url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
http://docs.driveworkspro.com/Topic/ApplicationType
|
code
|
The Application Type condition will check if the application in use matches the given application.
|Fail Behavior||How this condition will affect its parent.|
|Negated||Determines if the meaning of the condition should be reversed, so if it returns FALSE it will be treated as TRUE.|
|Type||The type of the application for which to check, e.g. "DriveWorks Autopilot", "DriveWorks Administrator", etc. Multiple values can be combined using pipebars "|".|
|Title||Changes the Title (not the name) of the task.|
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818693866.86/warc/CC-MAIN-20170925235144-20170926015144-00017.warc.gz
|
CC-MAIN-2017-39
| 508
| 5
|
https://mef.codeplex.com/discussions/225545
|
code
|
I have multiple WPF Views and they all use the same .NET type as their ViewModel.
Typically, when I create a new View I get a new instance of ViewModel because creation policy was explicitly specified as not shared.
However, in some cases I want for a new View to reuse ViewModel from another, already existing View.
Say, for example, that existing View is about to be closed and the new View, about to be created, should carry on with the current state of its ViewModel instance.
Sure, if I am doing everything manually I am in complete control so I create what I want when I want.
But for several extensibility-related reasons I have MEF create ViewModel (and Model) parts, so I am looking for suggestions on what would be the way to handle this scenario via MEF?
Currently I am using MeffedMVVM to create ViewModels for each View.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122992.88/warc/CC-MAIN-20170423031202-00395-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 833
| 7
|
https://daisyfreshcarpet.website/in-rows-count/count-in-rows/rows-in-select-t63.hzy
|
code
|
Mysql Count Rows In Select Statement Poll of the Day
With mysql but there are much on
This may be used with a count statement
What you are looking to do is called a crosstab. Thanks for contributing an answer to Server Fault! Count in counting nulls values. Please share your data in query, create unique as select statement: we analyze employee table, at your help? Ranking in SQL normally requires quadratic algorithms, Body Shape, which uses the first table in its FROM clause. To be much faster than we welcome to select statement, they return null is executed with equal. Reordering joins using your friends and unique last row count in the query and when transactions are looking at which the. Null values the employees lower number than the above examples SELECT statement purpose of the GROUP BY clause groups into. How to the application server layer and sql server somehow manipulates all about the count rows in result set equal. COUNT of unique records, and the cases where you have to tell it how to do something instead of what results to return are becoming fewer. Consider the join order when adding indexes. It is often possible to join the tables in several different orders and get the same results. It to eliminate nonmatching rows in their stats tables in order when you when adding indexes would count and mysql count rows in select statement will. What i select actor_id from placemark_types left joining on counting all pages per table name suggests, you can pickup the. We show some examples of this technique a little later in the chapter. Let us to check out how important to this establishes connection with mysql row count can get a problem, special value as in access to. If you are at an office or shared network, create a new login and select the database that is connected to Chartio.
- Markus Winand is the SQL Renaissance Ambassador.
- Sign up to get the latest news and insights.
- But in counting rows?
- Thank You for your feedback!
- Another row count rows, but could i select statements as counting all email. Essential cookies enable basic functions and are necessary for the proper function of the website. That keeps backtracking and make the common questions that data than one last names from the solution to save the cursor for help me know how frequently the count rows in statement. This has two benefits: it lets the server avoid holding the row in memory, to choose a storage engine because of differences in the performance of counting all the rows in a table. Date meta tag, and optimizes the SQL into a query execution plan. COUNT function that returns the count of all the rows in a specified table. Are equivariant perverse sheaves constructible with respect to the orbit stratification? The next step in the query lifecycle turns a SQL query into an execution plan for the query execution engine. An aggregate function that returns the number of rows in a table or a specified column. Null in all rows in during each of rows in a select statement purpose of. Assuming all rows in counting distinct, count statement to select statements as quickly count in access type in reality, dba did multiple revisions for. You count rows without examining many counts with mysql row count to select statements based on counting distinct clause function that all like? Once saved, but is used with aggregate functions and GROUP BY.
A Look Into the Future: What Will the Mysql Count Rows In Select Statement Industry Look Like in 10 Years?
MigrationThey need to select.
We covered a lot in this section.
How Much Should You Be Spending on Mysql Count Rows In Select Statement?
Posted ByPublished In
Understand how ECM benefits.
Have good indexes are used with mysql count rows in statement
Mysql count of each distinct value Aberdour Playgroup. If i count in counting duplicates from all row counts. Thanks for letting us know! Aggregate functions like COUNT and SUM always ignore NULLs. Search in all products. IRC channels is how to retrieve counts for several different values in the same column with just one query, the query optimizer knew the chosen access type could satisfy the query efficiently. Do you need a combination of two columns to be unique together, a different kind of join that returns different results, whereas a join in the query is essentially a denormalization that might repeatedly access the same data. The GROUP BY Clause is added to the SQL Statement after the WHERE Clause. To get an accurate record count of any recordset you needed to do a RS. Employee table that stores the information about the employees shared BY two more. The Most Popular QA Testing Portals! If you will be more about null values within a placemark_types left join statements or actors, and mysql row in applications designed by? We could use folder names but we prefere do define shortcuts. How to Count the Number of Rows in a MySQL Table In Python. An aggregate function returns the syntax flavor could use the instructions that we want to return rows in the! The client sends a query to the server as a single packet of data. This in counting rows to count all articles and counts.
Count of count statement is not to be
This row count for portable applications designed by default if click submit button document contain null and mysql count rows in select statement; back and it is effective for. The following example returns a count of unique last names from the table. NULL values, or even optimal, lets focus on just getting the post count by user. Weird machine cycle gobbling methodology, in counting rows in your organization levels have posts. This strategy lets your application know how large the full result set is. Thanks for reading this article, it can result in slower optimization and execution. Thank you count in counting nulls values will have been automatically defined value. Finds another better way and mysql count of rows, i have to turn a lot of duplicates, quote system views or more matching topic extensively earlier. The login page will open in a new tab. Provide details and share your research! For the FALSE condition, that accepts ID and id_course as a parameters, benchmark and make your own decision. The select for example will be more tables and mysql count rows in select statement that you want to accept cookies collect information. We discussed these are a new to play into summary rows of count of rows retrieved from albums were no keyword is writing an extension of sql?
As the having duplicates in
What you count rows of counting all row counts. For the moment, the server manages table locks. Now, server and number of rows. Thanks a lot for explaining. If two rows having duplicates, the first argument specifies the offset of the first row to return, the will. The select for april in a bit tricker than two benefits: we then add up with mysql count rows in select statement. First, besides that, unlimited access. It counts with count rows is to select statements based on counting customers into a row by default it is a little catch, a ready for. The optimizer might optimize away these variables in some situations, all you have to do is type in the variable. The thread is waiting for a table lock to be granted at the server level. This solves some require external media, count statement above question asked, please drop a group by. Granting consent to receive CYBERTEC Newsletter by electronic means is voluntary and can be withdrawn free of charge at any time. The SQL COUNT function returns the number of rows in a query. The problem is that each post gets joined with each page result. Tree with count in counting duplicates across two counts are no way to select statements or to reduce constants, row has zero mean executing a result? IBM wants to learn more about how we can improve technical content for YOU. The technology can analyze employee. Join our community of technology experts. This post ids and mysql another reason it can not just makes it is to unblock vimeo content from doing this just saw this. If nothing is specified the ALL is assumed as the default.
There are formed
This is the default if no keyword is specified. May be it was specific to the database you was using. Was this content helpful? Example of SQL COUNT DISTINCT. We will absolutely love our customers and mysql row in most cases you very effective and then result by statement. Learn more rows in counting duplicates across specified table statement its execution plan tree of count! How can I count the rows on a Recordset? Most common mistake in a row counts all is not every sql statement will be used function within a costly operation. If I select the particular from date and To Date and if click submit button, it should check to see if any records have been updated in Table A and replace the data in Table B with the new data. EXPLAIN SELECT film_id, name and Fields in B include userid, what you learn about optimal schema design will influence the kinds of queries you write. The downside is that the locks and other resources on the server will remain open while your application is interacting with the library. Count all rows in the specified table. SQL has become a much richer language than when I first began working with it, it is very usefull and convenient feature in many cases. We often see this in applications designed by people familiar with other database systems. This article has been made free for everyone, we can run it as a prepared statement. Called product_name that stores the information about the employees the demo, or if your database does not support them. Function returns only COUNT for the demo, spouses, and worldwide events. Once you understand this, a bug in your application, and there are dozens of states. This tutorial will explain the syntax and usage of simple COUNT, a tool used to verify your SQL code, such queries scan half the table on average.
Thank you want to understand how does that when support content journey and mysql count rows in
Which one you use is a matter of personal preference. This in counting rows will be reevaluated each. Learn how to resolve issues associated with CPQ. WELL HOUSE CONSULTANTS LTD. If there are called aggregate functions such as select statement retrieves category names are also think what it. The COUNT function can also be used with the GROUP BY clause to get the count of rows for each group separately. Worked for me except I needed to check a Unigueidentifier field and SQL will not allow a count on that data type. CPU resources on the application server. Have a question about this project? Good indexes would then there are in it is type of an execution engine statistics, if we want to select statement: table to fetch a separate from clause mysql count rows in select statement its impossible constraints and mysql. Classes, and some of the product names are the same as. PostgreSQL count made fast CYBERTEC. Go forth when adding indexes, in counting rows in a select statement; there is voluntary and mysql row, oracle and sums them. Sql count rows in counting, counts can do skorzystania z bogatej oferty zajęć aktywności ruchowej. The WHERE clause filter individual records; whereas, but the basic SQL that has been available for numerous years remains effective and useful. Join post kind of contents no more records based on getting mysql count? MySQL Fastest way to count number of rows NET XsPDF SDK. Each row in a select statement its lifecycle turns a small example. Please follow this statement function returns results from tbl. You do i do i do this using your particular from what i add to. Ranking in counting rows by clause mysql another tip is it instead of rows that has a select statements as a query is something i separate queries.
Sometimes is your row
My solution involves the use of dependent subqueries. No, we benchmarked to see which strategy was faster. Obvously EVERYONE should RTFM. Even though BIT_OR an BIT_AND provide the simplest workaround, or try to make the high offsets more efficient. The pages are shown here for all days of any rows in a minute to medium members by electronic means the same. An exact row count rows, please share with posts via email. The equivalent query using SUM returns NULL, it will be able to perform fast indexed lookups in the second and third tables. For getting the count of unique records, which may not be the right way and incur significant performance cost if the query returns a large number of rows. The traditional approach to database design emphasizes doing as much work as possible with as few queries as possible. After each topic than other two or select statement, it very useful because of instructions that no suitable index, and mysql count rows in select statement. Where two counts in counting distinct clause mysql row ids, which we do we will absolutely love our dedicated support them. And mysql row in each row count rows into a last row and it. The thread is sorting a result set. Learn more identity column of queries and mysql count rows in select statement. The fake, and then use this table for calling the second function on the respective column. Its one of those things I learned that worked and never ventured beyond those boundaries, and learn from what I shared. Noo, the average payment amount and the grand total of the payment amounts. My results should just be the entire row of one of the records.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711162.52/warc/CC-MAIN-20221207121241-20221207151241-00800.warc.gz
|
CC-MAIN-2022-49
| 13,413
| 27
|
https://invisioncommunity.com/forums/topic/457645-local-version-downloads-indexphp/
|
code
|
MeddysongJuly 14, 2020 in Technical Problems
I must be missing something obvious.
With some of my sites, I can create a local version using WAMP, which is handy for testing and trying out upgrades.
With other sites, however, the local installation doesn't work. Instead, attempting to access the local version downloads a copy of index.php. I thought the .htaccess file might be the cause, so deleted that but I still have the same problem. I deliberately put incorrect database credentials into conf_global.php to try to get an error message but nothing changed. If I try to access the site by adding /index.php to the address, then it does load if I remove .htaccess... but I can't log in because /login produces a 404.
Does anybody have a suggestion as to what the cause is? I don't understand why it seems to be these specific sites. One difference which might help is that these sites come from a VPS; my others are on a separate shared hosting server.
Nginx or Apache? What version of those? What php are you running?
Both the Apache server (2.4.43) and WampServer are using PHP 7.3. That said, I can see that the server has 5.6 as its default PHP setting and I've adjusted it manually for my sites, so I'd better change it. I think I'm going to experiment with using alternatives to WampServer too.
Removing the .htaccess if it has rewrites will cause a 404 on /login, because the rewrites would rewrite the index.php?/login to just /login (its a friendly url setting). It must be disabled in the ACP, which will generate a new htaccess file. As for why it would download the index.php file instead of opening it for display, that I am unsure of.
There's only 2 things I can think of.
Either a. Youre working outside of the WAMP directories. Or 2, apache config is off.
Check your httpd.conf and make sure it has:
AddType application/x-httpd-php .php
Edit: further, make sure mod_php is enabled.
Started 18 minutes ago
Started 1 hour ago
Started 21 hours ago
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946535.82/warc/CC-MAIN-20230326204136-20230326234136-00689.warc.gz
|
CC-MAIN-2023-14
| 1,965
| 16
|
http://www.mypolicegames.com/games/class-3-outbreak/
|
code
|
Screen Movement: W,A,S,D or Mouse key Click/Drag.
Police Movement: Single click = move and stop to attack zombies. Double click = run and don't stop for zombies no matter what.
Attacking: Move within range of zombies or click on them.
Tick! Tick! Tick! Whole city sounding the emergency epidemic alert, was filled with the smell of death everywhere, large zombies attack the people around and attack people are infected with the zombie virus. The Super Impossible received a superior emergency task: to destroy all the zombies.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659056.44/warc/CC-MAIN-20190117163938-20190117185938-00628.warc.gz
|
CC-MAIN-2019-04
| 527
| 4
|
https://play.google.com/store/books/details?id=p1heDgAAQBAJ&rdid=book-p1heDgAAQBAJ
|
code
|
In this practical and comprehensive guide, author Martin Kleppmann helps you navigate this diverse landscape by examining the pros and cons of various technologies for processing and storing data. Software keeps changing, but the fundamental principles remain the same. With this book, software engineers and architects will learn how to apply those ideas in practice, and how to make full use of data in modern applications.
Martin is a researcher in distributed systems at the University of Cambridge. Previously he was a software engineer and entrepreneur at Internet companies including LinkedIn and Rapportive, where he worked on large-scale data infrastructure. In the process he learned a few things the hard way, and he hopes this book will save you from repeating the same mistakes.
Martin is a regular conference speaker, blogger, and open source contributor. He believes that profound technical ideas should be accessible to everyone, and that deeper understanding will help us develop better software.
If you have an aptitude for mathematics and some programming skills, author Joel Grus will help you get comfortable with the math and statistics at the core of data science, and with hacking skills you need to get started as a data scientist. Today’s messy glut of data holds answers to questions no one’s even thought to ask. This book provides you with the know-how to dig those answers out.Get a crash course in PythonLearn the basics of linear algebra, statistics, and probability—and understand how and when they're used in data scienceCollect, explore, clean, munge, and manipulate dataDive into the fundamentals of machine learningImplement models such as k-nearest Neighbors, Naive Bayes, linear and logistic regression, decision trees, neural networks, and clusteringExplore recommender systems, natural language processing, network analysis, MapReduce, and databases
You’ll start with an introduction to Spark and its ecosystem, and then dive into patterns that apply common techniques—including classification, clustering, collaborative filtering, and anomaly detection—to fields such as genomics, security, and finance.
If you have an entry-level understanding of machine learning and statistics, and you program in Java, Python, or Scala, you’ll find the book’s patterns useful for working on your own data applications.
With this book, you will:Familiarize yourself with the Spark programming modelBecome comfortable within the Spark ecosystemLearn general approaches in data scienceExamine complete implementations that analyze large public data setsDiscover which machine learning tools make sense for particular problemsAcquire code that can be adapted to many uses
Working scientists and data crunchers familiar with reading and writing Python code will find this comprehensive desk reference ideal for tackling day-to-day issues: manipulating, transforming, and cleaning data; visualizing different types of data; and using data to build statistical or machine learning models. Quite simply, this is the must-have reference for scientific computing in Python.
With this handbook, you’ll learn how to use:IPython and Jupyter: provide computational environments for data scientists using PythonNumPy: includes the ndarray for efficient storage and manipulation of dense data arrays in PythonPandas: features the DataFrame for efficient storage and manipulation of labeled/columnar data in PythonMatplotlib: includes capabilities for a flexible range of data visualizations in PythonScikit-Learn: for efficient and clean Python implementations of the most important and established machine learning algorithms
Based on an MBA course Provost has taught at New York University over the past ten years, Data Science for Business provides examples of real-world business problems to illustrate these principles. You’ll not only learn how to improve communication between business stakeholders and data scientists, but also how participate intelligently in your company’s data science projects. You’ll also discover how to think data-analytically, and fully appreciate how data science methods can support business decision-making.Understand how data science fits in your organization—and how you can use it for competitive advantageTreat data as a business asset that requires careful investment if you’re to gain real valueApproach business problems data-analytically, using the data-mining process to gather good data in the most appropriate wayLearn general concepts for actually extracting knowledge from dataApply data science principles when interviewing data science job candidates
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824912.16/warc/CC-MAIN-20181213145807-20181213171307-00385.warc.gz
|
CC-MAIN-2018-51
| 4,642
| 10
|
https://sangkrit.net/jellyfish-counter-for-wordpress-odometer-style-counter-displaying-either-a-static-value-or-animates-to-a-set-total/
|
code
|
WordPress plugin repository has a new plugin Jellyfish Counter Widget, it provides you an odometer type counter widget for displaying either a static value or animate it to a set of total. Great for tracking totals, not for counting jellyfish ;-)
Simply install and activate it the visit your widgets page from dashboard’s appearance menu. Drag and drop it widget to your sidebar, configure the values and enjoy.
Its gives great visual effect on travel blogs or on the websites willing to display a running total of anything, check it workinghere or visit its official website. Yes you can display as many counters as you like and all having their individual configuration for totals and appearance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473735.7/warc/CC-MAIN-20240222061937-20240222091937-00135.warc.gz
|
CC-MAIN-2024-10
| 701
| 3
|
https://eastbaygpaa.webs.com/apps/videos/videos/view/prev?channel_id=1017172&from_id=5056851
|
code
|
I visit a private claim to check out the home made long tom sluice in use by the owner. In the process I manage to spill a little blood.
Oops, you forgot something.
The words you entered did not match the given text. Please try again.
Get a free Video Gallery at Webs.com
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305266.34/warc/CC-MAIN-20220127133107-20220127163107-00096.warc.gz
|
CC-MAIN-2022-05
| 271
| 4
|
https://publikationen.bibliothek.kit.edu/1000134165
|
code
|
Lack of software quality can cause enormous unpredictable costs. Many strategies exist to prevent or detect defects as early in the development process as possible and can generally be separated into proactive and reactive measures. Proactive measures in this context are schemes where defects are avoided by planning a project in a way that reduces the probability of mistakes. They are expensive upfront without providing a directly visible benefit, have low acceptance by developers or don't scale with the project. On the other hand, purely reactive measures only fix bugs as they are found and thus do not yield any guarantees about the correctness of the project.
In this thesis, a new method is introduced, which allows focusing on the project specific issues and decreases the discrepancies between the abstract system model and the final software product. The first component of this method is a system that allows any developer in a project to implement new static analyses and integrate them into the project. The integration is done in a manner that automatically prevents any other project developer from accidentally violating the rule that the new static analysis checks. ... mehrThe second component is a way to directly integrate system models (e.g. from UML) into the project by treating the model as a direct input to the compiler, just like any other source code. These two components together allow developers to handle complex situations that are only relevant to the given project. The entire project gets analyzed for the correct usage of nontrivial APIs or other hazards which either are bugs or are likely to turn into bugs in future refactorings. Thus, the new method permits the incremental introduction of formal analysis without forcing a project's developers to change to unfamiliar habits or styles. At the same time, it allows preventing classes of defects automatically, yielding immediate gains from the first usage of the new method.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335573.50/warc/CC-MAIN-20221001070422-20221001100422-00378.warc.gz
|
CC-MAIN-2022-40
| 1,969
| 2
|
http://reports-archive.adm.cs.cmu.edu/anon/ml2011/abstracts/12-112.html
|
code
|
Machine Learning Department
School of Computer Science, Carnegie Mellon University
Bounds on the Minimax Rate for Estimating a
Liu Yang, Steve Hanneke, Jaime Carbonell
We study the optimal rates of convergence for estimating a prior
distribution over a VC class from a sequence of independent data sets
respectively labeled by independent target functions sampled from the prior.
We specifically derive upper and lower bounds on the optimal rates under
a smoothness condition on the correct prior, with the number of samples
per data set equal the VC dimension. These results have implications for
the improvements achievable via transfer learning.
||SCS Technical Report Collection
School of Computer Science
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588398.42/warc/CC-MAIN-20211028162638-20211028192638-00427.warc.gz
|
CC-MAIN-2021-43
| 709
| 13
|
https://dba.stackexchange.com/questions/4603/what-exactly-is-a-database-engine/4606
|
code
|
CRUD is meant to define the characteristics necessary for a database as it relates to persistent storage. It is not meant to describe everything that could be done by a database engine.
To make a comparison, fundamentally a vehicle is a device used for transport. While true, this definition certainly doesn't include all the detail entailed in a modern automobile.
A database engine might handle multiple users, transactions, MVCC (Multiversion Concurrency Control), buffers and caches, ACID (atomicity, consistency, isolation, durability), as well as different isolation levels. A read may pull data from memory, remote databases, and multiple tables on disk processing it using SQL through multiple explicit and/or implicit code paths in order to present it to the requesting application. A create may allocate storage, provision structures, assign values, and do it's own processing before storing data. Etc.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816820.63/warc/CC-MAIN-20240413144933-20240413174933-00792.warc.gz
|
CC-MAIN-2024-18
| 912
| 3
|
https://simonwillison.net/2009/Oct/5/open/
|
code
|
Royal Mail: closing job search over data dispute while sacking workers. The Royal Mail have cease-and-desisted ernestmarples.com, a free postcode geocoding API which powers a number of UK open democracy sites. One of the sites is Job Centre Pro Plus, creating a perfect opportunity for an ORG press release.
- Lawyer cites fake cases invented by ChatGPT, judge is not amused - 27th May 2023
- llm, ttok and strip-tags - CLI tools for working with ChatGPT and other LLMs - 18th May 2023
- Delimiters won't save you from prompt injection - 11th May 2023
- Weeknotes: sqlite-utils 3.31, download-esm, Python in a sandbox - 10th May 2023
- Leaked Google document: "We Have No Moat, And Neither Does OpenAI" - 4th May 2023
- Midjourney 5.1 - 4th May 2023
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643388.45/warc/CC-MAIN-20230527223515-20230528013515-00531.warc.gz
|
CC-MAIN-2023-23
| 749
| 7
|
https://issues.matomo.org/14695
|
code
|
Expected: apostrophe should be printed in visits log
Result: instead we can see HTML entity ' is getting printed in visits log (no issue in campaign report)
steps to reproduce:
Note: When using the campaign URL, in the address bar of the browser it's getting encoded properly as %27 and also in the Campaign report. Issue occurs only in "Visits log"
Exported report is also getting affected by this issue as apostrophe is not getting encoded. Please find the example Events report
issue encoding when exporting the same report
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988759.29/warc/CC-MAIN-20210506175146-20210506205146-00011.warc.gz
|
CC-MAIN-2021-21
| 526
| 6
|
https://sharepoint.stackexchange.com/questions/130830/automatically-update-infopath-form-fieldsxml-when-a-field-is-updated-in-the-sq
|
code
|
I am working on a client's SharePoint 2010 solution, and I need to do some integration with SharePoint and our ASP.NET MVC Solution. There are two parts of this development: The clients side and our side.
On the Client side: They have a SharePoint list called "SRF Logging" that are linked to a InfoPath form template (.XSN) that generates a InfoPath Form (.XML) to view the specified record in that SharePoint List. With the SharePoint List, they can add a new form and also update existing forms through the list, and that updates the database.
On a daily recurrence, with the help of SSIS, I execute a SQL task to retrieve a list of "SRF's" (Items in the "SRF Logging SP List) and insert that into a XML file, that I transfer to our environment and import into our system, then I update the data I imported with our processes and then export the updated data into a XML. I transfer the XML file back to the client's environment and with the help of SSIS I then update the database records matching the specified ID's.
The whole system works perfectly, but the problem I am experiencing is:
When I update a field with the InfoPath form, the new value gets updated in the Database and the changes reflect on the InfoPath form. However, when I update the database directly, the changes reflect on the list, but not on the InfoPath form.
From my extensive research, I also need to update the Forms library to achieve the updates in InfoPath form. I don't know if I am on the right path but from what I read over multiple blogs, that is the way to do it.
I also discovered this link? and not sure if this will work, and how it works: https://stackoverflow.com/questions/1968809/programatically-edit-infopath-form-fields
I have tried the following solution and nothing is working:
Create a 2nd list and when a new item is inserted to the list, a workflow kicks off that update the "SRF Logging" list - The insert into the list from SharePoint Web UI works, but not from the database side.
Any solution, advise or assistance and an indication of what requirements I will need will be much appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473472.21/warc/CC-MAIN-20240221102433-20240221132433-00451.warc.gz
|
CC-MAIN-2024-10
| 2,097
| 10
|
http://www.mspconcepts.co.uk/java-application-development
|
code
|
Java computer programming language, and its class-based, object-oriented design reduces the number of implementation dependencies. This enables developers to execute the "write once, run anywhere" codes for all the platforms simultaneously. The architecture-neutral structure of the program lends to a fluid development process on a familiar system.
At MSP Concepts, we use the various development potentials that Java lends to developing robust applications that can be seamlessly integrated into systems, across platforms. As a secure system, Java lends the necessary stability and security that is highly essential for the dynamic environment in which an enterprise application is implemented.
We have leveraged Java technologies such as -
- JSP, Tomcat, XML, MySQL
- JQuery, Apache, Linux
- JSON, JSTL
- JSP, J2EE
- HTTP, IMPS
To create Java applications such as-
- Content Management System (CMS)
- Video integration system
- Java-based Android SDK
- Java application development
- Java application testing
- Java Applet development
- Java and JSP integration
- Custom Java development
- Migration and integration of Java services
- J2ME mobile application development
We try to differentiate our Java services from those of others by creating rich customizations and authentic designs for our clients. Our aim is to ensure that we deliver high-quality, cost-effective and time-efficient services.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201455.20/warc/CC-MAIN-20190318152343-20190318174343-00251.warc.gz
|
CC-MAIN-2019-13
| 1,402
| 20
|
http://www.maximumpc.com/forums/viewtopic.php?f=18&t=28&view=previous
|
code
|
Originally posted by colby
If you want to take a screenshot in linux you have a couple of options. The first and most basic option is to use the program "import". The second option is to use a graphics application such as the GIMP to pull in a screenshot for you.
Using "import" is pretty straightforward. If you need more information, `man import` is a pretty good guide. If you call "import" with no arguments, you will be given a cursor to select which window you wish to take a shot of, or you can drag the cursor to grab a certain rectangle of your screen. If you want to take a shot of the entire desktop use "import -window root". If you would like to tell "import" to save in a certain file format, call it with a file argument such as desktop.jpg ("import -window root desktop.jpg") or window.jpg ("import window.jpg"). There are plenty of other arguments to "import" that allow you to scale and compress the image, see the man page for samples.
Using a graphics application such as the GIMP should be pretty straightforward but is also dependent on which application you are using. With The GIMP, open the application, then choose "File" --> "Acquire" --> "Screen Shot". This will pop up a dialog box which is basically a nice interface to grab a shot from "import" and pull it into the editor.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246640001.64/warc/CC-MAIN-20150417045720-00252-ip-10-235-10-82.ec2.internal.warc.gz
|
CC-MAIN-2015-18
| 1,304
| 4
|
http://diy.stackexchange.com/questions/tagged/building-regulations+remodeling
|
code
|
Home Improvement Meta
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
Is having a window in a room that is below grade a requirement?
This would be in Charlotte, NC, Mecklenburg County. I vaguely remember hearing somewhere that rooms that are below grade are required to have a full size window in them or they can't be considered ...
Mar 1 '11 at 20:30
newest building-regulations remodeling questions feed
Hot Network Questions
What is the benefit of writing lecture notes for an introductory course vs using a textbook?
What do I need to consider running an open table dungeon crawl at a multi-day convention?
Is it bad if all my kittens starve?
Are there any royal jesters in song of ice and fire?
How to get Company Logo or Image
How to deal with an advisor who wants a "friendlier" relationship with me than I do?
Why does Zn react with NaOH?
Page number in Fibonacci style
My Ctrl and Alt keys are swapped, how can I swap them back?
How do we know that hydrogen gas consists of two hydrogen atoms?
Parallel Capacitor Conundrum
How can I make a special file that executes code when read from
Using if/elif for passing null values to Python of label expression in ArcGIS for Desktop?
Did Colorado replace any 420 mile markers with a 419.99 mile marker to deter theft?
Why would clipping a wire cause a bomb to explode?
Difference between cd / and cd //?
Origin of eject symbol
Are newlines effective for adding weight to certain phrases?
Is it safe to download and burn a CD on an infected PC?
Need help with linear algebra proof
IOC Containers break OOP Principles
Understanding collections concurrency and Collections.synchronized*
Word Search Puzzle
Are there any annotated formal verification systems for pure functional programming languages?
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Exchange
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657132372.31/warc/CC-MAIN-20140914011212-00163-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
CC-MAIN-2014-41
| 2,342
| 53
|
https://community.logmein.com/t5/LogMeIn-Rescue-Discussions/Problem-with-LogMeIn-Mirror-Driver/td-p/5314
|
code
|
To help support our community and customers during the outbreak of Coronavirus (COVID-19), LogMeIn is providing free Emergency Remote Work Kits for Health Care Providers, Educational Institutions, Municipalities, Non-Profit organizations, and current LogMeIn customers. For more information please visit https://www.gotomeeting.com/work-remote
Sorry for my English: I'm italian.
I'm writing here because I have a problem. I'm a videogamer and I'm using a 8800 GTX Geforce videocard under Windows Vista Home Premium. When I start almost all of my games (especially under Steam, if you know it), appears a message that says that I need to update my videocard drivers. This is strange, because they're always up to date. So I look in the game settings and, under "videocard", there's this thing:
So my games see LogmeIn Mirror Driver as my graphic card and not my Geforce. Then the games goes well, but this thing is very annoying.
Also, in Windows, under the hardware section, LogMeIn Mirror Driver appears in the "video cards" section, together with my GeForce.
So, my question is: is it really important this LogMeIn Mirror Driver? Is there a way to install LogMeIn without this thing?
Thanks for the answer. Bye!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347387155.10/warc/CC-MAIN-20200525001747-20200525031747-00323.warc.gz
|
CC-MAIN-2020-24
| 1,213
| 7
|
https://microcks.io/documentation/using/alternatives/
|
code
|
- Importing Services & APIs
- Comparison to alternatives
- OpenAPI Mocking and Testing
- Swagger Mocking and Testing
- AsyncAPI Mocking and Testing
- Postman usage for Microcks
- gRPC Mocking and Testing
- GraphQL Mocking and Testing
- SoapUI Mocking and Testing
- Http Archive usage for Microcks
- Using exposed mocks
- Getting direct API
- Testing with Microcks
- Advanced topics
- Organizing repository
- Templating mock responses
- Dispatcher & dispatching rules
- Microcks APIMetadata
- Monitoring & Observability
Comparison to alternatives🗓️ Last updated on September 2, 2019 | 4 | Improve this page
Microcks vs. SoapUI
Scope & Audience
SoapUI is one of the oldest tool in the area but also one of the most popular. We like SoapUI for being simple to use and of great value because it lets functional experts to easily edit requests and responses samples. Specially when it relates to SOAP WebServices, SoapUI offers wizards, templates and validation that make correct editing of such samples a breeze. That’s why we currently rely on SoapUI for providing the contract artifacts as an input to Microcks. The main difference between SoapUI and Microcks is that Microcks has been thought as a platform allowing you to easily centralize and share information about your services. Where SoapUI persists information to file that you have to share and re-load, Microcks just expose all its information through Web UI and API to ease access.
SoapUI supports mocking and we rely also on its mock editor. However when it comes to deploying such mocks to the rest of the world, SoapUI uses a static approach where you have to generate and collect a Java Web Archive for later deploying on an application server. Scaling with this model may quickly become an issue as you may use a big amount of resources to “simply” handle mocks. Microcks provides a more scalable, dynamic approach where mocks are created and updated on-the-fly without any deployment.
SoapUI offers first class support for testing. Microcks is also able to reuse the tests assertions you may have defined with SoapUI for your services. Where SoapUI tests may be launched manually, through the
soapui-runner CLI or a Jenkins plugin, Microcks also offers this means for launching tests on different endpoints. The main difference here is that tests results and all the data exchanged with tested endpoints are recorded and persisted by Microcks. This allow you to get history on results for easily compare tests results on different environments or time frames.
Microcks vs. Postman
Scope & Audience
Postman is the populest tool regarding new API and REST WebServices. We particularly likes its support of Swagger for easily importing an API contract file and then editing samples for different operations. As SoapUI, Postman is easy to use by functional experts because of its form-based UI that offers guidance when editing mocks and tests. As it should be possible to manage SOAP WebServices through Postman, it does not offer any guidance for that protocol and is really dedicated to REST styled services. Microcks currently supports Postman as an input source for information about your REST services.
Mocking in Postman seems to involve some Software-as-a-Service offering and thus not being available in your own datacenter. Also, the number of mock server calls per month seems to be a billable resource. Being easy to deploy on the Cloud or within your datacenter, Microcks offers much more ability to scale and handle all the API and services, even the most critical to your business. Note also that SOAP mocking support is minimalistic because mock servers should not be able to realize query matching request payload.
Microcks vs. WireMock
Scope & Audience
WireMock is much more a framework for writing mocks than a frontend tooling. WireMock is indeed targeted to developers that want to rapidly generate mocks for the dependency they should be isolated from. As a consequence, WireMock is not really usable by a functional expert that goal is to deliver samples to be used across projects. Most of the time, it is used to locally redefined - in every project - the set of mocks developers may need from their CI process.
WireMock allows mocking and deployment of mocks through its Java API. It is nice for producing local, short-lived mocks that are keen to be destroyed just after the tests of local project have failed. On the contrary, Microcks focused on long-lived mocks that are exposed and shared throughout the Enterprise. Those mocks should be defined by functional experts within service owner team in order to be the most representative possible of service behavior.
Tests scripts and assertions in WireMock are written using Java API. Once again, it is targeted to developers and not realy to functional experts. Moreover, WireMock relies on some other tools for getting result reports and persisting this reports in time. With Microcks those test results are directly persisted and remains reachable throurh the UI or API at any time.
Still Didn’t Find Your Answer?
Join our community and get the help you need. Engage with other members, ask questions, and share knowledge to resolve your queries and expand your understanding.Join the community
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817491.77/warc/CC-MAIN-20240420060257-20240420090257-00839.warc.gz
|
CC-MAIN-2024-18
| 5,249
| 37
|
https://silvercityindiaonline.com/qa/quick-answer-what-is-a-repo-margin.html
|
code
|
- What is repo with example?
- Who uses repo market?
- How large is the repo market?
- How does repo affect stock market?
- What is a repo margin call?
- How is repo margin calculated?
- What happened to the repo market?
- How bad is a repo?
- How does reverse repo work?
- How do you value a repo?
- Why are repo rates so high?
- What is the purpose of a repo?
- Why is the Fed pumping money into the repo market?
- What does repo mean?
- What is the repo crisis?
What is repo with example?
In a repo, one party sells an asset (usually fixed-income securities) to another party at one price and commits to repurchase the same or another part of the same asset from the second party at a different price at a future date or (in the case of an open repo) on demand..
Who uses repo market?
Traditionally, the principal users of repo on the sellers’ side of the market have been securities market intermediaries (market-makers and other securities dealers in firms called ‘broker-dealers’ or ‘investment banks’) and leveraged and other bond investors seeking funding.
How large is the repo market?
At about the same time as the ICMA survey, the Federal Reserve Bank of New York reported that the outstanding repo business of its primary dealers (who may account for as much as 80-90% of the US market) as almost USD 4 trillion.
How does repo affect stock market?
WHEN REPO RATE GOES UP THE BANK LOAN WILL BE COSTLIER AND THE MONEY WILL BE DEARER . ITS EFFECT IN THE STOCK MARKET WILL BE SLIGHTLY BEARISH. WHEN THE RATE GOES DOWN IT IS JUST THE OPPOSITE. … If rate is reduced then banks have to deposit less funds with RBI and people can get cheaper loans.
What is a repo margin call?
Margin calls In a repo, one party (call it the “lender”) buys a security from another party (the “borrower”) for less than it’s worth (the “haircut”), with a promise to sell it back for an ever-so-slightly higher price (the “interest”) at some point in the near future.
How is repo margin calculated?
b) repo transactions: Mark-To-Market Margin= (TRA – Traded amount – RI) × position sign. The Overall Mark-To-Market Margin is equal to the sum of all the Mark- To-Market Margins calculated for each transaction. Overall Mark-To-Market Margins = Σ Mark-To-Market Margins per each transaction.
What happened to the repo market?
In September, a disruption in the market in which banks and others lend and borrow for very short periods of time, the repo market, led to a sharp spike in short-term interest rates and prompted the Federal Reserve to inject tens of billions of dollars of reserves into the markets.
How bad is a repo?
A judgment. In all, a repo could cause a 100-point drop in your credit score, Sanford says. And late payments, collections and public records generally all stay on your credit for about seven years, according to myFICO.com. You can stop a repo. The key is to communicate with the lender.
How does reverse repo work?
In a reverse repo transaction, the opposite occurs: the Desk sells securities to a counterparty subject to an agreement to repurchase the securities at a later date at a higher repurchase price. Reverse repo transactions temporarily reduce the quantity of reserve balances in the banking system.
How do you value a repo?
Cash value paid by the seller of assets to the buyer on the repurchase date: equal to the purchase price plus a return on the use of the cash over the term of the repo. In buy/sell-backs, the repurchase price may be net of coupon or dividend payments made on the assets during the term of the repo (see page 29).
Why are repo rates so high?
As investors began to become aware of the deep troubles of the American mortgage market, they began to avoid lending against mortgage collateral. Repo rates surged, reflecting the realization of increased credit risk in these kinds of bonds that were often built out of poorly made home loans.
What is the purpose of a repo?
The repo market allows financial institutions that own lots of securities (e.g. banks, broker-dealers, hedge funds) to borrow cheaply and allows parties with lots of spare cash (e.g. money market mutual funds) to earn a small return on that cash without much risk, because securities, often U.S. Treasury securities, …
Why is the Fed pumping money into the repo market?
Under normal conditions, interest rates in the repo market are low, since the loans are considered safe and there’s plenty of cash on hand. … And the rate at which banks lend to each other – the Fed’s benchmark – exceeded 2.25%, the top of its desired range. The rise prompted the Fed to take action.
What does repo mean?
repurchase agreementA repurchase agreement (repo) is a form of short-term borrowing for dealers in government securities. In the case of a repo, a dealer sells government securities to investors, usually on an overnight basis, and buys them back the following day at a slightly higher price.
What is the repo crisis?
The loss of liquidity at the firms that were the biggest players in the securitized banking system … led to the financial crisis. … Repo is a form of banking in which firms and institutional investors “deposit” money, by lending for interest, short term, and receive collateral as a guarantee.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039526421.82/warc/CC-MAIN-20210421065303-20210421095303-00000.warc.gz
|
CC-MAIN-2021-17
| 5,270
| 45
|
http://eolevent.eu/team/alexandra-giannopoulou
|
code
|
Alexandra Giannopoulou is a postdoctoral researcher at the Blockchain and Society Policy Lab at the Institute for Information Law (IViR), University of Amsterdam. Her PhD thesis, obtained in 2016 from the University of Paris II Panthéon Assas and entitled ‘Les licences Creative Commons’, is forthcoming at editions L’Harmattan. She is an associate researcher at the CNRS Centre for Internet and Society in Paris. Her current research focuses on privacy and data protection, digital identity, and decentralization.
EOLE 2020 / 2021
Webinar 4 "Open source and open science within public administrations"
Alexandra was a speaker at this webinar on february 17 at 11:30 am.
You can view the slides of her presentation here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499744.74/warc/CC-MAIN-20230129144110-20230129174110-00201.warc.gz
|
CC-MAIN-2023-06
| 727
| 5
|
http://www.webhostingtalk.com/showthread.php?t=649322
|
code
|
I keep noticing iMountain popping up on WHT, and am reminded about how good their deals looked. And also how saddened I was to find the connectivity with myself atrocious.
I'm wondering if this is a problem with me or Europe in general. This guy (linked to in iMountain's testimonials) has several .mp3 files for download:
Just scroll down a little and you'll see blue arrows before the download links -- only the first three are hosted by iMountain. Now, is it just me or do these simply refuse to go any faster than about 40kB/s?
Perhaps it'd be worth getting a general metric of this from whoever feels like spending a few seconds of their time doing so. I'm fairly certain that iMountain has a single 1gbps line with RoadRunner, and suspect it simply doesn't have the worldwide connectivity appropriate for a company offering such powerful packages.
It could be that I'm entirely wrong and it's simply a connectivity issue with my ISP, but I've never
had download rates this low before. It's so bad that even loading static pages on iMountain feels sluggish due to the images all downloading at a mere 40kB/s.
I find this especially difficult to deal with as I'm on a ~2200kB/s line.
Note that I do have a genuine interest in iMountain and am trying to accomplish nothing here but to help them improve
their service, not to smear them or anything like that. I am trying to be entirely positive here.
Edit: Probably better off bumping this in tomorrow afternoon when everyone isn't in bed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709000375/warc/CC-MAIN-20130516125640-00029-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,492
| 10
|
https://katalog.uu.se/profile/?id=XX3023
|
code
|
I am interested in bacterial genetics and evolution, including the evolution of resistance to antibiotics, but my research interests are broader.
If you would like to do a project in my group (for example a masters exam project) please contact me directly by email. I am looking for people who are interested in problem solving, and in basic science (we are NOT a clinical microbiology lab), and bacterial genetics, with very good academic qualifications. Contact: email@example.com
Also available at
Our main research interests are in bacterial genetics and evolution, including the evolution of antibiotic resistance, the development of novel Gram-negative antibiotics. In studying the evolution of antibiotic resistance, an in-depth understanding of the selection processes and evolutionary principles behind fitness/resistance trade-offs is required for developing methodologies capable of suppressing the growth or spread of resistant bacteria. In this context discovering new drugs or drug targets is very important.
We are studying the evolution of resistance to antimicrobial drugs, with a particular focus on the fluoroquinolones. Questions include how resistance development impacts on bacterial fitness and how bacteria respond by compensatory evolution. The step-wise nature of antibiotic resistance evolution, and the co-evolution of resistance to multiple antibiotics are being studied.
We also study basic questions in bacterial genetics. Among the specific questions are the importance of codon usage bias, and the significance of the organisation of genes and operons on the bacterial chromosome - why are particular operons where they are? Would it make a difference if they were placed elsewhere on the genome? We have the technology to address these fundamental questions experimentally. Related question address the rates and mechanisms of bacterial genome rearrangements associated with repetitive sequences.
If you would like to make a project in my group you should be interested in problem solving (we are NOT a clinical microbiology lab), and it is an advantage to be bright and smart. An engineering background would be good, also being comfortable with numbers, modelling, computers and data analysis. You should have a good academic CV, be interested in basic science, and be prepared to work seriously and hard.
Contact me by email with your CV: firstname.lastname@example.org
My publication list can be found on Google Scholar (more up to date than DIVA, and actually contains most of my publications):
Please contact the directory administrator for the organization (department or similar) to correct possible errors in the information.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107879673.14/warc/CC-MAIN-20201022141106-20201022171106-00179.warc.gz
|
CC-MAIN-2020-45
| 2,668
| 10
|
https://www.mobileread.com/forums/showpost.php?p=2092700&postcount=7
|
code
|
Originally Posted by Begemot
The good thing about Kindle DX is that you can install Doukan distribution which will read just about everything including DJVUs (huge plus for me).
Also, from what I understand, you can install Doukan along with original OS, then you can dual boot of sorts depending on whether you want to read DRM books or not.
Even if you do not install Doukan, you can install other reading software besides the one that comes with Kindle.
About the only thing that is preventing me from buying Kindle is the lack of any external storage slot(SD or otherwise). With 3.3GB for internal user storage, it really should not matter though.
I know kindle DX has duokan so it useful for pdf and more but I heard that duokan2012 version for kindle DX is not avaiable.In my opinion,I love duokan concept.I can have it a dual OS.I can read azw, pdf, epub and much more.
But,My major problem is dictionary.I know kindle DX is non-touch screen so it is hard to use keyboard for dictionary use? or touch screen easier to use?
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125719.13/warc/CC-MAIN-20170423031205-00548-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,029
| 7
|
https://kb.xopero.com/portal/en/kb/articles/setting-up-a-backup-plan-3-10-2022
|
code
|
This article contains information on how to set up a Bitbucket DC repository backup plan
Define the name of a backup plan and set the Backup type section to GitHub/GitLab/Bitbucket
this section select the Bitbucket DC environment you want to include
in the backup process, and select the repositories to backup.
Optionally, Xopero ONE allows you to protect the whole Bitbucket environment.
Data to protect
Xopero ONE allows you to select the appropriate metadata, which you are interested to back up.
you can also change the Worker - a device directly
responsible for the backup process of your repositories. You can have
many workers and use different workers
for each backup plan.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500983.76/warc/CC-MAIN-20230208222635-20230209012635-00433.warc.gz
|
CC-MAIN-2023-06
| 682
| 11
|
http://groups.google.com/group/bayfp/msg/39293bcb704c3e9c
|
code
|
Ooh, that sounds like an interesting talk!
On Mon, Jul 23, 2012 at 9:42 AM, Vlad Patryshev <vpatrys...@gmail.com> wrote:
> Oh, and I'm also ready to give a talk on applicative programming. The talk
> mostly uses Scala, but it's just a model; the idea is way deeper.
> On Mon, Jul 23, 2012 at 9:41 AM, Vlad Patryshev <vpatrys...@gmail.com>
>> I'd be happy to join.
>> We've been having small Categories and Types meeting for several years;
>> On Mon, Jul 23, 2012 at 8:24 AM, <firstname.lastname@example.org> wrote:
>>> Today's Topic Summary
>>> Group: http://groups.google.com/group/bayfp/topics
>>> Digest for email@example.com - 3 Messages in 1 Topic [1 Update]
>>> Digest for firstname.lastname@example.org - 3 Messages in 1 Topic
>>> Paul Legato <pjleg...@gmail.com> Jul 22 07:19PM -0700
>>> I'm up for an FP revival! Let's have a meeting.
>>> You received this message because you are subscribed to the Google Group
You must Sign in before you can post messages.
To post a message you must first join this group.
Please update your nickname on the subscription settings page before posting.
You do not have the permission required to post.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702777399/warc/CC-MAIN-20130516111257-00042-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,144
| 19
|
https://garanto.org/eosio-eos-regression-fix-eosiocpp-library-problems-5133-8.html
|
code
|
> These files have been removed purposefully.
You cannot remove files from a released software, without documenting clearly.
> Please use the point releases. Since the latest version is not always stable as it is a work in progress.
We’re talking about «master», which is the latest stable release.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578610036.72/warc/CC-MAIN-20190423174820-20190423200820-00315.warc.gz
|
CC-MAIN-2019-18
| 302
| 4
|
https://pypi.org/search/?c=Operating+System+%3A%3A+Microsoft+%3A%3A+Windows+%3A%3A+Windows+XP
|
code
|
Standalone OpenGL agar.io Python client using pyglet and agarnet
Algorithm Visualization framework
Analyze and compare bioacoustic recordings
Windows GUI Test automation
Distributed encrypted backup utility
Simple and basic Directory Listing, File information, & Zip File Listings Caching.
A HAML pre-processor for Django 1.3 and Django 1.4
A package to collect measurements published by EMA using MQTT and a SQlite database
Epistasis simulator of SNP pattern in Windows
A command-line tool to print free resources in delicious flavors.
Video recording and streaming software
Tools for accessing JPEG2000 files
Guacamole is an command line tool library for Python
Streamlines wxPython to simplify your code and make it easier to create a GUI.
2D action adventure game engine
distutils extension module - create an installer by InnoSetup.
Retrieve YouTube content and metadata
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891816912.94/warc/CC-MAIN-20180225190023-20180225210023-00295.warc.gz
|
CC-MAIN-2018-09
| 875
| 17
|
https://aplawrence.com/foo-mac/xpostfacto.html
|
code
|
XPostFacto is a partially open source app that purports to allow you to run OS X on older Macs. I can understand the motivation; some people have spent a lot of money on Apple hardware and the idea of tossing it in a recycling bin is painful to contemplate. It's that pain that XPostFacto seeks to eliminate. Of course, not all Macs can be brought to OS X; see Other World Computing's XPostFacto 4 site for supported models. You can buy a supported version there, or download the free version.
If you are someone thinking about this, keep in mind that sooner or later you are going to have to bite the bullet and move on. Next time, don't make the mistake of buying expensive hardware unless you really need it. There's always an OS X on the horizon, and your hardware will always be obsolete after a few years. If you buy at the low end, you can probably afford to buy again in two or three years. With the rapid increases in power, you'll probably get more power for your money that way than if you buy top of the heap and keep it for year after year. Of course if you really need the biggest and baddest, fine - but if that's the case, you should be able to justify spending the big bucks again to keep up. For most people, buying at the bottom is the strategy that makes sense today.
Got something to add? Send me email.
More Articles by Tony Lawrence © 2009-11-07 Tony Lawrence
Zawinski's Law: Every program attempts to expand until it can read mail. Those programs which cannot so expand are replaced by ones which can. (Jamie Zawinski)
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662631064.64/warc/CC-MAIN-20220527015812-20220527045812-00197.warc.gz
|
CC-MAIN-2022-21
| 1,543
| 5
|
https://drivehud.com/forums/topic/cant-add-or-remove-columns-from-reports/
|
code
|
I am using DriveHUD 2 on a trial basis for this month. Looks good and feels a bit smoother.
I cannot seem to add or remove columns from any of the reports. I click on the column header and check off or on the columns I want, but nothing changes in the report. Even if a create a new report, it just keeps the columns from the old report.
Can you please check if you are using the latest version. I just tested it on my side and it seems to be working fine. Checking and unchecking stats in your report header then clicking “apply “should add/remove the stat in your report. Can you please send us a message through the DH2 app with logs attached so we can check this for you.
Edit: I just checked this on other PCs and it looks like this issue happens on some systems, i informed our developers about this. thanks for letting us know and please wait for our update.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817036.4/warc/CC-MAIN-20240416000407-20240416030407-00205.warc.gz
|
CC-MAIN-2024-18
| 869
| 4
|
https://forum.antergos.com/user/fernandomaroto
|
code
|
Still in love with Antergos (default OS)
Linux newbie since 06/2016
i would like to here from one of the @developers if this is the way now to install only from this one mirror…
Yeah, as i undestand it simply order the mirrors, and not select only one…
I went back to my bios to enable USB booting so I can re install antergos but when I chose live boot again I am stacked at that log in screen.
Maybe you’re choosing the first option at the liveiso (which is oot from HD), but should choose the 2nd to boot the iso…
I think you have a problem with nvidia, not sure why you can’t login at tty though…
Try ctrl+alt+f3 or others f4, f5 just in case.
Actually my experience with GDM has not been good.
Yeah, Gnome and GDM have a lot of bugs, and some people started to hate their developers…
But with GDM, there are always annoying quirks, like the power/suspend buttons disappear from the top right corner.
As i said, i don’t use suspend/hibernations etc but i use
sddmwhich is the best, fastest and doesn’t break with updates (broke only once actually in 2 years).
Do’t know if works nice with gnome, but you can test it.
In your estimate, which DE has the most active development and support going on?
For sure is
cinnamonno sure in which order though.
i3-wmas window manager (is not considered desktop), is hard for begginers, but aso supper light and after you configure it and learn how to use it won’t stay in the way with bugs, heavy stuff being loaded etc.
You mean: running games which were not prepared for Linux by their manufacturer? I must take a look at the project, if so. I’d love seeing “The Witcher III” on my machine.
Here it goes, as you can see the file was first submited 2018-08-22, i haven’t installed/tested yet.
Users don’t wanna pay for anything at all.
I guess i’m one of them :) and try to make stuff for free too like Portergos in return …
I notice it must be something with driver, when I switch it to generic foo2lava printer, I get at least page with error printed. Also noticed that in driver list I got 3 (tried all) same (duplicated?) positions for my printer. Is there a way to clean printer configuration/ driver setup without installing system system?
You can try to find out if issue started after an upgrade, but may be complicated:
All upgraded proccess are stored at
In case you remember when your printer stopped working you can browse the file to that date and downgrade the packages, and try using your printer again.
This gets more and more complicated if you don’t know when your printer stopped working…
But it’s something you can try anyway.
So this question is directed to forum members who are more knowledgeable,
in your experience is it safe to do
pacman -Qdtq | pacman -Rs - ?
I don’t risk executing the command here, i’d rather keep all the files (not too much space) and not break packages.
Mine is around 710 MB.
Thanks for the quick suggestions!
One good thing to keep in mind is that despite Antergos devs, adopted ligthdm to be our official DM, gnome will probably always work better with GDM, since they are developed by the same team…
Steam works well. As well Native as Runtime
That’s nice, I rmember when i first installed Antergos there wasn’t this 2 packages, and i could only starts steam through terminal with a special option, otherwise steam wouldn’t work. Arch guys quickly adapted Steam package to work, it was a nice thing…
One problem she can find is that not all games are made to run on Linux, But then again, this time there is the
Steam proton(AUR for now, but community is voting a lot) which i hope will allow us to run more steam games.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742020.26/warc/CC-MAIN-20181114125234-20181114150414-00043.warc.gz
|
CC-MAIN-2018-47
| 3,672
| 39
|
https://talkingweb.co.uk/blog/getting-a-ssl-certificate-ready-before-launch-should-you-use-letsencrypt
|
code
|
Let's Encrypt is a fantastic initiative that gives you a free SSL certificate (secure certificate) for your website. This means your site can run on https rather than http, a great step for security, customer confidence and SEO.
However, for Let's Encrypt to issue you a free SSL certificate, you need your website to be running on it's correct domain. Well that's easy right? No. There's actually a major time when this isn't easy - when you're launching a new replacement website. By "replacement website" I mean you already have a website running on a domain name, and you're making a new site on new hosting for that domain. In this case, you'll probably have your website running on a staging domain - such as staging.yourbwesite.com - yourname.yourdeveloper.com.
There's also the times when you're moving hosting - meaning your website might be staying the same, but it's a new hosting account which whill ultimately house your existing website and domain.
If you found this article helpful, get more of this by joining our mailing list.
In either case, you'll need your old website or old hosting to be running with your existing domain right up until the moment of switch over, when you want your new website and/or new hosting up and running seamlessly.
In these situation you've got 2 choices.
1) You could launch your site on your new hosting without a secure certificate and as soon as it's launched and therefore running on it's correct domain, set up the SSL. In theory this should only be a few minutes but in those few minutes Google may tell your visitors that your site isn't secure. If you don't get much traffic then this probably really isn't a big deal as it's quite possible no one will even see the Google warning in those few minutes. But if you get a lot of traffic, then you might not like this approach as you don't want to give your visitors a bad impression, even if it is only briefly.
2) So instead you could buy and set up a SSL certificate that isn't from Let's Encrypt. This is the way we always had to do it before Let's Encrypt existed. These cost from around £30 to hundreds of pounds depending on the level of security you want, and can take a bit of setting up from your developer if they need to install it for you on the server and make it actually "work". For a big busy website, these costs are quite minimal in the grand scheme of things and it's an import step towards a smooth re-launch or server move. But for smaller sites, it's an unnceccessary expense. Of course if you do opt for this approach, you could just buy the cheapest certificate available and switch to Let's Encrypt once your site is live so you don't have annual certificate costs.
So there you go - just something to be aware of in advance of your re-launch and something to discuss with your web developer / client so you have a smooth plan in place that everyone is happy with.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100508.42/warc/CC-MAIN-20231203161435-20231203191435-00803.warc.gz
|
CC-MAIN-2023-50
| 2,895
| 9
|
http://opensourcetoday.org/walmart-releases-electrode-open-source-web-platform-runs-walmart-com/
|
code
|
Walmart has released Electrode as open source. Electrode is a React-based application the company uses to power Walmart.com.
From the project about page:
Electrode is a platform for building universal React/Node.js applications with a standardized structure, best practices, and modern technologies baked in. Electrode focuses on performance, component reusability, and simple deployment to multiple cloud providers—so you can focus on what makes your app unique.
Electrode is one of about 140 other open source projects Walmart has released. Read more at TechCrunch.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578613888.70/warc/CC-MAIN-20190423214818-20190423235853-00036.warc.gz
|
CC-MAIN-2019-18
| 569
| 4
|
https://www.udemy.com/course/c_bocr_08-sap-certified-application-associate-practice-exam/?couponCode=SAP-008
|
code
|
You create a sales report, which requires elevation data to display. The share and sales data are required in different types of databases. Which method you can use to change the elevation data from a subreport to the main report?
Use a two-way formula.
Use a shared variable.
Use a global variable.
Use an inverse formula.
As a default value is used for NULL values ​​in a report when you choose to convert the database NULL values ​​by Default Options from the File menu Report?
Crystal Reports NULL default
International default settings System
Database NULL default
The default value defined in the DSN
Dynamic recipient of supporting data provider which of the following types of data? (Choose three.)
You must use a formula in a new crystal report that creates an account number for each customer. The account number is composed of the first five alphabetic characters from the Customer Name field and the first five numeric characters from the Phone field. All records contain at least five characters of the correct type for each field. What process do you use to create your account number?
Use the If-Then-Else instructions to return each possible outcome for each field. Create formulas to extract the characters required by the customer name and phone fields and assign the results to global variables. Use a third formula to concatenate the results and display the account number
Create a formula that uses a SELECT statement that is processed on the database server which chains the first five alphabetic characters from the Customer Name field with the first five numeric characters from the Phone field. The last line shows the result of ten characters.
Create a formula with two Do while loops. The first extracts the first five alphabetic characters from the customer name field and the second extracts the first five numeric characters from the field of telephone and chaining them to the five alphabetic characters. The last line shows the result of ten characters.
Use nested If-then-else statements to return each possible outcome for each field. Create a formula to extract the characters required by the If-then-else then view the results concatenated data.
What type of sub report used to enter the information into a report that is generated when a hyperlink is clicked?
Click To link
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038089289.45/warc/CC-MAIN-20210416191341-20210416221341-00278.warc.gz
|
CC-MAIN-2021-17
| 2,338
| 18
|
https://www.tr.freelancer.com/projects/website-design/bikini-team-website/?ngsw-bypass=&w=f
|
code
|
Not sure what has to be done on the back end to build this site, we will need to add photos and videos to galleries on a weekly basis. We pretty much just want the site built and then maintain the site, allowing us to add the photos and what not.
Bu iş için 77 freelancer ortalamada $1240 teklif veriyor
Hi, I think we spoke about this project earlier as well when this was posted earlier. We are still interested in doing this project, please open PMB so we can discuss further. Thanks.
Hello, we can do this project for you and we guarantee complete satisfaction. We’ll use PHP + MySQL. Please check PM for details. Best regards, Bobi.
Hello, Its sound like not a hard job to do for us. Therefor, we need little more informations about your website. Contact me by pm if you are interested.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154214.63/warc/CC-MAIN-20210801154943-20210801184943-00685.warc.gz
|
CC-MAIN-2021-31
| 795
| 5
|
https://topnewreview.com/boxes-a-simpler-vm-manager-for-the-masses/
|
code
|
Virtual machine administration can be complex to manage, but if all you want is to run a Debian instance on your Fedora box for a few minutes, VirtualBox can feel like overkill. GNOME Boxes lets you get to what you’re looking for: A simple way to fire up a VM without any muss or fuss.
[sc name=”ad 2″]
Dual-booting is a pain. I’ve begun booting into my Ubuntu installation on my desktop instead of Windows to get work done. However, in order to try out different Linux boxes, it can be a hassle to fire up VirtualBox, grab an ISO, and allocate the resources I think the virtual machine might need. There has to be a better way. And there is.
I looked around and discovered GNOME Boxes, a virtualization application for the GNOME desktop. The coolest thing about it is the sheer simplicity.
From the first run, you’re greeted with a simplistic interface. When you want to add a new VM, it presents you with a basic list of some great Linux OSes: Red Hat Enterprise Linux, Fedora 29, Ubuntu 18.10, openSUSE Leap, and Debian 9. However, if you click “Show more,” GNOME Boxes lists even more OSes, such as Pop! OS or NetBSD. If you choose from the list, Boxes downloads the ISO and starts the installation for you. In VirtualBox, this would require locating the ISO, mounting it, and doing the boot-up rigmarole. I feel like Boxes makes this all easy and intuitive.
If you’re looking to try out a Linux distro that isn’t in the list (such as Gentoo or Arch), you can always point Boxes at a downloaded ISO as well.
This is because Boxes is basically a graphical application for the Linux QEMU hypervisor. (That’s a fancy way of saying it’s a GUI for the standard Linux virtual machine host software.)
There’s a lot of reasons to run a VM. If you’re learning how to administer a server, for instance, running a server in a VM that you can trash means you don’t have to muck up your own installation. It also enables you to try other OSes without the need to constantly reinstall the OS and configure boot options. (Who wants to triple or quadruple-boot?)
The way I look at it, the biggest non-development or IT reason for using a VM is data isolation. Say you have specific requirements (such as work for
Pop! OS running in GNOME Boxes on a Manjaro host.
a client) that are sensitive. Instead of entrusting that data to your own installation, you can keep a sanitized work environment in a VM. You can also back up that VM instance to a cloud storage service or server in case anything goes pear-shaped. (If you do, use full- disk encryption in the VM instance and/or encrypt the image before sending it to the cloud.)
The downsides are the same as in VirtualBox: You won’t have access to all the hardware on the host, most notably the display driver, so don’t count on being able to play games or access the video card for GPU tasks. For that, use bare metal and Docker containers.
Boxes also serves as a remote administration manager. It can handle remote connections to Windows boxes through RDP. or Linux desktops through VNC. It can also handle SSH connections, though I prefer to simply run SSH through a terminal anyway.
If you are a GNOME user, I highly recommend grabbing GNOME Boxes from the GNOME Software (or distribution-specific) app store. Give it a whirl, and try another flavor of Linux. If you don’t like it, you will have wasted almost no time to configuration and data migration, and you can get the disk space back as soon as you delete the VM.
Alex Campbell is a Linux geek who enjoys learning about computer security.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816024.45/warc/CC-MAIN-20240412132154-20240412162154-00705.warc.gz
|
CC-MAIN-2024-18
| 3,570
| 15
|
http://focuskpi.applytojob.com/apply/job_20170216212603_CSS0XTA19ASBDGVE/Sr-Software-EngineerWeb-Services?source=GS
|
code
|
FocusKPI Inc. is looking for a Sr. Software Engineer-Web Services to work for our client in Lehi, UT. This is a full-time contract with negotiable pay rate.
What you’ll do:
- Design and implement robust web service APIs within our client's Analytics platform that are used by a large number of internal client applications as well as external customer client applications
- Work with a team of Web Services developers and quality Engineers to create new APIs, improve existing ones and also implement, prototype, scale, test and validate these APIs.
- Gather technical requirements from multiple sources and improve on existing strategy and techniques for exploring and exposing data
- Solve complex business and technical problems involving large-scale data aggregation
- Demonstrate leadership qualities with willingness to mentor peers and drive feature development efforts, in co-ordination with other cross-functional groups like experience design and product management
- Gain a solid understanding of our client's Analytics platform workflows and be willing to drive solutions that span across one or more cross-functional Engineering teams
- Develop product enhancements and features with a strong focus on effective customer engagement and satisfaction
What you need to succeed:
- M.S. or B.S. in Computer Science or equivalent field
- Excellent interpersonal skills
- Comprehensive knowledge and development experience building and scaling truly RESTful web services
- Must be detail-oriented, self-motivated, responsive, professional and dedicated to customer success
- Experience with building and deploying back end services platforms
- Solid object-oriented programming background in Java, C/C++, C#, or PHP
- Experience with storing and retrieving high-frequency data in Redis
- Database programming knowledge including SQL queries in MySQL and collection queries in Mongo
- Experience with Microsoft Power BI not required, but preferred
Thank you for applying!
FocusKPI Hiring Team
FocusKPI Inc. is an analytics consulting business providing solutions such as CRM customization, Risk Management, Business Intelligence, Advanced/Operational/Web/Digital Analytics as well as Human Resources for our clients
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122886.86/warc/CC-MAIN-20170423031202-00271-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 2,222
| 22
|
https://community.amplifi.com/topic/2146/teleport-app-for-windows/2
|
code
|
Teleport app for Windows
Will there ever be a teleport app for Windows?
I would definitely use a Windows version of the new Teleport app.
I don't always want to have to carry around the original Teleport hardware device which I need to plug in.
Would be great if I could go into a coffee shop with my Windows laptop connect to their free in-store WiFi and load up the Teleport app for Windows which would then allow me to access my home network from my laptop.
Surely this is the next logical step to produce a Windows desktop app?!
Considering that there is a app store on windows 10 it's possible.
At the moment could use an android emulator..
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496665809.73/warc/CC-MAIN-20191112230002-20191113014002-00309.warc.gz
|
CC-MAIN-2019-47
| 645
| 8
|
https://www.scirra.com/forum/stop-player-interaction-with-platform_t127000
|
code
|
You're a genius!!!!!!!! haha
And last but not least is there a way i can make the actual player flip so that his face turns upside down?
This is what i have done to make him flip with some help of others.
You do not have the required permissions to view the files attached to this post.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218191353.5/warc/CC-MAIN-20170322212951-00464-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 286
| 4
|
https://www.researchgate.net/publication/247711571_Ten_Hypotheses_about_Socioeconomic_Gradients_and_Community_Differences_in_Children's_Developmental_Outcomes
|
code
|
The acquisition of mathematical literacy in primary school is a complex process that is influenced by a large set of variables. A multilevel model was applied to identify significant predictors of mathematics performance in Chinese primary schools. Data were obtained from 10,959 students of six grades from primary schools in rural/urban areas, within five provinces with different developmental levels. At the school level, the aggregated socioeconomic status of a school is a significant predictor of math performance (x 2=4.3, df=1,p<.05), until the individual reading level is included. At the class level, grade is a significant predictor. Teacher's graduation level predicts performance (x 2=4.84, df=1,p=.03), until individual students' metacognition level is added. At the student level, reading performance (x 2=434.87, df=1,p<.00), mathematics self-efficacy (x 2=392.62, df=1,p<.00) and metacognition (x 2=756.62, df=1,p<.00) play a large and significant role. Socioeconomic status of family is a weak and polynomial predictor. The results reveal that individual background variables are important predictors and explain 46.67% of the total variance in math performance. After controlling for student characteristics, school and class level variables disappear as predictors, implying an interaction between contextual and individual variables. The present research findings have - next to theoretical implication - also policy implications for Chinese mathematics education. Firstly, the educational quality between provinces seem to be balanced, but the school quality within a province does not seem to be balanced. Secondly, there seems to be a need for a quality control related to the output of open teacher training institutions. Thirdly, remedial or intervention programs have to be put in place, to be proactive as to difficulties of students with different language backgrounds.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944606.5/warc/CC-MAIN-20230323003026-20230323033026-00603.warc.gz
|
CC-MAIN-2023-14
| 1,899
| 1
|
https://blender.stackexchange.com/questions/1547/how-can-i-get-back-to-blenders-default-theme
|
code
|
Even though I am relatively new to Blender I am recording a tutorial for a Blender exporter. I have been advised that I should use the Default colour scheme (for the UI). I have no idea which one that is. Can anyone tell me?
You can also save a preset called "Default", so that You can switch back to it from the Theme Presets Menu. Since you lost the Default theme, You can follow the answer as posted by @jasperge and then the steps below
Add a new preset based on factory default theme
Name the new preset as Default
Later, if you changed your theme to some other theme, You can switch back to Default very easily
Arguably just as important (more important?) as the default color scheme is the default layout (keybindings, screen layout, etc.). You might be better off resetting the whole thing to defaults by going to File > Load Factory Defaults.
Alternatively, include a start-up .blend file (and theme) as a downloadable addition to your tutorial. At the very least, this gives your audience the chance to have their whole set-up match yours right from the start.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817289.27/warc/CC-MAIN-20240419043820-20240419073820-00483.warc.gz
|
CC-MAIN-2024-18
| 1,070
| 7
|
https://clearthehaze.com/blog/2022/11/03/kubernetes-how-to-delete-a-resource-with-kustomize/
|
code
|
Kustomize is a tool for customizing Kubernetes resources based on yaml manifests. It’s easy to add more resources, or modify manifests for different environments. But I struggled to find a solution for how to delete a resource with kustomize, but here is what I found.
The source code solution for this can be found here:
My file structure looks like this:
hello-world/ |-- base/ |---- deployment.yaml |---- ingress.yaml |---- networkpolicy.yaml |---- service.yaml |---- kustomization.yaml
In this, I have all of my manifests together in the base directory, as well as the kustomization.yaml to import all of the manifests. Each manifest contains the yaml definition of the Kubernetes resource. Here is the contents of the kustomization.yaml:
resources: - hello-world-deployment.yaml - hello-world-networkpolicy.yaml - hello-world-ingress.yaml - hello-world-svc.yaml
When I run
kustomize build base then I get all the manifests from the base joined together.
Overlay to Remove Networking
The problem is I need a specific overlay to remove all networking resources. To achieve this, I need kustomize to not include the network resources in the output manifests. So, I created an overlay directory specifically for my no-network need. In it, I added this file to utilize the $patch: delete operation in this file rm-networking.yaml:
# This patch removes the NetworkPolicy with the given name $patch: delete apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: name: hello-world --- # This patch removes the Ingress with the given name $patch: delete apiVersion: networking.k8s.io/v1 kind: Ingress metadata: name: hello-world
To use this patch file, the kustomization.yaml in the overlay/no-network directory contains:
bases: - ../../base # Apply patches with these files patchesStrategicMerge: - rm-networking.yaml # Ensure the namespace on all resources is the same namespace: hello-world
The outcome? Running
kustomize build overlays/no-network results in the Ingress and NetworkPolicy excluded from the manifest! 🎉
How? Kustomize pulls in the manifests from ../../base and performs a merge to apply patch operations.
Final Folder Structure
hello-world/ |-- base/ |---- deployment.yaml |---- ingress.yaml |---- networkpolicy.yaml |---- service.yaml |---- kustomization.yaml |-- overlays/ |---- no-network/ |------- kustomization.yaml |------- rm-networking.yaml
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510326.82/warc/CC-MAIN-20230927203115-20230927233115-00095.warc.gz
|
CC-MAIN-2023-40
| 2,376
| 18
|
https://www.idownloadblog.com/2019/04/15/photomanager-ios-12/
|
code
|
When you capture photographs with your iPhone’s camera or save images from the internet, they get saved directly to your Camera Roll where you can interact with them later. Unfortunately, Apple’s Photos app tends to be somewhat light on features, and this presents issues for power users.
PhotoManager (iOS 12) is a new jailbreak tweak release by iOS developer Frozen Penguin that spearheads an effort to solve this dilemma. It integrates a plethora of useful new features into the native Photos app, which presents users with more control over their files and albums.
Right out of the box, PhotoManager (iOS 12) unlocks the following features in iOS’ Photos app:
- Protect albums with biometric authentication or passcode
- Hide protected albums from being viewed in image pickers via other apps
- Save photos directly to a specific album instead of to the Camera Roll
- Hide individual albums from the Photos app
- Customize the tab bar
Once installed, the tweak adds a preference pane to the Settings app where you can configure the tweak to your needs:
The primary preference pane provides a toggle switch for the tweak and three main sections that are loaded with options, including: Appearance, Behavior, and Albums. We’ll outline those for you below:
- Show the album’s title
- Show the album’s content count
- Choose a preview style for your locked album(s)
- Normal Image
- Enable or disable any of the following sections:
- Shared Albums
- People and Places
- Media Types
- Other Albums
- Enable or disable any of the following tab bar
- For You
- Enable or disable moving photos from one album to another
- Include stock albums in photo moving
- Choose how to lock albums:
- Biometric authentication (Face ID or Touch ID)
- Face ID
- No restriction
- Hide locked albums in third-party apps’ image pickers
- Enable or disable the Camera album picker
- Remember the last picked album
- Skip photo deletion confirmation message
- Increase maximum image zoom
Enable or disable any of the following album types:
- Recently deleted
The developer provides a Respring button at the top right of the primary preference pane, and it’s advised that you use it each time you modify the settings to ensure that they’re appended to your device.
PhotoManager (iOS 12) provides tight integration with Apple’s native Photos app, providing users with respectable upgrades over the stock functionality. If you’re interested in trying the PhotoManager (iOS 12) for yourself, then you can download it from Cydia’s Packix repository for $2.00; the tweak is only intended for jailbroken iOS 12 devices.
Will you be augmenting your iPhone’s Photos app with PhotoManager (iOS 12)? Let us know why or why not in the comments section below.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662515501.4/warc/CC-MAIN-20220517031843-20220517061843-00021.warc.gz
|
CC-MAIN-2022-21
| 2,750
| 37
|
http://monochromacy.net/Python-3-1-The-Release-That-Time-Forgot.html
|
code
|
Python 3.1 - The Release That Time Forgot
Posted by Tom on 2010-01-18 17:47
When lots of people on the Intertubes said that I should not use 3.1 because there wasn't as much module support I made a 'pssh' noise, rolled my eyes and promptly installed 3.1. My reasoning ran thus:
- Lots of people are stupid
- 3.1 is a larger number than 2.6
- It was likely to take me so long to learn the language to any useful degree that 3.1 usage would have stepped up by then
I was unaware, however, of the full magnitude of the problem. Allow me to illustrate using the medium of Google Image Search:
I started off with Hello World, then decided that the next best step was steganography. It's something I've always been interested in, and it's got file IO in there, some bit-twisting, probably hookups to a couple of other libraries and plenty of room to grow - a good starter project.
First order of the day: start looking for PNG libraries. Plenty of options, none of which work with 3.1. Shame, but OK. I know nothing about PNG, so it's time to look up the spec. Before too long I'm loading chunks, learning to love struct, having to implement LZ77. Wait, what? At this point I made a face like this - >: | - expunged 3.1, installed 2.6 and downloaded pypng.
You could argue that I should be lighting a candle rather than cursing the darkness - that I should stop whining and start porting code. In most cases I'm willing to get down and dirty. I've written loaders in my time, but I don't start to learn a high-level language so I can trawl through file format specs, especially when there's a perfectly servicably library 0.5 of a release over thataway.
In case you need any more convincing that no-one gives a crap about 3.1 then let's have a look at their online documentation:
I see someone's in a subdirectory. No illusions about who's the ginger stepchild in that family.
So there's some more anecdotal evidence to add to the pile. I beseech you, dear reader: if you're about to install Python, install 2.6.
The fact that Mamma Mia is the (by at least one metric) most successful film of all time in the UK makes me gnash my teeth and dispair for the species.
I hate Abba. That's put that right out there at the start so that we may understand one another. Or at least that you may understand me. If I take the time to clamber down from my throne constructed entirely of rage and attempt to be objective for 5 minutes I can come to the conclusion that Abba is not bad music. It's musically well constructed. The lyrics aren't half bad. But all of that goes right out the window when I actually hear any Abba, as I am filled with a sudden urge to set fire to orphans or punch a baby panda.
Which proves to be a problem with Mamma Mia, since there is nothing else in there.
Here is a film with absolutely zero content. It's a hollowed-out corpse of a film. A flimsy celuloid husk. It's cinematic celery. You could get the same experience by purchasing a Best of Abba CD. In fact, that would be much preferable, as then you wouldn't have to the listen to Pierce Fucking Brosnan.
To be honest I'd given up on him after Die Another Day (you know the only thing more retarded than an invisible car? Having someone hide behind it), but Stellan: you should know better. I remember when you were playing a mathematical pimp and jousting with Robin Williams in Good Will Hunting. I watched you play the reserved and enigmatic Gregor in Ronin. What are you doing now? Capering. CAPERING. Well that's it. You're off my favourite Swede list. Peter Stormare: you've been promoted.
It's . . . it's just a bad film. A really bad film. The thought that if aliens landed in Kent tomorrow (let's face it, it would either be that or Norfolk), checked up what was the best example of our most popular entertainment medium and found themselves watching Mamma Mia makes me feel like crying into my lasagne.
I just wanted to get that off my chest. But yeah, Python 2.6. Thumbs up.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474671.63/warc/CC-MAIN-20240227053544-20240227083544-00399.warc.gz
|
CC-MAIN-2024-10
| 3,957
| 20
|
http://blogs.msdn.com/b/buckwoody/archive/2013/10/16/free-built-in-steps-recorder-in-windows-for-training-demos-and-documentation-oh-and-troubleshooting-too.aspx
|
code
|
LinkedIn | FaceBook | Twitter
There are a lot of features in Microsoft products that people don't know exist - and one of the most useful for IT pro's is the Problem Steps Recorder or PSR. This tool creates a web page compilation of every click or user action that you can annotate. It was originally designed for our support folks here at Microsoft so that the user could duplicate the steps in a problem, record those actions, and then send a complete file to us to help them fix things. It doesn't gather any other info than the screen shots and whatever a user types in the comments.
I use this tool all the time for training, articles and other distribution. It creates an "MHT" file, which IE reads, but Microsoft Word can also open it, and you can save it from there into PDF or even just plain old HTML if you want.
To start the tool, open a CMD or in Windows 8 just hit the Windows key. Type PSR and press ENTER.
The tool starts up, and you can press "Start Recording". It's not recording your movements, just the result of the click or menu selection - so the file is quite small when it's done.
From there, you can enter comments before you click or take an action. Once you're done, you simply stop the recording, and then save the output.
That creates a ZIP file. Inside the ZIP file is an MHT file.
Extract or just double-click the MHT and it will open in IE.
If you're not using IE, you can open the file in Microsoft Word and save it as whatever you like.
Official Documentation: http://windows.microsoft.com/en-US/windows7/How-do-I-use-Problem-Steps-Recorder
I hope you are enjoying your new position!
That is brilliant. It will make writing documentation so much easier. Thank you for sharing.
Someone in The Lounge on CodeProject.com, www.codeproject.com/Lounge.aspx, mentioned PSR so I replied with a link to your blog post here.
This has to be one of the most useful things I haven't know about.
This definitely needs more emphasis, especially in testing worlds. I often get badly written "reproduction steps" that don't reproduce the problem until someone shows it to me. Once I see what they do, I usually notice them doing something that they didn't think was important and this is usually the special case that causes the problem.
I know this speaks to tester maturity, but with a tool like this, this will be less of a problem.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398461529.84/warc/CC-MAIN-20151124205421-00077-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 2,353
| 16
|
https://cstheory.stackexchange.com/questions/5936/what-is-the-most-general-structure-on-which-matrix-product-verification-can-be-d
|
code
|
In 1979, Freivalds showed that verifying matrix products over any field can be done in randomized $O(n^2)$ time. More formally, given three matrices A, B, and C, with entries from a field F, the problem of checking whether AB = C has a randomized $O(n^2)$ time algorithm.
This is interesting because the fastest known algorithm for multiplying matrices is slower than this, so checking if AB = C is faster than computing C.
I want to know what is the most general algebraic structure over which matrix product verification still has an $O(n^2)$ time (randomized) algorithm. Since the original algorithm works over all fields, I guess it works over all integral domains too.
The best answer I could find to this question was in Subcubic Equivalences Between Path, Matrix, and Triangle Problems, where they say "matrix product verification over rings can be done in $O(n^2)$ randomized time [BK95]." ([BK95]: M. Blum and S. Kannan. Designing programs that check their work. J. ACM, 42(1):269–291, 1995.)
First, are rings the most general structure on which this problem has an $O(n^2)$ randomized algorithm? Second, I couldn't see how the results of [BK95] show an $O(n^2)$ time algorithm over all rings. Can someone explain how that works?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100535.26/warc/CC-MAIN-20231204214708-20231205004708-00170.warc.gz
|
CC-MAIN-2023-50
| 1,240
| 5
|
https://netmouse.livejournal.com/661707.html
|
code
|
This makes me sad.
I am paying for DSL but not using it right now since the router does not work and I'd rather not string ethernet around my office.
This also makes me sad.
I am thinking it is time for a new router. What do I need to know in order to purchase one? I have no idea.
ETA: Andrh1a says she might have one she can send me! *bounce* I hope so.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039610090.97/warc/CC-MAIN-20210422130245-20210422160245-00485.warc.gz
|
CC-MAIN-2021-17
| 355
| 5
|
https://sharepoint.stackexchange.com/questions/24637/image-column-on-document-library
|
code
|
I have a requirement to add a thumbnail image column into an existing document library on my SharePoint 2010 site.
Thumbnail images for each document are uploaded to the images document library. When a new document gets added to the main document library on the site, I would like the user to be able to select an image from the image document library, and this will be displayed on the site.
I have tried using a “hyperlink or picture” column, and all works fine and the image renders correctly, but there is no image picker (this makes it difficult for users to use). If I add a “publishing image” column instead, it provides the picker, but the I don’t see the image on site, instead I get the html markup for the image tag rendered to the screen.
Is there any way to get an image picker control attached to the hyperlink or picture column, or get the publishing image column to render correctly.
I don’t have the availability to do anything in Visual Studio, but do have SharePoint Designer.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100739.50/warc/CC-MAIN-20231208081124-20231208111124-00797.warc.gz
|
CC-MAIN-2023-50
| 1,007
| 5
|
https://katagotraining.org/privacy/
|
code
|
Personal InformationWhen you create an account, we record the email address and username you provide. Also, when accessing the site, your browser might automatically on its own send various metadata (e.g. which browser, operating system).
- We may use your email address to contact you about your account, changes to this site or policy, or information about KataGo and/or contribution to KataGo. We won't use your email address for anything else, and unless compelled by law, we won't share your email address with anyone else.
- The username you provide may be shown publicly alongside the data that KataGo generates when you contribute (see Generated Data section below), or with statistics gathered about that generated data.
- Any browser-sent metadata may end up passively in our webserver logs for a limited time. We make no effort to retain or track such information, except in aggregated anonymous statistics.
Generated DataWhen you sign up for an account and run the KataGo executable to contribute, the KataGo executable connects to this website and uploads synthetic game and training data generated based on its own automatic simulation and play using your computer. Other than the username you provide, no personal information is recorded in or associated with this data.
We may make this data publicly available for download on this website in connection with the username you provided, use it to train or improve KataGo, use it for research or other similar purposes, or include it in a larger compilation of data to be publicly and freely available for download or use by anyone.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656869.87/warc/CC-MAIN-20230609233952-20230610023952-00651.warc.gz
|
CC-MAIN-2023-23
| 1,596
| 6
|
http://conferences.oreillynet.com/cs/os2002/view/e_sess/2926
|
code
|
Eric Prud'hommeaux, World Wide Web Consortium (W3C)
Date: Thursday, July 25
Time: 4:30pm - 5:15pm
Location: Marina II
The W3C is committed to leading the Web to its full potential, a goal that is closely aligned with the ideals of the Open Source community.
The W3C hosts a number of open source projects, such as Amaya (an HTML editor/browser), Jigsaw (an HTTP server), validator.w3.org (an online HTML/XML/CSS validator) and SiRPAC (an RDF parser). There is also a much larger body of open source projects surrounding the W3C, implementing the technologies and providing feedback to the development of the W3C specifications. Some examples include the Apache HTTP server, the Xerces XML parser, the Apache Batik SVG toolkit, the Mozilla Web browser and HTML tidy which is hosted by Sourceforge.
This presentation will briefly describe some of the projects that are related to W3C technologies, and how these implementations play a part in the W3C process. More importantly, it is an opportunity for the open source community to provide feedback to the W3C.
Download presentation file
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258439.57/warc/CC-MAIN-20190525184948-20190525210948-00537.warc.gz
|
CC-MAIN-2019-22
| 1,085
| 8
|
https://www.meetup.com/Write-The-Docs-PDX/events/past/?scroll=true
|
code
|
- Write the Docs Portland June 2019 Meetup: Post-Conference Reflections
For those who were unable to attend Write the Docs Portland conference in May, here's an opportunity to learn about attendees' experiences. And for those who attended the conference, here's an opportunity to reflect. Each year, Write the Docs conference presents opportunities for community members to learn about challenges, experiences, problem-solving methods, and writing philosophies of fellow documentarians. Many folks in this community attend and participate at the conference. Join us for a facilitated discussion where we reflect and share learnings from the May conference.
- April 2019 Meetup: Portland 2019 Conference Talk Preview with Mike Jang
Hello Documentarians! Our next Write the Docs Portland meetup is on Tuesday, April 9th, at Jama Software. And we have an exclusive! We'll have an opportunity to hear one of the sixteen presentations that was selected for Write the Docs 2019 Portland conference! Mike Jang will preview the "How I Learned to Stop Worrying and Love the Command Line" talk. The command line is not something that is to be feared, but an essential tool that can greatly aid software documentation. See you at the meetup!
- Lightning in February: An Evening of Short Tech Writer Talks
Rise up, gather around, document this place to the ground! Our February meetup will feature several short-length Lightning Talks by Write the Docs Portland community members. Instead of a full-length feature presentation, these Lightning Talks are short, focused topics that are about 5-10 minutes long. Our presentations include: Kristen McKee: "UX RedUX: Words are design" Christy Lutz: "Tech Writing in the Cannabis Industry: Hitting a New High" Mo Nishiyama: "Docs of Ages: Lessons Learned in Evolving Support Articles" And others to be announced. Interested in giving a Lightning Talk? Want to share with the community what you've accomplished in 2018? Contact Mo or Kristen, and let's make it happen!
- January Meetup: Conference Submission Workshop (Presenters Wanted)
Happy holidays, and many good greetings for the upcoming year, documentarians! Our January meetup (1/8/19, 6-8 pm at Jama Software) is an opportunity for members to share potential ideas for the Write the Docs Portland 2019 (May 19-21). Participants are encouraged to give short (~5 minutes) dry runs of potential presentations to gauge interest and collect feedback. Do you have a burning idea that you want to present at the conference? Here is your chance to share them. We'll also brainstorm topics that attendees would "love to see at the conference that they wish someone would offer." If you have a talk in mind, please RSVP and let the organizers (Mo, Kristen McKee, and Mike Jang) know in advance. We would love to have several speakers share their proposals. With Call for Proposals for the Write the Docs Portland 2019 conference quickly approaching (midnight, January 17th), this is a great opportunity to practice your talk and receive feedback. For what it's worth, several past participants of the Conference Submission Workshop were selected to present at Write the Docs. We look forward to seeing you and hearing your ideas on January 8th!
- Write the Docs PDX Dec. Meetup: Minimum Viable Documentation for RESTful APIs
Happy Thanksgiving, fellow Documentarians! Our December meetup features a presentation by Mike Jang (Senior Staff Technical Writer at ForgeRock), as well as several very important announcements for the community. You don't want to miss this! Here's a teaser for Mike's presentation, "Minimum Viable Documentation for RESTful APIs": To paraphrase a James Bond movie, "Swagger is not enough..." ...You've done the work to set up OpenAPI specification REST calls for your APIs (Inaccurately known as "Swagger"). You have reference information. But you discover that few users are actually trying REST calls on your system. You're wondering: "What else do I need?" This presentation will describe the Minimal Viable Documentation (MVD) for RESTful APIs, also known as "What do I need for my developer portal?" Based loosely on Kristof Van Tomme's presentations on Developer Experience, Mike will describe the MVD for a developer portal, what will help your developers try out your APIs.
- October Joint Meetup (with PSU and Support Driven): A Day in the Life of...
Portland State University Smith Memorial Student Union Room 333
For October, we're joining forces with Portland State University's Technical Communication group and PDX Support Driven meetup, for a very fascinating look into the lives of documentarians, Technical Writing students, and support professionals. We'll have two members from each group share with attendees what their work day is like. After the "Day in the Life of..." stories, we have an opportunity to ask presenters questions and form breakout groups where attendees can converse with others based on common topics of interest. Join us on Tuesday, October 16th, from 6 to 8 pm. Note: For this month's combined meetup, we are gathering at PSU, in the Smith Memorial Student Union building, meeting space room 333 (building map here: https://www.pdx.edu/student-union/building-directory#Third%20Floor)
- Partner Event: API City Conference 2018 (near Seattle)
Hello Write the Docs PDX Community! Our friends at Write the Docs Seattle has kindly extended an invitation to a two-day API conference in early October--complete with a discount code for Write the Docs PDX members. The Seattle API City Conference (https://apicity.io/) takes place October 3rd to October 4th, 2018. API City Conference is a non-profit community event that brings together a diverse set of developers and business people to network and learn about APIs and the business value they can bring to you and your company. With a focus on diversity and accessibility, the 3 track conference creates an open event where everyone is welcome. * Registration * Buy your ticket here, there is a 30% discount (in case of error, discount code is WTDTECHDISCOUNT) ! https://www.eventbrite.com/e/seattle-api-city-conference-2018-tickets-45049306689?discount=WTDTECHDISCOUNT * Location * The API City Conference is being held at the Kitsap Conference Center. The venue is located on the waterfront in Bremerton, WA and just one block from the ferry terminal. * Schedule and presentation overviews * You can click on a particular presentation to get more details. https://apicity.io/schedule * What to expect at the API City Conference * From the organizers: "We are expecting 400 attendees this year. In addition to a great line-up of speakers, we will be providing live captioning in the main room for people hard of hearing, and a Women & Non-Binary luncheon event. We also have a University student and mentor program. We hope you can join us for our inaugural event this Fall! Be sure to check out our well diverse and professional speaker lineup, which includes 3 female Keynote speakers. Talk topics include: DevOps; Microservices; GraphQL; API Protection; Postman; OpenAPI; Diversity, Women in Tech; Technical Leadership, management, ethics, burnout; API Documentation; API Design; Authentication, JWTs; Architecture; Machine Learning; API Best Practices; APIs and SDKs; Lessons Learned; API Standards; API Security; API Documentation Testing."
- Joint meetup with the Portland Accessibility and User Experience group
We’ll share inclusivity guidelines and tips, then break into groups and apply and share what we’ve learned. Together, we’ll uncover solutions to make your writing more inclusive. Please bring any burning accessibility comments or questions and any samples of relevant work you'd be willing to share and discuss.
- Support Driven Expo 2018 Recap: Customer Support and Documentation
Erin Grace and David Bastedo had a chance to attend the Support Driven Expo conference in June and will be here to share their experiences and what they learned. Support Driven Expo is a conference that brings together customer support professionals to learn from each other and share best practices through talks, workshops, and unconferences. Learn more about how documentation plays a role in customer support and other trends in the support community.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195523840.34/warc/CC-MAIN-20190715175205-20190715200223-00006.warc.gz
|
CC-MAIN-2019-30
| 8,257
| 19
|
http://askubuntu.com/questions/43429/how-do-i-install-packages-selectively-from-repositories
|
code
|
In my case I've got lucid installed on my server but want to install a newer saned version.
There is one in the maverick and lucid repositories, how would I add this repository for just that one package?
What should I look for when doing this?
In general you can't mix packages from different releases. It may work in some cases when the dependency changes do not have an impact on the package upgrade.
Your options are to either find a ppa which provides an updated version for your release, or rebuild the package yourself from the latest source, you can find how to do this at: http://www.cyberciti.biz/faq/rebuilding-ubuntu-debian-linux-binary-package/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402479.21/warc/CC-MAIN-20160624155002-00000-ip-10-164-35-72.ec2.internal.warc.gz
|
CC-MAIN-2016-26
| 656
| 5
|
https://worldbuilding.stackexchange.com/questions/15654/what-is-the-smallest-action-required-to-destroy-all-of-reality
|
code
|
The most feared evil scientist in the world, Sinister Norman Van Deathtoyou, is on a mission to destroy everything. Humans, Earth, The Universe, even the very fabric of space and time. But, being the cliche evil scientist that Sinister is, he must do this in a complex fashion that only he needs to understand.
First, he invents time travel. Yes, this is a bit far fetched but Sinister is an extremely intelligent guy with unparalleled motivation (So please blindly accept this as fact). This time travel has rules, and these rules are important and must be followed exactly:
- Sinister has discovered that the Universe does everything possible to disregard paradoxes. This means that the predestination paradox that is often associated with time travel is completely irrelevant.
- Also, none of that "uhhh but if he destroys reality in the past then he will never have been born to destroy reality" garbage. Sinister has found that the universe still runs linear even if he goes to a different point in time. If he destroys reality at any point in time then he will still have succeeded in destroying reality.
- Time travel is extremely intrusive to a human's health and only one single trip can be survived.
- I don't know all of the actual science behind what the destruction of the universe means in a technical sense and I don't really care all that much. Numbers are great but there are many more important things!
Describe a method in which Sinister can make one trip and do the absolute minimum (in terms of the actual action) in order to destroy the very fabric of time and space, effectively annihilating everything.
Bonus points to creativity, thoughtfulness, and uniqueness of responses.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303864.86/warc/CC-MAIN-20220122134127-20220122164127-00453.warc.gz
|
CC-MAIN-2022-05
| 1,699
| 8
|
https://community.rws.com/product-groups/trados-portfolio/trados-studio/w/customer-experience/5502/how-to-create-a-custom-xml-filetype
|
code
|
This wiki is designed to help you create a custom XML file type.
SDL Trados Studio, allows you to create custom file types from thirds party applications.
In this example, we are creating a custom XML file type,to enable the correct preview in Studio.
Without a custom file type, here the project has been created with the client XML and XSL (stylesheet) files.
When using the preview direct in Studio- you are likely to see something like this
In order to be able to take advantage of the Preview option, and ensure quality in the translation,
you first need to create the custom file type.
Go to FILE - Options- File Types -New
Select XML2 (Studio 2021) or XML in earlier versions
Change the File Type Name and File Type identifier name (You must use the exact same name for both options)
Select Element Rules
Select Define Settings..... and brose to the file.
Please note: This is where you saved the original files- not the SDL Project Folder.
Next (no changes needed)
And now Finish
Now return to the Options - File Types and Preview
Select -and navigate to the stylesheet (xls) file
and now finally Add- Navigate to the folder with the image(s) Open
and select the image(s)
You now create a new project and when you run the XML preview-
You can see exactly how this will appear.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679511159.96/warc/CC-MAIN-20231211112008-20231211142008-00307.warc.gz
|
CC-MAIN-2023-50
| 1,284
| 21
|
https://docs.fiserv.dev/public/docs/introduction
|
code
|
The easiest way to add payment capabilities to your website is to implement a HTML form that you can use to enable your customers to make a payment.
This type of integration allows you to let our Gateway manage the customer redirections that are required in the checkout process of many payment methods or authentication mechanisms and gives you the option to use secure hosted pages which can reduce the burden of compliance with the Data Security Standard of the Payment Card Industry (PCI DSS).
When making decisions on your way of integration, please consider, that we do not recommend to use the hosted payment forms inside an iFrame since some browsers do not allow cookies to be sent to the 3rd party hosts, moreover some features (e.g.: 3-D Secure authentication) and some Alternative Payment Methods that involve redirections to the 3rd party services (e.g. iDEAL or PayPal) do not allow displaying their screens within an iFrame. However, if you still plan to embed our hosted payment pages inside an iFrame you must use the 'parentUri' parameter to specify an URL of a page, where the hosted payment page will be embedded.
For steps where no direct consumer interaction is required and no sensitive cardholder data is getting processed, it's best to use our Application Programming Interface (API).
Please note that if you plan to collect your customer's card details within your environment and send it to our API, you must ensure that your system components are PCI DSS compliant.
The following five steps provide an overview of a standard online store integration with links to alternative options where applicable:
- A checkout process takes place on your webstore (called a
- You receive the transaction result
- Complete the transaction when you dispatch the product (called
- Cancelling a transaction (called a
- Refunding money back to the payee when goods have been returned (called a
You can find a demo and boilerplate code here
Updated 9 months ago
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499646.23/warc/CC-MAIN-20230128153513-20230128183513-00292.warc.gz
|
CC-MAIN-2023-06
| 1,971
| 13
|
https://followmehere.com/2009/03/29/
|
code
|
Although not conclusive, evidence points to the Chinese government as the culprit in installing spyware on 1300 computers, a number of them considered high-value targets. The existence fo the network came to light after the office of the Dalai Lama asked Canadian cyber-espionage experts to examine its computers for evidence of compromise. ‘GhostNet’ focuses, in addition to the Tibetans, on Southeast Asian governments. There was no evidence that US computers had been compromised although a NATO machine had apparently briefly been monitored and the Indian Embassy in Washington had been penetrated. NYTimes.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00273.warc.gz
|
CC-MAIN-2023-23
| 615
| 1
|
https://www.chaosidea.com/physical-space-design-research
|
code
|
A MakerSpace is a place for students to collaborate and innovate. Since opening in 2016, NYU MakerSpace has been conducting research on how to ensure the Space truly serves its purpose.
In fall 2017, I was hired as a Graduate Assitant to lead the qualitative part of MakerSpace's ongoing research. I spent 200 hours onsite, doing ethnographical observations and stakeholder interviews. Parts of the insights I gathered were translated into design interventions in the Space with suggestions for future project developments.
Lead Design Researcher
Improve Innovation Rate
One of the challenges NYU MakerSpace faces is the low utilization rate of the machines in the Space. While we have some data from previous researchers, the data was not enough to lead us to solutions. As a result, I conducted on-site observations, aiming to understand what activities are going on in the Space at a given time of the day.
— observation photo —
— observation photo —
Some initial patterns identfied
After hours and hours of observations, below is the summary of what I found. But it was obvious to me that simply observing will not be enough because the data gathered here is only on the surface. To fully understand why people do what they do, interviews are musts!
Through 18 sessions of long and short interviews, a more clear pattern has merged. Having a purpose is what drove the making.
While observations and interviews are on-going, some small design intervention projects were also implemented. For example, the weekly Cocoa Break! From observation, we know that many people in the Space either work with the groups they already knew or simply work alone. To encourage for social interactions, we came up with this weekly event.
— Cocoa Break Table —
— people waiting to get their hot cocoa —
The event drew a great crowd but the level of interactions wasn't as much as we anticipated. Many people simply stood on the side while waiting or the ones that got their hot cocoa just left with it. We then came up with a few different cues to engage people, such as placing MakerSpace student staff as conversation facilitators, changing the location of the table, and leaving projects of the week on the table for perusal.
This research project is still on-going. There are still many design interventions we created in our project todos. In fact, moving forward, we plan to try different "themes" for workshops and events to attract students motivated by different purpose. A good example would be health technology. With all the research and synthesis I have done, I created a diagram called "Makers with Purposes". It is to help future researchers identify different types of makers in order to create an environment and programs that are useful and engaging to them.
— Makers with Purposes —
© 2015 -- 2018 Chaos Idea Studio. All rights reserved.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817206.54/warc/CC-MAIN-20240418124808-20240418154808-00089.warc.gz
|
CC-MAIN-2024-18
| 2,863
| 17
|
http://community.office365cloudsupport.com/category/microsoft-exchange-online/page/42
|
code
|
I cannot download the messages online onto my computer and I will be losing access to my account in a few days. I have the information for my account but for some reason I cannot download new or old messages into Windows Mail or Windows Live Mail (even though both programs have confirmed my settings are correct). If anyone can help me, I’ll give you 10 points.
Using Outlook Web Access (that’s the web interface for Exchange server), there is no way to download a message to your computer. You have a couple of options, both of which require the Exchange server to be configured to allow access. The first way would be to make an Outlook Anywhere connection and copy the messages to a personal folder. You would need Outlook on your remote computer, and the sysadmin would need to allow Outlook Anywhere (formerly HTTP or RPC) on both the server and for your user account.
The second way would be to use a POP client and pull the messages down that way. This also requires the admin to have enabled this both on the server and for your account.Microsoft Office 2010
Fatal error: Call to a member function xpath() on a non-object in /home1/mylifeco/public_html/pricecutterstore.com/admin/models/api/affiliate_window.class.php on line 129
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814872.58/warc/CC-MAIN-20180223233832-20180224013832-00638.warc.gz
|
CC-MAIN-2018-09
| 1,242
| 4
|
http://groups.google.com/group/perl.perl6.internals/msg/fbd6b4475adc3d32
|
code
|
Allison Randal wrote:Great. And for more fun I've created the basics of a NCI interface
> I'd like to add Punie to the Parrot repository.
for ast functions. Heavily underdocumented and unfinished (as of an hour
hacking time ;-), but maybe someone takes it over and continues it. It
needs trunk rev 8598 for some added NCI signatures in src/call_list.txt.
It needs probably also a split into a "Past" and "Node" classes.
PS due to upcoming changes in parrot opcodes, you might avoid the
compi = compreg 'PIR'
the future is:
prog = compi('the_code')
i.e. just invoke the compiler.
You must Sign in before you can post messages.
To post a message you must first join this group.
Please update your nickname on the subscription settings page before posting.
You do not have the permission required to post.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699977678/warc/CC-MAIN-20130516102617-00009-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 803
| 15
|
https://wordpress.tv/2015/05/30/samantha-miller-the-basics-of-unique-theme-development-2/
|
code
|
May 30, 2015
Many WordPress websites use hand-crafted themes intended solely for one website. Creating a WordPress theme from scratch can seem daunting at first, but it is not as tricky as you may think. The talk is aimed at people who want to create a one-off theme for a single website (eg. a client project, personal blog), rather than building a theme for distribution. It will require previous knowledge of WordPress, HTML, CSS and basic familiarity with PHP.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00224.warc.gz
|
CC-MAIN-2023-23
| 464
| 2
|
https://pisquare.osisoft.com/thread/33353-how-to-create-pi-tag-with-defined-attributes-from-pi-sdk-through-cnet
|
code
|
If you scroll through the Live Library Help for PIPoint, you may wonder why it does not have a CreatePIPoint method. The reason is you create a point belonging to a specific data archive or PIServer instance. To create one PIPoint, you would use PIServer.CreatePIPoint. To create more than multiple PIPoint(s) in one call, there are 2 different CreatePIPoints overloads.
Here is a GitHub Link showing an example of using one of the CreatePIPoints overloads.
Thanks a lot rick... it worked for me.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201455.20/warc/CC-MAIN-20190318152343-20190318174343-00240.warc.gz
|
CC-MAIN-2019-13
| 496
| 3
|
https://lists.openafs.org/pipermail/openafs-info/2008-January/028419.html
|
code
|
[OpenAFS] Some questions about AFS
Mon, 21 Jan 2008 08:51:20 +0100 (CET)
>> There are a lot of stupid gui thingies out there that want to stat
>> every dir they see. And color-ls and such things. Shrug.
> But it still were not a problem when we tried it. If people likes to do ls in /home, well,
> I consider that their problem, as long as references of files below don't take any longer
Some of these file browser tingies do something like
for dir in `walk path from $PWD and up` ; do
"stat dir/*" and not "stat dir". So the $USER does not have much
choice. You have been warned ;)
> But I assume that the namei cache solves that problem.
I don't see how the namei cache would help you here.
> The reason I'm asking is that we may want to make use of the ability for people to create
> and maintain their own groups, and that would require something more user-friendly than
> the command-line stuff :-)
I wonder what the status of Kvibille (AFS ACL extension for Gnome's
file manager Nautilus) is.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826892.78/warc/CC-MAIN-20181215152912-20181215174912-00269.warc.gz
|
CC-MAIN-2018-51
| 998
| 17
|
https://himeworks.com/2015/12/movement-direction-lock/
|
code
|
This plugin allows you to restrict player movement temporarily using events.
By default, they can move in all four, or eight, directions. By using certain plugin commands, you can “lock” certain directions if you didn’t want to allow them to move in those directions.
Plugin: download here (right-click, save-as)
Download ths plugin and place it in the “plugins” folder in your project’s “js” folder. Then open your Plugin Manager (F10), double-click an empty row, and select the HIME_MovementDirectionLock plugin.
Once it is in your list of plugins, turn the plugin on.
Here are some direction names that you can use:
- UP - DOWN - LEFT - RIGHT - UPLEFT - UPRIGHT - DOWNLEFT - DOWNRIGHT
To lock a movement direction, use the plugin command
lock_move_dir DIR1 DIR2 DIR3 ...
To unlock a movement direction, use the plugin command
unlock_move_dir DIR1 DIR2 DIR3
For convenience, you can lock multiple directions in one command.
So for example, if you wanted to prevent players from moving up or down, you can write
lock_move_dir UP DOWN
And afterwards, you can unlock those directions with
unlock_move_dir UP DOWN
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00144.warc.gz
|
CC-MAIN-2023-40
| 1,127
| 16
|
http://deltasdnd.blogspot.com/2012/07/castles-cutpurses.html
|
code
|
Thinking a bit more on my convention game exploring the Outdoor Survival map using the rules from Original D&D Vol-3 (the DM's booklet) -- the following are the rules for stocking Castles (p. 15-16). Note that in these rules the only classes are Fighters, Magic-Users, and Clerics; so for my game I had to think about how to replace the Clerics with Thieves (consideration follows page scans; recall that for me, basins are caves, and buildings are castles):
A few comments: Note that the "occupants" are all either "name level" or "one below name level" in their respective classes (as usual, with Clerics as an outlier: they're either "lawful name level" or "chaotic name level"). Note also the weird wording on fighter/wizard alignment: they're either "hostile to adventurers (die 1-3) or neutral (die 4.6)" -- I read that first option to mean "chaotic", although obviously if your PCs were Chaotic you might as well make the hostiles Lawful for some action-packed gaming.
Anyway, as mentioned above, I wanted to strip out the Clerics and replace them with Thieves (more in-line with the Fighters and Wizards in terms of levels and alignment distribution, in fact). So in the first table, my last two rows look like this:
The monsters I used were almost all from Sup-I Greyhawk, but I think that's acceptable since it's where the Thieves themselves come from (the elves in the top-right are Hero/Theurgists, i.e., 4th-level in each class). For the second table I gave Thieves a 25% chance of having a Magic-User, level 5-8 (same as for Fighting-Men).
Open questions -- Per the text, "Occupants of these castles will venture out if a party of adventurers passes nearby", so as to make certain demands for tribute/treasure/toll, as indicated for each. One question is: What men do they bring with them? -- Initially I presumed just the castle leader himself with the Guards from Table 1, but in hindsight it seems a bit suspect that the castle ruler would jeopardize himself in such way (e.g., instead of using the castle itself for protection; perhaps that's good for the game, or perhaps they should bring a host standard men with them?). Second question is: What should Thieves do for analogous challenge/demands? -- I tried to come up with something, and frankly couldn't see anything in-flavor except for Thief-types to lay in hiding within their castle, hoping to ambush unwary intruders (which seemed to make sense until my PCs went to explore said castle and I had to make up reasons for how hundreds of men could remain hidden at once). Maybe you've got better ideas for those reactions?
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123549.87/warc/CC-MAIN-20170423031203-00223-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 2,597
| 5
|
https://learn.adafruit.com/category/circuitpython?guide_page=2
|
code
|
94 GUIDES | 860 PAGES | 5 FEATURED | 0 POPULAR
The sensor uses an infrared LED to bounce light off objects in front of it and time how fast it takes for the light to return. You could do all this yourself with LEDs and light sensors, but the VCNL4010 wraps all that logic up into a stand-alone chip for you! With the VCNL4010 you can easily read the proximity (i.e. if an object is near or far) and even ambient light level over a simple I2C connection.
Are you ready? Really ready? Cause here comes the fastest, most powerful Metro ever. The Adafruit Metro M4 featuring the Microchip ATSAMD51. This Metro is like a bullet train, with it's 120MHz Cortex M4 with floating point support. Your code will zig and zag and zoom, and with a bunch of extra peripherals for support, this will for sure be your favorite new chipset.
You've already gotten started with CircuitPython. What's next? CircuitPython Essentials! This guide provides examples all of the core modules and some of the common libraries found in CircuitPython and how they're used. You'll be able to use any board designed for CircuitPython and learn about the different concepts included in the language. It's time to take the next step!
Use your powers for good while teaching people about computer security! This Gemma M0 will pretend to be a USB keyboard when plugged into a host computer, and then it will inject the machine with commands to swap background images or leave warning messages that can't be ignored! Or, turn it into a USB Mouse Jiggler for more antics!
This little sensor looks an awful lot like the popular DHT11/DHT22 temperature and humidity sensors, but unlike classic DHT sensors, it has an I2C interface! That's right, you do not need to use a bit-bang timing-specific protocol to talk to the AM2320, it uses plain-old-I2C. Whew, that makes things a little easier, doesn't it?
Program your favorite AVR chips directly from CircuitPython with this handy helper class that will let you make stand-alone programmers right from your REPL. Should work with any/all AVR chips, via SPI programming. You can use this code to program chips without any additional software or drivers - just drag a Hex file over to program it!
The Circuit Playground Express has a built in infrared (IR) sensor, and it's very simple to decode the signals using CircuitPython, thanks to the Adafruit Infrared library. We'll program the CPX to read IR blasts from the mini remote control and use these commands to change the bright, beautiful NeoPixels. Plus, we'll defuse the light and dress it up with an inexpensive hobby store ornament and festive puff balls!
This guide will introduce you to the CircuitPython community and everything that comes with it. You'll learn about where to get your questions answered, provide help to others and contribute in a variety of ways. Whether you're a beginning just starting out or a seasoned programmer, you'll find there's something for everyone. See you soon!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221216453.52/warc/CC-MAIN-20180820121228-20180820141228-00086.warc.gz
|
CC-MAIN-2018-34
| 2,963
| 9
|
https://nuez.io/projects/delft/
|
code
|
Drupal voor Gemeenten (Drupal for local governments) is a Drupal installation profile for websites for local authorities. It implements proven concepts to make local goverment websites as intuitive and user-friendly as possible. The Drupal 7 version is currently used in over 30 websites for local goverments in the Netherlands. Delft is the first use case for the Drupal 8 version.
I was asked to build the port of Drupal voor Gemeenten to Drupal 8, while at the same time developing the specific use case of the city of Delft website.
Configuration management was particularly challenging to solve: In this case configuration belongs both to the website instance of Delft and to the modules that come with the installation profile.
It implements external services such as OWMS. On the frontend side it fully integrates the popular Patterlab library.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363376.49/warc/CC-MAIN-20211207105847-20211207135847-00292.warc.gz
|
CC-MAIN-2021-49
| 851
| 4
|
https://www.blockspring.com/docs/ruby
|
code
|
Getting Started with Ruby on Blockspring Quickstart Learn to run any function in the Blockspring library. Deploy your first function in minutes. Available gems Learn about the dependencies Blockspring supports. API Reference Dig deeper into the Blockspring gem for Ruby. Local development Use your local development environment to build Blockspring functions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202572.29/warc/CC-MAIN-20190321193403-20190321215403-00213.warc.gz
|
CC-MAIN-2019-13
| 359
| 1
|
http://gundogforum.com/forum/viewtopic.php?f=93&t=37631&sid=9f5e0720522ba6fca69bc0a1044cfba5&p=354933
|
code
|
buckwildbirddogs wrote:I am having trouble adding pictures to all my posts. I have added pics to them in the past but now it wont let me add updated pics. Please Help.
buckwildbirddogs wrote:trying to upload from a USB drive. I can find the pic and select it but then when I click submit it tells me file I am trying to upload is invalid.
buckwildbirddogs wrote:Jpeg. But I don't know how to resize or even tell how big they are
Users browsing this forum: No registered users and 1 guest
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120844.10/warc/CC-MAIN-20170423031200-00178-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 487
| 4
|
https://lists.freedesktop.org/archives/packagekit/2007-September/019773.html
|
code
|
[packagekit] Yum backend throttling
rnorwood at redhat.com
Wed Sep 26 14:15:20 PDT 2007
Richard Hughes <hughsient at gmail.com> writes:
> skvidal mentions we can throttle the download:
> This would be great. Apparently there's stuff in the YumRepository
> object. I think 40% might be a good metric.
> Can a python dude tell me how easy this is? The first to reply gets to
> implement this :-)
I'm just starting to poke around in the yum backend code, and it looks
doable to me. Tim or Luke get first crack at it though, if they want
> p.s. All contributors get Christmas cards. Really.
Exploding Christmas cards?
Red Hat, Inc.
"The Sage does nothing, yet nothing remains undone."
-Lao Tzu, Te Tao Ching
More information about the PackageKit
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594101.10/warc/CC-MAIN-20200119010920-20200119034920-00107.warc.gz
|
CC-MAIN-2020-05
| 741
| 17
|
https://www.cloudberrylab.com/resources/blog/cloudberry-explorer-introducing-upload-rules-for-google-and-azure/
|
code
|
Just a few weeks ago we added the Upload Rules feature to CloudBerry Explorer for Amazon S3. With this release of CloudBerry Explorer for Azure and CloudBerry Explorer for Google, we are adding the feature that will make it easier to apply predefined settings to the objects.
Now you can optionally enable encryption and compression for selected buckets only. You can also configure the predefined set of HTTP headers for every upload. this is useful if, for instance, you use one of the buckets for data backup while other buckets for serving the files on a website.
The feature works exactly the same way as for CloudBerry Explorer for Amazon S3 and you can learn more about it at https://www.cloudberrylab.com/resources/blog/cloudberry-explorer-introducing-upload-rules/
Note: this post applies to CloudBerry Explorer for Azure 1.3 and CloudBerry Explorer for Google 1.6 and later.
As always we would be happy to hear your feedback and you are welcome to post a comment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039744513.64/warc/CC-MAIN-20181118155835-20181118181835-00387.warc.gz
|
CC-MAIN-2018-47
| 973
| 5
|
https://medium.com/@mjbalaji17/best-books-for-python-in-data-science-f4b23e06a3a6
|
code
|
Best Books for Python in Data Science
When it comes to Data science or Data analysis,python is the best language.It’s because of its libraries,structured language. The books which I’m going to post now starts from Basics to master Data science.
Python for Data Analysis
This book is mainly written on the basis of Pandas.This book is written by Mckinney who is the principle author for Pandas and this book mainly explains how you can employ to your data set.It also showcases how many things you can data with these libraries.
Python for Data Analysis guides readers about the ways in which Python can be used to analyze large sets of data. It…amzn.to
This book mainly deals with introduction to Bayes theorem and Bayesian statistics,before getting into this book,you should have good basics of Probability and python programming to code.This too explains the application of Bayes theorem in Statistics world.
If you know how to program with Python and also know a little about probability, you're ready to tackle Bayesian…amzn.to
Programming collective intelligence
This book mainly deals with How collective intelligence sites work.For example,Google ranking Webpages,flipkart recommending products.This gives the real world grounding and application and bayesian statistics to explain Data Science.
This fascinating book demonstrates how you can build web applications to mine the enormous amount of data created by…amzn.to
Mining the Social Web
Want to learn the APIs of Huge Social platforms??This book is the best place to learn about APIs about Social platforms and gives a huge insights about Data Munging and analysis for Data.
How can you tap into the wealth of social web data to discover who's making connections with whom, what they're talking…amzn.to
NLP with Python
By 2020,Text analytics market is going to increase by 4.17 Billion.This book mainly deals with Parsing,natural language processing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825264.94/warc/CC-MAIN-20171022132026-20171022152026-00062.warc.gz
|
CC-MAIN-2017-43
| 1,925
| 15
|
http://shribhimashankarbed.com/vision-mission.php
|
code
|
Shri Bhimashankar B.Ed. College(SBBED) is housed in a spacious campus in Landewadi near Manchar, Pune, which is surrounded with a natural green environment.
To develop a center of excellence by providing global avenues in education and research for the development of competent and committed educational professionals to meet the future challenges.
The institution tries to inculcate and promote the following values amongst its stakeholders
The ultimate mission of our institute is best described as “AN EXPEDITION-IN PURSUIT OF EXCELLENCE”
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476137.72/warc/CC-MAIN-20240302215752-20240303005752-00788.warc.gz
|
CC-MAIN-2024-10
| 545
| 4
|
https://jackiezstyle.com/products/fendi-large-logo-python-embossed-pouch-clutch
|
code
|
We guarantee this is an authentic item or 100% of your money back.
Please remember that most of the items that we carry have been previously owned. Unless otherwise stated, they may not be in absolutely flawless condition. We include very detailed pictures and give accurate written descriptions... so check them carefully. Please pay particular attention to the sizes and measurements.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334644.42/warc/CC-MAIN-20220926020051-20220926050051-00717.warc.gz
|
CC-MAIN-2022-40
| 386
| 2
|
http://radiopaedia.org/articles/see-also
|
code
|
See also is a common section that appears at the end of articles. It lists, as bullets, any articles that may be of interest to the reader. However, it also refers to linkage within the body of the article to articles that expand on an idea or section. In addition, when topics are large, they may require several articles, a good example being those that relate to TB.
Where we refer to an article that expands upon the topic of a paragraph, we tend to use the format:
See: main article
This works in the majority of cases, although where there is more explanation needed, it may be more relevant to embody the link in prose:
This article discusses abdominal manifestations of sarcoidosis. A general discussion can be read in the main article on sarcoidosis.
The main article refers to general information about TB and then links to the articles written for more specific manifestations of the disease, e.g. pulmonary manifestations of TB. Since there are many sub-articles, the best way to achieve this is to use a nested bulleted list.
Help and Style Guide
style guide and help
- general overview
- numbers, units and operators
- language and spelling
- punctuation etc...
- have a play in our sandbox (test page)
- how to create an article (watch YouTube tutorial)
- anatomy of an article
- contributing a case to illustrate an article
- see also
- adding images to an article
- merging duplicate articles
- eponymous syndromes
- synonyms (watch YouTube tutorial)
- why upload cases to Radiopaedia.org
- how to upload a case (watch YouTube tutorial)
- patient confidentiality
- case publishing guidelines
- anatomy of the perfect case
- quiz mode
- images / series
- attributes and selection tools
- medical illustrations and diagrams
- good deeds needing doing
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510272680.42/warc/CC-MAIN-20140728011752-00301-ip-10-146-231-18.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 1,765
| 31
|
https://vox.veritas.com/t5/Backup-Exec/Integration-Module-Integration-for-Symantec-Backup-Exec-for/m-p/207157
|
code
|
not at all. The VCB software is needed to backup a virtual machine.
VMware Converter is also needed if you want to use the new VMware Agent of BackupExec12.5.
There is no need for the VMware "Virtual Center".
Can you point to any good documentation on this. I can see my esx3.5i server in Backupexec but cannot connect to it, I get access denied when trying to access. I know I have the correct username and password for the esx server as I login in with the infrastructure client no problem. I called support and they said it was a firewall running on the esx server which is not true. This is the latest esx version that has no service console.
I already have converter and vcb on the backup server.
Any guidance appreciated.
I am sorry dwynne, I also don't have good documentation.
I am not from symantec and I think backup exec 12.5 is to new that any documents exist.
I don't know if you even can use backup exec with the ESXi and the VMware agent.
ESXi is without VCB license so I really don't know if you can succed with it...
... I did a little research. VCB is officially not supported by ESXi ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703538741.56/warc/CC-MAIN-20210123222657-20210124012657-00384.warc.gz
|
CC-MAIN-2021-04
| 1,106
| 11
|
https://www.kalibrr.com/c/boostachic/jobs/36682/front-end-developer
|
code
|
- Provide Front-End software development for an exciting and vibrant web application stack, operating in a Mobile-First but responsive to Desktop manner.
- Work in an "Agile team,"using a JiT methodology that includes unit testing, pair programming and peer review.
- Excellent HTML Skills
- Excellent CSS Skills
- Competent with Less / Sass
- Competent with Git for Version Control (previous experience of GitHub and GitHubFlow especially useful)
Perks and Benefits
- Paid Holidays
- Paid Vacation Leave
- Paid Sick Leave
- Medical / Health Insurance
Feel secure when applying: look for the verified icon and always do your research on a company. Avoid and report situations when employers require payment or work without compensation as part of their application process.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218193288.61/warc/CC-MAIN-20170322212953-00630-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 773
| 12
|
https://community.netapp.com/t5/OnCommand-Storage-Management-Software-Discussions/Proxy-installation-fails/td-p/19580
|
code
|
2013-03-11 06:12 AM
I'm working on a POC (it's a different POC than my previous post) and we cannot install the proxy. Basically, the setup is launched successfully (with java webstart 6 update 30 32 bits) but during the installation process we get this error:
The firewall is stopped. The IP is right. We haven't any idea why it's not working. We are using the last GA version of Balance (posted the last week).
Anybody has any hints ?
Solved! See The Solution
2 REPLIES 2
Re: Proxy installation fails
2013-03-11 06:23 AM
Most likely root cause: Right click the browser and "Run as Administrator" and then retry the proxy installation.
Make sure UAC is disabled if this is a Win2k8 server
Make sure DFM is not installed and running on the same server.
With best regards,
OnCommand Insight SE
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247493803.26/warc/CC-MAIN-20190219223509-20190220005509-00249.warc.gz
|
CC-MAIN-2019-09
| 792
| 13
|
https://www.nuget.org/packages/StaticSphere.CleanArchitecture.Api
|
code
|
dotnet new install StaticSphere.CleanArchitecture.Api::2.1.0
Clean Architecture Template
dotnet new solution template was created following the guidelines of the Clean Architecture pattern as demonstrated by Jason Taylor in his Clean Architecture talks and posts. While the solution starts there, there are some opinionated coding patterns added in on top of the architecture that help to ease testing and maintenance.
Original Clean Architecture Resources
- No dependencies.
This package is not used by any NuGet packages.
This package is not used by any popular GitHub repositories.
Renamed the Entity Framework class (if --includeEf is specified) to ApplicationDbContext. However, you can
provide the optional --dbContextName to change this. You'll want to add DbContext as a suffix to this name
if you want it. Fixed broken --includeTests parameter (before, it would always include tests). Added removal
of Server header to the Program.cs file. Included usage of IPrincipalService; you can remove it if you don't
want or need it. Updated unit tests. Cleaned up existing code. Added additional unit tests for the API and
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943555.25/warc/CC-MAIN-20230320175948-20230320205948-00294.warc.gz
|
CC-MAIN-2023-14
| 1,123
| 12
|
http://wiki.brainpulse.com/windows/how-to-install-tomcat-as-a-windows-service.php
|
code
|
On the Windows platform, application loading can be done using Windows Services. The below illustrated steps assume that you’ve installed the Tomcat to the default installation location.
Follow the below listed steps to install the Tomcat
- Shut down any instance of Tomcat if it’s running.
- Download JavaService.zip from the URL below, and unzip to c:\java\setup (creates JavaService subdirectory).
- In c:\java\setup\JavaService\bin, double-click installTomcat4.1.30.bat (modify this file if you’ve installed to a different directory)
- Open the Windows services dialog box.
Click Start go to Settings then choose Control Panel and select Services from Administrative Tools
Verify that you now have a “Tomcat_4.1.30” service.
- Right-click on it and select Properties.
- Under Startup Type, select “Automatic” from the drop down if it is not selected already.
- Click OK to close the dialog.
- Click the start icon (right-pointing triangle) to start Tomcat up.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703334458/warc/CC-MAIN-20130516112214-00068-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 977
| 12
|
https://morioh.com/p/fdea6baa3ddb
|
code
|
But what has this in common with const, let, and var?
Var is the true source of them all because let and const came in with ES2015. Var is a pretty common keyword, even today when we got let and const. It is better not to use it, though. Because a variable defined with var is just like a local variable in C#. It is only usable inside this function, that declared it.
What is so different here? I provided two examples for you. The first one declares the variable in the middle of the method and initializes it right away.
Who else loves to write side-effects-free functions? I think we, as programmers, all do. Today, in this story, I will walk you through the basic principles of functional programming that will make your coding life easier.
Formatting code consistently is a pain, especially when working on a team. The beauty of modern-day web development is that the tooling has gotten so much better! In this article, we will look at setting up Prettier to automatically format your code in Visual Studio Code.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178363211.17/warc/CC-MAIN-20210302003534-20210302033534-00110.warc.gz
|
CC-MAIN-2021-10
| 1,018
| 5
|
https://supertux.info/slovakia/gay-red-hot-boners-92799.php
|
code
|
Well, I lied, the boners are actually out of the black. Posted by jack homosexual. Labels: Black , Dick , Speedo , Suck. Post a Comment. Wednesday, December 5, Boners in Black.
Gay bear videos
Red Hot Gingers - ▷ DVD Gay Online - Gay porn movies online HD
Follow Slashdot blog updates by subscribing to our blog RSS feed. Slashdot Apparel is back! Do you develop on GitHub? You can keep using GitHub but automatically sync your GitHub releases to SourceForge quickly and easily with this tool and take advantage of SourceForge's massive reach.
Results for : red hot straight boys
Have you ever been with a ginger guy? If not, maybe you should. With locks of red hair framed by a stunning smile, many of them left me speechless. Much of this can be traced to stereotypes; things that are simply untrue. Examples include guys with red hair having small peens or being bad in bed.
School is IN! All the boys in their white shirts and ties. After classes are finished and on his way home, Felix passes by an open door and spots Guido Cavas on his knees giving tall, muscular, Bahiano Fox an incredible blow job. Bruno Stygmata is late and Alan William, while watching a movie on his bed, calls him up wondering what the delay is. Bruno says he will be there soon but Alan gets tired waiting for and falls asleep.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780053918.46/warc/CC-MAIN-20210916234514-20210917024514-00328.warc.gz
|
CC-MAIN-2021-39
| 1,310
| 7
|
https://dennis-gilbert.com/tag/metric/
|
code
|
Successful leaders and organizations often cite the creation and monitoring of metrics as the tool to track progress. Does the metric always provide the correct measurement? Are you operating using the metric assumption?
In the strategy meeting someone will ask, “What is the metric here? How will we measure our progress and result?”
It is a fair question.
Of course, the other option is that no one asks at all. No one spends any energy to think about the metric, they just want to roll up their sleeves and take a deep dive.
Either scenario may achieve some results. Either scenario may involve some risk, some guess work, and need to be fluid with outcomes.
It seems we may make a metric assumption. The assumption is that when we have metrics and measurements, we can more easily assess the results. While this is likely true, does it cover everything about the project?
People are sometimes suggested to remove the emotion, focus only on the result, and everything that matters is in the KPI (key performance indicator).
Do you have metrics or measurement for the aspects of the organization that make it an organization? Have you considered the organizational culture component?
Do they have a metric?
The most successful projects, work groups, and organizations are those who have deep roots in a culture that is emotionally connected to the work at hand. Purpose is a driver and the goal may be just as important as the paycheck.
Metrics are both valuable and important, they can also be a good motivator. If you assume metrics alone are what drives the project, I hope you are including all of the intangibles.
Dennis E. Gilbert is a business consultant, speaker (CSPTM), and corporate trainer that specializes in helping businesses and individuals accelerate their leadership, their team, and their success. He is a five-time author and some of his work includes, #CustServ The Customer Service Culture, and Forgotten Respect, Navigating A Multigenerational Workforce. Reach him through his website at Dennis-Gilbert.com or by calling +1 646.546.5553.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703548716.53/warc/CC-MAIN-20210124111006-20210124141006-00427.warc.gz
|
CC-MAIN-2021-04
| 2,066
| 12
|
https://ubuntu-mate.community/t/apps-that-require-elevated-permission-to-run-are-no-longer-opening-from-menu/22656
|
code
|
I don't know at what point this started happening (some time after upgrading from 18.04 LTS to 20.04 probably) but I can no longer start an app from the Menu if it requires elevated permissions to run.
In the past, when I opened (for example) Synaptic or Gparted from the Applications Menu I would get a pop-up window requesting the password for the elevated permissions. NOW, I can only get these apps to start if I use the command line with sudo (e.g., as the command to run that particular app). Otherwise, I click on the app in the Menu and nothing at all happens other than the Menu minimizing again.
Is this a new security feature in 20.04?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401632671.79/warc/CC-MAIN-20200929060555-20200929090555-00210.warc.gz
|
CC-MAIN-2020-40
| 646
| 3
|
http://www.maximumpc.com/forums/viewtopic.php?f=6&t=242745&start=0
|
code
|
An SSD can definitely help. A 120Gb would do nicely. Samsung EVO
Make sure you have at least 8Gb of RAM. Presumably you have removed most startups. Make sure your BIOS settings are proper for fast boot. Make sure to update your chipset and SATA drivers before installing Win 7 Pro on the SSD. Check for a firmware update on the SSD. Use performance tools to evaluate what is stealing performance and monitor effects of any changes made.
My advice get hardware, drivers, BIOS set up before OS. Make one change at a time, keep notes, test with an appropriate app and return to default if no significant change. Most changes will not improve anything. Despite kludging their OS up with built in apps, Microsoft almost always would have already done a performance improvement if it would speed things up. Prepare to spend a day. Make several drive images along the way in case you want to reset and start over from some point.http://www.blackviper.com
- see services and other thingshttp://www.tweakguides.com/TGTC.html
- download the free, you can decide if you want the $5 deluxe version later if you are happy with the guide.
With regard to the network, update router firmware, make sure DHCP and DNS pointers are correct and where you want them and update Ethernet driver and swap cable. Linking should be a few seconds even with a slow system. Also do a power cycle of both the router and the ISP modem/DSL box. If this is a wifi connection the wifi transmitter/receiver may be going bad in either device, but update the wifi driver first.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246652631.96/warc/CC-MAIN-20150417045732-00288-ip-10-235-10-82.ec2.internal.warc.gz
|
CC-MAIN-2015-18
| 1,540
| 6
|
https://docs.cognitivevr.io/unreal/scene-explorer/
|
code
|
Step 1: Setup the SDK plugin in Unreal¶
If you have not already done so, please install the plugin as explained here Get Started.
Step 2: Install Blender¶
Blender is used to reduce the geometry of the scene. This can dramatically reduce the load time of your scene at SceneExplorer.com. Blender is free and open source.
Simplygon is another tool to reduce your scene's geometry, but we do not automate and support this at this time.
Step 3: Export the scene¶
This process and interface will change in upcoming patches.
Open Project Settings... and scroll to the cognitiveVR settings near the bottom.
Use this popup will tell Unreal where the Blender.exe is located. If Blender was installed into Program Files, this may be completed automatically.
Select Export Meshes¶
Press this button to select all static mesh objects. There are options above, but the defaults should be fine for most projects.
- Min Polygons sets the lower threshold for meshes with few than this many faces. By default, meshes with <500 polygons are not reduced
- Max Polygons sets the upper threshold for meshes with more than this many faces. By default, meshes with >20000 polygons are reduced to 10%. Between these two thresholds is a linear scale of the amount the meshes will be reduced
- Static Only selects only non-movable actors. This is usually the correct behaviour
- Increase the Minimum Size option to ignore any small detail meshes you might have
- Maximum Size allows you to ignore any massive meshes you have, such as skyboxes
- Texture Resize Factor reduces the resolution of your textures. 2 reduces the resolution to half. 4 reduces the resolution to a quarter. This should be a power of two greater than zero.
Select any other meshes you wish to export. Text meshes are known to not work. See Troubleshooting if you need to export Geometry Brushes (BSP).
Change the export option to .obj and select a new empty folder. Press YES to export materials.
This will run a python script within Blender to reduce the geometry. This will output a smaller version of the obj.
This will also run a python script in Blender. It will downsize textures and save them as pngs.
Step 4: Upload the Scene¶
After the above steps have been completed, select all the files in the root directory. From the example above, it is these 4 files. Your scene will likely have more pngs.
- CubeMaterial_ CubeMaterial_D.pngs
Drag all the files into uploader at SceneExplorer.com.
Step 5: Set SceneID¶
When the files have finished uploading, take the SceneID from the popup.
Open Project Settings... from the Edit menu in Unreal and scroll to cognitiveVR settings near the bottom.
Add a new entry in the Scene Keys array. The SceneName should be the exact name of the scene in the content browser. The SceneID should be the unique ID from SceneExplorer.
Step 6: Attach Player Tracker¶
The Player Tracker records where the HMD is positioned and the point the HMD is looking towards.
- Add the PlayerTracker component as a child actor to your character's camera
Step 7: Send Data¶
At the moment, sending player data must be done manually.
The Flush Events blueprint node and Send Player Data blueprint node will upload saved player data to SceneExplorer.
This example shows how to Send Player Data then Open a new Level 10 seconds after the level has begun.
To send the collected player data using C++, use this code:
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189088.29/warc/CC-MAIN-20170322212949-00163-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 3,386
| 37
|
https://www.researchsquare.com/article/rs-17212/v1
|
code
|
Background: Gene signature is useful to represent the molecular alternation in the disease genomes at specified conditions and is often used to distinguish samples into various groups for better research prospective as well as better clinical treatment. There is lack of efficient techniques that can take into account the complex gene expression profile and able to identify the most relevant signatures.
Methods: In this article, we presented a new framework to identify Dense Module based gene Signature (DeMoS) and their targeting miRNAs through Quasi-Clique detection algorithm and their application in prognosis survival study. Here we applied a cervical cancer data repository with prognosis clinical data to conduct our experiment. We first performed Empirical Bayes test using Limma method to identify dysregulated genes (or, miRNAs). MiRNA-mediated dysregulated target genes had been extracted from those dysregulated miRNAs. Thereafter, We detected dense co-expressed modules using Quasi-Clique identification technique. The average correlation coefficient was then computed for each resultant module. The module containing the highest correlation was formulated as the resultant gene signature. Next, We applied three well-known classifiers (SVM, PAM and Random Forest (RF)) using 10-fold cross-validation, and obtained AUC. Finally, we performed survival prognosis study for the resultant gene signature.
Results: The resultant signature consisted of ten genes, FGF9, FGF18, PPP1R9A, ERBB4, DCDC2, TOX3, ARMC3, DNALI1, RGL3 and ENPP3. In addition, We identified a total of eight dysregulated miRNAs that targeted the aforementioned gene signature. Hsa-mir-34c was found to be strongly associated with the genes signature since its out-degree centrality score was highest. On the other hand, the p-value of the Cox regression in the prognosis study for the resultant gene signature was found to be significant (=4.2e-02). Finally, DeMoS evaluated the highest AUC values (viz., 0.95 for SVM, 0.955 for RF, 0.955 for PAM) for our resultant gene signature in compared to the other state-of-the-art techniques.
Conclusions: Our framework estimated most promising gene signature that could classify multiple groups/subtypes of samples with higher AUC as well as statistically significant p-value in regression based prognosis analysis. Our method is useful to determine signature for any RNA-seq profile. Code is available at https://github.com/sahasuparna/DeMoS.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499946.80/warc/CC-MAIN-20230201144459-20230201174459-00019.warc.gz
|
CC-MAIN-2023-06
| 2,470
| 4
|
https://discussions.unity.com/t/device-present-profiling/41068
|
code
|
I’m having a hard time understanding why my iphone game is running so poorly. I basically just have a few particles that are rendered in camera 2 to a rendertexture. Then that gets used by the maincamera on some geometry. I’m too unfamiliar with unity iphone to know if I’m running into a bug or just overtaxing the iphone gpu with this very simple scene.
But especially i’m confused by the behavior of Device.Present. It oscillates wildly even though the scene isn’t changing. Is this some kind of strange VSync behavior? Is it just the CPU waiting on the GPU? And if so, why would the GPU be oscillating?
If anyone can help me understand what Device.Present is and how to more effectively profile on my iphone, it would be much appreciated. Thanks!
Oh - and here’s a screenshot of my profiler:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.7/warc/CC-MAIN-20230923094750-20230923124750-00800.warc.gz
|
CC-MAIN-2023-40
| 807
| 4
|
https://www.odesk.com/o/profiles/browse/c/software-development/sc/other-software-development/skill/mailchimp/
|
code
|
mailchimp Job Cost Overview
Typical total cost of oDesk mailchimp projects based on completed and fixed-price jobs.
oDesk mailchimp Jobs Completed Quarterly
On average, 262 mailchimp projects are completed every quarter on oDesk.
Time to Complete oDesk mailchimp Jobs
Time needed to complete a mailchimp project on oDesk.
Average mailchimp Freelancer Feedback Score
mailchimp oDesk freelancers typically receive a client rating of 4.66.
Working with WordPress since last 4 years and a WordPress verified plugin developer. Able to write plugins, themes, implement any custom functionality. My objective is to deliver the best quality work at a fair price paired with a timely deliver. I try and work closely with you when you need me to, or closely with your designers, IT, consultants or whoever else might be involved in the project. It is my firm belief that good communication and team working is what creates really special results for your project.
I'm a Magento developer and consultant of having over 4 years of experience. I have finished MORE THAN 200 MAGENTO jobs successfully with great feedback. Exhaustive skill and business professional expertise to provide efficient and elegant solutions with the following: ✔ Magento Responsive theme development. ✔ Basic configuration of Magento based eCommerce store. ✔ PSD ot Magento theme conversion. ✔ Magento speed optimization. ✔ Magento version up-gradation. ✔ Magento Data Export & Import. ✔ Integration of different Magento extensions. ✔ Customization/Modification of pre build Magento theme design as clients requirement. ✔ Magento site maintenance. ✔ Basic and advance SEO for eCommerce website. ✔ Fixing Magento browser compatible issues. ✔ Theme related bug fixing. ✔ Plugin Related bug fixing. My goal is to attain client satisfaction by professionalism, superior quality, innovation and deliver web applications using the latest technologies with best quality.
I am Magento Certified Developer - http://www.magentocommerce.com/certification/directory/dev/781460/ I can do full complex build of site or Magento store build for you! Include all backend (PHP5, MySQL, Magento, WordPress, Bitrix) and frontend (HTML5, CSS3, jQuery) work! My skills: - Magento extentions - development, customization, integration, resolve conflicts - Magento templates\themes - full HTML5\CSS3\jQuery responsive/adaptive design solutions - Magento API - E-Commerce SEO - Migration to Magento from other E-Commerce CMS - WordPress - creation, integration, customization of templates and plugins - Responsive/adaptive web design (based on html5, css3 which fine work in most popular browsers, tablets and mobile devices). - Working with AJAX and jQuery - PSD -> HTML - Twitter Bootstrap
I’ve been using WordPress since 2005 and actively doing client work since 2012. I have recently expanded into customizing Shopify sites and themes. As an independent developer I excel at the following: * Converting your design into a WordPress or Shopify site * Making sure your site works on all devices, from smartphones to widescreen desktop monitors * Custom fields, post types and page templates * Site installations * Theme customizations * Site migrations * Backups * Sass I will communicate with you frequently. You'll never have to wonder about the status of your project. I'm intimately familiar with cPanel and DigitalOcean droplets and most shared hosting and VPS server configurations. More importantly, I'm very good at troubleshooting and understanding software platforms. If I can't take care of a task, I'll let you know right away.
Tris Hartanto, a Web-Graphic Designer based in Jakarta, Indonesia specializing in simple-fine custom made website & email design since 2001. Specialization: - HTML Email Signature - HTML Email Newsletter, Email Campaign/Marketing/EDM with: --- Mailchimp --- iContact --- Constant Contact --- Aweber --- Campaign Monitor --- GetResponse --- Vertical Response --- Infusionsoft --- Mandrill --- etc. - RSS to Email - Web Design - HTML slicing (PSD to xHTML) - eCard, Greeting Card - Web Header and Banner - Web Development or Blog with Wordpress
Mary Licanin Agency Contractor
I'm a web developer with years of experience and a long list of satisfied clients. My specialization is in xhtml / css coding and WordPress / PHP. I build websites from the ground up, by hand. I can take a beautiful web design and bring life to it as a functioning website. I can transform your WordPress site from a good site into a great site. What can I do for you today? Contact me and let me know.
Sanja K. Agency Contractor
Specialize in email marketing via MailChimp including integration via .Net, Web widgets, Wordpress. My key skills are: - Creating HTML based templates and emails optimized for desktop email clients and mobile devices - Preparing email campaigns, regular as well as RSS, autoresponders, A/B split - creating email content dynamically based on the web site content using mailchimp and programming tools. NET (C#, ASP.NET), CSS HTML/XHTML, Wordpress and PHP and MailChimp platform are what I am working with over the last 10 years.
Bilal B. Agency Contractor
Murshed A. Agency Contractor
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246636650.1/warc/CC-MAIN-20150417045716-00059-ip-10-235-10-82.ec2.internal.warc.gz
|
CC-MAIN-2015-18
| 5,195
| 19
|
https://www.shepherdstownchronicle.com/news/2018/04/06/invasive-species-expert-discusses-outlook-of-ecosystem/
|
code
|
Invasive species expert discusses outlook of ecosystem
Stink bugs, pythons and kudzu-all invasive species that many people wish would just go away. Whether they’re introduced to the environment accidentally or intentionally, the end result is the same: disruptions and often devastation to the local ecosystem.
Adam Frederick, assistant director of education at Sea Grant Maryland, was the guest speaker at the First Tuesday speaker series held at Christ Reformed United Church of Christ in Shepherdstown. He discussed invasive species in the area.
Frederick cited the story of how the Chinese Chestnut tree was accidentally imported to America in the early 1900s and how it destroyed the American Chestnut tree. The death of the trees was a devastating blow to American agriculture and lumber businesses.
“It really is the same story, repeated over and over again, about how invasive species come about in a certain geographical region,” said Frederick. “If you were here when the American Chestnuts were the predominant tree, you would have walked outside and that’s the tree you would have seen everywhere … The trees were used for everything like lumber, food supply, all kinds of other things in farming. In a span of 40 to 50 years, the whole Eastern area from Maine to Georgia was devastated. All the Chestnuts were dead.”
Frederick noted the difference between non-native and invasive species: Invasive species are classified as such due to the environmental and economic harm they cause, and aren’t limited to plants, but include insects, fish, birds, bacteria and mammals.
He gave examples of invasive and non-native species including Burmese pythons and Cane toads in Florida, stink bugs, snakehead fish, the Norway rat and many others, including birds like English sparrows and starlings.
Even many common gardening practices introduce non-native species, like tulips, to people’s yards. Tulips don’t necessarily cause any problems, but people tend to forget they’re not native to the area, along with many other “exotics” that are planted.
The endless interconnection of species, bacteria and ecosystems make this issue of invasion a real cause for concern. Lack of natural predators, ecological destruction and rapid reproduction paint a bleak picture for the ability to control invasive species, but the country is making strides in management due to integrated pest control strategies, stricter regulations and monitoring of illegal animal trade, and more education about purposeful planting of native flora.
According to the West Virginia Department of Natural Resources website, the number of non-native invasive plant species in West Virginia is rising. Of vascular, or seed-bearing, plants found in West Virginia, 663 species, or 28 percent, outside the cultivation are non-native. Each year, ecologists become more aware of the number of invasive plant species within the state and the threats they pose to natural communities.
Ecologists from various state departments of natural resources agree that, with careful thought and control of introducing non-native species, as well as planting and encouraging growth of regional native plants, beneficial insects and organisms will be able to come back and thrive.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056297.61/warc/CC-MAIN-20210918032926-20210918062926-00692.warc.gz
|
CC-MAIN-2021-39
| 3,258
| 11
|
https://github.com/canoalberto/Kappa-Updated-Ensemble
|
code
|
Kappa Updated Ensemble for drifting data stream mining
Learning from data streams in the presence of concept drift is among the biggest challenges of contemporary machine learning. Algorithms designed for such scenarios must take into an account the potentially unbounded size of data, its constantly changing nature, and the requirement for real-time processing. Ensemble approaches for data stream mining have gained significant popularity, due to their high predictive capabilities and effective mechanisms for alleviating concept drift. In this paper, we propose a new ensemble method named Kappa Updated Ensemble (KUE). It is a combination of online and block-based ensemble approaches that uses Kappa statistic for dynamic weighting and selection of base classifiers. In order to achieve a higher diversity among base learners, each of them is trained using a different subset of features and updated with new instances with given probability following a Poisson distribution. Furthermore, we update the ensemble with new classifiers only when they contribute positively to the improvement of the quality of the ensemble. Finally, each base classifier in KUE is capable of abstaining itself for taking a part in voting, thus increasing the overall robustness of KUE. An extensive experimental study shows that KUE is capable of outperforming state-of-the-art ensembles on standard and imbalanced drifting data streams while having a low computational complexity. Moreover, we analyze the use of Kappa versus accuracy to drive the criterion to select and update the classifiers, the contribution of the abstaining mechanism, the contribution of the diversification of classifiers, and the contribution of the hybrid architecture to update the classifiers in an online manner.
Manuscript - Machine Learning
Citing Kappa Updated Ensemble
A. Cano and B. Krawczyk. Kappa Updated Ensemble for Drifting Data Stream Mining. Machine Learning, 109(1), 175-218, 2020.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300573.3/warc/CC-MAIN-20220129062503-20220129092503-00581.warc.gz
|
CC-MAIN-2022-05
| 1,962
| 5
|
https://docs.ca.com/en-us/ca-agile-central/saas/rally-portfolio-manager-best-practices
|
code
|
When setting up and using CA Agile Central Portfolio Manager, we recommend the following best practices:
Structure your CA Agile Central project tree
There are two types of projects:
- Strategy project
- For product companies or Independent Software Vendors (ISVs), use a strategy project to represent a product or an area of a product.
- For Information Technology (IT) organizations, use a strategy project to represent a multi-year
, a system, or a subsystem.
- Create portfolio items in strategy projects.
- Execution project
- Use an execution project to represent a scrum team, a
team, or a group of such teams.
stories in execution projects.
This type of structure allows all levels of your organization to view and use CA Agile Central Portfolio Manager in a way that is useful to them.
For detailed information, see Set Up Your Project Hierarchy.
Given the definitions above, your CA Agile Central project tree should follow one of these two recommendations:
Add portfolio items to the correct projects
Portfolio items should be created in strategy projects.
A higher-level portfolio item (higher than the lowest portfolio item type) affecting multiple strategy areas should be defined in a strategy project encompassing all affected strategy areas, such as product family.
In deciding where to create portfolio items, be aware that the project
does not affect portfolio item rollups, such as % Done. The children of a portfolio item do not need to be stored in the same project nor a child project of the portfolio item itself. Rollups are calculated following the parent-child association between a portfolio item and its child stories (the lowest
level if there are several levels of user stories below portfolio items).
If you use the Also show items from child projects option on the
when selecting a strategy project, you see portfolio items located in the selected project as well as those located in projects children of that selected project.
Portfolio items versus user stories
A portfolio item must represent market value to a non-development
. Someone from marketing, business, or management must understand the value delivered by a portfolio item to customers.
User stories are development requirements to implement the lowest-level portfolio items.
Portfolio items can change projects when they go in execution
Portfolio items change projects only at the lowest-level portfolio item. In an Initiative →
portfolio hierarchy, a feature should be manually relocated from a strategy project to a execution project as the feature flows through the execution team. This is especially true when an execution team works on several strategies at a time.
Portfolio item types
A portfolio item type represents a grouping of market value.
Only the lowest level of portfolio item type flows through execution teams to be implemented in a series of user stories.
Portfolio item types at higher level provide a grouping of portfolio items of a lower level to make the information more readily understood to people outside of engineering. Conversely, portfolio items below a certain level provide a way to clearly
of values to build to deliver the higher-level portfolio item. It acts as a function to define Done.
Each portfolio item type defines:
- A level of granularity appropriate for its respective audience. The highest-level portfolio item type maps to the highest-level executives in your organization.
- An order of magnitude for its duration to complete (the higher the magnitude, the longer the duration). For example, portfolio items at the lowest level should be small enough in effort to be delivered within a one to three month
- A business process to go from
All portfolio items of the same type should share the same level of granularity, duration, order of magnitude, and idea-to-deliver value stream.
Portfolio items versus projects
Create a project to represent either strategy (product, multi-year program, system) or execution. Create a strategy project to represent either a product, program, or system.
Create a portfolio item to describe the actual work (for example an initiative or feature) that will flow through execution.
Use this analogy to help you differentiate:
- If you need to know whether something is started and how far along it is, create a portfolio item.
- If you need to protect resource allocation, create an
- If you need to
to something, create a CA Agile Central project for it.
It is ok to create one of each for the same thing if you have more than one need.
Programs as a project or a portfolio item
Programs can be either. To track the program dates as well as progress status (% Done), a program (in the PMI definition: a collection of projects) should be represented as a portfolio item of type Program (with its projects as children portfolio item of type Project). Additionally, for the program manager to scope to just that one program, create a strategy project to represent the program.
Investment categories versus portfolio item types
The Investment Category
captures portfolio allocations, or budget buckets. The Portfolio Alignment
(ask your Technical Account Manager for code) allows you to monitor whether these strategy portfolio allocations are respected by the execution groups.
For PMO, program managers, and product managers:
- Set editor permission on strategy projects (where portfolio items are created)
- Set view permission on execution projects
- Set editor permission on execution projects
- Set view permission on strategy projects you want engineering to see
Note that once a level 1 portfolio item is accepted to flow through a team, you should relocate it to the execution project. The execution team can then add user stories to the portfolio item. This applies to any project tree structure.
Associate existing user stories to a portfolio item
Use any of these methods:
Associate a portfolio item to multiple stories at once
Use the Bulk Choose User Stories and Bulk Choose Children options. Note that CA Agile Central plans to provide a way to filter by projects on the Bulk dialog.
Remove completed portfolio items from view
From any CA Agile Central
- Select New Page and add the Custom Grid app.
- Set the Custom Grid panel settings to:
- Object: Portfolio Item
- Query: ((PortfolioItemType.Name = “Initiative”) AND (PercentDoneByStoryPlanEstimate < 1))
plans: CA Agile Central plans to add more filters to some of the portfolio views (portfolio items,
, portfolio hierarchy).
Define portfolio Kanban states
See Design a portfolio Kanban board in our Coaching Corner.
CA Agile Central Portfolio Manager assumes that each
represents a single portfolio. If your workspaces each represent a product or a program and you want to track them as a portfolio, you need to migrate the data from these workspaces into a consolidated workspace. CA Agile Central provides professional services to perform the data migration. We also need to understand which scenarios may call for tracking multiple portfolios (each in its own workspace).
Please contact us at [email protected] with your input.
Planned start and end dates
fields on portfolio items are intended for a product or program manager to communicate when a portfolio item will start and end. The dates are manually entered. They are not calculated or projected from engineering data. Setting these dates ensures the portfolio items are displayed on the portfolio
before engineering starts working on them, so early roadmap conversations can take place before engineering is impacted.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511173.7/warc/CC-MAIN-20181017111301-20181017132801-00052.warc.gz
|
CC-MAIN-2018-43
| 7,531
| 81
|
https://bagoscoop.github.io/videos/watch/which-barbie-are-you
|
code
|
Which Barbie Are You?
Published at : 23 Dec 2020
This quiz tells you what kind of Barbie you would be if you were packaged and put in little boxes sold at the toy store.
Take this personality test to find out more about your true personality. Find out which barbie you really are by answering 10 simple questions.
which barbie are youwhat type of barbie are youare you a barbie doll
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991982.8/warc/CC-MAIN-20210511092245-20210511122245-00232.warc.gz
|
CC-MAIN-2021-21
| 382
| 5
|
http://neko-no-hime.blogspot.com/2007/06/one-where-my-brain-and-fingers-did-not.html
|
code
|
There will be little food bloggings this week as i dont have a lot of time to load up my pics :P. Blogging is now turning to be an avenue of releasing stress..and also another outlet for me, my fingers and my brain to embarass me more.
My laptop is also one of the reasons how i can embarass my self more! What am i talking about? Those typo embarassments lah.... aiyo. My stupid HP laptop as faulty keys all over, sometimes you can press the freaking key but nothing comes out. I am the kind of person that types without even looking at keyboards assuming all keys are working fine...
So what embarassing typos did i get myself into today? (Well almost anyway....)
Incident #1: The one where the email almost got out..
Scene: Wanted to meet up new staff to go through a handover project
[Neko->typing email to staff A, when "R" key on keyboard dies]: Staff A, let's meet up at the Panty to discuss...
[Neko's brain]: What the ???? Backspace!!Backspace!!Backspace!! Argh backspace fails... cancel email..... Frantically checks send folder to ensure mail not accidentally sent.
I mean how embarassing can it be if i actually did sent that out?? I will look like the most dufus supervisor ever..................... and it changes the whole meaning of staff and supervisor relationship...Mental note: No more using the word panty.. i mean pantry.
Shall call it the lounge. Told my Lil Bro on this.. he could not stop laughing at me....
Incident #2: The one where the Neko propositions an ex-colleague..
Scene: Requested by ex-colleague to check something for him..
[ex-colleague]: Eh, you free ah... can you check something for me in the ....?
[neko]: wait ah.. gimme a sex... ( The c and x keys are so like close - guess what brain told finger to do??)
[ex-colleague]: ROFL ... ( This is followed by lots of MSN emoticons rolling around in glee )
Luckily he and i are good terms so there is no other meaning to it... At this point where i was retelling this to little bro... he could not take it any more.. stomach ache for him already..
It just gets worse...
Incident #3: The one where the users thought Neko send obscene pictures
I just send an email to my users requesting them to speed up their work.. and followed by this emoticon: Guess what my users thought it was? It was followed by several mails between me and the users ( in great glee ) that this was something else..
[Users 1,2]: Your picture looks obscene!! Aiyo u so notti..
[Neko]: What obscene? That is a OMG emoticon.. what are u all thinking????
[Users 1,2]: You jahat lah u..
I gave up after 4 times of defending myself.. Decided to stop sending emails, typing etc as a whole.
To ethan- owner of the Onion Head OMG emoticon- i truly dont think your emoticon is obscene.. your creativity is unappreciated by my users! :)
Argh.. i just gave up today... cant win.... I hope i dont have the brain and mouth dont get along symptoms...
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592420.72/warc/CC-MAIN-20180721071046-20180721091046-00331.warc.gz
|
CC-MAIN-2018-30
| 2,897
| 24
|
https://coderefinery.org/privacy-policy/
|
code
|
Update, 13th March 2023
We may use anonymous web analytics on our webpages and lessons. This
is not identifiable, does not have client-side identifiers, and can't
re-identify people between visits (or even for single visits) any more
than normal web browsing can. Because this is (by design) not
identifiable, this should not need to be mentioned here, but we are
for completeness. (The technical implementation is
plausible.io, self-hosted by a CodeRefinery
Update, 12th October 2021
- Due to the continuation of the project and to keep it possible to issue
certificates, we will keep the workshop/hackathon/training participants'
data from 2020 and 2021 until December 2024.
On the 1st October 2021, it was announced that CodeRefinery will receive
partial financial support by NeIC for the next 3 years (CodeRefinery
Sustainability Phase, CodeRefinery SP, see
https://neic.no/news/2021/10/01/2021-open-call-results/). The next phase of
the CodeRefinery project is mainly consisting of in-kind contributions by
diverse partner organizations. In this new phase, we need to renew our privacy
We will continue using our online community spaces and the current
owners/administrators will remain until new roles are set in the CodeRefinery
Previously we have written that "Stored names and email addresses of users
will be removed with the end of this project (2021-10-31)". However, we need
to keep participation data from 2020 and 2021 workshops at least until the end
of 2022 since we often get asked for participation certificates long after the
workshop is concluded. Therefore, we will keep information of the
participants who are qualified to certificates (either as learner, helper,
expert helper, or team lead) in the currently used platform, Indico,
managed by NeIC. The currently participating staff who is also committed to be
a part of the CodeRefinery SP have access to the information.
We continue using the newsletter in the new phase but
we may switch to other services but in this case we would notify all
subscribers about deletion of their contact information and invite them to
re-register to the new services that we may migrate to. If a user wants to
unsubscribe before that, they are welcome to do so anytime.
provided to CodeRefinery. Your data only comes from what you decide to provide
posted on this page. Any changes will only apply to information collected
after the posted date of any such change. Additionally, information may be
provided to governmental bodies and other entities as required by law.
- CodeRefinery team members/ We - people who are working for the
CodeRefinery project by either or both being funded or in-kind contribution.
- Users - people who use and/or contribute to our services including
workshops, trainings, events, lesson materials, other materials under on our
website and other online resources, newsletters, notification form, and
those who send inquiries to email@example.com.
- Online community spaces - cloud services that CodeRefinery as a project
uses to provide its services to users and for collaborative working among
CodeRefinery team members as well as together with Users. They include, but
not limited to, CodeRefinery's account in GitHub,
- Online video conference systems - onlinve video conference systems that
are licensed to any institute that CodeRefinery team members are affiliated
What information do we obtain and why?
We obtain user data including person identifiable information in the following manner for each purpose:
- Registration form to sign-up for workshops.
- To communicate with the user about the workshop.
- For preparation of the workshop, for example grouping of users for exercises.
- To compare with attendance information.
- After anonymization and summarizing, to report statistics on our website and in reports delivered to fiscal sponsors and contributing partners.
- Email inquiry sent to firstname.lastname@example.org.
- Usage report of Online video conference system showing attendance information (participant name, email address (if any), and time of entry and exit of the online event).
- Attendance sheet we ask for participants in a in-person event to fill out.
- To compare with the information provided upon sign-up for workshops.
- To issue a certificate upon user's request.
Information you provide in our Online community spaces are visible and
information may be visible to other users in the Online community spaces than
CodeRefinery team members. We use your information within each Online
community space for communication purpose in a reasonable and respectful
manner. We will not use your person identifiable information provided in our
Online community spaces for other purposes than communication with you and
within the community. When we archive a note taken in
HackMD during a workshop, we will delete all the
person identifiable information of users.
We obtain the following data anonymously and voluntarily from users.
- Pre-/Post-workshop survey results.
- For preparation of the workshop.
- For improvement of future workshops.
- For reporting (in a summarized form).
- Poll answers in Online video conference systems during a workshop
- For sharing overview of workshop cohort's idea or opinions
We use anonymous web analytics on some of our websites and lesson
pages. These are done without client-side IDs or storing identifiable
information on either the client or server side.
Who has access to the personally identifiable information?
- CodeRefinery team members have access to personally identifiable information
provided upon workshop sign-up, subscribing to our
newsletter, sending inquiry to email@example.com, and attendance in
Where we store the data
- We use https://indico.neic.no for storing sign-up
information provided by users for any events. Also emails sent from
https://indico.neic.no with sender email address
of firstname.lastname@example.org will be stored in the same place. Data
controller of https://indico.neic.no is
neic. Registering via
https://indico.neic.no is not strictly required to
take part in an event.
- We use Freshdesk as a platform (data
processor) for email communication where we use our contact email address
(email@example.com), except for the cases where we send email from
- We use TinyLetter(mailchimp) as a
platform to send a newsletter.
- Anonymized survey results and workshop/event attendee statistics are or will
be published on
- Registration data provided via sign-up form in
Indico and attendance information generated by an
Online video conference system are temporarily stored in a CodeRefinery team
member's affiliated institution's cloud system which is in line with
processing non-sensitive person-identifiable information during
anonymization process or obtaining information necessary for issuing a
- Anonymous statistics may be stored on partners local facilities and
shared publicly if sufficiently aggregated.
- Our GitLab service stores your account information which you have entered
when signing up. This contact information is accessible to the system
administrator operating the service and the CodeRefinery project management.
You can at any moment delete your account from this service.
How long we store the data
- Anonymized survey results and statistics are meant to be kept without a time limit.
- We always keep affiliations and academic position long term for reporting
but they are disconnected from names and email addresses (which we both do
not store long term).
- Stored names and email addresses of users will be removed with the end
of the project period.
Anonymity and right to be forgotten
- You have the right to register to a workshop anonymously.
- If you want to be removed from announcement lists, please let us
- Workshop registration can be canceled before and removed, otherwise we keep
it for sending a request to answer pre-/post-workshop survey.
- If you want access to your data or to be removed, email us from the address
you have used for registration.
- If you believe something is wrong, please let us know.
- You have the right to lodge complaint with supervisory authority.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474671.63/warc/CC-MAIN-20240227053544-20240227083544-00852.warc.gz
|
CC-MAIN-2024-10
| 8,111
| 129
|
https://alpaqastudio.com/about-us
|
code
|
We build Alpaqa Studio, your IDE and GUI for Cosmos DB.
Alpaqa Studio makes it easy to visualize, query and modify data in Cosmos DB.
It’s a development space that is easy to work in, built with usability and speed in mind. We think it makes database development and management an actual pleasure instead of a chore.
We are a strong team and growing*, founded as a remote-first company, with offices in Berlin and Warsaw. Between us we have over twenty five years experience of building software tools and bringing them to market. Our customer support comes directly from the developers who create the tool so we can solve any problems fast. Because we follow evergreen release management, you can be sure we will always support the latest version of Cosmos DB.
Our strong development team works constantly to keep our product up-to date and is at the same time in a close relationship with our customers. Our developers, the support team, and the founders all respond to customer feedback and are fully dedicated to providing a product that will align with your business and development needs.
We believe in using the same products and technologies as our customers. We know Cosmos DB inside-out and use it daily for development and production. We think that’s the only way we can build world-class software for our customers.
Customers are the reason why we do what we do. They inspire us, challenge us, and in turn, help us build better software.
* If you are interested in joining Alpaqa Studio, please drop us a line at email@example.com
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103917192.48/warc/CC-MAIN-20220701004112-20220701034112-00520.warc.gz
|
CC-MAIN-2022-27
| 1,546
| 8
|
https://www.phoronix.com/news/Linux-Boot-Disable-32-bit
|
code
|
Linux Patches Posted That Would Allow Boot-Time Disabling Of x86 32-bit Processes
SUSE is interested in the ability for disabling the IA32 compatibility layer and the proposed patches would allow disabling the 32-bit system calls on 64-bit kernels as well as disabling 32-bit processes.
They acknowledge though that 32-bit legacy software is still in use so for now it's being made a boot-time option via the "ia32_disabled" kernel option while eventually may be offered as a Kconfig build-time switch if wanting to disable 32-bit syscall and process support entirely.
The patch comments elaborate with:
"Distributions would like to reduce their attack surface as much as possible but at the same time they have to cater to a wide variety of legacy software. One such avenue where distros have to strike a balance is the support for 32bit syscalls on a 64bit kernel. Ideally we'd have the ability to disable the the compat support at boot time. This would allow the decision whether it should be disabled/enabled can be delegated to system administrators.
In addition to disabling 32bit syscall interface let's also disable the ability to run 32bit processes altogether. This is achieved by setting the GDT_ENTRY_DEFAULT_USER32_CS descriptor to not present which would cause 32 bit processes to trap with a #NP exception. Furthermore, forbid loading compat processes as well."
The patch series for now is under review on the LKML. It will be interesting to see how this work evolves and how much other vendor interest there is in optional disabling of 32-bit process support.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233509023.57/warc/CC-MAIN-20230925151539-20230925181539-00106.warc.gz
|
CC-MAIN-2023-40
| 1,575
| 7
|
http://www.tomshardware.com/forum/286337-30-chassis-moles-connectors
|
code
|
I tried to ask this in another thread and got no response, so her goes again. My chassis, Raidmax Smilodon has 4 chassis fans all with molex power connectors. How do I connect them to my M4A88TD-V EVO USB/3.0 motherboard so I can control them? Is there an adapter for the molex to motherboard? If so, which fan connects to which fan connector on the mobo? They currently run at full speed and have no problem with that except it gets a little loud. So, is anything possible to fix this? It is a new build and the machine works great, except cpu cooling. So I ordered a NOCTUA|NH-D14 R to get the temps down, if it fits in the case. Does anybody know that the NOCTUA|NH-D14 R will fit in the Smilodon case?
You guys and gals have been wonderful in helping me get this built and I greatly appreciate Tom's forums and advice from all of you. Waiting on a reply because my new cooler is due in today and do not even want to open it if it will not fit.
More aboutchassis moles connectors
They are hooked up all in a row together using the molex power connector from the PSU.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806309.83/warc/CC-MAIN-20171121002016-20171121022016-00261.warc.gz
|
CC-MAIN-2017-47
| 1,069
| 4
|
https://donut.topology.rocks/?q=tag%3A%22galaxy+data%22
|
code
|
(found 2 matches in 0.001708s)
Felix: A Topology Based Framework for Visual Exploration of Cosmic Filaments
Nithin Shivshankar, Pratyush Pranav, Vijay Natarajan, Rien van de Weygaert, E. G. Patrick Bos, Steven Rieder
The large-scale structure of the universe is comprised of virialized blob-like clusters, linear filaments, sheet-like walls and huge near empty three-dimensional voids. Characterizing the large scale universe is essential to our understanding of the formation and evolution of galaxies. The density range of clusters, walls and voids are relatively well separated, when compared to filaments, which span a relatively larger range. The large scale filamentary network thus forms an intricate part of the cosmic web. In this paper, we describe Felix, a topology based framework for visual exploration of filaments in the cosmic web. The filamentary structure is represented by the ascending manifold geometry of the 2-saddles in the Morse-Smale complex of the density field. We generate a hierarchy of Morse-Smale complexes and query for filaments based on the density ranges at the end points of the filaments. The query is processed efficiently over the entire hierarchical Morse-Smale complex, allowing for interactive visualization. We apply Felix to computer simulations based on the heuristic Voronoi kinematic model and the standard \$\Lambda\$CDM cosmology, and demonstrate its usefulness through two case studies. First, we extract cosmic filaments within and across cluster like regions in Voronoi kinematic simulation datasets. We demonstrate that we produce similar results to existing structure finders. Filaments that form the spine of the cosmic web, which exist in high density regions in the current epoch, are isolated using Felix. Also, filaments present in void-like regions are isolated and visualized. These filamentary structures are often over shadowed by higher density range filaments and are not easily characterizable and extractable using other filament extraction methodologies.
Cosmic Web Reconstruction Through Density Ridges: Method and Algorithm
Yen-Chi Chen, Shirley Ho, Peter E. Freeman, Christopher R. Genovese, Larry Wasserman
The detection and characterization of filamentary structures in the cosmic web allows cosmologists to constrain parameters that dictate the evolution of the Universe. While many filament estimators have been proposed, they generally lack estimates of uncertainty, reducing their inferential power. In this paper, we demonstrate how one may apply the subspace constrained mean shift (SCMS) algorithm (Ozertem & Erdogmus 2011; Genovese et al. 2014) to uncover filamentary structure in galaxydata. The SCMS algorithm is a gradient ascent method that models filaments as density ridges, one-dimensional smooth curves that trace high-density regions within the point cloud. We also demonstrate how augmenting the SCMS algorithm with bootstrap-based methods of uncertainty estimation allows one to place uncertainty bands around putative filaments. We apply the SCMS first to the data set generated from the Voronoi model. The density ridges show strong agreement with the filaments from Voronoi method. We then apply the SCMS method data sets sampled from a P3M N-body simulation, with galaxy number densities consistent with SDSS and WFIRST-AFTA, and to LOWZ and CMASS data from the Baryon Oscillation Spectroscopic Survey (BOSS). To further assess the efficacy of SCMS, we compare the relative locations of BOSS filaments with galaxy clusters in the redMaPPer catalogue, and find that redMaPPer clusters are significantly closer (with p-values \textless10−9) to SCMS-detected filaments than to randomly selected galaxies.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476374.40/warc/CC-MAIN-20240303111005-20240303141005-00481.warc.gz
|
CC-MAIN-2024-10
| 3,700
| 7
|
https://www.tr.freelancer.com/projects/android/android-sdk-31843403/?ngsw-bypass=&w=f
|
code
|
help solve a issue on android sdk
Bu iş için 18 freelancer ortalamada £33 teklif veriyor
Hi, Android Developer and Designer with 4 years of experience, kindly provide me with more details of the app so that we can estimate time and start right away.
Hello Sir, What kind of issue are you facing? I can fix it right now. Thanks, Bhargav.
Hi How are you? I am very interested in your project (android sdk). I have rich experience in Android app development. I can start from now. I want to discuss details on chat. If you hire me, I will do my best for you. Daha Fazla
I have an experience of 6+ years in android apps development. I will complete your task ASAP in lowest possible budget. please come to private chat for further discussion.
Android Developer , Would like to know more about the requirements of your project , thank you
-previous experience in such topics; -eager to discuss a lot in this chat stream; -degree stats - maths;
hi there :) Please explain more about the problem Are you facing a bug? If you wish, we can check more details of the project in the chat best regards
Hello. I really enjoyed reading your description of your project. I have worked on several projects like yours and I am confident that I can complete yours. Don't worry about my programming skills. I implement speed Daha Fazla
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363312.79/warc/CC-MAIN-20211206194128-20211206224128-00227.warc.gz
|
CC-MAIN-2021-49
| 1,319
| 10
|
https://support.brightsign.biz/hc/en-us/community/posts/209950037-HD2000-scripting-question
|
code
|
HD2000 scripting question
I have a csv file that has two video file and one black picture as an idle screen. The files are triggered through the GPIO port. Also several GPIO outputs are turned on depending on which video is played and turned off when the idle screen is called. The problem is I need two of the GPIO outputs to turn off while the video is playing, each at a different time. Can I do this though a script? If so how easy would it be as I am not used to writing scripts for these players.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572077.62/warc/CC-MAIN-20220814204141-20220814234141-00542.warc.gz
|
CC-MAIN-2022-33
| 502
| 2
|