url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
https://coderanch.com/t/369733/java/File-Choosers
|
code
|
I need to use the JFileChooser() constructor to open a file which is in the network path. But all the constructors are support to open the files in the user's home directory. Could anybody help me to display the dialog box including the Network Neighborhood. Thank Nisha
posted 15 years ago
I don't think it is possible in the current version of JSDK. There is an article on Sun Java site regarding Swing API changes for JSDK 1.4 version. Do check the section on JFileChooser.
Snigdha<br />Sun Certified Programmer for the Java™ 2 Platform
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948592972.60/warc/CC-MAIN-20171217035328-20171217061328-00410.warc.gz
|
CC-MAIN-2017-51
| 541
| 4
|
http://tailieu.vn/doc/lab-9-1-5a-trunking-with-isl-66041.html
|
code
|
Trunking changes the formatting of the packets. The ports need to be in agreement as to which
format is being used to transmit data on the trunk or no data will be passed. If there is different
trunking encapsulation on the two ends of the link they will not able to communicate. A similar
situation will occur if one of the ports is configured in trunking mode, unconditionally, and the other
one as in access mode, unconditionally.
When managing a switch, the Management Domain is always VLAN 1. The Network Administrator's
workstation must have access to a port in the VLAN 1 Management Domain. All ports...
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122629.72/warc/CC-MAIN-20170423031202-00522-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 610
| 7
|
https://bugs.webkit.org/show_bug.cgi?id=10489
|
code
|
An umbrella bug for other bugs affecting the Safari port of TIBCO(R) General Interface, a leading AJAX development platform.
Are the above dependent bugs the only ones left before TIBCO will work with WebKit browsers?
Are there any workarounds for some of the issues that may be applied in the meantime?
So actually we are already shipping a version of General Interface that we support (with known quirks) on Safari and Chrome. The remaining open bugs fall into several categories:
GI provides a browser-independent wrapping API that fails on WebKit due to bug:
8291 8342 12307 13075 14833
GI could provide a better developer experience on WebKit if bug were fixed:
Implemented WebKit specific workaround in GI code:
9063 11646 12339 13057 14831 14835 15631
Removed/deprecated functionality in GI (for all supported browsers) because of lack of progress/bugginess:
All remaining related bugs are XML or XML DOM, changing component accordingly.
Back in 2009, TIBCO donated General Interface (GI) to Dojo:
Not sure if there is anything left to do here or not.
Old URL: http://gi.tibco.com
New URL: http://dojofoundation.org/projects/general-interface
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00178.warc.gz
|
CC-MAIN-2022-33
| 1,149
| 15
|
https://m.jwell-global.com/products/fdy-yarn-spinning-machine/
|
code
|
FDY Yarn Spinning Machine
The corporation keeps to the operation concept "scientific management, superior quality and performance primacy, consumer supreme for
FDY Yarn Spinning Machine, Cost Of Extruder Machine
, Plastic Extrusion Line
, Twin Screw Extruder Manufacturers
, Now we've been sincerely consider to grant brand agent in different areas and our agents' maximum margin of profit is the most important thing we care about. Welcome all of the friends and customers to join us. We have been ready to share win-win corporation.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506658.2/warc/CC-MAIN-20230924155422-20230924185422-00184.warc.gz
|
CC-MAIN-2023-40
| 534
| 6
|
https://www.cwi.nl/innovation/application-domains/model-driven-software-engineering
|
code
|
To control the quality of software systems, we inevitably need to control their complexity, regulating their safety, information security, efficiency and economy. Without a thorough understanding of the domain such control is impossible, especially when the code of today's software systems is growing beyond the human scale. The goal of model-driven software engineering is to bring the code of software systems back to a size and shape which can be managed by human software engineers.
Model-driven software engineering is a software-engineering approach based on high-level descriptions of the relevant aspects of software. The actual implementation is derived automatically through code generation or interpretation. While the strategy and goals of model-driven software engineering are clear, the execution of this vision is still limited to clearly defined (and large) sub-domains of software engineering. The challenge is to make it effectively available to all software engineers, in all their specialized contexts.
Bridging the knowledge about the specific domain context to the general software technology is an intrinsic part of our approach. Model-driven software engineering is relevant for all domains which develop and apply software technology. With language workbenches, such as Rascal Metaprogramming Language and Ensō we support software engineers in building their own model-driven software engineering solutions. Next to this we also research and develop solutions for specific areas such as banking, computational auditing and digital forensics.
Where model-driven engineering is chosen as solution to prevent future complexity, in the context of existing large and complex software systems, the application domain Software Maintenance is relevant.
Contact person: Tijs van der Storm
Research group: Software Analysis and Transformation (SWAT)
Research partners: University of Groningen, TU Eindhoven, OCÉ, Belastingdienst, NFI
Spin-off: SWAT.engineering (being formed)
Tools: Rascal Metaprogramming Language, Ensō, Rebel, Derric
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122621.35/warc/CC-MAIN-20170423031202-00493-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 2,054
| 9
|
https://astronable.com/bluehost-marketing-offers-200-included/
|
code
|
Bluehost Marketing Offers $200 Included
Discovering a high-grade cheap webhosting supplier isn’t easy. Every site will certainly have various demands from a host. Plus, you have to contrast all the functions of a hosting company, all while searching for the most effective offer feasible.
This can be a whole lot to type via, particularly if this is your very first time acquiring organizing, or constructing an internet site.
The majority of hosts will certainly supply extremely affordable initial pricing, only to increase those rates 2 or 3 times higher once your initial contact is up. Some hosts will offer complimentary bonuses when you join, such as a free domain name, or a cost-free SSL certificate.
While some hosts will be able to supply much better efficiency as well as high degrees of safety. Bluehost Marketing Offers $200 Included
Below we dive deep into the very best low-cost host plan there. You’ll discover what core hosting attributes are necessary in a host and how to analyze your very own hosting demands to make sure that you can pick from among the most effective cheap organizing suppliers listed below.
Disclosure: When you acquire a web hosting plan through links on this page, we earn some payment. This helps us to maintain this site running. There are no additional costs to you whatsoever by using our links. The list below is of the best inexpensive webhosting plans that I’ve directly utilized and also checked.
What We Take into consideration To Be Low-cost Web Hosting
When we describe a webhosting bundle as being “Cheap” or “Budget” what we indicate is hosting that comes under the cost brace between $0.80 to $4 monthly. Whilst investigating low-cost organizing carriers for this guide, we considered over 100 various hosts that came under that rate variety. We after that assessed the top quality of their most inexpensive holding plan, value for money and also client service.
In this write-up, I’ll be looking at this world-class website holding business and stick in as much appropriate details as possible.
I’ll look at the attributes, the rates options, and anything else I can think about that I assume may be of benefit, if you’re deciding to register to Bluhost and also get your web sites up and running.
So without additional trouble, allow’s check it out.
Bluehost is just one of the greatest host business worldwide, obtaining both massive advertising support from the business itself as well as affiliate online marketers who advertise it.
It truly is a large business, that has been around for a long time, has a huge credibility, as well as is most definitely among the top choices when it involves webhosting (most definitely within the leading 3, at least in my publication).
However what is it precisely, as well as should you obtain its solutions?
Today, I will certainly respond to all there is you require to recognize, offered that you are a blog owner or a business owner that is searching for a host, as well as does not know where to get going, given that it’s a wonderful solution for that audience in general.
Allow’s visualize, you intend to host your sites and make them visible. Okay?
You currently have your domain name (which is your site destination or LINK) today you intend to “turn the lights on”. Bluehost Marketing Offers $200 Included
You need some organizing…
To accomplish all of this, and to make your site visible, you require what is called a “server”. A server is a black box, or device, that stores all your internet site information (documents such as photos, texts, videos, links, plugins, as well as other info).
Currently, this server, needs to get on all the time as well as it has to be attached to the net 100% of the moment (I’ll be stating something called “downtime” in the future).
Additionally, it additionally needs (without obtaining too elegant and also right into information) a file transfer protocol frequently called FTP, so it can show web internet browsers your web site in its desired type.
All these points are either expensive, or call for a high degree of technological ability (or both), to develop and also preserve. And also you can absolutely go out there and also discover these points on your own and also set them up … however what about rather than you acquiring and keeping one … why not simply “renting hosting” instead?
This is where Bluehost comes in. You lease their web servers (called Shared Hosting) as well as you launch a website utilizing those web servers.
Since Bluehost maintains all your documents, the business likewise enables you to establish your content administration systems (CMS, for short) such as WordPress for you. WordPress is a very prominent CMS … so it just makes sense to have that choice offered (almost every organizing business currently has this alternative too).
In short, you no more require to set-up a server and then integrate a software application where you can develop your web content, separately. It is already rolled into one bundle.
Well … envision if your web server remains in your house. If anything were to happen to it in any way, all your documents are gone. If something goes wrong with its inner procedures, you need a technician to fix it. If something overheats, or breaks down or obtains damaged … that’s no good!
Bluehost takes all these hassles away, and also takes care of everything technical: Pay your web server “lease”, and also they will certainly take care of every little thing. As well as once you buy the solution, you can then start focusing on including web content to your website, or you can place your initiative into your advertising projects.
What Provider Do You Obtain From Bluehost?
Bluehost offers a myriad of various services, but the primary one is hosting certainly.
The hosting itself, is of different kinds incidentally. You can lease a common web server, have a devoted server, or likewise a virtualprivate web server.
For the purpose of this Bluehost testimonial, we will certainly concentrate on organizing services and various other solutions, that a blogger or an online business owner would require, instead of go too deep right into the bunny opening and discuss the other solutions, that are targeted at more knowledgeable folks.
- WordPress, WordPress PRO, as well as shopping— these holding solutions are the packages that enable you to host an internet site utilizing WordPress as well as WooCommerce (the latter of which permits you to do e-commerce). After acquiring any of these plans, you can start developing your web site with WordPress as your CMS.
- Domain Industry— you can also purchase your domain from Bluehost as opposed to various other domain registrars. Doing so will certainly make it much easier to direct your domain to your host’s name web servers, because you’re utilizing the exact same market.
- Email— once you have acquired your domain name, it makes good sense to likewise obtain an email address linked to it. As a blog writer or on the internet business owner, you ought to virtually never ever utilize a cost-free email service, like Yahoo! or Gmail. An e-mail similar to this makes you look less than professional. Fortunately, Bluehost offers you one free of charge with your domain name.
Bluehost likewise offers committed servers.
And also you may be asking …” What is a committed web server anyway?”.
Well, things is, the basic webhosting plans of Bluehost can just so much traffic for your website, after which you’ll require to update your hosting. The reason being is that the usual web servers, are shared.
What this suggests is that one server can be servicing two or more web sites, at the same time, one of which can be your own.
What does this mean for you?
It indicates that the solitary web server’s resources are shared, and also it is doing several tasks at any given time. When your site starts to hit 100,000 website gos to monthly, you are mosting likely to require a specialized web server which you can additionally obtain from Bluehost for a minimum of $79.99 monthly.
This is not something yous needs to fret about when you’re starting but you need to maintain it in mind for certain.
Bluehost Pricing: Just How Much Does It Expense?
In this Bluehost evaluation, I’ll be focusing my interest generally on the Bluehost WordPress Hosting packages, given that it’s one of the most popular one, and likely the one that you’re seeking and that will suit you the most effective (unless you’re a big brand name, business or website).
The 3 available strategies, are as complies with:
- Basic Plan– $2.95 monthly/ $7.99 routine price
- Plus Strategy– $5.45 per month/ $10.99 regular rate
- Selection Plus Plan– $5.45 per month/ $14.99 normal cost
The initial price you see is the rate you pay upon register, and also the 2nd price is what the cost is, after the initial year of being with the business.
So basically, Bluehost is mosting likely to bill you on an annual basis. And you can likewise choose the amount of years you want to host your site on them with. Bluehost Marketing Offers $200 Included
If you select the Fundamental strategy, you will certainly pay $2.95 x 12 = $35.40 beginning today as well as by the time you enter your 13th month, you will certainly currently pay $7.99 each month, which is likewise billed annually. If that makes any kind of feeling.
If you are serious about your internet site, you should 100% obtain the three-year choice. This suggests that for the standard plan, you will pay $2.95 x 36 months = $106.2.
By the time you strike your 4th year, that is the only time you will pay $7.99 per month. If you think of it, this strategy will certainly conserve you $120 in the course of 3 years. It’s not much, however it’s still something.
If you want to obtain more than one site (which I extremely advise, as well as if you’re major, you’ll possibly be obtaining more eventually in time) you’ll wish to use the option plus plan. It’ll allow you to host unrestricted web sites.
What Does Each Strategy Offer?
So, when it comes to WordPress hosting strategies (which resemble the shared holding plans, however are more geared in the direction of WordPress, which is what we’ll be concentrating on) the features are as follows:
For the Standard plan, you obtain:
- One site just
- Safe internet site using SSL certificate
- Optimum of 50GB of storage
- Totally free domain for a year
- $ 200 advertising and marketing credit history
Remember that the domains are purchased independently from the organizing. You can obtain a totally free domain name with Bluehost below.
For both the Bluehost Plus hosting and also Choice Plus, you obtain the following:
- Endless variety of websites
- Free SSL Certificate. Bluehost Marketing Offers $200 Included
- No storage space or data transfer limitation
- Free domain name for one year
- $ 200 advertising and marketing credit score
- 1 Workplace 365 Mail box that is cost-free for one month
The Choice Plus strategy has actually an included benefit of Code Guard Basic Alternative, a back-up system where your documents is saved and also replicated. If any type of collision takes place as well as your site data goes away, you can recover it to its initial type with this function.
Notice that even though both plans set you back the very same, the Choice Strategy then defaults to $14.99 per month, normal rate, after the set quantity of years you’ve chosen.
What Are The Benefits Of Using Bluehost
So, why choose Bluehost over various other web hosting services? There are thousands of web hosts, many of which are resellers, but Bluehost is one choose few that have stood the test of time, and also it’s probably the most well known out there (and permanently reasons).
Right here are the three major advantages of picking Bluehost as your webhosting service provider:
- Server uptime— your web site will not show up if your host is down; Bluehost has more than 99% uptime. This is exceptionally vital when it concerns Google Search Engine Optimization and positions. The higher the much better.
- Bluehost speed— exactly how your server feedback establishes how quick your web site reveals on a browser; Bluehost is lighting quickly, which means you will certainly minimize your bounce price. Albeit not the best when it concerns packing speed it’s still hugely important to have a rapid speed, to make individual experience better and much better your position.
- Unlimited storage— if you get the Plus plan, you need not bother with the number of documents you store such as video clips– your storage space ability is limitless. This is really important, since you’ll most likely encounter some storage space concerns later on down the tracks, and also you do not desire this to be a hassle … ever before.
Last but not least, client support is 24/7, which suggests no matter where you remain in the globe, you can get in touch with the assistance group to fix your site concerns. Pretty common nowadays, but we’re taking this for provided … it’s likewise extremely essential. Bluehost Marketing Offers $200 Included
Additionally, if you have actually obtained a free domain name with them, after that there will certainly be a $15.99 charge that will be deducted from the amount you originally purchased (I picture this is because it kind of takes the “domain name out of the marketplace”, unsure regarding this, but there most likely is a hard-cost for registering it).
Lastly, any kind of demands after thirty days for a reimbursement … are void (although in all honesty … they should possibly be strict below).
So as you see, this isn’t necessarily a “no doubt asked” plan, like with several of the various other holding choices out there, so make sure you’re fine with the policies before proceeding with the hosting.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323584886.5/warc/CC-MAIN-20211016135542-20211016165542-00385.warc.gz
|
CC-MAIN-2021-43
| 13,921
| 82
|
https://openwebexperience.com/decentralized-autonomous-organizations/
|
code
|
While some see DAOs as a utopian revolution in the making, for others it’s just a silly fad that’ll never be legitimized by regulators. As with most things, the truth falls somewhere in the middle.
DAOs aren’t an instant solution to all the problems of traditional businesses. But they do solve some issues while opening up possibilities that were unfathomable before.
After giving you a high-level overview of what DAOs (Decentralized Autonomous Organizations) are, how they work, and their benefits, we’ll discuss if you should consider starting one and give you two use cases of DAOs for small and midsize businesses (SMBs).
TL;DR — Key Takeaways: What are DAOs?
- DAOs are community-led entities that operate without central leadership.
- These organizations use smart contracts to automate operations and ensure transparency, immutability, and trust.
- Governance models shape how a DAO operates by establishing roles, responsibilities, a voting system, and more.
- Some advantages of DAOs include fast and efficient operations, transparency and trust, community collaboration, and a low entry barrier.
- Communicating effectively and cooperating with several people — potentially strangers — is the biggest challenge when starting a DAO.
- You should consider starting a DAO if you want to pool funding, increase transparency, trust, and collaboration with other businesses, or incentivize customer loyalty and engagement.
DAO Meaning: What Is a Decentralized Autonomous Organization (DAO)?
A decentralized autonomous organization (DAO) is a community-led entity without central leadership.
People come together to build a DAO around a shared goal. Members collectively own, manage, and make decisions to achieve that pre-determined objective.
Theoretically, all organizations, including investment, consulting, and engineering companies, could be built as DAOs — but reality is always more complex than theory.
How Are DAOs Formed?
Before we get into the inner workings of these organizations, here’s an overview of how DAOs are created:
- Define the goal of the DAO and write the mission statement
- Build a community
- Define your toolstack
- Define the ownership model
- Define the governance model
- Get funding
- Keep iterating: experiment, take feedback, adapt, and evolve
Note that the steps don’t need to be completed in this specific order (apart from steps #1 and #7). Some might be done concurrently.
How Does a DAO Work?
DAOs work by using smart contracts on a blockchain. These contracts are basically chunks of code that automatically execute operations when certain criteria are met.
They’re built by a core team of community members and lay out the foundational framework that governs the DAO (steps #1 to #5). Smart contracts are public, meaning any member can fully audit, verify, and understand how the DAO works.
How Are DAOs Managed?
DAOs use bottom-up management instead of hierarchical structures. Every member of a DAO is on the same level and has a voice. They all vote with the best interest of the organization in mind because:
- Everyone has active stakes in the organization
- Each participant can be held accountable for their votes since they’re public
There are various voting systems. But, in most cases, the weight of a member’s vote is proportional to the number of tokens they hold. Usually, DAOs are funded by issuing and selling tokens and that’s what eventually determines voting weight.
Non-fungible tokens (NFTs) can also be used to fund a DAO and define voting power. Smart contracts can be coded to allocate a percentage of NFT sales to fund the DAO, for example.
Also, NFT holders can stake their tokens in the vault, which generates value for them while supporting the project’s goals. Voting rights are then based on how many tokens each person staked.
After the DAO is launched, no single person or group can change the smart contract code governing the organization. To make changes, a consensus needs to be reached through voting. The same goes for treasury allocation and all other proposals.
What About DAO Governance?
DAO governance is like an instruction manual — it’ll guide how a DAO works and how its members should act. Here’s everything a DAO governance model defines:
- Roles and responsibilities: ‘Who does what,’ why those roles are needed, the toolstack, and the skills each person should have.
- Expectations: How independent members are, how often they’ll work together, and how much time each person is expected to dedicate to the DAO.
- Conflict resolution: How conflict will be resolved when it inevitably arises.
- Voting system: Examples include token-weighed voting, reputation-based voting, or share-based voting. Other details that need to be defined include who can submit voting motions, how long the voting is open for, and more.
- Rewards, incentives, and compensation: What do contributors get? Tokens, crypto, NFTs, fiat currencies, or something else?
Your smart contract will be built based on the answers to these questions. It might take you months to create the best governance model and smart contract possible. But the success of your DAO rests on how much attention and foresight you put into this step.
7 Benefits of Decentralized Autonomous Organizations (DAOs)
DAOs have multiple benefits over traditional organizations, including being:
- Decentralized and online: No individual controls the community. All decisions are made democratically and collectively — from anywhere, at any time.
- Fast and efficient: Smart contracts are tamper-proof and self-executing, which speeds up operations.
- Transparent and trustless: Members don’t need to know each other since blockchain is immutable, safe, transparent, and open-source; everyone acts with the collective interest in mind because they all have active stakes in the DAO and votes are public. Plus, nothing goes through without a majority vote.
- Community-based: Members come together and agree on a goal to build the DAO around. Everyone contributes with funds and has the same rights and privileges.
Other advantages of this type of organization include:
- Having a low entry barrier: The rules and procedures are coded in a smart contract, removing the legal mumbo-jumbo that often gatekeeps ‘regular’ people from business.
- Giving members a sense of ownership: Since innovation increases financial reward, everyone is incentivized to participate and innovate. In essence, more people having active stakes leads to more progress.
- Handing over power to consumers: DAOs allow customers to control and take part in the decision-making process by partially owning the organizations that serve them.
Should You Start a DAO?
DAOs are a great concept and will likely be huge in the future. But the reality is that, for now, not many business owners need to go out of their way to create or take part in one.
Still, there are a few instances where you could consider starting a DAO, including:
- Fostering a deeper level of engagement or involvement with your community of customers, supporters, and stakeholders.
- Pooling in decentralized funding from alternative sources.
- Materializing your values of transparency and accountability by using a DAO as a framework for transparent governance.
- Increasing collaboration with other businesses.
- Incentivize customer loyalty with tokenized incentives and programs.
Up next, we’ll go into more detail about two of these DAO use cases.
Decentralized Autonomous Organization Examples
There are several DAO examples, such as FamilyDAO, BakeryDAO, and NounsDAO, and use cases, including decentralized governance, insurance pools, fractional real estate ownership, and many more.
We can’t go over all of them so we’ll focus on two use cases that SMB owners can benefit from.
1. Decentralized Funding
Business owners can create a DAO to raise funds from a community of investors or supporters as an alternative to traditional funding from banks or venture capital.
By issuing tokens that represent ownership or participation in the business, anyone can contribute funds and become a stakeholder, creating a more decentralized and community-driven financing model.
2. Decentralized Collaborative Ecosystems
Businesses can form or join DAOs in industry or niche-specific collaborative ecosystems.
The goal of these DAOs is to provide the necessary framework for businesses to share resources, knowledge, and best practices, network, tackle challenges, and collaborate.
Tools and Platforms You Need to Form a DAO
Building a DAO involves a combination of blockchain, decentralized technologies, smart contracts, and web development tools.
Here’s a high-level overview of the toolstack typically used to build a DAO:
- Blockchain platform (e.g., Ethereum, Polkadot, or Solana)
- Smart contract programming language (e.g., Solidity, Vyper, or Rust)
- Web3 library (e.g., Web3.js, Ethers.js, or Web3.py)
- Decentralized storage tool (e.g., IPFS, Storj, or Arweave)
- Web3 development framework (e.g., Hardhat or Truffle)
- Testing and debugging tools and testnets (e.g., Ganache, Maian, Sepolia, or Rinkeby)
- Security auditing tools and frameworks (e.g., Securify or Slither)
- Legal agreement protocol (e.g., Open Law)
- Web3 financial tools for crowdfunding, transfers, treasury management, and more (e.g., JuiceBox, MetaMask, Yearn Finance, and Gnosis Safe)
- Decentralized voting system (e.g., Snapshot or Tally)
- Tools and platforms for community/audience building, discussing proposals, collaborating, delegating tasks, managing payroll, and more (e.g., Twitter, Discord, Collab.Land, Coordinape, and Utopia Labs)
Alternatively, if you want to create and sell NFTs to fund your DAO and define voting power rather than using governance tokens, you can use:
- NiftyKit to create, mint, and sell your NFTs or Manifold Studio to mint them and create a custom smart contract.
- OpenSea to sell your NFTs — you can set a percentage of proceeds to be automatically sent to your DAO’s funding address upon each sale.
- Snapshot to enable NFT holders to stake their tokens in your DAO’s vault and govern the voting process.
Note that this is a massive oversimplification of the DAO-building process and toolstack — we would need dozens of articles to properly explain this.
Also, non-techies, fear not! Aragon, for example, is an all-in-one DAO creation and management platform with absolutely no coding required.
A Legal Framework for Decentralized Autonomous Organizations
In the US, there’s no countrywide legal framework for DAOs. Since they can’t be incorporated, they fall into partnership status by default, meaning all members are under unlimited liability.
To have limited liability protection, DAOs need to be legally recognized.
Vermont law doesn’t mention DAOs but allows companies that run on blockchain to register as “blockchain-based LLCs” (BBLLCs) since 2018.
Traditional Delaware LLC law is notoriously flexible, allowing it to accommodate various DAO principles — but not all.
Jersey, a UK self-governing territory, introduced a hybrid model where DAOs are protected by the LLC model as well.
So, Will You Create Your Own DAO?
DAOs offer SMBs exciting opportunities for innovation, collaboration, funding, community engagement, and more.
All this information might’ve been overwhelming if you’re new to DAOs, but we encourage you to keep learning about them and have a go at some of the tools and platforms we mentioned.
Subscribe to our newsletter for updates on the state of DAOs.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100135.11/warc/CC-MAIN-20231129173017-20231129203017-00231.warc.gz
|
CC-MAIN-2023-50
| 11,567
| 101
|
https://turnipdecoy.proboards.com/thread/209/server-info
|
code
|
Right. Here's the general schedule until I get Vista fixed (read: removed) and get my Linux install stable and functioning:
Between 11:00 AM and 3:00 PM Philbert time, the server is most likely down due to maintenance. Any other time it is down, it may be a connection issue or me being lazy. So don't call me if it be down between those hours. Otherwise, yeah, sure, drop me a line.
If it isn't down between those hours, be ready in case it does go down.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655897027.14/warc/CC-MAIN-20200708124912-20200708154912-00599.warc.gz
|
CC-MAIN-2020-29
| 455
| 3
|
https://blog.amarkulo.com/lenovo-ibm-cisco-vpn-problem/
|
code
|
Lenovo/IBM Cisco VPN Problem
Yesterday I tried to connect to my work network with Cisco VPN client after recent reinstallation of my laptop but without success.
Error that I was getting was PEER_DELETE-IKE_DELETE_UNSPECIFIED. I tried to find some with similar problem on Google but that wasn’t successful either.
So the only thing to do was to install Windows from scratch and begin from start again with elimination of software.
After a while I have found that new version of Thinkpad Fingerprint Software 5.8 was cause of my agony. It took me almost 2 days to find this error but reverting on older version 5.6 solved the problem.
I hope that this will help someone with similar problem like I had.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594603.8/warc/CC-MAIN-20200119122744-20200119150744-00458.warc.gz
|
CC-MAIN-2020-05
| 702
| 6
|
http://www.afterburnerplacement.com/embed-expert-articles.htm
|
code
|
Home > EMBED Expert Articles
Afterburner EMBED Expert Articles
Collaborative Leadership: A Process for Success in a Turbulent World - An article discussing how to succeed in modern organizations through disciplined collaboration.
Recruiting America’s Military Elite to Lead Your Organization - An article about the value of recruiting former military.
The Value of Military Leadership Experience in Turbulent Business Environments - An article about the advantages of military leadership experience in the business world.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704392896/warc/CC-MAIN-20130516113952-00032-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 523
| 5
|
http://www.findbestopensource.com/product/vbscriptwrapper
|
code
|
We have collection of more than 1 Million open source products ranging from Enterprise product to
small libraries in all platforms. We aggregate information from all open source repositories.
Search and find the best for your needs. Check out projects section.
A little python wrapper to make shorten urls, using main used services: goo.gl, bit.ly and tinyurl. This little library doesn't need a big documentation, see the file "test.py" in the main directory to see how it works.
YAJSW is an LGPL licensed pure java alternative for tanuki java service wrapper. It implements a multitude of additional functions and can be easily extended with groovy scripts. JSW configurations can be easily ported.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549448146.46/warc/CC-MAIN-20170728083322-20170728103322-00650.warc.gz
|
CC-MAIN-2017-30
| 700
| 5
|
https://lingalert.com/2021/03/08/cssp-2021/
|
code
|
The 14th Syntax and Semantics Conference in Paris (CSSP 2021) December 9-11, 2021
Conference website: http://www.cssp.cnrs.fr/cssp2021/index_en.html
Submission deadline: May 9 2021
The 14th Syntax and Semantics Conference in Paris (CSSP 2021) will take place on December 9-11, 2021 at Université de Paris, Campus Rive Gauche (former Paris-Diderot). We plan to hold the event in a hybrid format, i.e., with both physical and virtual attendance. Depending on the development of the pandemic, we may have to revert to an online-only conference.
CSSP invites papers combining empirical inquiry and formal explicitness, and favours comparisons between different theoretical frameworks. We welcome submissions using theoretical, experimental or computational methods in:
- the syntax-semantics interface,
- the semantics-pragmatics interface,
- language acquisition: syntax-semantics-pragmatics.
- We invite submissions for 40 minute presentations (including 10 minutes for discussion).
- Submissions are expected to describe substantial, original, completed and unpublished work, hence submissions should be up to 5 pages plus an extra page for references.
- The submission must be anonymous.
- The same person can submit one abstract as author, and one as co-author, or two with different co-authors.
- Instructions for submissions, style templates for abstracts, and details on the selection procedure are available at http://www.cssp.cnrs.fr/cssp2021/soumission/index_en.html
Invited Speakers: TBA
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00761.warc.gz
|
CC-MAIN-2023-14
| 1,496
| 14
|
https://iosexample.com/business-app-an-application-that-show-list-business-using-the-yelp-api/
|
code
|
Business App an Application that show list business using the Yelp API.
This App build using :
- Swift 5.0.
- MVVM design pattern.
- iOS Deployment Target 13.0
- Project format using Xcode 12.0 – compatible
- SDWebImage -> For loading image Asynchronous
The app can search :
(Using location / city / zipcode)
(Business Name & Location) -> the field is required
The app can filter the list of business from Best Match, Rating, Review Count, and Distance
The app show the information of business
- Name and photo of business
- Address and contact Information
- Rating and Prices
- Category of business
- Hours of Operations
- Transaction that available for
- Photo Gallery of buiness
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679516047.98/warc/CC-MAIN-20231211174901-20231211204901-00222.warc.gz
|
CC-MAIN-2023-50
| 683
| 19
|
https://stickinthemudpodcast.com/gambling/what-is-a-virtual-dice.html
|
code
|
How do you play dice virtually?
How do you play dice games on Zoom?
- Choose a host or a leader. …
- Give participants the directions ahead of time. …
- When possible, have players record their own scores. …
- Make sure everyone has the correct number of dice before starting the game. …
- Determine who will start and in what order players will roll.
Is there a virtual dice?
Great for any type of board game or virtually make up your own using Virtual Die! Version 1.3 includes new gameboard design, improved dice roll and shortened cup shake. Now you can get your Virtual Dice on the table faster with Virtual Die!
What is dice simulation?
The dice is a simple cube that generates any number from 1 to 6, and the dice simulator is a computer model that rolls the dice for the user. A dice rolling simulator can be implemented in different ways by Python. … The Pillow module of Python is used to display any image in Python that is not installed by default.
Can you roll dice on Zoom?
Zoom also has an extension on the app marketplace called DnD Dice that will simulate dice rolling for you.
Can you play card games on Zoom?
Classic card games like Checkers, Go Fish, Crazy Eights, etc. are all available at the click of a mouse on PlayingGames.io. The website allows you to select a game, invite as many people as you please to your link, and get ready to play.
Is there a roll the dice app?
Get free dice app and enjoy it on your phone or tablet. Tap on the screen to roll up to 6 dice simultaneously. … Application is also available on your smartwatch with Android Wear and on your Android TV.
How do you roll dice fairly?
To get convincingly random rolls, drop the die into the cup, allowing it to bounce several times, and not looking in at it or turning it to any specific position. Put your hand over the mouth of the cup, shake vigorously, and roll the die out onto the table.
Can I add an interactive dice to Google Slides?
After making your copy of the Google Slides wait a second and notice an extra menu next to the Help menu appears. Click on the menu and you can choose to roll one die or up to five dice. A pop up window will let you know the outcome of the dice roll. That’s it!
How do you make a dice simulator in Python?
import random min = 1 max = 6 roll_again = “yes” while roll_again == “yes” or roll_again == “y”: print “Rolling the dices…” print “The values are….” print random. randint(min, max) print random. randint(min, max) roll_again = raw_input(“Roll the dices again?”)
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662539131.21/warc/CC-MAIN-20220521143241-20220521173241-00008.warc.gz
|
CC-MAIN-2022-21
| 2,544
| 23
|
https://www.pagalguy.com/discussions/vel-tech-multi-tech-results-ug-pg-april-november-semester-exams-88958369402644
|
code
|
Vel Tech Multi Tech Results UG PG April November Regular Arrear Supplementary End Semester Exam Result. Vel Tech Multi Tech Dr.Rangarajan Dr.Sakunthala Engineering College is an autonomous institution which is providing BE BTEch ME Courses. Recently Completing the semester exams students are waiting for the announcement of Vel Tech Results 2020. Students can obtain the information on the release of Vel Tech Multi Tech Results from https://www.gyananetra.com/vel-tech-multi-tech-results/. This can provide you all the baisc information from the controller of exam on the result announcement.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039563095.86/warc/CC-MAIN-20210422221531-20210423011531-00273.warc.gz
|
CC-MAIN-2021-17
| 594
| 1
|
http://cpran.net/docs/plugins/window/
|
code
|
window plugin makes it easier to implement windowing algorithms by taking
care of the generation and handling of windows and providing extensible features
to customise what happens within those windows.
Like the [
vieweach] plugin, this is done by means of
procedure predefinition. Please refer to that plugin’s documentation for a
more detailed explanation of the principles behind this approach.
See below for a list of the individual predefinable procedures and what they mean.
Note: as far as Praat is concerned, there is no difference between what are here called “procedures” and “hooks”. The only difference is that the latter are designed to be overwritten, while the former are designed to be used as they are, but the user is free to ignore this (at their own risk).
How flexible the window durations should be. Because of rounding errors,
setting this to 0 (= no elasticity at all) might result in the production of
windows of extremely marginal durations. A small elasticity value can prevent
this. This variable defaults to 0.000001, meaning that a window with a desired
duration of 1 second, might in some cases have a duration of up to 1.000001
The index of the current window. Manually modifying this value might have
The start time of the current window.
The end time of the current window.
The main iterating procedure, when called sets the iterations in motion. By the
time it is called, The selection must hold an object with a time axis, meaning
one for which operations like
Get total duration are available. The windows
will be generated using the duration of this object.
In order to calculate the position of the windows, the procedure requires either a total number of desired windows, or a desired window duration.
This value is passed to the windowing procedure as the
value argument, which
will be interpreted depending on the value of the
type$ argument. When
"duration", then the value will be taken to be the desired window duration
in seconds. Alternatively, if set to
"number", the value will specify the
total number of windows to fit in the time interval.
The time shift between windows is specified with the last argument,
This number is interpreted as a proportion of overlap for consecutive windows,
such that an overlap of 0 means the windows do not overlap at all, and an
overlap of 0.5 means that they overlap by half of the duration of the window.
Note that the amount of overlap is taken into consideration when calculating the number of windows. This means that specifying a set number of 10 windows in a 1-second long Sound object would result in 10 0.1-second windows if the overlap was set to 0, but in 10 0.18-second windows if the overlap is 0.5.
overlap value of 1 would mean that the windows overlap entirely, and is
therefore not allowed with the current API.
In most cases, the value of the
overlap argument will be in the range
0 <= x < 1. But this is not necessary. By extension of the above, a negative
overlap value would mean that there is a gap between the windows.
overlap value greater than
1 results in a special case. Since
the windows overlap by more than the duration of the window itself, this means
that the “next” window should start before the beginning of the current one.
In this case, the iteration is done from the end of the object, such that the
overlap value can be honoured in a way that makes sense.
Executed once for each window. When this procedure is called, the selection is
guarranteed to be the same as the object that was selected when
Executed before the iteration begins.
Executed after the iteration ends.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510214.81/warc/CC-MAIN-20230926143354-20230926173354-00687.warc.gz
|
CC-MAIN-2023-40
| 3,608
| 52
|
https://www.fr.freelancer.com/projects/php-wordpress/wordpress-app.2339175/
|
code
|
We need to develop an application for Wordpress. The wordpress app has to do the following:
-Small forms of three imputs
-When the form is processed, it takes the three entered data, some other data from the data base and then generates a pdf file which will be sent to the user for downloading.
Due to bad previous experiences, we are going to pay only when the project is finished and we are satisfied with it.
Bid only if you have a Paypal account.
7 freelance ont fait une offre moyenne de 150 $ pour ce travail
I'm an experienced UK WordPress developer with perfect English and extensive experience. I will code the app for you as a plugin, turning the user inputs into a pdf file. Let's discuss this further in PMB.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806569.66/warc/CC-MAIN-20171122103526-20171122123526-00522.warc.gz
|
CC-MAIN-2017-47
| 721
| 7
|
https://www.rafcommands.com/forum/showthread.php?30686-Trying-to-figure-correct-date-of-death-from-Cas-File-Typos&s=a4009b82c005f234e634d83be42bac9b
|
code
|
A question to start with -
Why is the "Killed" Red stamp on the form as the details state he died in Hospital ?
As to the death date, from looking at the others in the list the date on the far left seems to usually be a later date than the date given in the Central box. So is it not possible that the Central box is the date he was admitted to Hospital, and the date on the far left incorrectly given 10/11/23 instead of 10/12/23 ?
Just putting the idea forward .
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644867.89/warc/CC-MAIN-20230529141542-20230529171542-00489.warc.gz
|
CC-MAIN-2023-23
| 464
| 4
|
http://farid2.xyz/archives/3206
|
code
|
Deevyfiction Dual Cultivation novel – Chapter 611 – The Sisters’ Teamwork add van recommend-p3
Supernacularfiction Dual Cultivationblog – Chapter 611 – The Sisters’ Teamwork envious utopian suggest-p3
Novel–Dual Cultivation–Dual Cultivation
Chapter 611 – The Sisters’ Teamwork annoy racial
at the gates the burning darkness
A few moments down the road, Su Yang suddenly placed his dense shaft into Fang Zhelan’s cave, ahead of discharging his sauce into her reduce hole.
“I will enhance with the two of you simultaneously,” he said, baffling them.
can immortals be killed
Although Fang Xiaoru drawn on Su Yang’s shaft to the best of her expertise, Fang Zhelan worked tirelessly on his loved jewels underneath together with her oral cavity and hands and fingers, doing Su Yang truly feel just like he’d joined paradise.
She then looked at Fang Xiaoru and said to her, “Since there is a small system, I will be at the base.”
‘This is in fact a lot more embarra.s.sing than I’d imagined…’ Fang Zhelan shown to herself with a slightly green deal with. Not really in her craziest goal would she visualize themselves holding her minimal sibling given that they ended up both n.a.k.e.d.
“You can’t fall asleep nevertheless, Xiaoru. We’ve only just begun.” Fang Zhelan believed to her by using a look.
“It’s so hot…” Fang Xiaoru claimed, feeling as though she just had a shower area in popular Yang Qi.
At some time afterwards, Fang Zhelan explained, “I want to kiss you because of this oral cavity, too…”
And even while Fang Xiaoru recovers her endurance, Su Yang and Fang Zhelan get started their subsequent around of farming.
Su Yang proceeded to cultivate using the Fang Sisters, alternating between Fang Zhelan and Fang Xiaoru every 10-20 minutes, and so they would continue this rotation until both the sisters could no longer switch from weakness.
“I am going to increase with two of you as well,” he explained, baffling them.
She then considered Fang Xiaoru and believed to her, “Due to the fact there is a more compact system, I am going to be on the bottom.”
Fang Zhelan nodded and set Fang Xiaoru near to the conclusion from the bed furniture so she could relocate far more unhampered.
Fang Zhelan carried on to grow with Su Yang for many people a short time, and by the time Fang Xiaoru restored enough strength to carry on, the time had come for Fang Zhelan to rest, allowing Fang Xiaoru for taking her place.
“I am going to enhance with the two of you concurrently,” he stated, baffling them.
Fang Zhelan nodded and put Fang Xiaoru close to the stop in the your bed so she could proceed even more openly.
“Let me clean it up for you, Xiaoru…” Fang Zhelan suddenly handled her and started off licking the Yang Qi sticking onto her human body, promptly dumbfounding her.
Fang Xiaoru immediately nodded her mind, and she started off licking Su Yang’s shaft together with Fang Zhelan, before taking transforms positioning it in their oral cavity.
A handful of moments later, when Fang Zhelan observed that Fang Xiaoru was staring at her with the envious gaze, Fang Zhelan reported, “Let’s enjoyment him collectively.”
Fang Xiaoru adopted Fang Zhelan’s position and motions plus started rubbing Su Yang’s shaft together with her reduced mouth.
At the conclusion of their cultivation, Su Yang launched his Yang Qi into Fang Zhelan twenty-one instances, when Fang Xiaoru could only deal with eleven rounds just before sliding unconscious.
“As required of yourself, Su Yang… I am just always learning new things from you…” Fang Zhelan mentioned with a grin in her encounter.
“How… How are you going to achieve that?” Fang Xiaoru asked him.
She then investigated Fang Xiaoru and thought to her, “Considering that you now have a small entire body, I am going to be at the base.”
“Ahhhhh~!” Fang Zhelan did not assume the sudden penetration and stuffing and m.o.a.ned loudly.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949533.16/warc/CC-MAIN-20230331020535-20230331050535-00560.warc.gz
|
CC-MAIN-2023-14
| 3,986
| 31
|
https://www.mail-archive.com/fop-dev@xml.apache.org/msg18648.html
|
code
|
Andreas L. Delmelle wrote: > Victor, IIC, Jeremias' concern is about the PDF lib in HEAD > containing substantial improvements over the code in the > maintenance branch. One aspect that springs to mind is WRT > encryption support --as I recall, maintenance still had some > problems with this, for instance, when using custom fonts... > Jeremias once mentioned that, in order to make it work > properly, he had to make significant changes to the PDF-related code.
Yes, I am well aware that there are improvements to HEAD in several places, and that FOray will be missing those for the moment. I fully intend to eventually integrate the HEAD improvements into FOray, but 1) it is non-trivial, 2) I have bigger issues ATM (still trying to get FOTree isolated), and 3) I don't want to do much until I either have to, or until FOP decides how it will proceed -- if FOP decides to start with FOray's isolation work and upgrade to HEAD, then it might be a joint effort. If FOP decides to isolate HEAD's PDF lib directly, and if they use a common interface (like aXSL), then I shouldn't duplicate that effort in FOray, I should just wait until FOP is done with that work and drop it into FOray. If FOP doesn't want PDF isolated, or has no interest in using a common interface, then I'm not part of the picture at all. My main point to Jeremias is that none of this has anything to do with building an interface that everyone can use, except that: 1) FOray already has the interface at least partially designed by virtue of isolating the PDF code, and 2) making an interface *before* starting isolation work is a big help in that work. Victor Mote
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514162.67/warc/CC-MAIN-20181021161035-20181021182535-00477.warc.gz
|
CC-MAIN-2018-43
| 1,639
| 2
|
https://ttlc.intuit.com/users/ef783df0-c954-44b1-9a99-8a5e79813b33
|
code
|
From the community
In 2018 I want to have zero contribution towards my self-employment retirement. How do I get rid of the number showing (originally I wanted to maximize my contribution)?
I have tried using the “Update” button for this row, but I cannot get the result to show zero.
- chijam has not answered any questions.
chijam has not provided any information.
chijam is not following any tags.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578613888.70/warc/CC-MAIN-20190423214818-20190424000818-00157.warc.gz
|
CC-MAIN-2019-18
| 403
| 6
|
https://aijobsboard.com/jobs/machine-learning-engineer-5/
|
code
|
Machine Learning Engineer
About the job
Machine Learning Engineer (Lead/Manager)
We are looking for an engineer with 8+ years’ experience and a passion for driving a new generation of data and machine learning-enabled services for products to impact the world. You will Lead/Manage an existing machine learning platform and work closely with all other engineering teams on overall product performance.
What you will be working on:
- Architect, Design, and Code highly scalable, machine learning applications processing large volumes of data.
- Explore large datasets, research, and develop algorithms/models to solve interesting business problems.
- Work with data scientists to create, optimize and productionize machine learning models.
- Expand machine learning infrastructure to increase efficiency and throughput for our applications.
What we are looking for in your experience:
- BS/BA degree in technical field such as computer science, mathematics, or related field.
- 8+ years of experience with Python and comfortable with SQL
- 8+ years of experience with building Machine Learning models.
- 8+ years of experience using tools such as, CoreML, TensorFlow, PyTorch, TensorRT, SparkML and Scikit-Learn.
- Knowledge of software engineering best practices across the development lifecycle, including agile methodologies, coding standards, code reviews, version control, build processes, testing, and operations.
What we are looking for in you:
- Communicate highly technical results and methods clearly.
- You are focused on results and able to put the team-first.
- Excellent problem-solving skills coupled with a passion to solve challenging problems using data science/ML with a focus on delivering business value.
Discover More AI Jobs:
- Address United States
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178385529.97/warc/CC-MAIN-20210308205020-20210308235020-00068.warc.gz
|
CC-MAIN-2021-10
| 1,773
| 21
|
http://beta.slashdot.org/~Telvin_3d
|
code
|
Firefox Gains Support for VP9 Video Codec
Yeah, but why would you? It's a slightly less efficient implementation of h264 with no hardware support.
Alfred Poor Says HDTV Manufacturers are Hurting (Video)
There is the added blow of commoditization of TVs and electronics in general. Even back in the SD days of CRT sets making TVs was difficult and high manufacturing. Back when Sony was considered the top electronics brand int he world, that's one of the major areas where they made their name. So even before the HD boom televisions enjoyed an excellent margin. They used to be sold more like cars, with a certain degree of haggling expected for the higher end models. The last few years have seen all that disappear.
Automakers Struggle With Pairing Smartphones To Car Infotainment Systems
I doubt there is enough market here to be bothered with. For example, Apple has sold about 15 million appleTVs so far. That number is so small that they publicly label it a 'hobby' and actively discourage any real attention on their earnings reports. How big is the after-market car audio market? Has any single unit ever sold 15 million total? A quick Google puts the total value of the car audio industry around 2 billion. Apple's revenue last year was 156 billion. They could capture the entire market and only get a 2% bump. They probably spend more on advertising than the entire car audio industry would net them.
Which is why they are puttering around with the occasional arrangement directly with auto manufacturers. But even that is likely more of a hobby than a serious investment.
Ask Slashdot: Legal Advice Or Loopholes Needed For Manned Space Program
You had damn well better cover your bases before launching, especially in international waters. If the first time the governments of the world take notice of you is when they detect your unannounced launch of an ICBM (And anything that can get into space is definitely showing up as an ICBM) in international waters it is going to end in tears.
Blizzard Wins Legal Battle Against WoW Bot Company
I haven't read the TOS of WoW, but I doubt there is any clause that says anything like "by agreeing to this, you also give us rights to anything you create which might be related to the service we offer."
I'm pretty sure it says precisely that. Or at least 'You agree to only interact with our software in approved ways". Which, for a multiplayer game, seems like a pretty reasonable restriction.
Fusion Reactor Breaks Even
The current cost of electricity in the USA is anywhere from $.08 to $.17 per KWh depending on location. If fusion can do it for $.20, or even $.25 it would probably be considered a win when you factor in the environmental benefits and reduced dependence on coal and other resources. If you figure in increased use of electric power in areas that currently use gas/oil like cars, then even $.25 looks great due to the reduced reliance on foreign sources.
Steam Machine Prototypes Use Intel CPUs, NVIDIA GPUs
I've seen a LOT more unexplained crashed with nvidia's drivers spewing stuff into dmesg than I have with nouveau, the intel drivers, or even amd's binary drivers
Sure, but what distro/versions/other hardware are you running? At a guess, I think nVidia had little trouble ironing out all the bugs for a single targeted setup like this. One hardware spec and known OS/packages? Easy. It's supporting every frankenbox and smashed together OS that causes them ulcers.
Health Exchange Sites Crushed By Demand; Shutdown Blanks Other Gov't Sites
Uh, how about your neighbor to the north, Canada? We're even larger geographically and are so ethnically diverse that our second largest province has a completely different official language than the rest of the country. And yeah, there's some friction but we make it all work pretty good.
Obamacare Could Help Fuel a Tech Start-Up Boom
Like any other form of tax, Obamacare's net results will be negative in employment
As a truism, that's bullshit. And it's not even entertaining bullshit.
Let's pretend it was taken to it's logical extreme, aka a society with zero taxes. Also known as a society with no roads, no enforced laws, no food inspection, no building codes, etc. You really thing that's a better functioning society with increased employment? Now, obviously a society at the other extreme (100% taxes) is equally dysfunctional. Arguments can be made for lower taxes (and certainly better spent taxes), and arguments can be made for raising taxes in some circumstances (certainly worked in California lately), but to say lower taxes are always better is so stupid it's not even wrong.
Valve Announces Linux-Based SteamOS
If you think 5-10 Gb is large, you need to recalibrate your expectations. 8Gb is probably the smallest USB stick I've in a store in the last year. Single movie files are regularly that big. 1 Tb and up is a pretty standard hard drive size. back when you had a 100 Gb HD and felt pretty good about it 8 gigs was enormous. Now it's not.
Why Steve Albini Still Prefers Analog Tape
I expect to be able to read PCM files saved onto current CD and DVD media for at least another 50 years, while it's already hard to get good quality tape playback.
I wouldn't be too sure about the 50 years thing. The manufacturers tend to state an average lifespan of around 25-35 years for burned CDs and DVDs. Based on independent testing, those turn out to be fairly accurate numbers. But they are an average. For every one that lasts 25 years, there is one that goes 45 years no problem and one that is kaput after 5.
There are two major things that go wrong. First, any minor flaws in the how the disc has been sealed and the reflective backing will oxidize over time, rendering it useless. The second thing is that the 'burning' is accomplished with photosensitive organic dyes. They can have chemical changes over time, but more importantly remain photosensitive. A single day left out in sunlight can be the end of a disc.
If you want a neat trick, leave a disc out face up in the sun and cover part of it with a piece of paper or something else. It's like one of those old time photography demos.
Archival organizations usually recommend the useful lifespan of a burned disc as 8-10 years. As in if you burn a hundred discs and store them properly you should be able to count of reading them all for the first eight years. After that statistics start taking its toll.
US Electrical Grid On the Edge of Failure
Most Americans should be basically unprepared for regular or severe power outages. If the basic utilities are failing enough that it's accepted as a regular thing, shouldn't you be up in arms?
Microsoft Needs a Catch-Up Artist
Looks like someone never tried an iOS upgrade on an older iDevice...
Older than what? Apple has industry leading backwards compatibility on their mobile devices. Hell, plenty of android devices are effectively end-of-life six months after they come out. The latest iOS build is backwards compatible back to the 3GS, which launched just over 4 years ago. Try to find ANY 4 year old android that supports Jelly Bean.
Limitations and All, Chromebooks Appear To Be Selling
I've seen these percentages reported a lot of places, but I have yet to be able to find anything that lists actual sales numbers. Without knowing how big the market for sub-$300 PC market is, it's a meaningless measurement. For example, if 50 million sub-$300 PCs were sold, 25% is a really respectable number. If two million sub-$300 PCs were sold then the 500,000 total sales are quite disappointing.
FCC Rural Phone Subsidies Reach As High As $3,000 Per Line
if there is no difference in capital gains as opposed to income where is the incentive to invest in companies
You incentive to invest is exactly the same. you invest in order to make more money. Option one is that you leave you money sitting in a bank account where it does nothing. Option two is to invest the money and then pay some percentage of taxes on the profits.
And no one in the history of ever has gotten the profits on their investments, looked at the taxes and wished that they had made $0 instead by not investing.
The Black Underbelly of Windows 8.1 'Blue'
They've never... understood that Gnome isn't just something for them to tinker with as the mood strikes them but something that other people should want to use.
Except that 'Something to tinker with as the mood strikes them" is exactly what it is. It's open source and it's their project. It is whatever they want it to be, with whatever goals they want it to have. Now, those goals might be very different from what you, or me, or anyone with larger ambitions for the Open Source community might want them to be, but that's tough luck.
It's the big stumbling block of the Open Source movement. When the goals of the developers just happen to align perfectly with what users and the general community envision (i.e. the development of Firefox) the results are stupendous. When the developers are really just scratching their own itch with a public project (GIMP) you get years of frustration as features and design decisions completely baffle observers.
If you want it done differently, you can fork it yourself. And if you think there should be a middle ground between "meekly accepting whatever is tossed your way" and "full fledged OS developer", well, the OS community doesn't have a lot to offer.
Of course, you could provide monetary incentives to get people to provide the features you want. However, given the cost of funding an entire OS development team to do what you want you'll probably have to find some way to recoup the expense. Next thing you know, you're charging people money in exchange for software that does the things they want in the way that they want. What a ridiculous idea.
The Aging of Our Nuclear Power Plants Is Not So Graceful
1. The reason reactors are not being built has to do with the cost -- they're not cost-effective for utilities unless they get huge subsidies.
Subsidies and long term planning for essential infrastructure is one of the few things that almost everyone agrees is firmly in the role of government. Why even subsidize it? Just build it and run it and screw corporate profit. Break even on the power generation and reap the benefits of increased industry.
2. Where are you going to put the nuclear waste? No, seriously, stop joking around: where are you *really* going to put the waste? This has been well-studied, and there's no good answer.
There are many good answers, most of which were figured out before the first nuclear plant was ever built. The most popular seems to be sealed off at the bottom of extremely deep and stable mines. The catch is that the creation of nuclear waste has largely been placed into private hands, but the cost of disposal is largely in government hands.
3. Improving efficiency is faster and more-effective than increasing output in the near term. Sure, we do need increased capacity, but instead of burning money in the form of subsidies lavished on for-profit energy companies, let's commit real public expenditure on real efficiency initiatives.
So why give the money to for-profit companies? If there is no profit in creating basic infrastructure that every other business needs, then provide that infrastructure out of the taxes that all those other businesses pay. That's the point of taxes in the first place.
Sony, Microsoft Squabble Over Console Features, But the Real Opponent Is Apple
And because they no longer wanted to agree to Google's terms... they stopped using Google's service.
Sony, Microsoft Squabble Over Console Features, But the Real Opponent Is Apple
Name one successful app that Apple has cloned after it's become popular.
MakerBot Merging With Stratasys
Yeah, but almost any serious printing requires a heated print area, even if only for the first layers. Otherwise things cool off too fast.
Telvin_3d has no journal entries.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507442900.2/warc/CC-MAIN-20141017005722-00363-ip-10-16-133-185.ec2.internal.warc.gz
|
CC-MAIN-2014-42
| 11,923
| 62
|
https://knowledge.ni.com/KnowledgeArticleDetails?id=kA00Z000000kKFNSA2&l=en-US
|
code
|
It is possible to Read/Write an array of variables (excluding Boolean type) to a PLC Memory. Certain memory types (I, Q, M, SM, V, AI, and AQ) support operations on arrays, where Boolean arrays are not allowed.
To specify an array address, append [rows][cols] to the end of an address. If only [cols] is specified, [rows] will default to 1. With the array type, it is possible to read and write a block of 200 bytes at once.
The maximum array size for Word and Short types is 100, and for DWord, Long and Float types is 50. The array size is determined by the multiplication of rows and cols.
Note: The maximum array size also depends on the maximum block size of the device being used.Examples:
- To read and write an array of 10 Variable Memory (Float) values starting with V10, declare an address as follows: V10 with Float as the data type. Note: This array will read and write values to registers V10, V14, V18, V22 ... V46.
- To read and write to bit 23 of Internal Memory (Long) M20, declare an address as follows: M20.23. Choose Long for the data type.
For more information you can refer to NI OPC Server help located in C:\Program Files (x86)\National Instruments\Shared\NI OPC Servers\V5\Help
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945282.33/warc/CC-MAIN-20230324113500-20230324143500-00463.warc.gz
|
CC-MAIN-2023-14
| 1,203
| 7
|
https://www.seoclerks.com/user/adsformarketing
|
code
|
Excellent traffic ...received all with Extra visits within the expectation days.... for sure i will recommended nice Seller for his good job and nice personality... but my advice to use google as a tracking link more than Bilty
I'm getting nothing. Does the full url I've gotten 0
Thanks and great work... i highly recommend...
Good job. Thank you
Thank you for delivering on time.
Thanks again, awaiting the results. http://bit.ly/bigmoneyathome
Wow! That was quick, awaiting the Results. Thanks again:-) http://bit.ly/bigmoneyathome
nice good trafic
great thanks !
Amazing Client. Very helping and friendly.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824822.41/warc/CC-MAIN-20181213123823-20181213145323-00625.warc.gz
|
CC-MAIN-2018-51
| 609
| 10
|
https://ask.replit.com/t/replit-feels-silent/105795
|
code
|
I have recently been feeling that replit feels lonely. This is because of the new updates. Removing comments was probably the worst thing replit could do. Replit used to feel like a popular city, a destination for tourists, but removing commenting and making hosting paid has turned it into a bunch of private basements, with people rarely going outside. I am not sending hate to anyone, I am just asking replit to reconsider their options.
I agree with you. They also should make that you can send message if replit.
Huh, nice analogy. I agree, Replit feels lonely. It’s more disconnected now.
Unfortunately, replit has shifted their goals to more professional development and especially AI and deployments, which de-emphasizes the community. The most likely reason is that hobby and casual coders, who make up most of the community, do not as much money for replit as professional and corporate clients. The deprecation of Teams for Edu also occurred, probably because it was taking too much resources during a crucial revamping period.
Dw guys I will revive this community w my upcoming game
Yup. And millions of students are no longer using it.
Capitalism… it destroyed our environment, our social medias, and now Replit.
Yeah, I used to speak with some people only on Replit, now I’ve lost connection, most of them don’t have linked social accs or ask (even if they do have ask, they don’t open it).
I agree, it’s like a ghost town. My follow feed is pretty much empty and so it trending with the exception of… wait for it… repls about how sad people are about the lack of comments.
Yeah. One of my favorite online games, called rocketer(rocketer.glitch.me) had its servers hosted here. I made good friends there and I have memories of it, but sadly, Replit killed the game with its new changes and I will have much less contact with my friends.
If you played that game as well, my username there was KRONOSLAYER.
Replit is done for got now
this is one of the reasons i practically left the replit community i move almost all my code and stuff from replit to a friends raspberry pi the second reason would be because i needed more ram than just 512MiB
any1 know similar place i can use to develop and iterate that allows for free hosting ? THANKS!
Or Glitch. I went to that site, it has free hosting, but it’s mainly for websites.
My classroom no longer uses Replit – for the most part. It serves as my lecturing platform, but due to some numerous changes, we can no longer use it as a platform for the students. It’s such a shame.
@huntedkitty @QwertyQwerty88 For real. Replit’s recent changes have really isolated our community. Now, for the first time, I need to use it for a school project and when I was about to, I found that being inactive for 6-8 months has caused me to not know until it was too late about payment being the only way to use hosting on Replit. Thanks to huntedkitty for bringing this up.
Turned out that rocketer.glitch.me is back. I was going to cry looking at rocketer being dead, until I started crying about rocketer being back up(sarcasm). Turning away from that, I am using Replit to develop one of my games, but I will not be able to host it here anymore. I’ll just have to move it to another site when I convert it to node js and prepare for multiplayer. Replit did feel like a city with lots of people until it became more and more silent until now.
I do agree but asking them to change the updates is one thing but getting them to change the update is the issue they most likely won’t!
I can see how Replit is lonely. When the comments on the cover page were still up and running there was a sense of community everyone knew everyone and everyone was able to talk to one another that’s what made Replit unique. It also helps with coding because people could suggest what they could do to make their Repl better. Those comments were also a way of learning how to code because people could give pointers and tips!
Anyway, I agree with this. Removing comments, forcing deployments (more understandable than the others), and more updates that have disconnected Replit’s community.
In my opinion, the community-based features were one thing that made Replit special and unique compared to other (primarily online) IDEs.
Even the Replit homepage screams lonely.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816820.63/warc/CC-MAIN-20240413144933-20240413174933-00896.warc.gz
|
CC-MAIN-2024-18
| 4,327
| 23
|
https://www.telerik.com/forums/command-canexecute-on-radbutton-inside-radbusyindicator-causes-unexpected-wrong-behavior-on-radbutton-isenabled-property
|
code
|
We have faced an issue that is caused by one of your intended bugfixes related to the order of evaluation of the Command.CanExecute and IsEnabled property. The problem is that the IsEnabled property always wins. (This is what you’ve fixed) But this fix is causing some really annoying behavior which I think is not appropriate at all.
We’ve created a small repro project the reflect the problem.
We have RadButton grouped into a RadBusyIndicator. The RadButton has a Command with a CanExecute implemented which returns false if the button should not be enabled (a list has no more items or sg like that...). Another button or interaction or whatever triggers the IsBusy on the RadBusyIndicator to simulate a background process. However as soon as the IsBusy is false again the RadButton is Enabled even if the CanExecute returns false.
The same works as expected if I use a Silverlight Button instead of RadButton.
I’ve attached a repro project.
- Run th app
- Click on Toggle Enabled Button (CanExecute now returns true, Buttons are enabled)
- Click on GetBusy Button
- IsBusy is Set to True (RadBusyIndicator activated)
- 500ms later CanExecute logic set to return false
- Then 500ms later IsBusy is set to False (RadBusyIndicator deactivated)
- At this point the buttons should be disabled. (RadButton is enabled, Silverlight Button is disabled)
The question: Do you have plans to fix this wrong behavior?
11 Answers, 1 is accepted
The main problem in SL is that when you change CanExecute it internally changes IsEnabled and this way you have two properties that can change it. The busy Indicator internally changes the IsEnabled property of its content and it has a closing animation which delays its actual closing and it sets IsEnabled to true after you set CanCommandExecute to false. The only workaround at the moment is to manually call RaiseCanExecuteChanged after closing the busy indicator.
I've changed this in your project and reattached it so could you please examine it and if you have further questions feel free to ask.z
the Telerik team
I don't know why yo changed the previous behavior (giving higher priority to IsEnabled property to the Command). I supose that several telerik users suggested it but I think this is not a good approach and is an antipattern. A button bound to a Command should be disabled if the command does not allows its execution. If someone needs to bind the button to a command and control the IsEnabled property separetly is as easy as always return true on Command's CanExecute action and handle the IsEnabled as they need. In summary, I think is a bad idea to alter the logic behavior to satisfy a more or less large handful of users that need an "special" behavior.
I solved this issue checking again if the command can be executed on the command's execute method. Not nice, as button appears as enabled, but at least I avoid inconsistencies such as null references in my command's execute methods.
I'm really disapointed and annoyed. I upgraded my application (and telerik assemblies to Q1 2012 SP1) a few days ago and now I'm receiving notifications of many errors and strange behaviors. All of them related with buttons in modules that I didn't modify and worked fine from several months. My application, a large one I'm developping for more than two years, uses intensively RadBusyIndicators and RadButtons (of all types: DropDownButton, SplitButton, RibonButtons...). Now I have that many buttons that should be disabeld because the commands they are bound CANNOT BE EXECUTED are enabled because the IsEnabled property has higher priority than CanExecute method of the bound command. The result is that my application oftens crashes due exceptions (NullException very often) and sometimes presents inconsistencies.
Now I have to review all my code, force to reraise the CanExecutedChanged event in all commands whenever a RadBusyIndicator.IsBusy changes. And this not always works. Firstly, because I don't know why but sometime a button becomes enabled even after this CanExecuteChanged reraise when an async operation that enabled the BusyIndicator is completed and, therfore, the BusyIndicator gets disabled. Secondly, because the components that handle the async operation (tipically a webservice call) and that owns the command are decoupled and there's no way reraise the event. So, I have to check again in the command execution action if the command can be executed. That solves the errors but keeps very often buttons in an inconsistent state, as they are enabled but they do nothing when pressed.
I can understand that some (or many, that's always relative) users asks to alter the default (practically standard) before of a command. Sometimes, any developper needs a component behaves differently from the "expeceted" behavior. It's more hard to me to understand why people at Telerik accept this requests. For me it's a big mistake, an antipattern, to allow that a button bound to a command that cannot be executed is enabled. Why must be enabled a button that cannot be executed?? It's really annoying this behavior and I think I'm not the only one affected. If someone needs to control give higher priority to the IsEnabled property than to the command it's as easy as create a custom command or use a DelegateCommand and always return true in CanExceute method and the handle the IsEnabled property separetly. Why alter the default behavior.
I'd like that telerik reconsider this modification anf go back to the default behavior. I've created a new entry in PITS to request it.
Thank you for the feedback and we're very sorry for the caused inconvenience.
First I'd have to tell you that we can't roll back the change because other customers depend on it. We changed the "default" behavior because it wasn't standard - once you set a command the IsEnabled binding didn't work anymore (that's not the case in the Microsoft buttons), and this was causing other problems. Our goal was to make our buttons behave like the Microsoft ones, but it seems that there's a bug with the BusyIndicator and we'll fix it for the service pack (you can track the progress here).
As I've said before - the main problem is that you can change IsEnabled from two places - IsEnabled and CanExecute and in WPF this is easy because you can override the IsEnabledCore method, but in SL you can't and we had to think of some kind of workarounds (and as you've found out, they are still not working in all cases) to synchronize everything.
For now I can give you a workaround (it's not the most elegant code, but, as far as I tested, it's working) - you'll gave to set an attached property to each button you use and it'll automatically invalidate your command on IsEnabledChanged.
Could you please examine the attached project and if you have more questions please feel free to ask.
the Telerik team
I have a couple of doubts about your proposed solution.
Fisrt of all, I fear it becames a source of memory leaks due the static Dictionary that may cause that no one of the buttons using this behavior being garbaged.
Second it only works with DelegateCommand. What about with other ICommand implementations?.
Anyway, thanks for this code, I think that, at least, will be a good starting point.
I'm glad that I was able to help you and we'll let you know when the fix is available so that you could test it in your solution.
the Telerik team
I've coded my own behavior, based on yours, to try to deal with this issue. Below, the code for this behavior:
Just a behavior with three DependencyProperties, IsEnabledButton, ButtonCommand and ButtonCommandParameter. These three DP share the same method to handle their changes. The PropertyChanged handle method just updates the button IsEnabled property based on its Command.CanExecute method result.
In my app, I have a custom ResourceDictionary with some default styles. This resource dictionary is loaded into the Application resource by code once the application is started and the Telerik Theme for the App is set. I've just added the following lines of xaml at this ResourceDictionary:
With the above xaml, I'm setting, by default, the behavior in first code block to each RadButton and RadRibbonButton (wich inherits from RadButton). So each time the IsEnabled, Command or CommandParameter properties change on a RadButton, the behaviors updates the button IsEnabled property considering if the command can be executed.
By the moment, for me is a good solution as I don't have to review all my telerik buttons and, once telerik solves this issue, I'll be able to remove this behavior quickly and safely.
Hope thi helps somebody. If any issue is detected with this solution, please let me know it.
Thank you for the code snippets and I hope they'll be helpful for other customers with similar issues.
As for the bug - I'm glad to tell you that the fix should be available in our next internal (this Monday) build and it'll be great if you could download it and see if everything is working correctly.
the Telerik team
This issue should be fixed in both Q2 SP and Q3 and if you have more questions feel free to ask.
All the best,
the Telerik team
Explore the entire Telerik portfolio by downloading Telerik DevCraft Ultimate.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00778.warc.gz
|
CC-MAIN-2022-33
| 9,226
| 48
|
https://forums.stardock.com/460824/turn-mod-planets-around-your-home-star-into-an-extreme-planet
|
code
|
I'm not sure how to give a planet a trait, I replaced Habitable with BarrenWorld for Mars but that causes an error and game wont launch.
D:\Games\Steam\steamapps\common\Galactic Civilizations III/Data/Game\PlanetDefs.xml(25,34): error:
value 'BarrenWorld' not in enumeration
Are you saying I need to make a new planet trait? If so how do I make it affect Mars for example.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703497681.4/warc/CC-MAIN-20210115224908-20210116014908-00616.warc.gz
|
CC-MAIN-2021-04
| 372
| 4
|
https://bugs.kde.org/show_bug.cgi?id=253054
|
code
|
Version: CVS (using Devel)
Akonadi applications display collections based on their mimetype. For example the KAddressbook only displays collections containing contacts and distribution lists. KOrganizer looks for events and todos.
The filtering is done by akonadi but there is a bug: The filtering works only if the collection in question is a top level collection or there is at least one top level collection with the correct mimetype.
With e.g. the groupdav resource this is not the case.
1. Only iCal resource loaded
2. Only groupdav resource loaded:
3. Groupdav and iCal resource loaded:
Resources: groupdav/calendar, iCal
Steps to Reproduce:
Add a resource that provides non top-level collection with a matching mimetype and make sure it is the only one that matches. Then try to list this mimetype with the EntityTreeView.
For example: Set up the groupdav resource, make sure it is the only one providing contacts and open KAddressbook - it will be totally empty.
Model containing the groupdav resource.
I wrote a workaround and will upload it to the reviewboard after this bug report.
SVN commit 1188436 by skelly:
Make sure a recursive listing is done even if a first level listing returns no items.
M +1 -0 entitytreemodel.h
M +13 -4 entitytreemodel_p.cpp
M +1 -0 entitytreemodel_p.h
WebSVN link: http://websvn.kde.org/?view=rev&revision=1188436
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00631.warc.gz
|
CC-MAIN-2022-33
| 1,355
| 19
|
https://ge-appliances.pissedconsumer.com/ge-monogram-42-refrigerator-bad-inverter-design-20120917345952.html
|
code
|
I have two GE monogram 42" refrigerators and the invertors fail about every 3 to 4 years ($500 each time). It is very evident that this refrigerator is poorly designed because the inverter keeps failing (part number wr55x10490).
This really sucks considering these units cost about $6,000 each.
GE --- I do not know what it takes to keep your customers happy but it sure would be a step in the right direction if you would fix this problem.
I know I will not buy another GE refrigerator until this problem is fixed. I hope this will help GE do the right thing and fix this problem.
Product or Service Mentioned: Ge Appliances Refrigerator.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255837.21/warc/CC-MAIN-20190520081942-20190520103942-00277.warc.gz
|
CC-MAIN-2019-22
| 639
| 5
|
https://blog.tbcdevelopmentgroup.com/2022-08-01-the-trouble-with-versions-part-iii.html
|
code
|
This is part III of my blog on versions. Last time we discussed
the question of what version of
perl to use for development.
Conclusion: In most cases, the choice will be made for you,
especially in maintenance and legacy migration situations. If you have
the luxury and ability to use a more version of
perl, use it. Let’s continue:
perlshould I be using for development?
perlshould I support?
perlshould I support?
For me, this has become more than just an academic question. Several years I ago I petitioned the Pause administrators to allow me to adopt Amazon::S3. It had been a long time since the module was updated and it needed a little TLC to support new features and fix some deficiencies. The adoption process took a lot longer than I had imagined. Between the time I requested co-maintainer rights and the time it was actually granted the urgency and desire to adopt the module waned. Recently the need to update this module has re-appeared so I began making some much needed improvements. My first release to CPAN of the updated module was 0.49 and thus began my introduction to CPAN Testers Reports.
|Version||Max Version Passing||Min Version Passing||First Failure||O/Ss With Passing Version|
|0.49||5.36.0||5.14.4||5.32.1||darwin, freebsd, linux, mswin, openbsd, solaris|
|0.50||5.37.1||5.14.4||5.34.1||darwin, freebsd, linux, mswin, openbsd, solaris|
|0.51||5.37.1||5.14.4||5.18.4||darwin, freebsd, linux, mswin, openbsd, solaris|
|0.52||5.37.1||5.14.4||5.8.9||darwin, freebsd, linux, mswin, openbsd, solaris|
|0.53||5.37.1||5.14.4||NA||darwin, freebsd, linux, mswin, openbsd, solaris|
|0.54||5.37.1||5.14.4||5.37.1||darwin, freebsd, linux, mswin, openbsd, solaris|
My first release only passed (accidentally) on a few versions but
seemed to passs on at least 1 version of all operating systems
tested. The failures were all due to missing dependencies that I had
failed to identify in
Makefile.PL. Thus a new release (0.50) was
required - somehow I made the same mistake, however as you can see
from the report, a new max version (5.37.1) emerges due to one of the
testers adding that version to its list of
perl versions to test. I
say the tests that passed, passed accidentally, because I’m guessing
that those testers had (for some reason) the necessary modules
installed in their environment.
That’s an important point to consider - all testing environments are
not created equally. By looking at the reports, we can conclude
empircally that there must be something different about these
environments if the module fails on one tester’s version of
5.37.1 and another passes? Take this report for example:
Note the failed tester and the OS version. The version of the OS is
different in the failing tester’s report…however the failure was due
XML::Simple not being installed because it was missing from the
list of dependencies in
Makefile.PL. So why did the other’s pass?
The conclusion must be that
XML::Simple was somehow present in those
environments otherwise they would would failed there as well.
Some other oddities of the CPAN Testers Reports is what versions of
perl are used for testing the module. After releasing 0.50 I noticed
that version 5.8.9 of
perl suddenly showed up in the testers
report. Hmmm…should I try to support that version? Is there a
reason it shouldn’t pass on 5.8.9? What versions of
perl did the original author’s 0.45 version support? Well, as it
turns out when that module was tested in 2012, it support 5.6.2!
Should I support 5.6.2? Would it actually be possible to support
The answer as it turns out is no. Version 0.45 would probably not pass
version 5.14.0 due to the versions of
perl that are required by the
Version 0.45 specifies that any version of
LWP::UserAgent::Determined will do, which in term will require
any version of
As I futilely attempted to see what the minimum
perl my adopted module could support I attempted to
LWP on version 5.10.0 of
not build on 5.10.0 (actuall it was the module
is part of
libwww-perl that failed unit tests) so I dutifully
filed an issue assuming that the authors of
LWP would want to know
that the module does not build on 5.10.0.
The response to my report was suprisingly - let’s bump the required
perl to 5.14. So, while
LWP successfully builds on
LWP::UserAgent::Determined does not.
After a lot of useless traversing down rabbit holes I was able to
determine that installing an older version of
LWP would, in fact succeed in
LWP::UserAgent::Determined. The rub here however is that
other modules like
XML::Simple require yet other modules that
specifed that any version of
LWP would do. If the dependency
that required any version of
LWP is installed prior
to installing a specific older version of
LWP listed in my manifest,
well, now we’ve installed an incompatible version of
specifying any version of
LWP will bring in the latest version.
cpanm had done the right thing and installed specific
versions of modules specified in the dependency list first, then the
older version of
LWP would have satisfied the requirement. This is
not to say that
cpanm did the wrong thing…it got the list of
direct dependencies from the distribution and started installing them.
To be fair, the versions of
perl I have been testing against are
old. CPAN authors should not be bound to supporting older versions of
perl at the expense of modernizing or enhancing their modules. The
point is to simply illustrate the difficulty in releasing a CPAN
module that does support older versions of
So should I then conclude that I need to bump the minimum version of
perl that Amazon::S3 will
support to something like 5.16.3? If I still want to support older
perl would it even be possible to find the versions of
dependent modules that do not break my build? Does that even make any
sense when modules are sometimes updated to fix bugs?
As it happens, I did manage to get a working build for
and 5.14.0. Of course, it was a forensics exercise and not very
satisfying to be truthful.
By installing version 6.13 of
LWP and version 2.14 of
HTML::HeadParser I managed to somehow get
Amazon::S3 to build
and complete all tests successfully.
The guidelines to support older versions of
perl seem to be:
perlyou plan to support
perlyou plan to support
more next time…
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510481.79/warc/CC-MAIN-20230929022639-20230929052639-00814.warc.gz
|
CC-MAIN-2023-40
| 6,275
| 118
|
https://www.rwhitley.co.uk/blog/now-then-lloyds-bank-station-road-west-drayton.html
|
code
|
Here's a comparison of Lloyds Bank on Station Road in West Drayton between now (February 2019) and back in circa 1950. You can see that the bank has expanded into the two neighbouring shops over time. But other than that it doesn't look much different... except for the rather lovely old car sat in front!
Follow us on social media for more!
- Facebook: https://www.facebook.com/RWhitleyCo/
- Instagram: https://www.instagram.com/rwhitleyco/
- Twitter: https://twitter.com/RWhitleyCo
- Vimeo: https://vimeo.com/user93627774
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00619.warc.gz
|
CC-MAIN-2022-33
| 523
| 6
|
http://www.cplusplus.com/forum/general/118727/
|
code
|
If your compiler supports C++11 (or TR1), you could also use std::array, if a fixed sized array is OK.
1 2 3
const size_t array_size = 8;
queue<array<int, array_size>> q; // C++11 doesn't need the spaces between the >s
And while you can't create a queue of arrays, you can create a queue of structs which contain a fixed sized array. Of course, you then have to work with the struct member so the code is less tidy (unless you sort of reinvent std::array.)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106984.52/warc/CC-MAIN-20170820185216-20170820205216-00009.warc.gz
|
CC-MAIN-2017-34
| 456
| 5
|
https://www.minneapolisfed.org/research/staff-reports/a-framework-for-studying-the-monetary-and-fiscal-history-of-latin-america-1960-2017
|
code
|
We develop a conceptual framework for analyzing the interactions between aggregate fiscal policy and monetary policy. The framework draws on existing models that analyze sovereign debt crises and balance-of-payments crises. We intend this framework as a guide for analyzing the monetary and fiscal history of a set of eleven major Latin American countries—Argentina, Bolivia, Brazil, Chile, Colombia, Ecuador, Mexico, Paraguay, Peru, Uruguay, and Venezuela—from the 1960s until now.
This paper has been written as part of the Monetary and Fiscal History of Latin America Project sponsored by the Becker Friedman Institute at the University of Chicago. It will be a chapter in _A Monetary and Fiscal History of Latin America, 1960—2017_, edited by Timothy J. Kehoe and Juan Pablo Nicolini and published by the University of Minnesota Press.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474523.8/warc/CC-MAIN-20240224044749-20240224074749-00815.warc.gz
|
CC-MAIN-2024-10
| 845
| 2
|
https://www.shopstyle.com/shop/specsandblazers/43232980
|
code
|
Shop the look from Niké Ojekunle on ShopStyle #ShopTheLook #ShopStyle #MyShopStyle #OOTD #Blogger
ShopStyle Look by specsandblazers featuring NuFACE Women's FIX Line Smoothing Device & Serum
More looks from Niké Ojekunle
See All Looks by Niké Ojekunle
Created by our ShopStyle Collective Creator. Discover the latest trends, styles and more at ShopStyle.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103344783.24/warc/CC-MAIN-20220627225823-20220628015823-00251.warc.gz
|
CC-MAIN-2022-27
| 357
| 5
|
http://www.ms.uky.edu/~lee/ma502/hw5/hw5.html
|
code
|
Next: About this document
Due Tuesday, October 27
You should have already done this:
- Find all the cube roots of i.
- Draw any non-convex quadrilateral such that no two sides are the
same length. Draw an ``Escher-like'' tiling of the plane by modifying the
sides of this quadrilateral in the manner that we discussed in class.
You may use Geometer's Sketchpad to do this if you wish.
- Explain how you can be absolutely certain that we have found all
21 possible planar clusters. Some suggestions: What are the
possible numbers of polygons that can be in a cluster? For each
possible number, what are the possible numbers of triangles that can
be in a cluster? For each possible number of triangles, what are the
possible numbers of squares? Etc.
- Consider two points and in
- What are the coordinates of the midpoint of the segment
- Suppose we wish to divide the segment by a point
C such that AC:CB=3:2. Determine the coordinates of C.
- Determine coordinates of the vertices of the polyhedron
determined by the space cluster 3-4-3-4. Use Maple to draw it.
Print out the result.
- Read the article on imaginary numbers and the two articles on
tilings that are on reserve in the Education Library.
- Make good drawings of the possible tilings by planar clusters.
- Find samples of border wallpaper and regular wallpaper with
interesting repeating patterns.
Wed Nov 4 12:25:34 EST 1998
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825510.59/warc/CC-MAIN-20171023020721-20171023040721-00501.warc.gz
|
CC-MAIN-2017-43
| 1,388
| 27
|
https://www.experts-exchange.com/questions/29118001/Gaming-over-ESXi.html
|
code
|
So I have a fun one, I need to build this server to ESXi 6.5, it's got 2 Nvidia K2 GPU's and a dual processor, 12 core Xeons.
My Director, yes, Director, wants me to build this as a virtualized Gaming Environment for Friday Afternoons.
Now I've read that you can do this and I know that there are a few things that need to be changed within ESX. However, my question would be can multiple people game at the same time from the server and shoot each other in the face. It won't be a heavy game, something like counter strike :D
Right so, this can be done with Horizon View but not with ESXi? I was planning on using something like WinVNC to connect to the virtual machine.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654031.92/warc/CC-MAIN-20230608003500-20230608033500-00672.warc.gz
|
CC-MAIN-2023-23
| 671
| 4
|
https://security.stackexchange.com/questions/173905/email-got-hijacked-or-hacked-where-to-start/173906
|
code
|
An important email got hacked (I got a notification from my provider that he changed the PW because my email login was used worldwide to send out emails, mostly spam I guess). I assume it was hijacked and not spoofed.
This email is usually used to register web services etc. for example it is used with AWS3, heroku etc. I have no clue how someone got access but now I am here, shit happens.
I need to figure out what happened exactly, but I dont know where to start.
I contacted my provider, so I get detailed numbers on how many emails were sent out and I will also change every password and use simple antivirus, but I am afraid that this is not enough?
I also checked every email which I received in the last weeks, there was nothing suspicious.
Thank you all for the answers, they still help me to be prepared in future.
According to the current situation:
My provider answered very fast and it seems that the issue was caused by me. I use this email to send out news to our users and every week we have more users and obviously more emails. The automatic notification and PW reset was triggered by me sending out those emails. I simply have to adjust security level of this email and thats it.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305341.76/warc/CC-MAIN-20220128013529-20220128043529-00041.warc.gz
|
CC-MAIN-2022-05
| 1,199
| 8
|
https://www.globalissuesnetwork.eu/gin-conferences/gin-conference-2024/sustainable-gin
|
code
|
Air travel stands out as a major factor influencing both an individual's yearly carbon footprint and the overall carbon impact of our GIN Conference. To address this, we kindly request that all student teams journeying to Luxembourg via airplane assume responsibility for mitigating the environmental impact of their flights. For calculating travel emissions: Carbon Travel Calculator
To facilitate this, we will gather information during conference registration to identify schools actively engaged in offsetting their air travel, enabling us to precisely assess the conference's carbon footprint. Teams have the flexibility to devise their own strategies for offsetting air travel or can make use of the convenient OFFSET TOOL provided.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476452.25/warc/CC-MAIN-20240304133241-20240304163241-00105.warc.gz
|
CC-MAIN-2024-10
| 738
| 2
|
https://community.morphmarket.com/t/orange-belly-in-asphalt-or-freeway-like-combos/1451
|
code
|
I was asked by John @ MorphMarket to post this discussion. We recently hatched a clutch of snakes from a freeway x super orange belly pairing. The offspring being orange belly asphalts (Orange Belly Freeways) and orange belly yellow bellies (Orange Belly Ivories). MorphMarket doesn’t recognize the orange belly asphalt as a freeway, nor does it recognize the orange belly yellow bellies as Ivories, so we had to get creative when listing them (please see the Sun Devil Reptiles store and check out the listings and the description.) MorphMarket doesn’t want us to have yellow belly in the listings as its not in the animals. Any ideas for a solution to this would be greatly appreciated.
Personal opinion here
Asphalt and Gravel, while very similar, are recognized as two distinct alleles and so their combos are, likewise, labeled differently. Which is why we call a Asphalt/YB a Freeway instead of a Highway.
From what I gather, most everyone who works with OB is of the opinion that it is separate/distinct from YB. So… Following the logic applied to Asphalt/Gravel from above, an Asphalt/OB then should not be called a Freeway because Freeway is the name for the Asphalt/YB.
As such, I would just label them on MM as being Asphalt/OD
- We don’t allow adding trait tags for anything except what the animal is being advertised to have. While the OP has good intentions, we have all kinds of mayhem if don’t hold a hard line on this.
- Our system does not have a way to encode multiple meanings for a single trade name. That’s why for BEL we have to break it up into several trade names here as you can see on the combos page.
- So the best we could do is add something like Asphalt (Orange Belly) but honestly most people aren’t going to search that way.
I said it could be posted as a feature request here to see what kind of discussion it might generate. I recategorized as MorphMarket Support / Feature Request.
I believe you may be able to include freeway with a variance to orange belly. Similar to the BEL. Doing the same with the Ivory would work also.
What about officially labeling it an Orange Belly Freeway? That would be descriptive in giving potential buyers more exact information specifying Orange Belly as separate from Yellow Belly, as there are some who look for that.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400206763.24/warc/CC-MAIN-20200922192512-20200922222512-00479.warc.gz
|
CC-MAIN-2020-40
| 2,303
| 11
|
http://www.vorb.org.nz/wheeler-full-suss-primo-condition-33lb-offers-t691.html
|
code
|
Nah - he's got another bike. This one is the crappy one.
That had it's rear shock (or pivot) nearly fall out.
ps: pictures are available somewhere in tama's collection of wheels working on said "sqealer" upside down (after saying something like "don't ever work on your bike upside down. I think he also mentioned something about not using a hose on your bike, but it was a weekend for bike deviancy all round...)
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706470784/warc/CC-MAIN-20130516121430-00072-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 413
| 3
|
https://campusarch.msu.edu/?p=2651
|
code
|
Happy Digital Learning Day!
Digital Learning Day was started by the Alliance for Learning, in partnership with the National Writing Project to celebrate innovative teaching practices that teach digital skills to students in order to improve their opportunities in the future. Digital learning consists of any instruction that uses technology to strengthen learning. Campus Archaeology has always been committed to using digital tools as a way to reach the public and explore the past. Students work with Geographic Information Systems to do spatial analyses, OMEKA to create online museum exhibits, and social media to share their work to the public.
Last year for Digital Learning Day, we hosted a workshop to teach social media and digital identity skills to students and faculty within MSU’s Department of Anthropology. The event was a major success, and many students came away with a new found knowledge of how to use digital tools to improve their networking, research, and teaching.
We decided to follow up last year’s event with a more informal brown bag discussion and hack session. Today, on Digital Learning Day 2014, a group of Anthropology students got together to review digital identity management, update their social media profiles, learn new technologies that appeared within the last year, and help each other develop their digital skills. At the event we reviewed the basic principles of maintaining a digital identity, answered some questions regarding use and best practices for employing different tech tools for research, and updated our online profiles. It was a very successful event with great discussions.
Campus Archaeology had another very successful Digital Learning Day, and we are looking forward to next year!
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337595.1/warc/CC-MAIN-20221005073953-20221005103953-00203.warc.gz
|
CC-MAIN-2022-40
| 1,747
| 5
|
https://elearning.industriallogic.com/gh/submit?Action=PageAction&album=automatingScenariosSafely&path=automatingScenariosSafely/drivingFromScenarios/driving&devLanguage=Java
|
code
|
Just as Test-Driven Development (TDD) goes from a failing test, to a passing test, to refactoring,
scenario development proceeds the same way.
We pick a scenario, then implement the fixtures just enough to see the scenario fail.
Then we implement the desired behavior, either via TDD or by implementing it directly.
When the scenario passes, we can refactor more, then tackle the next scenario, until the story is done.
This "two-level" style (using both scenarios and TDD)
is often called Acceptance-Test Driven Development
it is a common (but not mandatory) approach to BDD.
||use this markup:
(Supported languages: java, cpp, csharp, c, python.)
|a method or class name
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358903.73/warc/CC-MAIN-20211130015517-20211130045517-00224.warc.gz
|
CC-MAIN-2021-49
| 672
| 11
|
https://ftw.usatoday.com/2017/12/snake-hunters-capture-a-monstrous-17-foot-132-pound-python-in-florida
|
code
|
The South Florida Water Management District launched the “Python Elimination Program” earlier this year in an attempt to eradicate the apex predators from the Everglades. Since March, more than 100 pythons that measured more than 10 feet in length have been killed, and earlier this month, a group of python hunters set a new record by capturing a 17-foot behemoth near the Big Cypress National Preserve.
Via the Sun-Sentinel:
“That snake could pretty much kill any full-grown man,” said one of the hunters who caught the python, Jason Leon, to NBC 6. “If that snake was alive right now, it would probably take like three of us to be able to control that snake.”
(Photo courtesy of the South Florida Water Management District.)[jwplayer xCQ3ccrA-t2dCqACG]
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710974.36/warc/CC-MAIN-20221204140455-20221204170455-00693.warc.gz
|
CC-MAIN-2022-49
| 767
| 4
|
https://lists.qt-project.org/pipermail/development/2018-July/033041.html
|
code
|
[Development] Upgrade the XCode running in the CI's macOS 10.11
alexandru.croitor at qt.io
Mon Jul 9 11:39:05 CEST 2018
I believe it already is the latest.
As per http://coin/coin/api/results/qt/qtwebengine/e5e1c69e2008205b2178c940c47c1349d6e41c7b/MacOSOSX_10_11x86_64MacOSOSX_10_11x86_64Clangqtci-osx-10.11-x86_64-3-6a86deDeveloperBuild_Release_QtNamespace_NoPch/e45496f196c102ad5a87327cb11c97f68b4b2baf/build_1531080426/log.txt.gz
we are using XCode 8.2, and the last supported version on 10.11 is 8.2.1. I don't think that the patch release will make a big difference though.
On 9. Jul 2018, at 02:15, Thiago Macieira <thiago.macieira at intel.com<mailto:thiago.macieira at intel.com>> wrote:
This is the second time I've run into a compiler bug with that XCode's ancient
Can we please upgrade the XCode installation there to the latest available for
If that's the latest, can we declare that building Qt on 10.11 is no longer
supported for Qt 5.12? I'm not asking about deployment, only building.
Thiago Macieira - thiago.macieira (AT) intel.com<http://intel.com>
Software Architect - Intel Open Source Technology Center
Development mailing list
Development at qt-project.org<mailto:Development at qt-project.org>
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Development
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488556133.92/warc/CC-MAIN-20210624141035-20210624171035-00356.warc.gz
|
CC-MAIN-2021-25
| 1,331
| 18
|
https://blog.adafruit.com/2021/11/05/a-halloween-talking-clock-based-on-a-raspberry-pi-pico-raspberrypipico-circuitpython-halloween-piday-raspberrypi/
|
code
|
On Saturday, August 13, 2022 we will be working on the Adafruit Customer Support Forums. If you visit over the weekend and things are not complete yet, please check back later, https://adafruit.com/forumupdates
A Halloween talking clock based on a Raspberry Pi Pico #RaspberryPiPico #CircuitPython #Halloween #PiDay @RaspberryPi
This project is a Halloween talking clock that plays sounds every hour. Only a few external components (easy to source and solder) are needed.
The Raspberry Pi Pico draws about 1.6 mA in it’s lowest power mode (deep sleep). Seems not much, but it is too high for a battery powered circuit, because they will exhaust in around two months. For that reason, an external power circuit that can shut off the board completely was added. After that, power consumption was lowered to 70 uA, so batteries will last for a year.
The Pico acts as sound storage and player. To show the time and generate an hourly signal, a quartz clock movement with trigger was used. Combining these 2 elements, a talking sound clock was born.
For software, two versions of the same application were made: one developed in CircuitPython and the other in the C/C++ SDK. There’s no need to recompile code (in the app developed in CircuitPython) to change sounds
Stop breadboarding and soldering – start making immediately! Adafruit’s Circuit Playground is jam-packed with LEDs, sensors, buttons, alligator clip pads and more. Build projects with Circuit Playground in a few minutes with the drag-and-drop MakeCode programming site, learn computer science using the CS Discoveries class on code.org, jump into CircuitPython to learn Python and hardware together, TinyGO, or even use the Arduino IDE. Circuit Playground Express is the newest and best Circuit Playground board, with support for CircuitPython, MakeCode, and Arduino. It has a powerful processor, 10 NeoPixels, mini speaker, InfraRed receive and transmit, two buttons, a switch, 14 alligator clip pads, and lots of sensors: capacitive touch, IR proximity, temperature, light, motion and sound. A whole wide world of electronics and coding is waiting for you, and it fits in the palm of your hand.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572021.17/warc/CC-MAIN-20220814083156-20220814113156-00021.warc.gz
|
CC-MAIN-2022-33
| 2,165
| 7
|
https://docs.vmware.com/en/Management-Packs-for-vRealize-Operations-Manager/6.2/vio/GUID-2E6A13C7-A376-4C8F-9126-E73773DC5534.html
|
code
|
After you install the management pack, add and configure an instance to start collecting data.
- From the left menu, click Administration, and then click Solutions.
- On the Solutions page, click Management Pack for OpenStack, and then click the Configure icon.
- Select the OpenStack Adapter and configure the instance settings.
Option Action Display Name Enter a name for the adapter instance. Description Enter a description for the adapter instance. OpenStack API Host Enter the host name or IP address where the KeyStone service is running. This service provides an entry point to the OpenStack API. VIO Manager Host Enter the VIO Manager host name or IP address where the service is running. Port Enter the port number where the KeyStone service is running. The default port number is 5000. Connection Type Select the connection type with which the management pack should communicate with OpenStack. The option set by default is HTTPS. Domain Name Enter the domain name of a project to receive data from that particular domain. Endpoint Type Endpoints are the APIs used to call the different OpenStack services. Select the set of endpoints which vRealize Operations Manager uses when connecting with the OpenStack API.
- Detect Automatically. This option is selected by default, and can be used if you do not know where vRealize Operations Manager is installed.
- Public Only. Select if vRealize Operations Manager is installed outside the management network.
- Admin Only. Select if vRealize Operations Manager is installed inside the management network.
- Internal Only. Select if you want to use the Internal service endpoints that are registered with OpenStack
Support Auto Discovery Auto discovery enables the management pack to discover resources and monitor the OpenStack deployment. This option is set to True by default, and should not be changed.
- To add the credentials used to access OpenStack and optionally vCenter Server, click the Add icon.
Option Description Credential name Enter the name by which you are identifying the configured credentials. OpenStack Username Enter the username with which you connect to OpenStack. OpenStack Password Enter the password with which you connect to OpenStack. Admin Project Enter the name of a project for which you have an admin role. For the most complete discovery possible, you should have the admin role on all projects.Note: The Admin Project should be associated to the specified Domain Name. VIO Manager Username Enter the username with which you connect to the VIO Manager Host. VIO Manager Password Enter the password with which you connect to the VIO Manager Host.
- Click Test Connection to validate the connection.
- The Advanced Settings area includes the Collector drop-down box, in which you can select the collector upon which you want to run the adapter instance. A collector gathers objects into its inventory for monitoring. The collector specified by default has been selected for optimal data collecting.
- Click Save Settings.
The adapter instance is added to the list.
What to do next
Verify that the adapter is configured and collecting data by viewing application-related data.
|Where to View the Information||Information to View|
|Collection Status and Collection State columns in the Management Pack for VMware Integrated OpenStack Solutions Details pane on the Solutions tab.||The strings
|Environment Overview||The objects related to OpenStack are added to the inventory trees.|
|Dashboards||Management Pack for VMware Integrated OpenStack dashboards are added to the vRealize Operations Manager dashboards.
Click the Home icon in the left pane of vRealize Operations Manager to view dashboards.
Note: Following ports must be opened for all the standard deployments:
- Openstack endpoint: Ports 5000, 9696, 8774, and 443
- VIO manager: Port 443
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00189.warc.gz
|
CC-MAIN-2022-33
| 3,835
| 26
|
https://npm.taobao.org/~segfaultx64
|
code
|
Wed Apr 06 2016 05:11:23 GMT+0800 (China Standard Time)
(latest: 1.0.1) A simple way to do select case logic inline in a react component
(latest: 1.1.4) express-http-to-https is a node.js package for providing an Express middleware that redirects the client to HTTPS if they attempt to connect over HTTP.
(latest: 0.2.1) This library provides some basic graph data structures and algorithms.
Copyright 2014 - 2017 © taobao.org |
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487621273.31/warc/CC-MAIN-20210615114909-20210615144909-00547.warc.gz
|
CC-MAIN-2021-25
| 429
| 5
|
https://www.itwire.com/business-it-news/security/73138-jigsaw-ransomware-source-code-on-sale.html
|
code
|
Forcepoint researchers said they had decided to do some preliminary analysis to understand the economics of the malware, where it was traded from and level of sophistication of the author.
Once a system is infected, Jigsaw issues a warning to the user that a certain number of files will be deleted at differing time intervals, unless a ransom of US$150 is paid to a specified Bitcoin account.
This led the researchers to believe that the malware was being rebuilt by different people with some modifying the source so as to avoid detection by standard anti-virus programs.
Searching for these copyright notices using the full text, it was easy to find the author. All the links, bar one, that came up in a search led to reports generated by automated malware analysis tools; the odd one out led to a Tor site belonging to the author of Jigsaw.
Here the source code for Jigsaw, which is written in C#, was offered for sale for a price of US$139. Forcepoint said it appeared that the author had made 24 sales.
However, return on investment seems to be very low. Forcepoint extracted the ransom Bitcoin addresses for four samples and found that in two cases the extortionist received no ransom payment at all. In one case they received US$1 worth of Bitcoin (which may have been merely a test) and the most successful one received a total of US$89 worth of Bitcoin.
Forcepoint also noted that though the Jigsaw author had provided instructions on how to configure and build the malware, some who had done so had left their names in the build strings for the executable.
"This could have been funny if it were not true," the Forcepoint team wrote in its analysis. "A mediocre and greedy techie writes a 2nd rate piece of malware that is designed to scare people into parting with their money. He (or she) sells it to a group of customers who are not that techno-savvy but are equally greedy and devoid of any morals. Hardly a happy story.
"But, if we needed an illustration of bad programmers selling to somewhat inept 'wannabe' criminals via the unregulated 'dark web', this is probably good enough for now."
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057427.71/warc/CC-MAIN-20210923165408-20210923195408-00036.warc.gz
|
CC-MAIN-2021-39
| 2,106
| 9
|
https://www.suse.com/c/developer-strangelove-or-how-i-learned-to-stop-worrying-and-love-the-waterfall-model/
|
code
|
Developer Strangelove or How I Learned to Stop Worrying and Love the Waterfall Model
Everyone loves to hate the Waterfall Model (WM) and extoll the virtues of modern development methodologies. But while people are rolling their eyes at the mere mention of the WM, they forget that it was one of the first attempts at a systematic approach to complex system development. Few first attempts turn out to be the best, but all first attempts teach us something. As such, the WM contains pearls of wisdom that should not be ignored.
Figure 1: The Venerable Waterfall Model
For the uninitiated, the WM starts with requirements. Requirements describe what the system or software will accomplish in structured natural language. An overly simple example might be: “If signal A is true, the system shall light the green LED.” A complex system could have tens or even hundreds of thousands of requirements. A modern aircraft has millions. The next step is architecture and design. Here the requirements are analyzed and categorized to guide the system or software architecture design. The result is your typical flowchart-like diagram with boxes representing functionality and connectors for interfaces. Implementation is next. The developers implement the hardware and/or software needed to fulfill requirements within the boundaries provided by the architecture. Finally, you test the implementation. Easy peasy.
There are three benefits to the WM: 1) a systematic approach 2) that is easy to understand and 3) recognizes that details increase over time. First, having a systematic approach to anything is a good idea. For system and software design, a systematic approach guides developers along a logical path of development, provides oversight for project progress, and improves reproducibility. Second, the WM is very easy to understand. This benefit should not be scoffed at; simplicity is its own reward. Third, the WM is a top-down approach that starts at a high-level of understanding and specification and works its way down, increasing details at each level, until the final product is realized and verified. This might seem obvious now but that is only because the WM engrained it in the minds of developers over the last 50+ years.
Over the years the WM has been the victim of oversimplifications and misunderstandings. For instance, one misunderstanding is that the next phase could only start after the previous phase finished. The WM in no way suggests this, in fact pictures of the WM always show the phases overlapping. That’s not to say there aren’t legitimate problems with the WM. Although it rarely happened in practice, a major downfall of the WM is that testing is shown to happen only at the end. This implies you’ve gone through months or even years of work before you run the first test. No one really did this, but it’s how the model was presented. Another problem is that the WM doesn’t contain any notion of feedback loops. It’s commonly accepted these days that refinement is done after feedback from subsequent phases and that changes from outside forces necessitate rework. But the WM is presented in a linear fashion which ignores these inevitable loops.
So now you’re asking yourself: why would a system/software engineer with 20 years’ experience in safety-critical industries put up a spirited defense of the old worn-out WM? Answer: because the Waterfall Model set the stage for the V-Model.
Tune in next time, when I describe WM’s spiritual successor, the V-Model.
Requirements are the key to success. Some customers have great requirements, and some have crummy requirements. Crummy engineers have a chance of muddling through if the requirements are good and understood. Good engineers with a good model will stumble (or grumble) with crummy requirements.
The WM allows for loops, but try convincing managers to allocate time and staff for the looping. The enlightened ones might add in a little.
An engineer with some understanding of the product (system requirements, experience, napkin, etc.) can start working on tests even before the requirements are complete. I made the mistake of saying out loud in a meeting that I was working on tests before software requirement completion, and was greeted with stares as though I had grown a third eye.
As a requirements engineer, I whole-heartedly agree! Requirements will be an interesting challenge for the EB project (see subsequent posts) since we don’t really have developers in the traditional sense. I hope all is well at Astro. I miss you and the old crew. 🙂
Just read you posts, great reads.
Working for over 15 yrs in automotive and today I (again) had to explain, that although we want to be “agile”, we need some product reqs writen down and a process to get the missing ones! Having user stories in Jira is not enough to be certain we are going to hit what our customer (actually thinks he/she) needs …
Keep at it, looking forward to new posts!
Sorry for the anonymity, I am kind of like that way :)!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949331.26/warc/CC-MAIN-20230330132508-20230330162508-00789.warc.gz
|
CC-MAIN-2023-14
| 5,022
| 16
|
https://www.npmjs.com/package/react-dialogista
|
code
|
An experimental slim library providing centralised system for all dialogs/popups/modals in your app.
Important: We use minor version increment as version bump. It means that any new minor version may contain API breaking changes. This applies for all versions before 1.0.0 or until stated otherwise.
React Dialogista requires React 0.14 or later.
If you use React before 16.0.0
npm install --save email@example.com
Starting v0.15.0, react-dialogista works with React 16.0.0 and later
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949506.62/warc/CC-MAIN-20230330225648-20230331015648-00421.warc.gz
|
CC-MAIN-2023-14
| 483
| 6
|
https://eu.forums.blizzard.com/en/wow/t/a-pyrewood-village-bastion-evening-cest-midcore/246099
|
code
|
International, English speaking , Family and Work Friendly, “play smart not hard”. [15/15]
Who are we?
A mix of vanilla veterans (some getting long in the tooth) and friends picked up along the private server era that love the original game; looking to expand our company with like-minded people. A lot of our folks have jobs and or families so our playstyle is tailored to make good use of available time. All experience levels welcome, we’ll guide you along the way if you are a wow or vanilla newbie.
What can you expect from us?
- A plan for all 6 phases to get through content with minimum busywork and max progress / fun.
- A stable drama-free guild environment fully transparent on goals and function. You’ll never be blindsided with adhoc decisions or not know what’s coming next.
- A competently run Discord / Guild Hub, daily and weekly guild activities and all the tools to facilitate getting informed and participating.
- Social events, help with professions.
- Monty Python and Douglas Adams jokes (but always up for some quality/effort memes) .
Where can you find us?
In-game at Pyrewood Village PvE Realm or the [Bastion Discord]
We are an adult guild. Less in the PEGI18 sense (could happen occasionally) more in the low tolerance to salt / angst.
- Try to leave your RL bothers at the login screen.
- Get involved with guildies.
- Your solo time is yours, but be dependable after commiting to an official guild activity.
- Represent the guild ethos on the realm.
- Have fun
RAIDS / GROUPS
Our overarching goal is to clear all raid content in a timely manner.
Core members have had decent 40man progress (T2.5) in 2006 and had a chance to test our progress plan on the closest available fascimile since (Nost+ private realms) all the way into Naxx.
Not aiming at breaking speed clear records but we will get our clear times down to a comfortable level and take all measures to stay there.
- Raid times are Fri / Sun 20:00 - 23:00 CEST (tweaks possible after polling our roster).
- 40man Loot System is EPGP with mainspec over offspec.
- Loot rules for Alliance / PuG raids / 20mans on our Discord.
- Gear/ Consumable / Playstyle expectations for raid content also on our Discord (reasonable minimums are set depending on highest content available).
- Our main focus is PvE but we will get involved with the realm community and participate or run the occasional opt-in PvP event.
Recruiting (April 2021 update)
- 1 or 2 healer spots (priest preferred)
- 1 or 2 pure dps spots (warrior preferred)
Friends of the above (we could fit one of whatever in our roster, except rogues perhaps)
See you in-game
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038064520.8/warc/CC-MAIN-20210411144457-20210411174457-00130.warc.gz
|
CC-MAIN-2021-17
| 2,625
| 31
|
https://discourse.igniterealtime.org/t/adding-contacts-to-a-member-of-a-forced-group/45557
|
code
|
Firstly I wish to thank you all for the great job. I migrated my Jabberd2 server to the Wildfire one with no pain. I just have a doubt till now:
I am member of the support group. And this group is forced to be in every account.
But I cannot add anyone to my host list. Every time I ask, I get the response “Authorized” but in my host I always get the response “Subscription: none”.
There is a way to change this behavior?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657167808.91/warc/CC-MAIN-20200715101742-20200715131742-00431.warc.gz
|
CC-MAIN-2020-29
| 429
| 4
|
https://www.avforums.com/threads/harmony-885-selecting-input.231737/
|
code
|
I have a Viewpia LCD TV. The different inputs are selected by pressing "Input", the use the arrows to scroll up or down the input list, and then select the correct input by pressing OK. This works fine on the 885 when switching activities. BUT there is a problem when the input cycling gets out of sync. When pressing Help the 885 tries to correct input. It cycles correct through the inputs choices, but it does not manage to select any input (by sending OK). The only way to correct this is to manually select the input on the TV. Anyone else have this problem? By the way, is there a way to cycle through inputs both up and down? It seems like the 885 only cycles one way and this is a real pain when you have 6 inputs to cycle through from AV2 to AV1.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945272.41/warc/CC-MAIN-20180421164646-20180421184646-00486.warc.gz
|
CC-MAIN-2018-17
| 755
| 1
|
https://ur.fanpop.com/clubs/advice/forum/post/26275/title/feel-invisible
|
code
|
Ok. I am shy person when I moved to another school, but once i'm there let myself go. I've recently moved from school and I don't know a lot of people. I barely talk at school ,but i was getting over it. Then I had a haircut in which I do not look good. Now I feel Like I'm at the bottom again. WHAT SHOULD I DO?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370493818.32/warc/CC-MAIN-20200329045008-20200329075008-00217.warc.gz
|
CC-MAIN-2020-16
| 312
| 1
|
https://talkdelta.freshdesk.com/support/solutions/articles/82000880217-how-to-solve-error-13-type-mismatch-
|
code
|
1. Check the broadcast setting. [Talk delta exe>Settings>system settings>broadcast settings]
2. Or Update the system setting.ini file[Talk delta access setup folder> systemsettings.ini > delete the expiry date and rename I flag =W to A] and check.
3. Or Rename the existing file system.ini file old and copy the systemsettings.ini file from another machine and paste in the target folder.
4. May occur while starting live[F7]. Check in registry [Run>regedit>current user>software>vb and vba >Delta soft>Live summary portfolio>total>N to Y] and check system setting in talk delta exe.
5. Or else Backup Restore still error is showing up then might have to change the PC.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337663.75/warc/CC-MAIN-20221005172112-20221005202112-00692.warc.gz
|
CC-MAIN-2022-40
| 669
| 5
|
http://www.ehow.com/how_7865192_remove-broken-drain-snake.html
|
code
|
If you've been using a drain snake to clear your pipes, you know that the tools can be a good way of moving blockages but aren't infallible. A drain snake can sometimes break off within the pipe, leaving you with more blockage than when you started. When this happens, don't waste your time fishing around in the plughole: the way to remove the snake is to open up the pipe.
Things You'll Need
- Straight pipe wrench (10- to 18-inch)
- Large basin
Access the area underneath the plughole you've been forcing the snake into. In most cases, this will be underneath the basin or sink. If the snake is stuck under your bathtub, the pipes may have to be accessed through your basement.
Adjust the straight wrench so it is the right width to unscrew the nuts holding the U-bend in place. Place a basin under the U-bend to catch excess water trapped in the pipe.
Unscrew the nuts on either side of the U-bend and pull it down and out of place. Pull the fragments of the broken snake out of each end of the pipe, and shake any fragments out of the U-bend.
Replace the U-bend, and tighten the nuts to restore your drain.
Tips & Warnings
- While the U-bend is removed, this is a good time to clean any persistent blockages out of your U-bend or the pipe on either side of it.
- Hardware Store: Plumbing
- Jay Maples; Admin, Rigid Plumbing Forum; Minneapolis, MN
- Photo Credit Jupiterimages/Photos.com/Getty Images
How to Repair a Kinked Drain Snake
Kinked drain snakes come at the most inopportune time: when you are already dealing with a clogged drain. The drain snake itself,...
How to Clean Out the U Bend in a Kitchen
The U-bend pipe under your kitchen sink helps transfer waste water to your home's sewer line and contains water in its neck...
How to Troubleshoot a Stuck Plumbing Snake
If your plumbing snake (also known as a drain auger) gets stuck while you attempt to wrestle a blockage out of your...
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105297.38/warc/CC-MAIN-20170819031734-20170819051734-00666.warc.gz
|
CC-MAIN-2017-34
| 1,902
| 19
|
https://datamining.togaware.com/survivor/First_Contact.html
|
code
|
Desktop Survival Guide
by Graham Williams
In Chapter we identified that a significant amount of effort within a data mining project is spent in processing our data into a form suitable for mining. The amount of such effort should not be underestimated.
Once we have processed our data we are ready to build a model--and with Rattle we can build the model with just a few mouse clicks. Using a sample dataset that someone else has already prepared for use, in Rattle we simply:
The data comes from a weather monitoring station located in Canberra, Australia. Each observation is a summary of the weather conditions on a particular day. It has been processed to include a target variable which indicates whether it rained the day following the particular observation. Using this historic data we have built a model to predict whether it will rain tomorrow. Weather data is commonly available, and you might be able to build a similar model based on data from your own region.
With only one or two more clicks, further models can be built. A further few clicks will have an evaluation chart displaying the performance of the model. Then a click or two more will have the model applied to a new dataset to generate scores for new observations.
Now to the details. We will continue with both the Rattle GUI and simple command line familiarity (which is not strictly necessary in using Rattle, but as we develop our data mining capability, it will become useful). We will load data into Rattle and explain the model that we have built. We will build a second model and compare their performances. We will then apply the model to a new dataset to provide scores for a collection of new observations (i.e., predictions of the likelihood of it raining tomorrow).
Copyright © Togaware Pty Ltd Support further development through the purchase of the PDF version of the book.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100146.5/warc/CC-MAIN-20231129204528-20231129234528-00439.warc.gz
|
CC-MAIN-2023-50
| 1,864
| 8
|
http://vmworkshop.org/2016hotl.shtml
|
code
|
2016 Hotel Information
With the plethora of internet hotel search sites (e.g. trivago, kayak, expedia, orbitz, priceline, hotel, etc.) and frequent stayer programs, and that fact that we have no VM Workshop hotel discounts to offer, there is little point in providing hotel suggestions. Most people have their own preferences.
Nonetheless, using your favorite search engine, a decent starting
search argubent might me:
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710691.77/warc/CC-MAIN-20221129100233-20221129130233-00092.warc.gz
|
CC-MAIN-2022-49
| 418
| 4
|
http://www.tomshardware.com/forum/27764-42-file-transfer-minutes-gigabit-network-good
|
code
|
Apologies, I am a newbie here and at networking. I didn't find a similar thread so I thought I'd post my question.
I am transferring an 8.51 GB file between a computer and a Time Capsule on a home ethernet "Gigabit" network, and it takes about 8 minutes. Is this a good speed? If not, what can I do to speed up my file transfers?
Computer: Mac Mini, OS 10.6.2, Gigabit ethernet port
NAS: Time Capsule 500Gb, Gigabit ethernet port
Switch: D-link 1005D Gigabit switch
More about :file transfer minutes gigabit network good
Thanks for the responses. I was thinking that 18-ish MB/sec seemed a bit mediocre too. So what could the "weakest link" be? Is it the 5400rpm HD on the computer? Or is it the Time Capsule (7200rpm drive)?
Any suggestions as to how I could improve the transfer speed?
There's a very good chance the 5400rpm drive is slowing it down.
Without further test, you won't know. You need to isolate each device and test them separately. You would need to find a HD performance test to see how well your HDs perform. Then you would need to find a test to stress your gigabit link. Since a gig link is good for over 100MB/sec, you typically need to use a ram drive to supply the data fast enough to actually attempt to saturate it.
I would think setting up a ram drive in OS X wouldn't be that hard since it's based on BSD, but I don't use/own any MACs.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413558066654.4/warc/CC-MAIN-20141017150106-00013-ip-10-16-133-185.ec2.internal.warc.gz
|
CC-MAIN-2014-42
| 1,363
| 11
|
https://pixelache.ac/posts/audiovisual-installation-metasphere-8-19-4-at-node-gallery
|
code
|
Welcome to visit the audiovisual installation Metasphere a collaboration between Irina Spicaka (concept, visual design and mapping), Krisjanis Rijnieks (creative code, technical structure) and Platon Buravicky (sound) (all LV), on display at Node Gallery, located in the Aalto University Arabia campus, from April 8 to 19.
Opening hours are Mon-Thu 8:00-19:00, Fri 8:00-18:00.
The audiovisual installation ‘Metasphere’ is on display atNode Gallery, located in the Aalto University Arabia campus, fromApril 8 to 19. Opening hours areMon-Thu 8:00-19:00, Fri 8:00-18:00.
Metasphereshows the fragile nature of the inner state of a human being. This work portrays a fragment of the everyday perception experience. That includes the process of observation of the surrounding environment and how it interacts with the subjective reflections of it. The round shape of the screen is a symbol of completeness. It is the perception mechanism. There is always something that does not...
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100286.10/warc/CC-MAIN-20231201084429-20231201114429-00231.warc.gz
|
CC-MAIN-2023-50
| 978
| 4
|
https://elementary.io/th/get-involved
|
code
|
ทุกอย่างที่เราทำอยู่นี้เป็นโครงการโอเพ่นซอร์ส 100% และถูกพัฒนาอย่างมุมานะโดยผู้คนจากทุกมุมโลก แม้คุณจะเขียนโปรแกรมไม่ได้ แต่คุณยังเสนอข้อคิดเห็นของคุณได้นะ
With the help of our users and fans, we've been able to grow from a small group of passionate volunteers into a tiny but sustainable company. Every little bit of support helps us improve elementary OS and tackle even more ambitious problems.
Directly fund elementary and get a badge on your GitHub profile to show your support. GitHub Sponsors doesn't charge any fees, so it's a great way to make your contribution go farther.Sponsor on GitHub
Patreon works like an ongoing crowdfunding campaign. Choose an amount to contribute each month to help us reach our goals. Plus, earn exclusive rewards and read exclusive content early.Back on Patreon
Easily use a debit card, credit card, or PayPal account. You can choose a one-time payment or set up recurring payments.
Set up a recurring contribution through Liberapay, the open source and non-profit funding platform.Contribute with Liberapay
Contribute via cryptocurrency with Coinbase. We can securely accept Bitcoin, Ethereum, and other cryptocurrencies instantly.Pay with Crypto
Stack Exchange is a Q&A website built around finding the best answers to common questions. Anyone can create an account to start asking and answering.ตั้งคำถามหรือปัญหา ดูคำถามที่ยังไม่ได้รับการตอบ
Our desktop environment and all its apps are built using Vala, GTK, Granite, and a number of other open libraries. We host all of our code and do all development on GitHub. If you've never developed for elementary OS before, we recommend you check out our Getting Started guide.Getting Started Guide Browse Code
Help out by tracking down issues and reporting them. Or help by confirming, clarifying, and cleaning up existing issues.Read the Guide
Contribute to elementary OS by fixing issues, improving functionality or implementing new features. เรียนรู้เพิ่มเติมBitesize Issues
Improve the overall elementary OS ecosystem and earn money by creating great new apps for AppCenter.Publish on AppCenter
Our design team turns ideas into clear issue reports and deliverable assets. Before diving in, it's recommended to read about our design workflow. เรียนรู้เพิ่มเติม
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400206329.28/warc/CC-MAIN-20200922161302-20200922191302-00322.warc.gz
|
CC-MAIN-2020-40
| 2,704
| 13
|
https://help.briovr.com/hc/en-us/articles/360052039473-Using-too-many-materials-may-cause-the-object-to-render-improperly-
|
code
|
Exceeding the recommended number of texture maps will slow down performance, and may cause scenes to crash on smaller devices.
Recommended number of materials for fastest performance
(These recommendations are based on 2048x2048px texture maps)
- 6 or less for fastest performance;
- 10 maximum
- 1 material for fastest performance;
- 5-8 maximum depending on device
- 4 or less for fastest performance;
- 5-8 maximum, depending on device
- 9 or less for fastest performance;
- 12-15 maximum, depending on device
Reduce materials by removing unnecessary texture maps. If you have uploaded your own materials, you can combine their maps using the material ID method.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662543797.61/warc/CC-MAIN-20220522032543-20220522062543-00185.warc.gz
|
CC-MAIN-2022-21
| 665
| 12
|
https://design.wikimedia.org/style-guide/components/dropdowns.html
|
code
|
Dropdowns must feature a label stating the current selection and a menu of at least two, preferably three option.
Dropdown labels communicate what selections the component conveys. Labels are obligatory for dropdowns.
Icons might simplify identification for the available selection in dropdowns by the user.
Dropdowns appear button like with obligatory 'down' indicator as identifier.
States of dropdowns
Dropdowns have following visually separate states:
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991693.14/warc/CC-MAIN-20210512004850-20210512034850-00316.warc.gz
|
CC-MAIN-2021-21
| 455
| 6
|
http://www.fungamesarena.com/humbug-2.html
|
code
|
Humbug is a humorous platform style puzzle game where you will have to think out of the box. Ziggy Fraud wants the crown. He will do anything to make his dream come true. Even if it needs a little cheating. Think out of the box!
WASD to move, Space to interact with objects, 1-2 to modify strenght/life, Q to pause.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698540975.18/warc/CC-MAIN-20161202170900-00353-ip-10-31-129-80.ec2.internal.warc.gz
|
CC-MAIN-2016-50
| 315
| 2
|
https://community.slingbox.com/thread/11781
|
code
|
I understand that ever since Comcast provided you with a digital cable converter, you keep losing channels.
The main issue is that the Slingbox SOLO is not capable to fix this issue, since it does not have a tuner. Your best option is to get the Slingbox PRO HD.
This unit have an internal tuner that might help you under these specific circumstances. However, keep in mind that it all depends on the signal encryption. If the signal you get is encrypted, you might not be able to get some of the channels.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102307.32/warc/CC-MAIN-20170816144701-20170816164701-00016.warc.gz
|
CC-MAIN-2017-34
| 506
| 3
|
https://insights.sigasi.com/manual/vivado/
|
code
|
Sigasi Studio is often used in combination with the AMD/Xilinx Vivado Design Suite and offers many features to improve this workflow:
- Configure Sigasi Studio as default editor in Vivado
- Automatically generate a Sigasi Studio project from an existing Vivado project
- Automatically add the VHDL sources of Vivado libraries to your Sigasi Studio projects with a Quick Fix
- Fine-tune the version of the Vivado UNISIM.VComponents package you need
- Automatically compile your files with Vivado’s XSIM and launch a simulation with a simple click.
Configuring the Vivado installation path in Sigasi Studio is explained here.
Using Vivado’s XSIM as external compiler
Launching a simulation with XSIM
The Vivado integration in Sigasi Studio does not support multi-project setups (i.e. project references).
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948932.75/warc/CC-MAIN-20230329023546-20230329053546-00720.warc.gz
|
CC-MAIN-2023-14
| 806
| 10
|
https://www.freelancer.com/job-search/android-project-web-container/
|
code
|
The design of a device that will contain compartments and drop the items they contain to an outside container. The compartments will contain different items that might be solids, liquids, sticky or slippery materials. The purpose is to make a drop when an electrical signal is sent to the device. Keep in mind that all parts must be made with a Lathe
Need logo design for my product I will be selling on amazon. ( Meal Prep Containers). Looking for a Gorilla type of design holding a meal prep container. Masculine to buff looking with mean Gorilla face. Product Names i'd like to use are 1. ApeTuk 2. FitTuk
...company logo 6 months or so ago. I have a need for a Chai (tea) company logo, and along with 3 or 4 high resolution images (various sizes - one for my website header, one for web site background on main page and others) each with the same theme for my future website. I may use the header image as the wrap around image of the chai/tea cups or glass. These
Important: Because too many times people either dropped the project, didnt deliver working solution, or promised to deliver but took the money and disappeared without any word, we need a screenshot/video/demo of the working solution first and only then we can assign you to the project and create the milestones. We just simply had enough of people
...everywhere. Requirements: We need a packaging design to hold the jars in place securely. The design should be for ONE jar only, but either jar should fit in the cardboard container. There should be some sort of handle as well. The customer should still be able to drink from their jar from the top. I also attached an example of the cardboard jar box
...better of mine with the shipping containers tell me. Noticed that I don't have any exact numbers of meters square yet, but I will give you an approximately sizes. Each container: Length 12m> width 2,40m > Height 2,60 m. I am planning to put 4-6 containers some of them I recommended to be in top of each others and some of them the top is a roof. for
Looking for an experienced cloud developer to migrate existing working solution to autoscaling cluster: - Project has two Docker images. First is a hub, second is for workers that register and perform task. - Master uses kubernetes service account through java bindings to spin up pods with worker - It works on OpenShift (solution is documented)
I need a script in Wordpress which will scrape a number of times per day a single page (just a table with football matche...be available in my WP (the data is available in the source page). Presenting the data: The scraped pages should be able to be added via shortcode in a visual composer container for example. That's why some css will be needed.
... menu items right side. Menu items are text but last two items are icons: settings and user. User is dropdown. - Content area, need only one color, one area <div class='container-fluid'></div>, which working with menu. - Footer same looks like [url removed, login to view], links first and then text. For mobile, menu works like [url removed, login to view] does....
... I have a project coming up - quote system. Client logs in, selects products, (weight and volume), depending on how many products, there are 4 different sized containers to be filled (adding up product's weight and volume). Containers all have different price (on size). And from the clients postcode a quote to pick up the filled container is derived
Hi Thoughtfulwrites. I'm looking for someone who has knowledge of container solutions, cloud migration or hub and spoke. I need 2 blog posts written per month for a client. The audience is tech teams at large retailers, so you'd be speaking quite technically. What do you think?
I have an existing website built for a domain, which just needs some polish to be finished...just needs some polish to be finished. I have it wired up with [shippable], but would prefer [codeship] as our continuous deployment system. We're using AWS EB w/docker container(s) and some parameters such as SSL still need to be finished. A wildcard SSL
...an analytics software, and a different set of tables will be produced.] - Import these new datasets back into Qualtrics [on Qualtrics side, this will be done through a “container” survey, so it will read the new datasets as surveys and then visualizations will be created inside this platform] Summary of data flow / necessary developments: - Qualtrics
** PROJECT SUMMARY ** Our client is looking for a business website to highlight their services. Pay Total: £100 Pay Breakdown: 40% on Project Partial Sign off stage (This is when we have received the initial build from you and then sent it to our client for review) 60% on completion of the website (This is when the website is launched
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109682.23/warc/CC-MAIN-20170821232346-20170822012346-00286.warc.gz
|
CC-MAIN-2017-34
| 4,773
| 14
|
https://premium.wpmudev.org/forums/topic/cant-select-provider-location-keeps-refreshing-to-default
|
code
|
I have a page with all_appointments on it. I also am showing the Provider Locations and the Services on that same page. I thought that selecting those would filter what showing in all_appointments.
1. Is that not true? Or is there a way to filter (not sort) the list I'm looking at? So I can see all appointments for Service X or Service Y independently?
2. I can sort all the columns individually by clicking on the header, except for the "Provider" column. I can click on it, but nothing happens.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247490225.49/warc/CC-MAIN-20190219142524-20190219164524-00097.warc.gz
|
CC-MAIN-2019-09
| 498
| 3
|
https://archives.trin.cam.ac.uk/index.php/informationobject/browse?sort=relevance&sf_culture=es&levels=227&view=table&sortDir=desc&collection=155181&topLod=0
|
code
|
- Add. MS b
- 16th-20th c.
The additional manuscript series are artificial groups containing manuscripts from various sources. Most of the contents are single items or small groups, but they include some fairly large personal archives, either arranged in sequence or scattered in various places. See the overview of the collections (https://archives.trin.cam.ac.uk/index.php/overview).
Trinity College Library, Cambridge
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650201.19/warc/CC-MAIN-20230604161111-20230604191111-00204.warc.gz
|
CC-MAIN-2023-23
| 420
| 4
|
https://community.articulate.com/discussions/articulate-storyline/help-with-layers-staying-on-screen
|
code
|
Help with layers staying on screen
Oct 25, 2022
Could someone help me with something, please? I want for the user to be able to click a hotspot or button on the base layer on a table and for a layer to come up but it stay up while they click the next layers so that the entire table populates after they have clicked each hotspot.
OR--have the text inside shapes and they start out hidden and then when the user clicks the hotspot/button they turn to normal/visible. But again they all stay up, populating the table.
I've tried both ways and can't seem to make it work. Story attached.
Thanks in advance!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500288.69/warc/CC-MAIN-20230205193202-20230205223202-00862.warc.gz
|
CC-MAIN-2023-06
| 604
| 6
|
https://nextbrain.ai/video-tutorials/investment-opportunities
|
code
|
The dataset is designed to test and develop a model that can accurately predict whether a company is a good investment opportunity based on its age, industry, annual revenue, and number of employees.
The main objective is to create a machine learning model that can detect the underlying rule that governs the dataset and accurately predict the target variable.
This dataset contents the following columns:
- Company age: Age of the company in years
- Industry: Accounting, Agriculture, Automotive, Banking, Defense or Software
- Annual Revenue: Annual revenue of the company in $
- Employees: Number of employees of the company
- Invest: Success or not in previous investments
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473819.62/warc/CC-MAIN-20240222125841-20240222155841-00647.warc.gz
|
CC-MAIN-2024-10
| 677
| 8
|
https://www.spartaglobal.com/media/from-code-firstgirls-student-to-coding-coach-209694/
|
code
|
From Code First:Girls student to coding coach08/11/2019
By Jillian Guillen
Jillian Guillen is a DevOps trainee at our London Wall Academy. After learning about Sparta Global through a Code First:Girls workshop that was hosted and run by our Academy, Jillian jumped at the opportunity to give back. Joining other Sparta Global trainees, Jillian has volunteered to help coach young women in coding skills at Sparta Global’s latest Code First:Girls workshops. In this blog she discusses her journey into tech and her new role as a mentor for women…
I was constantly doubting myself, questioning where my future was heading and relying solely on my degree to help me pick a path to follow. After what seemed like an endless list of pros and cons, ifs and buts, three years of undergraduate study, a year abroad and one long jobless summer later - I found myself in awe and utter curiosity of the tech industry. Something had to be done.
It is important to note that my desire to pursue a career in the tech industry did not come out of the blue. My journey into coding began in 2018 when I applied for a Code First:Girls Level 1 HTML/CSS Web development course. I was lucky enough to be taught by passionate and dedicated instructors, who very much deserve an honorary mention - shout out to the Sparta Global trainers! I don’t know if you remember me, but thank you both for your patience and hard-work. I vividly remember your enthusiasm for coding and what to avoid when designing a website.
From this, a fire in me had been ignited and a newly found passion for coding was born – and it all happened during my final year of University. Upon achieving a 2:1 at Kingston University, BA English Literature and Journalism, I spent long sombre Summer nights narrowing my goals to really understand where I was heading and which industry I truly wanted to explore.
Fast-forward to September and when my 10-week training began at Sparta Global. Currently, I am a trainee in DevOps. I would be lying if I said it was easy, I would also be lying if I said that everything we built worked! But coming into terms with a DevOps mentality, you realise there are many ways to do something and many ways to achieve a goal - do not get vendor-locked in or fixated with a single way of doing things. With the skills I have acquired, the mindset I have learned, the methods and approaches I have adapted, the possibilities are endless.
Now volunteering to help with Code First:Girls’ Level 2 Python workshop, I can see how far I have come, and it is amazing to see how attendees have doubled from when I attended last year. I was once that student thirsty for coding knowledge, eager to learn and curious about tech and the wonders of back-end. Not having the right qualifications and technical background did not stop me. Equipped with drive and passion, I was not afraid to immerse myself in the industry.
For my future in tech, I would like to become successful in the field of DevOps - perhaps leading a team and building immutable, secure and robust infrastructures with constant integration, delivery and deployment. I whole-heartedly wish and encourage more women to engage in tech and learn how to code as it is not only a life-long skill but a skill that tests your agility and adaptability to constantly push you out of your comfort zone.
If you are willing to learn and are unafraid of making mistakes, you are already a step ahead!
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335257.60/warc/CC-MAIN-20220928145118-20220928175118-00668.warc.gz
|
CC-MAIN-2022-40
| 3,435
| 10
|
https://agiledaysistanbul.org/speakers/necmettin-ozkan/
|
code
|
IT Quality Management Expert
Earned a Computer Engineering degree from Ege University, a Master of IT Management degree from Universiti Teknologi Malaysia. First-hand professional experience in IT quality, process and performance management and Agile Software Development. Among the frameworks, closely works with ITIL, COBIT, and Scrum. In particular, consulted in a large-scale transformation of IT processes, tools and people of a Bank from waterfall to Scrum that is the biggest in the Middle East and East Europe in size and taking place in a highly regulated environment driven by COBIT. Also, passionate about contributing to the body of knowledge by sharing with public speaking, academic publications and as a reviewer for international conferences. Nowadays, deeply interested in researching on balanced and scaled agile software development and the real agility.
Adoption of Scrum is increasing. COBIT, on the other side, has domination in information technology field and is a de-facto standard providing an IT governance model with an international set of generally accepted control objectives. Considered the coverage of Scrum and COBIT (version 4.1 in this case), a coexistence of them in the same organization […]
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247494694.1/warc/CC-MAIN-20190220085318-20190220111318-00557.warc.gz
|
CC-MAIN-2019-09
| 1,231
| 3
|
https://pro.arcgis.com/en/pro-app/latest/tool-reference/cartography/calculate-grid-convergence-angle.htm
|
code
|
The input feature class (points, multipoints, lines, and polygons).
The existing field that will be populated with the true north calculation value in decimal degrees.
Specifies the method used to calculate the rotation value.
Coordinate System Field
The field containing a projection engine string for a projected coordinate system to be used for angle calculation. The angle calculation for each feature will be based on the projected coordinate system projection engine string for the specific feature. In cases of an invalid value, the tool will use the cartographic coordinate system specified in the Cartography environment settings. The default is none, or no field specified. When no field is specified, the projected coordinate system used for calculation will be taken from the Cartography environment settings.
The updated feature class with calculated rotation values.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100527.35/warc/CC-MAIN-20231204083733-20231204113733-00328.warc.gz
|
CC-MAIN-2023-50
| 880
| 6
|
https://www.tr.freelancer.com/projects/flash-graphic-design/flash-demo-for-application/
|
code
|
A flash demo for an automated testing application.
We have a windows based application that we would like to redesign
note: this is not a web project!
as a start we would like to have a demo! that demonstrates the design
and aplicabilty of the application
the demo should be Very attractive cause were gonna show it
in an exhibition for automated testing equip.
the demo should be with sound and effects as in the related file
the selection will be made by the most attractive design! (and price ofcurse)
please send us via pmb links to flash demos u made or jpg of design for application gui.
when we start the process we will send u the current application
screens a a video showing the flow inside the application.
payment will be done after recieving the demo acording to the application screens definition.
attached a smple flash of where design should go..
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823303.28/warc/CC-MAIN-20181210034333-20181210055833-00038.warc.gz
|
CC-MAIN-2018-51
| 862
| 14
|
http://support.sensibo.com/knowledge_base/topics/how-to-share-my-device-with-another-user
|
code
|
To share the device do the following:
1. Click the device you want to share
2. Click "Settings"
3. Click "Share this A/C"
4. Select the medium to share the device (whatsapp, email, messenger, etc.)
5. The recipient should install Sensibo, close the app (from the backgroud as well) and then click the shared link. The Sensibo device will be shared and will appear on their Sensibo app as well.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578742415.81/warc/CC-MAIN-20190425213812-20190425235812-00462.warc.gz
|
CC-MAIN-2019-18
| 393
| 6
|
http://cillinsg.blogspot.com/2014/08/commodities-update-10-aug-14.html
|
code
|
Lumber, Wheat and Natural Gas had traded higher this week.
Most commodities remain weak except for Metals show sign on Fri. May watch Metals.
I am monitoring the following:
- Cotton (Double bottom based on weekly chart and consolidating this week),
- Natural Gas (monitor for 2ET),
- Wheat (monitor for 2ET),
- Coffee (may pull back based on weekly chart),
- Platinum and
Instruments that show buying interest by Producer/Merchant/Processor/User
- Oats (created 1ET)
- Soybean (created 1ET)
- Rough Rice
- Orange Juice
- Feeder Cattle (HLF 2ET, weakness for time being)
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590069.15/warc/CC-MAIN-20180718060927-20180718080927-00509.warc.gz
|
CC-MAIN-2018-30
| 569
| 14
|
http://lists.openshift.redhat.com/openshift-archives/users/2016-January/msg00053.html
|
code
|
That makes sense. Didn't know about the system:admin user. However having just logged in with that user, I'm still having issues:
[root openshift-test admin]# ./oadm policy add-cluster-role-to-user cluster-admin admin
Error from server: User "system" cannot get clusterpolicybindings at the cluster scope
Also, as I am trying to follow instructions (on how to install fabric8 on OpenShift) given here, I'm also getting problems:
[root openshift-test admin]# ./oadm router --create --credentials=/var/lib/openshift/openshift.local.config/master/openshift-router.kubeconfigerror: can't check for existing router "router": User "system" cannot get services in project "default"
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401578485.67/warc/CC-MAIN-20200927183616-20200927213616-00635.warc.gz
|
CC-MAIN-2020-40
| 674
| 5
|
https://watch.mhzchoice.com/kaboul-kitchen/videos/the-ex-woman-of-my-life
|
code
|
GET 50% OFF YOUR FIRST 1 MONTH!
Limited time - use
promo code: SUMMER18 at checkout
Watch this video and more on MHz Choice
Jacky’s old flame shows up in Kabul as part of a French diplomatic delegation, and requests to book his restaurant for her boss. Directed by Frédéric Berthe, 2014.
Colonel Amanullah comes to Jacky pleading for a personal favor; he needs to hide his mistress for a few days. Directed by Jean-Patrick Benes & Allan Mauduit, 2012.
Sophie’s school project for Afghan girls is off to a rocky start when attendance turns out to be very low. Directed by Frédéric Berthe, 2012.
Exposed by the French secret service, Jacky is now forced to work as a double-agent against Amanullah and the CIA. Directed by Frédéric Berthe, 2014.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589634.23/warc/CC-MAIN-20180717090227-20180717110227-00172.warc.gz
|
CC-MAIN-2018-30
| 753
| 8
|
https://forum.wiznet.io/t/topic/9941
|
code
|
I have a monitoring system that automatically sends a SMS when an event occurs. I can also query the system remotely by sending a SMS with a keyword and the system sends a SMS containing a report.
The system is composed of a STM32 arduino-like board with a W5200 ethernet interface board, which is connected to a port of a Teltonika RUT500 3G router. My board sends TCP frames containing commands to manage the SMS traffic, and this works apparently well, though there are sometimes unexpected delays.
I then changed the router for the newer and more powerful model RUT900, that is claimed to have exactly the same command interface. But now no SMS are sent anymore.
If I analyze the ethernet traffic, I find the frames that contain the command that is perfectly correct; as a proof, if I copy the payload of the frame and I paste it to the data field of the windows tool Packet Sender, and I send the frame to the router, this time the router DOES send the SMS!
However if I look more closely, the next frames captured after the command are not the same according to the SMS is sent or not.
If the command works normally, the router responds with a frame containing “ok”, or some other information, according to the type of command. Otherwise, no frame is sent back.
Actually this occurs on any type of command to the router,with various effects.
Here is an example, with the command that queries the number of received SMS. I captured using Wireshark two occurrences of the command “sms_total”, the first time successfully and a response comes, the second time is a failure : (the identifiers have been changed to “xxxx” for privacy)
|85||4.586611||192.168.17.80||192.168.17.1||HTTP||127||GET //cgi-bin/sms_total?username=yyyyyyy&password=xxxxxxxxxx HTTP/1.1|
|86||4.586611||192.168.17.1||192.168.17.80||TCP||60||80 → 1121 [ACK] Seq=1 Ack=74 Win=29200 Len=0|
|87||4.627634||192.168.17.1||192.168.17.80||TCP||123||80 → 1121 [PSH, ACK] Seq=1 Ack=74 Win=29200 Len=69 [TCP segment of a reassembled PDU]|
|88||4.829373||192.168.17.80||192.168.17.1||TCP||60||1121 → 80 [PSH, ACK] Seq=74 Ack=70 Win=1979 Len=0|
|89||4.829544||192.168.17.1||192.168.17.80||HTTP||165||HTTP/1.1 200 OK (text/plain)|
|90||5.031344||192.168.17.80||192.168.17.1||TCP||60||1121 → 80 [PSH, ACK] Seq=74 Ack=181 Win=1868 Len=0|
|93||5.186552||192.168.17.80||192.168.17.1||TCP||60||1121 → 80 [FIN, ACK] Seq=74 Ack=181 Win=2048 Len=0|
|94||5.186552||192.168.17.1||192.168.17.80||TCP||60||80 → 1121 [FIN, ACK] Seq=181 Ack=75 Win=29200 Len=0|
|95||5.186552||192.168.17.80||192.168.17.1||TCP||60||1121 → 80 [ACK] Seq=75 Ack=182 Win=2048 Len=0|
|100||5.694432||192.168.17.80||192.168.17.1||TCP||60||1122 → 80 [SYN] Seq=0 Win=2048 Len=0 MSS=1460|
|101||5.694432||192.168.17.1||192.168.17.80||TCP||60||80 → 1122 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460|
|102||5.694432||192.168.17.80||192.168.17.1||TCP||60||1122 → 80 [ACK] Seq=1 Ack=1 Win=2048 Len=0|
|103||5.697597||192.168.17.80||192.168.17.1||HTTP||127||GET //cgi-bin/sms_total?username=yyyyyyy&password=xxxxxxxxxx HTTP/1.1|
|104||5.697597||192.168.17.1||192.168.17.80||TCP||60||80 → 1122 [ACK] Seq=1 Ack=74 Win=29200 Len=0|
|105||6.021582||192.168.17.80||192.168.17.1||TCP||60||1122 → 80 [FIN, ACK] Seq=74 Ack=1 Win=2048 Len=0|
|106||6.022114||192.168.17.1||192.168.17.80||TCP||60||80 → 1122 [FIN, ACK] Seq=1 Ack=75 Win=29200 Len=0|
|107||6.022114||192.168.17.80||192.168.17.1||TCP||60||1122 → 80 [ACK] Seq=75 Ack=2 Win=2048 Len=0|
Clearly there is something wrong in the ethernet communication. Wireshark does not say anything about it. What can it be? How can it affect the operation of the router? How can I fix it?
Thanks in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104512702.80/warc/CC-MAIN-20220705022909-20220705052909-00485.warc.gz
|
CC-MAIN-2022-27
| 3,699
| 27
|
http://lizdelves.com/blog/page/2/
|
code
|
What is the Pomodoro Technique?
If you’re the type of person who prefers to what a video, here’s a quick introduction.
If you don’t like watching videos, let me explain. The Pomodoro Technique uses a wind-up timer to manage time and tasks. The name ‘Pomodoro’ is Spanish for tomato. I’m not sure how common wind-up tomato times are in the UK, but I think it’s more common for us to use egg timers. Perhaps it’s named after tomato timers because egg in Spanish (huevo) is not as obvious to pronounce.
The techniqued was devise by Francesco Cirillo in the late 80s and there’s even a book about it (and an illustrated version too).
The crux of the technique is this. You set the egg timer to 25 minutes, focus on a single task, and avoid distractions and interruptions like phone calls, emails and social media. Once the 25 minutes is finished, you have a five minute break. When you’ve completed four ‘Pomodoros’ (sets of 25 minutes + 5 minute break), you have a 15-20 minute break.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100568.68/warc/CC-MAIN-20231205204654-20231205234654-00843.warc.gz
|
CC-MAIN-2023-50
| 1,005
| 5
|
https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/WebExtensions/API/browserSettings/closeTabsByDoubleClick
|
code
|
BrowserSetting object that can be used to enable or disable the user's ability to close a tab using double-click.
The underlying value is a boolean.
By default, closeTabsByDoubleClick is false. The setting can be changed by the user in about:config.
BCD tables only load in the browser
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817289.27/warc/CC-MAIN-20240419043820-20240419073820-00154.warc.gz
|
CC-MAIN-2024-18
| 285
| 4
|
https://nfc-forum.org/faq/
|
code
|
NFC Forum specifications include several security-related features:
The Signature Record Type Definition (RTD) 2.0 technical specification enables the digital signing of NDEF messages stored on NFC tags. In Peer-to-Peer mode this specification allows the signing of transmitted messages between two NFC devices. This enables the receiving device to verify the integrity (and optionally, the author) of the message to bear digital signatures. By adding a signature to NFC tags, developers can build a tag authenticity checking process into their applications. Signatures can be used to protect any NDEF message in the NFC ecosystem and are not limited to tags.
In Peer-to-Peer mode, the Logical Link Control Protocol (LLCP) 1.3 technical specification uses industry-standard advanced cryptography for encryption and message authentication, to ensure the confidentiality of messages exchanged between peer devices. It includes a secure channel that is negotiated uniquely for each new peer-to-peer session to prevent passive eavesdropping without the need for the NFC applications to manage the necessary keys for the secure channel.
The NCI 2.0 Technical Specification offers a flexible concept to integrate different types of secure elements into a NFC device. In principle, a secure element can be either directly connected to the NFC Controller allowing secure and prompt-performing NFC applications, or it can be connected to the main processor of the device (Device Host) providing security services to NFC applications (e.g., Host Card Emulation applications).
NCI even supports secure elements directly connected to both the NFC Controller and the main processor to address the needs of different types of NFC applications (this solution is used, for example, by NFC SIM cards).
NCI supports different interfaces on the secure element. In addition to the SWP/HCI connection used by NFC SIM cards and many other secure elements, secure elements with other connections are supported (e.g., the ISO/IEC 7816 APDU Smartcard interface).
The powerful routing mechanism of NCI 2.0 allows it to forward received RF commands to the right entity hosting the NFC applications. This mechanism permits secure NFC applications hosted on different secure elements to coexist with HCE applications inside the same NFC device. This mechanism supports NFC applications installed on secure elements that announce their configurations and capabilities according to the GlobalPlatform Amendment C Specification.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662530066.45/warc/CC-MAIN-20220519204127-20220519234127-00387.warc.gz
|
CC-MAIN-2022-21
| 2,496
| 7
|
https://github.com/360Controller/360Controller/wiki
|
code
|
Clone this wiki locally
Welcome to the 360Controller wiki! Here you will find additional information of the Xbox 360Controller driver.
This driver supports the Microsoft Xbox 360 controller, including access to rumble motors and LEDs, on the Mac OS X platform. It includes a plugin for the Apple Force Feedback Framework so some games will be able to activate them, along with a Preference Pane with which allows you to test everything is installed correctly. Both wired 360 controllers connected via USB, and wireless 360 controllers connected via the Wireless Gaming Receiver for Windows, are supported.
This project is a fork of the Xbox360Controller project originally created by Colin Munro.
See the releases page for the latest compiled and signed version of the driver. Most users will want to install and run this.
If you are interested in installing as a developer please see below.
The driver exposes a standard game pad with a number of standard controls, so any game that supports gaming devices should work. In some cases this may need an update from the manufacturer of the game or a patched version. The Preference Pane uses the standard Mac OS X Frameworks for accessing HID devices and accessing Force Feedback capabilities, so should be a good test that the installation is functional.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280086.25/warc/CC-MAIN-20170116095120-00521-ip-10-171-10-70.ec2.internal.warc.gz
|
CC-MAIN-2017-04
| 1,303
| 7
|
http://xml.sys-con.com/node/2493920
|
code
|
|By Maureen O'Gara||
|December 26, 2012 12:00 PM EST||
ARM has just given Intel another reason to chew its lip.
The British mobile chip designer has launched a promised joint venture in mobile security called Trustonic that's gotten the backing of companies like MasterCard, Sprint, Cisco, Samsung, Nvidia and 20th Century Fox Home Entertainment.
ARM owns 40% of the new company and its two partners, Gemalto, a security ISV in Amsterdam, and Giesecke & Devrient, a payments house in Munich, each have 30%.
Former ARM VP Ben Cade has been named Trustonic's CEO. The venture will be headquartered in Cambridge, England, where ARM lives and will have offices around the world.
It's assumed the venture will ultimately go public since it will take tens of million of dollars to create the standard for banks, online retailers, service providers and enterprises in general that Trustonic is shooting for.
The widgetry, based on ARM's eight-year-old TrustZone technology, is intended to be used for digital rights management (DRM) and mobile payments.
Described as an electronic version of a safety deposit box in a bank vault it's supposed to guarantee that information stored on mobile devices is free of spyware and virus infections.
Service providers could, say, let end users watch content on multiple devices without increasing the chance of piracy. And it's said to cut the time it takes to make an e-commerce transaction on a smartphone from two-and-a-half minutes to seven seconds.
Trustonic envisions network operators incorporating revenue-generating value-added services and device makers using a secure platform to protect sensitive assets such as passcodes, fingerprints and certificates.
The joint venture will focus on developing a GlobalPlatform-compliant Trusted Execution Environment (TEE) that will offer a common security standard for connected devices. The TEE will be integrated into the TrustZone security technology embedded in ARM's system-on-a-chip (SoC) and licensed to chip makers.
The widgetry involves hardware isolation as well as software and cryptographic isolation.
Separated by hardware from the main operating system, Trustonic says a TEE ensures the secure storage and processing of sensitive data and trusted applications. It protects the integrity and confidentiality of key resources, such as the user interface and service provider assets. A TEE manages and executes trusted applications built in by device makers as well as trusted applications installed as people demand them. Trusted applications running in a TEE have access to the full power of a device's main processor and memory, while hardware isolation protects these from user installed apps running in the main operating system. Software and cryptographic isolation inside the TEE protect the trusted applications from each other.
Device and chip makers can use TEEs to build platforms that have trust built in from the start, while service and content providers can rely on the dingus' integral trust to start launching innovative services and new business opportunities.
For its part Intel has McAfee, whose DeepSAFE hardware-based security product also sits below the operating system, and partnerships with both Visa and MasterCard.
Join us at Cloud Expo | @ThingsExpo 2016 – June 7-9 at the Javits Center in New York City and November 1-3 at the Santa Clara Convention Center in Santa Clara, CA – and deliver your unique message in a way that is striking and unforgettable by taking advantage of SYS-CON's unmatched high-impact, result-driven event / media packages.
May. 26, 2016 12:00 PM EDT Reads: 2,178
SYS-CON Events announced today that BMC Software has been named "Siver Sponsor" of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2015 at the Javits Center in New York, New York. BMC is a global leader in innovative software solutions that help businesses transform into digital enterprises for the ultimate competitive advantage. BMC Digital Enterprise Management is a set of innovative IT solutions designed to make digital business fast, seamless, and optimized from mainframe to mo...
May. 26, 2016 12:00 PM EDT Reads: 1,963
SYS-CON Events announced today that Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, will exhibit at the 18th International CloudExpo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, New York, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
May. 26, 2016 11:45 AM EDT Reads: 2,167
18th Cloud Expo, taking place June 7-9, 2016, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterprises are using some...
May. 26, 2016 11:45 AM EDT Reads: 2,987
SYS-CON Events announced today that ContentMX, the marketing technology and services company with a singular mission to increase engagement and drive more conversations for enterprise, channel and SMB technology marketers, has been named “Sponsor & Exhibitor Lounge Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York City, New York. “CloudExpo is a great opportunity to start a conversation with new prospects, but what happens after the...
May. 26, 2016 11:30 AM EDT Reads: 952
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, will provide an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life ...
May. 26, 2016 11:30 AM EDT Reads: 1,832
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York and Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty ...
May. 26, 2016 11:15 AM EDT Reads: 2,457
What a difference a year makes. Organizations aren’t just talking about IoT possibilities, it is now baked into their core business strategy. With IoT, billions of devices generating data from different companies on different networks around the globe need to interact. From efficiency to better customer insights to completely new business models, IoT will turn traditional business models upside down. In the new customer-centric age, the key to success is delivering critical services and apps wit...
May. 26, 2016 11:00 AM EDT Reads: 1,044
Designing IoT applications is complex, but deploying them in a scalable fashion is even more complex. A scalable, API first IaaS cloud is a good start, but in order to understand the various components specific to deploying IoT applications, one needs to understand the architecture of these applications and figure out how to scale these components independently. In his session at @ThingsExpo, Nara Rajagopalan is CEO of Accelerite, will discuss the fundamental architecture of IoT applications, ...
May. 26, 2016 10:45 AM EDT Reads: 1,061
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discuss how businesses can gain an edge over competitors by empowering consumers to take control through IoT. We'll cite examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He'll also highlight how IoT can revitalize and restore outdated business models, making them profitable...
May. 26, 2016 10:45 AM EDT Reads: 2,674
SoftLayer operates a global cloud infrastructure platform built for Internet scale. With a global footprint of data centers and network points of presence, SoftLayer provides infrastructure as a service to leading-edge customers ranging from Web startups to global enterprises. SoftLayer's modular architecture, full-featured API, and sophisticated automation provide unparalleled performance and control. Its flexible unified platform seamlessly spans physical and virtual devices linked via a world...
May. 26, 2016 10:15 AM EDT Reads: 1,941
In his session at 18th Cloud Expo, Bruce Swann, Senior Product Marketing Manager at Adobe, will discuss how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized, relevant and real-time customer engagement across offline (direct mail, point of sale, call center) and digital (email, website, SMS, mobile apps, social networks, connected objects). Bruce Swann has more than 15 years of experience working with digital marketing disciplines like web analytics, social med...
May. 26, 2016 10:00 AM EDT Reads: 1,230
SYS-CON Events announced today that EastBanc Technologies will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. EastBanc Technologies has been working at the frontier of technology since 1999. Today, the firm provides full-lifecycle software development delivering flexible technology solutions that seamlessly integrate with existing systems – whether on premise or cloud. EastBanc Technologies partners with p...
May. 26, 2016 10:00 AM EDT Reads: 2,022
SYS-CON Events announced today that 24Notion has been named “Bronze Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. 24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to con...
May. 26, 2016 10:00 AM EDT Reads: 1,758
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management...
May. 26, 2016 08:45 AM EDT Reads: 2,928
Companies can harness IoT and predictive analytics to sustain business continuity; predict and manage site performance during emergencies; minimize expensive reactive maintenance; and forecast equipment and maintenance budgets and expenditures. Providing cost-effective, uninterrupted service is challenging, particularly for organizations with geographically dispersed operations.
May. 26, 2016 08:45 AM EDT Reads: 1,728
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
May. 26, 2016 07:45 AM EDT Reads: 1,844
SYS-CON Events announced today Object Management Group® has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
May. 26, 2016 06:15 AM EDT Reads: 2,303
SYS-CON Events announced today that Alert Logic, Inc., the leading provider of Security-as-a-Service solutions for the cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Alert Logic, Inc., provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Ful...
May. 26, 2016 05:45 AM EDT Reads: 2,663
SYS-CON Events announced today that MobiDev will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. MobiDev is a software company that develops and delivers turn-key mobile apps, websites, web services, and complex software systems for startups and enterprises. Since 2009 it has grown from a small group of passionate engineers and business managers to a full-scale mobile software company with over 200 develope...
May. 26, 2016 05:15 AM EDT Reads: 2,455
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049276131.38/warc/CC-MAIN-20160524002116-00184-ip-10-185-217-139.ec2.internal.warc.gz
|
CC-MAIN-2016-22
| 13,617
| 56
|
https://www.indiedb.com/games/duck-n-dodge/images/the-selector-update1
|
code
|
Duck n' Dodge! is a papercraft platformer inspired by arcade classics like Frogger. Race through trap-filled areas dodging crocodiles at day and night, coupled with colorful visuals and a unique sense of humor. Duck n' Dodge offers welcoming yet challenging gameplay to satisfy casual players arcade veterans of the genre. We make constant updates, so make sure to check back in. If you are a YouTuber or Twitch streamer, you are free to upload and monetize gameplay of Duck n' Dodge, if you wish. We do not issue claims or strikes due to users monetizing videos. Duck n' Dodge was previously known as Just Duck It.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107893402.83/warc/CC-MAIN-20201027052750-20201027082750-00138.warc.gz
|
CC-MAIN-2020-45
| 615
| 1
|
https://docs.helloid.com/hc/en-us/articles/360010147600-Use-a-data-source-in-a-form
|
code
|
After you've created a data source, you must connect it to a form element. Many form elements support data source connections, such as drop downs, check boxes, grids, and more.
Connect a data source to a form element
- Go to Self Service > Forms. Select the Add Form button to create a new form, or select the Edit link for an existing form.
- On the form, add or edit the element to which you want to connect your data source. For this example, we'll add a Drop down element.
- If the form component supports data source connections, you will see a toggle for Use Data Source, as shown below.
- Turn on the Use Data Source toggle. In the Select Data Source drop down, select your desired data source. In this example, we will use the native HelloID Groups data source.
- The Value Field drop down represents the actual data value which will be submitted, whereas the Text Field drop down represents the label that will be shown to the end user. Make appropriate selections for both fields. For this example, we will select immutableId and name, respectively.
- Select the Update Field button when you are finished.
- Select the form's Save button.
- The example form now contains a drop down menu, populated with a list of groups in the HelloID environment:
Note that when the form is submitted as part of a self service request, you can access the data source object just like other form fields. See the Self Service Request Variable Reference for more information.
Pass input variables into a task or PowerShell data source
When you connect a task or PowerShell data source to a form element, you are given the option to pass arguments into its input variable(s). You can manually specify a value, or use a value from another element on the form by turning on the Use Value From Other Field toggle.
In the example below, we are using the latter option. The value of a text input element (Username Search) is being passed into the Username input key of a grid component's data source. In this case, the data source has been previously configured to take Username as an input variable. Its PowerShell script takes the value passed from the Username Search field and uses it to return a list of matching Active Directory users.
When the user enters a value in the Username Search field and submits the form, the results are displayed in the grid element itself:
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178363782.40/warc/CC-MAIN-20210302065019-20210302095019-00305.warc.gz
|
CC-MAIN-2021-10
| 2,361
| 15
|
https://voiceofthedba.com/2018/07/13/the-mvp-award-looks-backward/
|
code
|
I was awarded the Microsoft Data Platform MVP designation in July 2018. I’ve been honored to receive this designation since 2008, though the award doesn’t drive my work. I started writing articles to help others get better with their work, just as I got help from others before me. That was the goal of SQLServerCentral, and I’m proud whenever I hear that I’ve been able to help someone solve a problem, learn a new skill, or improve their career in some way.
Microsoft has an MVP site, and they describe the people they recognize in this way: “Microsoft Most Valuable Professionals, or MVPs, are technology experts who passionately share their knowledge with the community.” The award is for those that make efforts to help others “ranging from speaking engagements, to social media posts, to writing books, to helping others in online communities …” In other words, for those that help others, Microsoft chooses to designate some of them as MVPs for their efforts.
Their past efforts.
That’s the key. If you are awarded the MVP designation, then you’ve spent quite a bit of time during the previous year helping others and sharing knowledge. You could stop all your writing, speaking, etc., and you’d still be an MVP for the next year. You might not be renewed after that, but you could use the logo, attend the MVP Summit, and more during this year.
There are budget constraints to the MVP program, just like other corporate initiatives. As a result, not every speaker, blogger, open source MS stack developer, etc. gets awarded. People get nominated, or if they’re already MVPs, they’re automatically considered for the next award period. This leads to an evaluation process where every nominee for some period is ranked in some order. I have no idea what method is used, but it’s a combination of speaking, blogging, organizing events, writing free/open source software, and likely more. There is a budget that says only xx people will be awarded, and the top xx people get picked. I really have no idea how this works, but since I’ve been a recipient of the award, this is what I’ve observed.
Most people appreciate the award and continue to contribute to the community. Some really want to earn the award and make special efforts to ensure they make plenty of contributions. If you want to get recognized, it takes a lot of work. This is a competitive environment, with many people regularly making contributions to the community. You have to make enough to rank above the cutoff, regardless of accomplishments in prior years.
I’m always appreciative of the award, but as I mentioned, it doesn’t drive me. I have a set of things that I do for work, and a set that I volunteer for as a part of the community. If that earns me a high enough ranking, that’s great. If it doesn’t, I’m fine with that. Ultimately my goal is to help others, and I’ll continue to do that, regardless of recognition.
The Voice of the DBA Podcast
Listen to the MP3 Audio ( 4.1MB) podcast or subscribe to the feed at iTunes and Libsyn.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948871.42/warc/CC-MAIN-20230328201715-20230328231715-00515.warc.gz
|
CC-MAIN-2023-14
| 3,061
| 9
|
https://docs.apexdesigner.io/vacationRequestProcessInstancePage
|
code
|
This video shows the process instance page functionality and design. Here is the transcript:
Next we're going to cover the Process Instance page. Here is the Process Definition page that we looked at in the last clip. Down at the bottom, there's a list of process instances where they can click on those and it looks very similar in layout. We have the properties on the top left. We have the BPMN diagram on the top right with the refresh button. And in this case, in place of the process instances we have a list of tasks on that process instance.
So let's take a look at the design. So this one will be very similar to the last one. It's indented under there. We've got process instances. Now in this case we include the fields that we want to show.
We include the processDefinition which is the parent of this element, as well as including the tasks and sorting those by start time descending. In addition to the refresh button, we have suspend and resume buttons. Now you notice that we didn't see those up here. That is because this particular instance is completed. So you can see another little trick we use right here.
We've put an if on this to say we'll only show the suspend button when the process instance state is active. When they click it, we're going to trigger the suspend method which is over here. So if we take a look at that, it's a very simple method. It's an async method that means that you can use await here. And so it's simply doing await this.camundaProcessInstance.suspend. All of the rest API calls and the other stuff that needs to be done is handled automatically for you by the Camunda library. After it's suspended, then we read it back to make sure that we have all of the appropriate data from that.
The resume button is very similar. Fields, process instance diagram and the task table are just like process instance. So I won't spend time on those. But if we go back here and look at an active process instance, you can see now we've got a pause button or a suspend button with the pause icon and we can suspend that and it will re-read. Now the state is suspended and we can resume that one. And now the state is active.
That is the design and operation of the Process Instance page.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817128.7/warc/CC-MAIN-20240417013540-20240417043540-00268.warc.gz
|
CC-MAIN-2024-18
| 2,224
| 7
|
https://appsource.microsoft.com/en-gb/product/office/WA200005110
|
code
|
Launchpad by Accelerator 365
by Reply Ltd
Display a custom set of links to page visitors to help navigate them to tools and apps they need.
The Launchpad web part enables users to conveniently access all of their everyday links, tools, and resources from a single location - your company's intranet.
Content owners can curate a comprehensive selection of links for site visitors with the help of the Launchpad Directory app. This directory serves as a centralized hub for managing all of your organization's links.
Launchpad offers you the following features:
- Personalized - Take control of the links in your Launchpad by adding from the directory or repositioning/removing default ones. And if you can't find the link you're looking for, you can even add your own personal link.
- Searchable - Utilize the integrated search bar to navigate your organization's entire link directory. Alternatively, use categories feature to filter for specific groups of links.
- Easy management - The directory streamlines your organization's link management by acting as the central location for adding and editing global links.
- Targeted links - Leverage the audience targeting feature to target individual links and create a tailored intranet experience.
- Viva Connections ready - Like all Accelerator apps, Launchpad is compatible with Viva Connections. Part of Microsoft’s Viva Employee Experience platform, Viva Connections brings your intranet home page and content into Teams.
- Responsive - Launchpad is optimally designed for any and all devices, whether your users are accessing SharePoint on desktop browsers or mobile devices.
*Claim a free trial with full functionality for 60 days. After 60 days, the Launchpad trial will expire with instructions for purchasing a licensed version.
Learn how to download your free trial of Launchpad.
*Launchpad requires Microsoft Graph API permissions to be approved in the SharePoint Admin Centre.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817576.41/warc/CC-MAIN-20240420091126-20240420121126-00776.warc.gz
|
CC-MAIN-2024-18
| 1,938
| 15
|
https://crossminds.ai/video/stereogan-bridging-synthetic-to-real-domain-gap-by-joint-optimization-of-domain-translation-and-5f6e53741dc9eff099d896a1/
|
code
|
Authors: Rui Liu, Chengxi Yang, Wenxiu Sun, Xiaogang Wang, Hongsheng Li Description: Large-scale synthetic datasets are beneficial to stereo matching but usually introduce known domain bias. Although unsupervised image-to-image translation networks represented by CycleGAN show great potential in dealing with domain gap, it is non-trivial to generalize this method to stereo matching due to the problem of pixel distortion and stereo mismatch after translation. In this paper, we propose an end-to-end training framework with domain translation and stereo matching networks to tackle this challenge. First, joint optimization between domain translation and stereo matching networks in our end-to-end framework makes the former facilitate the latter one to the maximum extent. Second, this framework introduces two novel losses, i.e., bidirectional multi-scale feature re-projection loss and correlation consistency loss, to help translate all synthetic stereo images into realistic ones as well as maintain epipolar constraints. The effective combination of above two contributions leads to impressive stereo-consistent translation and disparity estimation accuracy. In addition, a mode seeking regularization term is added to endow the synthetic-to-real translation results with higher fine-grained diversity. Extensive experiments demonstrate the effectiveness of the proposed framework on bridging the synthetic-to-real domain gap on stereo matching.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945287.43/warc/CC-MAIN-20230324144746-20230324174746-00400.warc.gz
|
CC-MAIN-2023-14
| 1,454
| 1
|
https://www.r4photobiology.info/tag/photobiology/page/4/
|
code
|
Package documentation web site at: https://docs.r4photobiology.info/photobiology/
This new update comes on the steps of the two previous ones (0.10.0, 0.10.1) and fixes a few bugs found since.
Changes from version 0.10.1 the most recent CRAN release, are:
color_of()was failing in some cases when it should not.
[ ]were in certain cases dropping attributes, in most but not all cases only
- White LED example spectra may have had attributes inconsistently set.
- Additional test cases were added (a suite of 4165 automatic test cases is used before release).
NOTE: The updated package is on its way to CRAN.
Please raise issues concerning bugs or enhancements to this package through Bitbucket https://bitbucket.org/aphalo/photobiology/issues
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363215.8/warc/CC-MAIN-20211205160950-20211205190950-00307.warc.gz
|
CC-MAIN-2021-49
| 742
| 9
|
https://tutorialmeta.com/question/score-api-update-request-returns-http-403-error-200-user-cannot-access-thi
|
code
|
Score API - Update Request Returns HTTP 403 Error, (#200) User Cannot Access This Application
I'm developing a game on Facebook and having a problem to update the scores of the players.
The application receives HTTP ERROR 403 from Facebook as a response to the update score Graph API call. When I replay the same HTTP post request from other machines it passes without any error.
- Players are requested for publish_actions during registration
- The application is registered as a game
- The admins of the application don't get the error from FB
- The servers which run the applications are behind a load balance
This can't be networking issue since some update requests pass, this can't also be permission issue since the request is passed when executed from other machines.
Does anyone have an idea how to solve the problem or give me a direction to keep on investigating?
HTTP session as recorded by fiddler( XXX is replacing the application access token):
Problem solved. We had country restrictions defined in the Facebook application back office. Since our server is not located in one of the allowed countries the requests sent from that server where rejected by Facebook.
Once we removed the country restrictions everything started to work.
- → How to Fire Resize event after all images resize
- → URL routing requires /Home/Page?page=1 instead of /Home/Page/1
- → Getting right encoding from HTTPContext
- → How to create a site map using DNN and C#
- → I want integrate shopify into my mvc 4 c# application
- → Bootstrap Nav Collapse via Data Attributes Not Working
- → Shopify api updating variants returned error
- → ASP.NET C# SEO for each product on detail page on my ECOMMERCE site
- → SEO Meta Tags From Behind Code - C#
- → How to implement search with two terms for a collection?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710933.89/warc/CC-MAIN-20221203143925-20221203173925-00577.warc.gz
|
CC-MAIN-2022-49
| 1,817
| 22
|
https://www.landgate.wa.gov.au/location-data-and-services/programs-and-initiatives/
|
code
|
Promoting location data use to empower WA
At Landgate we’re both hosts and custodians of large collections of location information. We capture, maintain, manage and deliver the datasets to ensure they’re accessible for WA. We promote a range of programs and initiatives designed to enable all Western Australians to discover and access location data in innovative ways that benefit their businesses and their lives.
Explore these programs, initiatives, and services now.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510085.26/warc/CC-MAIN-20230925183615-20230925213615-00508.warc.gz
|
CC-MAIN-2023-40
| 474
| 3
|
http://sap.sys-con.com/node/2447023
|
code
|
|By Marketwired .||
|November 14, 2012 04:01 PM EST||
SUNNYVALE, CA -- (Marketwire) -- 11/14/12 -- AMD (NYSE: AMD) has collaborated with the University of Frankfurt's Institute for Advanced Studies (FIAS) to deliver a new standard in power-efficient supercomputing with the SANAM supercomputer, securing the number two ranking on the latest Green500 List. The supercomputer will aid FIAS in quantum chromodynamics research.
Powered by 420 AMD FirePro S10000 dual-GPU server graphics cards based on AMD Graphics Core Next Architecture, the SANAM supercomputer redefines supercomputing with its incredible power efficiency. Capable of sustaining 420 TFLOPS, providing a system energy efficiency of over 2.3 GFLOPS per watt and performing 2,351 million calculations per second per watt, the SANAM supercomputer is shifting the industry mindset of determining performance through FLOPS to focusing on eco-conscious measurements like performance-per-watt. This latest AMD technology milestone comes two days after the announcement that AMD Opteron processors power the world's highest-performance supercomputer, "Titan," as ranked on the Top500's Supercomputer Sites list. In addition to the number two ranking on the Green500 List, the SANAM supercomputer can also claim the performance crown as the most powerful and energy-efficient supercomputer powered primarily by graphics processors.
AMD also introduced new reliability features that allowed the SANAM supercomputer to perform 3.6 quintillion double-precision operations during its Green500 run, further demonstrating how leading-edge supercomputing can be achieved through green technology. Moreover, AMD is solidifying its commitment to the future of the high performance computing (HPC) industry by announcing four emerging software tools that enable developers to use familiar programming methods to leverage AMD discrete graphics processing unit (GPU) and accelerated processing unit (APU) technologies.
"There is a massive shift in the HPC industry from defining supercomputing performance in terms of FLOPS to performance-per-watt and developing environmentally responsible technologies," said John Gustafson, senior fellow and chief product architect, Graphics Business Unit, AMD. "The SANAM supercomputer, equipped with AMD FirePro S10000 GPUs based on our Graphics Core Next Architecture, consumes a mere 180 kilowatts of power while running, which is incredibly low for a supercomputer. With solutions like the FirePro S10000 along with innovative software from AMD and technology partners like AccelerEyes, CAPS Entreprise and PGI we enable institutions engaged in cutting-edge research, like the University's work in quantum chromodynamics, to achieve massive compute performance and processor density, while staying within their power budget."
SANAM is a joint project of Frankfurt Institute for Advanced Studies and King Abdulaziz City for Science and Technology (KACST) in Riyadh, Saudi Arabia. As an integral part of the high-speed cluster (HSC) project, Adtech Global provided technical research to identify a systems solution that would not only work for the high-speed cluster HSC application, but could also provide long-term development and modifications opportunities.
"We focused on utilizing technologies which would provide the ability to continuously improve performance, lower costs and reduce power consumption in the future," said Rick Rozalsky, vice president of Global Business Development at Adtech Global. "We knew at the outset that the SANAM supercomputer we worked on with University of Frankfurt and AMD was going to be special, but knowing is one thing and seeing is another. We have worked on many high-end, custom solutions; however, it is always exciting to flip the switch and witness the incredible performance of today's supercomputers. The performance-per-watt capability of this system is simply amazing."
AMD continues to leverage the massive parallel processing capabilities of its GPUs to power the next breakthrough in scientific research. By enabling HPC developers to take advantage of GPU compute with familiar developer tools and programming methodologies that integrate OpenCL on the backend, AMD is working to grow and strengthen the software ecosystem for a broader base of developers to take advantage of GPU computing.
Four Maturing Tools for HPC Developers
- Accelereyes ArrayFire: Accelereyes is dedicated to delivering fast, simple GPU software. The general availability release of ArrayFire, a GPU software acceleration library that provides hundreds of functions already optimized for speed by top GPU computing experts, allows for easy integration into C, C++, Fortran and Python applications;
- Portland Group (PGI) Accelerator compilers: PGI Accelerator Fortran, C and C++ compilers target the AMD line of APUs as well as the AMD line of discrete GPU accelerators. PGI continues to work closely with AMD to extend its PGI Accelerator directive-based compilers. The goal is to generate code directly for AMD GPU accelerators, and to generate heterogeneous x64+GPU executable files that automatically use both the CPU and GPU compute capabilities of AMD APUs;
- CAPS Entreprise HMPP compiler: CAPS Entreprise is a leading provider of solutions for deploying applications on "many-core" systems. CAPS source-to-source HMPP compiler is based on C, C++, and Fortran directives and supports OpenACC® and OpenHMPP standards. With help from AMD, the compiler incorporates a powerful OpenCL parallel data generator;
- AMD CodeXL: AMD CodeXL is a comprehensive tool suite that enables developers to harness the benefits of AMD CPUs, GPUs and APUs. It includes powerful GPU debugging, comprehensive GPU and CPU profiling, and static OpenCL kernel analysis capabilities, enhancing accessibility for software developers to enter the era of heterogeneous computing. AMD CodeXL is available as both a Visual Studio® extension and as a standalone user interface application for Windows® and Linux®.
- Read more about AMD's presence at SC12
- Learn more about AMD Professional Graphics
- Learn more about GCN Architecture
- Follow AMD professional graphics news on Twitter at @AMDFirePro
- Become a fan of AMD technology on Facebook
AMD (NYSE: AMD) is a semiconductor design innovator leading the next era of vivid digital experiences with its groundbreaking AMD Accelerated Processing Units (APUs) that power a wide range of computing devices. AMD's server computing products focus on driving industry-leading cloud computing and virtualization environments. AMD's superior graphics technologies are found in a variety of solutions ranging from game consoles, PCs to supercomputers. For more information, visit http://www.amd.com.
Advanced Micro Devices, Inc. AMD, the AMD Arrow logo, AMD FirePro, AMD Opteron, and combinations thereof are trademarks of Advanced Micro Devices, Inc. Other names are for informational purposes only and may be trademarks of their respective owners.
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni...
Jul. 28, 2016 03:15 AM EDT Reads: 2,634
Large scale deployments present unique planning challenges, system commissioning hurdles between IT and OT and demand careful system hand-off orchestration. In his session at @ThingsExpo, Jeff Smith, Senior Director and a founding member of Incenergy, will discuss some of the key tactics to ensure delivery success based on his experience of the last two years deploying Industrial IoT systems across four continents.
Jul. 28, 2016 03:00 AM EDT Reads: 1,615
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and shared the must-have mindsets for removing complexity from the develo...
Jul. 28, 2016 02:30 AM EDT Reads: 1,538
SYS-CON Events announced today that MangoApps will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MangoApps provides modern company intranets and team collaboration software, allowing workers to stay connected and productive from anywhere in the world and from any device.
Jul. 28, 2016 02:15 AM EDT Reads: 1,399
IoT is rapidly changing the way enterprises are using data to improve business decision-making. In order to derive business value, organizations must unlock insights from the data gathered and then act on these. In their session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, and Peter Shashkin, Head of Development Department at EastBanc Technologies, discussed how one organization leveraged IoT, cloud technology and data analysis to improve customer experiences and effi...
Jul. 28, 2016 02:00 AM EDT Reads: 2,051
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, explained how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
Jul. 28, 2016 01:45 AM EDT Reads: 1,104
In today's uber-connected, consumer-centric, cloud-enabled, insights-driven, multi-device, global world, the focus of solutions has shifted from the product that is sold to the person who is buying the product or service. Enterprises have rebranded their business around the consumers of their products. The buyer is the person and the focus is not on the offering. The person is connected through multiple devices, wearables, at home, on the road, and in multiple locations, sometimes simultaneously...
Jul. 28, 2016 01:15 AM EDT Reads: 841
“delaPlex Software provides software outsourcing services. We have a hybrid model where we have onshore developers and project managers that we can place anywhere in the U.S. or in Europe,” explained Manish Sachdeva, CEO at delaPlex Software, in this SYS-CON.tv interview at @ThingsExpo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 28, 2016 01:00 AM EDT Reads: 1,619
"We've discovered that after shows 80% if leads that people get, 80% of the conversations end up on the show floor, meaning people forget about it, people forget who they talk to, people forget that there are actual business opportunities to be had here so we try to help out and keep the conversations going," explained Jeff Mesnik, Founder and President of ContentMX, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 27, 2016 10:30 PM EDT Reads: 1,410
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
Jul. 27, 2016 10:00 PM EDT Reads: 2,669
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
Jul. 27, 2016 09:45 PM EDT Reads: 2,007
"delaPlex is a software development company. We do team-based outsourcing development," explained Mark Rivers, COO and Co-founder of delaPlex Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 27, 2016 08:00 PM EDT Reads: 2,037
We all know the latest numbers: Gartner, Inc. forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from last year, and will reach 20.8 billion by 2020. We're rapidly approaching a data production of 40 zettabytes a day – more than we can every physically store, and exabytes and yottabytes are just around the corner. For many that’s a good sign, as data has been proven to equal money – IF it’s ingested, integrated, and analyzed fast enough. Without real-ti...
Jul. 27, 2016 07:30 PM EDT Reads: 1,116
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
Jul. 27, 2016 06:45 PM EDT Reads: 2,074
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…
Jul. 27, 2016 06:45 PM EDT Reads: 1,188
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Jul. 27, 2016 04:30 PM EDT Reads: 1,883
Big Data, cloud, analytics, contextual information, wearable tech, sensors, mobility, and WebRTC: together, these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at @ThingsExpo, Erik Perotti, Senior Manager of New Ventures on Plantronics’ Innovation team, provided an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it ...
Jul. 27, 2016 04:30 PM EDT Reads: 222
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Jul. 27, 2016 04:15 PM EDT Reads: 1,150
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Jul. 27, 2016 04:00 PM EDT Reads: 1,745
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
Jul. 27, 2016 04:00 PM EDT Reads: 1,073
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257828010.15/warc/CC-MAIN-20160723071028-00087-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 16,881
| 61
|
http://stackoverflow.com/questions/3586697/what-is-the-best-way-to-send-php-array-via-jquery
|
code
|
can anybody help to explain or give reference on how to send array of multiple array (or just array ) in jquery. and what the best way to do when something is failed or successfull. what i mean is how the php code send back the success or failed message
Use JSON ENCODE
Something like this:
See this article for an example. Basically, you have to use PHP's
If you want to put some information into your error, which I highly recommend, just return an error array encoded with JSON. So replace the echo "error" with this:
Than you just have to check if the "error" is found in the JSON returned from PHP.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00164-ip-10-164-35-72.ec2.internal.warc.gz
|
CC-MAIN-2016-26
| 603
| 6
|
https://www.renpy.org/wiki/renpy/doc/cookbook/Inventory_and_Money_System
|
code
|
You've reached a page on the Ren'Py wiki. Due to massive spam, the wiki hasn't been updated in over 5 years, and much of the information here is very out of date. We've kept it because some of it is of historic interest, but all the information relevant to modern versions of Ren'Py has been moved elsewhere.
Some places to look are:
Please do not create new links to this page.
So, you want to add a system that keeps track of money in the game so that the character can shop or earn coins, do you? This kind of thing would probably be pretty useful in a game using the DSE (Dating Sim Engine offered in Frameworks.
Here are two possible solutions for you.
You can just copy and paste the code if you want and modify it to your purposes, but I encourage going through it to gain a deeper understanding of object-oriented programming.
This is a beginner example and is probably the kind of thing you're going to want to use if you're only doing this once or twice. It also introduces some of the concepts that we're going to expand upon.
$ coins = 0 $ items = "Today you made 10 coins! Good job!" $ coins += 10 "You have %(coins)d coins remaining. What would you like to buy?" menu: "Spaghetti": $ coins -= 3 $ items.append("spaghetti") "Olives": $ coins -= 4 $ items.append("olives") "Chocolate": $ coins -= 11 $ items.append("chocolate") if "chocolate" in items: "You have a bar of chocolate! Yummy!"
init: pass label start: $ coins = 0
You can keep track of money... let's call it coins... with a variable. The $ (cash sign) means that we're using a python statement outside on an "init python:" block.
We're going to initially set this value to 0. The "label start:" tells Ren'Py where to begin at.
I'm leaving init blank for now.
$ items =
Here's something new. We're declaring the variable "items" as an empty set, usually defined by brackets such as "[" and "]". Since it's empty, there's nothing-inbetween yet.
"Today you made 10 coins! Good job!" $ coins += 10
We've added a string that lets the player know what's happening. By using the += operator, we can add coins. We're adding 10 coins to zero.
"You have %(coins)d coins remaining. What would you like to buy?"
%(coins)d is what we say if we want to put the number of coins into a string or dialogue of printed text. "%(coins)d" is a dynamic string that will insert the value of that variable, whether it's text or a number.
If my money was instead measured in "pennies", then I would use "%(pennies)d". The variable name goes inside the parentheses.
This kind of label lets Ren'Py know to offer the user a set of choices, which we will then define. Indentation is important. For menu labels, it is four spaces over.
"Spaghetti": $ coins -= 3
By using the -= operator, you can subtract coins, just like before when we gave the player 10 coins by adding it to zero.
If you have a list named "items", you can add things to the list by saying items.append("thing"). It's a python statement so we also use a $ sign.
"Olives": $ coins -= 4 $ items.append("olives") "Chocolate": $ coins -= 11 $ items.append("chocolate")
Then we just put the rest of what we know into practice by making the rest of the menu options.
if "chocolate" in items: "You have a bar of chocolate! Yummy!"
The question statement if "object" in "list" tells you whether or not the list contains that object. When we append "chocolate" to "items" then the brackets look like this to Ren'Py: ["chocolate"]
If the player buys everything, it would look like this:
["chocolate", "olives", "spaghetti"]
init python: class Item: def __init__(self, name, cost): self.name = name self.cost = cost class Inventory: def __init__(self, money=10): self.money = money self.items = def buy(self, item): if self.money >= item.cost: self.money -= item.cost self.items.append(item) return True else: return False def earn(self, amount): self.money += amount def has_item(self, item): if item in self.items: return True else: return False label start: python: inventory = Inventory() spaghetti = Item("Spaghetti", 3) olives = Item("Olives", 4) chocolate = Item("Chocolate", 11) "Oh, look! I found ten coins!" $ inventory.earn(10) $ current_money = inventory.money "Now I have %(current_money)d coins." "My stomach growls loudly." if inventory.buy(chocolate): "Mmm, chocolate. I'll save that for later... " else: "Not enough money... " "Suddenly, I feel hungry." jump preshop jump shop2 if inventory.has_item(chocolate): "Good thing I bought that chocolate earlier." else: "If only I had some chocolate..." label preshop: $ spaghetticost = spaghetti.cost $ olivescost = olives.cost $ chocolatecost = chocolate.cost label shop2: menu shop: e "I go into the store." "Buy spaghetti for %(spaghetticost)d coins.": if inventory.buy(spaghetti): "Hey, those are uncooked. I can't eat those yet!" jump game_continues "Buy olives for %(olivescost)d coins.": if inventory.buy(olives): "I hate olives." "And they cost more than the spaghetti." "But at least I don't have to cook them... " jump game_continues "Buy chocolate for %(chocolatecost)d coins.": if inventory.buy(chocolate): "Mmmm, dark semi-sweet chocolate! My favorite!" jump game_continues "Buy nothing.": jump game_continues label fallthrough: e "Not enough money..." jump shop2 label game_continues: "And so I left the store." $ current_money = inventory.money "I have %(current_money)d left"
Here's an advanced solution using the long-term goal of classes of objects to reduce the amount of work needed over the entire project. I hope you're ready to put it all into practice.
You can actually read more about classes here: Classes in Python
This statement lets Ren'Py know to run this at the start ("init") and that it's python code ("python:") so none of these statements need a cash sign $ to prefix them.
It's a little different from the above method.
Here, we declare a class of objects, which is like a group.
def __init__(self, name, cost):
We define some properties for it at initialization: name and cost.
self.name = name self.cost = cost
"self" refers back to the original class ("Item") and the period is a break in the hierarchy. "name" comes directly after that, so name is a property of "Item". The same thing is true of "cost".
We declare another class called "Inventory".
def __init__(self, money=10):
The "Inventory" (self) is defined as having "10" money at initialization again. In other words, the variable container "money" is set as equal to the number "10."
This can be freely changed, of course. Just remember where it is, maybe leave a comment for yourself.
self.money = money
As before, we're declaring that the property "money" of the "self" (class Inventory) is contained within a global variable called "money".
self.items =
This is an empty set called "items" which can be filled, just like before—but now it's contained with the class called Inventory as an embedded property of that group.
def buy(self, item): if self.money >= item.cost:
We define another function: "buy" with the property of "item."
If the money contained with the "Inventory" is less than the "cost" variable contained within the "Item" class then we...
You may also notice the period between self and money. That tells Ren'Py the location of money in the hierarchy.
The >= syntax is identical to the += and -= we were using before, except that this time we're using it only to evaluate the container within the variable and not change it.
self.money -= item.cost
We subtract the amount of the cost away from the "Inventory" money. In effect, the player has lost money.
We put the "Item" into the "Inventory".
Just like in the beginner's code, we're adding the "item" into the empty set.
The player bought the item.
else: return False
The player didn't buy the item.
def earn(self, amount):
We're making another definition now, for the earning of money.
The variable in operation here is the "amount" in question.
self.money += amount
Again, "self" still refers to class "Inventory". So what is earned is added from "amount" into "money."
def has_item(self, item):
This is a definition that checks to see if the item is in the inventory or not.
if item in self.items: return True else: return False
This one is pretty self-explanatory and works like checking about adding an item into the "items" container.
Was that a little confusing?
Let's see it in action.
This tells Ren'Py where to begin, just like last time.
You can declare a python block even from a "start" label.
inventory = Inventory()
The variable "inventory" is declared to be the same as the "Inventory" class, which is followed by (). Again, no $ sign is necessary.
spaghetti = Item("Spaghetti", 3)
Spaghetti is declared to be of class "Item."
Notice that it's taking the arguments "name" and "cost" just like we declared before?
It costs 3 "money".
olives = Item("Olives", 4) chocolate = Item("Chocolate", 11)
We then apply that same kind of code to two other objects. Olives cost more than spaghetti and chocolate is obviously a luxury few can afford...
"Oh, look! I found ten coins!" $ inventory.earn(10)
We state that 10 "money" is earned and sent to the inventory, after it goes to amount.
$ current_money = inventory.money
This is a hack to make the field a global so we can use it as a dynamic string below.
"Now I have %(current_money)d coins." "My stomach growls loudly."
Like in Example 1, this string changes depending on the amount declared for the variable "current_money".
If you give the player 11 instead of 10 coins under the class Inventory, he can buy it.
"Mmm, chocolate. I'll save that for later... " else: "Not enough money... " "Suddenly, I feel hungry."
The "else" function just handles what happens if it's not possible to buy it. By the default option, the player can't afford it.
jump preshop jump shop2
A "jump" will go to the label and not return.
See below for these sections.
If the "Item" "chocolate" is contained within the "Inventory" item set... then the statement below is printed:
"Good thing I bought that chocolate earlier."
else: "If only I had some chocolate..."
Well, we only had 10 coins, huh?
Let's take a look at those shop labels.
label preshop: $ spaghetticost = spaghetti.cost $ olivescost = olives.cost $ chocolatecost = chocolate.cost
We redefine some of the properties of the items into global variables.
label shop2: menu shop: "I go into the store."
By not including a colon, Ren'Py will display this dialogue at the same time as the menu.
"Buy spaghetti for %(spaghetticost)d coins.": if inventory.buy(spaghetti): "Hey, those are uncooked. I can't eat those yet!" jump game_continues
This is just like we've done before, and here we're using a dynamic string for the cost of the spaghetti: that means you can change it in the future or maybe even lower it.
Then we jump down to the label game_continues which is covered further on below.
"Buy olives for %(olivescost)d coins.": if inventory.buy(olives): "I hate olives." "And they cost more than the spaghetti." "But at least I don't have to cook them... " jump game_continues "Buy chocolate for %(chocolatecost)d coins.": if inventory.buy(chocolate): "Mmmm, dark semi-sweet chocolate! My favorite!" jump game_continues
More of the same.
"Buy nothing.": jump game_continues
Always remember to give the player a neutral option when shopping. With a user interface, this would probably be a cancel imagebutton.
label fallthrough: "Not enough money..." jump shop2
This is what happens when you can't afford an item.
label game_continues: "And so I left the store." "I have %(current_money)d left"
The player's shopping trip ends here. You may notice the return of are global hack, this is because this code must be placed before all current_money variables to ensure they will work.
The last bit of code is mainly for testing reasons, to ensure that the money was removed from your inventory.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301863.7/warc/CC-MAIN-20220120130236-20220120160236-00690.warc.gz
|
CC-MAIN-2022-05
| 11,834
| 113
|
https://henningmusick.blogspot.com/2008/12/pythonic-bayreuth.html?m=1
|
code
|
Sometimes artistic insight comes unbidden, in the middle of the night, and at the cost of a little sleep. Sometimes, too, it's just a little silly.
A couple of months ago I was struck by the similarity which is the first item detailed below (less surprising in the fact of similarity, than in my only picking up on it decades after I first saw the movie). Yester even, after watching The Meaning of Life again, I at last awakened to the Wagnerian magnificence of its musical interconnections, befitting the grandeur of theme of this, the Python troupe's final film as a group.
Both of the first two songs under consideration were written by Eric Idle and John du Prez.
Before The Meaning of Life proper (the feature presentation), there is a short live-action film by Terry Gilliam, The Crimson Permanent Assurance, which closes with "The Accountancy Shanty" (see Ex. 1):
The two phrases are generally contrary in motion, the first outlining a stepwise descent of a fourth, the second (again temporarily disregarding the pick-up eighth-note) a stepwise ascent (with one chromatic passing-tone) of a major third.
Compare this with another Idle / du Prez song from the second half of the main film. On screen, Eric Idle himself surprises Terry Jones (in pepperpot guise) by stepping out of the refrigerator, and breaking into song with such force, that the architectural integrity of Jones's kitchen is compromised . . . and Idle sings the "Galaxy Song" (Ex. 2):
(I've cast all the examples in C major for ease of comparison.) Note that the first two phrases of the "Galaxy Song" describe exactly the same contours as those of "The Accountancy Shanty": the stepwise descending fourth (and indeed, the same pick-up pitch) of the first phrase is broadly the same in both songs; and the second phrase is even closer (the rhythmic 'space' of the successive pitches is more closely related in the case of the respective second phrases).
Nor is this all. Leave us consider the musical number from The Miracle of Birth, Part II: The Third World, "Every Sperm Is Sacred." At first the song is in a solemnly decorous duple meter (Ex. 3a):
Afterwards, though, it is metrically recast (with variation in contour) as a bumptious march (Ex. 3b):
Note that the E-to-G to which the phrase every sperm is sung is inverted in the march: the spaciously ceremonial descending sixth of the opening has been converted to a (rascally, it must be admitted) ascending minor third, which also relates to the ascending major third (stepwise via chromatic passing-tone) of the b phrase from both "The Accountancy Shanty" and the "Galaxy Song." (I await word from a Dutch neighbor on research suggesting that this ascending chromatic figure may in fact be derived from the Prelude to Tristan und Isolde.) What is more, this "rascally" third is a compressed echo of gradual stepwise ascent (E-F-G) of the 'peaks' of the three successive phrases of the opening (marked by the bracket in Ex. 3a above).
The grand musical summation of the interlocking musical motifs in The Meaning of Life, predictably, is reached in the final number, "Christmas in Heaven" (Ex. 4):
"Christmas in Heaven" does not merely recapitulate phrase a (with pick-up), but then repeats the phrase transposed diatonically down a fourth. And the paradisal character of the music is a shrewd echo of Stephen Foster's "Beautiful Dreamer" (Ex. 5):
The descent at the start of "Christmas in Heaven" is stepwise rather than the arpeggiated tonic triad of the Foster; but the goal in both cases is the lower-neighbor figure on D and then an ascent of a fifth.
The musical coherence and archetypes of The Meaning of Life are little short of overwhelming, and magnificently redeem the choric promise of "Always Look on the Bright Side of Life" from the Life of Brian.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358685.55/warc/CC-MAIN-20211129014336-20211129044336-00210.warc.gz
|
CC-MAIN-2021-49
| 3,797
| 14
|
https://community.monzo.com/t/google-1-authorisation-payments/7796
|
code
|
I have a lot of £1 Google payments and subsequent refunds cluttering my transaction history. These get triggered for all sorts of Google payment reasons, but the dominant one for me is that it seems Google does a £1 hold when doing card autofill on Android to verify the entered CVV and “unlock” the card in the browser. Is it possible to merge the payment + refund transactions and replace these with “Active card check”? A possible issue is that it might not be possible to differentiate between authorisation holds and actual £1 payments.
kelvin (Kelvin) #1
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247495001.53/warc/CC-MAIN-20190220125916-20190220151916-00397.warc.gz
|
CC-MAIN-2019-09
| 571
| 2
|