the future of Windows from the team building it. “The developer community is diverse, and we are committed to providing unparalleled Internet solutions for their specific business challenges,” said Paul Maritz, group vice president of the platforms group at Microsoft. “We expect developers to walk away from these conferences with a clear understanding of how to be successful in Internet- or intranet-driven environments.” Vendors, Demonstrations and Hands-On Stations These conferences will provide a working showcase for Internet and intranet development tools and components from Microsoft and will feature more than 150 leading third-party vendors. In addition, each conference will feature a hands-on technology room. The registration fee for each conference is $995 for those confirming their attendance before Sept. 30 or $1,195 for those registering later. For registration information, agendas and a complete list of breakout sessions, visit the Web site for the Microsoft Site Builder Conference at http://www.microsoft.com/webdev/ or the Professional Developers Conference Web site at http://www.microsoft.com/events/pdc/ . The Site Builder Conference is produced by Microsoft and SOFTBANK Expos. SOFTBANK Expos is the world’s largest Internet conference and trade show company and the producer of educational technology events including NetWorld+Interop and Seybold Seminars. Visit the SOFTBANK Web site at (http://www.sbexpos.com/) . Founded in 1975, Microsoft (NASDAQ ) is the worldwide leader in software for personal computers. The company offers a wide range of products and services for business and personal use, each designed with the mission of making it easier and more enjoyable for people to take advantage of the full power of personal computing every day. Microsoft, ActiveX, Windows, Windows NT and BackOffice are either registered trademarks or trademarks of Microsoft Corp. in the United States and/or other countries. Java is a trademark of Sun Microsystems Inc. Note to editors: If you are interested in viewing additional information on Microsoft, please visit the Microsoft Web page at http://www.microsoft.com/presspass/ on Microsoft’s corporate information pages.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473690.28/warc/CC-MAIN-20240222030017-20240222060017-00295.warc.gz
CC-MAIN-2024-10
4,930
21
https://forums.ruckuswireless.com/conversations/ruckus-indoor-aps/r300-how-to-setup-for-home-use/5f91c400135b77e247913d3c
code
R300 - How to setup for home use I have zero experience with Ruckus products. I have a couple of second-hand R300's that I inherited and I would like to know if they can be used without paying for a license or controller software. I did not want to take a chance on bricking them so I haven't attempted any firmware updates or configuration edits. I'm in the process of updating my network to include VLANs. I want to put the R300's on their own VLAN. What FW should I use?
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107910815.89/warc/CC-MAIN-20201030122851-20201030152851-00418.warc.gz
CC-MAIN-2020-45
473
4
https://dba.stackexchange.com/questions/291629/define-recursive-composite-types
code
Is it possible to define recursive composite types in Postgres 13? create type "t" as ( I am aware that I can use a table with a parent-child relationship. The only disadvantage is that I will need to query each nested level instead of directly accessing the nested data. I am also aware that I can use jsonb, but I am not sure if it can access the nested data directly without querying each nested level? What are the other alternatives using PL/pgSQL only? I need to access each nested level separately.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817112.71/warc/CC-MAIN-20240416222403-20240417012403-00132.warc.gz
CC-MAIN-2024-18
505
7
https://discussions.unity.com/t/how-can-i-make-only-a-killing-blow-apply-physics/242863
code
I want all enemies to be immune to physics unless the hit would kill them. In that case, I would like the physics of getting hit to apply. If there was a magic FrameBeforeCollision() method I could use, I could just turn off kinematics and be done, but Unity is not that nice. I could potentially do this by having every projectile check in FixedUpdate() if there will be a collision in the next update, pass the damage value to the enemy to see if that hit would kill it, and if so turn off kinematics. Thus, the next update will be a collision, I can apply damage reducing the HP to 0, and then the physics of the hit will send the enemy flying. My worry here is if I have a very quick moving enemy and a collision on the edge of the collider, the prediction could be wrong since my projectiles are not instantaneous bullets. I’m guessing a little bit, because I don’t fully understand your concept, but I think your suggested solution is going in the right direction. Though I think there is a slightly simpler way to do what you want to do. If most hits don’t kill, then the default should be to keep physics turned off. If a hit would kill, then you apply physics in the moment of that killing blow, through scripting. And the various OnTrigger / OnCollision events are pretty close to that magic method that you’re asking for. In outline, I suggest you make all your colliders into trigger-type colliders and write some logic into the OnTriggerEnter method. Also, make sure all of your enemies have a kinematic rigidbody. When a bullet hits an enemy, the enemy’s OnTriggerEnter method would run. In that method, you would calculate damage, and change the enemy health accordingly. If the enemy health is below zero, then you could switch the enemy’s rigidbody to dynamic, and use either AddForce or AddForceAtPosition to apply a knockback to the enemy. All of this would happen within OnTriggerEnter. The simplest solution I feel would be to disable kinematics any time a projectile is NEAR the player (close enough to hit) while also having a health that could be lethal if hit. That’s far less complicated than prediction. The only problem could be frame rate - physics objects can cause issues with lag and the result could be errored. That said, I think it might be good enough for your use case.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510888.64/warc/CC-MAIN-20231001105617-20231001135617-00769.warc.gz
CC-MAIN-2023-40
2,320
5
https://www-304.ibm.com/support/docview.wss?uid=swg21173983
code
IBM Host On-Demand silent installation on Unix, Linux, and Linux for z/OS Instructions for silent installation of IBM Host On-Demand on Unix®, Linux®, and Linux for z/OS®. Resolving the problem When installing Host On-Demand on a Linux or other Unix platform, it is possible to install the product from a command prompt without using a graphical interface. This is done by passing the "-silent" option to the appropriate installation binary file. For Linux or UNIX servers, you should use the following binary files: hodinstall_aix.bin for AIX® hodinstall_linux390.bin for Linux/390 hodinstall_linuxppc.bin for Linux partitions on pSeries® or iSeries™ hodinstall_linux.bin for all other supported Linux versions hodinstall_solaris.bin for Solaris Operating System™ hodinstall_hpux11x.bin for HP-UX To install Host On-Demand in the default installation directory using the silent install option on Linux for z/OS is as follows: The binary files listed above can be found in the /HODINST directory of your Host On-Demand installation CD or image. For further information, please refer to Appendix D of the Planning, Installation, and Configuration Guide for Host On-Demand. This Appendix contains additional options for installing Host On-Demand from the command line. The options include the use of a response file to customize the silent installation options. When performing the silent install, you should not use the script files provided with Host On-Demand such as the setupunix.sh script in the media root directory or the instunix.sh script in the /INSTMGR directory as these files are intended only for graphical installations. More support for: WebSphere Host On-Demand Software version: 10.0 Operating system(s): AIX, HP-UX, Linux, Platform Independent, Solaris, z/OS Reference #: 1173983 Modified date: 09 July 2004 Translate this page:
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424961.59/warc/CC-MAIN-20170725042318-20170725062318-00494.warc.gz
CC-MAIN-2017-30
1,855
21
https://www.cnet.com/forums/discussions/norcent-lt-2650-lcd-turns-on-but-i-get-no-sound-or-picture-334911/
code
Why I ask is some doubled the warranty. Sadly those that repair such things don't frequent these forums. Just look at our Samsung forum and see why. -> There are so little you can do with said machines that you should find your receipts and make the calls. Even if you don't get it fixed for free at least ask if they will take the thing back for free since here it costs 20 to 99 bucks to toss it in the trash. I need help to figure this out, i have a Norcent 26" LCD TV that turns on but i get no picture or sound out of it, i had it for about 1-1/2 years, it was working fine until a few days ago when i turned it on and it didn't work, i have done some research online, and apparently i am not the only one that has the same problem with it, the problem is that nobody knows where to find the parts to fix it, if anybody out there can help me i would appreciate it very much.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155634.45/warc/CC-MAIN-20180918170042-20180918190042-00224.warc.gz
CC-MAIN-2018-39
879
4
https://forums.adobe.com/thread/1021216
code
Is there a way to remove the upper most parent bookmark without removing the children? For example I have Book bookmarks and I want to remove the "Book" and leave the "Chapter" and "Page" bookmarks intact. I am using Acrobat X Pro. Select the sub-level bookmarks tree and drag it/them to the top level, then delete the empty parent entry. Thanks. That was too simple.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039744803.68/warc/CC-MAIN-20181119002432-20181119024432-00077.warc.gz
CC-MAIN-2018-47
367
4
https://forums.sandisk.com/t/ssd-freezes-when-attaching-files/74331
code
Hello everyone, this is my first post on the SanDisk forums. I have been having issues with my SSD (SDSSDP-064G). When I attach a file via e-mail and send it to anyone, the SSD randomly crashes without showing any errors/bluescreens - my display simply freezes and I cannot do anything except pushing the reset/power button (sometimes it does not stop after an enclosure and keeps running smoothly though). Other than that, everything works just fine. I have my SSD set as a system partition (currently using Windows 7 Ultimate 64 bit with Service Pack 1). The problem itself isn’t that serious, but it starts to become annoying after a while since I have to try multiple times to send a file on e-mail. It doesn’t matter whether I want to upload a single package or a few files at once. I have already tried to fix it on my own and that’s what I found: I can send files/photos through Skype/Dropbox with no issues whatsoever (so my upload is fine). Switching/Disconnecting other HDDs from SATA ports does not help (I have been thinking that my motherboard could be causing trouble because of other disks that are connected simultaneously). I doubt that it is a board-related problem because using an e-mail is the only issue I have encountered so far and everything else seems to work well. It would be nice to hear some other ideas cause not being able to use your e-mail kinda sucks Thanks in advance.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038476606.60/warc/CC-MAIN-20210418103545-20210418133545-00377.warc.gz
CC-MAIN-2021-17
1,410
6
https://www.hockeyforum.com/threads/help-if-you-can-please.7462/#post-29092
code
The thing is, it only does this with TSN, no other site???BE-LEAF-ABLE said:No, I never get that. Maybe running a spyware remover would help, and if that doesn't work then try taking a look at your internet security settings. It's possible the settings are are off a bit and need some tweaking or something. Yeah, I have Mozzila Firefox as well, and as far as ad-aware and spy-ware go, I have all the programs for that as well.faulkner91sf said:if u can erase IE off your computer completely do it... download MOZILLA FIREFOX i think the site for it is: Mozilla - Home of the Firefox web browser and Thunderbird email client download it and trust me, it is no virus it works very good and its quicker then IE. dont download sypware and even buy it, get AD AWARE if u want any kind of extra virus protectors. Yeah, FireFox is faster b/c that is what I use and it goes FASTTTTTTTTTTTTTCanuck said:i get that on a few other sites but not tsn and i dont get that problem very often. If your using internet explorer i suggest you switch of to Mozilla Firefox. It is alot better IMO. It changed the way I think about and use the internet. With all the add-ons you can get, I don't think there's a better browser to use.BE-LEAF-ABLE said:Firefox, eh? Hmm... I may need to try that out.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057589.14/warc/CC-MAIN-20210925021713-20210925051713-00188.warc.gz
CC-MAIN-2021-39
1,278
10
http://www.derkeiler.com/Mailing-Lists/Firewall-Wizards/2003-11/0103.html
code
[fw-wiz] RE: Problem with TCP 1433, conduits and ACLs... From: Wes Noonan (mailinglists_at_wjnconsulting.com) To: <firstname.lastname@example.org>, <email@example.com> Date: Wed, 26 Nov 2003 15:59:45 -0600 Yes, I had an access group. I had 15 other ACLs on that interface, including others for that server, that worked great. > -----Original Message----- > From: Wes Noonan [mailto:firstname.lastname@example.org] > Sent: Wednesday, November 26, 2003 13:22 > To: 'email@example.com' > Subject: Problem with TCP 1433, conduits and ACLs... > Had a strange problem last night doing a PIX upgrade. Here is the > 2 PIX515E in failover configuration. Upgraded the PIXOS to 6.3(3) from > 6.1(4). Installed new activation key for 3DES (they have UR license). The > next step was to convert a bunch of conduits and statics to ACLs. > The original statics were "open". IP x to IP y kind of stuff. We converted > them to port specific statics. The conduits were also converted to ACLs. > Seemed pretty straight forward. When we applied the changes, everything > seemed to be working except for one webserver. The server build the web > pages from a SQL database running on the internal network. The server > would not load any pages and displayed a custom error message that > essentially stated "I can't access the database". Every other system > worked fine however, and for the real kicker I could telnet from the > webserver to TCP 1433 on the SQL server and get the SQL session to come > The original conduit/static was as follows: > static (inside,dmz) 172.16.11.134 172.16.4.134 netmask 255.255.255.255 0 0 > conduit permit tcp host 172.16.11.134 eq 1433 host 172.16.8.101 > The new ACL/static was as follows: > static (inside,dmz) tcp 172.16.11.134 1433 172.16.4.134 1433 netmask > 255.255.255.255 0 0 > access-list dmz_ingress_01 permit tcp host 172.16.8.101 host 172.16.11.134 > eq 1433 > In looking at the logs, I could see the hit count on the ACL increasing. I > could also see the sessions being created, but I never saw any data > passing. I added the "log" option to the ACL as well as putting an > explicit "deny ip any any log" entry and never saw anything that indicated > why the system wouldn't work. I was not running the sqlnet fixup on that > port number. > I am pretty much at a loss for what the problem was. In the end we decided > to roll back the ACLs for the DMZ and put the old conduits back in place > with the new static statements. As soon as we did that, it started working > fine. Clearly there seems to be an issue with how the PIX is handling the > ACL traffic as opposed to the conduit traffic, but I can't see what that > might be. TIA. > Wes Noonan firewall-wizards mailing list
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121153.91/warc/CC-MAIN-20170423031201-00509-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,708
45
http://www.linuxquestions.org/questions/linux-desktop-74/800x600-display-renders-some-menus-unusable-744255/
code
Look in the xorg.conf man page under "Display subsection". I think you may want to add a Virtual entry. Virtual xdim ydim This optional entry specifies the virtual screen resolution to be used. xdim must be a multiple of either 8 or 16 for most drivers, and a multiple of 32 when running in monochrome mode. The given value will be rounded down if this is not the case. Video modes which are too large for the specified virtual size will be rejected. If this entry is not present, the virtual screen resolution will be set to accommodate all the valid video modes given in the Modes entry. Some drivers/hardware combinations do not support virtual screens. Refer to the appropriate driver-specific documentation for details. That would give you a virtual screen larger than your real screen. Another option for reaching the bottom of windows and dialogs, such as clicking an "OK" box hidden below the screen, is to hold down the [ALT] key, press anywhere on the window or dialog box and drag it, to reach the part you need. This won't work for drop down menu's but will for moving windows.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189734.17/warc/CC-MAIN-20170322212949-00281-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
1,089
9
https://www.cnet.com/forums/discussions/computer-shutting-down-315405/
code
Sorry, forgot to add I run Vista. I have been told it is a Vista glitch. My Acer Aspire5610z laptop suddenly, without warning, shuts down. Blank screen, nothing. It may do this after it has been on for hours or it may do it shortly after it boots up. It had a worm and a couple of trojans.What can I try before returning it to the manufacturer? Thanks
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376831715.98/warc/CC-MAIN-20181219065932-20181219091932-00129.warc.gz
CC-MAIN-2018-51
351
2
http://metrotrade.ru/cellvalidating-example-23094.html
code
The Cell Validating event only fires when losing input focus (before leaving the current cell) or when Gc Multi Row validates. The default key setting assigns end edit without leaving the current cell action to the "Enter" key. The Data Grid View control of Windows Forms is a versatile control that can help you create professional-looking data entry forms. What's the best place to implement validation logic code and conditional formatting code for a Data Grid View? If the focus is moved to a cell in the same row, then no other events occur. If the focus is moved to a cell in another row, then both Row Validating and Row Validated are fired, containing the whole row data, including the new and the old values of the edited cells. In general, it is better to use the Cell Parsing event whenever you need to convert/change the value in a cell. Handle the Cell Validated event to perform post validation processing. Canceling this event cancels the changes to the current cell. From within that event, you can indicate that the user's value is invalid by setting the Error Text value of the cell or row. To perform any custom validation on the cell or row being edited, you can use the Cell Validating and Row Validation events, respectively.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866772.91/warc/CC-MAIN-20180524190036-20180524210036-00080.warc.gz
CC-MAIN-2018-22
1,247
11
https://www.ibm.com/developerworks/mydeveloperworks/blogs/DB2PerfTune/date/201112?lang=en
code
It is usually pretty easy to quickly implement new DB2 features. DB2 makes it easy to improve your database performance with a new zParm or table space definition. Unlike most of these new features, however, DB2 temporal tables need research before you implement them. DB2 temporal tables offer great flexibility and many data warehouse design options that can be leveraged very effectively--or be abused--with the wrong application design. To prepare you need to evaluate whether the application is appropriate for temporal tables. First with DB2 temporal tables it is even more important to determine the frequency of the inserts, updates and deletes that are going to happen. Frequencies are always a good design point for any application but it is especially important for DB2 temporal tables because of the way BUSINESS_TIME or SYSTEM_TIME is maintained and how all the data changes are captured within the associated history temporal table. Every data change could really be two processes because rows need to be replicated into your history table. That could be a major performance consideration. The next research points are the restrictions with DB2 temporal tables and history tables. The temporal table must be a regular table with the added BUSINESS_TIME or SYSTEM_TIME. No clone table capabilities, column masks, row permissions or security label columns are allowed. The same restrictions are in place for the history table. The temporal table and its associated history table must be kept in sync. Restrictions also exist regarding the altering, adding or removing columns into the temporal table and the history table to guarantee integrity. Also backup and recovery for the temporal table and its history table must be kept in sync and there are restrictions around DB2 Utilities that could delete data from these tables. In addition once the history table is defined, its table space or table cannot be dropped. So make sure the columns desired in your DB2 temporal tables are stable and well defined for the application. There are several resources that should be reviewed before designing your first application using DB2 temporal tables. The first is the IBM DB2 10 manuals. By reading these friendly manuals you get a good understanding of the syntax, various examples and details about all the restrictions. Next there have been some presentations about DB2 temporal tables at past IDUG conferences and IOD conferences. Track down you colleagues that went to the conferences and get the CD or access to the website for the presentation downloads.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865691.44/warc/CC-MAIN-20180523161206-20180523181206-00062.warc.gz
CC-MAIN-2018-22
2,569
5
http://rainbowfactory.net/spinrewriter6/7-common-mistakes-everyone-makes-in-spin-rewriter-9-0-get-your-free-trial-now.html
code
This excellent article rewriter tool will thoroughly scan your entire content, looking for the words that it can replace with a synonym. All the words that it replaces with a substitute will be highlighted in the bold and colorful text. By clicking on any of the highlighted words or phrases, you can see the original word, suggestions or add your own word. Also, you can click on the original word to revert or click on any other word to replace. Anyone may carry out this, all you need is a new computer system and the capability to chain a phrase together. You can create original content articles and submit them to post directories and obtain compensated. You have to apply to these websites and may or may not really get switched down. If you should occur to obtain switched down after that just maintain plugging away until you discover somebody to "employ" you. Millions of people who also have the internet at their fingertips are wondering exactly the same thing as you right now: How can I make money online? How can I get search engine exposure for my website (or blog)? What will give me a leg up on the competition? Thankfully you have already arrived at the answer to all these questions. Article Rewriter Tool is available for free to make your online business as successful as possible, with minimal effort on your part. Hey Cathy, thanks for sharing about WordAi. It certainly is interesting, to say the least. I guess at some point all of us would want to automate our business and will look into programs like these for a solution. The example you showed gave me a very clear indication that the algorithm isn’t quite there yet. You seem too lenient in grading it because to me, it is practically unreadable. I believe hiring writers is a better use of that money. There are a lot of spinners on the market, some are OK and others are just plain junk. If you are asking why The Best Spinner isn’t in this comparison it is because currently TBS is not producing the results we need for higher quality spins. Sure you can hand tweak your articles to be perfect, but in our business time is money. The less time I have to spend on tedious tasks is more time I have for making money. While no spinner will produce perfect results, these two do a great job of getting you closer to human readable content. To us that means content that reads in a linear fashion with proper verbs and nouns. So below we will show the results of spun articles by these two top spinners. AnswersChief is the best professional market promotion software that aimed at YAHOO!ANSWERS. And the tailor-made AnswersChief aims at the newest version of YAHOO!ANSWERS. Not only can you automatically submit questions and answers with AnsweChief, but you can also insert images to your questions and answers. Even without submitting a link, customers will visit your site. There is a completely new feature - Team Version, SpinnerChief 5 is the only article spinner that has a team version now, which is especially designed for team using, create/manage/use team thesaurus with team members together, and multi-users can use the license on different computer with themselves member accounts. Manager can manage team members easily. October 6th, 2018 (Saturday): THE WEEKEND — This weekend will be the perfect time to build more exposure to the offer and really drive the point about the amazing offer home. At this point you should start including countdown timers to the offer close on Tuesday at midnight PDT, describing the pitfalls of not taking action while there's still time, and also describing your own additional bonuses (optional, but great for max conversions). I mean you can do that as well of course and it all depends on what SEO project you will be working on. If you just need an extremely high quality article for some Tier 1 project, you can head to the website and do some manual work, but if you need content for, say, your GSA SER campaigns, you just need to connect WordAI to your Kontent Machine and you are good to go. Now, let’s take a look at WordAI’s “Standard” spinner. Spin Rewriter 7.0 is the latest version of Spin Rewriter and was released in October 2016. It’s a web based article spinning tool that works in your browser and is extremely powerful for creating and generation unique content with a few clicks. Spin Rewriter has become the best article spinner in 2016 due to it’s powerful features, top-class support and constant improvements. PrepostSEO article re-writer is developed with advance techniques so that it can help users in an effective way. This tool scans through all the words and change them with their synonym. To use this word spinner please paste copied content in the input box and click on the rewrite button. After that our tool will process whole text and then spin it. In the Step 3 you can choose different words from the suggestions or you can use your own word. After that click on the next button to get re-written content. 4. Tier 2 content (content that is keyword rich and relevant to your niche. Doesn’t have to be all that readable, it just has to be indexable by a search engine.)– Here put same options as with the Tier 1 content situation with the only difference that you set the 1st input to “Regular.” It is important that lower tiers have a lower quality of content compared to upper tiers. Exactly Mark! In my experience you can certainly write around 1000 words per hour, even if you are practically new to blogging. I personally think that spinning articles is just a gimmick that doesn’t really get results but wastes tons of time. The spinning software certainly makes a lot of money for the creators though! They are the ones who are laughing all the way to the bank! When there are so many article rewriter or article spinner tools available both online and offline then why should you use our tool? Don’t get us wrong, we are not just bragging when we say that this is one of the best rewriting tool or text spinner tools out there. We are offering you the best article spinner and what makes our article rewriter unique and distinct is its convenience and user-friendly interface. It is a simple yet an efficient article spinner that doesn’t require any sign up, registration fee or installation. All you need is a good internet connection and you are good to go. Also, our paraphrasing tool is absolutely free which makes it an ideal option for students and people who can’t afford paying heavily to writers or rewriting tool or website. Only standard WordAI spinner showed 12% match for me in Copyscape which is very good I think. Also I will add that for SPAM links in general you don’t need any quality at all. if Google crawler can’t find connection with other spinned articles – goal achieved. Sorry, but I don’t see that with expensive spinners as Copyspace shows that in plain sight. Does your website need quality content in big numbers? The truth is; producing decent articles can take any author hours and limit the amount of fresh written content on your website especially if you are the only one writing for your website. On the other hand, hiring a writer can get expensive. Have you ever considered using an article spinner? Spinning content is a great way to keep your website rel... https://www.inetsolutions.org/wp-content/uploads/2016/03/WordAI-Ultimate-Tutorial-And-Honest-Review-Innovative-Content-Spinning-Software.jpg 1200 1920 root https://www.inetsolutions.org/wp-content/uploads/2015/07/Inet-Solutions-Symbol-Plain18-80x80.png root2016-03-03 15:51:322016-03-03 21:58:36WordAI Ultimate Tutorial & Honest Review - Innovative Content Spinning Software Imo it is not possible for google to detect properly spun content, it is not worth computing power it requires. They can do this using ngrams for example, but it is uses a lot of queries. And for example article spinner I coded beats this algo, so google cant detect that the content is spun. Manual spinning is also good but it takes more than 30 minutes per article. This is definitely one of the better options among the spinners that we have available right now, with great customer support – which I had a pleasure of dealing with, they were helpful and fast to respond. Actually the whole team behind this product is very professional, I know a couple of them and dealt with them in the past, they an alright bunch. In this day and age, it is by far the one of the hardest tasks to do online always coming up with fresh content for Google to devour. I love how easy Spin Re-Writer makes it for online marketers to get on with their business and not have to worry about the big G penalising their sites. Of course it's not just about fresh content, but it is certainly a big factor. Thanks Aaron and the team...:) Firstly remember that all of these features are on-top of the CRAZY awesome features of the previous line of Spin Rewriter versions all the way up-to version 6. The software was constantly improved upon over the years to keep up with the industry standards, meet the needs of it’s users and provide you with the ultimate cloud based content spinning software to date. Seriously, if you have a blog or a collection of web 2.0 properties, you want to build some authpority to your additional tier 2 and 3 sites, you want backilinks and endless content for any purpose, then this tool is for you. No matter what business you are in, you are going to need content of some degree and spin rewriter 9 is the perfect solution with out any doubt. Paraphrasing or article rewriting can be tricky, even with the help of an article rewriter. Yes, you heard that right. It’s not always as easy as it may sound while using an instant article spinner you need to be sure that the original wording or style has not been copied. Even if you are citing something, it can still be considered as plagiarism if you don’t do it right. It is important to reread the results of paraphrasing tool just to see if it is making complete sense to you. Also, you may modify the words, phrases or sentences to make them sound more like you, the vocabulary and wording that the audience would recognize and find appealing. Use of plagiarism checker is also advised, just to be on the safe side. After all, computers remain computers; they can never replace human brain. To help and guide you on how to use our best free article spinner online tool, our experts have come up with a list of handy tips. These tips are constructive in preparing you to use article rewriter tool properly. Not only are you getting access to Spin Rewriter 9.0 for the best price ever offered, but also You’re investing entirely without risk. Spin Rewriter 9.0 include a 30-day Money Back Guarantee Policy. When you choose Spin Rewriter 9.0, your satisfaction is guaranteed. If you are not completely satisfied with it for any reason within the first 30 days, you’re entitled to a full refund – no question asked. You’ve got nothing to lose! What Are You Waiting for ? Try It today and get The Following Bonus Now ! Always start with quality content: Quality content means is a unique content on a very specific topic. You have to create unique valuable content which will be more informative for human readers. It’s impossible for a program to produce content that is engaging the users because it just replaces few words without any writing skill. So, It’s a big risk for you if you start with low-quality content and the more risk if you are going to use the alternate version of the articles. He inquired why these creatures just stood there and made no attempt to get away and saw a trainer nearby. “Well,” trainer said, “when they’re extremely young and much smaller we use the same size rope to tie them and, at that age, it is enough to hold them. As they grow up, they may be conditioned to believe they cannot break away. They believe the rope can still hold them, so they never make an effort to break free.”
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657470.23/warc/CC-MAIN-20190116113941-20190116135941-00107.warc.gz
CC-MAIN-2019-04
12,004
26
https://bots.ondiscord.xyz/users/406701517366624256
code
259 this week Sx Bot is a Discord bot featuring live stream alerts, nitro boost tracking, reaction roles, invite tracking, giveaways, fun commands, games, movies, logging, and much more! Come see why we are one of the fastest growing bots! 0 this week Sx Live is a Discord bot featuring Live Stream Alerts, Streaming Roles, and Spotify Roles! PKASH hasn't created any lists.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711232.54/warc/CC-MAIN-20221208014204-20221208044204-00145.warc.gz
CC-MAIN-2022-49
374
5
http://www.sevenforums.com/customization/18088-open-save-swedish-language-pack.html
code
I have used Windows 7 for a week now. After installing Swedish Language pack I got this strange problem. When using "Open" or "Save as" in an application that uses "old style"-dialogues, the "file name" box moves to the file area. It gets very tricky to change the file name. There is no such a problem when using the English interface. I even tested the Serbian language pack and it works fine. Thanks in advance.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00015-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
414
2
http://stackoverflow.com/questions/9065428/how-to-use-jackson-with-a-web-proxy
code
I'm writing class to read from a JSON web service using Jackson. Previously, when reading from a web service I've used a custom web browser class to be able to set certain connection information, such as proxy host/port/username/password, etc as well as read and connection timeout values. Is there a way to do this in Jackson natively? E.g. by setting the proxy parameters in a configuration? Or should I revert back to getting the API response as a string and then using Jackson to parse it? FYI, this is the (simplified) code that I am using. URL configUrl = new URL("http://my.webservice.com/api"); ConfigClass localConfig = mapper.readValue(configUrl, ConfigClass.class);
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010554119/warc/CC-MAIN-20140305090914-00059-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
676
5
https://energymetalnews.com/2018/06/04/cell-phone-battery-inventor-claims-massive-breakthrough-possible-game-changer-on-car-batteries/
code
The scientist who invented the battery used in almost every cell phone in the world has authored a new paper claiming to have made a huge leap forward in technology for electric car batteries. John Goodenough is known as the father of the lithium ion battery, and now has written a paper describing a solid-state battery that provides double the power and increases capacity with use instead of losing it, Axios reports. The claims in the paper have thus-far mystified other battery researchers. “No one outside of Goodenough’s own group appears to understand his new concept. The battery community is loath to openly challenge the paper, but some come close. “If anyone but Goodenough published this, I would be, well, it’s hard to find a polite word,” Daniel Steingart, a professor at Princeton, said to Quartz. His breakthrough would potentially improve battery storage efficiency 30-fold and, better yet, does not require exotic materials. Goodenough is often a candidate for a Nobel prize in chemistry, but this one might finally bring him the prize.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649986.95/warc/CC-MAIN-20230604125132-20230604155132-00225.warc.gz
CC-MAIN-2023-23
1,065
6
https://issues.liferay.com/browse/LPS-118795
code
Steps to reproduce - Create a display page template for an item type that doesn't have form variations (see note below) - Add a fragment with an editable field (for example Heading) - Click on the fragment and click again to focus the editable field. - In the side panel go to the mapping tab. The Source field shows a default value of "unknown-variation(0)" The Source field shows a default value with a human-friendly name of the item type. This issue can currently only be reproduced by developing support for a custom item type. I found it while developing an example. While this could also happen to Blogs Entry, it doesn't because as of today it still has an InfoDisplayContributor implementation active which makes the code avoid the problem.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104293758.72/warc/CC-MAIN-20220704015700-20220704045700-00044.warc.gz
CC-MAIN-2022-27
749
9
http://joblounge.blogspot.com/2008/10/stating-company-revenue-on-resume.html
code
I am an executive for a growing company with annual revenue of $130MM and an aggressive outlook of becoming a $700MM company in a very short time. I have applied for other executive positions internally but the company hires from outside and seems to favor managers from large companies whose current revenue base is $700MM or better. I have similar experience but it is not evident on my current resume. If I applied for positions outside the company I would face a worse situation in that the prospective employers don’t know me. On my resume I accurately state the annual revenue of various companies for which I have worked as well as the annual volume of revenue for which I was directly responsible. That sets the foundation for the accomplishments I state for each job. My resume work history begins in 1985 when I worked for an $80MM division of Xerox. In today’s dollars, the same $80MM is equivalent to $166MM (based on CPI present value calculations), which would be an accurate comparator to a contemporary company of equal size. However, I present the revenue on my resume as $80MM because it is accurate for my time there, but it may make the job appear less than what it was. This is true for other previous employers as well. Am I underselling myself by not stating revenue of previous employers/responsibilities at present value? Should I adjust the revenue data accordingly to allow the reader to assess my job skills today as benchmarked against other candidates today, perhaps younger individuals whose revenue contributions may appear greater simply due to the time-value of money? What’s the right thing to do? You should use the actual dollar amount for the time the revenue was earned. In other words, if in 1985 your division's revenue was $80MM, then you should state $80MM on your resume. Anyone in a position to evaluate you for an executive position should have the financial savvy to understand how $80MM translates into today's dollars. To give more perspective, you might add a clause to your statement that tells the revenue for the entire company. For instance: For this company with $400MM in revenue, served as Department Manager for such-and-such Department with revenues of $80MM. Of course you'll use today's dollars when you state the revenue you manage at your current position. This will clearly demonstrate that you have executive experience in the appropriately high-revenue corporate arena, and should compete with any competitor, no matter what his or her age. Best of luck with this next step in your career!
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121778.66/warc/CC-MAIN-20170423031201-00277-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,561
8
https://dottoratoit.deib.polimi.it/?m=5&id=4&c=&s=All&idd=835769
code
Section: Computer Science and Engineering Tutor: AMIGONI FRANCESCO Major Research topic :Data Reduction of Monitored Data Advisor: PERNICI BARBARAAbstract: Nowadays, monitoring data are collected and processed in various domains, while the utilization of monitoring data remains an open question. The scale and size of data brings information systems a heavy burden, which requires new techniques to derive information quickly. We design a data reduction technique based on correlation model, and exploit it in data centers. On the other hand, the variety of monitoring data has brought many new observations of the environments, while how to integrate those new data into knowledge still needs investigation. We explore the possibility of utilizing various monitoring data in IoT to enhance the adaptability of services, namely, enable the service to diagnose and adapt to sensor faults. Data Reduction in Monitored Data Nowadays, increasing time series data has brought new challenges in many domains because their massive instances, dimensions, speed and complexity. In order to solve this problem, data reduction techniques are becoming an integral part of future systems, especially for Monitoring System. Different from most data reduction techniques which are based on information theory, this paper is planning to explore a novel model-based method, which tries to build piecewise regression models only for correlated data with guidance of priori knowledge, avoiding unnecessary computation between unrelated data streams. Until now, we have designed a primal data reduction framework, corresponding experiments and evaluation criteria. Advisor: Professor Barbara Pernici
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865098.25/warc/CC-MAIN-20180623152108-20180623172108-00158.warc.gz
CC-MAIN-2018-26
1,680
8
https://tracker.moodle.org/browse/MDL-40247
code
- Set course format to weeks and show all sections in one page to true - Change the name of one of the sections and leave all others as default dates - move a section without name on top of the one with name. - make sure after the change, the names are not messed as they are now - Refer https://tracker.moodle.org/browse/MDL-33546?focusedCommentId=229056&page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#comment-229056 for screen shots.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00095.warc.gz
CC-MAIN-2022-33
458
5
https://codedump.io/share/Qz12sm92Xs50/1/push-local-branch-to-remote
code
I have created local branch: git checkout -b tmp1 git push remote_tmp1 tmp1 fatal: 'remote_tmp1' does not appear to be a git repository fatal: Could not read from remote repository. Please make sure you have the correct access rights and the repository exists. You are getting that specific error because you have not added remote_tmp1 as a remote repository. Add the remote repository first and then retry pushing: git remote add remote_tmp1 https://remoteserver.com/repository.git git push --set-upstream remote_tmp1 tmp1 You can add the remote using https as above or with ssh if available. For example if you're using Github you can use either:
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945484.58/warc/CC-MAIN-20180422022057-20180422042057-00388.warc.gz
CC-MAIN-2018-17
648
13