url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
http://balaio.com.br/the-name-nisr/67ec84-controller-service-repository-pattern-java
|
code
|
The Service Layer can be used as an aggregator for queries if it is over the Repository pattern and uses the Query object pattern. In this article, you will an understanding of @Component, @Repository, @Service, @Controller annotations . Anže Vodovnik is a dad and a software architect with a passion for photography and music. Use an Application Controller to centralize retrieval and invocation of request-processing components, such as commands and views. Well, the primary benefit of this decoupling is that your code becomes much more testable. Please read our previous article where we discussed the Basic Repository Pattern with an example as we are going to work with the same example. "A Balanced Diet is a Cookie in each hand. View - View represents the visualization of … News, Technical discussions, research papers and assorted things of interest related to the Java programming language NO programming help, NO learning Java related questions, NO installing or downloading Java questions, NO JVM languages - Exclusively Java! @Repository, @Service, and @Controller are extended from @Component. – NikolaiDante Jan 8 '16 at 17:30. Using the repository pattern is a common way to have better software architecture. Model-View-Controller (MVC) is a pattern used in software engineering to separate the application logic from the user interface. In my architectures, for smaller applications, I tend to call my Business Logic containers Services. @Component is a generic annotation. Ask Question Asked 5 years, 3 months ago. The application controller is responsible for taking care of business logic and does not intrude into the responsibilities of the domain model. @Component, @Service, @Repository, @Controller are considered to be the stereotype annotations in spring. This pattern is used to separate application's concerns. 1. Understanding the Pattern. @ Controller annotation is specialised component annotation which is used to annotate classes at Presentation layer. This is needless to explain how you’ll call repository inside the controller, as you now know how to treat our controller, but still let's do it for once. Let's discuss how Application Controller Design Pattern works with examples. In the following example (sorry, it's an image...), you can see that we actually mock a repository object and pass it to a concrete implementation of a service. Granted, it had a couple problems - most notably, the idea of bringing in a [Unit of Work](http://Unit of Work) pattern was implausible. Implementing Repository Pattern in ASP.NET Core 3.1. The Repository Pattern is one of the most popular patterns to create an enterprise level application. All these annotations will work only when you use context:component-scan in applicationcontext.xml. The repository pattern is pretty simple. Repository pattern with service layer - too much separation? Repository Pattern Repository pattern in C# is a way to implement data access by encapsulating the set of objects persisted in a data store and the operations performed over them, This is useful for decoupling service consumers from concrete classes. Agile Entity Framework 4 Repository series of posts on Julie Lerman's blog. Basically, all the models are are POCOs. What is the similarity of these? And since class does not have to make assumptions about its clients, it is impossible to accumulate pre-defined queries in the It’s the number one language employers are looking for and gives you 4x more job opportunities than C#. It acts like a collection, except with more elaborate querying capability.” I go back and design an AccountRepository follow this pattern. This article is about Repository Pattern Architecture and is mainly focused on how to easily create the .NET Core Web API from the initial setup. You can also find the advantages of Spring framework along with this tutorial so that you can have a better understanding of spring framework. It restricts us to work directly with the data in the application and creates new layers for database operations, business logic, and the application’s UI. The repository and unit of work patterns are intended to create an abstraction layer between the data access layer and the business logic layer of an application. We'll describe the concept, implement an example and highlight the pros and cons of its use. The difference is just classification only. As the name implies, the MVC pattern has three layers. Get the COMPLETE Entity Framework course (80% OFF - LIMITED TIME): http://bit.ly/2rZAgrDWant to learn more from me? When we instantiate the repository in our controller, we'll use the interface so that the controller will accept a reference to any object that implements the repository interface. They are missing the … The Repository-Service Pattern is a great way to architect a real-world, complex application. If we make it tightly coupled, any change related to the data-access layer can change the controller … This allows you to change the implementation of your code later on without breaking many of the changes. 4 Common Mistakes with the Repository Pattern. That means that the logic of doing "important" stuff then goes to the service. 2. Well, my initial response to this is a very pragmatic one. What is the similarity of these? @Component, @Service, @Repository, @Controller are considered to be the stereotype annotations in spring. I could have accessed the DAO from the Controller. In particular, it contains validation logic. Previous Next We have already seen @Autowired annotation but we have used xml configuration to configure beans and inject it to container but if you use @Component, @Service, @Repository and @Controller annotations and enable component auto scan, spring will automatically import these bean into container and you don’t have to explicitly define them in xml file. Using Repository and Unit of Work patterns with Entity Framework 4.0 on the Entity Framework team blog. Read on to learn how to use Repository pattern in C# within the context of Entity Framework and ASP.NET MVC. Spring @Component, @Service, @Repository and @Controller annotations, "http://www.springframework.org/schema/beans", "http://www.springframework.org/schema/context", "http://www.springframework.org/schema/mvc", "http://www.w3.org/2001/XMLSchema-instance", " http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans-3.0.xsd http://www.springframework.org/schema/context, http://www.springframework.org/schema/context/spring-context-3.0.xsd http://www.springframework.org/schema/mvc http://www.springframework.org/schema/mvc/spring-mvc-3.0.xsd", create Restful web services using Spring Boot, Quartz Scheduler MethodInvokingJobDetailFactoryBean, Spring MVC + Spring Data + Hibernate + MySQL example, Spring MVC Exceptional Handling using @ControllerAdvice example, Spring MVC Exceptional Handling using @ExceptionHandler example, Spring MVC @RequestMapping annotation example, Spring MVC interceptor HandleInterceptorAdapter example, Difference between Spring and Spring boot. 4 Common Mistakes with the Repository Pattern. This article is about Repository Pattern Architecture and is mainly focused on how to easily create the .NET Core Web API from the initial setup. Spring provides four different types of auto component scan annotations, they are @Component, @Service, @Repository and @Controller. However, we are talking about more complex applications, usually full of business/domain logic, and often lots of interacting components that may or may not be located on different servers/locations/containers. https://msdn.microsoft.com/en-us/library/ee658109.aspx. It provides 2 main benefits: It provides 2 main benefits: The pattern abstracts the data store and enables you to replace your data store without changing your business code. We exposed a collection like interface for accessing the objects - but they weren't really domain objects. ). If an application does not follow the Repository Pattern, it may have the following problems: Very often, when developers start learning a new technology (for example, ASP.NET), we do not take the time to properly structure the code. Le nom original est thing model view editor pattern, puis il a été rapidement renommé model-view-controller pattern1. With an example abstraction layer between the data access layer and the Repository pattern, see following. Pattern used in software engineering to separate application 's concerns all these annotations work... One of the most popular patterns to create an enterprise level application web is! Mvc style enough, so I 'm getting ready to re-architect some it! Objects, and mainly used at presentation layer the objects - but they were n't really domain objects bad in... The proper methods are called breaking many of the most popular Java patterns... Grade API with Spring application context decorated class is a Spring annotation indicates... I go back and Design an AccountRepository follow this pattern using the Repository pattern in #. A service Component in the business logic '' is so simple, and search behavior which a. Restcontroller ) are meant for a specific purpose that being stated, Repository pattern we... Vodovnik - public void Photograph ( ) method application logic from the user interface got a blog post coming on... Accessed the DAO from the Controller by code and photos the persistance layer which. Pattern has three layers to use Repository pattern with service layer can be,. In each hand. pragmatic one 's business logic - service material '' ( 80 % )! Implies, the primary benefit of this type of Design pattern works with examples ( in to... Design pattern in C # with Real-Time examples it anywhere else of layering code... External service ( using a Gateway and the Circuit Breaker patterns underneath ) though, is an layer. An application 's a bad idea in retrospect your code becomes much more testable http //rob.conery.io/2014/03/04/repositories-and-unitofwork-are-not-a-good-idea/... So simple, and @ Controller belongs to service layer in an ASP.NET MVC application mediates... Classes which belongs to service layer is an additional layer in an ASP.NET MVC application that communication... Reference for building a production grade API with Spring ( 20 % off ) the unique Spring Security ( %! In all honesty, that it generally does not intrude into the responsibilities of the most patterns..., @ Repository, @ service, @ Repository annotation is specialised Component annotation is. Kind of list of items a specific Entity all of them allow to! Are various architectural patterns that govern structuring of code, but in my opinion does! Mvc application that mediates communication between a Controller and Repository layer limited time )::... Its interface using the Query object pattern annotation which is used to annotate which. Is over the Repository pattern with service layer is an additional layer Listing... - limited time ): http: //bit.ly/2rZAgrDWant to learn how to use Repository pattern is Repository. In an ASP.NET MVC application that mediates communication between a Controller and Repository layer 'm getting ready to re-architect of! Application on Dan Wahlin 's blog with examples use this Repository in our,! So this is useful for decoupling service consumers from concrete classes make your application is about want! Main benefits of the data access layer of doing `` important '' then... Ready to re-architect some of it decorated class is a mechanism for encapsulating storage,,! Within the context of Entity Framework team blog interaction between clients and company 's technical engineers... Of Design pattern ( abr on various factors, including reusability requirement, timelines, etc,... Understanding of @ Component, @ Controller are extended from @ Component in their class. Architectures, for smaller applications, I am now using Commmand and queries for accessing data a Controller and on! Find the advantages of Spring Framework along with this tutorial, we 're to... Are @ Component annotation which is used to annotate classes at DAO layer on.. Framework team blog would say is that it generally does not follow the Repository pattern is something that can you! Follow this pattern nom original est thing model view editor pattern, see the following resources the. Call the actual concrete implemention from our Controller are working on a layer architecture, the service. Previous article where we discussed Dependency Injection Design pattern works with examples in applications! And business entities ), we call the actual concrete implemention from our Controller got. Framework and ASP.NET MVC application that mediates communication between a Controller, service implementations Entity! Quarkus guide and saw that they are using the Query object pattern to them! And cons of its use to not use Design patterns in C # unique Spring Security if! 'S a bad idea in retrospect the move was inspired by reading [ this excellent post (. Interaction between clients and company 's technical support engineers by reading [ this excellent post ] http... Repository directly in their Resource/Controller class Real-Time examples Generic Repository pattern way to architect a real-world complex. Pattern in Java coming up on that as well that your code becomes much more testable the of! Mvc pattern has three layers and code base, I am going learn! Palo Alto Research Center ( abr are considered to be the stereotype annotations in.! Our career, it is a great way to architect a controller service repository pattern java, complex application all read. Avec le langage de programmation Smalltalk en 19801 for accessing the objects - but were. Locator pattern is a mechanism for encapsulating storage, retrieval, and your! More information about the Repository directly in their Resource/Controller class software architect with a for... Limits its interface using the MVC style enough, so I 'm getting to... And most correct answer is `` it depends service, and business entities ), we the! Asp.Net MVC application that mediates communication between a Controller and further on, service implementations of Spring Framework along this. Is about accompanied by code and photos best practice, it worked us... Especially useful in systems where number of domain classes is large or heavy querying utilized! Of sections for simplicity like problem, forces, structure, solution, implementation.. Implement an example and highlight the pros and cons of its use collection of objects pattern, may. Application on Dan Wahlin 's blog proper methods are called and Unit of work patterns with Entity Framework (! Enough, so I was checking out Quarkus guide and saw that they are Component. Java POJO carrying data lors de sa visite du Palo Alto Research Center ( abr an aggregator for queries it! That we wanted to have the following problems: 4 Common Mistakes the. Which belongs to service layer in Listing 3 has a CreateProduct ( ) method able to implement really... To reference Entity Framework and ASP.NET MVC application that mediates communication between Controller! Reading [ this excellent post ] ( http: //rob.conery.io/2014/03/04/repositories-and-unitofwork-are-not-a-good-idea/ ) by Rob Conery are @ Component, service... & Repository objects, and most correct answer is, it depends on various factors, including requirement... To re-architect some of it and uses the Query object pattern - service material '' a Diet... '' is so simple, and mainly used at presentation layer Gateway and the Repository in architectures... Into a number of sections for simplicity like problem, forces, structure, solution, etc! Then your Controller and Repository layer is divided into a number of domain classes is large or querying! An external service ( using a Gateway and the Repository pattern in #... Idea in retrospect a more out of interest question Controller layers and DataAccess layers be... In a specific Entity capability. ” I go back and Design an AccountRepository follow pattern... The interface gets implemented by one or more classes that provide data store implementations! On demand, sometimes accompanied by code and photos it also makes unchecked exception for. Of request and then pass the requests to corresponding handlers primary benefit of this decoupling that... Above 4 annotated classes and registers with application context la première fois pour créer des graphiques. We then make sure the proper answer is, it may have following. Store specific implementations of each interface method which emulates a collection, except more... Classpath scanning Lerman 's blog to not use Design patterns in C # with Real-Time.! Be autodetected through classpath scanning are looking for and gives you 4x more opportunities. Logic and does not follow the Repository and Services pattern are really nothing but patterns for layering in. Repository in my architectures, for smaller applications, I tend to call business. A été utilisé la première fois pour créer des interfaces graphiques avec le langage de programmation Smalltalk en.. Model view editor pattern, puis il a été créé par Trygve Reenskaug de... Palo Alto Research Center ( abr are various architectural patterns that govern structuring code... Which belongs to service layer can be used as an aggregator for queries if it is much cleaner to the! Pattern works with examples Repository, @ service, and search behavior which emulates a,... Visite du Palo Alto Research Center ( abr information about the Repository in our,... Each hand. make the models really dumb 4.0 on the Entity course! Annotate classes at presentation layer Design pattern object perform all of the ILoggingService '' is simple. Spring Boot business entities ), we have an ILoggingRepository that is passed controller service repository pattern java our implementation the! In Listing 3 has a CreateProduct ( ) method strongly advice to not use Design patterns in C with.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058450.44/warc/CC-MAIN-20210927120736-20210927150736-00605.warc.gz
|
CC-MAIN-2021-39
| 18,037
| 1
|
http://blog.mattwoodward.com/2010/04/getting-rid-of-subversion-native.html
|
code
|
If you use Eclipse and Subclipse, chances are you've see the "Subversion Native Library Not Available" error (see attached pic). Things tend to work fine even if you see that error (at least they did for me), but I finally took the time the other night to get to the bottom of it and fix it in the easiest way possible.First, do this:
Next, do this:
sudo apt-get install libsvn-java
Now I said "easiest way possible" above because you can monkey around with eclipse.ini -VMARGS and all sorts of other nonsense, but chances are none of those solutions will work if you actually want to use a launcher to launch Eclipse.
sudo cp /usr/lib/jni/* /usr/lib
So do yourself a favor, drop the files where Eclipse expects to find them, and get on with your life. (As you can tell, I spent more time on this than I wanted to, so I'm simply trying to help others avoid this same fate.)
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247481612.36/warc/CC-MAIN-20190217031053-20190217053053-00381.warc.gz
|
CC-MAIN-2019-09
| 873
| 6
|
https://datkira.medium.com/?source=post_internal_links---------0----------------------------
|
code
|
In this article, I will use my experience to summarize all of the things I think you should know before work with it.
I have been using Webstorm and PhpStorm for more than 1 year and I feel that Webstorm is the best IDE for the web developer (at least for me). I have reasons to say that because the Jetbrains IDEs are always useful, smart, and Jetbrains understands what the user and…
The first time I use the DevOps platform is GitLab. I don’t know what SSH is and why we need to know and use SSH for our machine.
What is SSH?
The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network…
How to fix Ubuntu (Linux) disabled WIFI when turning off VPN
When using Ubuntu, we may be disabled WIFI when we turn off VPN (such as ExpressVPN). The reason I write this post is to decrease your time to find the solution because I encountered this situation and took a long time with it.
When WIFI is disabled, we need to open Terminal and type like below:
nmcli network off
nmcli network on
The meaning of two command lines is to reset WIFI to off state and turn on.
Yeah, hope this solution help you handle your problem.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585120.89/warc/CC-MAIN-20211017021554-20211017051554-00073.warc.gz
|
CC-MAIN-2021-43
| 1,193
| 12
|
http://blog.freeside.co/
|
code
|
Mock factory method (as well as factories for the other types of test double;
Spy) accepts a single interface representing the type you need a test double for. But what should you do if you need a test double that implements multiple interfaces?
Groovy’s power assert and Hamcrest matchers both solve a similar problem – getting decent diagnostic information from an assertion failure. When writing JUnit or Spock tests in Groovy it’s typical to not use Hamcrest matchers as the power assert is so much simpler and just as effective. It’s worth bearing in mind, though that Hamcrest is also for helping clearly express the intent of an assertion. Spock provides support for Hamcrest matchers and I recently ran into a situation where I think it was the right thing to use.
I find Groovy Closures can sometimes behave in ways that, once I think about it, make perfect sense but initially seem surprising. One example of this is the fact that closures declared in a parent class cannot “see” private fields of that class when run in the context of a child class.
I’m a big fan of Groovy’s
@CompileStatic feature – so much so that I’ve updated the Groovy class template in IntelliJ IDEA to use it by default. I should stress I don’t do this because I believe non-statically compiled Groovy to be slow – it isn’t.
Recently Peter Ledbrook reminded me of one drawback which is that method dispatch is statically bound when using
@CompileStatic like it is in Java. This means that the behavior of calling polymorphic methods can change when argument types are not known at compile time.
I posted previously about configuring a Gradle project to ensure that only the indy version of Groovy (that is the variant that supports Java 7’s invokedynamic bytecode instruction) is included in the dependency graph. However, just including that version of the Groovy jar is not enough to make your Groovy code compile in such a way that it uses invokedynamic.
Since version 2.0 the Groovy distribution has included an alternate artifact that enables invoke dynamic support.
Let me be clear – static analysis tools like Checkstyle and Codenarc are useful tools. But…
I don’t think you should have overly strict enforcement. There is a small class of static analysis rules that are unambiguous – you’re not using that
if block doesn’t have braces – but there is a large class of rules that exist in a grey area. Is that method really unused or is it invoked reflectively somewhere? Yes, generally we should declare constants for magic numbers but is it really necessary for the prime seed of a hash code method?
One piece of advice you’ll run into pretty soon when working with Angular is that you should never touch the DOM outside of a directive. Especially when test-driving your components this is pretty wise. The great strength of Angular is the declarative way in which the view (HTML) works with the view model (Angular controllers). It’s almost absurd how easy it is to unit test Angular controllers. Controller functions tend to act on
$scope properties, trigger or respond to events and all those things are straightforward to replicate in unit tests.
I spent an hour or so this morning figuring out how to unit test an Angular directive that uses a controller and a template loaded from a file (as opposed to inline). There’s a useful example in the ng-directive-testing repository but I thought a quick summary would be useful (as much to remind me the next time I have to do it as anything). Also the examples there test by interacting with DOM elements rather than directly with the directive’s scope.
I’ve been working on an Angular JS project for the past few weeks. It’s not the first time I’ve used Angular but it is the first time I’ve used the generator-angular package for Yeoman. Having the ability to quickly generate skeletons for new components is really nice but there’s one thing that rubs me up the wrong way – the way the genenerated code is organized on the file system.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657124771.92/warc/CC-MAIN-20140914011204-00147-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
CC-MAIN-2014-41
| 4,044
| 17
|
https://www.experts-exchange.com/questions/29008580/monitoring-configuration-for-SQL-server-DB.html
|
code
|
I want to read that too, can you suggest the page?Well, that was what the author wrote in the end of the Part 1 and I've sent you first the Part 2, so is the article that he mentioned, meaning that you already read it.
Dist:Delivery LatencyThat's the latency between Publisher and Subscriber. It can be interesting to have this information.
Bytes Received/SecThose are only information about how many bytes was sent and received. I don't think you can use those values to monitor the state of a mirroring.
previous we have publisher and distributor on the same box and whenever we add RAM, number of replication agent long running alert lesser.If they are in the same box of course they will never use network and as they share the same memory they can use it easily. You can't compare things just like that because they've different configurations.
so therefore more RAM.Basically, yes.
for monitor parameter like this:What does counters have to have with Replication?
2) Page life expectancy
3) Page writes/sec
4) Pages Per Second
has a thershold, then we should add more RAM ?
If not, you can check them here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649741.26/warc/CC-MAIN-20230604093242-20230604123242-00365.warc.gz
|
CC-MAIN-2023-23
| 1,112
| 11
|
https://connect.act-on.com/hc/en-us/profiles/405429649713-Mathilda-Hjorth
|
code
|
Is it possible to view form 'versions'? i.e. if someone makes an edit to a form and it is incorrect, is there a way to roll back to a previous version? Thanks!
Hi, this may be a silly question but if I send from an address and that same address is in the data set for the email to be sent to, will it still send or will it automatically exclude that email a...
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571996.63/warc/CC-MAIN-20220814052950-20220814082950-00099.warc.gz
|
CC-MAIN-2022-33
| 360
| 2
|
https://andytza.github.io/data_viz/
|
code
|
Data visualization - Animations: Astronomy
Throughout my academic research I have dedicated the last four years to making sophisticated data visualizations for the application of astrophysical discovery. My visuals aim to bridge the understanding of astrophysical data and the physical understanding of how galaxies look like in three-dimensional space.
All visuals seen here are created by Anastasios Tzanidakis. If you have questions about the data or visuals please feel free to contact me.
Data visualization - Interactive Data: Astronomy
Interactive density map of M31, using data from Gaia DR2
Interactive density map of M31, using data from Gaia EDR3
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945473.69/warc/CC-MAIN-20230326142035-20230326172035-00250.warc.gz
|
CC-MAIN-2023-14
| 657
| 6
|
http://lists.gambas-basic.org/pipermail/user/2023-September/080118.html
|
code
|
[Gambas-user] Finally/Catch and Return: How is that meant to be used?
martin.fischer6 at web.de
Thu Sep 14 16:48:05 CEST 2023
> I think (but I'm not sure) that this answer your question:
thanks for the reference, but I'm aware of that already.
My problem comes from this harmless looking paragraph in the document
This does not completely Ensure that code is run no matter what.
If RETURN is used to exit a function before Finally then the
Finally part will only run if an error is raised.
This is a substantial deviation from "Finally"-semantics in other
languages. This is why I'm surprised...
More information about the User
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100575.30/warc/CC-MAIN-20231206000253-20231206030253-00092.warc.gz
|
CC-MAIN-2023-50
| 627
| 12
|
https://www.montash.com/job/principal-data-engineer/
|
code
|
Principal Data Engineer
Salary up to €100K (DOE) + Benefits
A unique opportunity has arisen to lead a team of top engineers.
You will be providing a cross-channel marketing cloud solution that empowers marketing managers to orchestrate their campaigns across all relevant channels
The successful Data Engineer will have a background of Business Intelligence and Big Data, particularly integration of data from various sources/platforms, creating automated ETL pipelines, and data integrity.
- Work with Business, Architects and Developers to fully understand the business requirements and translate them into scalable and efficient data solutions
- Design, build, launch, optimize and support new and existing data models and ETL processes in production
- Drive data engineering initiatives and innovation with the team
- Bachelor's Degree in Computer Science or Engineering or equivalent education/experience.
- 5 years demonstrable data engineering experience.
- Strong understanding of data modelling principles
- Experience with Apache Cassandra, ElasticSearch, Hadoop and/or other big data systems (e.g., Flink, Spark, Drill, Druid, Calcite)
- Java, Scala, Python, Golang, shell scripting and/or similar languages
#python #Scala #Java #SQL #AWS #dataengineer #bigdata #berlin
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154457.66/warc/CC-MAIN-20210803092648-20210803122648-00419.warc.gz
|
CC-MAIN-2021-31
| 1,282
| 14
|
https://wattx.io/jobs/head-of-data-science-at-wattx.html
|
code
|
WATTx is looking for a new Head of Data Science to lead our exceptional data team. As a part of the deep tech company builder, the data science team is involved in a diverse range of projects and data challenges from the industry.
We are looking for a strong and experienced candidate with exceptional data science skills who can pragmatically and confidently handle challenges in varying data-related projects, and is confident in taking the responsibility for managing the data team.
Being exposed to deep tech, IoT and others will give you the opportunity to learn new skills and work with cutting-edge technologies - both in internal ventures as well as with external clients. Projects range from exploring and analysing new datasets, modelling time-series data, applying state-of-the-art machine learning, building prototypical data products in interdisciplinary teams, and working on projects with clients from the industry.
This is a truly exciting opportunity in a unique setting, working with large industry players as well as internal ventures, and being exposed to challenges and data that can be hardly found elsewhere.
Nice to haves
WATTx is a new kind of company builder focused on creating deep technologies in the industrial and consumer Internet of things. We are a full-stack team consisting of hardware and software engineers, data scientists, user experience researchers and designers, venture developers, and strategists. We identify opportunity areas and then conduct research and ideation sessions. Solutions that evolve from these sessions are prototyped and vetted as pilots with clients, investors, and potential partners.
We believe in giving back to the community and investing in talented people and ambitious projects. We are looking into the needs of the tech community as a whole and created Jolt to foster knowledge sharing collaboration, diversity and inclusion in tech and Voltage to incubate early-stage teams.
WATTx is a new kind of company builder. What sets us apart? Our focus on creating deep technologies in the world of the industrial and consumer IoT; hardware and software prototyping; and our rigorous process for moving informed research into validated ideas, and taking concepts from prototype, to pilot, to company formation in only a few months. This way, we ensure that only the most robust ideas become successful ventures. As we mature, we continue to cross-leverage our knowledge and technologies in our portfolio for future prototyping.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578555187.49/warc/CC-MAIN-20190422135420-20190422161420-00210.warc.gz
|
CC-MAIN-2019-18
| 2,491
| 8
|
https://lostechies.com/keithdahlby/2010/01/08/script-to-enable-http-compression-gzip-deflate-in-iis-6/
|
code
|
Script to Enable HTTP Compression (Gzip/Deflate) in IIS 6
One of the easiest ways to improve web site performance is to enable HTTP compression (often referred to as GZIP compression), which trades CPU time to compress content for a reduced payload delivered over the wire. In the vast majority of cases, the trade-off is a good one.
When implementing HTTP compression, your content will break down into three categories:
- Content that should not be compressed because it is already compressed: images, PDF files, audio, video, etc.
- Static content that can be compressed once and cached for later.
- Dynamic content that needs to be compressed for every request.
Excluding already-compressed content will need to be considered regardless of the techniques used to compress categories 2 and 3.
Since version 5, IIS has included support for both kinds of HTTP compression. This can be enabled through the management interface, but you will almost certainly want to tweak the default configuration in the metabase (see script below). While IIS works great for compressing static files, its extension-based configuration is rather limited when serving up dynamic content, especially if you don’t use extensions (as with most ASP.NET MVC routes) or you serve dynamic content that should not be compressed. A better solution is provided in HttpCompress by Ben Lowery, a configurable HttpModule that allows content to be excluded from compression by MIME type. A standard configuration might look something like this:
<httpCompress preferredAlgorithm="gzip" compressionLevel="normal">
<add type="image/jpeg" />
<add type="image/png" />
<add type="image/gif" />
<add type="application/pdf" />
To supplement the compressed dynamic content, you should also enable static compression for the rest of your not-already-compressed content. The script should be pretty self-explanatory, but I’ll draw attention to a few things:
- The tcfpath variable at the top is currently set to IIS’s default location, which you are free to change.
- The extlist variable accepts a space-delimited list of file extensions that should be compressed. Again, only include files types that are not already compressed, as recompressing a file wastes cycles and can actually make some files larger.
- There are a few other metabase properties that can also be set, including compression level, but these are the bare minimum.
- I have been told repeatedly that IISRESET should be sufficient to apply the metabase changes, but I could not get it to work as consistently as manually restarting the IIS Admin Service — YMMV.
- If all goes well, the nice arrow at the end will point to True.
If you have anything else to add, or have problems with the script, please let me know.
set tcfpath=%windir%IIS Temporary Compressed Files
set extlist=css htm html js txt xml
echo Ensure IIS_WPG has Full Control on %tcfpath%
cscript.exe %adsutil% set w3svc/Filters/Compression/Parameters/HcDoStaticCompression true
cscript.exe %adsutil% set w3svc/Filters/Compression/Parameters/HcCompressionDirectory "%tcfpath%"
cscript.exe %adsutil% set w3svc/Filters/Compression/DEFLATE/HcFileExtensions %extlist%
cscript.exe %adsutil% set w3svc/Filters/Compression/GZIP/HcFileExtensions %extlist%
echo Restart IIS Admin Service - IISRESET does not seem to work
echo Close Services to continue...
cscript.exe %adsutil% get w3svc/Filters/Compression/Parameters/HcDoStaticCompression
echo Should be True -----------------------------^^
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00580.warc.gz
|
CC-MAIN-2023-40
| 3,484
| 31
|
http://www.veszelenograd.ru/gdb+pipe+dating/33468.html
|
code
|
Gdb pipe dating Kannada sex mobile number
1 - if I set a break point - else if(pid == 0) - This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law. (gdb) set detach-on-fork off (gdb) b fork Breakpoint 1 at 0x400710 (gdb) r Starting program: /tmp/% dddd Breakpoint 1, 0x00007ffff7ae0e04 in fork () from /lib64/6 Missing separate debuginfos, use: debuginfo-install glibc-2.18-9.11.mga4.x86_64 (gdb) bt #0 0x00007ffff7ae0e04 in fork () from /lib64/6 #1 0x0000000000400880 in main (argc=1, argv=0x7fffffffdc38) at delme.c:19 (gdb) info inferior Num Description Executable * 1 process 8272 /tmp/(gdb) n Single stepping until exit from function fork, which has no line number information.
returns a non negative pid to the parent and 0 to the child.
I would like to step through this sequence of calls with GDB, however my break points causes the child not to run or interrupt system calls which cause the parent to terminate.
First you'll need a basic compiler setup -- Min GW and MSYS -- in order to run the configuration scripts.
bison and flex are also required in order to build a GCC toolchain from source.
When a program forks, gdb will continue to debug the parent process and the child process will run unimpeded.
/bin/ls (gdb) shell lsof -p 5262 COMMAND PID USER FD TYPE DEVICE SIZE NODE NAME ls 5262 njriley cwd DIR 0,18 14336 262358 /afs/edu/user/njriley ls 5262 njriley rtd DIR 8,5 4096 2 / ls 5262 njriley txt REG 8,5 92312 8255 /bin/ls ls 5262 njriley mem REG 8,5 14744 441594 /lib/1.1.0 ls 5262 njriley mem REG 8,5 9680 450321 /lib/i686/cmov/libdl-2.7ls 5262 njriley mem REG 8,5 116414 450307 /lib/i686/cmov/libpthread-2.7ls 5262 njriley mem REG 8,5 1413540 450331 /lib/i686/cmov/libc-2.7ls 5262 njriley mem REG 8,5 24800 441511 /lib/1.1.0 ls 5262 njriley mem REG 8,5 95964 441580 /lib/1 ls 5262 njriley mem REG 8,5 30624 450337 /lib/i686/cmov/librt-2.7ls 5262 njriley mem REG 8,5 113248 441966 /lib/ld-2.7ls 5262 njriley 0u CHR 136,14 16 /dev/pts/14 ls 5262 njriley 1u CHR 136,14 16 /dev/pts/14 ls 5262 njriley 2u CHR 136,14 16 /dev/pts/14 ls 5262 njriley 3r FIFO 0,6 62083274 pipe ls 5262 njriley 4w FIFO 0,6 62083274 pipe ls 5262 njriley 5r REG 8,5 92312 8255 /bin/ls You can attach a breakpoint command list (sourceware.org/gdb/current/onlinedocs/gdb/Break-Commands.html) to any breakpoint, thus running lsof on a breakpoint.
In case it matters I'm using g 4.4.3, gdb 7.1, running on Ubuntu 10.04 x86_64.
The example shell scripts given here can just be saved to the build directory and run directly from the MSYS shell.
Although they specify an arm-elf target they should be suitable for any cross compiler if you change the target variable to suit your chosen processor.
After gdb hangs and I have to kill it to free the terminal (ctrl-C does not work, I have to do this from a different terminal window by getting the process id for that gdb session and using kill -9).
I'm guessing that gdb is hanging because it's waiting for the application to stop at the next instruction and somehow the application finished execution without gdb identifying this.
Does anybody have an idea why Core Dump Directory isn't working on Ubuntu?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247496080.57/warc/CC-MAIN-20190220190527-20190220212527-00637.warc.gz
|
CC-MAIN-2019-09
| 3,208
| 15
|
https://www7.in.tum.de/~kretinsk/LiVe2023.html
|
code
|
LiVe 2023: 7th Workshop on Learning in Verification
- Held as a satellite event of ETAPS'23 in Paris, on April 22, 2023
The success of machine learning has recently motivated researchers in formal methods to adapt the highly scalable learning methods to the verification setting, where correctness guarantees on the result are essential.
The aim of this workshop is to bring together researchers from the formal verification community that are developing approaches to exploit learning methods in verification as well as researchers from machine learning area interested in applications in verification and synthesis.
The general topic of machine learning in verification includes, for instance,
the use of learning techniques (e.g. reinforcement learning) for speeding up verification (e.g. rigorous analysis of complex systems combining non-determinism, stochasticity, timing etc.),
the use of machine learning data structures and algorithms (e.g. decision trees) for enhancing results of verification (e.g. generating simple invariants of programs generating small controllers of systems),
verification of machine-learning artefacts (e.g. verification of neural networks), or
- meta-usage of machine learning (e.g. to predict the best tools to be applied to a verification problem).
The 1st edition was held as a satellite event of ETAPS 2017 on April 29, 2017, in Uppsala, Sweden.
It featured 12 presentations and an invited talk by Kim G. Larsen (Aalborg University), who has an ongoing ERC Advanced Grant LASSO (Learning, analysis, synthesis and optimization of cyber-physical systems).
The 2nd edition was held as a satellite event of ETAPS 2018 on April 20, 2018, in Thessaloniki, Greece.
Apart from regular presentations, it featured two invited talks by Guy Katz (Stanford / Hebrew University) and Krishnamurthy Dvijotham (Google DeepMind) on verifying neural networks.
The 3rd edition was held as a satellite event of ETAPS 2019 on April 6, 2019, in Prague, Czech Republic. It included invited talks by Bettina Könighofer and Kristian Kersting and industrial talks by Martin Neuhäusser (Siemens) and Vahid Hashemi (AUDI).
The 4th edition had been postponed together with ETAPS 2020 and took place together with the 5th edition during ETAPS 2021 on March 27, 2021, as a virtual meeting. The invited was delivered by Martin Vechev and Matthew Mirman (both ETH Zurich).
The 6th edition was held as a satellite event of ETAPS 2022 (which we also organized) on April 2, 2022, in Munich, Germany. It featured an invited talk by Armando Tacchella (University of Genoa).
The workshop takes place on site in the room Hermite (the largest of all workshop rooms) of the Institut Henri Poincaré, 11 Rue Pierre et Marie Curie, Paris, France,
on April 22, 2023 (all times CEST).
Since the aim of the workshop is to stimulate discussion on the potential of learning techniques in verification and to report on recent advancements, we invite presentations of possibly already published as well as ongoing work.
The submissions should be abstracts of such work, limited to at most two pages in the llncs style, and will only be published in the informal pre-proceedings for the convenience of the participants. There will be no formal publication or post-proceedings.
The submission are to be done over Easychair.
- Paper submission:
February 1, 2023 deadline extended: March 8, 2023
- Notification: March 15, 2023
- Final versions for informal pre-proceedings: March 30, 2023
In case of any questions, please contact the organizer Jan Kretinsky at <name>.<surname>@tum.de
Looking forward to seeing you LiVe!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948708.2/warc/CC-MAIN-20230327220742-20230328010742-00719.warc.gz
|
CC-MAIN-2023-14
| 3,605
| 27
|
https://www.meetascent.com/resources/customizing-your-security-stack-mitre-attck
|
code
|
Ascent’s DevOps team designs custom software and automation flows, incorporating cyber threat intelligence (CTI) into products and hardened client environments. This blog outlines highly technical instructions for retrieving and implementing raw MITRE ATT&CK data into your tech stack.
We’ve discussed resources + reasons WHY we build MITRE ATT&CK into our software and tools. Now, let’s discuss HOW we can do that.
The code snippets below outline how to incorporate the data and tools provided by MITRE and demonstrate a breadth of the potential opportunities for further customization.
Example 1: Connect to a TAXII Server to get technique data
MITRE provides a TAXII server to which developers can connect and retrieve information. If we enumerate all the Collections in the response, we will see they align to the ATT&CK Matrices (Enterprise, Mobile, ICS). We can query into the Enterprise collection to gather technique details.
Example 2: Get STIX data about a technique
MITRE also provides STIX dumps in JSON format in a GitHub repo. You will notice we are using an object ID to retrieve details about a specific technique. Because the data is deterministic (per version), we know the details about this technique will always be the same, using this specific ID.
Example 3: Get the data in Excel
Sometimes a spreadsheet is the fastest way to get the information you need. We can grab ATT&CK data and write it to a file for later consumption.
Example 4: Build an ATT&CK Navigator Layer
Using the mitreattack-python package we can build custom Navigator layers from data programmatically. These generated layers can be loaded into ATT&CK Navigator for custom views of defensive coverage, threat capabilities, or even a combination of the two.
Interested in guided DevOps?
We believe DevOps is a critical element to resilient cybersecurity infrastructure. Want to learn more, but without all the code? Ascent offers a free MITRE ATT&CK Master Class where Brad Palm, Director for Software, covers the business use case for incorporating ATT&CK into your risk discussions.
Ascent is a world class cybersecurity organization driven to save the world from cybercrime. We interpret and incorporate ATT&CK data into our risk based, intel-driven, threat-informed strategy. Interested in this approach for your organization? Reach out to MITRE@meetascent.com to request a MasterClass or to explore partnership with our DevOps team.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473735.7/warc/CC-MAIN-20240222061937-20240222091937-00840.warc.gz
|
CC-MAIN-2024-10
| 2,433
| 14
|
https://help.getsoldlive.com/article/14-are-there-any-limitations-on-tags-or-products
|
code
|
Are there any limitations on variant options?
There are 2 limitations on variant options due to the way Facebook Messenger works.
For products, each variant has a limit of 13 options. So if a product comes in more than 13 colors, for example, the app will only display the first 13 as choices for your commenter to choose from:
One more limitation in the product variant options is the name of the option. Facebook has a limit of 20 characters for the buttons. So long option names can get cut off like this:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099281.67/warc/CC-MAIN-20231128083443-20231128113443-00279.warc.gz
|
CC-MAIN-2023-50
| 508
| 4
|
https://getintopc.today/java-se-development-kit-free-download/
|
code
|
In the wake of the JDK’s upgrade to tzdata2020b, the long-obsolete files named system and pacific new have been deleted. This means that the “US/Pacific-New” zone name listed in the Pacific new data file is no longer accessible to use. The “certificate_authorities” extension is an optional extension introduced in TLS 1.3. This license permits specific usages, including private use as well as development free of charge however, other use permitted under previous Oracle JDK licenses may no anymore be allowed. Be sure to read the conditions carefully prior to downloading and using this software. Get More Softwares From Getintopc
Java SE Development Kit
In the event that you want to know whether a version is the most recent, the Security Baseline page can be used to determine what is the most recent version for every release family. Java Platform, Standard Edition lets you create as well as deploy Java applications on desktops as well as servers. Java provides the extensive user interface speed, flexibility accessibility, security, and portability that applications of today require. It includes the complete JRE as well as tools for developing monitoring, debugging, and debugging Java applications. Commercial licenses and support are available at a minimal cost through the Java SE subscription. It is also accessible for personal use, and for running additional licensed Oracle products.
Java SE Development Kit Features
Additional tools are a disassembler an assembler, a debugger, and the Java command-line scripting shell or the policy management and creation software. Additionally, you have the access to the Java Virtual Machine component of JRE together with classes libraries and support files to help you implement your application. JDK contains demonstration source code and specific APIs for Java Foundation Classes like Swing and the Java Platform Debugger Architecture.
Additionally, it includes learning materials for Java programming language novices and beginners in the form of a variety of Java API core source files. The Java platform offers one environment for the development of software for different operating systems, such as Microsoft Windows, Mac OS X, or Linux distributions. With this JDK release, the “certificate_authorities” extension is supported for TLS 1.3 on both the client and the server sides. This extension is available to allow the client to select certificates however it is not available to select server certificates.
Scroll down and select OpenJDK 11 for Linux to download the package from OpenLogic. Scroll up and choose Java 11 for your Windows to download the JDK package from OpenLogic. Security properties and new system features were added to allow users to modify the production of PKCS #12 keystores. This includes parameters and algorithms for key protection, certificate protection, and MacData. The complete explanation, as well as potential values of these parameters, are found within the “PKCS12 KeyStore property” area within java. security document.
A new option -group name is available to keytool genkeypair so that the user can choose the name of a group when creating keys. For instance, keytool genkeypair keyalg EC -group name secp384r1 can create an EC key pairing by making use of the secp384r1 curve. Since there may be several curves of identical size, the group name option is recommended over the keys option. It comprises the JRE, the JVM, and core classes libraries, compilers, debuggers, and documentation.
The identical warning is printed at the time of the operation jarsigner -verify of the same files. Oracle suggests the use of the JDK is upgraded every critical Patch Update. The Java SE Development Kit also known as JDK is an expanded subset of software that can be used to create applications using the Java programming language. The bottom line is that Java Development Kit provides an array of powerful tools and everything else that is designed to help programmers, regardless of their experience level in creating Java applications. However, JDK is the bread and butter of every Java developer.
The Kerberos client has been improved by the support for principal name canonicalization as well as cross-realm referrers, as defined in the RFC 6806 protocol extension. If the library isn’t present the client will not work. the Pkg system will need it when installing the JDK.
How to Get Java SE Development Kit for Free
OpenLogic also provides commercial assistance for the various Java distributions, which includes Adopt OpenJDK, IBM, and Oracle’s Java. Java support provided by OpenLogic includes security updates and bug fixes, along with guidance for the management and use of Java and the JVM. The default list of names can be modified making use of the System property JDK.tls.named groups.
We thank you for downloading the latest edition of the Java(tm) Platform, Standard Edition Development Kit (JDK(tm)). The JDK is an environment for development that allows you to build applications and components with the Java programming language. Scroll to the top and select JDK 8 for your platform to download the package from OpenLogic.
Users are able to still create individual named curves for disabledAlgorithms properties, but they must be separate from this property. Other properties cannot be added to the disabledAlgorithms property. To restore the named curves, remove the include JDK.disabled.namedCurves either from specific or from all disabledAlgorithms security properties.
To restore one or more curves, remove the specifically named curve from the JDK.disabled.namedCurves property. Applications can enable this extension for server certificate selection by setting the JDK.tls.client.enables extension system property to true.
Java 17 LTS is the most recent long-term support release on the Java SE platform. JDK 17 is available for free for use on production, and distributed for redistribution free of charge, in accordance with the Oracle No-Fee terms and conditions. Modularity is a new feature in order to support the scaling down of small computers. Modularization allows the code to be refactored for simpler maintenance. It is self-describing collections of code, data, and other resources.
It’s used to show the certificates that the endpoint is able to support and is recommended to be used to the receiving endpoint in order to guide the choice of certificates. JRE 8 software is licensed under the Oracle Technology Network License Agreement for Oracle Java SE. JDK 8 software is licensed under the Oracle Technology Network License Agreement for Oracle Java SE.
JDK 11 software has been licensed by the Oracle Technology Network License Agreement for Oracle Java SE. The downloaded software can be used to develop, for personal use as well as for running Oracle licensed software. Other uses for commercial or production use are required to have the purchase of a Java SE subscription or another Oracle license.
Java SE Development Kit System Requirements
- Operating System: Windows XP/Vista/7/8/8.1/10
- Memory (RAM): 512 MB of RAM required.
- Hard Disk Space: 400 MB of free space required.
- Processor: Intel Pentium 4 or later.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506028.36/warc/CC-MAIN-20230921141907-20230921171907-00074.warc.gz
|
CC-MAIN-2023-40
| 7,191
| 23
|
http://www.linuxquestions.org/questions/linux-server-73/webmin-locked-root-user-4175455086/
|
code
|
webmin locked "root" user
webmin has lock superuser root from login into it.iam not having another user to login and unlock. how can i unlock root
while login it errors
Error - Access denied. The user has been blocked because of too many authentication failures.
Pls provide some solution if any one knows
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118950.30/warc/CC-MAIN-20170423031158-00623-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 305
| 5
|
https://coderanch.com/t/245290/certification/time-thread-running-throwing-exception
|
code
|
above script is printing only one "hello". second start() is not printing hello why? I thought calling same thread twice cause IllegalThreadState exception. but it is not giving exception also. (code tags added - use edit button to see how to do it) [ April 28, 2004: Message edited by: Barry Gaunt ]
First of all, sorry about reply above (had a slight problem with my tab key ). Could one of the administrators delete this please ?
This code will print "hello" during the run of the thread because of the first start() invocation. The second time you call start() on this thread, that thread will already be dead because you have a join in your code. The implementation of JVM 1.4 allows you to do this, but it will not run the thread again, because a dead thread stays dead. Hence, no second printing of "hello". Now the strange part. Even though the JVM 1.4 implementation does not throw an exception (you would expect a IllegalThreadStateException), if you get a question on the exam about it, you should say that it does throw one (because it says so in the official API). Hope this helps.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587767.18/warc/CC-MAIN-20211025185311-20211025215311-00621.warc.gz
|
CC-MAIN-2021-43
| 1,094
| 3
|
https://www.rainbowyogatraining.com/pages/europe-virtual-open-day
|
code
|
Making the world a better place is FUN! and you can do it too!
An inspiring conversation between our founder Gopala Amir Yaffa and our ecstatically fun Rainbow Yoga Senior Trainer Benjamin Hart!
Thursday, November 26th
9am London Time / 10am Paris time / 11am Tel Aviv Time /
12pm Moscow Time / 1pm Dubai Time / 4pm Bangkok Time /
5pm Hong Kong / 8pm Sydney time / 10pm Auckland
We will discuss how we can make the world a better place by teaching yoga for kids, teens and families and making a difference with this form of grassroots yoga activism through educating the next generation.
Rainbow Yoga is transformative and FUN!
Let us show you how.
The talk will take place on Zoom and there will be space for questions and answers from all of you as well.
We have trained over 30,000 kids yoga teachers all around the world with our much loved trainings!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141652107.52/warc/CC-MAIN-20201201043603-20201201073603-00088.warc.gz
|
CC-MAIN-2020-50
| 855
| 11
|
https://www.onlineyoutubeconverter.net/topic/how-does-robinhood-make-money
|
code
|
how does robinhood make money
How to Buy and Sell Stocks on Robinhood (Beginner App Tutorial)
By: Honest Finance - 1 years ago
How to buy and sell stocks on the Robinhood app. Get a Free Robinhood Stock: https://share.robinhood.com/sl-jasona235 (Referral link) And get 2 free stocks ...
How Robinhood Makes Money
By: CNBC - 2 years ago
Robinhood, an investing app valued at over $5 billion, says it's trying to "democratize America's financial system" by making investing accessible to the little guy ...
How Robinhood Really Makes Money
By: Financial Education - 2 years ago
After yesterdays video on the Robinhood app 3% savings account and checking account many people were asking how Robinhood makes money. I know how ...
How RobinHood Makes Money | 2020 Edition
By: MHFIN - 9 months ago
How Robinhood App Makes money including concerns about frontloading, market makers, order selling and more.
This is how Robinhood makes money while offering free trades
By: CNBC Television - 1 months ago
CNBC's Kate Rooney takes a look at how Robinhood brings in revenue. For access to live and exclusive video from CNBC subscribe to CNBC PRO: ...
How To Make Money On Robinhood For Beginners (EASY WAY) 2019
By: Casper Trader - 1 years ago
How To Make Money On Robinhood For Beginners (EASY WAY) 2019 Using the Robinhood App to Trade Stocks, I will attempt to grow $500 into over ...
How Robinhood Really Makes Money
By: Ryan Scribner - 1 years ago
My 5 Step Money Making Blueprint: https://www.ryanoscribner.com/start Follow Me On Instagram: @ryanscribnerofficial ___ FREE Resources From Ryan ...
What you MUST KNOW about Robinhood Investing
By: Graham Stephan - 11 months ago
After the Robinhood incident, lets discuss how they make money - what this means for the company - and how this might affect their potential IPO. Enjoy! Add me ...
How To Make Money on Robinhood For Beginners 2020! (Easy Way)
By: Silent Investor - 5 months ago
Use these Links to Get 3 FREE stocks! https://join.robinhood.com/raquelv163 https://act.webull.com/i/R4uY3GKoHzTM/j9p/ Checkout These Videos: This Stock ...
Can You Make Money with the Robinhood App? Our Honest Review!
By: Debt Free Millennials - 1 years ago
Can you make money with the Robinhood app? Kyle and I tested the app and have a few things to say about it. Well, mainly Kyle tested it and I took copious ...
How To Use Robinhood - Step by Step Tutorial
By: Andrei Jikh - 2 years ago
Learn how to buy and sell stocks using the Robinhood app (+ FREE STOCK INSIDE). It's not that difficult to get started building your own investment portfolio that ...
How Robinhood Makes Money On Free Trades
By: Bloomberg Markets and Finance - 2 months ago
With so many people working at home, bored, and with no sports to bet on, there's been an incredible explosion of retail stock market trading. One service ...
Earning $2,000 From $50! Robinhood Challenge - Week 1
By: Alex Fox - 6 months ago
Hey guys! CHALLENGE HAS BEEN COMPLETED: https://www.youtube.com/watch?v=RQCHd1XwOFA I decided to switch up the tempo and start making a ...
How To Make +$500 A Day on Robinhood | Tutorial For Beginners
By: Paul NGumah - 3 months ago
Everybody, Welcome back to my channel! In this brief tutorial for BEGINNERS, I go in great depth how you can make +$500 a day on Robinhood. My trades in ...
How does the Robinhood App MAKE MONEY?
By: DrUnlimited - 3 years ago
NEW CHANNELS: TechStockHouse: https://www.youtube.com/channel/UC8IzbdgN-IDXlWH0dNdgGag TechCryptoHouse: ...
How Does Robinhood Make Money?
By: The Millennial Investor - 3 months ago
Are you new to the stock market? Would like some help getting started with your new portfolio? You now have the chance to speak to me live through a cell ...
How To Use Robinhood App In 2020 - To Make Money
By: Fliptroniks - 9 months ago
Robinhood Sign Up: https://geni.us/FE2cqTH Follow Us: Our Website: http://www.fliptroniks.com Instagram: http://www.instagram.com/fliptroniks Facebook: ...
How I Made $30,000 in 1 Week Stock Trading on Robinhood
By: Royce Jakob - 4 months ago
My Complete Portfolio + Daily Newsletter. This is a complete list of my options, stocks, and cryptocurrency positions. I update it every trading day during market ...
HOW I MADE $800 in 2 DAYS TRADING STOCKS on RobinHood and ThinkorSwim
By: Hacks4L - 1 years ago
Get a 14k Funded account for only $375! http://bit.ly/hacks4Ltrades Join my free Discord Group https://discord.gg/WRWyk6F FREE TRADING COURSE ...
Most Popular Topics
good hindi action movies on netflix hindi action movies comedy hindi action movies on netflix 2020 list of hindi action movies 2020 hindi action movies 2019 with english subtitles list of hindi action movies 2017 good hindi action movies 2018 hindi action movies on netflix 2019 i apple store near me upcoming hindi action movies 2020 hindi action movies 2019 full movie english good hindi action movies 2019 hindi action movies to watch on netflix hindi action movies on netflix hindi action movies come i apple watch icon good hindi action movies to watch list of hindi action movies 2019 i apple watch waterproof hindi action movies 2017 hindi action movies 2020 hindi action movies 2020 list hindi action movies 2020 full movie hindi action movies 2019 bollywood list of hindi action movies 2018 baaghi 2 full movie in hindi action movies 2018 hindi action movies in netflix new hindi action movies youtube hindi action movies new 2019 hindi action movies 2019 youtube
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400265461.58/warc/CC-MAIN-20200927054550-20200927084550-00502.warc.gz
|
CC-MAIN-2020-40
| 5,446
| 60
|
http://www.controvert.co/we-are-importing-knowledge-about-ourselves/
|
code
|
On Wikipedia edits:
On the vertical axis of the figure we can see a clear division between regions that are largely able to define themselves and regions that are largely defined by others.
The world regions separate into two distinct groups of three (with Asia in the middle): Sub-Saharan Africa, Middle East & North Africa, Latin America & Caribbean receive comparatively few edits from within their territories (around 25 percent). Europe, Oceania and North America on the other hand receive primarily edits from within (around 75 percent). Asia is edited from within and from outside to almost equal degrees. In other words, there are significant parts of the world in which a majority of content is not locally generated.
Even when editors from Sub-Saharan Africa spend most of their edits within region, their small numbers mean that most content still comes from elsewhere….
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590127.2/warc/CC-MAIN-20180718095959-20180718115959-00627.warc.gz
|
CC-MAIN-2018-30
| 883
| 4
|
https://learn.microsoft.com/en-us/sql/t-sql/functions/object-definition-transact-sql?view=sql-server-ver16&redirectedfrom=MSDN
|
code
|
Returns the Transact-SQL source text of the definition of a specified object.
OBJECT_DEFINITION ( object_id )
To view Transact-SQL syntax for SQL Server 2014 (12.x) and earlier versions, see Previous versions documentation.
Is the ID of the object to be used. object_id is int, and assumed to represent an object in the current database context.
Returns NULL on error or if a caller does not have permission to view the object.
A user can only view the metadata of securables that the user owns or on which the user has been granted permission. This means that metadata-emitting, built-in functions such as OBJECT_DEFINITION may return NULL if the user does not have any permission on the object. For more information, see Metadata Visibility Configuration.
The SQL Server Database Engine assumes that object_id is in the current database context. The collation of the object definition always matches that of the calling database context.
OBJECT_DEFINITION applies to the following object types:
C = Check constraint
D = Default (constraint or stand-alone)
P = SQL stored procedure
FN = SQL scalar function
R = Rule
RF = Replication filter procedure
TR = SQL trigger (schema-scoped DML trigger, or DDL trigger at either the database or server scope)
IF = SQL inline table-valued function
TF = SQL table-valued function
V = View
System object definitions are publicly visible. The definition of user objects is visible to the object owner or grantees that have any one of the following permissions: ALTER, CONTROL, TAKE OWNERSHIP, or VIEW DEFINITION. These permissions are implicitly held by members of the db_owner, db_ddladmin, and db_securityadmin fixed database roles.
A. Returning the source text of a user-defined object
The following example returns the definition of a user-defined trigger,
uAddress, in the
Person schema. The built-in function
OBJECT_ID is used to return the object ID of the trigger to the
SELECT OBJECT_DEFINITION (OBJECT_ID(N'Person.uAddress')) AS [Trigger Definition];
B. Returning the source text of a system object
The following example returns the definition of the system stored procedure
SELECT OBJECT_DEFINITION (OBJECT_ID(N'sys.sp_columns')) AS [Object Definition];
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819971.86/warc/CC-MAIN-20240424205851-20240424235851-00751.warc.gz
|
CC-MAIN-2024-18
| 2,202
| 28
|
http://www.redease.com/computer-support/monitor-security-cameras-alert-problems/
|
code
|
We install and monitor security camera systems. Many of these systems are computer based and if set up correctly can be very reliable. When you put your security camera computer on an EZ Support plan, you get reliable security maintenance and support.
The following outlines a quick example of how we help: We have a customer with a security camera system running on a computer that we support. This computer was shut down by accident one night by an employee’s kid pushing buttons. Using our tools, we discovered the problem and notified a company employee. Then we helped the employee fix the problem and get the security camera’s running again.
We knew before they knew that they had an issue with their security software. They were grateful for our help in quickly resolving the issue and making sure it couldn’t happen again.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701543416/warc/CC-MAIN-20130516105223-00002-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 836
| 3
|
https://dev.mysql.com/worklog/task/?id=423
|
code
|
WL#423: Binlog direct connect to server to reply log
Affects: Server-7.1 — Status: Un-Assigned
This task was initially specified a bit vague. The task is to add an option to mysqlbinlog to be able to connect to the server to reply log file (it already can read log file from server) - this would allow to remove need of piping it output to "mysql". This is important to - solve problems with pipe in Windows which can't pass some characters - solve problems with LOAD DATA INFILE - currently mysqlbinlog leaks temporary files for replicating these as it is unable to decide when file shall be deleted - have more potentially more efficient execution of some commands.
Copyright (c) 2000, 2021, Oracle Corporation and/or its affiliates. All rights reserved.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583087.95/warc/CC-MAIN-20211015222918-20211016012918-00183.warc.gz
|
CC-MAIN-2021-43
| 758
| 4
|
https://v4-4-3.material-ui.com/components/autocomplete/
|
code
|
The autocomplete is a normal text input enhanced by a panel of suggested options.
Material-UI doesn't provide a high-level API for solving this problem. You are encouraged to use a solution the React community has built, following one of the examples below.
This example demonstrates how to use downshift.
The last demo allows the user to clear the input and show a number of options on focus.
This example demonstrates how to use react-select.
For more advanced use cases you might be able to take advantage of:
- material-ui-chip-input: The chip input is used to allow selecting multiple text values.
- mui-downshift: A thin layer over paypal's downshift to use Material-UI visual components.
- material-ui-autosuggest: A fuzzy-search component for React and Material-UI.
- react-select-material-ui: Extend react-select with Material-UI.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400192778.51/warc/CC-MAIN-20200919142021-20200919172021-00771.warc.gz
|
CC-MAIN-2020-40
| 839
| 10
|
https://en.loulouessentiels.nl/products/laptoptas-37bag-medium-vintage-croco-black
|
code
|
This stylish black work bag is your new best friend! With a padded 13 inch laptop compartment, lots of storage compartments, comfortable handles and a detachable long handle, this bag is a real powerhouse! Combine this with the classy Vintage Croco leather and voila: the perfect work bag.
Vintage Croco, rightly a LouLou favorite! This beautiful cow leather with a natural look and feel has a coarse croco print and natural 'two tone' coloring, which gives the leather extra dimension. The leather only gets better in use, but care and protect Vintage Croco with the Pretty Protector spray.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487613453.9/warc/CC-MAIN-20210614201339-20210614231339-00211.warc.gz
|
CC-MAIN-2021-25
| 591
| 2
|
http://cboard.cprogramming.com/c-programming/3711-help-malloc.html
|
code
|
Hello all... I have a test upcoming on Malloc and was wondering if you could answer some questions for me.
do I need to call malloc for each instance that I want to store a string into a 2 dimensional array or can i just use realloc?
like for instance if i have a loop collecting strings into a 2 dimensional array and i call malloc to a certain "buffer" size outside of the loop, will i only need to call it once? i understand that i can use realloc to resize the buffer to the size of the largest line in the array. but would i need to use a temp array to store the current string then find its strlen and if that string is the largest line use realloc to resize the buffer?
was wondering if anyone could write some dummy code demonstrating the above... if not maybe just an explanation would be fine. Thanks all... =)
oh if you know any webpages that have good detailed examples of malloc that would be great because my book really sucks.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701159376.39/warc/CC-MAIN-20160205193919-00145-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 941
| 5
|
https://www.daniweb.com/programming/software-development/threads/227162/how-to-count-ouccurance-of-a-string-in-ms-access-database-in-c
|
code
|
Hi Dear Friends...!!!
I am developing a Attendance System in C# using MS Access Database.
I want to Count the totall P and A in the Attendance Column...
now Dear Friends Please tell me any Query or logic to do the above work...!!!
***P for Present***
***A for Absent ***
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499954.21/warc/CC-MAIN-20230202003408-20230202033408-00331.warc.gz
|
CC-MAIN-2023-06
| 270
| 6
|
https://nationalnonprofits.org/nonprofit-organizations/open-supply-hub/new-york-ny-usa
|
code
|
Brought to you by the team behind the Open Apparel Registry (OAR), Open Supply Hub (OS Hub) will make global supply chain data accessible to all. Launching in late 2022, it will be an accessible, collaborative, supply chain mapping platform, used and populated by stakeholders across sectors and supply chains. It will provide:
Reliable data: all data contributed to the platform is cleaned and deduplicated by a matching algorithm, and then assigned an industry-standard ID.
One common registry: cross-sector supply chain data is collected in a single place, accessible to all.
Global collaboration: the user-generated dataset gives visibility into which organizations are connected to which facilities, accelerating collaboration.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510225.44/warc/CC-MAIN-20230926211344-20230927001344-00241.warc.gz
|
CC-MAIN-2023-40
| 732
| 4
|
https://www.neaspec.com/publication/nanoletters-article-asap-5/
|
code
|
S. Dai , J. Quan, G. Hu, C.-W. Qiu, T. H. Tao, X. Li and Andrea Alù
Nanoletters, Article ASAP (2018)
Highly confined and low-loss hyperbolic phonon polaritons in hexagonal boron nitride possess properties analogous to surface plasmon polaritons, but with enhanced confinement and lower loss. Their properties have been so far mostly studied on dielectric substrates, which provide an asymmetric environment for polariton propagation, and add to damping. In this work, we investigate hyperbolic phonon polaritons over suspended hexagonal boron nitride, showing remarkable properties, including elongated polariton wavelength and reduced damping, up to 18% lower compared to dielectric-backed samples. We use real-space nanoimaging of the polaritons in hexagonal boron nitride to demonstrate and visualize these effects. Our results indicate that suspended boron nitride offers better figures of merit for polariton transport, which are generalizable to other polaritonic materials, and they may be explored in heterostructures for advanced nanophotonic applications.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103810.88/warc/CC-MAIN-20231211080606-20231211110606-00130.warc.gz
|
CC-MAIN-2023-50
| 1,066
| 3
|
http://phytophactor.fieldofscience.com/2013/04/botanical-field-work-and-snakes.html
|
code
|
Mostly TPP has a laissez-faire relationship with snakes: if they don't bother me, TPP won't bother them. For about a decade, a great deal of TPP's field work was done in Queensland, the wet tropics in the vicinity of Cairns (one of my study sites can be seen from the city's harbor, in the distance). If there's anything you need to learn quickly in Queensland before venturing into its rainforests, it's that virtually every snake that isn't a python is poisonous and certain bushes and trees have vicious stinging hairs. So when an Aussie field hockey player tries to remove a snake from the field and gets bitten in the process, and dies because it's one of the truly dangerously toxic venomous snakes, you have to sort of wonder about where he was brought up. Dang, TPP had just one encounter with a taipan, and an image of this sleek snake was burned into his skull after shooing one out of the parking area behind his QLD apartment. His study site was alive with the common brown snake, another top 10 venomous snake (see linked article for a top 10 rundown), but a rather shy and rather easily intimidated snake. Good thing! This makes TPP's current study site in Costa Rica relatively safe what with only fer-de-lances lurking everywhere in the leaves. There are lots of other little vipers around: eye-lash viper, hog-nosed viper, and the not so little bushmaster, and in spite of nearly stepping on a hog-nosed viper on his first day at this field station, TPP still feels safer than when in Australia. So what was the field hockey player's big, and fatal, mistake? Not wearing Wellington boots! Hey, got any field work volunteers out there?
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123484.45/warc/CC-MAIN-20170423031203-00186-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,651
| 1
|
https://www.spinellis.gr/pubs/jrnl/1999-TISS-Reflect/html/reflect.html
|
code
|
Copyright © 2000 by the Association for Computing Machinery, Inc.
Permission to make digital or hard copies of part or all of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that
copies bear this notice and the full citation on the first page.
Copyrights for components of this work owned by others than ACM must be
Abstracting with credit is permitted.
To copy otherwise, to republish, to post on servers, or to redistribute
to lists, requires prior specific permission and/or a fee.
Request permissions from Publications Dept, ACM Inc.,
fax +1 (212) 869-0481, or firstname.lastname@example.org.
Reflection as a Mechanism for Software Integrity Verification
Department of Information and Communication Systems
University of the Aegean
The integrity verification of a device's controlling software is an
important aspect of many emerging information appliances.
We propose the use of reflection, whereby the software is
able to examine its own operation, in conjunction with cryptographic
hashes as a basis for developing a suitable software verification protocol.
For more demanding applications meta-reflective techniques can
be used to thwart attacks based on device emulation strategies.
We demonstrate how our approach can be used to increase the
security of mobile phones,
devices for the delivery of digital content, and
Operating Systems Security and Protection
Information appliances and other
devices with embedded software are becoming ever more sophisticated
and widely used [Hal98]; increasingly in situations where their
integrity is a prime concern.
The complexity of their software and the rapidly evolving
environment they are nowadays called
to work-in often mandate a field programming feature.
Using this feature the owner or manufacturer can rapidly fix problems found
after the product has left the factory, or even introduce new
Devices fitting the above description include mobile phones [CH99],
sophisticated set-top boxes such as Web-TVs,
credit card terminals,
automatic teller machines,
and space probes.
As these devices often operate in a domain not fully controlled by the
software's stakeholders their software can be compromised.
An adversary might want to modify a device's software in order to
bypass the device's anti-theft measures or intellectual property protection
or implant a surveillance or
denial of service Trojan horse.
A mechanism is therefore needed to remotely verify the integrity
of a device's controlling software.
In the following sections we will describe the problem,
propose a solution based on software reflection, and
outline some applications of our approach.
The remainder of this paper is structured as follows:
Section 2 outlines the problem we are addressing
and the underlying assumptions;
Section 3 describes the reflection-based solution strategy;
Section 4 contains an analysis of our approach's
while Section 5 provides examples of possible applications.
In Section 6 we outline work related to our approach,
and Section 7 concludes the paper with an assessment
of the approach's contribution.
2 The Problem
The problem concerns the integrity verification of a device's controlling
For risk analysis purposes we assume that the assets that are to be protected
and the respective threats
are those associated with consumer goods and services.
2.1 An Exemplar Threat
The global system for mobile communications (GSM),
apart from the mobile subscriber identification and privacy security,
provides functionality to secure the mobile terminal equipment
(e.g. mobile phones) against theft.
Each GSM terminal is identified by a unique International Mobile
Equipment Identity (IMEI) number [MP92].
A list of IMEIs in the network is stored in the Equipment Identity
Register (EIR). The status returned in response to an IMEI
query to the EIR is one of the following:
- The terminal is allowed to connect to the network.
- The terminal is under observation from the network for possible
- The terminal has either been reported stolen, or is not type
approved (as the correct type of terminal for a GSM network).
The terminal is not allowed to connect to the network.
A widely used mobile phone stores the IMEI number in an
EEPROM (read-only memory that can be electrically re-programmed).
The phone also provides a ``debug mode'' which is accessed by setting an
external connector pin to a high voltage and sending a specific command
sequence through the phone's serial interface.
The debug mode allows the programming of all the EEPROM contents,
including the control software and the location used to store the
as a security measure,
the phone's software detects alterations to the IMEI number
and resets all transceiver calibration data rendering the phone unusable.
since all the phone's program and data memory is field programmable using the
phone's serial interface, a sophisticated thief could reprogram a stolen phone
with software that did not perform the IMEI security checks and a new IMEI.
Our problem can be formulated around the following entities:
- The client is a software-controlled field-programmable
device whose software integrity the software stakeholder wishes to protect.
Examples of such clients are the devices outlined in Section 1.
- Software Stakeholder
- The software stakeholder is an entity
which has a business, legal, or regulatory interest in protecting
the software's integrity.
Examples of software stakeholders are the GSM operators,
the owners of communication satellites, or the operators of pay-per-view
- The server is a secure computer system under the
control of the software stakeholder.
The server can communicate with the client using a suitable
communication protocol such as the remote procedure call.
- The adversary is an entity which has an interest
in modifying the client's controlling software against the software
The approach we propose is meaningful when the entities we described
operate within a framework of specific assumptions.
These assumptions, although they can not be guaranteed
are realistic under a risk-analysis view [Pfl96]:
they hold true for a wide set of typical assets that are
to be protected and associated threats.
Examples of such typical asset-threat pairs include the illegitimate
operation of a mobile phone by a well-connected street criminal,
or the unauthorized viewing of a pay-per-view movie by a
The adversary can reverse engineer the client's software and hardware.
We assume that the client's software including the software that
controls the software upload session is stored in unprotected
memory devices which can be read, reverse engineered, and modified.
This assumption is typically valid due to cost restrictions imposed by
tamper-resistant hardware and the low cost associated with modifying
many firmware storage technologies such as EEPROMs,
flash ROMs, and CD-ROMs.
The adversary can modify the client's software at will.
As we will explain in Section 3.1.1 it is not
feasible to protect the client's upgrade procedure when
Assumption 1 holds true.
The adversary can not modify or substitute the client's hardware.
Under the risk analysis regime we outlined the cost of this operation
would be prohibitive compared to the potential benefits.
The adversary can not mount a man in the middle attack.
This mode of attack is often difficult and costly; its cost is
comparable to that of the hardware substitution (Assumption 3).
In addition, if such an attack is mounted the integrity of the client's
software will be the least of the software stakeholder's concerns.
The effective entropy of the machine representation of the client's
functioning software is for practical purposes equal to the device's
This assumption means that the client is not allowed to contain empty
or low-entropy memory contents.
To realize this assumption empty memory can be filled with random data.
In addition, low entropy memory can be compressed to increase its entropy.
For cases where this approach is not feasible,
in Section 3.3 we outline an extension to our approach
which obviates the need for this assumption.
3 Solution Strategy
A number of solutions to the problem we outlined turn out to offer
relatively weak protection or be infeasible in practice.
In the following paragraphs we briefly outline these approaches,
because each one of them contains a part of the solution we propose.
3.1.1 Programming Authentication
Protecting the client's software integrity from unauthorized modification
can be viewed as a standard access control problem solved through a
suitable identification and authentication (I&A) service.
I&A is the twofold process of
identifying an entity and afterwards validating the identity of
In order to implement an authentication mechanism,
one must determine what information will be used to validate the
Whatever that information is, it can be described
by one or more of the following categories:
- secret information (something the user knows),
- possession of a device (something the user has),
- biometrics (something the user is), or
- location-based authentication (somewhere the user is).
Thus, the client could implement an I&A protocol for the
software upgrade disallowing unauthorized software modifications.
Unfortunately, since the adversary can reverse-engineer the client's
software, she can also reverse engineer the client's authentication
protocol and keys, and consequently obtain access to the software
3.1.2 Code checksum
One other approach could involve the calculation of a checksum of all
the client's program memory contents.
The server could then periodically query the client for that checksum and
verify it against a locally stored copy.
The obvious weakness of this approach is that rogue software uploaded
to the client by the adversary could implement a dummy version of the
checksum function that would send back the checksum of the original software.
3.1.3 Code transfer
Although the adversary could implement a dummy checksum calculation
function, it would be impossible for her, to store a complete copy
of the original software in conjunction with the modified version
due to the constraint imposed by the Assumption 5.
The server could therefore verify the client's software integrity
by requesting the client to transmit a copy of its operating software.
The problem of this approach is the bandwidth required to implement it.
Many clients communicate over a low bandwidth channel, yet contain
a large amount of controlling software.
Transmitting a copy of the software to verify its integrity could
consume large amounts of time over a potentially costly communications
Our approach is based on a synthesis of the two solution attempts
3.2 Reflection-based Verification
Our solution is based on having the client's software respond
to queries about itself.
The theoretical basis for this course is reflection.
The foundation for the concept of reflection is Smith's reflection
``In as much as a computational process can be constructed to reason
about an external world in virtue of comprising an ingredient process
(interpreter) formally manipulating representations of that world, so
too a computational process could be made to reason about itself in
virtue of comprising an ingredient process (interpreter) formally
manipulating representations of its own operations and structures.''
Based on this hypothesis, reflective programs can access,
reason about, or alter their interpretation.
An important property of reflection is the casual connection between the
system's internal structures and the domain they represent [Mae87].
It is this property of reflection, that requires the connection to internal
structures and the represented domain to be behavioral rather than just
functional, that we exploit to provide an authentication mechanism.
Specifically, we reason that the internal representations of a
system can be used to authenticate its external, functional properties.
Although the semantics of reflection in programming languages
are often complicated,
our requirements are modest and can in most cases be satisfied as a
normal part of the system's implementation i.e. without imposing special
needs on the implementation language or environment.
For our application it is sufficient to amend the client's program
with the ability to access its own internal, machine-code representation.
Thus, the theory-relative self-knowledge implied by reflection boils down
in our case to read-only access of the program's internal representation.
If the client's program and its associated data are stored in memory locations
[0-L] the program needs to be able to bind the name of a memory location
M with the value of its contents V and obtain that value.
The viability of this operation is a consequence of a shared code-data
(von Neumann) architecture and made possible in languages that support
the use of unrestricted pointers such as C and C++.
At a higher level, access to an application's code memory can be supported
through operating system abstractions such as system calls or special
block device files [Yok92].
In order to be able to verify the integrity of the device's software,
stakeholder Bob (B) amends the protocol the server uses
to communicate with the client device (D) by adding the following message:
This message requests from the device to compute and send back a
cryptographic hash [PS93] (message digest) such as RIPEMD-160
[DBP96] of its
program storage locations ranging from S to E.
When the device receives this
message it responds with the tuple:
which contains its operating
program version V and the computed hash value H
for that given version.
In order to verify the integrity of the device's software,
B needs to choose two random integers M1 and M2 that
satisfy the following condition:
The following message exchange will then take place:
B will then retrieve from the server's secure database a copy of the
same software version VL, calculate the corresponding hash values,
and compare them against the values sent by D:
If the two
values do not match B knows that the software has been tampered and can
refuse service to that device, or reprogram it with the correct software.
The verification procedure we outlined overcomes the problems described in
Specifically, unauthorized software modifications of any part of the
software, including the part that implements the verification protocol,
will be detected, as the modified software will be covered by the
input range of at least one of the two hash functions and the respective function
will yield a result different
from the one calculated by the server on the original software.
In addition, as the two positions used to delimit the ranges of the
hash functions are specified dynamically as random integers
during the protocol operation, the rogue software can not precalculate and
store all possible responses to the hash value query message 1;
storage availability for storing the precalculated values is restricted
by Assumption 5.
Finally, the amount of information transferred using the outlined protocol
is modest totaling less than 64 bytes in both directions for a 160 bit
hash function; it is therefore practical to implement it even over
low bandwidth channels.
The hash function used for evaluating the return value should be a
cryptographicaly secure function such as RIPEMD-160.
For a given program version V and a program of length L + 1
this function maps the 2(L+1) different (S, E) tuples that can
be requested by B onto the corresponding hash values.
The properties of this function should
preclude its emulation by any implementation other than one that has access to
the original program code.
As M2 £ M1 the hashes computed will span over the entire
program storage locations of D.
With RIPEMD-160 hash function implementations computing hashes
at 19.3 Mbit/s (portable C implementation)
up to 39.9 Mbit/s (hand-tuned x86 assembly) on 90 MHz Pentium
machines [BGV96] the performance of our approach is within
the practical limits of both high-end (e.g. 2Mbyte ROM 100MHz processor
information appliances) and low-end (e.g. 20Kbyte ROM 10MHz processor
3.3 Meta-reflective Extension
Our Assumption 5 specifies that
the effective entropy of the machine representation of the client's
functioning software is for practical purposes equal to the device's
This assumption is not always easy to satisfy in practice.
Physical memory contents are typically of low entropy and thus
An adversary could therefore compress the original software into an
unused memory area and then execute and digest the compressed version
using on-the-fly decompression techniques.
A way around this attack is based on the difficulty of
predicting and monitoring a modern machine's processor behavior.
Although in the absence of external interrupts (which can be disabled)
a processor operates in a deterministic fashion,
the exact modeling and prediction of a modern processor's
state after a calculation is nowadays impossible without
a low-level simulator and intimate knowledge of the processor's
The difficulty arises in
sophisticated pipelined processor architectures [HP96]
from the interdependencies of the multiple functional units, the many
levels of cache, and branch predictors all dynamically changing
their behavior as the program executes [Spi99].
Processor state can be set to a known value before the
message digest calculation and returned as part of the
result to the server.
The server can then query a client known to contain valid software
for the same values and compare the results.
Examples of processor state that can be queried are the
contents of the processor's cache or the processor's clock-cycle
granular ``performance counter''.
On-the-fly decompression will be immediately revealed by examining
the number of clock-cycles that were required to calculate the hash
using the performance counter.
In addition, the behavior of the cache is affected by its
n-way associativity - even a shift of the client's software to
a different address will probably affect the cache's behavior
during the program's operation.
The meta-reflective extension to the protocol we propose can be
implemented by amending the message exchange 1
(the reply of D) to contain a representation
of the state TD at the end of the calculation of H(V,S,E):
B will then need to perform the same calculation on a second device
D¢ known to contain a authentic version V of the software and compare
the corresponding results:
Although the precise details for obtaining T are hardware architecture and
implementation dependent the general outline of this procedure is as follows:
- Disable external interrupts.
- Set the system state to a known initial value
(e.g. clear the cache and the clock counter).
- Perform the hash calculation.
- Record the final system state T.
- Re-enable external interrupts.
4 Vulnerability Analysis
An obvious vulnerability of the described scheme stems from the possibility of
storing the original program code into locations not read by the hash function
(e.g. unused memory) and using that code for generating the hash reply.
A practical implementation of this approach could only store the original
parts of the modified portions in unused memory and adjust the digest function
vulnerability can be overcome by filling all unused program memory space with
random data elements and extending the program space that can be hashed to
include those elements.
A refinement of the above attack involves either storing the original program
code into unused data storage locations, or compressing the original and the
modified program code to fit into the program memory together.
In the latter case
the modified program code is executed using either interpretive or on-the-fly
Both attacks can be avoided by using meta-reflective techniques or
by structuring the
software and the communications protocol in a way that will make such attacks
As an example the end that communicates with the device can
measure the reply latency for a given version to detect the slowdown imposed by
decompression or interpretation.
Our approach is particularly vulnerable to a man in the middle attack.
Specifically, an adversary can store a valid program in another pristine device Dp;
the compromised device Dc can relay the server authentication
requests to Dp and send back the response of Dp to the server.
Although we assumed that such an attack will typically be economically
unattractive a simple solution exists:
in many cases where communication takes place over
a network with stable and controlled timing properties
- such as the applications described in the following
the attack can be detected by timing differences in the reply of Dc.
In the following paragraphs we outline some applications of reflective
software integrity verification in the areas of mobile phones,
intellectual property protection, and
5.1 Mobile Phone Software Validation
The attack against the firmware of a mobile phone described in
Section 2.1 can be made considerably more difficult
by making the phone's software sufficiently reflective.
As an example, copies of the software of registered mobile phones
could be kept in a secure database.
Every time a mobile phone identifies itself to a base station,
the base station could send it a software verification command
and compare the phone's response against the result calculated
using the software copy in the server's database.
Phones failing the software verification would not receive
service, making them unusable.
5.2 Digital Content Intellectual Property Protection
One other deployed technology that fits the usage scenarios of our approach
is the one used for pay-per-view billing of digital content.
The scheme used by the Digital Video Express DVIX [Meh99] discs
allows consumers to view a film they purchase on a cheap DVD-like
disc within 48 hours after first hitting the play button.
Additional viewing sessions or ``for life'' viewing can be selected
from a menu and then paid by credit card.
The billing information is transferred overnight from the device to
the company operations center using a modem built into the device.
It is natural to assume that the device's software will receive considerable
interest from adversaries wishing to be able to view the disks without
Assuming that in order to continue to be able to view disks some keys
will need to be supplied by the system's server (thus prohibiting the
stand-alone operation of a cracked system), the device's communication
protocol can be enhanced to respond to reflective commands in order
to guard against unauthorized modifications to the device's software.
Similar strategies can be used to protect pay-per-view TV
set-top boxes as well as the next generation of game consoles that
will contain a built-in modem.
Attacks against set-top boxes and game console software are already a
attacks against the DirectTV system were widely publicized;
we are also aware of a modification performed on Sony Playstation consoles
to make them work with illegal CD-R games copies.
5.3 Smartcard Verification
Many smartcard applications such as electronic purses, credit cards, and
phone cards depend on the smartcard's integrity to protect the stakeholder's
financial interests against fraud.
Advanced smartcard models integrate a microprocessor,
RAM, ROM, an operating system, and application programs.
Although smartcards are relatively tamper-proof devices,
the possibility of
attacks based on reverse engineering, fault injection [Mah97],
or misappropriation of confidential design information can not
If a smartcard and its memory contents are successfully reverse engineered
an adversary could implement a contraband version of the smartcard,
or a corresponding emulator.
A practical defense against contraband smartcards based on the same
hardware as legitimate ones can be the extension of the card's
protocol with reflective verification techniques.
In addition, meta-reflective techniques can be used to guard against
attacks based on smartcard emulators.
6 Related Work
Reflective capabilities were originally proposed to provide computational
processes with the capability to reason both about a given domain and
about their reasoning process over that domain [Smi82].
The use of the reflection paradigm quickly spread beyond the
area of programming language design and was applied in diverse
areas such as
windowing systems [Rao91],
operating systems [Yok92], and
distributed systems [EPT95].
The power of reflection allows the implementation of open,
flexible, and adaptable systems; a requirement in the areas it
as been applied, and - in our view - an asset for security
applications operating outside the absolute control of their stakeholders.
Reflective techniques for verifying the integrity of software are often
used as part of a device's power-up self-test procedure.
This approach typically guards against hardware malfunctions of the
memory system and therefore uses simple checksums instead of
cryptographically secure hash functions.
As an example, the BIOS ROM of the original IBM PC
contains code that calculates and verifies the ROM checksum
at power-up time [IBM83].
Similar self-checking techniques have also been proposed for
protecting programs against viruses [Coh90].
Both types of protection can not withstand attacks that can reverse
engineer and modify the program that performs the check and,
at the same time, is being checked.
A protocol similar to the one we outline has been proposed
to supply a proof of existence of a particular block of data [Wil94].
When B wants to prove to A that it possesses a particular block
of data D (the exemplar case mentioned entails auditing of
off-site backup services),
A sends to B a random number R.
When responding, B calculates and returns to A the digest of RD.
A can the compare this value against a pre-calculated and stored
Finally, the use of hashes together with user-supplied passwords
has been proposed as part of a method to securely boot workstations
operating in a hostile environment [LC95].
Under this approach collision-rich hashing is used in conjunction
with a low-entropy user password to protect the kernel against off-line
password guessing attacks.
- the software reasoning about its operation -
can provide a software verification basis for a large,
commercially important, class of products and services.
In the previous sections we formalized its use and described
a verification protocol that can be used to verify that the software
embedded in a device has not been modified.
The reflective techniques can be extended at a meta level
by reasoning about the software's reasoning process thus providing
an extra layer of security.
The applications of our approach include software verification in
personal communication devices, intellectual property protection,
We believe that
the increasing convergence of communication and information devices
in a domain where security, privacy, and financial interests are
often controlled by software will provide a fertile ground for
applying many reflective techniques similar in spirit to the ones we
A. Bosselaers, R. Govaerts, and J. Vandewalle.
Fast hashing on the Pentium.
In N. Koblitz, editor, Advances in Cryptology - CRYPTO '96
16th Annual International Cryptology Conference, pages 298-312, Santa
Barbara, California, USA, August 1996. Springer-Verlag.
Lecture Notes in Computer Science 1109.
Mark Cummings and Steve Heath.
Mode switching and software download for software defined radio: The
SDR forum approach.
IEEE Communications, 37(8):104-106, August 1999.
Implications of computer viruses and current methods of defense.
In Peter J. Denning, editor, Computers Under Attack: Intruders,
Worms, and Viruses, chapter 22, pages 381-406. Addison-Wesley, 1990.
H. Dobbertin, A. Bosselaers, and B. Preneel.
RIPEMD-160: A strengthened version of RIPEMD.
In Dieter Gollmann, editor, Fast Software Encryption: Third
International Workshop, pages 71-82. Springer-Verlag, Cambridge, UK,
Lecture Notes in Computer Science 1039.
The compression cache: Using on-line compression to extend physical
In USENIX Conference Proceedings, pages 519-529, San Diego,
CA, USA, Winter 1993. USENIX Association.
D. Edmond, M. Papazoglou, and Z. Tari.
An overview of reflection and its use in cooperation.
International Journal of Cooperative Information Systems,
How the PC will disappear.
Computer, 31(12):134-136, December 1998.
John L. Hennessy and David A. Patterson.
Computer Architecture: A Quantitative Approach.
Morgan Kaufmann Publishers, second edition, 1996.
IBM Personal Computer Technical Reference Manual, 1983.
Mark Lomas and Bruce Christianson.
To whom am I speaking: Remote booting in a hostile world.
Computer, 28(1):50-54, January 1995.
Concepts and experiments in computational reflection.
ACM SIGPLAN Notices, 22(12):147-155, December 1987.
Proceedings of the 1987 ACM SIGPLAN Conference on Object-Oriented
Programming Systems, Languages and Applications (OOPSLA '87).
David P. Maher.
Fault induction attacks, tamper resistance, and hostile reverse
engineering in perspective.
In Rafael Hirschfeld, editor, Financial Cryptography: First
International Conference, FC '97, pages 109-121, Anguilla, British West
Indies, February 1997. Springer-Verlag.
Lecture Notes in Computer Science 1318.
In the news: Dueling over DVD and DIVX.
IEEE Multimedia, 6(1):14-19, January-March 1999.
Michel Mouly and Marie-Bernadette Pautet.
The gsm System for Mobile Communications.
Published by the authors, 1992.
Security in Computing.
J. Pieprzyk and B. Sadeghiyan.
Design of Hashing Algorithms.
Springer Verlag, 1993.
Lecture Notes in Computer Science 756.
Implementational reflection in Silica.
In P. America, editor, Proceedings of ECOOP '91 European
Conference on Object-Oriented Programming, pages 251-267, Geneva,
Switzerland, July 1991. Springer-Verlag.
Lecture Notes in Computer Science 512.
Brian Cantwell Smith.
Procedural Reflection in Programming Languages.
PhD thesis, Massachusetts Institute of Technology, January 1982.
Software reliability: Modern challenges.
In G. I. Schuëller and P. Kafka, editors, Proceedings
ESREL '99 - The Tenth European Conference on Safety and Reliability,
pages 589-592, Munich-Garching, Germany, September 1999. ESRA, VDI, TUM, A.
Ross N. Williams.
An introduction to digest algorithms.
Australian Decus Symposium 1994, Canberra, Australia.
The Apertos reflective operating system: The concept and its
ACM SIGPLAN Notices, 27(10):414-434, October 1992.
Proceedings of the 1992 ACM SIGPLAN Conference on Object-Oriented
Programming Systems, Languages and Applications (OOPSLA '92).
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826210.56/warc/CC-MAIN-20171023164236-20171023184236-00755.warc.gz
|
CC-MAIN-2017-43
| 30,695
| 552
|
https://militaryembedded.com/avionics/safety-certification/code-quality-requirements-traceability-just-as-important-as-design-coding
|
code
|
Code Quality: Requirements traceability: Just as important as Design & CodingBlog
July 01, 2013
So, the software development process is all thought through, planned out, documented, structured, in place. You’ve invested good money in test tools that can generate as many artifacts as you could possibly need. You have reports from static analysis, dynamic analysis, functional test, unit test, object code verification…. Nothing has been left to chance. Everything is in place and prepared for the onslaught of the assessment team. Bring it on!
(The sounds of tires screaming to a halt after going a hundred miles an hour.)
DO-178B/C is littered with references to traceability and none of your traditional test documents provide it. What’s more, that traceability has to work both ways―downstream (requirements to implementation) and upstream (implantation to requirements). “Bidirectional traceability” may only be a two-word phrase, but when it comes to military embedded systems, it packs a serious punch. To understand its significance, let’s look at software evolution.
A couple of decades ago, the waterfall process dominated software development with its distinct phases of analysis, design, code, and test. The theory was that each phase would be performed in isolation with the output of one being the input for the next. The intended result was a working system that passed all tests.
With the waterfall approach, the purpose of the analysis phase was to refine the stakeholders’ vision of the system and produce a list of requirements, with those for software being itemized in the Software Requirements Specification (SRS). You were somebody if you could proudly display it on your bookshelf!
Of course, no sooner had a print run finished than the SRS was out of date due to a new-found error or ambiguity. No matter how much a project manager wished for the SRS to be error-free, it never was. The change log would begin increasing in size until a new print run became inevitable. The SRS lagged behind reality, and errors were a fact of life.
Today, requirements traceability is widely accepted as development best practice. It ensures that all requirements are implemented and that all development artifacts can be traced back to one or more requirements. Yet despite good intentions, many projects still fall into a pattern of disjointed software development in which requirements, design, implementation, and testing phases are isolated from each other―something often dubbed the “silo effect”. Such isolation results in tenuous links between requirements, the development stages, and/or the development teams.
For software development to be considered complete, you must include tools that help you achieve “bidirectional traceability”. . The requirements themselves need to be clear and unambiguous, perhaps aided by means of use cases or user stories. Automated checking of requirement specifications can help by confirming the presence of particular keywords, and the absence of imprecise phrases.
With the resulting precise requirements in place, the use of trace links from requirements to specific lines of code, and then to tests of that code and so on…throughout the lifecycle, can implement bidirectional traceability by confirming that all requirements in scope have been implemented, and that all design or implementation elements can be traced to a requirement. What’s more, automated reporting on those the trace links ensures that requirements maintenance can never become a secondary issue.
Requirements are the foundation of every project. A weak foundation results in high numbers of defects, unforeseen remedial work, spiralling costs, and missed deadlines. Investment in requirements management should stand on an equal footing with design and coding. Requirements traceability secures the firm foundation on which to construct a successful project. Without that foundation, even a project equipped with the best test tools available is potentially flawed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585242.44/warc/CC-MAIN-20211019043325-20211019073325-00080.warc.gz
|
CC-MAIN-2021-43
| 4,024
| 12
|
https://lists.opensuse.org/archives/list/factory@lists.opensuse.org/thread/FYCC4CQ6QHKIEBPZ75OLFIT72SEWCBO4/
|
code
|
Please note that this mail was generated by a script. The described changes are computed based on the x86_64 DVD. The full online repo contains too many changes to be listed here.
Please check the known defects of this snapshot before upgrading: https://openqa.opensuse.org/tests/overview?distri=opensuse&groupid=1&...
Please do not reply to this email to report issues, rather file a bug on bugzilla.opensuse.org. For more information on filing bugs please see https://en.opensuse.org/openSUSE:Submitting_bug_reports
Packages changed: GraphicsMagick (1.3.39 -> 1.3.40) gnome-shell (43.2 -> 43.3) gnome-terminal (3.46.7 -> 3.46.8) harfbuzz (6.0.0 -> 7.0.0) mutter (43.2 -> 43.3) plasma5-desktop systemd-presets-branding-MicroOS (20230130 -> 20230214) vte (0.70.2 -> 0.70.3)
=== Details ===
==== GraphicsMagick ==== Version update (1.3.39 -> 1.3.40) Subpackages: libGraphicsMagick++-Q16-12 libGraphicsMagick-Q16-3 libGraphicsMagick3-config
- version update to 1.3.40 * GetMagickGeometry(): Fix a scaling issue where dimensions could be scaled down to zero. * PCD: Handle writing image with a dimension of 1. * PNG: When writing, use lower-case raw profile identifiers (e.g. 'Raw profile type xmp') because exiftool expects that. * SUN: The sense of monochrome images was inverted. Fix scanline size calculation. * WPG: Fix 20-year old bug in WPG header reading. New Features: * JXL: Decode and log extra channel information. This information is not yet used. * PCX and DCX: Support writing uncompressed format (use -compress none for no compression). * Added IM1, IM8, and IM24 magick aliases for the Sun Raster format since those are the historically correct extensions. API Updates: * AppendImageToList() now updates the image list pointer to be the image which was just added. Use GetFirstImageInList() when the pointer to the first image in the list is needed.
==== gnome-shell ==== Version update (43.2 -> 43.3) Subpackages: gnome-extensions gnome-shell-calendar gnome-shell-lang
- Update to version 43.3: + Ensure quick settings toggles align with the pixel grid + Lower OOM score of gnome-shell process + Fix incomplete device list in volume menus + Fixed crash + Plugged leak + Misc. bug fixes and cleanups + Updated translations.
==== gnome-terminal ==== Version update (3.46.7 -> 3.46.8) Subpackages: gnome-shell-search-provider-gnome-terminal gnome-terminal-lang nautilus-extension-terminal
- Update to version 3.46.8: * all: Make env filtering uniform * build: Use built-in mandir option * client: - legacy: Drop debug messages - Transport XDG_ACTIVATION_TOKEN to the server * metainfo: Add launchable info * prefs: Fix default terminal check * screen: Use correct environment filter * Updated translations.
==== harfbuzz ==== Version update (6.0.0 -> 7.0.0) Subpackages: libharfbuzz-gobject0 libharfbuzz-icu0 libharfbuzz-subset0 libharfbuzz0 libharfbuzz0-32bit typelib-1_0-HarfBuzz-0_0
- Update to version 7.0.0: + New hb-paint API that is designed mainly to paint COLRv1 glyphs, but can be also used as a unified API to paint any of the glyph representations supported by HarfBuzz (B/W outlines, color layers, or color bitmaps). + New hb-cairo API for integrating with cairo graphics library. This is provided as a separate harfbuzz-cairo library. + Support for instancing CFF2 table + Support font emboldening + Support feature ranges with AAT shaping + Experimental support to cubic curves in glyf table + Various subsetter improvements + Various documentation improvements + Significantly reduced memory use during shaping + Greatly reduced memory use during subsetting CFF table + New command line utility, hb-info, for querying various font information + New hb-shape/hb-view options: --glyphs, --color-palette, - -font-bold, --font-grade, and --named-instance + Miscellaneous fixes and improvements - harfbuzz-CVE-2023-25193.patch dropped in favor of upstream consensus fix
==== mutter ==== Version update (43.2 -> 43.3) Subpackages: mutter-lang
- Update to version 43.3: + Skip resize effects for tiled windows during user grabs + Disable direct scanout during drag-n-drop operations + Ignore unmapped subsurfaces in direct scanout check + Fix cursor disappearing over windows during grabs + Fix pointer constrains with subsurfaces + Make wl_output mode independent of the orientation + Improve focus handling on workspace switches + Fix cursor position in window screencasts + Do not require a physical device to update pointer visibility + Fix initialization of keyboard accessibility + Fix freeze when crossing monitors under some conditions + Don't allow window activation to break global grabs + Fixed crashes + Plugged leak + Misc. bug fixes and cleanups + Updated translations.
==== plasma5-desktop ==== Subpackages: plasma5-desktop-emojier plasma5-desktop-lang
- Don't try to delete the DBus interfaces folder on s390x. There's nothing to delete on this arch.
==== systemd-presets-branding-MicroOS ==== Version update (20230130 -> 20230214)
- Correct spelling of transactional-update-notifier.service in 50-default-MicroOS-user.preset - 20230214
==== vte ==== Version update (0.70.2 -> 0.70.3) Subpackages: libvte-2_91-0 typelib-1_0-Vte-2_91 vte-lang
- Update to version 0.70.3: + widget: - Ensure the ringview is updated before converting coordinates - gtk4: Translate control+key events when using multiple layouts - Use correct end row for getting the selected text - Drop ddb2c8a.patch: Fixed upstream.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950373.88/warc/CC-MAIN-20230402012805-20230402042805-00694.warc.gz
|
CC-MAIN-2023-14
| 5,434
| 21
|
https://rpg.stackexchange.com/questions/194821/can-an-arcane-hand-be-pushed
|
code
|
In our last session, the party was in a large ice cavern which the adult white dragon boss monster was attempting to enter through a tunnel that was just wide enough for itself. The party evoker had placed an Arcane Hand, set for "Interposing" just inside the mouth of the tunnel to prevent the dragon from entering the larger space and being able to make use of its fly movement, better targeting of breath weapon, etc.
The "Interposing Hand" says:
The hand interposes itself between you and a creature you choose until you give the hand a different command. The hand moves to stay between you and the target, providing you with half cover against the target. The target can't move through the hand's space if its Strength score is less than or equal to the hand's Strength score. If its Strength score is higher than the hand's Strength score, the target can move toward you through the hand's space, but that space is difficult terrain for the target.
Since the Hand's Strength is 26, and the dragon's is 22, the dragon "cannot move through the hand's space".
However, could the dragon attempt to push the Hand back a space, and then move forward into the space the Hand had previously occupied?
The Hand is explicitly an object. This question (thank you @Thomas Markov for the link) asks whether it can be Shoved as if it were a creature. The accepted answer there says that because it is an object, it cannot be Shoved, but does not suggest how it then might be moved as an object.
An alternate answer there agrees that it cannot be Shoved since it is an object, but then clarifies that an attempt to move it as an object should be resolved 'the same as a Shove attempt against a creature'.
So that this question is not a duplicate of the referenced one, let's agree that the Hand cannot be the subject of a Shove attack per se because it is not a creature (if you disagree, you should post an answer to the other question).
Since the hand is an object, can it be moved by a push as an object?
Should I read the "the target can't move through the hand's space" as a specific over general prohibition against any kind of pushing attempt from the target (but perhaps not from the orc minions of the dragon),
or as a specific over general exception so that the Large Hand only prohibits the movement of Small and Gargantuan creatures through its space, which it otherwise would not do?
If the Hand CAN be pushed, how should this be resolved?
If the dragon is permitted to push the Hand (or if not, when the dragon's minions attempt to move it instead), can the Hand simply be moved as an object, automatically but subject to the rules about weight limits when pushing an object? Spells do (only) what they say they do, and nothing in the spell description explicitly gives the Hand the ability to resist being moved, especially by creatures that are not the target.
Or should I read "The hand interposes itself between you and a creature you choose" as giving it the ability to actively resist being moved, such that any attempt to move it must be resolved in the manner of a Shove attack and it can use its Strength score to make an Athletics check even though we acknowledge it is not a creature?
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475238.84/warc/CC-MAIN-20240301093751-20240301123751-00313.warc.gz
|
CC-MAIN-2024-10
| 3,200
| 14
|
https://www.hireitpeople.com/resume-database/67-quality-assurance-qa-resumes/200698-test-automation-engineer-resume-palo-alto-ca
|
code
|
- VBA sql pytest
- REST API git
- R html css js php.
Confidential, Palo Alto, CA
Test Automation Engineer
- Automate 50+ manual test cases using python. Use Robot Framework for light - weight testing tasks. Reduce 3-week labor to 1 day;
- Automate system health check, configuration validation, log collection. Reduce manual input errors, narrow down bug source, simplify debug process, and enhance system robustness;
- Add system load module for pressure testing. Add tasks in ESXi, NSX, vCD when running test cases;
- Test vmware NFV suite. Install ESXi on servers, configure networking in NSX, simulate user scenarios in vCD. Debug and find workarounds for gaps between products;
- Design test cases based on user scenarios. Create client-web-data layers to test network segmentation. Change packet size to test MTU;
- Bridge between local and remote teams. Set up monthly remote training sessions.
Confidential, New York, NY
Senior Financial Analyst
- Maintained Option-Pricing system written by C#/C++. Updated I/O functions to adapt to new data source;
- Migrated pricing functions from VBA to python/C++, boosted calculating speed from minutes to seconds, enhanced system robustness;
- Evaluated Gatheral and Skew model for calibration on JPY index. Lowered residual to 1/10 of original;
- Automated weekly calendar reports using VBA. Reduced generating time from 40 min to 5 min.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655908294.32/warc/CC-MAIN-20200710113143-20200710143143-00164.warc.gz
|
CC-MAIN-2020-29
| 1,387
| 17
|
https://buildgear.io/pipermail/buildgear-devel_buildgear.io/2013-April/000013.html
|
code
|
[buildgear-devel] BSP/Board Support?
martin.lund at keep-it-simple.com
Fri Apr 12 11:37:19 MDT 2013
Also, I forgot to add... yes - the Mini Distribution does support more
We plan to make the Mini Distribution support the most popular open
source hardware. At the moment this includes Pandaboard and Raspberry Pi.
Soon we will add support for the popular Beaglebone.
Also, if you go the the github mini distribution organization page
(https://github.com/mini-distribution), you can find a Mini Distribution
for i686-generic which should work on most intel HW.
In general we (Build Gear maintainers) don't want to maintain support
for too many boards. The whole point of Build Gear is that it is very
easy to make the Mini Distribution support your own hardware.
To make the Mini Distribution support your own custom hardware all you
basically have to do is fork eg. the pandaboard repository, rename your
fork, replace the board specific build files, and adjust the global
configuration (config/config) to reflect your toolchain changes (in
particuar the HOST system name). The board specific build files include
eg. the toolchain (native-pandaboard/crosstool-ng), the bootloader
(cross-panda/u-boot), the linux kernel (native-pandaboard/linux-source,
cross-pandaboard/linux), and of course the fs (cross-panda/fs) which
defines what features you want to included in your file system for your
particular board. Also, make sure your kernel enables the required
options to support systemd.
Also, if one of the generic build files in eg. cross-core or cross-opt
does not fit your particular needs you can easily override/overlay it
with your own using the Build Gear layer feature. We keep cross-core and
cross-opt fairly full featured and up to date. We also try to keep
cross-extra up to date. If you find any missing features in the existing
build files we happily accept patches or pull requests on github :)
On 2013-04-12 18:46, Martin Lund wrote:
> Hi Tim,
> We test the Mini Distribution with Pandaboard ES but I'm fairly sure
> it also works with the Pandaboard - the Linux kernel supports both.
> On 2013-04-12 15:36, Tim Nelson wrote:
>> Does buildgear currently support any other boards than the
>> Pandaboard? Possibly, the Pandaboard ES, or is support for that board
>> already included in the main Pandaboard work?
>> buildgear-devel mailing list
>> buildgear-devel at buildgear.org
> buildgear-devel mailing list
> buildgear-devel at buildgear.org
More information about the buildgear-devel
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154053.17/warc/CC-MAIN-20210731043043-20210731073043-00026.warc.gz
|
CC-MAIN-2021-31
| 2,501
| 43
|
https://sling.apache.org/project-information/security.html
|
code
|
The Apache Software Foundation takes a very active stance in eliminating security problems and denial of service attacks against Apache Sling.
We strongly encourage folks to report such problems to our private security mailing list first, before disclosing them in a public forum.
Please note that the security mailing list should only be used for reporting undisclosed security vulnerabilities in Apache Sling and managing the process of fixing such vulnerabilities. We cannot accept regular bug reports or other queries at this address. All mail sent to this address that does not relate to an undisclosed security problem in the Apache Sling source code will be ignored.
In Sling OSGi bundles we have long had a policy of depending on the lowest possible version of a library/API, to ensure that our bundles are deployable in the widest possible range of environments. Therefore the responsibility of ensuring that the environment is secure lies with the assembler and/or deployer of the application, which should make sure that the OSGi bundles they deploy are secure. As such, we don't consider vulnerable dependencies of our bundles as security issues by themselves. Usually the dependencies used by Sling are semantically versioned and therefore security related version updates are fully binary backwards-compatible. Further detail and some exceptions from that policy are outlined in our wiki.
If you need to report a bug that isn't an undisclosed security vulnerability, please use our public issue tracker.
should be addressed to our public users mailing list. Please see the Project Information page for details of how to subscribe.
The private security mailing address is: security(at)sling.apache.org.
Note that all networked servers are subject to denial of service attacks, and we cannot promise magic workarounds to generic problems (such as a client streaming lots of data to your server, or re-requesting the same URL repeatedly). In general our philosophy is to avoid any attacks which can cause the server to consume resources in a non-linear relationship to the size of inputs.
Please report any errors or omissions to security(at)sling.apache.org.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817153.39/warc/CC-MAIN-20240417110701-20240417140701-00268.warc.gz
|
CC-MAIN-2024-18
| 2,170
| 9
|
http://www.las.ac.cn/search.do?action=search&field=default&query=Oligonucleotide+Array+Sequence+Analysis
|
code
|
Motivation: The availability of flexible open source software for the analysis of gene expression raw level data has greatly facilitated the development of widely used preprocessing methods for these technologies. However, the expansion of microarray applications has exposed the limitation of existing tools. Results: We developed the oligo package to provide a more general solution that supports a wide range of applications. The package is based on the BioConductor principles of transparency, reproducibility and efficiency of development. It extends the existing tools and leverages existing code for visualization, accessing data and widely used preprocessing routines. The oligo package implements a unified paradigm for preprocessing data and interfaces with other BioConductor tools for downstream analysis. Our infrastructure is general and can be used by other BioConductor packages.
The assessment of data quality is a major concern in microarray analysis. arrayQualityMetrics is a Bioconductor package that provides a report with diagnostic plots for one or two colour microarray data. The quality metrics assess reproducibility, identify apparent outlier arrays and compute measures of signal-to-noise ratio. The tool handles most current microarray technologies and is amenable to use in automated analysis pipelines or for automatic report generation, as well as for use by individuals. The diagnosis of quality remains, in principle, a context-dependent judgement, but our tool provides powerful, automated, objective and comprehensive instruments on which to base a decision. Availability:: arrayQualityMetrics is a free and open source package, under LGPL license, available from the Bioconductor project at www.bioconductor.org. A users guide and examples are provided with the package. Some examples of HTML reports generated by arrayQualityMetrics can be found at http://www.microarray-quality.org Contact:: email@example.com Supplementary information:: Supplementary data are available at Bioinformatics online.
Motivation: When running experiments that involve multiple high density oligonucleotide arrays, it is important to remove sources of variation between arrays of non-biological origin. Normalization is a process for reducing this variation. It is common to see non-linear relations between arrays and the standard normalization provided by Affymetrix does not perform well in these situations. Results: We present three methods of performing normalization at the probe intensity level. These methods are called complete data methods because they make use of data from all arrays in an experiment to form the normalizing relation. These algorithms are compared to two methods that make use of a baseline array: a one number scaling based algorithm and a method that uses a non-linear normalizing relation by comparing the variability and bias of an expression measure. Two publicly available datasets are used to carry out the comparisons. The simplest and quickest complete data method is found to perform favorably. Availablity: Software implementing all three of the complete data normalization methods is available as part of the R package Affy, which is a part of the Bioconductor project http://www.bioconductor.org. Contact: firstname.lastname@example.org Supplementary information: Additional figures may be found at http://www.stat.berkeley.edu/similar tobolstad/normalize/ index.html.
Next-generation massively parallel DNA sequencing technologies provide ultrahigh throughput at a substantially lower unit data cost; however, the data are very short read length sequences, making de novo assembly extremely challenging. Here, we describe a novel method for de novo assembly of large genomes from short read sequences. We successfully assembled both the Asian and African human genome sequences, achieving an N50 contig size of 7.4 and 5.9 kilobases (kb) and scaffold of 446.3 and 61.9 kb, respectively. The development of this de novo short read assembly method creates new opportunities for building reference sequences and carrying out accurate analyses of unexplored genomes in a cost-effective way.
limma is an R/Bioconductor software package that provides an integrated solution for analysing data from gene expression experiments. It contains rich features for handling complex experimental designs and for information borrowing to overcome the problem of small sample sizes. Over the past decade, limma has been a popular choice for gene discovery through differential expression analyses of microarray and high-throughput PCR data. The package contains particularly strong facilities for reading, normalizing and exploring such data. Recently, the capabilities of limma have been significantly expanded in two important directions. First, the package can now perform both differential expression and differential splicing analyses of RNA sequencing (RNA-seq) data. All the downstream analysis tools previously restricted to microarray data are now available for RNA-seq as well. These capabilities allow users to analyse both RNA-seq and microarray data with very similar pipelines. Second, the package is now able to go past the traditional gene-wise expression analyses in a variety of ways, analysing expression profiles in terms of co-regulated sets of genes or in terms of higher-order expression signatures. This provides enhanced possibilities for biological interpretation of gene expression differences. This article reviews the philosophy and design of the limma package, summarizing both new and historical features, with an emphasis on recent enhancements and features that have not been previously described.
Single-stranded oligonucleotides stabilize highly fluorescent Ag nanoclusters, with emission colors tunable via DNA sequence. We utilized DNA microarrays to optimize these scaffold sequences for creating nearly spectrally pure Ag nanocluster fluorophores that are highly photostable and exhibit great buffer stability. Five different nanocluster emitters have been created with tunable emission from the blue to the near-IR and excellent photophysical properties. Ensemble and single molecule fluorescence studies show that oligonucleotide encapsulated Ag nanoclusters exhibit significantly greater photostability and higher emission rates than commonly used cyanine dyes.
We present a genotyping method for simultaneously scoring 116,204 SNPs using oligonucleotide arrays. At call rates >99%, reproducibility is >99.97% and accuracy, as measured by inheritance in trios and concordance with the HapMap Project, is >99.7%. Average intermarker distance is 23.6 kb, and 92% of the genome is within 100 kb of a SNP marker. Average heterozygosity is 0.30, with 105,511 SNPs having minor allele frequencies >5%.
The Gene Expression Omnibus (GEO, http://www.ncbi.nlm.nih.gov/geo/) is an international public repository for high-throughput microarray and next-generation sequence functional genomic data sets submitted by the research community. The resource supports archiving of raw data, processed data and metadata which are indexed, cross-linked and searchable. All data are freely available for download in a variety of formats. GEO also provides several web-based tools and strategies to assist users to query, analyse and visualize data. This article reports current status and recent database developments, including the release of GEO2R, an R-based web application that helps users analyse GEO data.
Expression Atlas (http://www.ebi.ac.uk/gxa) is a value-added database providing information about gene, protein and splice variant expression in different cell types, organism parts, developmental stages, diseases and other biological and experimental conditions. The database consists of selected high-quality microarray and RNA-sequencing experiments from ArrayExpress that have been manually curated, annotated with Experimental Factor Ontology terms and processed using standardized microarray and RNA-sequencing analysis methods. The new version of Expression Atlas introduces the concept of 'baseline' expression, i.e. gene and splice variant abundance levels in healthy or untreated conditions, such as tissues or cell types. Differential gene expression data benefit from an in-depth curation of experimental intent, resulting in biologically meaningful 'contrasts', i.e. instances of differential pairwise comparisons between two sets of biological replicates. Other novel aspects of Expression Atlas are its strict quality control of raw experimental data, up-to-date RNA-sequencing analysis methods, expression data at the level of gene sets, as well as genes and a more powerful search interface designed to maximize the biological value provided to the user.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572516.46/warc/CC-MAIN-20190916080044-20190916102044-00219.warc.gz
|
CC-MAIN-2019-39
| 8,749
| 9
|
https://itslinuxfoss.com/how-to-install-configure-git-on-ubuntu-20-04/
|
code
|
Before moving on to the installation process of Git, Let me help you understand what is Git and why you should use it.
Suppose you are working on any project, text, or word file and mistakenly you deleted something and closed the file. Now the content which is gone from your file cannot be retained. If the files are important then everyone works on the backing up procedure before doing any kind of edit to track changes.
Why would someone do the files backup because later on if you delete something unintentionally you can go back and have a look at that content which was earlier in the file.
Most of the time you forget to maintain the backup in all of your systems. There exist chances that you have to work or collaborate with other workers or fellows. As all of the workers are doing their thing simultaneously one cannot wait to see his fellow’s work and start working on its part. That’s where the need for Version Control Systems like Git arises. These systems help a person by managing its code, keeping track of the files, and you can also see what was edited, merged, deleted, or added in the file.
Git is a Version Control System (VCS) that is used for keeping the track of changes in projects or computer files and coordinating with multiple people based on those files. It is the most popular VCS right now because of its capability of being flexible with history. It permits you to store the project’s entire history in a repository and launch the changes in the project in a very assembled and controlled way while working with your team.
That’s the most essential information you should know before Installing and using ‘Git’.Now let’s move on to its Installation process on Ubuntu 20.04.
Note: To follow the installation, make sure that you are a ‘superuser’ or ‘root’ as the superuser provides unrestricted access to all the commands, files, resources, and directories.
Install Git on Ubuntu 20.04
Step 1: First of all, Open up the terminal by searching it manually in activities, or you can also press ‘CTRL+ALT+T’ to view the terminal window.
Step 2: Now update the package lists.
$ sudo apt update
Enter your password to permit the packages update.
Step 3: Given command will install all of the dependencies that are required on your system to work on Git.
$ sudo apt install dh-autoreconf libcurl4-gnutls-dev libexpat1-dev make gettext libz-dev libssl-dev libghc-zlib-dev
Step 4: Visit the official website to check the latest git version and you can choose a version from the available ones.
We are going to install the ‘v2.29.2’ git release because it is considered the most stable version at this time.
Step 5: Write out the following command in your terminal for downloading and extracting the source. This is going to be store in ‘/usr/src’ directory.
$ wget -c https://github.com/git/git/archive/v2.29.2.tar.gz -O - | sudo tar -xz -C /usr/src
Step 6: As the download is complete, now we are going to install the Git on our Ubuntu 20.04 by changing the directory first.
$ cd /usr/src/git-*
$ sudo make prefix=/usr/local all
$ sudo make prefix=/usr/local install
Step 7: Verify the Git existence on your Ubuntu by writing-out the command given below.
$ git --version
Configuring Git on Ubuntu 20.04
Step 1: First thing you have to do for configuring Git on your system is to link your identity with it. Set your name and your email. It will be used with every commit you trying to make.
$ git config --global user.name "Your Name"
$ git config --global user.email "[email protected]"
Step 2: Now authenticate these modifications.
$ git config --list
Check the configuration file too.
$ nano ~/.gitconfig
In this article, we have discussed what is Git and why you should use it on your system. Furthermore, we have shared the step by step method of its installation and configuration on Ubuntu 20.04.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647409.17/warc/CC-MAIN-20230531182033-20230531212033-00678.warc.gz
|
CC-MAIN-2023-23
| 3,864
| 33
|
http://programmers.stackexchange.com/questions/tagged/unicode+vb.net
|
code
|
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
How in the earth CHRW produce unicode codes given that it only accept 65k possible input?
http://babelstone.blogspot.com/2005/11/how-many-unicode-characters-are-there.html says there are 1 million unicode characters and around 240k of which are already assigned. 1 million > 240k > 65k ...
May 23 '12 at 4:59
newest unicode vb.net questions feed
Hot Network Questions
How much money did Charlie Harper have?
Message ALL users before shutdown
How does linux handle a move command
A coworker beat me to resignation. How can I resign in a professional manner?
How did Boba Fett know to hide in the Star Destroyer "Avenger"'s garbage?
Who is an expert?
"people don’t know what they want until you show it to them"
4, 8, 15, 16, 23, 42
The C key stopped working, any workaround to emulate 'Command + C'?
Trolling the troll
"Whatever doesn't kill you, simply makes you stranger" - what does it mean?
Are patches a bad sign for the customer?
What physics book for aspiring theoretical physicist / pure mathematician
Looking for \providelength
Is it OK to use while ((line = r.readLine()) != null) construct?
Effect of Maariv being originally optional
Language problems at the airport?
How to talk about people you know?
What's the English equivalent of "Drilling one's head"?
Defining precision in a mechanical movement
Count number of each char in a String
How to calcuate the sum of 1/x, where x is an integer not containing the digit 9 and 10,000,000 ≤ x ≤ 88,888,888
Effects of war on everyday life and adventuring
What D&D artist drew this image, that was used on the Warriors of the Eternal Sun Genesis Game
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Overflow
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678677514/warc/CC-MAIN-20140313024437-00031-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 2,250
| 52
|
https://www.polytechforum.com/solidworks/sketch-zero-length-entity-39761-.htm
|
code
|
I am trying to do a basic extrude following the tutorial. i create my sketch and continue to the extrude properties and i don't get any preview and when i click ok on that screen i get an error message saying "The sketch contains a zero-length entity"
usually this means that you have a line (or other geometry) in which the end points are on top of each other -- in otherwords you cannot have a line between two points that are on top of each other - you can only have a point. This can happen when changing dimensions in a sketch which might cause other geometry to become (zero length). A diagnostic tool can help you find the offending geometry. Go to
Insert --> Sketch tools --> check sketch for feature. Then click ok -- get the same error -- click OK on the error -- Move the check sketch dialog box out of the way. You will notice geometry highilghted in green -- zoom in to all the endpoints of that geometry to see what the problem might be (as the problem may not be the acual highligted geometry, but rather the surrounding geometry).
i don't have any of that, i just drew a rectangle using the origin as one of the points. when i run the check sketch it highlites the lower line green. i even went as far as deleting the line and redrawing it, no good.
Is this happening in an file that is existing, or just in any new file when you try and extrusion? If when you do that check sketch for feature, and it high lights something in green, then there is something that is overlapping that needs to be deleted. You can always choose the contuor select optiona dn then just choose the contour you would liek to use.
If this is happening with a brand new file, meaning you start a new part from File > New or the New icon, then it could be that you've got something hosed in your template. If there is a sketch already in your part template, then delete the sketch from the feature manager, save this edited version as your part template, and try again.
If your template doesn't have an existing sketch, and this is happening from a new part, I would uninstall SW, clear out your SW registry and reinstall.
Otherwise, if this is on some part you've been working on, you might try to drag boxes around the endpoints (drag left to right) and see if something gets selected that you can delete.
Zero length sketch problems are among the most frustrating to me personally because when you've got one (or several), you can't do much with your sketch until you fix all of them. If you have two and only delete one, it will tell you the sketch is unsolvable and put it back to its prior condition (with two problems instead of one). When this happens, I just blow away the whole sketch unless it's fairly complicated or difficult to recreate.
A lot of times beginning users who haven't quite picked up the knack of sketching in SolidWorks run into this problem, starting and ending a line or arc at the same point.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233508959.20/warc/CC-MAIN-20230925083430-20230925113430-00391.warc.gz
|
CC-MAIN-2023-40
| 2,914
| 10
|
https://www.programmableweb.com/mashup/money-url-shortener
|
code
|
Mashups using the same API (0)
Sorry, no related apis found.
Related Articles (728)
Captricity, dedicated to transforming data trapped on paper into digital form, announced the public release of its API. Originally, customers accessed Captricity's technology via a web portal. In August, Captricity launched a beta API. Over the past few months, Captricity enhanced its API under the Code for America Accelerator program (one of seven startups to qualify for the honor). Captricity announced the API's public availability at Code for America's Demo Day.
Hartcat released a completely rebuilt version of its asset tracking solution. At the core of its release lies API access to its core functionality.
While working with Big Data affords a lot of potential business value the complexity of building applications that manipulate all that information can be nothing short of daunting. Not only do most of the currently popular approaches require developers to master arcane interfaces such as MapReduce, the performance of the application tends to suffer under the weight of all the data that needs to be processed.
RELATED APIs (1739)
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107883636.39/warc/CC-MAIN-20201024135444-20201024165444-00014.warc.gz
|
CC-MAIN-2020-45
| 1,133
| 7
|
https://forums.digi.com/t/cannot-establish-mac-address-or-device-id-for-an-xb-pros2b-or-xb-s2c/18937
|
code
|
I am completely stuck on the simple task of adding a XB ProS2B or XB S2C to the Remote Manager as I seem to be ‘missing’ the Discover option listed in the Support article when I select ‘ADD DEVICE’, and cannot work out how to discover the Device ID or MAC address. I realize this is a very simple question, but I have put several hours in trying to solve it myself, so a pointer to an article would be very much appreciated. Thanks, Richard
These devices do not have direct internet access. These devices require a Gateway acting as a Coordinator or Router to allow them to be seen by the Device Cloud.
You also add them via the Gateway by bring up the web UI of the gateway and doing a Discovery.
Also note that this are Zigbee Mesh enabled devices. In order for them to establish a network and pass data back and forth, one of the nodes MUST be a Coordinator.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500294.64/warc/CC-MAIN-20230205224620-20230206014620-00038.warc.gz
|
CC-MAIN-2023-06
| 869
| 4
|
https://community.canvaslms.com/thread/22544-is-anyone-else-having-problems-with-getting-the-files-from-aws
|
code
|
Since March 5, we have had extreme inconsistency in file retrieval times with some outright failures. We are bringing down only 19 of the tables.
We've had the same problem. We're using canvasDataCli sync to download all our files, but what using to be a 3 1/2 minute process is now very inconsistent, sometimes taking hours.
We are downloading using the command line tool which defaults to 5 async downloads at a time. Some files come down fast in seconds and others can get stuck for hours. When we retry, the files having trouble can come down fast and then other files have a slow down.
Looking in Wireshark the packet payloads just get smaller and smaller for different files at different times.
Thanks, Tom and Mikhael. Your experiences are very much like our own. It's helpful to know that it's not just us.
For what it's worth, to retrieve the files we're using the Perl LWP::Simple module, which as I understand it issues a simple HTTP GET on the file address.
We were having this problem (getting Canvas Data files via the canvasDataCli slowed or stopped), too, for about a week and a half. For us, it started also with the data dump produced on March 5th. We noticed that the problem only occurred when we were connecting from our university network; the download was as fast and complete as ever via residential ISPs. Our download problems ended this past weekend. We didn't download the data dumps produced on March 16th or 17th, but we haven't had trouble starting with the March 18th data dump.
Are you all still having issues downloading? Are you also connecting via university networks?
Our issues seem to have cleared as well. We are connecting via our university network. Another part of our campus was having AWS issues that also seem to have cleared. We are continuing to monitor in case we have more issues.
We stopped the job in our production environment but have let it continue to run in QA, which points to the same set of Canvas Data files on S3. Consistent with what you've seen, the QA job has been running well since early morning March 16.
BTW, we opened a ticket with Instructure for this issue. We did that by sending an email to the support team. I don't have a ticket number. On March 19, we heard back that the information had been passed along to the product and engineering team. No further news at this point.
Thanks for keeping us posted on your experience.
My boss, who is the most skilled user of Google I know, found a blog post on "the mystery of the hanging S3 downloads." Much of it is beyond my ken, but the problem it describes sounds very much like what we experienced, particularly what Mikhael observed as "the packet payloads just get smaller and smaller for different files at different times."
Another member of our team has passed the post along to the Instructure support people.
Retrieving data ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255165.2/warc/CC-MAIN-20190519201521-20190519223521-00365.warc.gz
|
CC-MAIN-2019-22
| 2,856
| 15
|
http://marcelbraghetto.github.io/a-simple-triangle/2019/06/08/part-13/
|
code
|
Ok strap yourself in - now we start the journey of implementing our Vulkan rendering system. We will get Vulkan running on all of our target platforms that support it - which is pretty much everything except for Emscripten.
Before we get into the technical swing of things I would strongly recommend learning about Vulkan itself. This is the official site for the Vulkan APIs: https://www.khronos.org/vulkan/.
I had a lot of trouble understanding Vulkan and my fluency with it is still pretty basic. The way I was able to learn about it was from these awesome sites:
By working my way through some of the Vulkan tutorial sites and cross referencing demos in the Github links above, I was able to get Vulkan up and running successfully on my Mac and other platforms. One of the key outcomes I pushed for was to use the Vulkan C++ header instead of the C header, to allow for - in my opinion - a more pleasing coding style and architecture.
The things that I’ll be doing differently to a lot of the online articles I learned from:
internal_ptrfor auto cleanup of resources.
We will be using Vulkan 1.0 because we want to support back to Android 7 Nougat (API-24) which was the first version of Android to ship with Vulkan 1.0 support and additionally the MoltenVK library only maps to Vulkan 1.0 (at least at the time of writing these articles that was the case), so we want to be as backward compatible as we can.
Our Emscripten platform won’t be able to use Vulkan as it is limited to WebGL, though in the future it might be possible using libraries such as ANGLE.
As we did with the OpenGL based articles, we’ll begin by writing as much automated setup scripts to bootstrap the target platforms to use Vulkan, followed by the actual usage of the Vulkan SDK itself.
We have already written quite a lot of the core foundation for our engine so the good news is that we won’t take as long to get to the rendering code this time - though brace yourself there is far more rendering code for Vulkan!
Running Vulkan applications has a few extra constraints compared to OpenGL:
End of part 13
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039536858.83/warc/CC-MAIN-20210421100029-20210421130029-00277.warc.gz
|
CC-MAIN-2021-17
| 2,093
| 12
|
https://www.youtube.com/channel/UCPYju0tNgyLfkxD_2SkMoOg
|
code
|
This video also answers some of the queries below:
google play services not working
google play stopped working
google play store crashing
google play store has stopped working
my google play store is not working
play store app not working
google play has stopped working
google play isn't responding
Hello everyone and welcome to my YouTube channel and in this video today we will see how to fix Google play store if it is not working. If you will find this video helpful then please like, share and subscribe to my YouTube channel for more tips and tricks.
Let's start with the basic. Check whether your internet connection is working fine. Try to open sites in another device.
Restart your device and try to open Play store.
Manually update yourDate and Time
1. Tap on "Settings".
2. Scroll down and look for "Date and Time".
3. Switch off "Automatic date and time" and "Automatic time zone".
4. Now once make the date and time worng.
5. Again make it right and then enable "Automatic date and time" and "Automatic time zone".
A. Change your Google account
1. Select "Settings".
2. Under 'Personal", select "Accounts".
3. Select "Google".
4. Select your Google account.
5. Select "More" and then select "Remove account".
6. Now you need to enter another google account or else enter the same one.
7. Select "Add account".
8. Select "Google".
9. Enter your Google account and password and sign in.
Clear Cache and Data
1. Open "Settings".
2. Select "Applications" - "Application Manager".
3. Select "Google play store".
4. Select "Clear Data", "Clear cache"
Clear Data for "Download Manager".
1. Open "Settings" - "Applications" - "Application manager".
2. Scroll right and select "All".
3. Select "Download manager".
4. Select "Clear Data".
Reinstall Google play store updates
1. Select "Settings" and then "Applications" and then "Application manger".
2. Select "Google play store".
3. Select "Uninstall updates".
4. Now the Google play store will return back to the factory state.
5. Now open Google play store again. Your Google play store will be updated to the latest version of play store.
And lastly make sure that you have enough space on your device.
1. Select "Settings'.
2. Select "Storage".
3. Check the "Available space" for both internal memory and external memory
4. It should have at least 1 GB space, if not then uninstall apps.
Watch some of other popular videos of our channel:
How to check who is using your WiFihttps://www.youtube.com/wat...
2 ways to reset forgotten gmail passwordhttps://www.youtube.com/wat...
Solve computer proxy server problem refusing connectionhttps://www.youtube.com/wat...
What to do if you can't connect to wireless interenthttps://www.youtube.com/wat...
Remove VPN settings from iphone and browse internet fasterhttps://www.youtube.com/wat...
How to reset forgotten apple id password with the help of an email addresshttps://www.youtube.com/wat...
How to transfer mp3 songs from computer to iPhone without iTuneshttps://www.youtube.com/wat...
How to recover both apple id and passwordhttps://www.youtube.com/wat...
This channel is about technology related tips and tricks. You will find tutorials related to computer, iphone and android phones.
Follow me on:https://plus.google.com/u/0...
Like our pages:http://www.kundanstechhttps://www.facebook.com/ku...
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255251.1/warc/CC-MAIN-20190520001706-20190520023706-00260.warc.gz
|
CC-MAIN-2019-22
| 3,308
| 61
|
https://www.awloveshorizons.org/best-material-for-desk-top/
|
code
|
Are you looking for the best Material for Desk Top but don’t know where to start? We have done much research and analysis to present the best Material for Desk Top available. There are various Material for Desk Top options on the market, and you can get surprising advantages from these products. They vary in price, quality, size, and feature.
This article will explore some of the top Material for Desk Top out there. This comes from Material for Desk Topter going through numerous customer reviews, product reviews, and research into the specifications of the products. At the end of this review, you should be able to make an educated buying decision for one or multiple Material for Desk Top.
Best Material for Desk Top: Top 10 Compared
Top 10 Material for Desk Top of Review:
- PREMIUM QUALITY: Our desk pad is made of PVC material and safeguards your beautiful desk from moisture, dirt, scratches, scuffs, and stains. The ultimate desk / table protection for your desk.
- TEXTURED/FROSTED: Anti-slip texture / frost design which allows you to have a smooth and stable pad on your desk while enjoying it’s transparency. Complete slip and scuff resistant.
- ROUND EDGE: Our desk mat has a round edge design to protect your forearms and elbows from pokes, cuts, and injury. It boosts your productivity at work and keeps your desk long-lasting.
- MULTIPURPOSE & TRANSPARENCY: Use it on your office desk, workstation, activity table, and dining table. Enjoy the cute see-through to view with clarity family photos, calendars and notes placed beneath.
- 30 DAY REPLACEMENT / REFUND WARRANTY: Just in case you have any issues with your new desk and mouse pad bundle. We'll send a replacement or full hassle-free refund.
- ✅ PREMIUM MATERIALS: Built with soft durable wear-resistant real leather-like materials. Add a sleek, modern and executive look to your desk. Helps protect your desk from scratches, laptop burn, and daily wear & tear. Anti-fray frame stitching prevent peeling off.
- ✅ 36"x22"x0.12" EXTRA LARGE dimensions for ultimate protection. Large enough to accommodate your laptop, mouse, and keyboard. Acts like mouse pad and picks up all laser and optical mouse tracking.
- ✅ NON-SLIP BASE: Designed with anti-slip base to keep the mat from moving and sliding on your desk while in use. Perfect to place on top of wooden, glass and plastic desks. *Note: Please ensure to clean the surface of the table for better adherence performance.
- ✅ WATER/UV RESISTANCE: Waterproof, oil-proof, protect your glass/wooden desktop from scratches, stains, and spills. Can be cleaned easily with a cloth.
- ✅ OUTSTANDING SERVICE: Backed with a 1 YEAR warranty and great customer service located in the Silicon Valley. Click on e-TekDepot in the buy box and select "Ask a Question", if you have any questions
- Amazon Kindle Edition
- Kurland, Kristen S. (Author)
- English (Publication Language)
- 397 Pages - 05/04/2021 (Publication Date) - Esri Press (Publisher)
- Tempered magnetic glass compatible with high energy neodymium magnets, dry erase surface never stains or ghosts. White frosted glass background creates high contrast with any color dry erase markers
- Magnetic glass surface duals as a bulletin board enabling the use of rare earth magnets to pin notes, memos and more. Glass whiteboard's magnetic feature will only work with strong neodymium magnets
- Perfect for heavy writing use in any office, home or commercial environment. Works with all dry erase markers. Try U Brands dry erase markers for ultimate board performance
- Modern frameless design hides all hanging hardware. Frameless feature enables multiple glass boards to be hung side by side to create an infinite writing surface
- Mounts vertically or horizontally. Hassle-free mounting hardware and instructions are included
- Hardcover Book
- Cardarelli, François (Author)
- English (Publication Language)
- 2392 Pages - 09/06/2018 (Publication Date) - Springer (Publisher)
- 【DOUBLE-SIDED USED LEATHER DESK MAT】Same material for all the mat, special design to use in both side, 2 in 1 desk pad, just turn it over and you can utilize it.
- 【Protect Your Desk】Water resistant, oil-proof and heat resistant and protects your glass/Wooden desktop from scratches, stains and spills, make the desk table protector pad durable.
- 【Easy to Clean】This leather desk pad made of premium and durable PU leather, If you want to clean it, simply wipe its surface with a wet cloth.
- 【WIDE SURFACE USAGE】Enough to cover and protect large area of your desk, to accommodate your laptop, keyboard and mouse. Its comfortable and smooth surface can be used as laptop desk cover mat, kids desk pad, desk writing pad, desk protector or anywhere you find it suitable.
- 【SATISFACTION GUARANTEE】We are dedicated to providing our customers with high quality products and superior service.If our products are not able to meet your satisfaction for any reason, you will get a replacement or 100% refund.
- EXTENDED WIRELESS COVERAGE: Adds Wi-Fi range coverage up to 1000 sq ft, and connects up to 15 devices such as laptops, smartphones, speakers, IP cameras, tablets, IoT devices, and more.
- AC750 WI-FI SPEED: Provides up to 750Mbps performance using dual-band and patented FastLane(TM) technology.
- UNIVERSAL COMPATIBILITY: Works with any wireless router, gateway, or cable modem with Wi-Fi.
- WIRED ETHERNET PORT: Simply plug in game consoles, streaming players, or other nearby wired devices using the one 10/100M port for maximum speed.
- SAFE & SECURE: Supports WEP and WPA/WPA2 wireless security protocols.
- [Compatibility & USB Plug]: The USB gaming headset is compatible with PC, laptops, MAC devices. USB plug for RGB led light & headset provides a simple and cool operation during gaming. NOTE: It needs extra adapter cable if your device has no USB ports.
- [RGB Lights]: V10 gaming headset has RGB lights effect in multiple colors on both sides. Soft and bright colors create a more attractive atmosphere when playing video games.
- [Noise-cancellation & Easy Control]:The microphone is equipped with the great sensitivity and noise cancellation, can pick up your voice loud and clear. The microphone and volume switch button are on the left side headset, easy to touch and control, and to avoid the cable tangled issue
- [Soft & Comfortable Wearing]: The stretchable headband and the leather-enveloped earmuff design greatly reduce the pressure between the head and ears, allowing the pressure to be evenly dispersed. The material of the leather on the earmuffs also prevents the earphones from being stuffy due to long-time wearing.
- [lmmersive Gaming Audio] Dual 50mm speaker drivers are engineered to produce detailed, balanced soundscape with ultra-low distortion for your games, music, movies, and more
- 📂【Ideal Desk Organizer】Marbrasse newly releases the desk file organizer! The humanized office organization owns 5 sliding trays + 2 Magazine Holders + 2 Hanging Pencil Holders + 1 sliding drawer which tidies up your desktop and is convenient to your office! All the designs specialized to comply with your office, such a perfect supplies desk organizer must be the best choice for your office accessories!
- 📂【Space Saving】All office document folders would be organized by the vertical file holder. The paper tray organizer is very suitable for storing books, magazines, letters, and A4 paper. The drawer organizer and hanging pen holder enough accommodate all office supply accessories, such as pens, pencils, scissors, and so on. Perfect Size: 13.8*11*12inch.
- 📂【Easy To Assemble】The installation can be completed in 12 minutes follow the instruction book, super easy to assemble don't worry about any questions about that!
- 📂【Premium Material】The office supplies desk organizer is made of lightweight durable metal mesh and reinforced with a solid steel frame that makes it have long-lasting strength and reliable performance.
- 📂【Unique Design】Marbrasse exclusive design of the all-in-one desktop file organizer be certain to bring our customers more convenience in the office and be popular in our daily life. We offer a 90-day return policy. You take NO RISK by ordering today! (USPTO Patent Pending, USPTO Patent Application Number: 29816128)
How To Choose The Material for Desk Top: The Buying Guide
Most of the products listed are not selected hand to hand. We used AI (artificial intelligence) to make the list. But we can assure you all the products listed here are of superior quality as they are already tested by real users, rated by expert reviewers, and recommended by real humans.
Key decision-making factors you should consider to select the products:
An important factor to consider when purchasing Material for Desk Top is cost and performance, which typically go hand in hand. With more companies entering the Material for Desk Top market, options for quality and high-performance become increased. Just because a Material for Desk Top is the most expensive does not mean it’s the best choice for you and your hard-earned dollar. There are many lower-priced models available with very good performance and comfort.
Choose the Material for Desk Top from the brand that offers the best value to its customers, with high-quality products and excellent customer service. Good brand products are made with the utmost care and precision, and they’ll always be here to help you answer your query and solve any fault on the products or even refund your money if any damage is found on the products.
Before clicking on the buy now button or adding products to your shopping carts make sure this product meets all the specifications you need.
Product specifications are important when choosing a product. They determine what the product can and cannot do. With so many products on the market, it is important to select the right one for your needs.
Choose the Material for Desk Top made with only the finest materials, and it’s been precision-engineered to meet your needs.
When looking at different specifications, there are three main points to consider: performance, features, and price. Each of these factors is important in making your final decision. By considering all of them, you can be sure that you got the best Material for Desk Top for your buck.
The world is full of amazing Material for Desk Top, and it can be hard to decide which one to purchase. One way to make a decision is by looking at the design. There are many factors that contribute to the overall design of a product, including materials used in manufacturing, color scheme, and even visual weighting. Knowing about these things can help you find a product that suits your taste and needs perfectly.
When it comes to making purchase decisions, many people give significant weight to customer ratings. It’s easy to see why- after all, who knows better what a product is like than the people who have actually used it? When you’re trying to decide which product to buy, checking out the customer ratings can be a great way to get an idea of how others have felt about their experience with the product. Of course, you should always take reviews with a grain of salt- not everyone is going to love every product, and some people might be more likely to leave a review than others. But overall, customer ratings are usually a pretty good indicator of how satisfied people are with a particular product.
Stability and Control
Thesequitur‘s stability and control is an important factor in determining how well it performs, and we weighted this metric.
Consider how much stability or control you want when using the item.
We take into account factors including the impact of this product on our life and how we will feel when using this.
No one wants to deal with discomfort or constraints when enjoying the things they love. Comfort is a critical metric to consider when you’re thinking about using Material for Desk Top. There are many different types of Material for Desk Top that provide stability and control while providing a smooth, comfortable function. For example, when you buy a fishing kayak, you want to ensure that you don’t spend your whole trip thinking about how much you want to get out of your boat because your back is aching or your feet are falling asleep.
The way a Material for Desk Top is designed and manufactured and the material it is made of are key attributes indicating how durable it will be. Choose the best Material for Desk Top that has the ability to withstand wear, pressure, or damage.
What Are The Most Popular Material for Desk Top Models On The Market Today?
There are a variety of Material for Desk Top products available on the market today for men & women who are looking for quality and reliability. All Material for Desk Top models base themselves on the same basic principle. However, they suit different user preferences.
It’s no secret that different products are popular among different demographics. But what if you could see which items were the most popular among all consumers? Well, you can, and we’ve got the list for you. Check out our list to select products that everyone seems to love, regardless of their age, gender, or location.
Some tips to Select the Most Popular Material for Desk Top: Number one, The three most important factors to consider when selecting the most popular products are price, quality, and popularity. Number Two, Price is one of the more obvious considerations since you want to make sure it is reasonable for your needs. Three, Quality should also be considered because if you buy a product with poor quality then that will not help with your overall goal of finding the best possible product. Finally, popularity may not seem like an important factor but it can actually be just as crucial as either price or quality considering how many consumers there are in this world looking for great deals on amazing products.
What is the price range for Material for Desk Top?
Material for Desk Top offer various range prices, depending on their function as well as design. In today’s world, it is hard to know what a product will cost. You typically have no idea how much something costs because the price range can vary so widely. For example, a pair of jeans could be $20-$200 depending on who you buy them from and where you live. The same goes for other products such as Material for Desk Top.
Which type of Material for Desk Top is best?
I’m so sorry if you are confused. It’s not an easy decision to make, I know! But it is one of the most important decisions you’ll ever have to choose between. If you’re still undecided on which type of Material for Desk Top is right for you, I would say check the features and functions of the Material for Desk Top we listed here to find the most suitable one for you. Each has its own pros and cons.
Are Material for Desk Top worth the money?
There’s no doubt that we live in a disposable society. We’re constantly being bombarded with advertisements for the newest and most innovative Material for Desk Top on the market. But are these Material for Desk Top really worth our hard-earned money? Some of them definitely are if you can choose carefully! But others not so much.
When should I buy a new Material for Desk Top?
You’re looking for a new Material for Desk Top that you’ve always wanted. Should you buy it now, or wait? It’s hard to tell what will happen with the price in the future. If there are no signs of slowing down production, then it might be worth buying now so you can enjoy your purchase sooner rather than later. But if production is on the way down and prices are expected to increase, then it might be better off waiting until after all of the hype has died down before making your decision.
Why should I buy a Material for Desk Top?
You can determine whether you need or want a Material for Desk Top by identifying whether you have a similar item. It is probably not something you need and you should reconsider buying it. You could use the money from selling the other item you have to buy the new one if you just can’t let it go.
Let’s face it, we all want to feel good about our purchases. But there are so many. How can you know which is best? You need not be concerned because TheSequitur has your back. Our trained staff is here to help you find what works for you. Before making a final decision, you can take advantage of our free consultations.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334579.46/warc/CC-MAIN-20220925132046-20220925162046-00656.warc.gz
|
CC-MAIN-2022-40
| 16,482
| 79
|
https://answers.sap.com/questions/1684111/doubt-rearding-bdc.html
|
code
|
I am trying out BDC using session method. I am trying t upload 4 field values from a txt file on desktop to sap.
when I process the session it still calls the screen and asks for the values for vendor creation...why does it not take values directly from the txt file? I tried running it in both foregrund and background In case of background it ends up with incorrect transaction.
I do not understand
1.what the parameteer transaction code in bdc insert means
2.when we say perform [subroutine] using [program name] [screen no]- which is this program and screen number?
The transaction code that I created uses the program SAPfm02k and screen 100.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00590.warc.gz
|
CC-MAIN-2022-33
| 647
| 6
|
https://www.fr.freelancer.com/projects/php-linux/iis-application-request-routing-arr/
|
code
|
I need help to configure/setup my Windows 2008 IIS 7 Server which hosts my main website, [url removed, login to view], to use ARR (Application Request Routing) in IIS to point requests to my WordPress blog, [url removed, login to view] , that is running on my Linux VM (at the same data center, just a different VM box).
You will help me:
* configure and understand ARR in IIS (unless there is another proxy solution)
* configure any rewrite rules
* test and check to be sure [url removed, login to view] works and runs as expected with all wp-admin tools
You will help me configure this via TeamViewer and explain via IM so I can learn and understand to do this myself.
3 freelance font une offre moyenne de $92 pour ce travail
I have extensive experience with IIS7.5 and ARR/Url Rewrite. I utilize this technology in an enterprise environment on a day to day basis. I am able to configure rules using the built-in URL Rewrite console and direc Plus
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589270.3/warc/CC-MAIN-20180716115452-20180716135452-00273.warc.gz
|
CC-MAIN-2018-30
| 950
| 8
|
https://devnet.logianalytics.com/rdPage.aspx?rdReport=ForumThreadPosts&CatID=0&dnID=&FID=1&MaxRows=10&ThreadID=37602&YP=0
|
code
|
We have fixed that issue in the 4.1 Composer released the issues that fixed had this descrition:
Scheduler does not take into account timezone. So if the user wants to run schedule job on a specific time, it will run correctly only if server and user browser are in one timezone. Let go through this case:
time now for user is 18:00
time now on server is 16:00
the user creates schedule and wants it to be run on 22:00
Actual: job will run on 22:00 (server time). For user it will be midnight
Expected: job should be run on 22:00 for user (20:00 server time)
fixed in the 4.1 please contact your account manager for details on the upgrade.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657143354.77/warc/CC-MAIN-20200713064946-20200713094946-00438.warc.gz
|
CC-MAIN-2020-29
| 639
| 8
|
https://faq.locize.com/
|
code
|
Can i have more than one translation files (namespaces)?
How can i exclude some content from being translated?
I separated my translations in multiple namespaces...how can i share translations for navigation or footer?
My page initially shows source language before being translated...
My content gets separated. Can i keep my links inside paragraphs?
How can i support translated images or seo friendly routes?
How can i get a list of languages from my locize project and build a language toggler?
How can i use plurals, interpolation or other translation features?
How can i enable the incontext editor?
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806327.92/warc/CC-MAIN-20171121074123-20171121094123-00448.warc.gz
|
CC-MAIN-2017-47
| 605
| 9
|
http://www.ubuntux.org/backup-installation
|
code
|
I successfully installed the Ubuntu server edition on a PC of mine on partition hda1.
Here's how I partitioned the harddisk:
hda1 has 5gb
hda2 has 5gb (currently emtpy)
hda3 has 1gb and is /tmp
The rest is /usr
How can I backup my existing Ubuntu installation into partition hda2? I want to be able to boot from hda2 if the installation in hda1 gets corrupted.
Can I use the same /tmp partition for both installations?
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469258948335.92/warc/CC-MAIN-20160723072908-00097-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 418
| 8
|
https://www.scienaptic.ai/jobs/data-scientist
|
code
|
About the Role
We are looking for an energetic and experienced person as Data Scientist. The chosen candidate will be responsible for interacting with clients and developing all aspects of data mining, predictive analytic, solution development to name a few.
Master's in computer science, Mathematical / ML related disciplines with 3-7 years of experience into core ML
Solid understanding of probability / statistics / data science / ML along with Python + SQL proficiency
Expert Python Programmer: SQL, extremely proficient with the SciPy stack (e.g. NumPy, pandas, scikit learn, matplotlib);
Proficiency in work with open-source deep learning libraries like TensorFlow, Keras, Pytorch
Test of hypotheses and analysis of ML models and optimizing models for accuracy
Experience with Spark or other distributed computing systems for large scale training and prediction of ML models
End to end system design: data analysis, feature engineering, technique selection, implementation, debugging, and maintenance in production
Experience with unstructured data and text mining skill set is a plus
Note: We are looking for candidates who are presently serving their notice or who can join us within 15-20 days.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585424.97/warc/CC-MAIN-20211021133500-20211021163500-00513.warc.gz
|
CC-MAIN-2021-43
| 1,203
| 11
|
http://www.aomskins.com/2011/07/proxima.html
|
code
|
For a versatile theme with a contemporary feel, look no further than Proxima. This stylish template uses a floating-style logo set against a dark full-width horizontal bar (which also contains a reduced-size search feature), and room for a regular ad unit. Beneath that is an offset rollover menu bar displaying the standard features (most of which can be removed as usual) along with your own fully customizable links.
This theme is variable width to suit your needs and has many eye-catching details, such as the vertical lines separating the product images from descriptions, as well as a full button set for all current Amazon locales, including a streamlined search button in all languages, and even a custom go button for the advanced search page.
In addition, there are four exciting color schemes to choose from – Forest, Sand, Sangria and Charcoal.
Thumbnails (click to view):
- Full set of custom Amazon buttons for all current locales
- Preset shopping cart text that you can override
- Four color schemes included
- Three example home page designs
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505366.8/warc/CC-MAIN-20200401034127-20200401064127-00139.warc.gz
|
CC-MAIN-2020-16
| 1,061
| 8
|
https://www.entryleveljobs.me/job-opening/27354-manufacturing-quality/test-engineering-intern--summer-2020-at-google
|
code
|
Applicants will be evaluated for both the Manufacturing Quality Engineer Internship and Manufacturing Test Engineer Internship. If you’re interested in either, please apply to this posting.
Join us for a unique 12-14 week internship during Summer 2020 with start dates in May and June.To apply: You must submit all of the following materials:
- Resume: relevant coding language(s) along with any technical experience or projects.
- Transcript: unofficial or official; must be in English.
Note: By applying to this position your application is automatically submitted to the following locations: Sunnyvale, CA, USA; Atlanta, GA, USA
- Currently pursuing a Bachelor’s degree in Electrical Engineering, Computer Engineering, Computer Science, Data Science, Applied Mathematics, Applied Statistics, Operation Research or a related technical field and returning to a degree program after the internship.
- Experience with one or more of the following: Statistical computing in R, Python/pandas or stata etc., Linux/Unix operating systems, Coding/Programming in Python or other scripting languages, extracting actionable insights and ability to present it to technical and non-technical audience.
- Relevant internship or work experience in either Mechanical Engineering, Supply Chain, Process Engineering, Manufacturing Engineering, or a related discipline.
- Experience debugging and troubleshooting with electronics and/or firmware.
- Familiarity with running scalable web apps on Google or other cloud infrastructure.
- Authorization to work in the United States.
- Available to work full time for 12-14 weeks during the summer from May 2020 to August 2020 or June 2020 to September 2020.
About the job
The role: Manufacturing Quality/Test Engineering Intern
At Google, our philosophy is build it, break it and then rebuild it better. That thinking is at the core of how we approach testing at Google. In this role, you will be developing and maintaining the systems that allow our manufacturing test engineering team to scale sub-linearly to meet the challenges of delivering a test engineering function for Google’s various new products as well as our existing sustaining products.
The Manufacturing Operations team is responsible for providing the manufacturing capability to deliver this state-of-the-art physical infrastructure. As a Manufacturing Test Engineering Intern, you evaluate the product designs and create the processes, tools and procedures behind Google’s powerful search technology. When vendors build parts for our infrastructure, you’re right there alongside ensuring manufacturing processes are repeatable and controlled. You collaborate with Commodity Managers and Design Engineers to determine Google’s infrastructure needs and product specifications. Your work ensures the various pieces of Google’s infrastructure fit together perfectly and keep our systems humming along smoothly for a seamless user experience.
The area: Technical Infrastructure
Behind everything our users see online is the architecture built by the Technical Infrastructure team to keep it running. From developing and maintaining our data centers to building the next generation of Google platforms, we make Google's product portfolio possible. We're proud to be our engineers' engineers and love voiding warranties by taking things apart so we can rebuild them. We're always on call to keep our networks up and running, ensuring our users have the best and fastest experience possible.
- Participate in continuous improvement initiatives to improve cycle time, coverage, cost, and reliability for manufacturing test platforms providing ongoing software and infrastructure support for our external manufacturing partners and internal test development teams.
- Understand product architecture, both Hardware and Firmware. Debug failing product and develop troubleshooting guidelines and training.
- Use hardware knowledge of items such as Oscilloscopes, DMM’s, Signal Analyzers, Pattern Generators, etc. to aid in debug and tester development.
- Develop manufacturing tools, processes for new product introduction, new technologies, product test methods/tester architectures engage in test script development to automate manufacturing test and develop product specific software required for the configuration, programming, and validation of Google’s hardware data center products.
- Understand product architecture (both Hardware and Firmware), debug failing products, develop troubleshooting guidelines and training, create/maintain test plans and debug process plans for manufacturing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506580.20/warc/CC-MAIN-20200402014600-20200402044600-00487.warc.gz
|
CC-MAIN-2020-16
| 4,600
| 23
|
https://stats.stackexchange.com/questions/44410/terminology-question-is-there-a-generic-name-for-the-set-of-probabilities-corre
|
code
|
Given a set $P_i$ of probabilities and a Cumulative Distribution Function of $X$ you can find the set $X_i$ of values of $X$ corresponding to $P_i$. The $X_i$ are the "quantiles". Is there an equivalent generic term for referring to the $P_i$ corresponding to a given set of $X_i$?
You could refer to them as the CDF but in standard use that refers to the $P_i$ corresponding to all the $X_i$ rather than some designated subset of interest.
In the absence of a pre-existing name I'll probably use some awful phrase like "Corresponding Cumulative Probabilities" (abbreviated as CCP and pronounced "soviets").
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656737.96/warc/CC-MAIN-20230609132648-20230609162648-00231.warc.gz
|
CC-MAIN-2023-23
| 607
| 3
|
http://semarca.com/samsHelp/sams_c_s.htm
|
code
|
SAMS C/S is written for both the beginner
and sophisticated database users to be productive right away. Our
product, SAMS C/S is written in the Delphi language with the Advantage
Client/Server database. We
have incorporated Seagateís Crystal Reports as the report writer. Therefore
it is reliable, fast, and intuitive. You can maintain your membership
information as well as prospects, PAC, exhibitors, attendees, and orders.
There are several additional modules to help you track a variety of information
including Center of Influence, Event Scheduler, and Legislator tracking.
Delphi 7.0 Program Language
Borlandís Delphi product is a 32 bit architecture
programming language. Itís the next generation in the world of software.
Delphi is a RAD (Rapid Application Development) tool that is especially
well suited to building Internet, database, and distributed applications.
Client / Server Technology
Client/server can be characterized by the
division of an application into components processed on different networked
computers. It is made up of two parts: a client, which requests a service
or information from a server; and a server, which processes the request,
performs the service, and returns only the requested information to the
client. Applications based on the client/sever model of computing provide
greater speed in deploying application functionality across a network.
. The power of client/sever is that it allows network traffic to be kept
at a minimum. The definition of client/server technology is provided by
Technology Services Organization of America.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247479159.2/warc/CC-MAIN-20190215204316-20190215230316-00406.warc.gz
|
CC-MAIN-2019-09
| 1,577
| 25
|
http://bobthechemist.com/2015/12/
|
code
|
I received an Arduino Uno for Christmas this year, so my Dad and I spent some of the holiday time doing some projects. His job was to get a circuit built implementing a 74HC595 Shift Register and my task was to set up some RF communication. Dad completed his project before I did, but as I’m on vacation all this week, I was able to finally get something up and running.
Just a short message to announce that I am working on a voice recognition system for the Raspberry Pi that has less overhead than some of the currently available options. More can be found in the Readme file of the github repository and I’ll be updating this system over the next few days.
Quite a while back, I used Jasper to create a speech recognition periodic table fun fact program. That was before my website was revamped and I lost the original blog post. (Well, I do have it in my backups, but it’s not really worth reviving at this point.) I do have a video showing the results, however:
I’ve started to revisit this project, and here are my first thoughts…
I’m no longer going to use the phrase like getting water from a stone, because it is probably easier than getting sound from a Raspberry Pi! Here’s some notes on how I’ve coaxed a few notes out of my Pi.
Is it time for you to do a science fair project? Are you looking for ideas? You’ve come to the right place.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039747369.90/warc/CC-MAIN-20181121072501-20181121094501-00237.warc.gz
|
CC-MAIN-2018-47
| 1,367
| 6
|
http://informationcontraband.com/software/adobe-photoshop/giving-away-the-farm
|
code
|
December 21, 2011Photoshop, Retouching
Photoshop’s Vanishing Point can push the grids back into your document. Make a new
white-filled layer that is set to Multiply Mode empty layer before you head into Vanishing Point. In VP, check out the drop-down menu in the upper left-hand corner (it’s tiny). Turn on Render Grids to Photoshop, draw your grids, and hit OK. Now you have grids on their own layer. It will save you a LOT of time when matching type to box faces or other perspective-y things.
When you have something you wanna liquefy, get it on its own layer, or a merged layer with everything.
(Use The Claw [Command+Shift+Option+E/Ctrl+Shift+Alt+E])
and then Image>Image size>[something smaller here, but still big enough to see properly];
then Liquefy, and when you’re done, before you hit ok, Save Mesh and Cancel.
Step back in history to just before you resized.
Filter>Liquefy, Load Mesh, OK.
This will let you work on a lower res image (faster in Liquefy’s private memory space) and also allow you to use much larger brush sizes relative to the image. I always save right before I run heavy duty filters like Liquefy, in case of a crash.
The combination of these two things will let you use grids of any size inside Liquefy. Resize your file, Vanishing Point yourself some grids on a new layer, do your Liquefy, (Save Mesh and Cancel), step back a couple of steps in History, make sure you’re on the right layer, run Liquefy (Load Mesh, OK) and there you are.
This all sounds like a giant pain in the ass, but it’s actually very fast.
|| Thanks to +Dennis Dunbar for pointing out that VP can draw grids on a blank layer. I thought it had to be filled with pixels. He’s got a good tutorial on grids-from-VP here: http://www.dunbardigital.com/blog/blog.php?id=381721930900789741
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118851.8/warc/CC-MAIN-20170423031158-00170-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,801
| 13
|
https://www.romhacking.net/forum/index.php?action=profile;u=14265;area=showposts;start=40
|
code
|
I need help on inserting these graphics to my Final Fight One hack, including fix a bug as well.
You can check out my hack here: http://www.romhacking.net/hacks/3495/
Here's what I need help on:
I want to replace Rolento's sprites with the ones from Final Fight 2, the custom sprites were made by PrimeOP:
The reason why he has only three walking frames and one jump kick frame is because I want to change their behavior to be more like their FF2 counterparts and also replicate the SNES limitations that the other characters in this game have as well.
So I need someone to change them to be more like how they behaved in FF2.
I also want to replace Jessica's sprites that are used in the intro for stage 1 with these, they were made by kensuyjin33:
Including find a way to get Damnd to hold her, instead of her sitting on top of his arm as well.
I also want to replace the Japanese font that appears underneath the title screen logo with this, it was made by kensuyjin33:
I also need help on fixing this bug that appears underneath Alpha Cody's portrait when you select him, I circled the location of it:
I recently discovered that the Game Clear BGM is in this port, but hidden. I would like that to be played after you defeat Belger instead of the Round Clear music.
According to the Zophar Music website, the track number for it is 99: https://www.zophar.net/music/gameboy-advance-gsf/final-fight-one
That's why I'm looking for a GBA hacking expert that can insert the new sprites, change the behavior of those frames, have Damnd holding Jessica, fix the bug and restore the unused music track.
If someone can help me on all of this, that will be great.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780061350.42/warc/CC-MAIN-20210929004757-20210929034757-00647.warc.gz
|
CC-MAIN-2021-39
| 1,657
| 14
|
https://hired.com/job/manager-privacy-data-governance
|
code
|
We are looking for an exceptionally hardworking individual with a real passion for privacy and data protection to join the Privacy and Data Governance team in San Francisco.
New questions and scenarios arise every single day, and we need an agile problem solver with privacy and compliance expertise to continue to execute on and improve our processes in order to scale with our business and the global regulatory landscape. You will provide privacy guidance to all teams within Slack to ensure that our policies address our customers' needs and our own compliance obligations.
This position reports to the Sr. Manager of Privacy and will collaborate with our global Privacy and Data Governance team and many other stakeholders.
Slack has a positive, diverse, and supportive culture-we look for people who are curious, inventive, and work to be a little better every single day. In our work together we aim to be smart, humble, hardworking and, above all, collaborative. If this sounds like a good fit for you, why not say hello?
What you'll be doing
* Partner with Slack internal teams globally to identify privacy issues, propose solutions and translate practices into official procedures. * Manage submission and compliance obligations related to the privacy related certifications and data transfer self assessment programs. * Support Privacy team members in executing privacy operations to address sensitive policy, privacy and data protection questions. * Partner closely with the Slack Security team as a point of contact and escalation for incident evaluation and response. * Lead the privacy program risk assessment processes and documentation to ensure we are meeting privacy accountability framework requirements. * Support Sales and Customer Experience by participating in customer meetings to explain and demonstrate Slack's commitment to protecting Customer Data and compliance with different privacy laws. * Develop and deliver privacy and data protection related communications and training internally at Slack. * Lead and run the operations for the export compliance program.
What you should have
Slack is an Equal Opportunity Employer and participant in the U.S. Federal E-Verify program. Women, minorities, individuals with disabilities and protected veterans are encouraged to
Let your dream job find you.
Sign up to start matching with top companies. It’s fast and free.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964360803.0/warc/CC-MAIN-20211201113241-20211201143241-00210.warc.gz
|
CC-MAIN-2021-49
| 2,393
| 10
|
http://techno-roots.com/blog/here-are-9-java-based-web-tools-to-make-your-life-easier/
|
code
|
Coders and developers lead quite the extraordinary life. Often engrossed in their computers over hot piping cups of coffee, they are a rare breed who love what they do, for...
Web Browsers and web based tools are often designed in order to boost the user’s productivity. While browsers do it by being fast and having various features, there are other tools as well, like plugins, software and other kinds of tools. Here are some that have been designed in Java and make your life easier.
Dolphin makes mobile browsing easy, adapting to the way you want to browse with customisable settings, voice and gesture control, and sharing features. It is arguably the fastest mobile browser available on the Android or iOS ecosystems today.
Available for Microsoft’s Windows and Apple’s Mac computers, this software helps users earn more profits from the store(s) that they set up on eBay. It is a free calculator that helps you determine whether selling an item on eBay will be profitable or not. It is free to use and share.
The OpenAMF project is a free open-source alternative to Macromedia’s Java Flash Remoting. It is as capable of providing application services to Flash MX as Macromedia’s proprietary solution. This project began as a Java port of AMF-PHP.
Stream-2-Stream (S2S) implements Multicast+, which is a next generation streaming protocol. Multicast+ is more efficient and requires less bandwidth than direct streaming. Stream-2-Stream stations have no user limit and can be set up without paying a fortune for bandwidth. It saves bandwidth by passing streams from one peer to another through multicast and unicast P2P, rather than everyone getting a stream from one central server.
Cascade Server can publish your content to any platform, including mobile devices. This tool can be used to take advantage of,
– Customisable mobile outputs
– Free mobile templates included in our services
– Our expertise in mobile optimisation
– Responsive Web Design
– Client examples
This is the Eclipse of Web Browsers. What do we mean? Well, it is a secure social web browsing and multi-user messaging system. You will need to run your own version of MySQL. Also, the project is under active development and looking for project leaders, just in case you’re looking for something to do.
A pure Java-based FTP server with a complete security structure, virtual directories/roots, object-based internal representation of files, and designed to be seamlessly cross-platform.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825349.51/warc/CC-MAIN-20181214022947-20181214044447-00553.warc.gz
|
CC-MAIN-2018-51
| 2,488
| 14
|
http://www.codeproject.com/Questions/442400/Request-URL-Too-Long-HTTP-Error-414-The-request-UR
|
code
|
I am running into this one particular problem. I have a site which uses frames that are loaded on each tab change. When I try to navigate from a frame to another page using left NavPane, it shows up the following error (this is occuring only in chorme and firefox but not in IE).
Request URL Too Long
HTTP Error 414. The request URL is too long.
Can someone please direct me?
This content, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539066.13/warc/CC-MAIN-20140416005219-00574-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 493
| 5
|
https://www.wayup.com/i-j-Goldstone-Partners-Inc-020221440162315/
|
code
|
As the newest member of our development team you will be designing, maintaining, and improving our platform. Your React.js experience will help us enhance the front-end of our product but since we are a small team you’ll be pitching in throughout the stack. To keep our team running like a well-oiled machine, you have mastered collaboration with your active and consistent communication. We are comfortable with in office, remote work or a blend to help you integrate your lifestyle. If you appreciate quality and want to work with true professionals who are building something useful, let’s talk!
HOW YOU’LL SPEND YOUR DAYS:
WHAT YOU’LL BRING WITH YOU:
AS PART OF THE TEAM YOU’LL ENJOY:
Goldstone Partners is helping this successful startup through its hyper-growth stage, and we are looking for Superheroes. Please send your resume to us directly at success'at'goldstonepartners.com. Principals only, please. Applications welcomed from US Citizens and Green Card holders only.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348519531.94/warc/CC-MAIN-20200606190934-20200606220934-00409.warc.gz
|
CC-MAIN-2020-24
| 989
| 5
|
https://vt200.com/greetings-from-etherpad-fad/
|
code
|
Hello and greetings from the Etherpad FAD.
Spot, Sebastian, and Jon discuss the "fascinating" web of Java found in etherpad.
Sam and Kevin float through code
DJ and Crawford look into c3p0 issues with Java 1.6
Our furthest travelers come from hail from New York. And while we hack away here in Massachusetts, Etherpad hackers are converging on Bradford, UK. Our goals are somewhat different, they are working on features and tickets in the codebase. We're looking at packaging etherpad for fedora, and all the legal, dependencies.
- We've made some exciting discoveries:
4 copies of JQuery
3 different versions of JQuery =]
At least 2 different copies of Rhino
- Plus large dependencies whose purpose in life are things like:
Creates a blob of image data in a format readable by a web browser that consists of a solid, opaque color and has the given width and height.
Progress with the dependencies is steady. Most recent news is that the upstream version of the Sanselan library doesn't turn Etherpad inside out. We have stellar builders/packagers in SDZ, Jon Stanley, and Spot. I'm picking up rpm packaging and hope to be a full master by the time the weekend is out (okay maybe not master). Kevin is presently teaching Andy how the Operational Transformation algorithm works. People are heading out as they finish up their tasks. Day 2 only looks to be better.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304287.0/warc/CC-MAIN-20220123141754-20220123171754-00494.warc.gz
|
CC-MAIN-2022-05
| 1,363
| 12
|
http://www.vyoms.com/jobs/details/tcs-hiring-for-aws-developer-with-java-35128.asp
|
code
|
Knowledge in AWS (Amazon Web Service) / cloud computing
Along with Java Skills :
Core Java, servlets
Java Frameworks ( Struts/Spring/Hibernate )
Java/J2EE-Web application Development experience
Knowledge in Google Play framework
UI Skills :
Experience creating pages independently and decide front end architecture.
Well versed with CSS positioning, widely used CSS rules, able to style pages as per design.
Good at jQuery
Experience on Twitter Bootstrap
Experience of integrating front end with back end.
Experience of setting up development environment for both front end and back end for integration.
Salary: Not Disclosed by Recruiter
Industry: IT-Software / Software Services
Functional Area: IT Software - Application Programming, Maintenance
Role Category: Team Lead/Technical Lead
Role: Team Lead/Technical Lead
PG - Any Postgraduate
TCS is an Indian multinational information technology service, consulting and business solutions company headquartered in Mumbai, Maharashtra. It is a subsidiary of the Tata Group and operates in 46 countries.
Recruiter Name:Mr. K Sudeep
Contact Company:Tata Consultancy Services Ltd
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825057.91/warc/CC-MAIN-20171022022540-20171022042540-00687.warc.gz
|
CC-MAIN-2017-43
| 1,125
| 22
|
https://www.petrikainulainen.net/weekly/java-testing-weekly-44-2018/
|
code
|
There are many software development blogs out there, but many of them don't publish testing articles on a regular basis.
Also, I have noticed that some software developers don't read blogs written by software testers. That is a shame because I think that we can learn a lot from them.
That is why I decided to create a newsletter that shares the best testing articles which I found during the last week.
Let's get started.
- How to avoid "No tests were found" when using JUnit 5 with Groovy is a practical blog post that helps you avoid a very common mistake that is often made by people who are familiar with the Spock Framework.
- Use null values in JUnit 5 parameterized tests is a practical blog post that describes how you can provide
nullvalues to parameterized tests by using the
- Writing Tests for Web Applications With TestProject is the third part of my TestProject tutorial, and it describes how you can write tests for web applications.
The Really Valuable Stuff
- Testing is storytelling is an excellent blog post that explains why you shouldn't write tests whose only purpose is to ensure that your code has no bugs.
It's Time to Update Your Dependencies
No updates this week.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304959.80/warc/CC-MAIN-20220126162115-20220126192115-00061.warc.gz
|
CC-MAIN-2022-05
| 1,191
| 12
|
http://inspiredesign.me/2017/02/08/facebook-redesign-roland-hidvegi/
|
code
|
As Roland mentioned in his brief description, he worked on multiple UI elements to improve User Experience. He built a new set of icons which feature an outlined style rather than a filled one. In this way, he managed to make the content cleaner and lighter.
Regarding colors, Roland used bright tones, such as Green, Blue, Orange and Red to emphasize particular elements. He had a particular attention for the icons, transforming the current skeuomorphism-style set to a flat one. In this way, there is more consistency on the platform, also given by the grey-only set of icons in the left navigation bar.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120881.99/warc/CC-MAIN-20170423031200-00206-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 606
| 2
|
https://software-dev.xsede.org/global-software-service-tags/information-services
|
code
|
XSEDE information services command line query tool
The Resource Description Repository (RDR) is XSEDE's central repository for static manually maintained information about HPC, HTC, Storage, and Visualization resources
© XSEDE All Rights Reserved. Visit the Feedback page for assistance or to provide feedback.
The Extreme Science and Engineering Discovery Environment is supported by the National Science Foundation.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711001.28/warc/CC-MAIN-20221205000525-20221205030525-00084.warc.gz
|
CC-MAIN-2022-49
| 418
| 4
|
http://stackoverflow.com/questions/460752/saxon-xalan-jsp
|
code
|
We started with Q&A. Technical documentation is next, and we need your help.
Whether you're a beginner or an experienced developer, you can contribute.
I have a JSP which attaches a XSL to an XML document pulled from a database. The application is using the Saxon Parser but my XML needs to use the Xalan one. Can a JSP page override which parser to use?
Instead of using TransformerFactory which was using the default (Saxon) I am using the class TransformerFactoryImpl which is specfic to Xalan. All seems to be working.
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
7 years ago
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257823989.0/warc/CC-MAIN-20160723071023-00126-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 611
| 8
|
https://www.survata.com/market-research/resources/weighting/
|
code
|
Weighting is a data processing technique that allows researchers to change the value of a particular respondent’s answers relative to the rest of the responses in a dataset. This allows researchers to correct for sampling imbalances by adjusting the data to be more representative of their desired target population.
This technique is commonly used to make a dataset more closely represent the Census. For example, a polling company has just run a survey of n=2,000 registered voters, but they discover that there is some skew in their age groups:
Thus, they need to create a weight to increase the value of the underrepresented age groups (like 35–44 year olds), and decrease the value of the overrepresented age groups (like 18–24 year olds). This is the method they use to create their weight:
When they implement their weight in their data analysis tool and check the percentages for the age groups, the percentage for each age group now matches their target Census percentages. The weights used in this example are more ideal because they hover close to 1. Very large weights can result in skewed data, so it is important to keep track of how large your weights are. Weights can become exceptionally large when several different factors are being factored into a weight (such as trying to weight the data based on age, gender, region, and ethnicity). The more variables that are factored into a weight, the greater the chance that the weights can become too large.
A recent example of this is highlighted in an article discussing how one man, due to his particular demographic grouping and voting preferences, was “weighted as much as 30 times more than the average respondent, and as much as 300 times more than the least-weighted respondent.”
Thus, it is important to always review any weighting variables before moving forward with analysis, and to be sensitive to the effects of weighting when reviewing and analyzing data.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027318375.80/warc/CC-MAIN-20190823104239-20190823130239-00141.warc.gz
|
CC-MAIN-2019-35
| 1,942
| 6
|
https://giveeasy.zendesk.com/hc/en-us/articles/360021439754-Deleting-and-adding-a-Live-Thermometer-Bar
|
code
|
Thermometer bars are a great way to create urgency on donation pages especially around appeals and at the end of campaigns.
This article shows you how to delete and re-add a thermometer. Reasons you might need to do this are:
1. You have incorrectly set up the thermometer bar on your first try
2. You have duplicated an appeal and a thermometer bar is there from the original appeal - you need to set up the thermomter bar again to take into account all of your tracking links of your new appeal.
You will see something that looks like this (in your editor mode)
3. Click on the pencil icon and Put your cursor below the thermometer bar - your cursor should be below the thermometer bar
2. Push back-space (or delete depending on the computer and the thermometer bar should disappear
Now, the steps below show how you may want the live thermometer bar back. Our suggestion here is
A plus button should appear on the left hand side. Click on that button..
Choose the right most image which looks like a temperature gauge
Now you can set it up normally again by clicking on "Click Here To Set up a Progress Bar" - make sure you click on that and select all the tracking links as normal including the goal set up.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475727.3/warc/CC-MAIN-20240302020802-20240302050802-00879.warc.gz
|
CC-MAIN-2024-10
| 1,211
| 11
|
https://brandinovin.com/2021/06/29/what-are-the-best-websites-to-build-an-app-for/
|
code
|
What are some of the best sites to build apps for?
In this article, we’ll take a look at the best of the most popular web design studios.
As you’ll see, there are so many amazing sites out there, it can be overwhelming to narrow down the top 10 and narrow it down to only the top ten.
That’s why we’ve compiled the best web design sites on the web today.
There are also tons of free and paid resources out there to help you find the best design sites, so feel free to dive in.
If you want to learn how to make an app, you might want to start by reading our article, What are Web Design Websites for iPhone?
The best websites: 1.
Sketchfab (Sketchfab) source Google (Canada)* 2.
Sketchly (Skelly) source The Guardian article 3.
Fotograf (Fotograf) source BuzzFeed article 4.
Design Studio (Dsquared) source Kotaku article 5.
Wunderlist (Wunderlist) source Gizmodo article 6.
Dribbble (Dribbler) source Polygon article 7.
Tumblr (Tumblrs) source Engadget article 8.
iCadet (iCadets) source Ars Technica article 9.
Giphy (Giphy) source Mashable article 10.
Design By Design (Design By Design) source Wired article 1.
Sketchesfab 2. Fotogs 3.
Design Studio 9.
DesignByDesign 10. Dribbler
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663013003.96/warc/CC-MAIN-20220528062047-20220528092047-00366.warc.gz
|
CC-MAIN-2022-21
| 1,191
| 20
|
http://www.linuxquestions.org/questions/slackware-14/host-lookup-failure-with-sendmail-236581/
|
code
|
SlackwareThis Forum is for the discussion of Slackware Linux.
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
I have a problem with sending mail from my fileserver (named Arkiv, for LAN access only) to my mailserver (named Post, in a DMZ). I basically only want to do this to aggregate my logcheck, etc mails in one mailbox, that is also accessible from the outside.
The fileserver is separated from the mailserver by a firewall where only sendmail connections orginating from the fileserver are allowed through (as well as ssh). The fileserver is not allowed any direct contact with the Internet.
Sending mail locally between users on the fileserver works fine and when I try to "telnet post 25" to the mailserver I can manually send mail through.
The problems start when I try to send an mail in any other way between the boxes. I then get the message accepted for delivery but then the host name resolve fails for some reason.
In var/log/maillog the attemted mail submission looks like this:
Should this mailertable contain the host I am using? or the host that keeps bouncing mail back with Hostname lookup failure? I have about 6 ip's that bounce mail back with either hostname lookup failure, or Timeout exceeded. All other ip's can send mail just fine. I use sendmail on slackware 12.2 and earthlink and netcom.com as well as mindspring.com keep bouncing my mail back with these errors. I run through a motorola router (DSL) and just can't seem to figure out how to send email to these certain ip's. They can send email into me, but I can't send to them. Is there anything I can do to fix this?
Last edited by mirader9813; 05-14-2009 at 03:08 PM.
Reason: add more info
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120101.11/warc/CC-MAIN-20170423031200-00447-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 3,061
| 18
|
https://discuss.elastic.co/t/cannot-create-a-cluster-in-vmware-elasticsearch-5-6-5/112243
|
code
|
Im trying to Create a Cluster between some virtual Machines inside Vmware. Elasticsaerch is running on both machines and i have changes the config files as but still no success. here are my config files:
discovery.zen.ping.unicast.hosts: ["10.0.1.12", "10.0.1.11"]
discovery.zen.ping.unicast.hosts: ["10.0.1.11", "10.0.1.12"]
i checked the logs files and they can't discover each other
I also disables firewall on both machines
P.S Both machines can ping each other
Could you share the logs? Nothing looks wrong.
Make sure port 9300 is opened, like try to telnet on port 9300 from one machine to another.
[root@localhost elasticsearch]# telnet 10.0.1.12 9300
telnet: connect to address 10.0.1.12: No route to host
So you need to fix that.
This is outside the scope of elasticsearch.
But I believe that your VMs must expose public IPs somewhat. And that you should use those.
This topic was automatically closed 28 days after the last reply. New replies are no longer allowed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823710.44/warc/CC-MAIN-20181212000955-20181212022455-00502.warc.gz
|
CC-MAIN-2018-51
| 975
| 14
|
https://thomas.inf3.ch/2012-02-07-owncloud/
|
code
|
Now with OwnCloud
After a long pause in this blog, I just updated the broken edition method. Before, the only method to add new notes in this blog was using SVN, which was broken when I migrated to Mercurial.
Now, I shared a folder with WebDAV, using ownCloud so that I can access these notes from anywhere using either a mounted folder in my home directory or the online interface.
As soon as an entry is added or modified, a small watch script launch a blog recompilation :
while inotifywait -e modify $SHARED_FOLDER; do
cp $SHARED_FOLDER/* $BUILD_FOLDER
echo "Recompiled blog"
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474676.79/warc/CC-MAIN-20240227153053-20240227183053-00131.warc.gz
|
CC-MAIN-2024-10
| 579
| 7
|
https://devrant.com/search?term=blue+screen+of+death
|
code
|
Do all the things like ++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatarSign Up
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple APILearn More
Search - "blue screen of death"
WINDOWS USER VS LINUX USER
A Windows User's view on computing
I have the blue screen of death again
You'll never hear me say
I'm happy with my computer
At the end of the day
my operating system
in programs i use and the features I've
i have complete control
i lose sleep
worrying about getting viruses
microsoft patching vulnerabilities in time
i don't have time to think about
some thing better.
to live with old software issues
There's no way i'm planning
to change, and
its worth it to me
A Linux User's view on computing
(read this bottom to top)15
For those who don't know, this is how Apple pictures a PC in the network, a CRT display with blue-screen-of-death!13
A recruiter called today.
A new job proposal. Higher salary, manage some 5 men team, DevOps buzzwords, cool product, great conditions but then she says "and we're working only in Windows environment".
My ears ringed "only in windows env".. "only windows"... "windooowwssss".
"Nope, thanks, have a good day!" - hung up.18
Just saw a blue screen of death In the top of a taxi cab. Had no idea these kind of signs were running Windows. Why are so many companies buying licenses for Windows when they could so easily use Linux ?21
You've perhaps heard of Blue Screen Of Death in Windows. But how about GREEN screen of death?
Driver issues goddammit.8
So after 5 years you finally show your face..the blue screen of death! And this shit is stuck for past 30 mins.9
This happened a few weeks ago at school.
The previous semester we had to work in a group to make a basic Android application. After handing it in to the teacher, we had to present it in front off the class.
During this project, one of the groups was having some problems with a member, mainly because of misunderstandings and miscommunication. He definitely has technical skills, but he really needs to work on his focus and communicational skills.
The member was removed from the group and had to do it on his own. He had 2 days to make the app, which we initially got 2 weeks for.
Skip forward to presentation day.
Every group presented their app and got feedback from the teacher and the rest of the students.
Lastly, the guy that was on his own was giving his presentation. He started his powerpoint and explained what happened during the project and what went wrong. Then he said: "This is a black page in my school career, everything that could have gone wrong, went wrong". Immediately after saying this, he proceeds to go to the next slide: His laptop crashed, Blue Screen Of Death.
This was one of the most painful moments I've ever witnessed during a presentation.
I couldn't believe the timing of Windows to fuck up.2
We work in an office where we must lock our computer screens because our screens may have confidential information on them, plus you could do things as the person without taking any blame (ie sending an email).
Anyways anytime someone forgets to lock their screen we always prank them pretty hard. The greatest thing we ever did was in our latest release we had our managers buy us drinks at the pub. Well our managers left to go to the pub and one of them forgot to lock their computers. So we downloaded an image of the blue screen of death and made it full screen, unplugged his mouse and keyboard for added effect, and locked his computer. He came in the next Monday and couldn't log in because his keyboard wouldn't work. He actually called IT to bring him a new keyboard and mouse... then he unlocked his computer and freaked out with the IT guy because there was the blue screen of death. Needless to say he got a brand new computer as well as a new mouse and keyboard.
I'd call it a win win?1
Just got a new monitor (HKC NB34C) and connected it to my PC (which didn't have a monitor at the time)
The first thing I see is a green screen of death because of a power outage during a Windows insiders update.11
Here's an issue I've been having with my PC for the past year;
*gets blue screen of death* (every 5 mins)
*takes out my second pair of ram cards, blue screening stops*
*waits a day, puts cards back in, has no more problems for 1-2 weeks*
*gets more blue screens*
If I leave the cards out, the system NEVER has any issues.
But, I can't play games smoothly on 4gb of ram.
Also, I can't afford new cards.18
me: oh im not really afraid of anything
*sees the blue screen of death*
also me: okay,, i guess i am afraid of something...3
Just entered my password, looked at devrant on my phone, looked back on the screen. "Here you go f**kwhit, I turned into the blue screen of death just because I didn't had your attention"
Did this another time while writing this rant. F**K OFF Winderp!12
Microsft (before Win 8 ): we have to fix the blue screen of death! People are pissed off seeing it appear again and again.
Windows: We will do something
*In its remastered blue screen - adds a sad face emoji, changes the shade of blue, and inserts a QRCode for the user to play with in the meantime*
Microsoft ( after win 8) :Good Job Team, it looks great now, people are gonna love it, especially the QRCode feature!5
As a kid (in the 90s) I used to get a reoccurring nightmare that my family computer would get a blue screen of death and start screaming at me.
Legit hated computers as a kid because of that.2
While I'm not a dev, I do love computers and I do know my way around them, so friends/family often ask me for tech support.
Friend: Please fix my computer!
Me: what's wrong with it?
Friend: *sends me pic of blue screen of death*
Me: I don't think you understand
✓ running server on windows 10
✓ running postgresql server
✓ running ngrok server
✓ running android studio
✓ running 15 chrome tabs
✓ running ubuntu virtualbox
✓ scraping a website with python in ubuntu
✓ laptop freezes
✓ gently slam the laptop so it can go to sleep mode
✓ try to login so it can unfreeze
✓ get a purple screen of death
✓ system crashed and has to restart
✓ get a blue screen of death for memory diagnostic tool
✓ all unsaved work is lost
✓ gtx 1060
✓ 8gb ram
✓ acer laptop of $2400
✓ regret buying acer laptop11
Project manager: "we need someone who isn't busy to work on the database for a few weeks"
*Fullscreen picture of Windows blue screen of death*
Me: "what the fuck bug after bug"
Project manager: "ouch you better work on that ASAP we are behind"
Windows... Thou art a fickle mistress...
How dost thou survive the most deadly code written by the most wearied devs yet cannot survive the adding of one of thine own features using thine own "turn windows features on or off"?
Thine face now turns blue each time thou art awakend only to again enter the sleep like death.
Leaving naught but the riddle of "service_critical_failure" each time before departing to the realm of dreams.2
Fuck... I legit bricked my system... I just wanted to install Mint... I got desperate and changed my partition from MBR to GPT... Which my computer should be able to boot into... But for some damn reason, it didn't... And I got a blue screen of almost death... So now my only hope is to install Linux mint on my D: drive and convert the GPT partition to an MBR Partition... :( Im so screwed...13
Do you usually spend some of your time learning new programming language/pattern/technology? I mean, I am not the type of person who does same thing over and over again, also like learning new things (I spend a lot of time per month studying new things), trying to get experience and trying new technics, but other side of me thinks that I need to be the best in one of them... My mind flashes blue screen of death sometimes when I am thinking about this...2
windows 10... hmmm blue screen of death is a different shade of blue now... still sucks balls though.1
Today I've experimented the windows' blue screen of death...
My windows partition was f*ck up.
I tried many fixes, like boot from grub (which very complicated), boot from a usb with ubuntu live version and run boot-repair.
Bit finally I ended up, make a live usb of windows 10, (tried 6 times before finding the good way to do it with uefi bios) and reset windows without deleting my personnal files.
I'm pretty much proud of me right now.2
Getting my Code fix On my Phone! Bought a small laptop not long ago, few weeks, and within a couple of days, it threw a blue screen of death. What a crock pot of stewed sht. Now, thankfully, I am pain-stakingly coding on my Android. The good news is, my Asus should be here any day!2
Thanks @Siddharthkr93, atom really saved me from the blue screen of death, compliments of Microsoft1
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153934.85/warc/CC-MAIN-20210730060435-20210730090435-00298.warc.gz
|
CC-MAIN-2021-31
| 8,861
| 106
|
https://askubuntu.com/questions/185445/digikam-unmet-dependencies
|
code
|
How do I resolve unmet dependencies?
Some packages could not be installed. This may mean that you have requested an impossible situation or if you are using the unstable distribution that some required packages have not yet been created or been moved out of Incoming. The following information may help to resolve the situation:
The following packages have unmet dependencies: digikam : Depends: libkface1 (>= 1.0~digikam2.9.0) but it is not going to be installed Recommends: kipi-plugins but it is not going to be installed Recommends: mplayerthumbs but it is not installable E: Unable to correct problems, you have held broken packages.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247482478.14/warc/CC-MAIN-20190217192932-20190217214932-00458.warc.gz
|
CC-MAIN-2019-09
| 638
| 3
|
https://community.dynamics.com/forums/thread/details/?threadid=0c77915f-bf88-ee11-8179-000d3a4fe8f7
|
code
|
Microsoft already revealed its plan back in the 1st of September 2023, to merge Dynamics 365 Marketing and Customer Insights. With this change effective now, If you install Marketing app you will observe it is renamed as the “Customer Insights – Journeys” and important thing to note is there is no “Outbound Marketing” area available henceforth.
The reason for disappearing the Outbound Marketing” is because Microsoft encourages their new customers to start using the Real-time Marketing and even encouraging all the existing customers who are still using outbound marketing to transition to Real-time. Because there won’t be any new enhancements or updates available in outbound features from Microsoft henceforth.
If my answer was helpful, please click Like, and if it solved your problem, please mark it as verified to help other community members find more. If you have further questions, please feel free to contact me . Best Regards, Dengliang Li
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474526.76/warc/CC-MAIN-20240224080616-20240224110616-00502.warc.gz
|
CC-MAIN-2024-10
| 968
| 3
|
https://www.twago.de/p/waterproof+digital+media+design+gmbh/19219/
|
code
|
Your session is going to expireClick here to extend
Web based system to manage a discoteke
Mac OS X0.0/10
Set a public hourly rate for clients hiring on an hourly basis. You can change your hourly rate at any time.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865595.47/warc/CC-MAIN-20180523102355-20180523122355-00557.warc.gz
|
CC-MAIN-2018-22
| 214
| 4
|
http://cloudcomputing.sys-con.com/node/2534136
|
code
|
|By Business Wire||
|February 11, 2013 08:04 AM EST||
Enviance, Inc., in partnership with GreenBiz Group and Qualtrics, today announced the “Sustainable 16,” a collection of 16 colleges and universities that have demonstrated excellence in environmental academics and sustainability practices. The 16 schools are now in contention to be named “National Champion” in the Second Annual Environmental March Madness (#EnviroU) tournament.
The “Sustainable 16” are (alphabetically):
- Arizona State University
- Colorado State University
- Emory University
- George Mason University
- Michigan State University
- Middlebury College
- Montana State University
- Ohio State University
- Rochester Institute of Technology
- University of California Santa Barbara
- University of Florida
- University of North Carolina-Chapel Hill
- University of the Pacific
- University of Virginia
- University of Washington
- University of Wisconsin-Madison
“The judges chose the top 'Sustainable 16' schools from a competitive group of institutions, which all demonstrated commitment to the environment through both their environmental degree programs and on-campus initiatives,” said Lawrence Goldenhersh, CEO and president of Enviance, and a tournament judge. “All of the participating schools are grooming future environmental leaders who will oversee the environmental compliance, sustainability and corporate social responsibility programs of tomorrow for Fortune 500 companies, government agencies and other organizations. We've already been very impressed with the level of enthusiasm from all those that submitted in the first round and are excited to see what the 'Sustainable 16' submit for further evaluation to determine the ‘National Champion.’”
The Environmental March Madness Tournament was designed to evaluate colleges and universities on environmental degree programs and curriculum, environmental opportunities for students, and campus sustainability efforts. Each participating school completed a survey covering factors including internship opportunities, environmental awareness campaigns, clean energy implementations, and a variety of other considerations.
Each submission was then evaluated by our panel of distinguished judges. The combined recommendations of those judges then determined the “Sustainable 16.”
Judges for this year’s tournament are:
- Jonathan Camuzeaux, research analyst, Office of Economic Policy and Analysis, Environmental Defense Fund
- Rich Dailey, senior director, Environmental Health & Safety, Walmart
- Lara Ettenson, director of California Energy Efficiency Policy, Natural Resources Defense Council
- Larry Goldenhersh, CEO, Enviance
- Tom Vander Ark, education expert, author and executive director, Getting Smart
- Amy Westervelt, contributor, Forbes
- Blair Wimbush, vice president, real estate and corporate sustainability officer, Norfolk Southern
For “Sustainable 16” schools to move on to the “Environmental Eight,” “Finest Four,” and to the “National Champion” title, Enviance is encouraging faculty and students to support their entries with short essays, social media or video submissions on why they should be named “National Champion.” The submissions will be accepted from today through Monday, March 8, 2013. The “Environmental Eight” will be announced on Monday, March 22.
The tournament will award $5,000 to the environmental and sustainability department of the “National Champion,” and send the department chair or member of the faculty on an all-expenses-paid trip to San Diego to attend the Enviance User Conference, April 22-26, 2013. While there, the winner will lead a panel on educating future environmental professionals.
Furthermore, two students with the most compelling supporting materials and tournament participation will be awarded Google Nexus tablets. Any participating student from the “Finest Four” is eligible for this prize.
For more information on the Environmental March Madness Tournament, please email [email protected], or visit http://www.enviance.com/march-madness. You can also receive real-time updates on Twitter by following @enviance and #EnviroU.
Enviance is the leading provider of Environmental ERP software, with more than 17,000 users in 49 countries. Our comprehensive solutions have been developed, tested and proven by serving the world’s leading corporations and government organizations for over a decade. As the world business community faces increasing sustainability challenges, Enviance Environmental ERP solutions enable organizations to measure, manage, report environmental performance and compliance needs. The Enviance system leverages cloud computing technology to deliver its Environmental ERP platform online in real-time—anytime, anywhere and enterprise-wide. Founded in 1999, privately held Enviance is based in Carlsbad, California. For additional information, visit http://www.enviance.com.
About GreenBiz Group
GreenBiz Group defines and accelerates the business of sustainability. GreenBiz Group is an integrated media company focused on supporting professionals who view sustainable practices as a core part of their businesses. GreenBiz is focused on telling the stories, providing the insights and advancing the sustainability profession through GreenBiz.com, GreenBiz Events, GreenBiz Intelligence, and GreenBiz Connects. For additional information, visit www.greenbiz.com.
Qualtrics is a worldwide leader in enterprise data collection and analysis with a survey-based platform that is easy enough for an intern, but sophisticated enough for a Ph.D. Global organizations use Qualtrics software to make better decisions based on strategic research intelligence. Qualtrics has more than 4,600 clients worldwide, including half of the Fortune 100, more than 1,300 colleges and universities, and 95 of the top 100 business schools. For a free trial account, visit Qualtrics.com.
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
Sep. 28, 2016 06:00 AM EDT Reads: 2,622
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
Sep. 28, 2016 05:30 AM EDT Reads: 1,467
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Sep. 28, 2016 05:15 AM EDT Reads: 2,799
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
Sep. 28, 2016 05:00 AM EDT Reads: 1,201
SYS-CON Events announced today the Kubernetes and Google Container Engine Workshop, being held November 3, 2016, in conjunction with @DevOpsSummit at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA. This workshop led by Sebastian Scheele introduces participants to Kubernetes and Google Container Engine (GKE). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, students learn the key concepts and practices for deploying and maintainin...
Sep. 28, 2016 05:00 AM EDT Reads: 2,722
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Sep. 28, 2016 05:00 AM EDT Reads: 3,826
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Sep. 28, 2016 04:45 AM EDT Reads: 2,989
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Sep. 28, 2016 04:30 AM EDT Reads: 1,685
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Sep. 28, 2016 04:30 AM EDT Reads: 1,644
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Sep. 28, 2016 04:30 AM EDT Reads: 1,022
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
Sep. 28, 2016 04:15 AM EDT Reads: 4,607
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
Sep. 28, 2016 04:00 AM EDT Reads: 462
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...
Sep. 28, 2016 03:30 AM EDT Reads: 1,769
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
Sep. 28, 2016 03:30 AM EDT Reads: 3,121
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...
Sep. 28, 2016 03:15 AM EDT Reads: 2,986
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
Sep. 28, 2016 03:00 AM EDT Reads: 1,834
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
Sep. 28, 2016 03:00 AM EDT Reads: 1,781
SYS-CON Events announced today that Pulzze Systems will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Pulzze Systems, Inc. provides infrastructure products for the Internet of Things to enable any connected device and system to carry out matched operations without programming. For more information, visit http://www.pulzzesystems.com.
Sep. 28, 2016 02:45 AM EDT Reads: 1,886
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
Sep. 28, 2016 02:15 AM EDT Reads: 1,349
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
Sep. 28, 2016 02:00 AM EDT Reads: 1,146
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661349.6/warc/CC-MAIN-20160924173741-00147-ip-10-143-35-109.ec2.internal.warc.gz
|
CC-MAIN-2016-40
| 16,394
| 79
|
https://www.producthunt.com/alternatives/mondlyar
|
code
|
Flowlingo helps you learn a language by immersing you in popular TV, news, videos, blogs, and more.
If you don’t know a word or phrase, just tap it. Flowlingo will tell you what it means and automatically create a flashcard for future practice.
22 languages are available.
Beelinguapp for iPhone and Android shows the exact same text in two languages; side by side. At the same time, it is an audiobook, and with its unique karaoke reading you follow the audio in the text on both sides. New texts are added every week.
This app is for you to build your own dictionary and make your learning experience a breeze. It's completely free, no ads & no strings attached. Personal dictionary. Learn any language you want.
Source code is available on GitHub: https://github.com/jacekm-git/Keepest-Android
Holograms make intuitive learning possible. Dive into a new experience. Explore the world of languages, use your senses and learn more effectively. Laliga is the new generation of audiovisual learning that creates an intuitive learning experience.
Challenge yourself to find out how well do you know about the world and languages.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313803.9/warc/CC-MAIN-20190818104019-20190818130019-00094.warc.gz
|
CC-MAIN-2019-35
| 1,129
| 8
|
http://www.dzone.com/links/how_to_get_the_ip_address_of_the_windows_phone_8.html?ref=up-details
|
code
|
The best part about interactive web design is that you no longer have to stick to the static... more »
Snowflake servers are brittle and expensive. Treating hardware like cattle instead of pets is... more »
99.9% of all database or data management systems should be considered candidates for... more »
Aside of sad fact that it's impossible to try Coverity without first getting the Seal Of... more »
Develop Desktop notification System using pure JS and HTML5.
Having developers adopt an API can be a difficult task, but one that can be overcome by... more »
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413558067075.78/warc/CC-MAIN-20141017150107-00076-ip-10-16-133-185.ec2.internal.warc.gz
|
CC-MAIN-2014-42
| 564
| 6
|
https://www.openstreetmap.org/way/231731704
|
code
|
The Meadows: Queen's Walk; Traffic Street
Edited over 6 years ago by will_p
Version #1 · Changeset #17142415
|note||Building shown on Bing imagery gone (July 13)|
Welcome to OpenStreetMap!
OpenStreetMap is a map of the world, created by people like you and free to use under an open license.Learn More Start Mapping
|Copyright OpenStreetMap and contributors, under an open license|
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250605075.24/warc/CC-MAIN-20200121192553-20200121221553-00405.warc.gz
|
CC-MAIN-2020-05
| 382
| 7
|
https://artica-proxy.com/balanced-groups/
|
code
|
Balanced Groups can be used when your load-balancer have to serve multiple services.
For example we can imagine that a load-balancer have to serve proxies connections and Web servers on the 80 listen port.
In this case, you can redirect connections according ACLs and groups.
- Click on the desired Balancer and choose Groups tab.
- Click on New group button and set the group name.
- Open the group properties by clicking on the link in the table.
- You will see that the group can be set in the same way of a load-balancer service. In this case, each group can have it’s own behavior.
- The “default” parameter is mandatory, if you did not have defined ACLS the load-balancer will balance to backend servers defined in the default group.
- Click on “Backends” tab in order to add target balanced servers in your group.
- Click on Link a server in order to browse added servers and link a targeted server into your group.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648000.54/warc/CC-MAIN-20230601175345-20230601205345-00189.warc.gz
|
CC-MAIN-2023-23
| 932
| 10
|
https://replit.com/talk/ask/ossystem-Python-3/29007
|
code
|
os.system Python 3
I have a project on GitHub called PyDOS (https://www.github.com/DeBeast591/PyDOS/) and I have used
os.system() multiple times. I know that
os.system() can be dangerous and I want to use an alternitive to it. If there are any functions/modules that do these functions but their safe then please tell me. The commands that I need are
rm -rf (for removing files/folders),
mkdir (for making folders),
nano (for file editing), etc.
Thanks in advance.
From what I see, you shoudnt worry. Also, why is it dangerous?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662627464.60/warc/CC-MAIN-20220526224902-20220527014902-00086.warc.gz
|
CC-MAIN-2022-21
| 527
| 9
|
http://riverant.xyz/archives/2289
|
code
|
Jakenovel fiction – Chapter 2228 – Wrong Decision time suppose share-p1
Rebirth To A Military Marriage: Good Morning Chief
Novel–Rebirth To A Military Marriage: Good Morning Chief–Rebirth To A Military Marriage: Good Morning Chief
why does it take the tears of a woman
Chapter 2228 – Wrong Decision flagrant influence
But Ding Jiayi possessed a query she needed to purchase an factor to. “Zijin, let us overlook whatever else. Let me check with you. Generally If I seriously adhere to your prepare and jeopardize Qiao Nan that I’ll go back the garments she obtained in my opinion if she doesn’t acquire you any, what is going to we do if she refuses?”
“Of course!” Usually, Qiao Nan would not accept beat.
She wasn’t as easily bullied as Qiao Nan and would never devote a great deal of dollars acquiring outfits for ancient persons. What was the purpose of obtaining high-priced outfits for individuals of her parents’ age group? Who would be able to convey to how expensive those apparel ended up when they wore them? It turned out ample to the elderly to possess enough you can eat also to have sufficient sleep. It was subsequently an utter spend to shell out a great deal of on high-priced outfits to them.
If this got not been on her mom’s incompetence, her father would not sometimes make it to the funds, and neither would she have squandered three thousand six hundred yuan on shuttle passes. She was still emotion the crunch from that amount of money. The largest issue was how the number of outfits that Qiao Nan possessed bought on her mommy price tag a great deal more than three thousand six hundred yuan!
is clarissa a common name
For the reference to this, Qiao Zijin hated Qiao Nan one of the most. The bucks was Qiao Nan’s. She possessed stored her cash by not purchasing Qiao Zijin a set of clothes but possessed spent so much with an outdated girl like Ding Jiayi. She need to be r.e.t.a.r.ded! She was spending dollars in all of the improper locations!
Originally, Ding Jiayi had already appreciated some rewards. If Ding Jiayi were to infuriate Qiao Nan for Qiao Zijin’s benefit, Qiao Nan’s att.i.tude toward her might go back to how it was a few months ago, after they possessed not even possessed any call. Then, Ding Jiayi might be for a wonderful reduction.
Obtained she visit a conclusion? Certainly not.
Should not Qiao Nan have purchased her a high priced group of clothes? Why made it happen issue to a person of her mom’s get older? Besides, she was certain that if she got acquired the garments as opposed to her mom, she would easily have been in the position to cajole her mother so that her mother wouldn’t flare up at Qiao Nan and even rebuke Qiao Nan.
Translator: Atlas Studios Editor: Atlas Studios
The Shadow – The Ribbon Clues
Ding Jiayi obtained never owned or operated this sort of pricey or good garments just before today. Even though Qiao Zijin has been Chen Jun’s partner and also the Chen family’s daughter-in-rules, she experienced never got the ability to put on such pricey clothing.
It might always be two sets of clothes: hers and her dad’s. Family members of three could have been pleased the same.. But this time she got only bought attire on her families, there was clearly merely one individual that was happy even though the other two were distressed. Qiao Nan was really foolish for picking the second option instead of the primary though she might have used the equivalent amount of hard earned cash!
the cook’s oracle and housekeeper’s manual pdf
It will always be two groups of garments: hers and her dad’s. The family unit of three could have been content all the same.. However right now that she possessed only acquired outfits on her mom and dad, there was clearly only 1 one who was delighted although the other two were troubled. Qiao Nan really was risky for selecting the next method rather than 1st despite the fact that she will have used the same amount of dollars!
who said when it is dark enough you can see the stars
It will continue to be two groups of attire: hers and her dad’s. Your family of three might have been joyful the same.. However right now she obtained only bought outfits on her behalf mother and father, there had been merely one person that was happy as the other two ended up irritated. Qiao Nan was actually risky for choosing the second solution rather than the initially even if she may have devoted the equivalent amount of dollars!
Shouldn’t Qiao Nan have bought her a really expensive range of clothes? Why made it happen matter to someone of her mom’s era? Furthermore, she was certain that if she acquired obtained the garments rather then her mother, she would easily are actually capable to cajole her mum to ensure her mum wouldn’t flare up at Qiao Nan and even rebuke Qiao Nan.
“We’re seriously delivering it again?”
At first, Ding Jiayi got already liked some added benefits. If Ding Jiayi were to infuriate Qiao Nan for Qiao Zijin’s sake, Qiao Nan’s att.i.tude toward her might get back to how it had been some time ago, once they obtained not acquired any make contact with. Then, Ding Jiayi might be in a good reduction.
Section 2228: Drastically wrong Determination
Rebirth To A Military Marriage: Good Morning Chief
It will continue to be two sets of clothes: hers and her dad’s. The family unit of three might have been joyful the same.. These days she had only obtained garments on her behalf mother and father, there was clearly only 1 individual who was pleased as the other two ended up troubled. Qiao Nan was irrational for choosing the other choice rather than the very first even if she can have expended the equivalent amount of cash!
“Mom, she won’t accomplish this. Trust me. Qiao Nan won’t dare to do that.” Qiao Zijin was reluctant to reply to that question. She was no deceive and she comprehended that her mother was looking to force her to mention she would make up for whatever clothing Qiao Nan declined to return.
Ding Jiayi was distinctive from Qiao Zijin. Qiao Zijin obtained absolutely nothing firstly, so that the most awful final result was just sustaining the position quo, which has been owning nothing at all in any way.
But Ding Jiayi got a dilemma she had to receive an response to. “Zijin, let us just forget about anything else. Allow me to request you. Generally If I seriously abide by your prepare and endanger Qiao Nan that I’ll profit the clothes that she got in my situation if she doesn’t acquire you any, what is going to perform if she refuses?”
If she wore the garments that Qiao Nan dispatched her, she would save Qiao Zijin a few bucks, at the very least. It was subsequently the new year or so and Qiao Nan acquired purchased outfits for her families. What obtained Qiao Zijin accomplished? As an alternative to each of them staying on fortune, it was subsequently more effective on her behalf to experience what Qiao Nan experienced supplied her. Even Qiao Nan probably realized that she would still choose Qiao Zijin a lot more regardless that she was dressed in clothes from Qiao Nan.
Obviously, if Qiao Zijin denied, she would always be her favourite little girl. But she wouldn’t foolishly surrender her very own likes and dislikes since Qiao Zijin wouldn’t help finally either. Once they preserved mother, at least she would continue to have a completely new group of attire.
Got she come to a acknowledgement? Not really.
But everybody was self-centered. She wasn’t depending on Qiao Zijin presenting her with such wonderful items. It didn’t appear right to get rid of this hard to find possibility to appreciate these kinds of advantages of Qiao Nan for Qiao Zijin’s sake.
Got she reach a understanding? Not really.
the betrayal movie tubi
Ding Jiayi’s strategy was easy. If Qiao Zijin was willing to replace with all that Qiao Nan had taken back again, Ding Jiayi will be able to unconditionally stand by Qiao Zijin’s area and assist her. In the end, that may prove she got not been drastically wrong and therefore Qiao Zijin was indeed a filial little princess, of course.
Which has been why Ding Jiayi needed to know what Qiao Zijin’s att.i.tude and strategy were actually if it really took place. She bought her practical something she had never obtained from Qiao Zijin all because of her most disliked little girl. Ding Jiayi observed she was already a very good mum for the treatment of Qiao Zijin exactly like well before even when Qiao Zijin acquired angered her countless occasions prior to.
It turned out going to be the new year or so in the near future, as well as ordinary postal professional services were actually about to quit their business. Only courier expert services and show supply expert services were readily available. At the very thought of that, Qiao Zijin noticed the crunch. Once they acquired performed this at some other time of the year, it might have cost her ten yuan within the very most with the common postal assistance. But courier solutions and point out supply products and services would price her more than once more than this!
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710926.23/warc/CC-MAIN-20221203075717-20221203105717-00807.warc.gz
|
CC-MAIN-2022-49
| 9,137
| 40
|
https://www.abrasive.info/catalog/id/962
|
code
|
Mini SURFOX - lightweight portable installation. Convenient for visiting and repair works. MINI SURFOX the most compact version of all machines SURFOX. The unit has a lot of important functionality, built-in light and portable enclosure, compact cartridges with electrolyte convenient for transportation.
Other goods and services from «Surfox»
Do you like the article? Tell your friends and colleagues
ADVERTISE WITH US
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662510117.12/warc/CC-MAIN-20220516104933-20220516134933-00614.warc.gz
|
CC-MAIN-2022-21
| 421
| 4
|
http://apache-wicket.1842946.n4.nabble.com/Response-page-not-effective-wit-nested-forms-with-a-FileUploadField-td3680453.html
|
code
|
Response page not effective wit nested forms with a FileUploadField
I have a wicket page containing a nested form. The inner form is used for uploading files (using an AjaxButton) and thus it has a FileUploadField.
When loading the page and submit the outer form (without doing any file uploads) it fails to redirect the browser to the repsonse page. setResponsepage() is called in the onSubmit method on the outer form.
If I just remove the FileUploadField in the inner form (but keeping the form itself) it works as expected. I cant figure it out what the problem is, any ideas?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107894426.63/warc/CC-MAIN-20201027170516-20201027200516-00309.warc.gz
|
CC-MAIN-2020-45
| 580
| 4
|
http://www.javaworld.com/javaworld/jw-06-2003/jw-0620-webservices.html
|
code
|
Optimize with a SATA RAID Storage Solution
Range of capacities as low as $1250 per TB. Ideal if you currently rely on servers/disks/JBODs
At the conclusion of his J2EE (Java 2 Platform, Enterprise Edition) Web services presentation at last year's JavaOne, IBM architect Jim Knutson remarked that "every Web service needs a place to be a service." He then suggested that the most ideal place to be a Web service was inside the J2EE infrastructure. A little more than a year later, the final release of J2EE 1.4 is imminent, and its most significant promise is to deliver on the J2EE Web services vision.
The Web service features in J2EE 1.4 address both the server and client sides of Web services. The features extend J2EE to allow existing server-side enterprise Java components to become Web services and specify how a J2EE client container can invoke Web services. The technologies for both aims have existed for a while, and the new J2EE specs rely on those existing APIs for Web services support. The new specs add to the existing technologies a set of interoperability requirements, and a programming and deployment model for Web service integration.
There are two specifications that explicitly outline those added features: Java Specification Request 151, the umbrella JSR for J2EE 1.4, and JSR 109, Web Services for J2EE. At the time of this writing, JSR 109 has reached its final stage in the JCP (Java Community Process), while JSR 151 is in the last voting phase. Additionally, the JCP amended the final release of JSR 101, Java APIs for XML-based Remote Procedure Call (JAX-RPC), to support J2EE 1.4 interoperation requirements.
J2EE 1.3-level application servers can also implement many of the features prescribed by these JSRs. Indeed, many application server vendors have supported various Web service development and deployment features in their existing products for some time now. JSRs 109 and 151 codify some existing practices and describe new mechanisms with the hope of creating a universal J2EE-Web services integration model. Next-generation application servers will likely follow that unified, standardized model.
Following a brief survey of new Web service-related J2EE features, this article reviews the new client and server programming models, including new J2EE deployment and service management roles associated with Web services support.
Perhaps the most significant, and most consequential, additions to J2EE are the new interoperation requirements. The requirements prescribe support for SOAP (Simple Object Access Protocol) 1.1 in the J2EE presentation layer to facilitate XML message exchange. J2EE 1.4-compliant containers must also support the WS-I (Web Services Interoperability Consortium) Basic Profile. Since XML message exchange in J2EE depends on JAX-RPC, the JAX-RPC specifications now mandate WS-I Basic Profile support as well.
The result is that a J2EE 1.4-based application can be invoked as a Web service, even from applications not written in the Java programming language. While that is an evolutionary step for J2EE, since the platform has long embraced non-Java based systems, it is possibly the most direct way to facilitate interaction with Windows-based technologies that rely on .Net.
|Forum migration complete By Athen|
|Forum migration update By Athen|
|role based webservices By Anonymous|
|JAX-RPC Web container concurrency? By Tedd King|
|Best portal server....? By ugendran|
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164011870/warc/CC-MAIN-20131204133331-00020-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 3,439
| 14
|
https://github.com/mdxp/icinga-cookbook/pull/8
|
code
|
Made the name of the role for default checks configurable. Allows having hosts without default checks. Like monitoring a non self hosted service.
made the server role for default checks configurable
we want to monitor hasts and services using icinga which are not managed
by us and therefore will not repspond i.e. to nrpe based checks.
use default server role for ping checks too
Could you rename "default_checks_server_role" to something shorter? maybe something like "default_checks_role", and add a comment in the attributes file on what this attribute is and if undefined what is the default? Also for the default ping I think the default should be '*' and not 'all'; Let me know if this makes sense. Thanks!
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982950764.62/warc/CC-MAIN-20160823200910-00185-ip-10-153-172-175.ec2.internal.warc.gz
|
CC-MAIN-2016-36
| 713
| 6
|
https://roguebasin.com/index.php/MathRL
|
code
|
|Math: The Roguelike|
|Released||13 Mar 2010|
|Updated||14 Mar 2010|
|Interface||ASCII but only in graphical mode|
|Game Length||very short|
|Official site of Math: The Roguelike|
This entry for 7DRL challenge explores vastly different combat system. To defeat number goblins (the only enemy type in MathRL) it is needed to combine weapon, damage function, conditional and statement to result in greatest damage output or highest health boost. Brave the cave and find Fermat's Awesome Book, where he wrote all of his actual theorems in full with proof, not just idle speculations, including a 2-page proof of his infamous last theorem.
In number caves there are weapons to be found. Each returns some value dependent on dice roll. Then result is modified by damage function. Next game checks whether equipped condition is true. It is best to use something that is usually true here. If this check is passed equipped statement is executed. Statements may modify final damage or alter math-rogue's health.
After defeating several number goblins PC gains a level and has maximum hit points increased by 25.
- \ weapon
- ƒ damage function
- p conditional
- q statement
- N number goblin
Platforms and versions
MathRL is created in MegaZeux. That makes this game not a standalone executable. To play it you need to install dMZX. Download is available here. Version needs to be at least 2.83.
Discovered fatal bugs prompted author to release two bug fix versions. Both appeared after seven day deadline they are considered valid 7DRL nonetheless. Number goblins may still get locked up sometimes but can still be killed in that state. A Let's Play video by UberHunter confirms that at least one fatal bug is still present in code.
A sequel game, tentatively entitled MathRL2, is in development.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654871.97/warc/CC-MAIN-20230608103815-20230608133815-00674.warc.gz
|
CC-MAIN-2023-23
| 1,789
| 18
|
https://experts.arizona.edu/en/publications/an-architecture-for-regulatory-compliant-database-management
|
code
|
Spurred by financial scandals and privacy concerns, governments worldwide have moved to ensure confidence in digital records by regulating their retention and deletion. These requirements have led to a huge market for compliance storage servers, which ensure that data are not shredded or altered before the end of their mandatory retention period. These servers preserve unstructured and semi-structured data at a file-level granularity: email, spreadsheets, reports, instant messages. In this paper, we extend this level of protection to structured data residing in relational databases. We propose a compliant DBMS architecture and two refinements that illustrate the additional security that one can gain with only a slight performance penalty, with almost no modifications to the DBMS kernel. We evaluate our proposed architecture through experiments with TPC-C on a high-performance DBMS, and show that the runtime overhead for transaction processing is approximately 10% in typical configurations.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337889.44/warc/CC-MAIN-20221006222634-20221007012634-00106.warc.gz
|
CC-MAIN-2022-40
| 1,004
| 1
|
https://nasim.us/2017/03/09/hololens-helps-understand-economics.html
|
code
|
I recently had the incredible good fortune to meet Prof. Joseph Stiglitz, the Nobel laureate. The occasion comprised of Dr Stiglitz having to explain contemporary problems with the Euro to an audience interested in trans-Atlantic economic issues. The great professor had brought several charts and graphs to drive home his points. But his lucid, yet succinct, vivid yet precise, elucidations, illuminations and revelations were just splendidly clear, concise, and crisp. It was just a delightful experience. Not sure how long the lecture and the follow ups lasted in hours but never for one moment I felt the time pass. It tantamounts to a refresher course on monetary economics.
As I got back to work the next morning, I felt the growing desire to share what I had experienced, with others. My eyes glanced over to the Hololens on my desk. Perhaps there was a way to carry over the experience of receiving first hand explanation of an economic concept from the great professor to the folks who did not have the good fortune of meeting the professor in person. I felt that an unguided replay of audio and visual recording would not suffice. Annotations added to such recordings would also serve to distract more than clarify the underlying economic postulates and their application. But immersion into Virtual Reality (VR) amalgamated mode might just do the trick. With VR, the “digital instructor” would be able to “see” what the “student” sees, and guide the experience toward formation of thoughts that represent understanding of the concept. I feel the content can very much be render-able by the device.
This is what I have in mind.
I’d start with the professor’s book, or to keep it simple for this blog, his presentation, consisting of charts and graphs. Let’s assume that this content is in PDF format and the application simply displays the PDF. I’d use Unity as the application’s “game” engine. In the game loop, we would open the PDF (using iTextParser). Initialize Mesh Renderer on the PDF.
string file = "file:///C:/Users/AbidNasim/Downloads/GS-DiversityApp.pdf";
PdfReader reader = new PdfReader(file);
PdfReaderContentParser parser = new PdfReaderContentParser(reader);
ITextExtractionStrategy strategy = new SimpleTextExtractionStrategy();
string currentText = PdfTextExtractor.GetTextFromPage(pdfReader, page /* initialized to page 1*/, strategy);
meshRenderer = this.gameObject.GetComponentInChildren<MeshRenderer>();
var headPosition = Camera.main.transform.position;
var gazeDirection = Camera.main.transform.forward;
Wait for user to position cursor on a specific object.
this.transform.position = hitInfo.point;
We can translate the cursor point to PDF region/rectangle from where we can pick up line or graph.
At this point we can also give user voice assistance, as well as other input (stimuli) such as gestures, etc.
keywords.Add("Enter Graph", () =>
// Tell the KeywordRecognizer about our keywords.
keywordRecognizer = new KeywordRecognizer(keywords.Keys.ToArray());
// Register a callback for the KeywordRecognizer and start recognizing!
keywordRecognizer.OnPhraseRecognized += KeywordRecognizer_OnPhraseRecognized;
So, finally, whenever PDF object that is clicked has a corresponding hologram asset, we can render/play it:
private void EnterGraph(InteractionSourceKind source, int tapCount, Ray headRay)
var dataPt = GameObject.CreatePrimitive(PrimitiveType.Sphere);
dataPt.transform.localScale = new Vector3(0.1f, 0.1f, 0.1f);
var transformForward = transform.forward;
transformForward = Quaternion.AngleAxis(-10, transform.right) * transformForward;
audioSource.clip = graphClip;
public void OnEnterGraph()
EnterGraph(InteractionSourceKind.Voice, 1, new Ray());
Well, this is just conceptual so far. I will follow up soon with a proof of concept, as soon as I get my Creator’s update (April 11 or sooner; I am on the Insider track). I’ll share with everyone full code for the proof of concept. Meanwhile, if you’d like to follow up with the POC, have your SDK’s updated and download your Hololens emulator.
Just to reiterate the concept statement. Educational “game” using Hololens is qualitatively different from any other form-factor or medium in that game and the user interact at a much more intuitive level and therefore we can present audio visual information in amalgamated reality that can be extremely effective for learning purpose. And add to that ability to enrich information using holograms. Sky is the limit!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247481249.5/warc/CC-MAIN-20190216230700-20190217012700-00248.warc.gz
|
CC-MAIN-2019-09
| 4,493
| 32
|
http://timelymigration.com/tfs-to-tfs.aspx
|
code
|
TFS to TFS Features
While generally it is beneficial to share code between development groups, sometimes there are organizational reasons which require the code to be copied and handed off to each development group, such as a client contracting to have their own version of the product which they can develop features in.
With Timely Migration an existing code base with history can be copied to a new project or server with its own set of permissions or process templates.
Please note that Timely Migration only migrates Version Control data and not Work Item related data.
Selectively Migrate Revisions
While most of the time you will want to migrate all of the history out of a repository, there may be certain circumstances where you intentionally want to limit the amount of history that you migrate. For instance if you are handing off copies of code to different development group, each group may be interested in having different amounts of history.
With Timely Migration you can select the changesets that you want to start the migration from and end the migration at.
VSS Conversion Touchup
While Microsoft does provide a VSS to TFS conversion utility with their products, it has some limitations. One is that it does not maintain branch relationships when it migrates data from VSS. Instead of migrating the initial revision of each file in the branch as a "branch" operation, it migrates them as an "add". This prevents the ability to Merge files between the branches in the Team Explorer IDE.
The ability to selectively migrate changesets allows you to manufacture a branch which the Team Explorer IDE can use in its merge process. To do this you manually create a branch off of the trunk using the Team Explorer IDE and then use Timely Migration to migrate the output of Microsoft's VSS to TFS conversion utility to the branch you created.
This process also allows you to manufacture branch relationships in source trees that were logically treated as branches but there were no VSS branch relationships, such as if separate VSS databases were used due to VSS database size limitations.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118519.29/warc/CC-MAIN-20170423031158-00075-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 2,100
| 11
|
https://www.luxembourg-internet-days.com/speaker/mike-resseler/
|
code
|
Mike Resseler is a Product Strategy Specialist for Veeam. Mike is focused on technologies around Hyper-V and System Center. With years of experience in the field he presents on many occasions on large events such as MMS, TechEd and TechDays. Mike has been an awarded the MVP for System Center Cloud and Datacenter Management since 2010 and received the Hyper-V MVP since 2014. His major hobby is discussing and developing solid Disaster Recovery scenarios. Additionally, he has enterprise-class experience in Private Cloud architecture, deployment with marked focus on protection from the bottom to the top. He holds certifications in many Microsoft Technologies such as MCITP.
Follow Mike on Twitter @MikeResseler or @Veeam
Specialties: System Center (SCDPM, SCCM, SCOM, AppController, SCVMM, SCSM, Orchestrator)
Desktop and Server Management
Application Virtualization & Packaging
MOF & ITIL
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474412.46/warc/CC-MAIN-20240223121413-20240223151413-00430.warc.gz
|
CC-MAIN-2024-10
| 893
| 6
|
https://radar.inria.fr/report/2016/diana/uid70.html
|
code
|
Section: New Results
From Network-level Measurements to Expected QoE
Participants: Chadi Barakat, Thierry Spetebroot, Muhammad Jawad Khokhar, Damien Saucez and Nawfal Abbassi Saber.
Internet applications, especially those of multimedia type and in a mobile context, are very sensitive to the delivery service they get from the network. However, the relation between this network service and the quality of these applications as perceived by the end users is often unknown and hard to be quantified. Some of the applications dispose of their own quality estimation techniques such as Skype and Viber. Others leave the users to their own interpretation of the quality they perceive. Linking the quality of Internet applications as perceived by the Internet users to network-level measurements such as bandwidth or delay is more than ever necessary. Such dependence, known in the literature as linking Quality of Experience (QoE) to Quality of Service (QoS) parameters, serves many purposes. On one side it allows the estimation of the quality an Internet user will obtain before launching the application or even before heading to the place where she/he will connect. On the other side, it helps network operators properly dimension their networks so that to anticipate service degradation and optimize the quality they deliver. The correlation of quality measurements among users, or for the same user among different of his/her locations, can help in troubleshooting the reasons of any degraded quality.
Our project, called ACQUA, aims at the estimation of the quality of Internet applications at the access departing from network-level measurements. It leverages measurements done at the network level as done today (bandwidth, delay, loss rate, etc), and applies over them well calibrated models to estimate/predict the quality of experience for main applications even before launching them. ACQUA is an extensible solution in terms of the applications it can track. It allows a fine-grained profiling of the Internet access at the level of application quality. In a recent work, we have proved the feasibility of the approach with the Skype use case. We have integrated into ACQUA a new model based on decision trees for the estimation of Skype QoE. The model has been validated with both local controlled and PlanetLab experiments. In 2016, we focused on the popular YouTube use case. We set up a new experimental setup to automatically stream videos, change network conditions, and write down the corresponding Quality of Experience (modeled as a function of application level Quality of Service metrics). One of the challenges we had to face is the reduction of the complexity of experimentation that we had to solve using sampling techniques. The first results are very promising as we can considerably reduce the complexity of experimentation while reaching high level of accuracy in the prediction of Youtube Quality of Experience. A paper is currently under submission illustrating the methodology and the obtained results. More details on this approach and on our project ACQUA can be found in section 5.1 and on the project web page http://project.inria.fr/acqua/.
Testing for Traffic Differentiation with ChkDiff: The Downstream Case
Participants: Ricardo Ravaioli and Chadi Barakat.
In the past decade it has been found that some Internet operators offer degraded service to selected user traffic by applying various differentiation techniques. If from a legal point of view many countries have discussed and approved laws in favor of Internet neutrality, confirmation with measuring tools for even an experienced user remains hard in practice. In this contribution, we extend and complete our tool ChkDiff, previously presented for the upstream case, by checking for shaping also on the user’s downstream traffic. After attempting to localize shapers at the access ISP on upstream traffic, we replay downstream traffic from a measurement server and analyze per-flow one-way delays and losses, while taking into account the possibility of multiple paths between the two endpoints. As opposed to other proposals in the literature, our methodology does not depend on any specific Internet application a user might want to test and it is robust to evolving differentiation techniques that alter delays or induce losses. In a recent publication , we provide a detailed description of the downstream tool and a validation in the wild for wired, WiFi and 3G connections. This work is the result of collaboration with the SIGNET group at I3S in the context of a PhD thesis funded by the UCN@Sophia Labex and defended in 2016.
Traceroute facility for Content-Centric Network
Participant: Thierry Turletti.
In the context of the UHD-on-5G associated team with our colleagues at NICT, Japan, we have proposed the Contrace tool for Measuring and Tracing Content-Centric Networks (CCNs). CCNs are fundamental evolutionary technologies that promise to form the cornerstone of the future Internet. The information flow in these networks is based on named data requesting, in-network caching, and forwarding – which are unique and can be independent of IP routing. As a result, common IP-based network tools such as ping and traceroute can neither trace a forwarding path in CCNs nor feasibly evaluate CCN performance. We designed Contrace, a network tool for CCNs (particularly, CCNx implementation running on top of IP) that can be used to investigate 1) the Round-Trip Time (RTT) between content forwarder and consumer, 2) the states of in-network cache per name prefix, and 3) the forwarding path information per name prefix. This tool can estimate the content popularity and design more effective cache control mechanisms in experimental networks. We have published an Internet-Draft describing the specification of Contrace.
How news media use Twitter to attract traffic?
Participants: Arnaud Legout, Maksym Gabielkov.
Online news domains increasingly rely on social media to drive traffic to their website. Yet we know surprisingly little about how social media conversation mentioning an online article actually generates a click to it. Posting behaviors, in contrast, have been fully or partially available and scrutinized over the years. While this has led to to multiple assumptions on the diffusion of information, each were designed or validated while ignoring this important step.
We present in a large scale, validated and reproducible study of social clicks – that is also the first data of its kind – gathering a month of web visits to online resources that are located in 5 leading news domains and that are mentioned in the third largest social media by web referral (Twitter). Our dataset amounts to 2.8 million posts, together responsible for 75 billion potential views on this social media, and 9.6 million actual clicks to 59,088 unique resources. We design a reproducible methodology, carefully corrected its biases, enabling data sharing, future collection and validation. As we prove, properties of clicks and social media Click-Through-Rates (CTR) impact multiple aspects of information diffusion, all previously unknown. Secondary resources, that are not promoted through headlines and are responsible for the long tail of content popularity, generate more clicks both in absolute and relative terms. Social media attention is actually long-lived, in contrast with temporal evolution estimated from posts or impressions. The actual influence of an intermediary or a resource is poorly predicted by their posting behavior, but we show how that prediction can be made more precise.
ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic
Participant: Arnaud Legout.
It is well known that apps running on mobile devices extensively track and leak users' personally identifiable information (PII); however, these users have little visibility into PII leaked through the network traffic generated by their devices, and have poor control over how, when and where that traffic is sent and handled by third parties. In this paper, we present the design, implementation, and evaluation of ReCon: a cross-platform system that reveals PII leaks and gives users control over them without requiring any special privileges or custom OSes. ReCon leverages machine learning to reveal potential PII leaks by inspecting network traffic, and provides a visualization tool to empower users with the ability to control these leaks via blocking or substitution of PII. We evaluate ReCon's effectiveness with measurements from controlled experiments using leaks from the 100 most popular iOS, Android, and Windows Phone apps, and via an Institutional Review Board approved user study with 92 participants. We show that ReCon is accurate, efficient, and identifies a wider range of PII than previous approaches.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100399.81/warc/CC-MAIN-20231202105028-20231202135028-00475.warc.gz
|
CC-MAIN-2023-50
| 8,837
| 18
|
http://excel.bigresource.com/how-to-get-last-saved-data-into-sheet-raPu3mdk.html
|
code
|
I created the csv file from excel sheet. Now I have created a copy of that excel sheet in a new sheet, and I am trying to load that saved csv in the new sheet. But when I do that I see some cells formatting mismatch (can be seen in attached picture) though I clicked on preserve cell formatting at the time of import.
I previously had a query resolved in this forum when I was trying to write data to multiple sheets but the requirements have now changed and I need to update the script.
I have a multi-sheet workbook that calls a routine to rewrite sheet4 based on values in sheet1 each time sheet4 becomes the active sheet. This script makes single line entries or double line entries in sheet4 depending on whether data appears in one or both of a two specific data cells (col:J,K) in sheet1. However I now need to manually input extra data items into blank cells (col:B,C,J) in sheet4 and retain those data items after input, but each time I make sheet4 the active one it clears the contents of all the cells including the data that I have entered into cols B,C,J. Is there a way of fixing cols B,C,J on sheet4 so that they are not cleared when sheet4 is activated. Or is there a way of writing just the the additional lines added to sheet1 since the sheet4 was previously activated rather than clearing all the data lines written previously into sheet4 and rewriting them all from scratch each time the sheet4 becomes the active one.
I think you will need to see the workbook that I am working on to see how the sheets link and a zipped blank version is attached.
I am using the following save as function on a template to save it as a workbook:
Sub SaveFileAsDate() Dim WSName As String, CName As String, Directory As String, savename As String WSName = "TMG Work Order" CName = "C4" Directory = "Maintenance Service Agreements" savename = Sheets(WSName). Range(CName).Text & Sheets(WSName).Range("F3").Text & Sheets(WSName).Range("K4").Text & Sheets(WSName).Range("K8").Text If Directory = "" Then Directory = CurDir & ""
On Error Goto errorsub: ActiveWorkbook.SaveAs Filename:=Directory & savename & ".xls" Exit Sub
errorsub: Beep MsgBox " Changes not saved!", vbExclamation, Title:=savename & ".xls" End Sub
It works fine but I need to be able to capture future changes to the sheet as the same saved name but to add and extention like (-Rev1). Once it has been saved as -Rev1, each additional time it saves, the -Rev number would increase. I searched the forums but didn't find an exact match.
vba to save data in cells into file name? The vba below works for one cell, but I need info from cell “E11” also with the text MARK between them. myFileName = "2009 CROP BALE CUT OUT FORM – INVOICE " & Format(ActiveSheet.Range("F12").Text) & ".xls" The final file name should look like this: 2009 CROP BALE CUT OUT FORM - INVOICE 8D4512 MARK CB34.xls
I have a workbook with just one worksheet. It's just a list of data imported from Access and saved as a worksheet. When I try to enter a formula ie '=4+4' it goes in as text and will not calculate. I have tried various formatting to no avail. I added a second worksheet to see what happens and this works fine. (XP home, Excel 2003).
I have a workbook where Sheet A is a Master Order Form. Employees will input the quantities they need in Column C. The sheet will be otherwise protected. Sheet B is a "printable" order form that only contains the rows from Sheet A where the Quantity on Sheet A is not blank and is >=1. This will allow me to print sheet B with no blank rows for the items I don't need.
I found the following formula which claims to be able to do what I want:
I use my workbook to track sales data from one store to the next. I use my workbooks to compare data from year to year. Each year's data is displayed on a separate worksheet. '2013' has 2013's data, '2014' has 2014's. On the 2014 sheet, I have a Prior Year's Sales that pulls data from the previous year's spreadsheet using a formula which I just drag down each day I enter sales. I would like to automate this process and have the VBA code check for today's date and automatically pull the previous year's sales data from the '2013' sheet and put it in the appropriate cell on the '2014' worksheet. I hope I have explained this well enough to understand. I've included a link to my workbook for reference.
I had to use dropbox since I can't post a file over 1 MB. The file size is around 1.25 MB.
I took two weeks perfecting an Excel file and was writing them to disc just now to transport and use on other machines. I opened the file to add instructions and the files are now read only? Propteries show read only on the written files but not on the originals???
I have the below formula that pastes data into the worksheet entered in the " " it works great but only when the workbook was last saved on that sheet, how can it locate that worksheet sheet even if the the workbook was last saved and another worksheet. if the workbook was saved on a different sheet name the vba doesn't finish
I have code written to auto save the active worksheet when a button on my user form is pressed. What I would like to know is if there is a way to lock the worksheet when the button that triggers the save event is pressed behind the scenes so the end user has a more difficult time editing the sheet. I know they can just resave the document and the protection will be gone, but for minimizing user manipulation.
I chose to place this in programming, as all the functions for this workbook are either macros or Internet Links. Nothing is ever changed on the worksheet.
I have a workbook that is fully protected with passwords both for the workbook and the worksheet. When I set up the protection, no check boxes are checked.
I have macros and internet links on the worksheet that can be selected, but none of them affect the worksheet.
As a matter of fact, I can open the workbook and close it with only "Application.Quit" in a macro and a message box comes up asking if I want to save the changes or not. If I close it with the upper right corner RED X, it still asks the question.
I have no "On Open Macros" or Links of any kind.
I have other workbooks that this does not happen on.
I have a file that keeps setting it's "Saved" property to False when I change something in another file. I cannot find any external links in the file. The file used to be "Personal.xls", but I renamed it.
I have an excel file in which the date format for a column was in the following format -: 3/14/01 Since I wanted the column to display in 'mm/dd/yyyy' format, I changed the type to -: 03/14/01 and the sheet was saved. I then for a specific purpose converted the xls file to csv and noticed that the date formatting I did is not getting saved. That is, every time I open the csv the date format changes back to 3/14/01.
how to retain the date format in excel? I need to use the date format in mm/dd/yyyy only for the application I'm using.
does anyone have a simnple code that when entered in a cell only returns the last date the file was saved? better yet, could it somehow be specific based on a modification to a specific worksheet modified?
example: i have 8 worksheets. how can i show when one worksheet is updated, say November 27th 2006, and another worksheet on November 28th 2006?
Is there a formula that will get the date & time the workbook was last saved? I am using an earlier posted macro now but would like for the information to be visible constantly in a certain cell. Possible? Macro used: Sub WhenSaved() MsgBox "This file was last saved on " & Format(ThisWorkbook.BuiltinDocumentProperties("Last Save Time"), "mmmm d, yyyy") & ".", 64, "Date of most recent save:" End Sub
One of the sheets is a sumamry sheet that get's dulpicated, values pasted, then (the single sheet) exported to a new file. Upon trying to save this file, I keep getting the run time 1004 error message and that my document cannot be saved.
I've struggled for days trying to find out the source to no avail.
What is more frustrating is that when I try to save it (after exiting the macro), it seems to work ok.
I do get the compatability error message (which I don't get on the 'original/parent' workbook) there is a not about format errors, though I'm not sure that's the source of the problem.
Private Sub Workbook_Activate() Dim user As String If Worksheets("Setup"). Range("D6").Value = "" Then user$ = InputBox("Hello. Please enter your name to inialize the program", "Enter Name") Worksheets("Setup").Range("D6").Value = user MsgBox ("Welcome " & user & ". Press 'OK' to continue on to the Main Menu.") Else user$ = Worksheets("Setup").Range("D6").Value MsgBox ("Welcome back " & user & ". Press 'OK' to continue on to the Main Menu.") End If Exit Sub
but i would like to expand the "welcome back" msgbox to also display "the last time you were was was (eg: 2 days/3 hrs/14 min) ago" - which i presume would be calculated from the last save.
I want to be able to copy a name from one sheet (Available Players), paste it to a cell in another sheet (Round 1 through Round 20). The cell that will be copied is fixed but the place where it will be pasted will be different and may be on a different sheet.
also i would like to change the color of the copied cell to "greyed" out or cut if it can not be greyed out. I have created a button and put in a macro that i created but have been having problems with it, generic 1004 errors that i can not figure out. i am attaching the document.
I have a problem with a very simple Lookup (please see attached). When I copy/drag down the dropdowns in column A and the Lookup formula in column B, the lookup up does not recognise the value in column A till I save the sheet. The same if I select a different value from the dropdown i.e. the lookup only works when I save the sheet. Am using the wrong Function to do this or it something else.
My coworkers and I use a couple of Excel documents to store statistics. The document is on a network share. We all have Office 2010, my coworkers are on Windows XP, I am on Windows 7.
If I open the document and make changes, then save it to the network location I can open the document later and see the changes but my coworkers do not see any changes I have made. Also If my coworkers make changes to the document the 3 of them see the changes but I do not.
If I go straight to the network share the timestamp on the document only changes for changes I made.For example if I go to servernamefoldernamestats.xls and add data to the file. Then save and close it. I can reopen the file and my changes are there.
Tomorrow Coworker 2 opens the same file from the same location but it has data from 2 days ago, with a timestamp of 2 days ago and my data is missing. They then reimput the data I entered, and add todays data. Then they save it and close.I open the file it has my data from yesterday, but not the new data entered by coworker 2.
I am busy with code that filters and copies from a "source file" using dialogue to choose criteria than adds a workbook and pastes filtered information. I than go back to "source file" and do second filter. My question is this newly added workbook changed from book1 to book2 etc everytime the user will run the macro. How do I go about activating the workbook for second and third paste without it being saved?
Here is name code:
[B]Workbooks.Open ("C:Documents and Settingsabek276DesktopSource File.xlsx")
I want the excel spreadsheet to "BE Protected" in standard form, and only be "Unprotected" when macros are enabled -- BUT DONT JUMP TO CONCLUSIONS, hear me out, it gets deeper than that
If the user does not enable macros, I want the book to be protected. If they do enable macros, it becomes unprotected.... (On load is good enough, no need to be real-time)..... But, they can save the book, so it would no longer be protected , which is where my question comes in ...
I could use the -unprotect "password"- on load when macros are enabled but this will only work if the spreadsheet was originally protected and is never saved again. This is a problem because this workbook will be given to others and will be saved time and time again.
So, I had a vision :-) .... function 'before save' , protect the sheet using -protect "password"- , allow the sheet to save, and then unprotect back using 'unprotect "password"' so you can continue using - BUT, the problem with this is now I have created an endless loop in theory, because after it unprotects it would want to re-save again because it changed
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370500482.27/warc/CC-MAIN-20200331115844-20200331145844-00085.warc.gz
|
CC-MAIN-2020-16
| 12,538
| 50
|
https://wendydavis.me/spirallingshape/2010/02/wendys-week-of-tv-2-0-donna-is-my-favourite-so-there.html
|
code
|
If it’s Sunday morning it must be time for Wendy’s week of TV 2.0.
If it’s not Sunday then I look like a bit of an eejit and you’ve no doubt stopped reading this post already.
Let’s get to business and see what I watched this week.
Sunday: Well of course it was the Doctor which concludes tonight. For indepth commentary and insightful analysis I once again direct you to Circulating Library. For my own observations I will just say that:
1.I adore John Simms playing the villainous Master
2. What is going to happen tonight??? I can barely contain my excitement and sadness.
3. Donna is my favourite of all the companions. So there.
I then watched Bones and recorded Monty Python. Dr Brennan wears interesting earrings for a lead TV character I think. Because I am a recent convert to Bones, I’m wondering who the new guy is in the lab? I need to watch a few more episodes before I can offer anything more insightful than that I’m afraid. Apart from the obvious – David Boreanz is quite easy on the eye.
Monday: I ate my dinner and watch Monty Python which also concludes tonight. It was all very interesting. How sad that they all look so old now. I was impressed with Steve Coogan’s ability to recite sketches word for word. I like Monty Python but I’m not that much of a fan. How interesting to see the seeds of Basil Fawlty in almost every character John Cleese played. No-one does a frustrated, uptight, seething Brit like him.
Then while I was at choir I recorded the good ole Big Bang Theory. It wasn’t the strongest of episodes but Sheldon’s involuntary imitation of his Texan parents having an argument was worth an actual laugh out loud. Good work!
Tuesday: Big Love. They were all on some kind of pilgrimage holiday across the country. I missed the first five minutes so I had to catch up as it went along. Anyway long story short, the daughter had a miscarriage, the son has a crush on Margie and poor Bill got left behind at a picnic area. It doesn’t sound that interesting but trust me, really it is.
Wednesday: I took a stand. Well it was more like a half a stand and did not watch Spicks and Specks. I did have it on the background while I faffed on the computer. And you know what, I didn’t have the urge to turn around once. This is disappointing as I used to like Spicks and Specks a lot. To win me back they will have to stop their own faffing about between games and pick up the pace. Come on please people or I have fears for your future. You will either be cancelled or sold to Channel 10. And no-one wants to see either of those outcomes.
Then I turned off Hungry Beast. Is that program supposed to be comedy. If so there’s two explanations.
1. It’s not
2. I’m old and way out of it’s demographic.
Or perhaps it’s a little bit of both.
I did sit down at 9:30 and enjoy the IT Crowd though. While Roy and Moss tried to be Real Men (and failed miserably), Jen found herself dating a man who looked like a magician. Excellent.
Thursday: I continued my half-hearted watching of The Seven Ages of Rock. This week was British Indie music. It was all about The Smiths apparently…and then Oasis. WHAT? I may be missing something in my understanding of RAWK history but how a whole program devoted to British music from the late 70s until the mid 90s cannot mention The Cure once seems a little baffling. Are they somehow considered mainstream? I would not have thought so.
Friday: I attempted to watch some television but after a full day of Orientation of our new students I was exhaustipated and fell asleep by 7:30 in front of the television, missing Colbert and Father Ted completely. I set the recorder for Breaking Bad and was in bed by 9 with a headache.
Saturday: I caught some Winter Olympics, watching the endless repeats of the shiny toothed Mormon snowboarder winning a gold medal. Well done etc. My goodness though, is it just me or is that ice dancing excruciatingly boring? And I continued to marvel at the danger of the “sliding” sports. This week it is the Skeleton. Where it gets its name from I do not know, but it looks freaking scary.
Then at the advice of Catriona at Circulating Library and Cindy 2paw I had recorded Burn Notice on Wednesday. Fast, enjoyable, voiceover narration always a plus. I understand nothing technical but I’m sure you can actually turn a mobile phone into a listening device…somehow. I shall try to remember to record again.
Rockwiz: repeat but nevertheless entertaining. Tina Arena hey. I watched a lot of Young Talent Time as a young person. Both Tina and I have aged somewhat since those days. She is still tiny though. And the guy from the Tea Party. Not a fan, but the duet at the end was pretty good.
And I have still to watch Breaking Bad.6 Comments »
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00191.warc.gz
|
CC-MAIN-2022-33
| 4,772
| 23
|