url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://github.com/electron/electron/pull/11965
code
Join GitHub today GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.Sign up Cache libnotify server caps #11965 An offshoot of the other libnotify branch. Before this patch, the implementation of This patch caches the server capabilities. Unrelated but also useful: this patch logs a warning if
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156513.14/warc/CC-MAIN-20180920140359-20180920160759-00071.warc.gz
CC-MAIN-2018-39
375
7
http://setiathome.berkeley.edu/forum_thread.php?id=4150
code
Joined: 24 Jun 00 With the old ‘Keep enough work on disk to last between’ lets say ‘4 and 4.5 days’, to start with there would be about 4.5 days work downloaded, then when the amount of work got down to about 4 days Boinc would try to get more work. Which meant that if the project was down your computer would have a further 4 days of trying to get more work before there was a danger of running out of work. How often does Boinc try to connect with the new ‘Connect to network’, I understand that the figure you enter is the minimum figure and the maximum is twice the minimum figure. Does Boinc wait until it reaches the minimum figure before trying or is there some other figure it uses as to when it try’s to get more work. The ‘Keep enough work on disk to last between’ gave greater control of how much work was stored on your computer allowing you to decide how much of a buffer to have. If someone is using a modem connection that they connect infrequently (say every 5 to 7 days) so require a larger buffer of work could mean that twice the minimum figure could easily put WU’s close to or past the report deadline if their computer is off for any time or they start using system intensive software, which would not happen if they could set the figures to be between 8 and 8.5 days. Now a figure of 7 gives you a maximum of 14 days work which is the most that can be downloaded because of the report deadline date. I run Seti and CPN, CPN uses ‘Keep enough work on disk to last between’. ©2018 University of California SETI@home and Astropulse are funded by grants from the National Science Foundation, NASA, and donations from SETI@home volunteers. AstroPulse is funded in part by the NSF through grant AST-0307956.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866276.61/warc/CC-MAIN-20180524112244-20180524132244-00249.warc.gz
CC-MAIN-2018-22
1,750
6
https://bigcatrescue.org/angry-birds-big-cats-golden-eggs/
code
NEW Angry Birds Golden Egg Levels Discovered at Big Cat Rescue! Watch tigers, lions, leopards, cougars and lynx, having fun searching for and DESTROYING their golden eggs! 🙂 BIG CAT TV is a close look into our day-to-day operations, the conservation efforts we support, and the 100+ feline residents of “Big Cat Rescue” in Tampa, FL. USA. Big Cat Rescue is an educational non-breeding sanctuary and a registered non-profit 501c3 so your donations are tax deductible! Subscribe here: http://youtube.com/subscription_center?add_user=BigCatRescue Music from APM Music (https://www.apmmusic.com) and Epidemic Sound (http://www.epidemicsound.com) and Artlist.io Take action to end big cat abuse at BigCatAct.com Follow Big Cat Rescue on Twitter http://twitter.com/BigCatRescue Like Big Cat Rescue on Facebook http://facebook.com/bigcatrescue Leave a Reply
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656869.87/warc/CC-MAIN-20230609233952-20230610023952-00737.warc.gz
CC-MAIN-2023-23
857
8
https://dba.meta.stackexchange.com/users/1842/sqlsandwiches
code
I am a DBA. Yay. Member for 9 years, 1 month 5 profile views Last seen Feb 11 '16 at 15:31 Top network posts - 26 Trying to find the last time that a value has changed - 21 How to write a query to find all tables in a db that have a specific column name - 8 Can someone explain the magic of Opendatasource/Openrowset? - 8 Is there a standard implementation of a Users Database? - 7 Maintain index on SQL Server table - 6 How do you change the location of the data files in SQL Server 2000? - 6 What are best practices for safely permanently deleting a database? - View more network posts →
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655887046.62/warc/CC-MAIN-20200705055259-20200705085259-00379.warc.gz
CC-MAIN-2020-29
591
13
https://www.scaruffi.com/singular/sin231.html
code
(These are excerpts from my book "Intelligence is not Artificial") Probability in the age of Neural Networks The fundamental limitation of neural networks is that they need to be "trained" with thousands if not millions of examples before they can "learn". A child can usually learn a new concept from a single example, creating a generalization that she will be able to apply to similar objects or situations ("one-shot generalization"). Bayesian thinking interprets knowledge as a set of probabilistic (not certain) statements and interprets learning as a process to refine those probabilities. As we acquire more evidence, we refine our beliefs. In 1996 the developmental psychologist Jenny Saffran showed that babies use probability theory to learn about the world, and they do learn very quickly a lot of facts. So Bayes in the 18th century may have stumbled onto an important fact about the way the brain works, not just a cute mathematical theory. Probabilistic induction was one of the very first proposals for artificial intelligence, notably Solomonoff's "Inductive Inference Machine" of 1956; and Judea Pearl's Bayesian reasoning ("Reverend Bayes on Inference Engines", 1982) provided the toolbox for probabilistic computation. Their motivation was the same that had originally motivated Fermi and Ulam: probabilistic reasoning is needed when the exact algorithm is too complicated and would result in unacceptable response time. In these cases it is preferrable to find an approximate (but quick) solution. In between, a generalization of subjective probability, the "theory of evidence", was developed by Arthur Dempster at Harvard University ("Upper and Lower Probabilities Induced by a Multivalued Mapping", 1967) and Glenn Shafer at Princeton University, who published the book "A Mathematical Theory of Evidence" (1976). Morris DeGroot of Carnegie Mellon University published "Optimal Statistical Decisions" in 1970, but the book that revived probabilistic reasoning was the English translation of DeFinetti's book "Theory of Probability" (1970), many years after his 1928 talk. Meanwhile, in 1970 Keith Hastings at the University of Toronto generalized the Metropolis algorithm ("Monte Carlo Sampling Methods using Markov Chains and their Applications", 1970). Another popular MCMC algorithm, "Gibbs sampling", was developed in 1984 by the brothers Stuart and Donald Geman (respectively at Brown University and the University of Massachusetts) who were working on computer vision ("Stochastic Relaxation, Gibbs Distributions, and the Bayesian Restoration of Images", 1984); Judea Pearl soon introduced Gibbs sampling in his Bayesian networks, also known as "belief networks" and "causal networks" ("Evidential Reasoning using Stochastic Simulation", 1987). MCMC became especially popular after Adrian Smith at the University of Nottingham, in collaboration with Alan Gelfand, showed how these algorithms can be used in a wide variety of cases ("Sampling-based Approaches to Calculating Marginal Densities", 1990). Just then the statistical software BUGS (Bayesian inference Using Gibbs Sampling) was becoming available Bayesian inference using Markov chain Monte Carlo (MCMC): it had been developed since 1989 at the University of Cambridge by Andrew Thomas, working under David Spiegelhalter. In 1993 the International Society for Bayesian Analysis met in San Francisco for its first conference. Finally, Radford Neal of the University of Toronto published a report titled "Probabilistic Inference Using Markov Chain Monte Carlo Methods" (1993) that said it all, and in 1996 published the book "Bayesian Learning for Neural Networks". Meanwhile, in 1983 Geoffrey Hinton at Carnegie Mellon University and Terry Sejnowski at John Hopkins University had introduced the Boltzmann machine that was still evolving. Because the computational cost of the undirected models is so high, the Boltzmann machine used an approximation method that was de facto already Gibbs sampling. In 1992 Radford Neal at the University of Toronto added "direction" to the connections (that were originally undirected, i.e. symmetric) of the Boltzmann machine in order to improve the training process. Pearl had described belief nets to represent expert knowledge (knowledge elicited from humans). Neal showed that belief nets can learn by themselves. In 1995 Hinton and Neal worked with the British neuroscientist Peter Dayan, who was keen on finding a similarity with Hermann von Helmholtz's theory of perception, and designed the Helmholtz Machine ("The Helmholtz Machine", 1995) for which they invented the "wake-sleep" algorithm for unsupervised learning ("The Wake-sleep Algorithm for Unsupervised Neural Networks", 1995). The wake-sleep algorithm, conceived purely from neuroscience, trains top-down and bottom-up probabilistic models (i.e. generative and inference models) against each other in a multilayer network of stochastic neurons. It is a form of "variational Bayesian learning": it approximates Bayesian inference when it becomes intractable, as it is typically the case in multilayer networks. Meanwhile, the Swedish statistician Ulf Grenander (who in 1972 had established the Brown University Pattern Theory Group) fostered a conceptual revolution in the way a computer should describe knowledge of the world: not as concepts but as patterns. His "general pattern theory" provided mathematical tools for identifying the hidden variables of a data set. Grenander's pupil David Mumford studied the visual cortex and came up with a hierarchy of modules in which inference is Bayesian, and it is propagated both up and down ("On The Computational Architecture Of The Neocortex II", 1992). The assumption was that feedforward/feedback loops in the visual region integrate top-down expectations and bottom-up observations via probabilistic inference. Basically, Mumford applied hierarchical Bayesian inference to model how the brain works. Hinton's Helmholtz machine of 1995 was de facto an implementation of those ideas: an unsupervised learning algorithm to discover the hidden structure of a set of data based on Mumford's and Grenander's ideas. Another important idea originated in non-equilibrium thermodynamics (thermodynamics was that studies irreversible processes). Christopher Jarzynski at the Los Alamos National Laboratory used a Markov chain to gradually convert one distribution into another via a sequence of intermediate distributions ("Nonequilibrium Equality for Free Energy Differences", 1997), an idea that Radford Neal at the University of Toronto turned into yet another annealing method ("Annealed Importance Sampling", 2001). Back to the Table of Contents Purchase "Intelligence is not Artificial")
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363134.25/warc/CC-MAIN-20211205005314-20211205035314-00201.warc.gz
CC-MAIN-2021-49
6,726
21
https://code2care.org/java/java-monitoring-and-management-console-jconsole
code
The Java Monitoring and Management Console - or simply called as jconsole is an advanced tool for Java developers to monitor and manage their Java Applications that are deployed on their local machine, or remote machines such as UAT (Staging) or Production environment. This tool comes very handily when there the developer wants to understand the following, - What is the trend of the memory (heap) consumption of the application. - To identify number of threads that are running (live threads). - Total number of Classes that are loaded and currency in use. - What is the trend of CPU utilization of the application over time. How to Lauch jconsole using command Line? Launching the monitoring tool is easy. just type jconsole in the command line (or Terminal if using Mac/Linux). You can also pass in optional parameters such as PID to launch the console with details of a JVM that you want to monitor.Syntax: jconsole [ options ] [ connection ... ] When you fire this command the jconsole UI application will be launched and you will see something like this. ⚡️You can select the time range from 1 minute, 5 minutes, 10 minutes, 30 minutes, 1 hour .. 1 day, ... 1 month, ... 12 months... All based on what time the issue might have occurred that you want to understand. jconsole various tabs - Overview tab: Shows the graphs of Heap Memory Usage, Threads, Classes and CPU Usage, - Memory tab: In this tab, you can see detailed charts of all kinds of memory areas such as Heap, Non-Heap, and various Memory Pool. You can also perform garbage collection here. - Threads tab: It provides detailed information of all the threads - you can look into the thread stacks and even identify deadlocks here. - Classes tab: Again this provided more detailed info about the classes loaded and their charts. - VM Summary tab: It looks something like this, VM Summary Saturday, April 24, 2021, at 6:09:59 PM GMT Connection name: pid: 5401 jdk.jconsole/sun.tools.jconsole.JConsole Virtual Machine: OpenJDK 64-Bit Server VM version 184.108.40.206+1-LTS Vendor: Azul Systems, Inc. Name: firstname.lastname@example.org Uptime: 22 minutes Process CPU time: 1 minute JIT compiler: HotSpot 64-Bit Tiered Compilers Total compile time: 27.076 seconds Live threads: 38 Peak: 39 Daemon threads: 30 Total threads started: 51 Current classes loaded: 5,156 Total classes loaded: 5,158 Total classes unloaded: 2 Current heap size: 69,452 kbytes Maximum heap size: 2,097,152 kbytes Committed memory: 516,096 kbytes Pending finalization: 0 objects Garbage collector: Name = 'G1 Young Generation', Collections = 357, Total time spent = 0.446 seconds Garbage collector: Name = 'G1 Old Generation', Collections = 0, Total time spent = 0.000 seconds Operating System: Mac OS X 11.2.3 Architecture: aarch64 Number of processors: 8 Committed virtual memory: 414,543,728 kbytes Total physical memory: 8,388,608 kbytes Free physical memory: 61,648 kbytes Total swap space: 2,097,152 kbytes Free swap space: 794,624 kbytes VM arguments: -Dapplication.home=/Library/Java/JavaVirtualMachines/zulu-11.jdk/Contents/Home --add-opens=java.base/java.io=jdk.jconsole -Djconsole.showOutputViewer -Djdk.attach.allowAttachSelf=true -Xms8m -Djdk.module.main=jdk.jconsole Class path: Library path: /Users/code2care/Library/Java/Extensions:/Library/Java/Extensions:/Network/Library/Java/Extensions:/System/Library/Java/Extensions:/usr/lib/java:. Boot class path: Unavailable Have Questions? Post them here! - Java -Day of the week using Java 8 DayOfWeek Enum - Java: TimeZone List with GMT/UTC Offset - Struts 2 Hello World Example in Eclipse - Formatting Double in Java [Examples] - Convert Java Array to ArrayList Code Example - Exception in thread main java.lang.NoClassDefFoundError: package javaClass - How to serialize-deserialize an object in java - Maven Unsupported major.minor version 51.0 - [Fix] java.net.MalformedURLException: unknown protocol - [Java Threads] Should we extend Thread Class or implement Runnable interface - connection.url property value in hibernate.cfg.xml for mysql - IntelliJ: Error: Could not find or load main class, java.lang.ClassNotFoundException - 5+ Fibonacci number Series Java Program Examples [ 0 1 1 2 3 ..] - [Java] NoClassDefFoundError Caused by: java.lang.ClassNotFoundException: org.apache.commons.logging.LogFactory - Java Split String by Spaces - Java SE 8 Update 301 available with various bug fixes and security improvements - Java - PatternSyntaxException - Split a String in Java with Examples - Convert byte array to String in Java - Run Java Code Every Second - Difference between using Scanner Class and String args for user input in Java - Remove Trailing zeros BigDecimal Java - Best free Decompiler for Java - Unsupported major.minor version 52.0 in java - java.io.IOException: Unable to locate resource handler.properties - How to change default macOS Terminal Window size - MacOS - What is FCM Messages Test Notification! [Microsoft Teams] [Google Hangouts] - Microsoft - Android : No Launcher activity found! Error - Android - reCaptcha Verification expired. Check the checkbox again - Html - How to add border to Android Button - Android
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587908.20/warc/CC-MAIN-20211026134839-20211026164839-00707.warc.gz
CC-MAIN-2021-43
5,155
47
https://www.freelancer.com/work/php-rails-backend/
code
We are looking for a developer who can develop an end-to-end POS project. If you have the skills as a web developer and also possesses good design skills, then we are looking for you! Our idea is to have the following requirements: (note that this is just an overview). When you bid, IT IS IMPORTANT THAT YOU GIVE US AN IDEA OF HOW YOU WILL BE DEVELOPING THIS. * Can support multiple languages, m... Experienced SystemAdministrator for est. 4 weeks full-time for managing - Administration of corporate ...managing - Administration of corporate network: openvpn, IPSec, routing, AWS vpc - Upgrading Linux Instances (EC2 instances) - various Applications: Apache, nginx, Ruby on Rails - Documentation of Infrastructure Location: Essen or Cologne, Germany To show that you understand English and...bidding: Which planet do we live on? A complete functional online platform used for forecasting. Detailed system requirements ready in attachment. Need to build frontend, backend, database (using Amazon Cloud service). Timeline: 1 month. (To be delivered before Jul 31.) Communication: 1-2 web calls each week Are you a master of Rails development? You can easily take over development of Redmine plugins from scratch? You have already implemented Redmine plugins? You know how to protect the sources by obfuscating and building to binary for redmine plugins? You know how to create Themes for Redmine? You also know how to make responsive and dynamic pages for Looking for an expert to integrate my Android app to my Drupal Website. I just want to control few settings of my app with the Drupal dashboard. I don't know what you call it, and whether it's possible or not. Please reply with your suggestions. Thanks! I need a front end developer who can im...The front end will be done in React.js. The backend already exists in Rails but may need a few updates to implement the new React design. I will provide a complete Adobe XD file for desktop, tablet and mobile versions. We will provide any copy and images that will be needed that are not already in the backend. we have a ralis 5 site which crashes on mobile devices, we think it is a turbolinks issue or css ...developers we are looking for an expert to work on our project. This project requires an excellent knowledge of Wordpress Freelanceengine theme, The task is not frondend but a backend tasks so only coding experts will need to apple for this job. We need the following 3 tasks done: 1. Fee for Featured ads, Bid Plans , to be add under Current Consumption I'm learning Ruby on Rails and think I know enough to create an app I have in mind -- except for the user auth part. I'd like you to create a base app for me that handles all the user auth and user management features I need, and then I can take it over and build out the rest of my app from there. Here are the auth features I need: - Normal Devise-based ...purchase an item. We are looking to modify the code to allow guest purchases that do not require registration and logins. Requirements - must be highly skilled with Ruby on Rails - must be highly skilled with ActiveAdmin, ActiveMerchant, ActiveRecord, SimpleForm - must be fluent in English and can communicate through screenshares - must be comfortable I need to users in Front-END could import using function of wpDataTables plugin ( this plugin imports only in Back-End) I need to users in Front-End could get data from Ebay using the function of WooImporter plugin and the links of the products of Column#4 + parameters of the column#5, the data to get from Ebay is: -price -seller -quantity -status -Delivery price. The three last columns have to ... i have a e-commerce rails app in the making, i want you to add the cart system in it, note all html and css work has veen done you have to add a fully functional cart system: 1. users should be able to add products to the cart. 2. users can view there cart after many days and the products should be there. 3. users should be able to delete products from We are looking for a ROR developer who can help to complete the website. We already have developed and completed a website in Ruby On Rails, we need some further features needs to be added. Smalls features list below: 1. able to edit the translate from admin panel and change the the side of the translate for arabic to right to left , 2. Deploy application
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867304.92/warc/CC-MAIN-20180624234721-20180625014721-00136.warc.gz
CC-MAIN-2018-26
4,347
13
https://blog.groupdocs.cloud/conversion/how-to-convert-pdf-to-tiff-file-programmatically-in-java/
code
PDF (Portable Document Format) and TIFF (Tagged Image File Format) are two popular file formats for storing and sharing documents. PDF is widely used because of its compatibility with different devices and operating systems, while TIFF file is preferred for storing high-quality images. Sometimes, you may need to convert a PDF file to a TIFF file for various reasons, such as archiving or printing. In this article, we will discuss how to convert PDF to TIFF file programmatically in Java using GroupDocs.Conversion Cloud SDK for Java. The following topics will be covered in this tutorial: - Java PDF to TIFF File Converter API and SDK Installation - How to Convert PDF to TIFF Image in Java using REST API Java PDF to TIFF File Converter API and SDK Installation GroupDocs.Conversion Cloud SDK for Java is a cloud-based file format document conversion API that allows you to convert your files and images to different formats using simple API calls. It supports more than 50 file formats, including Visio, PDF, Word, Excel, PowerPoint, raster images, and many more. Using GroupDocs.Conversion Cloud SDK for Java, you can efficiently convert your files and images to the format you need without using any third-party software. Integrating the API into Java-based applications is made simple and efficient, eliminating the need for additional software. You can either download the API’s JAR file or install it using Maven by adding the following repository and dependency into your project’s pom.xml file: <repository> <id>groupdocs-artifact-repository</id> <name>GroupDocs Artifact Repository</name> <url>https://repository.groupdocs.cloud/repo</url> </repository> <dependency> <groupId>com.groupdocs</groupId <artifactId>groupdocs-conversion-cloud</artifactId> <version>23.4</version> <scope>compile</scope> </dependency> After integrating the Cloud SDK into your Java application, sign up for an account. Collect your Client ID and Client Secret from the dashboard before you start following the steps and available code examples. Please enter the code shown below once you have your ID and secret: How to Convert PDF to TIFF Image in Java using REST API To convert a PDF file to a TIFF file using GroupDocs.Conversion Cloud SDK for Java, follow these steps: Upload the File Firstly, upload the PDF document to the cloud storage using the code snippet as given below: As a result, the uploaded PDF file will be available in the files section of your dashboard on the cloud. Convert PDF to TIFF Format in Java Here are the steps and sample code snippet to convert a PDF file to a TIFF file programmatically in Java using the GroupDocs.Conversion Cloud SDK for Java: - Firstly, create an instance of ConvertApi class. - Secondly, create an instance of the ConvertSettings class. - Next, provide the cloud storage name. - Set the input PDF file path and output file format as “tiff”. - Then, create an instance of the TiffConvertOptions class. - Optionally, set various convert options like setFromPage, setPagesCount, etc. - Now, set convert options and the output file path using the ConvertSettings instance. - After that, create ConvertDocumentRequest class instance and pass the ConvertSettings parameter. - Finally, call the convert_document() method and pass the ConvertDocumentRequest parameter. The following code snippet shows how to convert a PDF file to Tiff in Java using REST API: Download the Converted File The above code sample will save the converted TIFF file to the cloud. You can download it using the following code snippet: Free Online PDF to TIFF Converter How to convert PDF to TIFF images online for free? Please try an online PDF to TIFF converter to change a PDF to TIFF image. This converter is developed using the above-mentioned PDF to TIFF image REST API. This brings us to the end of this blog post. The following is what you have learned from this article: - how to programmatically convert PDFs to TIFF files in Java using GroupDocs.Conversion Cloud REST API; - programmatically upload the PDF file to the cloud and then download the converted TIFF file from the cloud; - and online convert PDF to TIFF using a free PDF to TIFF converter. Additionally, we also provide an API Reference section that lets you visualize and communicate with our APIs directly through the browser. Java SDK’s complete source code is freely available on Github. Please check the GroupDocs.Conversion Cloud SDK for Java Examples here. Moreover, we encourage you to refer to our Getting Started guide. Moreover, we suggest you follow our Getting Started guide for detailed steps and API usage. Finally, we keep writing new blog articles on different file formats and conversions using REST API. So, please get in touch for the latest updates. Ask a question For any queries about PDF to TIFF converter, please feel free to contact us on the free support forum. How do I convert PDF files to TIFF format using Java? You can convert PDF files to TIFF format using the GroupDocs.Conversion Cloud SDK for Java. The GroupDocs.Conversion Cloud SDK for Java is a powerful tool that allows developers to convert files from one format to another using cloud-based APIs. How to convert PDF to TIFF online for free? Our PDF to TIFF converter allows you to convert PDF to TIFF format for free. Please follow the step-by-step instructions given below to perform the conversion: - Open the free PDF to TIFF converter online. - Now, click in the file drop area to upload a PDF or drag & drop a PDF file. - Next, click on the Convert Now button. Free online PDF to TIFF converter will change PDF to TIFF image. - The download link of the output TIFF image will be available after converting the PDF file. How to convert PDF to TIFF on Windows? Please visit this link to download an offline PDF to TIFF converter for Windows. This PDF to TIFF image converter can be used to convert PDF files to TIFF images on Windows easily, with a single click. How do I install the GroupDocs.Conversion Cloud SDK for Java? You can install the GroupDocs.Conversion Cloud SDK for Java by adding the appropriate dependencies to your Java project. If you want to learn about related topics we recommend you visit the following articles: - Convert Markdown Files to PDF in Java using REST API - Convert EXCEL to JSON and JSON to EXCEL in Python - How to Convert CSV to JSON and JSON to CSV in Python - Convert Word Documents to PDF using REST API in Python - How to Convert PDF to Excel in Python using REST API - Convert PDF to Editable Word Document with Python SDK - How to Convert PDF to PPTX using a REST API in Python - Convert PDF File to PNG and PNG to PDF Format using Java - How to Convert PowerPoint PPT PPTX to HTML using Java - How to Convert Visio File to PDF in Java
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646144.69/warc/CC-MAIN-20230530194919-20230530224919-00180.warc.gz
CC-MAIN-2023-23
6,768
63
https://ez.analog.com/thread/18176-spi-driver-sample-code-for-bf525
code
i am trying to locate SPI driver code for BF525. If ther eis tutorial or sample code will be very useful to acclerate development. I am planing to have SPI driver with GPIO pin based IRQ to support control. Any advice from ADI engg support team will be very helpful.. i have very less time and thus looking for sample code Thanks in advance
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865679.51/warc/CC-MAIN-20180523141759-20180523161759-00149.warc.gz
CC-MAIN-2018-22
340
3
https://docs.telerik.com/data-access/deprecated/feature-reference/tools/dynamic-data-wizard/feature-ref-tools-dynamic-data-wizard-select-metadata-source-type.html
code
Select Metadata Source Type Dialog This article is relevant to entity models that utilize the deprecated Visual Studio integration of Telerik Data Access. The current documentation of the Data Access framework is available here. The Select Metadata Source Type dialog is the first page of the Dynamic Data Wizard. It allows you to select the metadata source type that will be used by the wizard. There are three options. You can choose Rlinq File, OpenAccessContext or Fluent Metadata Source. - Rlinq File - uses a RLINQ file to construct the metadata required by the wizard. All RLINQ files from the current and referenced projects will be retrieved. - OpenAccessContext - constructs the metadata required by the wizard from the context via reflection. All OpenAccessContext classes from the available compiled assemblies will be retrieved. - Fluent Metadata Source - constructs the metadata required by the wizard from mapping sources via reflection. All fluent metadata sources from the current and referenced projects will be retrieved.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943637.3/warc/CC-MAIN-20230321064400-20230321094400-00071.warc.gz
CC-MAIN-2023-14
1,040
6
https://wingerseotools.com/onpage-seo-checker-tools-seo-checklist-drupal.html
code
SEM goes hand in hand with SEO to make sure that your site is converting visitors into customers. Having a good looking and properly optimized site is great. Having all of the tools and systems running in the background is better than great. The first step is to make sure that your business is showing up in the search engines. While your site is ranking, we will work together to create customized sales funnels and follow up processes to build your customer base and grow your presence online. I was used to work with Tools like Sistrix, Ahrefs or Searchmetrics and did not know about SE Ranking before. But those tools were too cost-intensive for a small and quick start into SEO so I tried it out and I am quite satisfied with it. I like the ability to pay for certain services with credits, as I am not using them on a very frequent level, so it actually gives me greater flexibility to only use them when needed and not paying for them even when not using them. Smartphone - In this document, "mobile" or “mobile devices" refers to smartphones, such as devices running Android, iPhone, or Windows Phone. Mobile browsers are similar to desktop browsers in that they can render a broad set of the HTML5 specification, although their screen size is smaller and in almost all cases their default orientation is vertical. Everything for Google these days comes down to “Customer Experience”. Page speeds, table of content, the relevancy of content, length of content, uniqueness of content, jump links, video in the content, relevant headers, less broken links, customized 404 pages etc are all indicative of improving customer experience on th website and hence helps you rank better. Ego and assumptions led me to choose the wrong keywords for my own site. How did I spend three years optimizing my site and building links to finally crack the top three for six critical keywords, only to find out that I wasted all that time? However, in spite of targeting the wrong words, Seer grew the business. In this presentation, Will shows you the mistakes made and share with you the approaches that can help you build content that gets you thanked. As much as we love our work, we’re equally passionate about ROI. Dallas’ #1 SEO team focuses on increasing site traffic. We also manage your online ad spend on both mobile and desktop, on an expert level – from search and display ads to Facebook, Instagram, LinkedIn and more. Dallas SEO Dogs supports SEO and online advertising with conversion optimization, improving the chances that visitors become paying customers. Great SEO is increasingly dependent on having a website with a great user experience. To make your user experience great requires carefully tracking what people do so that you always know where to improve. But what do you track? In this 15-minute talk, I’ll cover three effective and advanced ways to use event tracking in Google Analytics to understand a website's user. A few years back we decided to move our community forum from a different URL (myforum.com) to our main URL (mywebsite.com/forum), thinking all the community content could only help drive additional traffic to our website. We have 8930 site links currently, which probably 8800 are forum content or blog content. Should we move our forum back to a different URL?
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505826.39/warc/CC-MAIN-20200401161832-20200401191832-00203.warc.gz
CC-MAIN-2020-16
3,314
8
https://forums.comodo.com/t/firewall-does-not-check-crc-md5-signatures-of-trusted-applications/242825
code
when a program asks for internet access for the 1st time, if I trust it I can select “allow” and “remember my answer” so that the firewall won’t pop up again the next time it tries to connect here’s the prob : if I slightly change the exe (so that its cryptographic signature is modified), the modified app can still access the net! shouldn’t there be an alert saying the [trusted] app was modified? PS. I have Firewall set to “Safe” and Defense+ set to “Paranoid” That’s a long time discussion on the board, devs state that they don’t need it because they monitor "who’ changes it… If you come from Kerio you will miss this alert yes, and i prefer to get notified also if a hash of an applications changes but it’s not there, and based on the dev’s responses it won’t be build in either… You have to do some searching to find it somewhere on the forums… CIS only checks the hashes when comparing a file to its white list. But if a malicious program tries to change another file (e.g. that .exe file that is connecting to the internet) then you will get a D+ alert about it. The reason you are not getting an alert when YOU change the file is becuase CIS is designed to allow YOU (the user) to modify files without triggering D+ alerts but other programs themselves would generate an alert when trying to modify other files. so what is this white list - is it the list of apps that the user sets to permantently “allow” or is it something else, and can it be modified by the user? PS. actually I do miss comodo v2.4 (which btw seemed far lighter on resources btw and I didn’t even install the antivirus in the present version), it was good at intercepting unwanted outbound connection attempts (I didn’t need a behaviour monitor because this is reserved for a separate antivirus app or something like Threafire, so as not to put all eggs in 1 basket if u get my drift) the only reason I switched to newer version was because the v2 was no match for recent threats that are capable or terminating the firewall services The white list is run by COMODO and the user cannot edit it. "Application Recognition Database (Extensive and proprietary application safe list) The Firewall includes an extensive white-list of safe executables called the ‘Comodo Safe-List Database’. This database checks the integrity of every executable and the Firewall will alert you of potentially damaging applications before they are installed. This level of protection is new because traditionally firewalls only detect harmful applications from a blacklist of known malware - often-missing new forms of malware as might be launched in day zero attacks. The Firewall is continually updated and currently over 1,000,000 applications are in Comodo Safe list, representing virtually one of the largest safe lists within the security industry." ok so I tried enabling Image Execution Protection (figured maybe the “image” part is about memorizing the hash of safe apps) but that didn’t work either however I did notice that Image Execution Protection keeps giving alerts about apps that are already listed as safe - eg. “explorer.exe is trying to launch winamp.exe”, “explorer.exe is trying to launch winword.exe”, etc (explorer is safe & isn’t being modified in memory, so the fw should warn about the 2nd app only, not the 1st) couple this with the fact that it does not even check the hash of explorer.exe (or other safe apps), and that makes the feature completely useless, so I disabled it again at least that could be useful info for other users : Image Execution Protection can be safely disabled without sacrificing on security, this should save some CPU resources (useful for my rig which ain’t exactly the most recent) Image Execution Control is an integral part of the Defense+ engine. If your Defense+ Security Level is set to 'Train with Safe Mode' or 'Clean PC Mode', then it is responsible for authenticating every executable image that is loaded into the memory. Comodo Internet Security calculates the hash of an executable at the point it attempts to load into memory. It then compares this hash with the list of known/recognized applications that are on the Comodo safe list. If the hash matches the one on record for the executable, then the application is safe. If no matching hash is found on the safelist, then the executable is ‘unrecognized’ and you will receive an alert. So i would object to the fact that you can safely disable this feature, specially if you are in Training mode or Clean PC Mode… As it’s only active by default on the extended security profile “ProActive” a normal install will have it disabled by default. yeah I figured this out soon enough (hope they correct this in the help file) and that’s why I disabled it - it’s more of an inconvenience & doesnt really add to security (not against trojans anyway - fw blocks all leaktests with or without it) Just want to let you all know of a test I did. Run Firewall only, in Safe Mode. With updates disabled well before Firefox 5 came, I installed Firefox 5 (or let it update itself from within FF4). There was no Comodo pop-up. So apparently Comodo is content with the new Firefox having the same path as the old one. For sure didn’t check MD5 signature/hash. (Reason for disabling updates: Had to do this since it annoyingly makes media players fall out of full screen, see other threads.) Update: In the folder C:\Program\COMODO\COMODO Internet Security\database some files, like white.n and white.h, have been updated after I disabled updates. So it seems white list is kept fresh still then. For me, that’s good. I use inly the firewall part of CIS, and after it’s rules set has been set, it really doesn’t need updates, or it is ok to wait years between them. However, even though white.h and white.n have been updated by Comodo after I disabled automatic updates, it did not have the latest info, as I could see when I later asked Comodo to do an update manually… (I posted this update at the end of this thread but it is not visible here, only if I start editing the thread…!) FF v5 is a digitally signed executable signed by Mozilla Corporation which is on the Trusted Software Vendors list. When it gets executed CIS won’t give a squeak indeed; it is a safe application. It determines if a file is safe using a SHA hash code look up. I’m assuming that Comodo does not update it’s white list when I disabled automatic updating. That’s why I tested like I did. Upadates were disabled before FF5 was available. Possibly this setting controls only program updates, and it might still update the white list. That isn’t clear in the help files. Probably needs some more testing to be sure how it works. Unless someone here knows the answer. Edit: I noted that some files in folder C:\Program\COMODO\COMODO Internet Security\database are updated even with this setting disabled. Including files called white.h and white.n. Awfully small files to hold every white listed program (4+32kB). But otherwise a strong indication that the white list is updated even now. That’s excellent then. I use Comodo as a “plain” firewall in Safe Mode, and as such, updates aren’t really necessary for security reasons (not at all like for an antivirus or if you use the entire CIS functionality), as long as it’s stable and no one changes the way the internet works. I can’t allow automatic updates since it makes media players jump out of full screen mode which is very annoying on an HTPC… In the folder C:\Program\COMODO\COMODO Internet Security\database some files, like white.n and white.h, have been updated after I disabled updates. So it seems white list is kept fresh still then. For me, that’s good. I use inly the firewall part of CIS, and after it’s rules set has been set, it really dosn’t need updates, or it is ok to wait years between them.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474659.73/warc/CC-MAIN-20240226094435-20240226124435-00101.warc.gz
CC-MAIN-2024-10
7,934
34
https://www.fi.freelancer.com/projects/data-entry/fill-spreadsheet-with-data-17603397/
code
Töitä ei löytynyt Pahoittelut, emme löytäneet etsimääsi työtä. Löydä viimeisimmät työt täältä: Potrzebuje stwprzyc strone www dla usług zwiazanych z aplikacja celulozy-izolacje za pomoca celulozy. Potrzebuje stworzyc logo dla mojej firmy. [kirjaudu nähdäksesi URL:n] I need content for youtube videos - title, description, tags Need content for 20 videos. I need a simple logo designer who can design a logo for me If you have ability to make a logo the please let me know Hello. I am looking for the creative person, who often watches Instagram memes/videos and surfs Youtube. Task: Come up with Instagram video storyline/script, where the video itself is very funny, hilarious and the ending is WTF, cringe and surprising. Example: "Guy (dressed up as a woman) is delivering a baby. Doctor is trying to get the baby out of the body, but instead of the baby, unicorn... requirement for someone who can do modelling of towers and assign member properties in STAAD pro, DON'T HAVE TO ANALYSE AND DESIGN. Only modelling the structure as given in staad pro only. 3 sayfası olan basit arayüzlü bir program. Back-end kısmı yazılı olarak var. Menüler, tablolar yerleştirilecek. Asyncron tasklar konusunda deneyimli olmasını bekliyorum. 1 yıllık birinin 1 - 1.5 günde bitirmesini beklediğim bir proje. Geliştiricinin Ankara'da olması tercihtir. Beraber oturup çalışılması gerekiyor. Hi there, I would like to turn a ~15 min video clip of a female voice into a believable male voice clip. Our company require a skilled PowerPoint expert which is able to transform our static and simple slides into professional and animated company documents (.pptx). If you have additional graphic design skills to bring our presentation to the next level would increase the potential of a long-term relationship. German speaking Expert preferred in order to bring content to the right place on the slide... I have a data set that needs updating. Essentially, I need 32 individual sheets transposed and consolidated into an existing sheet in Excel. This can be achieved through copy and pasting or a simple macro but non-standard row positions make using macros a little challenging. Approximately 150 copy and pastes per sheet are required. Or can use excel formulas which dramatically reduces the need for ...
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247482347.44/warc/CC-MAIN-20190217172628-20190217194628-00106.warc.gz
CC-MAIN-2019-09
2,328
12
http://gennadiymesheryakov.ru/internet+dating+yahoo+answers/3775.html
code
read jessicas guide to dating on the dark side - Internet dating yahoo answers How to Capture a Single Millionaire Through Internet Dating . This is a partial, non-exhaustive list of online dating websites . You can help by expanding it with reliably sourced entries.. Uses answers from user-generated questions to find matches that conform to. There are enough dating sites in the world, there's no need to take . Victims can be found anywhere scammers also forage for connections on social. do dating sites even work Online dating has made coupling up easier than ever while also confronting us with . 22 05 - What is the best free dating website yahoo answers . Joining the one that best suits your needs can mean the difference between . I've tried a couple of the pay sites ( Match, Yahoo , and e Harmony). For online dating site Match, the answer is yes about $50 million. 7 08 - There are plenty of online dating sites on the web, but where are your . relationship options tailor-made for the digital age, online dating can be a . S.-based Internet users searched for on Yahoo within the . This list is a collection of the very best online dating sites and services based on their . of a person, instead of the exterior games of impression is what makes this work . - This is because the online dating /matching (as provided by the commercial websites ) lacks the basic ingredients for developing real love. People who've used internet dating sites , what was your experience like? It's honestly kind of depressing how few friends I've made since starting to work . If you are after some free quick sex, a free online dating web site would work for you. Therefore, try to create a tag or nickname that you can use on dating sites . turn-offs for guys, how to talk dirty to a guy over text messages examples, do online dating sites work yahoo answers , dating relationship tips, teenage dating. Click The Link : meettips Click The Link : meettips.Tags: Adult Dating, affair dating, sex dating
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806465.90/warc/CC-MAIN-20171122050455-20171122070455-00464.warc.gz
CC-MAIN-2017-47
1,998
12
https://www.mouritech.com/articles/release-management-for-aws-lambda-function-with-api-gateway
code
Release Management For AWS Lambda Function With API Gateway In any predominant software organization, code will normally be deployed in three environments – Development, QA and Production. Problems with such multiple environments arise when we work with Lambda functions, while implementing changes only to a single environment without affecting others. In order to overcome this problem, we use AWS Lambda Versioning and Aliases. With AWS Lambda Versioning, we can publish more than one version of our Lambda function and deploy these in the above mentioned environments. We can then create aliases for each of the versions that we create for our lambda function. So, an alias is a reference to a specific Lambda function version. Consider a single Lambda function behind AWS API Gateway. The API gateway has 3 different stages deployed named as DEV, QA and PROD. By calling these stages we will see a different Lambda function response from a single Lambda function respectively. We have to perform the following: - Create Versions and Aliases in Lambda Function - Create Dynamic Resources in API Gateway - Create the Authorization in API Gateway for Authorizer Lambda - Enable the CORS in API Gateway for proxy-lambda - Create Deployment Stages and Variables in API Gateway - Test the API The following diagram gives an overview of our example Versioning and Aliases in AWS Lambda Function The versioning and aliases are among the most important features of Lambda function. When we use versioning in AWS Lambda, we can publish one or more versions of our Lambda function. A key point to all of this is that each version of our Lambda function has its own ARN, and most importantly, a published version of our Lambda function is immutable. There is one readily available version of our Lambda function that we can change and it is named Version $LATEST. We can then create aliases for each of the versions that we create for our Lambda function. An alias is therefore a reference to a specific Lambda function version. Each alias also has a unique ARN. One key difference between aliases and functions is that we can change aliases to point to different versions of our functions. In the below representation, Fig.1 shows an example of how to use Lambda function versions and aliases. Each alias corresponds to a different environment (Production, UITest and Integration test) that is using a specific version of an AWS Lambda function. Fig.2 is an example which explains how to update Lambda function aliases when moving a new version into Production and a new version for UITest. - Faster development and easier deployment - Maintain all stages (DEV, QA and PROD) of code in single lambda function - Easier operational management - Reduction in operational costs - No servers to manage - Versions are immutable - Execution duration is long - Startup latency Custom authorization and CORS proxy lambda setup in API Gateway The following diagram gives an overall request and response flow in API Gateway. AWS API Gateway is a brilliant and fully managed service that makes it easy for developers to create, publish, maintain, monitor, and secure APIs at any scale. We can use it for building serverless applications, integrating with legacy applications and for proxying HTTP requests directly to other AWS services. It also acts as a HTTP front-end. Custom Lambda authorizer An API Authorizer is a Lambda function that performs authentication and authorization on requests prior to AWS API Gateway execution. The Lambda either permits or blocks the API requests that contain a particular authorization token by returning an IAM policy. The returning IAM policy is then cached by the API gateway so it can be later reused for up to 1 hour. - We can have our authentication mechanism the way we want it - Ultimate control over authentication and authorization - We can have the UI call the APIs with a standard token (JWT) and the flow for developers remains the same – no extra consideration of AWS SDK - A lot of effort and thinking is necessary to build authentication - Chances of missing out on some crucial aspects CORS Proxy Lambda Cross-Origin Resource Sharing (CORS) is a security feature provided by the browser which restricts cross-origin HTTP requests that are initiated by running scripts in the browser. To make our REST APIs handle these cross-origin requests, we must enable CORS support. - Security – Allows restricted domains - Easy setup as we don’t want to setup any settings in API Gateway - Everything rests in the code - Headers, status codes and messages are hidden in the source code Thus, by using AWSome services of API Gateway and Lambda, we can develop and deploy robust serverless applications and provide security as well as authorization and authentication. - GitHub URLs for sample code of Authorization and CORS Proxy lambdas code: - AWS Lambda Function Versioning and Aliases from AWS docs: Contact for further details Prabhakar Reddy NAGURU Sr. Software Engineer – Cloud Application Development
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107889173.38/warc/CC-MAIN-20201025125131-20201025155131-00130.warc.gz
CC-MAIN-2020-45
5,043
47
https://hfboards.mandatory.com/threads/flyers-high-res-photos.873993/
code
Hello, I am doing up my 'man cave' and I wanted to blow up some Flyers pics of past and present. I have the Parent Time Mag cover already in High Res. and another one of him as well as a Bobby Clarke one. I am looking for some interesting pictures, not just 'mug shots' Very interested to use the board as a resource for ideas. I know there are a lot of passionate people here. Anyone direct me to some pics... I tried searching the forum here for a thread like this, couldn't find, please merge if it exists. I've also done the google search, but nothing really great catches my eyes. Also, If this is against the rules, please delete. Cheers.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875141396.22/warc/CC-MAIN-20200216182139-20200216212139-00141.warc.gz
CC-MAIN-2020-10
644
1
https://forum.archive.openwrt.org/viewtopic.php?id=38896&p=5
code
I've successfully run OpenWRT from trunk on this router (TL-MR3220v2). I have a problem with USB on this router. I have a custom board with FT232RL on it. It worked great on TL-MR3220v1. Now it also works, but USB host on router is crashing. When I run my program on it, You can see ongoing communication on LED's (USB led on router is flashing, RX led on my device is also flashing). After a while (sometimes 10s, but not more than 10 minutes) communication stops. USB LED on router is constantly on, RX LED is off. I's a hardware fallout for sure. When I connect it through USB Hub it works a lot better. But its also not ideal. When i start some 230V device close to cable (fluorescent lamp 20W) its also crashes. I found that USB socket shield is connected through 1nF capacitor. It's different than in devices I've had before. As far as i know this filter is for high freq EMI. I've try to connect it directly to GND, but it didn't helped. found my answer here https://forum.openwrt.org/viewtopic.php … 68#p190168 (Last edited by hot-dog on 28 Jan 2013, 01:28)
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337360.41/warc/CC-MAIN-20221002212623-20221003002623-00622.warc.gz
CC-MAIN-2022-40
1,067
6
https://www.uie.com/brainsparks/2007/06/01/sharing-sharepoint/
code
June 1st, 2007 Cameron Moll offers some advice on getting the most out of SharePoint, with semantic code and CSS styling. For those of you not familiar with SharePoint, it is a web application from Microsoft that’s deployed within an organization for collaboration purposes. I’ll pigeon-hole it as an intranet-in-a-box™ app. There are a lot of people out there, web developers and designers especially, who have this app in their organization and they don’t much about it. And now they’ve been charged with wrangling it. The complaint I hear repeatedly is that it is difficult to make properly coded web pages (CSS, semantics, et al) on the SharePoint framework. The phrase “surrender” is thrown about commonly. Several people have referenced Jared’s comments on the topic of SharePoint at the Web Directions North conference. Implementing Sharepoint is a lot like building a house. It’s like a friend of yours says, “I know exactly what to do.” And, he drives you to a Home Depot, drops you off at the front door and says, “Everything you need is here.” Then, drives off. Luckily for SharePoint users, Cameron knows a ton about semantics and CSS, has been thrown into the same position as many of you, and is sharing his discoveries. A big thanks to Cameron.Tweet
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123491.79/warc/CC-MAIN-20170423031203-00282-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,290
7
http://bioperl.org/pipermail/bioperl-l/2005-October/020005.html
code
[Bioperl-l] Setting Theoretical Database size for bl2seq tembe at bioanalysis.org Wed Oct 26 11:12:37 EDT 2005 This is not a BioPerl question, but I could not find a satisfactory answer from other sources and would appreciate any help. I am trying to use bl2seq for comparing query "q" and another genome "g". Now, for "q" I already have blastall output from an nt database containing >2 million sequences. I understand that to get compatible e values, I need to set for bl2seq to the theoretical data size of that nt database. Which the following 4 (taken from blastall output) should be used for -d ? length of database: 12,254,801,043 effective length of database: 12,167,805,299 effective search space: 48671221196 effective search space used: 48671221196 Any pointers/website/docs will be appreciated. More information about the Bioperl-l
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701149548.13/warc/CC-MAIN-20160205193909-00011-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
843
17
https://tracker.moodle.org/browse/MDL-66994
code
When an admin registers their site, if they chose to display their site in the site listing, the setting 'Display contact form' appears and they can select 'Yes, provide a form for other Moodlers to contact me'. In the past, when the list of registered sites was on moodle.net, if a visitor knew to log in (not very intuitive!) when they browsed the list, sites which were willing to be contacted had an icon next to them with a link to a contact form. (It worked well originally, when the list of registered sites was on moodle.org, and people were likely to be logged in anyway.) The functionality doesn't exist on stats.moodle.org. These days, if sites are willing to be contacted, they provide a contact link on their site. As the functionality was most likely hardly ever used when the list of registered sites was on moodle.net, it doesn't seem worth adding it to stats.moodle.org. Instead, let's just remove the 'Display contact form' setting in site registration.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655901509.58/warc/CC-MAIN-20200709193741-20200709223741-00162.warc.gz
CC-MAIN-2020-29
971
4
https://github.com/Homebrew/legacy-homebrew/pull/16534
code
Mass Parallel Ssh formula Execute commands on many machines via SSH, and get a nicely formatted output. Added mpssh formula I've created downloadable tarballs for the different releases, it's all in the issue above. Signed-off-by: Adam Vandenberg <firstname.lastname@example.org>
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218186353.38/warc/CC-MAIN-20170322212946-00623-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
279
5
https://uiuxdesignerjobs.com/job/senior-ui-ux-designer-infusemedia-remote/
code
Senior UI/UX Designer EMEA - Remote Since 2012, INFUSEmedia helped thousands of B2B organizations drive full-funnel results through our innovative demand generation solutions and best-in-class data validation platform. It’s what helps us build uncompromising trust and impeccable reputation with our clients, every time. We are seeking a UI/UX Designer to join our project team to help support our design needs specifically for web and mobile applications. Your primary role will be to research and design usable web and mobile interfaces, perform usability testing, and create prototypes to validate design concepts. The ideal candidate will use this information to help us create the best user experience possible for our client's applications. As a creative member of our Project team, the UI/UX Designer collaborates closely with Project Managers and developers to craft a structured, intuitive experience for our users. We're looking for someone with an eye for clean design, superior UX skills, and the ability to transform high-level requirements into flawless user experiences. - Real cases in the portfolio (at least 3 multi-page sites); - Working knowledge of the following technologies and software: Figma, Sketch, InVision, Visio, HTML, CSS (SCSS), iOS, Android, Design Systems, and Adobe Creative Suite - Strong knowledge of responsive web design principles - Experience working with Figma and prototypes in it - Expertise in accessibility and usability standards - Experience with various user research techniques - Strong analytical and problem-solving skills - Graphic design tools such as Adobe Photoshop or Illustrator is a plus - 5+ years’ experience successfully applying customer-centered design on products, designing web and mobile applications - A portfolio of professional UI/UX design work for both web and mobile platforms - Demonstrated knowledge of user interface design, usability evaluation techniques, perception, cognition, task analysis, experimental design, and statistics. - Mobile and web application design experience across various platforms (iOS, Android, Windows) including an understanding of responsive web design. - Strong experience in applying design principles and documentation within the product life cycle. - Exceptional attention to detail and a keen eye for aesthetics and layout - Solid understanding of web performance optimization and best practices - A team player but can work independently - Multi-tasking and time-management skills, with the ability to prioritize tasks - Demonstrated strong written and verbal English communication skills. - Must have excellent teamwork, communication, and technical problem-solving skills to contribute within a multi-functional and multi-disciplined team. - Must be able to work with minimal supervision in a fluid, fast-paced and agile environment. - Gather input from internal stakeholders and users to shape product direction, visuals, and user experience - Develop and refine wireframes, process flows, and prototypes to convey interaction and design concepts - Generate innovative ideas that simplify complex design challenges - Design end-to-end workflows to ensure high-quality implementation and user-friendly experiences - Conduct user, industry, and competitor research to inform design decisions - Work collaboratively with the Project team and Developers to enhance component library and patterns UI Kit preparation; - Collaborate with designers to implement responsive web designs that meet the project's specifications - Work with product managers, marketers, and developers to understand project goals and user requirements - Ensure cross-browser and cross-device compatibility for all developed web pages - Optimize web pages for maximum speed and scalability - Designing graphic user interface elements, like menus, tabs, and widgets - Develop UI mockups and prototypes that clearly illustrate how sites function and look like
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474541.96/warc/CC-MAIN-20240224144416-20240224174416-00188.warc.gz
CC-MAIN-2024-10
3,943
39
https://people.andersenlab.com/vacancy/nodejs-and-angular-and-python/1185
code
Full Stack Developer (Angular + Node.js/Python) for Global Technology and Consulting CompanyVacancies The project is the development of specialized solutions in Google Cloud for retail, healthcare, manufacturing, telecommunications, media, entertainment, and other industries. The customer is a global technology and consulting company that specializes in managed services, business, consulting, and staffing services. - Driving technical exploration/technology research and experimentation to output new concepts and POCs; - Building user interfaces, integrating with GCP APIs, and deploying to cloud; - Partner with UX designers, Customer Engineers and Sales to understand customer's problem. - Work experience with Angular; - Work experience with Node.js or Python; - Experience with Google Cloud Platform products (Storage, Cloud Run, App Engine); - Experience with Git, Jira; - Level of English – Intermediate. - Experience with Unix/Linux; - Experience with RDBMS, NoSQL; - Experience in developing advanced user interactions, animations, including 3D objects or AI/ML features. Reasons to join us Andersen is a pre-IPO software development company that provides a full cycle of services. For over 14 years, we have been helping enterprises and middle-sized firms worldwide transform their businesses by creating effective digital solutions using innovative technologies. We welcome true specialists no matter what country they live in. Salaries at Andersen are pegged to the USD, and employees are provided with a social package and an extensive set of bonuses. - Cooperation with such businesses as Samsung, Johnson & Johnson, Ryanair, Europcar, TUI, Verivox, Media Markt, Shypple, etc. This project is just your beginning here — working with us means reliability and prospects; - Excellent teams with streamlined processes and an opportunity to change the project. There are also systems of mentoring and adaptation for each new employee; - Many different ways to grow: you can develop expertise in different business domains and improve as a specialist or a manager. Transparent performance review and assessment systems will allow you to determine your development path and plan your growth; - Flexible start of the working day: from 7 AM to 11 AM. You can telecommute, work at the office, or opt for a hybrid schedule — whatever is convenient for you; - Referral programs and an opportunity to additionally earn up to $1,500 per month by participating in the company's activities; - Access to the corporate training portal, where the entire knowledge base of the company is collected and which is constantly updated; - Such perks as private health insurance, English language courses, and certification compensation (AWS, PMP, etc.). We'll be glad to see you in our team! Still looking for your dream job in IT? Click here to see the full list of vacancies with Andersen's team. We are constantly opening new positions!
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103037649.11/warc/CC-MAIN-20220626071255-20220626101255-00321.warc.gz
CC-MAIN-2022-27
2,937
26
https://www.jayathisoft.com/post/happiness-time-management-learning-jayathisoft
code
Y. Rambabu, Pamuru Prakasam engineering college It is a great place where i learnt different skills both technical and personality. That place is encircled with positive vibes and everyone of us are always encouraged to learn new everyday, sir and madam are supportive ( like parents) and they will have genuine communication on anything . It is a place where everyone are treated equally . professional wise i am having a highly protected life because the technologies i learnt here in simple way, but if learnt individually it takes a lot of time and output is very complex.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816734.69/warc/CC-MAIN-20240413114018-20240413144018-00297.warc.gz
CC-MAIN-2024-18
576
3
https://www.birmingham.ac.uk/schools/law/staff/profile.aspx?ReferenceId=126722
code
I am a second year PhD researcher, having won one of two highly competitive Birmingham Law School scholarships for my thesis in international legal theory. My research intersects across my main areas of interest, being public international law and jurisprudence. I gained the LLM (with Distinction) at the University of Birmingham in ‘International Law: Crime, Justice and Human Rights’. I gained my LLB with the University of London’s external program. I currently lecture in Jurisprudence at Aston University and previously taught criminal law in a visiting lecturer capacity at the University of Birmingham. Additionally, I hold associate LLB lectureships with The Open University and Jersey Institute of Law. I have previous experience in further education, teaching law at a Birmingham city centre college.
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540491491.18/warc/CC-MAIN-20191206222837-20191207010837-00205.warc.gz
CC-MAIN-2019-51
817
2
https://astronomy.stackexchange.com/questions/32865/are-there-galaxies-with-2-or-more-super-massive-black-holes-orbiting-each-other/32866
code
Stack Exchange network consists of 175 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers. We now know that most stellar systems have 2 or more stars orbiting each other. Do we know of any galaxies which have 2 or more super massive black holes orbiting each other? Is it possible? Yes, there are galaxies with two supermassive black holes in the center, see for instance 4C +37.11 Most likely such galaxies are formed by collision and merger of two galaxies, and their cores have not yet merged. Source Required, but never shown
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250591234.15/warc/CC-MAIN-20200117205732-20200117233732-00321.warc.gz
CC-MAIN-2020-05
635
5
https://askubuntu.com/questions/1117839/touchpad-and-mouse-do-not-work-in-live-boot-advised-to-use-nomodeset-but-don?noredirect=1
code
This question already has an answer here: I was trying to dual boot Ubuntu 18.04.1 LTS alongside Windows 10 on my laptop. I got the USB and followed the video and everything worked up to where I clicked Try Ubuntu without installing and when the desktop loaded I was not able to use my touchpad. A wireless mouse worked but I was not able to click. Someone told me You need to boot the installation media with an additional boot parameter nomodesetand also when booting the installed system until you install the Nvidia proprietary drivers. I have no clue what the user means by any of this as I am very new to Ubuntu, can someone explain how to do these things and what it means? Thank you in advance.
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496667945.28/warc/CC-MAIN-20191114030315-20191114054315-00095.warc.gz
CC-MAIN-2019-47
702
7
https://satchel.works/@wclittle/ventures-episode-137
code
Product: How to train your own LLM with OpenAI. Code: Adding HTML elements to your welcome view In this episode of Ventures, I (https://www.linkedin.com/in/wclittle) walk through a screencast of how to begin learning how to train your own LLMs (like ChatGPT) to be applicable for your own products and customers. On the coding side of things, I also walk through how to begin adding HTML elements to your welcome page in the Rails app that we spun up together in previous episodes of this series (follow along here: https://satchel.works/@wclittle/product-and-code-series). 0:05 - Tee-up for the episode, continuing the Web 2&3 Product & Code series (which you can follow along with here: https://satchel.works/@wclittle/product-and-code-series) 0:50 - Product: Walking through https://platform.openai.com/docs/guides/fine-tuning and how to begin training your own LLM 3:38 - Code: adding HTML to your Rails app welcome view, learning and borrowing from https://www.w3schools.com/html/html_basic.asp
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100545.7/warc/CC-MAIN-20231205041842-20231205071842-00552.warc.gz
CC-MAIN-2023-50
999
5
http://forums.zimbra.com/administrators/53187-trying-load-balance-zimbramtaauthhost.html
code
I'd like to load balance the zimbraMtaAuthHost setting on my MTAs so that it's not going to a single mail server. I have a VIP created that load balances to my mail servers on port 8443, however I cannot update zimbraMtaAuthHost to a name that isn't a valid mail server. I can change this setting to any one single mail server. zmprov ms mta1.testdomain.com zimbraMtaAuthHost "mtaauth.testdomain.com" ERROR: service.INVALID_REQUEST (invalid request: specified zimbraMtaAuthHost does not correspond to a valid service hostname: mtaauth.testdomain.com) Any suggestions on how to get around this? The entire environment is virtual, so I don't want to go the Linux clustering route. I'd also like this load to be equally load balanced across all mail servers, so I'm looking for more than just HA. [zimbra@mta1 ~]$ zmcontrol -v Release 7.1.1_GA_3196.RHEL5_64_20110527001604 RHEL5_64 NETWORK edition.
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049274119.75/warc/CC-MAIN-20160524002114-00145-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
895
6
https://github.com/cfmeyers
code
Collin Meyers cfmeyers - New York - Joined on - DocketDonkey 3 Hub for downloading Massachusetts Trial Court information as CSV files - nyc-devshop-list 1 A list of links to dev shops in the New York City area - fatbaby 1 Fatbaby is a simple CRUD app built with Flask for keeping track of a newborn's feeding, changing, and napping schedule. - grabGoogleAutoComplete 1 Command line script to get keywords from Google Autosuggest given search term. - cunyfirst-backbone-example-app 1 CUNYfirst Explorer: An example Backbone.js app that consumes the CUNYfirst-pAPI Contributions in the last year 600 total Oct 3, 2014 – Oct 3, 2015 Longest streak 16 days April 11 – April 26 Current streak 0 days Last contributed - Pushed 4 commits to cfmeyers/dotfiles Sep 29 – Sep 30
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736672441.2/warc/CC-MAIN-20151001215752-00171-ip-10-137-6-227.ec2.internal.warc.gz
CC-MAIN-2015-40
773
12
http://www10.edacafe.com/blogs/aldec/2017/04/
code
Most everyone would agree how important FPGA prototyping is to test and validate an IP, sub-system, or a complete SoC design. Before the design is taped-out it can be validated at speeds near real operating conditions with physical peripherals and devices connected to it instead of simulation models. At the same time, these designs are not purely hardware, but these days incorporate a significant amount of the software stack and so co-verification of hardware and software is put at high importance among other requirements in the verification plan. However, preparing a robust FPGA prototype is not a trivial task. It requires strong hardware skills and spending a lot of time in the lab to configure and interconnect all required peripheral devices with an FPGA base board. Even more difficult is to create a comprehensive test scenario which contains procedures to configure various peripherals. Programming hundreds of registers in proper sequence and then reacting on events, interrupts, and checking status registers is a complex process. The task which is straightforward during simulation, where full control over design is assured, becomes extremely hard to implement in an FPGA prototype. Facing this challenge, verification engineers often connect a microprocessor or microcontroller daughter card to the main FPGA board. The IP or SoC subsystem you are designing will be connected with some kind of CPU anyhow, so this way seems natural. Having a CPU connected to the design implemented in an FPGA facilitates creating programmatically reconfigurable test scenarios and enables test automation. Moreover, the work of software developers can be now reused as the software stack with device drivers can become a part of the initialization procedure in the hardware test.. The software can become a part of the initialization procedure in the hardware test. If that makes sense to you, then why not use an FPGA board that has all you need – both FPGA and the CPU?
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514162.67/warc/CC-MAIN-20181021161035-20181021182535-00460.warc.gz
CC-MAIN-2018-43
1,978
2
https://bugzilla.redhat.com/show_bug.cgi?id=27058
code
This box has two off-board disk controllers (Initio SCSI and Promise ATA, both with a combination of disks and CD-ROMs), and anaconda fails to create a lilo.conf that can successfully boot the system. The Promise card is the boot device, as it's first in PCI order and gets assigned BIOS drives C and D. However, anaconda sets boot=/dev/sda (E:) in lilo.conf. Incidentally, the kernel too lists sda first in /proc/partitions, which is wrong. Changing the boot order in the BIOS doesn't seem to affect this ordering. After installation, the system can't be booted, as there aren't any active partitions and anaconda has installed LILO on the wrong MBR. What is the device name(s) for the drives on the Promise card? /dev/hdb - CD-ROM on primary slave (on-board controller, VIA MVP3) /dev/hde - IBM Deskstar on primary master (Promise) /dev/hdg - IBM Deskstar on secondary master (Promise) /dev/sda - Seagate on ID0 (boot) of Initio 9100UW /dev/scd0 - CD-RW on Initio What are the partitions/mount points you specified? Thanks I will look at this. This is something we will have to address in the future. There is not currently a mechanism to determine which drive is 0x80 as far as the BIOS is concerned. Adding a UI interface to allow the user is not an option at this time because we have frozen the UI. For future releases, you will be able to change the order of the drives if our guess is not correct
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257432.60/warc/CC-MAIN-20190523224154-20190524010154-00448.warc.gz
CC-MAIN-2019-22
1,404
23
https://evlabs.io/
code
Data visualization in Python Learn how to extract visual knowledge from complex data for decision-making with Python. - Master the main visualization libraries in Python for Data Science. - Discover and extract the most important knowledge from complex data. - Learn to build web interfaces with charts to present important results to a wider audience. Master a basic data science skill.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335424.32/warc/CC-MAIN-20220930020521-20220930050521-00322.warc.gz
CC-MAIN-2022-40
387
6
https://slideslive.com/38930959/credit-assignment-metalearning-in-a-single-lifelong-trial-the-deepest-kind-of-deep-rl
code
Jul 18, 2020 Most current artificial reinforcement learning (RL) agents are trained under the assumption of repeatable trials, and are reset at the beginning of each trial. Humans, however, are never reset. Instead, they are allowed to discover computable patterns across trials, e.g.: in every third trial, go left to obtain reward, otherwise go right. General RL (sometimes called AGI) must assume a single lifelong trial which may or may not include identifiable sub-trials. General RL must also explicitly take into account that policy changes in early life may affect properties of later sub-trials and policy changes. In particular, General RL must take into account recursively that early meta-meta-learning is setting the stage for later meta-learning which is setting the stage for later learning etc. Most popular RL mechanisms, however, ignore such lifelong credit assignment chains. Exceptions are the success story algorithm (1990s), AIXI (2000s), and the mathematically optimal Gödel Machine (2003). The International Conference on Machine Learning (ICML) is the premier gathering of professionals dedicated to the advancement of the branch of artificial intelligence known as machine learning. ICML is globally renowned for presenting and publishing cutting-edge research on all aspects of machine learning used in closely related areas like artificial intelligence, statistics and data science, as well as important application areas such as machine vision, computational biology, speech recognition, and robotics. ICML is one of the fastest growing artificial intelligence conferences in the world. Participants at ICML span a wide range of backgrounds, from academic and industrial researchers, to entrepreneurs and engineers, to graduate students and postdocs. Total of 0 viewers voted for saving the presentation to eternal vault which is 0.0% Presentations on similar topic, category or speaker
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104514861.81/warc/CC-MAIN-20220705053147-20220705083147-00269.warc.gz
CC-MAIN-2022-27
1,916
5
https://www.myminifactory.com/object/3d-print-608-bar-spinner-with-speed-holes-28758
code
Just print it out and add three 608 bearings; one for the center spinner, and two for added mass around the sides! We've included two .STL files, one at standard scale, and one at 101% scale. Depending on your printer, you may need to adjust the scaling slightly to get a good fit between spinner and bearing. Feel free to experiment, and have fun printing! Buy from our Etsy here: https://www.etsy.com/listing/500436454/3d-printed-608-bar-spinner-with-speed Check out our YouTube channel for build videos and other cool stuff! https://www.youtube.com/c/3dcentralva This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250610919.33/warc/CC-MAIN-20200123131001-20200123160001-00306.warc.gz
CC-MAIN-2020-05
662
5
https://support.microsoft.com/en-us/kb/2737560
code
When you try to configure the first Windows Server 2012 domain controller in an existing Windows Server 2003, Windows Server 2008, or Windows Server 2008 R2 forest, the prerequisites check fails, and you receive the following error message: Verification of prerequisites for Active Directory preparation failed. Unable to perform Exchange schema conflict check for domain adatum.com. Exception: The RPC server is unavailable. Adprep could not retrieve data from the server 2008r2-01.adatum.com through Windows Management Instrumentation (WMI). Additionally, the C:\windows\debug\adprep\logs\<date/time>-test\adprep.log file shows the following: [2012/07/24:09:50:21.734]Adprep failed while performing Exchange schema check.[Status/Consequence]The Active Directory Domain Services schema is not upgraded.[User Action]Check the log file ADPrep.log in the C:\Windows\debug\adprep\logs\20120724094831-test directory for possible cause of failure.[2012/07/24:09:50:21.734]Adprep encountered a Win32 error. Error code: 0x6ba Error message: The RPC server is unavailable.DSID Info:DSID: 0x1810012aHRESULT = 0x800706baNT BUILD: 8517 The existing domain controller or controllers are missing the SeServiceLogonRight ("Logon as a service") right for the NETWORK SERVICE account. The WMI and DCOM protocols are blocked between the computer that is running Windows Server 2012 and the existing domain controller or controllers. Add the NETWORK SERVICE as part of the SeServiceLogonRight ("Logon as a service") right back to the Default Domain Controllers policy. By default, the service exists there in Windows Server 2003 domains. Make sure that no other policy is removing the service if the service is already present in the Default Domain Controllers policy. By default, the service is set by local security policy on all servers in Windows Server 2008 and later versions and is no longer part of Default Domain Controllers policy. Examine Windows Firewall on the existing domain controllers, and make sure that the following rules are enabled. (By default, these rules are enabled on domain controllers.) Windows Management Instrumentation (WMI-In) Windows Management Instrumentation (DCOM-In) Windows Management Instrumentation (Async-In) If these rules are not enabled, enable them, and then retest. If domain controller configuration is still failing the prerequisite test, examine any third-party software firewalls or endpoint protection software on the existing domain controllers and firewalls between the existing domain controllers and the domain controllers that are running Windows Server 2012. Make sure that their rules enable the following: TCP/IP - port 135 - RPC/DCOM/WMI endpoint mapper (RpcSs) TCP/IP - all ports - Asynchronous callback WMI client (Unsecapp) TCP/IP - all ports - Windows Management Instrumentation service (Wmimgmt) If domain controller configuration is still failing, use double-sided network captures between the existing and new domain controllers to determine where the traffic is dropping, and consider contacting Microsoft Customer Support. This issue also occurs if you are running Windows Server 2012. The adprep.exe /forestprep command also runs prerequisite checking. The missing SeServiceLogonRight right issue can be caused when administrators have previously run the dcpromo /forceremoval command in Windows Server 2003.
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982911825.82/warc/CC-MAIN-20160823200831-00104-ip-10-153-172-175.ec2.internal.warc.gz
CC-MAIN-2016-36
3,361
19
http://mylinuxsoftware.com/linux_mail_server_software.html
code
Software that Will Make Your Penguin Happy ... Linux Software -> Servers -> Mail Servers Sendmail implements a general purpose internetwork mail routing facility under Linux and other UNIX operating systems. It is not tied to any one transport protocol. Size: 2.0 MB - Software License: Sendmail License Postfix was started as an alternative to the widely-used Sendmail software. It attempts to be fast, easy to administer, and secure. Size: 3.2 MB - Software License: IBM Public License The Apache JAMES Project delivers a rich set of open source modules and libraries related to internet mail and news which build into an advanced enterprise mail server. Size: 7.3 MB - Software License: Apache License Exim is a message transfer agent (MTA) for Linux. In style it is similar to Smail 3, but its facilities are more general. It is free software under the GPL. Size: 1.5 MB - Software License: GPL Dovecot is an open source IMAP and POP3 server for Linux/UNIX-like systems, written with security primarily in mind. Size: 2.6 MB - Software License: Mostly MIT and LGPL Cyrus is a highly scalable enterprise mail system designed for use in enterprise environments of various sizes using standards based technologies. Size: 2.2 MB - Software License: original BSD license The Courier mail transfer agent is an integrated mail/groupware server based on open protocols, such as ESMTP, IMAP, POP3, LDAP, SSL, and HTTP. Size: 6.8 MB - Software License: GPL Qpopper enables a UNIX/Linux machine to act as a Post Office Protocol version 3 (POP) server. Size: 2.3 MB - Software License: BSD-Style Back to Linux Server Software © MyLinuxSoftware.com 2010 Do you like this website? Why not it to others...
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257939.82/warc/CC-MAIN-20190525084658-20190525110658-00245.warc.gz
CC-MAIN-2019-22
1,695
22
https://studenttech.berkeley.edu/student-it-jobs-opportunities/get-involved
code
FEMTech’s mission is to promote gender diversity in the tech industry and inspire women and underrepresented minorities from all majors to excel in technology careers. Lowering barriers in participating in robotics by offering hands-on workshops, introducing resources and opportunities on campus, and supporting personal projects and competition teams. DiversaTech is a student run technology consulting organization at UC Berkeley. We combine engineering, design, and business principles to create dynamic recommendations and strategies. Events and Competitions Learn about events and competitions on campus (some with cash prizes!) that offer students the opportunity to apply technology to real world situations
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945288.47/warc/CC-MAIN-20230324180032-20230324210032-00358.warc.gz
CC-MAIN-2023-14
717
5
https://reactiongaming.us/community/threads/about-redacted-support.1020/
code
If you are seeking support for the Redacted T6 LAN client crashes and errors, please do the following BEFORE you post a support topic: Verify your file cache on Steam. HOW? Post a screenshot of your game folder. If you are using a pirated copy, do not post a support topic. Pirated versions of the Black Ops II (including Skidrow and nosTEAM) do not work well with Redacted. You are on your own. If you don't provide the above with your support topic, do no expect help.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948599156.77/warc/CC-MAIN-20171217230057-20171218012057-00029.warc.gz
CC-MAIN-2017-51
470
1
https://elizabethdoran.com/research-2/research/
code
There are more than 7 billion people on the planet. We all need access to food, water, air and materials to provide shelter and well-being. How do we collectively balance the global ambitions of well-being, provision and equitable allocation of resources in an era of globalization and change? Attention to these challenges is coming together under the banner of sustainability science, an interdisciplinary ambition for basic science and applied problem solving. A uniformly agreed upon important pursuit, the consensus within the field itself is that the field is poorly defined. One track of my research investigates the theoretical underpinnings of this maturing discipline, as well as the progress toward its ambition of enabling a sustainable future.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945030.59/warc/CC-MAIN-20230323065609-20230323095609-00509.warc.gz
CC-MAIN-2023-14
756
1
https://webapps.stackexchange.com/questions/153190/how-to-let-view-only-users-expand-grouped-rows-in-google-sheets
code
I am sharing my Google Sheet as "anyone with the link can view." The spreadsheet contains grouped rows. It appears that viewers cannot click the plus sign icons to show rows that were hidden by grouping them. How can the viewers expand the grouped rows? Users who have view-only access to a spreadsheet cannot modify it, and expanding rows counts as a modification, so it simply does not work. One workaround is to share the spreadsheet as "anyone with link can edit", and protect individual sheets or ranges within the spreadsheet as required. If you are protecting full sheets, you will have to use the Show warning only option because otherwise the sheet will be completely view-only and row grouping cannot be used. Another alternative is to use filter views instead of row grouping to hide and show rows. This requires that some column in the dataset contains tags that let a filter view decide what to show and what not. See the Filter views example spreadsheet for an illustration.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476137.72/warc/CC-MAIN-20240302215752-20240303005752-00004.warc.gz
CC-MAIN-2024-10
988
4
https://gdg.community.dev/events/details/google-gdg-cloud-thessaloniki-presents-iwd23-women-techmakers-greece/
code
💥 Are you interested in #tech? The #IWDGreece2023 region-wide virtual (ONLINE) tech summit is just around the corner. ❗ It's a WEBINAR (online) via Facebook and YouTube only. 🔴 Facebook LIVE: https://www.facebook.com/womentechmakersGr 🔴 WTM Greece | YouTube LIVE: https://bit.ly/youtubewtmgr 🔴 GDG Athens | YouTube LIVE: https://bit.ly/youtube_gdgathens 🗓 Event's AGENDA 🔸 11:30 - 11:40 Welcome to IWDGreece2023 🔸 11:40 - 12:20 The Power of Design: Creating Meaningful Products for Today's World ▪ Marietta Lazana - Product Designer 🔸 12:20 - 13:00 Cybersecurity for Industrial Control Systems: Let's hack a power plant! ▪ Soultana Ellinidou - Cyber Security Manager 🔸 13:00 - 13:10 - Break 🔸 13:10 - 13:50 Accessibility Testing: Tips and Tricks ▪ Kate Vyshydkevich - Senior QA Engineer 🔸 13:50 - 14:20 Fireside Chat: Equal, but not the same ▪ Melpo Pittara - PhD Candidate of the Department of AI at the University of Groningen, Netherlands ▪ Maria Stylianoy - Engineering Manager at Marshmallow 🔸14:15 - 14:20 Closing - Thank You!
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656675.90/warc/CC-MAIN-20230609100535-20230609130535-00498.warc.gz
CC-MAIN-2023-23
1,080
24
https://etutorials.org/Microsoft+Products/microsoft+windows+server+2003+terminal+services/Chapter+8+Security+and+Stability/Network+Access+Control/
code
Now that we have taken a closer look at connection options and Terminal Services clients, let us focus on the network connection itself. What are the basic options for making the data transfer via RDP even more secure than with internal encryption alone? A common means of controlling terminal server access is through a firewall—for example, Microsoft Internet Security and Acceleration Server (ISA Server). A firewall controls data traffic between computers in an unsafe zone and in a target system, and it defines source IP addresses, source ports, target IP addresses, and target ports. These are used to establish filter rules that control data traffic. If, for instance, you want to make a terminal server available from the Internet without exposing the terminal server to direct accesses, the firewall could be set up in the following configuration: Source IP address: All (that is, each IP address) Source port: All ports above 1024 Target IP address: IP address of the terminal server Target port: 3389, the RDP port When a terminal server session is established, the client uses any local port over 1024. The client uses that port and the target IP address to connect to the target port (3389). All other ports in the direction of the terminal server should be blocked to avoid attacks on the ports of other services. On Windows Server 2003 with Terminal Services activated in application mode, there are fewer ports than on any of its predecessors, which reduces the risk significantly. However, external communication should be allowed only through that one channel. Nevertheless, a firewall does not provide complete protection! It only reduces the scope for attack. If a Windows service on a terminal server has a weakness, it could still be exploited despite the firewall. To avoid this effectively, additional authentication on the firewall can be required from the user attempting access—for example, by using RSA SecurID. Only after successful authentication does the port open up for a user session to be established. This gives the terminal server much more protection because it is invisible to anonymous users on the Internet. The terminal server is thus no longer a direct target for attack. Regrettably, this method is not suitable for all application scenarios. An advanced method of protecting terminal servers is to use a virtual private network (VPN). A VPN is the extension of a private network into the normally unsafe public network connections or the Internet. However, data can be exchanged between computers via the public network or the Internet if a virtual, secured point- to-point connection is established. This secure connection is also called a tunnel. There are several solutions for VPNs, either hardware-based (for example, by Cisco or Nokia) or software-based (for example, Smartgate by V-One or mVPN by PortWise). Hardware-based VPNs often work with firewalls; they require a special software to be installed on the local client. Software-based VPNs normally use port 443 (HTTPS). This port is open under most firewalls because it is needed for access to secure pages on the Web. The following two examples describe possible scenarios where VPNs are used with terminal servers. In this scenario, the terminal server is behind a firewall. If a user wants to connect to the server, he or she needs to pass through authentication at the VPN server (firewall) first. The software installed on the client connects to the firewall and in this way constructs a tunnel that is strictly limited to the client session. The data stream in the tunnel is often encrypted as well. Depending on the VPN server settings, the user might have access to the entire internal network or only to certain IP addresses and services. Terminal server access is transparent. Users do not notice that the server is not physically part of the local network. In this scenario, the terminal server and VPN server are behind a firewall. If an external client user wants to access the internal network with the terminal server, the user logs on to, for instance, a Web server with the relevant user name/password, smart card, or another authentication method. If the attempt is successful, tunnel software is downloaded in the form of an ActiveX control or Java applet and is locally installed on the client. The tunnel software then uses port 443 (HTTPS) to connect to the VPN server through the firewall, thereby establishing an encrypted tunnel. The tunnel software modifies the communication path so that the Terminal Services client no longer communicates directly with the terminal server, but with the local tunnel software. The tunnel software packs the data stream in a HTTPS tunnel and directs it to the VPN server. The VPN server unpacks the data stream and establishes a connection to the terminal server. In this way, communication takes place through several stations. This method prevents direct terminal server access and guarantees that the identity of the user session remains the same. One possible bottleneck is the VPN server, specifically when it needs to manage all tunnels for many simultaneous user sessions. Software-based solutions can usually be fine-tuned in terms of configuration and integrated into existing directory services. Depending on the user role, target systems can be allowed or blocked at the server, services, or user levels. As the tunnel software can be installed on the client later, this solution is universally applicable. For example, it is possible to access applications on the corporate network from an Internet caf? or Internet terminal at the airport, even though the target device does not usually allow installation of a VPN client. When looking at a VPN in detail, do not forget that secure communication requires a secure client. Software and hardware can be installed on a terminal in an Internet caf? that logs user entries (such as keyboard key strokes or mouse moves). No VPN concept can protect these logs from unauthorized evaluation. A public key infrastructure (PKI) comprises the policies, standards, and software relating to certificates, and public and private keys. It includes a system of digital X.509 certificates, certification authorities, and other registration authorities that verify and confirm the validity of individual origin and destination points during an electronic transaction. If required, the Windows Server 2003 certification services and certification management tools can provide an independent public key infrastructure. This would be the basis for logon using smart cards, client authentication via Secure Socket Layer (SSL), or Internet Protocol Security (IPSec). Windows Server 2003 makes it possible to log on to a terminal server session using a smart card. Two conditions must apply: The client must recognize the smart card (Windows XP, Windows 2000, and Windows CE .NET), and smart card logon must be enabled on the server. All this requires a public key infrastructure, either by Microsoft or a third party. For a third-party PKI, it is advisable to verify that the relevant root certificates are known in the Active Directory. A Microsoft CA (Certificate Authority) is already integrated in the Active Directory and does not require this verification. However, it is still necessary to integrate the relevant certificate templates for smart card logon into the certification point so that valid certificates can be generated for smart cards. Secure Socket Layer (SSL) is a suggested and open standard for setting up a secure communication channel that aims to prevent unauthorized persons from intercepting critical information. This service is particularly suitable for transactions on the Web, but it can be used for other services as well. An X.509 certificate forms the basis for the transmission of user, device, or service identity. The public key for encryption of the data transmitted is linked to that certificate. The integrated encryption of the RDP protocol is very similar to the SSL concepts. Another option for defending your system against network attacks is Internet Protocol Security (IPSec). IPSec protects the contents of IP packages through encryption, package filtering, and enforcing trusted communication. All this is achieved through encryption technologies that are based on security services, security protocols, and dynamic administration of public and private keys. IPSec implementation comes with Windows 2000, Windows XP, and the Windows Server 2003 product family, based on established standards. IPSec is integrated through certification services and the Active Directory, and it uses Kerberos V5 for mutual authentication of the computers involved. If the IPSec data traffic is directed through a firewall, you might need to perform additional configuration tasks. In addition to encrypting and generating checksums, IPSec offers several filters that are relevant to Terminal Services. These filters serve to control data traffic—for example, allowing only certain IP addresses or subnets to communicate with the server. Furthermore, you can determine ports for exclusive server communication. In this way, you can define rules that allow communication with the server only from a certain subnet via port 3389. This could be useful for remote server administration using Terminal Services. It is, of course, also possible to determine dedicated clients that access a terminal server running in application mode. If the clients are set up in a certain subnet and if communication with the terminal server is allowed from there only, illegal client connections are almost impossible. IPSec is an excellent alternative to the integrated encryption of the RDP protocol. RDP encryption uses an RC4 library by RSA. This library is based on the Secure Socket Layer concepts, but it is not an official industry standard. IPSec, on the other hand, is used in many companies and is often a preferred corporate solution because it is an industry standard.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476137.72/warc/CC-MAIN-20240302215752-20240303005752-00358.warc.gz
CC-MAIN-2024-10
10,002
24
https://doc.batch.com/cordova/legacy/1x-migration/
code
Batch's cordova plugin 2.0.0 update being a major version, it brings some breaking change to existing implementations: - batch.push.setGCMSenderId() has been removed. Android now uses FCM, which requires you to add a google-services.jsonfile to your project. More info here. - "setCanUseAndroidID" has been removed from the config object. You can safely leave the key, but it will be ignored. For any other supported API use cases, your code requires no change. If you've previously used batch.userProfile, you can easily use Batch User. You will still be able to set a custom region, language or identifier with the new API. The main difference between Batch User and BatchUserProfile is that you'll now be required to use an editor object in order to make changes, and then save them. This transactional behaviour brings additional thread-safety and better performance. That way, what used to be: // Use the user profile to set custom language and data batch.userProfile.setLanguage("en"); // Language must be 2 chars, lowercase, ISO 639 formatted batch.userProfile.setRegion("US"); // Region must be 2 chars, uppercase, ISO 3166 formatted batch.userProfile.setCustomID("john.doe"); will become this: batch.user.getEditor() .setLanguage("en") // Language must be 2 chars, lowercase, ISO 639 formatted .setRegion("US") // Region must be 2 chars, uppercase, ISO 3166 formatted .setIdentifier("john.doe") .save(); // Don't forget to save the changes! batch.userProfileis now deprecated, but will continue to work. We still suggest you migrate in the near future, so you can take advantage of the new capabilities.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511406.34/warc/CC-MAIN-20231004184208-20231004214208-00328.warc.gz
CC-MAIN-2023-40
1,612
14
https://supportforums.cisco.com/t5/other-security-subjects/achieving-isp-redundancy-over-an-ipsec-vpn-connection/td-p/568960
code
Achieving ISP redundancy over an IPSEC VPN connection Recently, we've been experiencing a number of connectivity problems with our ADSL connected remote sites. Our set-up uses a Cisco 837 at the remote site, with an IPSEC tunnel built terminating on our PIX515E at our Head Office. At the remote sites, we would like to get a 2nd ADSL link from an alternative ISP in the hope that a) we could load balance over the links and b) the 2nd link would allow us some resilience and could takeover should the other link fail. The question is - how can we achieve this with minimal disruption and with as little investment in additional hardware as possible? Could we buy a 2nd Cisco 837 for the 2nd ADSL link and build an IPSEC tunnel from the PIX to it? We could then use HSRP at the remote site and that would allow one link to take over from the other if it went down. However, how would our PIX know to then route the traffic over the 2nd connection? And could we perform any load balancing in this set-up? Or maybe we could buy eg a Cisco 2800 series router with 2 x ADSL WIC cards - one to each ISP. Again, how could we achieve load balancing and failover with this set-up? Or does anyone have any other recommendations/suggestions on how to achieve this? Re: Achieving ISP redundancy over an IPSEC VPN connection Ok, thanks - so I can't achieve load balancing but I could achieve automatic failover to a 2nd ADSL link? Would this set-up work for automatic failover: At remote site, 2 x Cisco 837s, with one connected to ADSL link for ISP A and the other connected to ADSL link for ISP B. I could run HSRP between the Cisco 837s with tracking on the ATM interface to change priority should the ADSL link on ISP A go down. So, any change in the ADSL link being used would be transparent to the users on the remote office LAN - they would use the same default gateway (i.e. the virtual HSRP address) Then on my head office PIX, i configure everything as previously EXCEPT i now add the peer address of the 2nd Cisco 837 router into my crypto map statement? So, how does the PIX decide which peer takes priority? Is it just the first one listed in the config? And, should that peer fail, how long would it take to failover to the other peer? BenefitsDocumentationPrerequisiteImage Download LinksLimitationsSupported PlatformsLicense RequirementsTopologyStep-By-Step ConfigurationConfigure Virtual ServiceActivate the virtual service and configure guest IPsConfiguring UTD (Service Plane)Configurin... Login to the FXOS chassis manager. Direct your browser to https://hostname/, and log-in using the user-name and password. Go to Help > About and check the current version: Check the current version availa... We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6. In Syslog I also se...
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125946578.68/warc/CC-MAIN-20180424080851-20180424100851-00366.warc.gz
CC-MAIN-2018-17
2,962
23
https://forums.cumulusnetworks.com/cumulus-vx-230884/mac-table-overflow-7738610
code
Hello, I'm try to enforce Cumulus VX device work in broadcast mode by the overflowing its mac-table. In plain words I try to carry out the mac-table overflow attack. I have generated over 10 000 000 of packets with different mac-sources, but nothing in result. Mac-table is enough big and unreadable, the device works with too big latency, but I want to see another effect. What's problem? Best answer by Dave Olson With no switch ASIC in VX, the MAC table is limited by available memory in the kernel. I'm not aware of a way to set a limit on that. There may be some other way to do whatever you are trying to do, but you haven't described what you want, only the issue with the MAC table.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347432521.57/warc/CC-MAIN-20200603081823-20200603111823-00137.warc.gz
CC-MAIN-2020-24
690
5
https://gitter.im/alibaba/dubbo/archives/2018/01/08
code
These are chat archives for alibaba/dubbo <dubbo:registry default="true" /> @marksnoopy To be honest, that may take quite a while to support, currently, we've got some requirements with higher priority. Welcome to contribute or join our team in alibaba. <bean />in any file. online/offlinemay help u with sth. useful, for example: graceful shutdown, delay register, publish/unpublish at runtime or publish in batches.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912205600.75/warc/CC-MAIN-20190326180238-20190326202238-00442.warc.gz
CC-MAIN-2019-13
417
6
https://www.icrag-centre.org/people/somayebayat.html
code
- PhD Researcher Somaye Bayat received a B.Sc. (2013) in Mining Engineering from the Shahid Bahonar University of Kerman, an M.Sc. (2017) in geophysics from Tehran University in Iran, and an M.Sc. (2022) from the National University of Ireland, Galway and the Dublin Institute for Advanced Studies (DIAS). Now she is a Ph.D. student at the National University of Ireland, Galway, and DIAS under the supervision of Dr. Tiernan Henry. Groundwater resources make up about 16 percent of Ireland’s public water supply, but the nature and extent of the resource distribution at depth (>100m) is poorly understood. The broad context of project is to develop a better understanding of deep groundwater resources in Irish limestones using existing seismic data sets. - Postgraduate Researcher - Earth System Change - Connected Waters
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.30/warc/CC-MAIN-20230924191454-20230924221454-00108.warc.gz
CC-MAIN-2023-40
826
6
http://maxspywareremover.com/what-is/what-is-lcj-error.php
code
Are there textual deviations between the Dead Sea Scrolls and the Old Testament? I am assuming you are getting a reference to the BandClient in a connection method but are not storing that reference at a class level. BUILD FAILED C:\ddci_eclipse\oa-lcj-workspace\com.ddci.openarbor.applicat ion\build-product.xml:91: The following error occurred while executing this line: C:\ddci_eclipse\oa-lcj-workspace\openarbor.pde.build\build-p de.xml:58: The following error occurred while executing this line: C:\Eclipse3.4.2\eclipse\plugins\org.eclipse.pde.build_3.4.1. How are you storing your pointer to it? Finding maximum of added fields How does template argument deduction work when an overloaded function is involved as an argument? The next button was running 'tiles = await bandClient.TileManager.GetTilesAsync();' –lcj Feb 23 at 3:52 add a comment| Your Answer draft saved draft discarded Sign up or log in Sign up R34x_v20081217\scripts\productBuild\allElements.xml:10: > The following error occurred while executing this line: > C:\Eclipse3.4.2\eclipse\plugins\org.eclipse.pde.build_3.4.1. PolakMIT Press, 4 Μαρ 2011 - 372 σελίδες 0 Κριτικέςhttps://books.google.gr/books/about/Quantum_Computing.html?hl=el&id=iYX6AQAAQBAJThe combination of two of the twentieth century's most influential and revolutionary scientific theories, information theory and quantum mechanics, gave rise to Have fun in college, Jackson. I would make sure to capture all exceptions and see if the problem is being raised. R34x_v20081217\scripts\genericTargets.xml:165: The following error occurred while executing this line: c:\build\openArbor\temp\eclipse.build\package.org.eclipse.pd e.build.container.feature.all.xml:25: The following error occurred while executing this line: c:\build\openArbor\temp\eclipse.build\package.org.eclipse.pd e.build.container.feature.all.xml:32: An error occurred when calling generator. Rieffel, Wolfgang H. R34x_v20081217\scripts\productBuild\productBuild.xml:31: > The following error occurred while executing this line: > C:\Eclipse3.4.2\eclipse\plugins\org.eclipse.pde.build_3.4.1. Using "están" vs "estás" when refering to "you" Trick or Treat polyglot Output a googol copies of a string Simply Riddleculous Subtracting empty set from another English fellow vs Arabic fellah R34x_v20081217\scripts\productBuild\allElements.xml:10: The following error occurred while executing this line: C:\Eclipse3.4.2\eclipse\plugins\org.eclipse.pde.build_3.4.1. Without the actual exception type and message, we can only guess at what the problem might be. –Phil Hoff -- MSFT Feb 1 at 17:14 add a comment| 1 Answer 1 R34x_v20081217\scripts\genericTargets.xml:165: > The following error occurred while executing this line: > c:\build\openArbor\temp\eclipse.build\package.org.eclipse.pd e.build.container.feature.all.xml:25: > The following error occurred while executing this line: > c:\build\openArbor\temp\eclipse.build\package.org.eclipse.pd e.build.container.feature.all.xml:32: > An error occurred when calling Page generated in 0.03509 seconds .:: Contact :: Home ::. If you have installed the sample tiles with the sample apps then make sure you are using a GUID that is different from the sample apps. http://www.papermag.com/amy-schumer-lights-camera-jackson-owned-1559835721.html Powered by: FUDforum 3.0.2.Copyright ©2001-2010 FUDforum Bulletin Board Software This comprehensive introduction to the field offers a thorough exposition of quantum computing and the underlying concepts of quantum physics, explaining all the relevant mathematics and offering numerous examples. Maximum number of tiles are installed on the band. The best thing here is to generate your own GUID for your tile. share|improve this answer answered Feb 1 at 16:18 Mark Thistle 1,7111221 I generated a new GUID so I don't think that's the problem. Not the answer you're looking for? https://books.google.gr/books?id=iYX6AQAAQBAJ&pg=PA268&lpg=PA268&dq=what+is+lcj+error&source=bl&ots=9oKAgfN1-Y&sig=w02DPHRAlITfuOQPpp-Wkd7XbXI&hl=en&sa=X&ved=0ahUKEwib4I-oku_PAhXmJJoKHVq-DBYQ6AEIRDAG It would show up in Visual Studio when I hit the "await bandClient.TileManager.AddTileAsync(tile);" line. –lcj Feb 1 at 15:34 What you've pasted is not an error message but the Rieffel, Wolfgang H. Browse other questions tagged microsoft-band or ask your own question. Can anywone help me resolve this issue? R34x_v20081217\scripts\build.xml:102: The following error occurred while executing this line: C:\ddci_eclipse\oa-lcj-workspace\openarbor.pde.build\customT argets.xml:10: The following error occurred while executing this line: C:\Eclipse3.4.2\eclipse\plugins\org.eclipse.pde.build_3.4.1. Generated Tue, 01 Nov 2016 10:52:45 GMT by s_hp90 (squid/3.5.20) Report message to a moderator Re: PDE build error [message #601367 is a reply to message #64901] Tue, 08 September 2009 20:11 Lars Vogel Unavailable until 15 August This means that the cache was not able to resolve the hostname presented in the URL. Unknown symbol on schematic (Circle with "M" underlined) Puzzler - which spacecraft(s) (actually) incorporated wooden structural elements? If so, are they within the recommended sizes? How the equipment works? Rieffel,Wolfgang H. CV7 Transducers communicate between themselves delivering four independent measures while head wind measured vectors are preferably used for calculations. Join them; it only takes a minute: Sign up error creating tile for microsoft-band up vote 0 down vote favorite I have been getting errors when trying to create a tile Please try the request again. R34x_v20081217\scripts\productBuild\productBuild.xml:31: The following error occurred while executing this line: C:\Eclipse3.4.2\eclipse\plugins\org.eclipse.pde.build_3.4.1. Near the end, look for a "Caused by" nested exception coming out of " org.eclipse.equinox.internal.p2.metadata.generator.ant.Gener atorTask.execute " -Andrew Lisa Jett wrote: > I have tried to add the following lines to PolakΈκδοσηεικονογραφημένηΕκδότηςMIT Press, 2011ISBN0262015064, 9780262015066Μέγεθος372 σελίδες  Εξαγωγή αναφοράςBiBTeXEndNoteRefManΣχετικά με τα Βιβλία Google - Πολιτική Απορρήτου - ΌροιΠαροχήςΥπηρεσιών - Πληροφορίες για Εκδότες - Αναφορά προβλήματος - Βοήθεια - Χάρτης ιστότοπου - GoogleΑρχική σελίδα current Your cache administrator is webmaster. One button connects to it. I tried with multiple GUIDs. ERROR The requested URL could not be retrieved The following error was encountered while trying to retrieve the URL: http://rlwjdt.myfirewall.org/R-Hv Unable to determine IP address from host name rlwjdt.myfirewall.org The DNS How to grep rows that have certain value in a specific column? The effect of an inclination of the wind sensor is partially corrected due to the shape given by the space. With its careful development of concepts and thorough explanations, the book makes quantum computing accessible to students and professionals in mathematics, computer science, and engineering. This method gives a sensibility of 0.12 m/s (0.25 knots), a dynamic of 40 m/s (80 knots) and an excellent linearity. R34x_v20081217\scripts\build.xml:102: > The following error occurred while executing this line: > C:\ddci_eclipse\oa-lcj-workspace\openarbor.pde.build\customT argets.xml:10: > The following error occurred while executing this line: > C:\Eclipse3.4.2\eclipse\plugins\org.eclipse.pde.build_3.4.1. R34x_v20081217\scripts\productBuild\productBuild.xml:31: > The following error occurred while executing this line: > C:\Eclipse3.4.2\eclipse\plugins\org.eclipse.pde.build_3.4.1. asked 9 months ago viewed 44 times active 9 months ago Blog Stack Overflow Podcast #93 - A Very Spolsky Halloween Special Related 6Displaying an image on Microsoft Band0Creating paged-scrolling tile Quantum computing is not about changing the physical substrate on which computation is done from classical to quantum but about changing the notion of computation itself, at the most basic level. Object name: 'BandClient'. –lcj Feb 3 at 2:31 Sounds like your bandClient object has gone out of scope.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211146.17/warc/CC-MAIN-20180816171947-20180816191947-00430.warc.gz
CC-MAIN-2018-34
8,258
14
http://stackoverflow.com/questions/161676/home-end-keys-in-zsh-dont-work-with-putty/10377906
code
I found it's a combination: The ZSH developers do not think that ZSH should define the actions of the Home, End, Del, ... keys. Debian and Ubuntu fix this by defining the normal actions the average user would expect in the global /etc/zsh/zshrc file. I've pasted the relevant code here: http://pastebin.com/f1d9dd5c6 (it get's messed up when I paste it as code in Stack Overflow). It is the same on Debian and Ubuntu. So, if you are connecting to a Debian or Ubuntu box, you don't have to do anything. Everything should work automagically (if not, see below). But... if you are connecting to another box (e.g. FreeBSD), their might be no user friendly default zshrc. The solution is of course to add the lines from the Debian/Ubuntu zshrc to your own .zshrc. Putty sends xterm as terminal type to the remote host. But messes up somewhere and doesn't send the correct control codes for Home, End, ... that one would expect from an xterm. Or an xterm terminal isn't expected to send those or whatever... (Del key does work in xterm however, if you configure it in ZSH). Also notice that your NUM pad keys act funny in Vim for example with xterm terminal. The solution is to configure Putty to send another terminal type. I've tried xterm-color and linux. xterm-color fixed the Home/End problem, but the NUM pad was still funny. Setting it to 'linux' fixed both problems. You can set terminal type in Putty under Connection -> Data. Do not be tempted to set your terminal type in your .zshrc with 'export TERM=linux', that is just wrong. The terminal type should be specified by your terminal app. So that if, for example, you connect from a Mac box with a Mac SSH client it can set it's own terminal type. Notice that TERM specifies your terminal type and has nothing to do with the host you are connecting to. I can set my terminal type to linux in Putty and connect to FreeBSD servers without problems. So, fix both these things and you should be fine :)
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131294307.1/warc/CC-MAIN-20150323172134-00165-ip-10-168-14-71.ec2.internal.warc.gz
CC-MAIN-2015-14
1,954
10
https://www.prometheanai.com/
code
That Builds Virtual Worlds Promethean AI is world's first Artificial Intelligence that works together with Artists, assists them in the process of building virtual worlds, helps creative problem solving by suggesting ideas and takes on a lot of mundane and non-creative work, so You can focus on what's important. All while learning from and adapting to individual tastes of every single Artist. We are beyond excited to announce that an early access version of Promethean AI is now available. It is free for non-commercial use and has additional licensing options for projects with below than $100k/year in financing (Indie) and above (professional). Basics Guide Videos Use the guide videos below to quickly familiarize yourself with Promethean AI functionality. Please remember that not all features are available in the free version Want to make Art like this? At Promethean AI our goal is not to solve technical problems or teach a computer how a chair relates to a desk. Our goal is to help everyone be a better artist. That is why we are excited to offer an Environment Art Internship program. We are trading our vast experience in building virtual worlds for invaluable insight into making "improving as an artist" a better, faster and more fulfilling experience for everyone. Apply below! Who is building it and Why After years of building most sophisticated and celebrated interactive entertainment in the world, it became apparent to Andrew Maximov, Technical Art Director at Naughty Dog Inc. (Sony Interactive Entertainment) that we need to fundamentally rethink creative technology. The road we were on was not only falling far short of creators needs, audience appetites and hardware constraints, but also has absolutely no scalable way of catching up with exponentially growing demand. Not to mention being exclusionary to artists. So we put together an amazing team and got to work (members of the Promethean AI team have contributed to the best in technology and entertainment) Having worked side by side with some of the best artists in the world we've been consistently amazed by their passion for their craft and we wanted to apply the same fervor towards the sole purpose of taking care of creative people. Because the world needs more of that. Our goal is to pass on the torch of creativity to anyone who ever had something to say. To empower creators and stories impossible otherwise. To give every artist the power of an army and help everyone go further and faster. All using the latest in our proprietary cutting edge machine learning technology. Game industry veteran, former Technical Art Director for Sony Interactive, Andrew pushed cutting edge technology that powered the biggest entertainment franchises in the world. Develop and Forbes magazine's 30 under 30, artist, programmer, consultant, entrepreneur and speaker at Computer Graphics events all across the globe. Distinguished in both tech and art Andrew has been co-running the Art Direction Summit at Game Developers Conference for 8 years, while also being on the jury for Siggraph Realtime Live. Democratizing the creative process, supporting artists and empowering creativity within every single person has been his unrelenting focus and singular goal throughout his entire career. Promethean AI was founded by During my 8 years game development career, I tried both the art and the technical side of the industry. I've been streamlining processes, investigating problems, and creating prototypes for the production teams. The passion that always drove me was to make artists' lives easier and provide them instruments to implement their great ideas. So I joined Promethean AI to empower more artists around the world to focus on art rather than tools to create it. Peter designed the cloud optimization pipelines for Simplygon and applications for HoloLens (and all other things 3D) at Microsoft. His background ranges from banking, intellectual property, IoT and machine learning implementations in roles from developer on teams to CTO of entire tech companies. The core idea has always been the same, though: to off-load clients with cloud solutions. Also, he’s so far only swede to ever have landed a #1 pop song on the charts in India! With 12 years of experience in video games, Ehsan has worked on several projects in different studios before joining the Promethean team. This includes Senior Environment artist role at Arkane Austin studios and Redfall game, lead artist on Shadow Blade: Reload, Co-founding and Co-CEO of Pejvak Games in Iran. Ehsan has been invited to speak at multiple 3D art events and is on the GDC game awards jury. Telling stories through interactive media is his passion. He believes making video games should be fun and accessible for everyone. Ehsan joined Promethean to solve artistic problems and help all developers enjoy the process just like he does. Co-founder & CTO of MSQRD, augmented reality facial tracking and animation company that was acquired by Facebook in 2016. Continued to develop the technology within Facebook until it's eventual roll out as Instagram and Facebook Messenger AR Cameras. Spearheaded the development of Facebook Spark AR platform. Computer Graphics Engineer. Forbes 30 under 30. We are hiring! We are looking for an experienced Technical Artist with the focus on geometry processing to drive our geometry processing system and help Promethean become even smarter! Do you enjoy putting your technical skills to creative use? Do you love power-amplifying others through state of the art technology? Do you want to make a real difference in how everyone in the world creates virtual worlds? Do you like autonomy, responsibility and are excited to drive meaningful progress? If these questions excite you and you have proven experience in supporting 3D production pipelines as well as Python we need to hear from you! C++/Qt/SQL are a plus! This is a full-time role that can be performed remotely from anywhere in the world. If you are community-minded, passionate about your particular 3D editor of choice and want to help us create and maintain Promethean AI plugin integrations we would love to work with you! This role would require an initial time investment of a few weeks to build our plugins and occasional support work, but will bring the Promethean team and your community immense joy as it will guarantee the absolute best experience world-building on your favorite platform. This is a part-time contract that can be performed remotely from anywhere in the world.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304954.18/warc/CC-MAIN-20220126131707-20220126161707-00500.warc.gz
CC-MAIN-2022-05
6,533
48
https://charltonteaching.blogspot.com/2021/05/can-genius-comes-from-random-variation.html
code
When I was working on understanding the creativity of genius; I came up against the fact that biological and psychological science could not explain real originality, except by positing that it came from 'randomness'. The basic model was that an original genius got his strange ideas from a two-stage process of randomly-generating variations upon existing knowledge; and (with high intelligence and knowledge) selecting better new ideas from the spectrum of random-novelty. The genius was supposed to be better at generating random novelty (by his high-psychoticism personality) and also better at selecting 'good ideas' from this random spectrum (by his high-intelligence and -motivation). This has at least two major problems as an explanation. The first problem is that it reduces all genius to the level of the fashion designer who 'creates' new fashions from selecting, exaggerating and recombining old fashions. It reduces originality to mere 'novelty'. Thus, it simply kicks the can/ problem-of-explaining-creativity further down the road - to whoever/ whatever came up with the original ideas, that are later being recombined and selected. This opens-up an infinite regress. The second problem is deeper; in that this explanation has smuggled in an unacknowledged metaphysical assumption that 'entropy' and 'randomness' are real and primary in the world - whereas creation and originality are merely derived from these essentially degenerative processes. We are assuming a reality in which there is de-geration, but no actual generation! Again we have not explained why there is anything in the first place that can be de-generated, or why there are things with structure that can then undergo entropy... We have posited a world in which we focus on that which dissolves creation - but with no explanation of created phenomena arise. We have posited a secondary world, a world of secondary processes - and the primary world is always elsewhere and unexplained. This metaphysical error is general, near-universal and taken for granted - so much so that it took me a great deal of hard-thinking to find it! Of course it is easy to know why this strange (and incoherent) assumption happened - i.e. because the underlying intention was that God (the primary creator) Must-Be excluded from any and all explanations. And once God is included in the explanation, as primary creator - then it becomes easy to understand that the source or real and original creativity lies in the divine - and in Man's share of that divine nature.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817106.73/warc/CC-MAIN-20240416191221-20240416221221-00316.warc.gz
CC-MAIN-2024-18
2,531
14
https://tradeveda.com/why-trading-bots-do-not-work/
code
Trading bots are programs designed to relieve the stress of analyzing and trading the markets as a trader. Often marketed with lots of promise, trading bots leave naive users rueing their losses in many cases. But, why do trading bots fail? Trading bots don’t work because the strategy has been curve-fitted to historical market movements. In other cases, the trading bot doesn’t work due to the actions and inactions of the trader and how the bot has been deployed. You can guarantee your bot works by developing one yourself. The rest of the article will look at seven reasons why trading bots don’t work after traders buy and deploy them. We’ll also discuss how to make sure your trading bot doesn’t stop working! Keep reading if you want to learn more. 7 Must Know Reasons Why Trading Bots Fail Unsustainable Core Strategy The trading world is replete with many people cooking up impressive results for the sole purpose of attracting investors and buyers. This is why they spend more time finding a set of trading rules that’ll create an attractive equity curve in a backtest instead of basing them on sound principles. In many cases, the results are achieved by curve-fitting or applying toxic money management techniques like a martingale. Some have a very small profit target and a large loss limit. When these factors align, you’ll get a trading bot that generates excellent backtested results but fails almost immediately when deployed in a live trading environment. Unfavorable Trading Environment Similar to the point above, some trading bots are designed to take advantage of very small inefficiencies that you can only replicate in specific trading conditions. For example, some trading bots take advantage of small price movements in specific time windows on a particular broker. Taking the trading bot to another broker that has slightly different pricing dynamics can yield imperfect results. For example, if a trading bot only works on a specific asset where a broker charges fixed two points as a spread, taking it to another broker that charges a floating spread that can reach 6-10 points during the recommended trading window for the strategy can make the bot stop working. Some trading bots are meant to stretch your trading equity to generate results. This is primarily true with high-risk systems that deploy a martingale approach or those that don’t take volatility into account. With such a system, you need an account size that matches the sums used in the original backtest. Otherwise, the bot will trigger a margin call if exposed long enough to standard live market conditions. Use on Wrong Assets Some bots are supposed to work on low-volatility assets. Once you deploy them on high-volatility instruments, they can burn through a trading account quickly. Most legitimate trading bot programmers will have a recommendation on the assets you can trade. However, this isn’t always fool-proof because a low-volatility instrument can turn high-volatility over a short period. Unless there’s a contingency plan built into the bot for such a scenario, the bot will likely crash a trading account if deployed on the low-volatility asset during such short-term scenarios. Indiscipline Leading to Unnecessary Tweaks Indiscipline makes traders with programming skills start fiddling with the code on a trading bot after a few losing trades. This can render the bot ineffective. The best trading bots are based on sound principles covering years of backtesting. Making arbitrary changes in a bid to avoid losing trades can ruin the core of the strategy—especially when you’ve not backtested your tweaks to see how it affects the trading results over the longer term. Many trading bots that go public can lose their edge if they’re based on fragile principles. With thousands of people using the same bot, the market inefficiency exploited may cease to exist. This is most visible when many of a bot’s users are trading with the same broker. Most traders using bots host them on virtual private servers to ensure they’re working round the clock. Any disruptions in the technical setup can cause the bot to stop trading. Unless you regularly check its performances, you may not notice the anomaly, and it could end up proving costly. How To Make Sure Your Bot Doesn’t Stop Working? You can do a few things to ensure you have a bot that’ll continue to work over the long term. Listed below are a few things that you can do to ensure that your trading bot doesn’t stop working: Develop One Yourself The core of any quality trading bot is made of a systematic trading strategy with detailed entry, exit, and money management rules. If you have such a system, backtest it across a couple of decades to see how it performs. If it beats most benchmark buy-and-hold investments and posts a manageable overall drawdown, you can work towards putting it into code. Remember, you need to ensure your backtest is based on sound principles and not curve-fitted. You also need to account for swings in market volatility by making sure the bot can adjust risk based on prevailing market conditions. With all of these metrics sorted, there’s a high chance of profitability with your bot. Don’t Buy Cheap Bots Accessible to Everyone In more than 99% of cases, cheap bots posted in open marketplaces end up failing. Avoiding them will help you save thousands of dollars when you calculate the cost of the bot and the cost of the account you’re bound to lose over time. Even when the bot works, thousands of traders using it can make it lose its edge. If you don’t have a system to convert into a bot and intend to buy, seek out licensed quant development companies in regulated jurisdictions to work out a deal. Such bots will definitely cost more than just a few hundred bucks, but you’ll have a higher chance of succeeding with it. If you’re disciplined, you’ll allow your bot to keep trading without any interference, hence ensuring it doesn’t stop producing results. Traders with technical skills can interfere with a bot’s trading. Still, even non-technical traders can also affect a bot’s results when they start closing trades manually or turning off the virtual private server arbitrarily. Many traders use bots because they help take away the emotions from trading, but indiscipline can still rear its head when using the bot in the ways we’ve mentioned. You may no longer be making the buy and sell decisions, but indiscipline can make you sabotage a perfectly working bot. Ensure Excellent Technical Setup As we mentioned earlier, a few technical bits come together to make a bot work. Apart from a compatible platform, you need to have a system that ensures the bot will remain online during the hours it’s designed to work. This may involve having a computer you can keep working over that time or renting a virtual private server. Regardless of the setup you choose, you need to ensure it matches the computing requirements for the bot and won’t fail frequently. Trading bots don’t work if they weren’t designed based on a sound hypothesis. This is the situation with most cheap bots. When high-quality bots don’t work, the fault can be traced to the trader’s behavior and general setup. If you have a solid trading infrastructure and your bot doesn’t work as advertised, the first thing to do is confirm if the behavior is in line with backtests. For example, if there are a couple of losing years in the backtest, you shouldn’t discard the bot after a few losing weeks.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944452.74/warc/CC-MAIN-20230322180852-20230322210852-00118.warc.gz
CC-MAIN-2023-14
7,559
32
https://vaadin.com/forum/thread/4861093/pro-subscription-what-does-it-do
code
To simplify things and help our users to be more productive, we have archived the current forum and focus our efforts on helping developers on Stack Overflow. You can post new questions on Stack Overflow or join our Discord channel. Which subscription do you have - Pro Tools ($35 per month per developer - current product) or Pro Account (90$ per month per developer, no longer sold but many accounts purchased last year are still active)? Pro Account was effectively the current Pro Tools (see vaadin.com/pro) plus some other things that have now moved to separately sold team support contracts. In either case, the subscription includes development time licenses for the add-ons listed on the page as well as for Vaadin TestBench for automated testing. Each of the products is licensed per developer working on the project, and no deployment licenses are needed - see the license text of each product for details or ask for specific clarifications.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710926.23/warc/CC-MAIN-20221203075717-20221203105717-00052.warc.gz
CC-MAIN-2022-49
951
4
http://collectl.sourceforge.net/Memory.html
code
Collectl reports the standard values with respect to memory which are fully documented under the data definitions. Trying to rationalize the way these values relate to each other can be a frustrating experience because they rarely add up to what you expect. Part of the reason for this that every byte is simply not accounted for in every category. This can be further complicated because at boot time, some devices will actually grab some memory that the kernel will never even see and so the total memory will not always equal to the physical amount of installed memory. If one looks at /proc/meminfo, which shows a lot more types of memory than collectl reports, it begs the question "why not report it all?" and the simple answer is there is just too much. Further, collectl uses a second file /proc/vmstat to gather virtual memory stats which further adds to the volume of possibly candidates to report. Again, collectl tries to report values of most use. Brief, verbose and detail Like other data in these 3 categories memory also reports values in this way as well. However there are a few important caveats to note: What fools people is that the first (or many) times they see low free memory they think their system is running out of memory when in fact is it not. If they reboot, the memory frees up, but then starts to fill again. So what's going on? It turns out that whenever you read/write a file, unless you explicitly tell linux not to, it passes the file through the cache and this will cause an increase in the amount of cache memory used and a drop in free memory. What many people do not realize is, until that file is deleted or the cache explicitly cleared, all files remain in cache and as a result if the system accesses a lot of files cache will eventually fill up and reduce the amount of free memory. Naturally linux can't allow the cache to grow unchecked, and so when it reaches a maximum set by kernel, older entries will start to age out. In other words, reading a file will be extremely fast when in cache but its access slowed to disk speeds when not. The only real way to tell what is going on is to look at the disk subsystem while accessing a file. If a complete or partial file is in cache, read I/O rates will be much higher than normal. If a file is written that will completely fit in cache, again the I/O rates will be very high because the rate at which cache is being filled is what is actually being reported. It is only when a file is a lot larger than cache that the I/O rates slow down, operating only as fast as dirty data in cache can be written to disk and is in fact the only real way to measure how fast your disk subsystem actually is. Collectl's --vmstat switch is actually internally turned into --export vmstat and so reports data the same way as vmstat does but now you get some added bonuses: zgrep Committed_AS /var/log/collectl/poker-20110928-000000.raw.gz Committed_AS: 889272 kB Committed_AS: 889272 kB Committed_AS: 889272 kB Committed_AS: 889272 kB Committed_AS: 889272 kB Committed_AS: 889272 kB Committed_AS: 889272 kB Committed_AS: 891664 kB Committed_AS: 891664 kB Committed_AS: 891664 kB Committed_AS: 891664 kB collectl -p /var/log/collectl/poker-20110928-000000.raw.gz --grep Committed_AS -oT 00:00:00 Committed_AS: 889272 kB 00:00:10 Committed_AS: 889272 kB 00:00:20 Committed_AS: 889272 kB 00:00:30 Committed_AS: 889272 kB 00:00:40 Committed_AS: 889272 kB 00:00:50 Committed_AS: 889272 kB 00:01:00 Committed_AS: 889272 kB 00:01:10 Committed_AS: 891664 kB 00:01:20 Committed_AS: 891664 kB |updated September 29, 2011|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645550.13/warc/CC-MAIN-20180318071715-20180318091715-00745.warc.gz
CC-MAIN-2018-13
3,589
11
https://worldsage.org/google-software-engineer-salary-how-much-does-google-pay/
code
Google is one of the top employers globally, and itsare some of the highest-paid employees. So, how much does its software engineers? We look at Google’s software engineer salary and benefits to find out. If you work for Google, how much do you earn? According to salary.com, the average Google earns $131,726 per year. That’s pretty high, considering the average U.S. wage is $41,914. I’m an engineer at Google, so I have a unique perspective on the company’s operation. I’ll, how much Google engineers typically make, and why you might want to consider moving into a job as a Google software engineer. paid its software engineers over $600,000 on average. According to the 2017 U.S. News Best Jobs Report, earn $84,000 annually. This means that premium. Google has no official figures on how much it its software engineers. Based on publicly available information, they appear to be among the best-paid software engineers globally. What is the average salary of a Google software engineer? According to salary.com, the average salary of a Google software engineer is $131,726 per year. This is roughly the same as the average U.S. salary of $41,914. However, I have a few questions: 1. How does this compare to the average salary of an engineer at other? 2. How does this compare to the average salary of a software engineer at Google? 3. How does this compare to the average salary of a software engineer at other? 4. How does this compare to the average salary of a software engineer at Google? 5. How does this compare to the average salary of a software engineer at other tech companies? What are the career recommendations for software engineers? Software engineering has grown to be an incredibly diverse field, and there are so many different opportunities available. Software engineering is one of the most in-demand jobs, so if you want to make a career switch, it’s worth checking out. The best way to land a job in this industry is by networking. It’s essential to start your career with a good network and build upon it. It’s also important to keep an eye out for new. For instance, Google’s A.I. assistant, , has taken over the world. The company has made significant strides with A.I., and it will only grow in popularity. As a software engineer, you’ll have the opportunity to work on projects focusing on this new technology. The ability to adapt andis also essential. Software engineers also tend to have high flexibility regarding and locations. There are several jobs available across the U.S., U.K., and Australia. How can I become a Google software engineer? As of October 2018,, on average, $130k per year. It’s a nice paycheck, but not one that comes easily. Google is a notoriously competitive company. Its hiring process is challenging and highly selective. It takes about six months to become a software engineer. During that , you’ll complete a series of interviews and tasks. This means getting a job at Google takes a lot of work, persistence, and hustle. But the benefits are worth it. What are the skills required to be a Google software engineer? It’s no secret that Google is a significant and growing company. According to Glassdoor, the median salary for software engineers at Google is $131,726 annually. That’s a lot of money. But, to be an engineer at Google, youtasks. It would help if you were good at algorithms, , and coding. If you’re already well-versed in these areas, you’re in luck. However, if you’re not, it’s probably a good idea to take a programming course. What are the benefits of working at Google? As a Google software engineer, you’re responsible forGoogle running. If you work at Google, you’ll enjoy a high salary and excellent benefits such as , paid leave, and retirement plans. Here’s what you can expect if you decide to work at Google: You’ll start making around $100,000 and can reach up to $150,000. health insurance for all full-time employees. Most employees have 14 days of paid leave per year. Google matches 100% of employee contributions. Google offers unlimited vacation time and unlimited sick leave. Google offers a 401(k) plan and a generous retirement plan. If you want a career with Google, check out our Careers page. Frequently Asked Questions Software Engineer Q: How do I start my career as a software engineer? A: Most companies offer anto help with this. In this program, you would learn by doing and taking on smaller projects. Q: What is the best thing about being a software engineer? A: There is a wide variety of jobs within software engineering. You can be involved in many different Q: What’s the biggest misconception about being a software engineer? A:think that software engineers are not very smart. Software engineers are brilliant and understand technology exceptionally well. Q: What’s the best thing about being a software engineer? A: The best thing about being a software engineer is that you are responsible for making things work and always learning. Top Myths About Software Engineers 1. Google is a family company. 2.their software engineers much. 3. Google pays their software engineers well above the programmer’s median pay. 4. If you work at Google, your salary will increase over time, just like the. 5. You can get rich working for Google. software engineers a competitive base salary with comprehensive benefits and a generous stock-based compensation plan. You can , have your pick of roles and projects, and are encouraged to take time off to raise a family.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099514.72/warc/CC-MAIN-20231128115347-20231128145347-00004.warc.gz
CC-MAIN-2023-50
5,524
43
http://www.slideshare.net/perficientinc/bus-g02-using-exceptional-digital-personas-to-drive-revenue-20140811125325216902-1
code
Be the first to like this Presenter: Mark Polly, director, Portals, Content and Social Practice, Perficient Mark discusses using buyer and customer personas and user stories to help ensure that messaging delivered though IBM Exceptional Digital Experience platforms not only increases site visits, but also increases sales revenue (and ideally profit margin) Clipping is a handy way to collect important slides you want to go back to later.
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701152987.97/warc/CC-MAIN-20160205193912-00318-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
440
5
https://www.curezone.org/forums/fm.asp?i=412892
code
Chaz, you seem to have a problem with anyone who disagrees with you. Do you really believe you can never be wrong? I'll leave that for others to judge but unless you are the Second Coming (which you MAY well believe) it is certainly a possiblity (on occasion at least) you may sometimes be wrong. I can't translate @#$ language I'm afraid. Again you maintain that someone who disagrees with you is misinforming - notions of infallibility again?
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662521041.0/warc/CC-MAIN-20220518021247-20220518051247-00764.warc.gz
CC-MAIN-2022-21
444
2
https://www.techspot.com/community/topics/headset-echo.141197/
code
On voice-over servers like ventrilo, teamspeak, mowhawk, etc., whatever I hear on my headset, is echoed back onto whoever else is on the server/channel. For example, if someone were to yell "HEY!", I would hear the "HEY!", and then whoever yelled "HEY!" would hear that "HEY!" as echo on my headset. The echo isn't caused by my volume, because the echo is the exact volume as what I hear (a good example on that would be music). I'm thinking this is because of my audio settings on input or output, at least that's what I got from google searches. This problem has been going on since I first used a microphone on this computer. I'm on windows XP using a Realtek sound manager.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890947.53/warc/CC-MAIN-20180122014544-20180122034544-00664.warc.gz
CC-MAIN-2018-05
677
1
http://slashdot.org/~JanneM/tags/interesting
code
Why? Maybe I simply only review things I like. Why would that devalue my reviews? This. One reason really low and really high reviews are much more common than they ought to be is that people only bother voicing an opinion if they feel strongly (positive or negative) about something. Another is that once they do, they'll tend to exaggerate their evaluation to really drive home how they feel. My suspicion is that the only stable scale is a simple "really liked it/really disliked it" up/down system. Then somehow weigh that according to the proportion of customers or buyers that actually bother to review. That depends of having a decently good estimate of that proportion though. The likes of Amazon have that for their products; for restaurants it'd be hard to impossible,
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657140379.3/warc/CC-MAIN-20140914011220-00237-ip-10-234-18-248.ec2.internal.warc.gz
CC-MAIN-2014-41
778
3
http://www.coderanch.com/t/46474/Struts/html-select
code
Hi All, How to use html:select tag to populate a drop down database ....for ex a drop down of all the US states from database. If anyone can provide a code it will be great Thanks posted 13 years ago See this sample code . <html:select property="contentID" size="5" style="width:200px;" > <html ptions collection="SearchResult" property="contentID" labelProperty="contentDesc"/> </html:select> here property = contentID maps to your attribute in the form bean. The options collection "SearchResult" in my request/session and its an ArrayList of an Objects which has contentID and contentDesc as attributes/properties. Hope this is clear.
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396100.16/warc/CC-MAIN-20160624154956-00102-ip-10-164-35-72.ec2.internal.warc.gz
CC-MAIN-2016-26
637
4
https://wgsextract.github.io/
code
WGS Extract WWW home is a desktop tool for verifying, analyzing and manipulating your Personal 30x WGS test result. It can also be used with any human genome based BAM or CRAM file including WES test results. WGS Extract User Manual: v4 Alpha (Google Doc) Latest Releases you can install on the supported platforms are: On the 15 Jan 2023, we discovered the 7 Dec 2022 v44 release of the program subpackage used in the Dev track introduced a bug that prevented microarray file generation from Build 38 BAMs / CRAMs. This is fixed in the v45 release (which may not yet be available in all tracks). We apologize for the inconvenience. These are just the installer scripts. You need to download, unpack and run the installer for your OS. See the Installation Section in the v4 Alpha manual for more details about how to install on your platform. See the v4 Release Notes in the installation directory for more information about the updates in the current release. The initial program installation is just under 1GB but can grow in size as more reference libraries are loaded. This program size is miniscule compared to the 50+ GB BAM files it operates on. As of the 31 July 2022 release, the WGS Extract program will now auto-update if you run the installer again. Not just updating the environment the tool depends on. This tool is geared toward the needs of genetic genealogy and Ancient DNA (aDNA) studies but may be helpful for those looking into health-releated uses of WGS tests. The personal, sub-$500, Direct-to-Consumer (DTC), 30x Whole Genome Sequence (WGS) tests are delivered with basic data files and reports. This tool serves to bridge the gap between the WGS data files delivered and the present day genetic genealogy community tools. Many health analysis sites accept the microarray and VCF files generated from your WGS test by this tool. Still waiting for your WGS test results? Want to get started today? See the International Genome Sample Resource (1K Genome archive) for BAM or CRAM files that you can download and play with to learn the tool while waiting for your results. This tool is designed to be a simple, push-button manipulation of WGS files from any source. It hides the installation and scripting of complex bioinformatic tools and automatically adapts based on the data within your files. For more control over your pipeline, either learn to use the underlying tools directly or seek out a Galaxy server (such as UseGalaxy). Dante Labs, Nebula Genomics, Sequencing, and ySeq are test results most commonly used with this tool. Full Genomes Corp, GeneDX, Sano Genetics and Veritas (historical) are other test providers whose output is processed here. These are all results from Illumina or MGI next generation sequencers. Results from Oxford Nanopore and PacBio HiFi and Revio third generation sequencers can also be used; as can FamilyTreeDNA’s BigY output. (This is not an endorsement of any company or service; simply reporting what is commonly used with the tool.) The tool acronym is WGSE and pronounced as “wig-see”. We encourage that use in conversation. We use the Facebook group Consumer WGS Testing for discussions on how to make use of your personal, sub-$500, DTC 30x WGS test results. Bugs, use cases and announcements about the Beta release tool happen there. As part of that Facebook groups’ Files section, you will find a number of useful companion documents and tool references. In particular, start with Bioinformatics for Newbies. User issues, if not brought up in the before-mentioned Facebook group, should be raised in the local user issues section of this GitHub site. The issues section is preferred so code bugs, use limitations and suggested improvements can be tracked within the development project. There is a separate Facebook group for Developers and Alpha testers where bleeding edge issues are discussed and tested before wider availability. Developer’s should visit the main GitHub WGS Extract Developers Code Repository as well. Development issues, code bugs and limitations should be raised in the development issues section so they are tracked till resolved in a release. The manual contains many suggested improvements if you want to take a stab at modifying and improving the code. If the latest release is not checked in to GitHub, simply download the latest release and start from there. Look in the Program folder for the Python source files. With v4, we have opened the following three release tracks to all: Beta, Alpha and Dev(eloper). Chose the installer for the track you wish to be on. Then simply rerun the installer when you are ready for an update to get the latest available release for that track. Developer releases are every few weeks and minimally tested. Alpha releases every one to few months and tested on each release platform with some key, new features not yet complete. Beta releases are every quarter to year and extensively regression tested and self consistent in their feature set. If you want to change release tracks at anytime, simply edit the release.json file in the installation directory to change to the desired release track and then rerun the installer. Or overlay the new installer downloaded from above onto your existing installation. The only difference in each installer is the release.json file and its track setting inside. Your current, installed version is displayed at the top of the program when run. We bring you v4 some 13 months after v3. v3 and the original, first 2 years v1 and v2 historical release from Marko are documented there. v3 went into Alpha on the 18th June 2020 and was finally released as Beta on the 15th June 2021. v4 entered Alpha on 1 April 2022 and has yet to be formally Beta released. This page is located at https://WGSExtract.github.io/ and serves as the WWW home for the tool. As the need develops, we will create our own Facebook Group for users to raise issues outside of the local User Issues Section already mentioned. 64 bit OS and processor platforms tested as part of the release process are: The tool has the potential to be a simple install in a BioConda environment as it is mostly just a Python package. But a majority of our users are on Microsoft Windows 10/11 systems. Bioconda nor the bioinformatic tools are supported there. So we currently deliver the tool with our own installer and Windows executables. This may change going forward after we find a Windows package manager to separately supply the bioinformatic tool ports we currently create. This is the only source of recent bioinformatic tool releases on a Windows system (that we are aware of). Docker packages are either not usable across all the platforms or too ineffecient for these large file and program needs. But could play a role in the future. Some have downloaded the WGSE tool solely to gain access to the Win10 native executables of the Bioinformatic Tools that we make available. These are installed on Windows systems. You can use these Bioinformatic tools independently after installing the WGS Extract program on Windows. Look in the cygwin64/usr/local folder for all the bioinformatic tools. Just add cygwin/bin and cygwin/usr/local/bin to your PATH to make the programs available in the command line of CMD, Powershell or the native BASH there. In v4, this is a full, BASE environment of Cygwin64 captured as of the stated release date. The bioinformatic tools are compiled to this same versions on that release date. So do not update the cygwin64 libraries direftly else the bioinformatic tools may break. The CygWin64 tools natively compiled to a Windows platform can be slower than native Linux binaries on the same platform. The Windows WSLG environment with Ubuntu Linux using the Linux versions of the bioinformatic tools can be installed and used also. Once WSLG becomes more complete and supported in Windows 11, we will likely avoid delivering Windows executables all together and simply ask Windows users to install and use WSLG for running WGS Extract. At which time we can consider becoming a Bioconda package as well. We do not provide support for the use of WSGE on WSLG at this time. Recent changes in the WSL2 file system in the last year finally made WGSE possible and generally faster than the Cygwin64 native binaries. This occurs because the Windows kernel cannot support some fundamental features from Unix / Linux that the bioinformatic tools rely on (e.g. memory mapped files). We started out hosting everything on a paid Google Drive account. What a disaster. Google starting lowering further and further the maximum size of a file that could be downloaded with a direct link. And then thwarted the attempts to get around that. Even with paid accounts, they clearly only want to support sharing of Google Docs files and maybe backup repositories that are shared between google accounts. Not public acess files not requiring registration. Luckily, we discovered MS OneDrive does not have these issues and restrictions. But are use of Bot.ly shortened links could not be used on MS Onedrive files (some legal spat between the companies). This was finally lifted sometime in early 2023 so we could completely transfer over to MS Onedrive and direct link downloads. Historical pages and releases will likely have non-functional Google Drive links which have to be rediscovered. We have taken release v1, v2 and v3 offline now. SHA256: TBD *WGSExtract-Alphav35_31Jul2022_installer.zip (may not be same version available above) MD5: TBD *WGSExtract-Alphav35_31Jul2022_installer.zip (may not be same version available above) More information is available on using hashes to verify the download
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644571.22/warc/CC-MAIN-20230528214404-20230529004404-00062.warc.gz
CC-MAIN-2023-23
9,660
27
https://openchia.io/en/fees/
code
Fees are structured this way - Until 1st October 2021 (2021/10/01): 0% - After 1st October 2021 (2021/10/01): 1% - Before 1st October: A reward of 1.75 XCH will be distributed to pool farmers, 0 XCH (nothing) is kept to the pool. - After 1st October: If a reward of 1.75 XCH is found, only 1% of that, 0.0175 will be kept to the pool as a fee. The remaining 1.7325 XCH will be distributed to pool farmers. We use PPLNS (Pay Per Last N Shares) to distribute rewards. When a block is won, we look at the valid partials (shares) submitted by all users in the pool since last payout and distribute the reward value based on your share among all farmers in the pool. In our case Last N Shares refers to partials since last payout. We believe this system is far more fair for less frequent rewards (when Last N Shares means only last few hours), since people contributing for more time will get more rewards. Once our estimated time to win gets below 48 hours we plan on changing the Last N Shares to 48 hours of valid partials. Payouts will happen within 5 minutes of the farmed block. These terms are subjected to change and will be communicated 1 week prior to the change in this website and on Discord channel.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587915.41/warc/CC-MAIN-20211026165817-20211026195817-00286.warc.gz
CC-MAIN-2021-43
1,208
11
https://maccity.ca/video/mac-city-morning-show-100-our-100th-show/
code
Mac City Morning Show #100: Our 100th Show! Can you even believe it!? It’s our 100th episode! To help us celebrate, purchase a T-shirt and be entered into a contest where you can win a brand new 2021 RAV4! See contest details here https://bit.ly/3cdY03i SHOP MAC CITY MERCH All profits will be donated to the Northern Lights Health Foundation! FOLLOW THE SHOW
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649439.65/warc/CC-MAIN-20230604025306-20230604055306-00649.warc.gz
CC-MAIN-2023-23
361
5
https://www.vchri.ca/events/vchri-internal-awards-information-session
code
Rm 2267 Diamond Health Care Centre This information session will provide an overview of the award process, and review the guidelines and application instructions for the Investigator, Team Grant and Innovation & Translational Research Awards. - 10:00 - 10:40: Investigator Award - 10:40 - 11:20: Team Grant Award - 11:20 - 12:00: Innovation & Translational Research Award There will be time for you to ask questions. Please register here. Please contact Amanda Chisholm email@example.com if you have any questions or concerns.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057861.0/warc/CC-MAIN-20210926114012-20210926144012-00411.warc.gz
CC-MAIN-2021-39
526
8
https://www.findbestopensource.com/tagged/win10
code
Bloatware Removal Utility, for automating removal of pre-installed, factory bloatware from devices running Windows 7-10 and newer. Silently removes items selected if possible. Preselects common bloatware. Can remove Win10 UWP/Metro/Modern/Windows Store apps and provisioned apps. Imaging would be a good way to set up multiple computers of the same model as there are sometimes issues with restoring images to dissimilar hardware. Also if you happen to have many different models of machines or would like to quickly and quietly remove the default bloatware that comes with many HP, Dell, and a few others this script supports this can automate that process to save you time and free you up for other more pressing concerns. This script will bring up the uninstallers and remove items silently in most cases. I've used it mostly for HP ProBook/EliteBook/ProDesk and varients and also Dell Insprion/Lattitude/OptiPlex/Precision. HP is by far the worst when it comes to preinstalled bloatware.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362952.24/warc/CC-MAIN-20211204063651-20211204093651-00619.warc.gz
CC-MAIN-2021-49
991
1
https://www.freelancer.com.ru/projects/php/looking-for-php-code-that/
code
I am looking for a php code that rotate images into correct orientation when they are being uploaded to the server and database, and then display them into the correct orientation from the server, just like a social media website. Some photos that were taking with phones sometimes shows images in a side view. 17 фрилансеров(-а) в среднем готовы выполнить эту работу за $157 Hello! I am a web developer. I have checked your project description. I can implement it I guarantee the good result. I will wait for your reply. Thank you.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573080.8/warc/CC-MAIN-20190917141045-20190917163045-00028.warc.gz
CC-MAIN-2019-39
578
4
http://www.archivum.info/opera.mail+news/2006-12/00037/Re-Newsgroup-message-won't-fetch.html
code
On Fri, 01 Dec 2006 19:15:11 -0500, John H Meyers <[email protected]> > Note that the headers already downloaded from my NNTP server > seem to be fine, but now that M2 has received and stored the > headers, it does not seem interested in fetching the message body. Note from the headers of the message ... Content-Type: text/plain; charset="us-ascii" I've seen problems in the past, where a poster had that header, but a hex 00 in his sig. Opera would hang trying to download any messages from that poster. (I got him to fix his sig). It's possible that opera found an invalid character, and has marked the message as not having a body available. You could try changing the keep local copy, and reset the message number in the "isp".newsrc file, to force opera to try and redownload the message. If you do that with an nntp capture running, you could at least see if the message contains any non-ascii characters, as it is stored on your news server. Regards, Dave Hodgins Change nomail.afraid.org to ody.ca to reply by email. (nomail.afraid.org has been set up specifically for use in usenet. Feel free to use it yourself.)
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814290.11/warc/CC-MAIN-20180222200259-20180222220259-00369.warc.gz
CC-MAIN-2018-09
1,124
20
https://sadhguruonline.com/videos/occult-forces-can-affect-you-if-you-wear-thumb-rings/
code
Occult Forces Can Affect You If You Wear Thumb Rings Sadhguru cautions against wearing rings on the thumbs and explains the significance of the ring finger, which can be a doorway to exploring many possibilities of creation. "In yoga, we are seeing this body as a ladder to the divine, and if you know how to keep this, this is a phenomenal mechanism." - Sadhguru "There are so many dimensions of life right here, now, but it's not in your experience." - Sadhguru "You will just exhaust yourself by doing wrong things. Everybody gets to live, but not with the same ease, isn't it? Simply because, unless you do the right things, right things do not happen to you in this world." - Sadhguru
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300624.10/warc/CC-MAIN-20220117212242-20220118002242-00197.warc.gz
CC-MAIN-2022-05
689
5
https://forum.freecodecamp.org/t/how-to-make-your-own-projects/667285
code
Hi, I’m new here and have been working on the Web Development module (and some of the old JS one) for about a month now. I’m really sorry if this is a dumb question. I’ve read here that others have used the certificate projects as exercises and then worked on some concepts of their own. I’m an actor and a writer, so part of my motivation is to be able to make websites for my “products”. What I really like doing the fCC projects is that I have the spaces to work on my HTML and CSS and that I can see the product while working. Is there some kind of program where I can make code from scratch (that isn’t part of the fCC projects) and be able to create and see my work on the screen together?
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474893.90/warc/CC-MAIN-20240229234355-20240301024355-00419.warc.gz
CC-MAIN-2024-10
709
2
https://furikku.livejournal.com/1005646.html?utm_source=3userpost
code
Art advice I'm trying to work on myself. I've always had trouble figuring out what level of detail is best, and I think this is a pretty good rundown on what makes a good detail piece versus a bad one. (I'm also having to work on thinking of the drawing as an abstract thing instead of a representational thing; I tend to want to err on the side of "more realistic," to the point that it's hard to tell what's supposed to be going on. Not the best plan ever.) Also on Dreamwidth. If you feel like commenting there, go for it. ( other people went for it.)
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046150067.51/warc/CC-MAIN-20210723210216-20210724000216-00183.warc.gz
CC-MAIN-2021-31
554
3
http://bobthechemist.com/2016/01/
code
In the previous iteration of my website, I had some details about installing the Vernier Go software development kit on the Raspberry Pi and then using Mathematica to visualize the results. Here is an updated set of instructions which is a little more straightforward. Andy Brunning over at Compound Interest has created a great infographic to help explain some of the chemistry behind the Flint water crisis. The graphic is below, but I strongly encourage you to take a look at his full article Andy’s post introduces a lot of concepts that could be incorporated into a Chemistry lecture, making it a potentially valuable resource for connecting what students may find as esoteric concepts to real-life situations. Check out the full article while I jot down some ideas for exam questions…. I made this thing a while back, and I keep telling myself that I’m going to write a longer article. Well, it probably won’t happen, so at least here’s a summary of my impressions on the build. Continue reading The RPi Palmtop I’ve been having some problems configuring the optimal fan speeds on my computer. Part of the issue is that I have no way of seeing temperature changes while I’m using full-screen applications. A little help from Wolfram, a Raspberry Pi and Adafruit’s LCDPiPlate got me the information I needed. I wanted to see if it would be possible to create a makeshift remote sensing device using Wolfram on the Raspberry Pi. Toss in VNC and some earlier code that I’ve written and here’s what I came up with. I finished off the year right, with a limited edition Goose Island Stout.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039747369.90/warc/CC-MAIN-20181121072501-20181121094501-00446.warc.gz
CC-MAIN-2018-47
1,610
8
http://www.seomastering.com/wiki/L_Sharp
code
From Seo Wiki - Search Engine Optimization and Programming Languages Template:Pound L# .NET is a dynamic computer programming language intended to be compiled and executed on the Ecma-334 and Ecma-335 Common Language Infrastructure (CLI). It is a dialect of Lisp, adapted from Paul Graham's proposed Arc language to exploit the libraries of the .NET Framework, Microsoft's implementation of the CLI specification. The language was designed by Rob Blackwell, as was its first implementation. As of 2007, there are no competing implementations. |File:HelloWorld.svg||This programming language-related article is a stub. You can help Wikipedia by expanding it.|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172649.58/warc/CC-MAIN-20170219104612-00005-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
658
4
http://ux.stackexchange.com/users/2966/jess-bowers
code
|location||Chapel Hill, NC| |visits||member for||4 years, 2 months| |seen||Dec 18 '10 at 23:08| I have a passion for film and design and I am currently working as an iOS & OS X app developer. |bio||website||twitter.com/badanalog||visits||member for||4 years, 2 months| |location||Chapel Hill, NC||seen||Dec 18 '10 at 23:08| 0 Votes Cast This user has not cast any votes
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936459277.13/warc/CC-MAIN-20150226074059-00051-ip-10-28-5-156.ec2.internal.warc.gz
CC-MAIN-2015-11
369
8
https://forums.macrumors.com/threads/pci-combo-firewire-usb-2-0-card.104826/
code
I just installed a PCI Firewire 400/USB 2.0 card into my G4 (running 10.3.7). The firewire ports work perfectly but the USB 2.0 ports don't see to respond to any of my devices. All the devices are USB 1.0 but I thought 2.0 is backwards compatable. I checked by PCI/AGP profiles, through About this Mac... and it locates the card as well as the firewire but makes no mention of USB 2.0. Is there a driver I should install that Im not aware of? I thought 10.3 supports USB 2.0 natively. The card is mac ready, it came with a driver CD however it seems to be only for windows machines since all the files in it are cads and exe's. Any thoughts?
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583513441.66/warc/CC-MAIN-20181020205254-20181020230754-00126.warc.gz
CC-MAIN-2018-43
641
1
http://ousva.kavinfo.ru/profile/356
code
NET; the reason for doing so that we’ll configure the server to issue OAuth bearer token authentication using Owin middleware too, so setting up everything on the same pipeline is better approach. NET Identity system which is built on top of Owin middleware and we’ll use it to register new users and validate their credentials before generating the tokens.As I mentioned before our back-end API should accept request coming from any origin, not only our front-end, so we’ll be enabling CORS (Cross Origin Resource Sharing) in Web API as well for the OAuth bearer token provider.Like everything else in git-flow, you don't have to use release branches if you don't want to. In our case I’ve identified clients to two types (Java Script – Nonconfidential) and (Native-Confidential) which means that for confidential clients we can store the client secret in confidential way (valid for desktop apps, mobile apps, server side web apps) so any request coming from this client asking for access token should include the client id and secret. You can check the demo application, play with the back-end API for learning purposes ( and check the source code on Github. Before start into the implementation I would like to discuss when and how refresh tokens should be used, and what is the database structure needed to implement a complete solution. In my own opinion there are three main benefits to use refresh tokens which they are: In order to use refresh tokens we need to bound the refresh token with a Client, a Client means the application the is attempting communicate with the back-end API, so you can think of it as the software which is used to obtain the token. Each Client should have Client Id and Secret, usually we can obtain the Client Id/Secret once we register the application with the back-end API.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267861163.5/warc/CC-MAIN-20180618203134-20180618223134-00553.warc.gz
CC-MAIN-2018-26
1,822
6
http://caturstore.xyz/archives/4069
code
Novel–Cultivation Chat Group–Cultivation Chat Group Chapter 1507 – Programmed chat shoes sin cuba in war time In addition to this, there were doors everywhere in the room, large and smaller. These entrance doors needs to be pa.s.sages resulting in all the parts on the immortal cave. About 20 moments down the road, Melody Shuhang’s view shone brightly. At the moment, he was while using precious saber Ruined Tyrant, and it experienced its guardrails elevated up substantial. With all the complete sensation of protection it gifted him, he wouldn’t sense any panic even if they sped up slightly. The statues in the front and back were definitely the actual opposing. That they had significant figures, however their heads were actually only the magnitude of a fist. If an individual didn’t take a close look, they can a.s.sume they were headless statues. All things considered, they emerged at the back front door of your cla.s.sical immortal property. Palace Become an expert in Seven Existence Talisman came ahead of the old vanity mirror within the entrance in the immortal household, and stated, “Fellow Daoist Tian Tiankong, I am on this page. Do you find yourself listed here?” At this particular moment… the key-board from the personal computer automatically started off inputting. Anyhow, he could certainly not enable the Inside Society be the first to be work this time around. Inside the pa.s.sage, they might be involved in a large steel entrance every once in a while. The doors ended up engraved with protective formations and runes. Palace Grasp Seven Lifestyles Talisman’s confront suddenly changed. Song Shuhang replied, “No problem.” When Melody Shuhang got just joined up with the Nine Provinces Number One Class, nevertheless got yet to meet Soft Feather, and had thought that the senior citizens within the Nine Provinces Primary Group of people were definitely being affected by the Chuunibyou condition, he obtained once pondered if Tian Tiankong and Tian Tianwei have been the same person, just with two individual chitchat bank account. The inside of Tian Tiankong’s immortal cave was very modern-day, and even possessed a bit of scientific disciplines-fiction on it. There were clearly two totally different variations when it arrived at the inside and outside in this immortal house. Ahead of the computer system, the chat software was excited and recorded within the conversation user interface of Nine Provinces # 1 Class. An lifestyle that may produce the Inside Community cower was most certainly not an item that he and Senior citizen Seven Lives Talisman could deal with at this time. Below the lead of Palace Learn Seven Existence Talisman, they walked across the flow, pa.s.sing by way of a bamboo woodland, then through the maze of bends and turns. Additionally, Gao Moumou recently discovered that Tune Shuhang would always go windowpane-searching on main purchasing internet websites, and then he appeared to have taken a solid desire for shopping online. He as well as the palace master obtained already pa.s.sed from the big development that was securing the region. What sprang out ahead of him was actually a tiny pond with lotus makes growing on its work surface, in conjunction with quite a few lotus blooms of varied shades atop them. Palace Become an expert in Seven Everyday life Talisman replied, “This position is Tian Tiankong’s immortal cave, Tian Tianwei’s immortal cave is in other places.” What appeared before Music Shuhang became a compact space of just twelve sq meters. Regardless of what occured to Tropical island Learn Tian Tiankong, they can simply check out the tropical island primary, and personally evaluate which was developing when they have there. Greek Studies: a Series of Essays The distance between Divine Niche Destination and American Orchid Destination was quite close, plus it did not take very long so that they can come. Of course, it wasn’t that odd for males to view women’s clothes. Who was aware? It might just be to make sure they could cook a gift idea for their sweetheart? Gao Moumou themself would secretly buy many cute clothes for Yayi every so often. Along the way, practically nothing out of the ordinary occurred. As Melody Shhuang’s world journeyed increased and higher, the consumption of the Lotus Blossoming Step turned out to be increasingly reduced, plus it pretty much became a pa.s.sive skill. There had been instances when providing Piece of music Shuhang went within the air flow, a dark-colored lotus will come out by itself effort. Palace Grasp Seven Lives Talisman wondered, “Eh? Is he not inside his immortal cave?” There was three channels which are going inward, though a single was sweeping outward. Palace Master Seven Existence Talisman stretched out his hands, needed out his cellphone, and once all over again forwarded a note to Area Master Tian Tiankong. “Where are you currently?” the rejuvenation of aunt mary So, once you have the sense that there might have been an event at Perfect Area Area, Track Shuhang repeatedly checked out if there was any alterations in his Inner World. If your Internal Community cowered, then he would immediately retreat with Older person Seven Life Talisman. At Jiangnan College or university Area. He arrived at the past entrance and knocked in the entrance which has a laugh. “Fellow Daoist Tian Tiankong, I am just coming. In addition, Furthermore, i brought small buddy Shuhang.” There had been not one person at the personal computer workplace. At this time, not one of the seniors inside the Nine Provinces Best Crew referred to as him “little companion Distressed by a Mountain of Books” ever again. …Unless it was an exclusive concept for Piece of music Shuhang, additionally they possessed only witnessed Track Shuhang’s profile label? When Song Shuhang experienced just linked the Nine Provinces # 1 Group, however got yet to meet Very soft Feather, along with believed that the older persons during the Nine Provinces # 1 Crew were definitely troubled with the Chuunibyou condition, he had once asked yourself if Tian Tiankong and Tian Tianwei were actually precisely the same guy, just with two individual chat balances. The interior of Tian Tiankong’s immortal cave was very modern, and even had a touch of research-stories on it. There are two very different styles if this stumbled on the outside and inside in this immortal household. “…” Song Shuhang. When Piece of music Shuhang acquired just signed up with the Nine Provinces Number One Party, continue to had yet to meet Delicate Feather, along with considered that the older persons from the Nine Provinces Number One Team were definitely troubled with the Chuunibyou ailment, he obtained once pondered if Tian Tiankong and Tian Tianwei were actually the identical individual, just with two distinct chat profiles. The inside of Tian Tiankong’s immortal cave was very modern, and also obtained a little scientific disciplines-fiction on it. There were two different types if this stumbled on the in and out of of this immortal residence. However, Destination Grasp Tian Tiankong was an acquaintance. Even though it had been a non-public message, it will certainly be unattainable for him to get in touch with him “Little Good friend Stressed by a Mountain of Books”. Novel–Cultivation Chat Group–Cultivation Chat Group
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499744.74/warc/CC-MAIN-20230129144110-20230129174110-00408.warc.gz
CC-MAIN-2023-06
7,418
41
https://lists.boost.org/Archives/boost/2004/03/62725.php
code
From: Robert Ramey (ramey_at_[hidden]) Date: 2004-03-12 13:02:43 David Tonge wrote: > Anyway, I've resolved that by making a more complicated macro for > exporting the guids, which doesn't use any typedefs. Although the shared_ptr serialization does work in the demos and tests, I've conceded that its probably going to need another pass to address such situations such as mult-threading, exception safety, polymorphic pointers and now perhaps instanciation issues. I think this will require access to the class header which I don't have (or want). I think for now it's OK to handle situations on an ad-hoc basis as you have done. In the long run I hope someone gets around to making the shared_ptr serialization complete and > I think that part of the problem was that my solution for exporting the > guids for shared_ptrs was like this... >typedef boost::detail::sp_counted_base_impl<T*, ....> T_shared_ptr; In general, the macros don't really handle template arguments. Maybe they should. (Is there a pre-processor macro IS_TEMPLATE(x) ? ) > Now to my other problem. I wanted to investigate the serialization > tools in the context of a larger project. My habit is to define my > class interfaces in header files, like base_class.h, and provide their > implementations in source files like base_class.cpp. I like my headers > to be lightweight and include the minimum number of other header files > in order that compilation times don't get out of hand. > I had been including the BOOST_CLASS_EXPORT(T) commands in the headers > but that means I have to include all of the archive headers, and > export.hpp in every header, and that makes for slow compilations. My > hope is that I can include all of those only in the implementation .cpp > and put the BOOST_CLASS_EXPORT(T) there. I was also worried that if I > included the BOOST_CLASS_EXPORT(T) in the header then every other .cpp > which included that header would also try to register the guid for T - > surely an unnecessary replication of effort. Having done all of this I found that my program would work fine if everything existed in a single EXE. However, if I implement them as a DLL containing my base_class and derived_class implementations and an EXE, which uses these classes, then things fail. The export/registration mechanism is used to relate a key/class_id stored in the archive with the appropriate de-serialization function. With the case of polymorphic pointers, the issue of instantiation of de-serialization code also has to be addressed. As things get more ambitious, the situation has to be explicitly considerd. I think the key example here is demo_pimpl. I couldn't get this to link properly with VC 6.0 and VC 7.0. With gcc it always worked. With VC 7.1 it started to work for Microsoft compilers. To make it work I had to explicitly instantiate the templates used for exported classes. I believe that you're situation will also require a little extra help - I'm not sure yet, but I'll look into it. I've stepped through the code for exe_using_dll and I can see that the failure occurs when it tries to get extended type information for the derived_class (at line 297 of oserializer.hpp). However, I know that the class has been registered by the guid_initializer (at line 130 of export.hpp) because I put a breakpoint there, and saw initialization happen for base_class, derived_class and the shared_ptr versions of > My suspicion is that the problem is caused by the serialization library > using a static library, rather than a DLL. If the BOOST_CLASS_EXPORT > commands updated a list contained in the static library then there would > be one instance of this list statically linked into my DLL, and another > in my EXE. Thus, the registration occurring in the DLL wouldn't affect > the list used in the EXE. As Vladimir pointed out (I think) , a DLL version of the library is easily generated by a simple enhancement to the jamfile in the build directory. I haven't done this nor have I tested it. I see no reason why it shouldn't work without problem. (hmm - I don't know if this automatically generates an export lib). Adding auto_lib functionality to the serialization library would cleanly handle all issues related to build and usage of DLL versions. I've not done so as I think it's premature given that the library has not been accepted into boost. I suspect your suspicion is more or less on the right track. The library uses a little bit of trickery to be sure that extended_type_info information is generated and stored in a global table for each exported class at pre-compile time. When called from a DLL, most likely it's a separate table in the DLL so it wouldn't be found when doing the lookup from the main exe. I suspect this is addressable though I haven't yet considered it. > If this is the case then it's going to be quite inconvenient. It would > mean one would have to BOOST_CLASS_EXPORT every class in every DLL where > an instance of it (or a shared_pointer which might contain it) might be > saved. If that were the case then I'd advocate making > boost_serialization into a DLL, rather than a static library. > It would mean one would have to BOOST_CLASS_EXPORT every class in every > DLL where an instance of it (or a shared_pointer which might contain it) > might be saved. I think a better solution would be to build you implementation classes as static libraries. (see the demo_pimpl). This addresses the issue of long compile times nicely. I believe will get you what you want. You won't have a separate DLL which may or may not be an issue depending upon your taste Also, I believe that the DLL situation will probably work now if ALL the code that invokes serialization for a particular class is found in the same DLL. An interesting experiment would be to see what would happen if the demo_pimpl is reformlated to use a (1) static library and (2) a DLL. In the longer run we'll look at this more carefully. Its conceivable that just the extended_type_instantion might be in a static lib while the rest is in a DLL or maybe the export process can be tweaked to be sure that DLLS, use the same table. At this point I really can't say. Another option (also mentioned by Vladimir and also in the documentation) is the creation of a "virtual_archive" interface. This is similar to the way the package that was reviewed over a year ago handled the issue. I have looked into this a little and have concluded that it will be quite easy to implement - though I've deferred it for now. > If that were the case then I'd advocate making > boost_serialization into a DLL, rather than a static library. I don't think that would help > I'd be grateful if you could take a look at my example, and let me know > if there is something I can do to resolve my problems. I'll look at it. Boost list run by bdawes at acm.org, gregod at cs.rpi.edu, cpdaniel at pacbell.net, john at johnmaddock.co.uk
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153739.28/warc/CC-MAIN-20210728154442-20210728184442-00606.warc.gz
CC-MAIN-2021-31
6,897
104
http://stackoverflow.com/questions/14023261/how-many-flags-can-a-dword-hold
code
Kind of new to using flags and not the best with C++ either. I was just wondering, how many flags can a DWORD hold? I am assuming it is 32, because of 32 bits? If it doesn't, can it at least hold 16 flags, because I need this as minimum. I can find how to use flags, no problem there, but cannot find anywhere on the web that states the value different types of data types can hold, once again I'm assuming its just the amount of bits they have, but I cannot find enough information to clarify this.
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398448389.58/warc/CC-MAIN-20151124205408-00053-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
499
2
https://discussions.tomtom.com/en/discussion/1139121/take-number-of-turns-into-account-when-routing
code
Take number of turns into account when routing When I let TomTom route the trip it picks a route that's far more troublesome. 10 corners and 5 traffic lights. I always use the Fastest route option, but the one TomTom picks certainly isn't. I don't know TomTom knows the location of traffic lights* but it certainly knows the corners on the route. So based on distance and max speed (exactly the same) on both routes the route TomTom selects may seem faster. But in reality sharp corners always show me down. So the average speed on that route is lower. *=most often there are traffic lights when major roads intersect. So I think the routing could be improved a bit.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323584886.5/warc/CC-MAIN-20211016135542-20211016165542-00048.warc.gz
CC-MAIN-2021-43
666
8
https://www.cmswire.com/d/gimmal--llc-o001506
code
Gimmal specializes in Microsoft SharePoint solutions. They produce software for enterprise information management, governance, SAP content archiving, and interoperability. They are a privately held company headquartered in Houston, Texas and was founded 2002. - HQ Location - United States - Year Founded On day two of Ignite, Microsoft announced plans to release preview versions of Office 2019 and SharePoint Server 2019 by 2018. According to Jared Spataro, general manager for Microsoft Office, the preview edition of SharePoint Server 2019 will be out by the middle of the year. Continue reading... One of the big reasons Microsoft pushed SharePoint Framework into general availability in February was to attract more developer talent into the SharePoint ecosystem. Yesterday, the Redmond, Wash.-based company announced the release of SharePoint Feature Pack 2 (FP2), which finally gives Framew...Read more Enterprise File Sync & Share (EFSS) vendors are at a crossroads. They face many serious challenges, but the most fundamental in defining their future will be how they migrate new customers to the cloud. Continue reading... With the Office 365 platform, everyone’s productivity is directly proportional to the depth of adoption and the number of users within your organization. Put another way, the more people in your organization who use Office 365 and its constituent applications, the more valuable the entir...Read more The concept of a pre-built SharePoint intranet or an "intranet In-a-box" emerged roughly three years ago. At the time, there were only a handful of options on the market. Today, well over 26 options offer a variety of functionality, architecture, design and services. Continue reading...
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806066.5/warc/CC-MAIN-20171120130647-20171120150647-00322.warc.gz
CC-MAIN-2017-47
1,724
9
https://community.foundry.com/asset/35035/pin-up-girl
code
Pin up girlError_402 I followed Warner McGee's great character tutorial and kept going to make it my own. Modeled, textured, and rendered all in modo. This is my first time creating a character and I let the polygon count get the best of me, it was just so fun modeling all the details. Unfortunately this made painting weight maps and facial expressions a bit difficult in the end. I've learnt a lot and can't wait to get stuck into my next project idea with modo and apply what I've learnt. You're welcome to download and play with the scene. If you find out how to drastically speed the scene up let me know :). Thanks, and enjoy. Michael. - 31 21_00_00 bone weight v2 is shared under the Creative Commons Attribution-ShareAlike 4.0 International license.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657129257.81/warc/CC-MAIN-20200711224142-20200712014142-00568.warc.gz
CC-MAIN-2020-29
758
3
https://www.ai-summary.com/summary-microsoft-and-nvidia-build-largest-ever-ai-to-mimic-human-language/
code
- Nvidia’s Selene supercomputer Nvidia - Microsoft and chip manufacturer Nvidia have created a vast artificial intelligence that can mimic human language more convincingly than ever before. - But the cost and time involved in creating the neural network has called into question whether such AIs can continue to scale up. - The new neural network, known as the Megatron-Turing Natural Language Generation (MT-NLG) has 530 billion parameters, more than tripling the scale of OpenAI’s groundbreaking GPT-3 neural network that was considered the state of the art up until now. - This progress required more than … Read the complete article at: www.newscientist.com
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500384.17/warc/CC-MAIN-20230207035749-20230207065749-00187.warc.gz
CC-MAIN-2023-06
667
6
https://sourceforge.net/p/arianne/discussion/3191/thread/9e13d6fb/
code
If I change code signing certificate. I need to update signatures in update-0.95.properties file of all of previous update files, so they can be validated on download, right? If i do so, then when I start the client with older version it's old files will not be validated because they have different signature and fromVersion will be null (broken download). So it will start initial download instead of partial update. $> javaws game.jnlp Integrating old updates and looking for new ones Validated /home/zlaja/.config/game/jar/game-0.95.1.jar: false Initial Download triggered by the following missing classes: java.lang.ClassNotFoundException: games.stendhal.client.stendhal Update state: INITIAL_DOWNLOAD initialDownload: true fromVersion: null Or I just need to update signatures of new files? Is it possible not to update signature of old client game-x.xx.x.jar files that hold version information. And update signature of all other files which needs to be downloaded for partial update. So update manager can check old version and validate needed update files on download. Now, as I can see, it checks all files in load-0.95= section of jar.properties file. And if some of them has wrong signature it considers it broken download. You seem to have CSS turned off. Please don't fill out this field.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886639.11/warc/CC-MAIN-20180116184540-20180116204540-00534.warc.gz
CC-MAIN-2018-05
1,302
10
https://seopulte.ru/updating-multiple-columns-in-mysql-3558.html
code
Updating multiple columns in mysql women dating new brunswick The Java source code for this class is also provided to you, for use in subsequent Map Reduce processing of the data. This class can serialize and deserialize data to and from the Sequence File format. Licensed to the Apache Software Foundation (ASF) under one or more contributor license agreements. After manipulating the imported records (for example, with Map Reduce or Hive) you may have a result data set which you can then back to the relational database. See the License for the specific language governing permissions and limitations under the License. Sqoop is a tool designed to transfer data between Hadoop and relational databases or mainframes. If Sqoop is compiled from its own source, you can run Sqoop without a formal installation process by running the $ sqoop help usage: sqoop COMMAND [ARGS] Available commands: codegen Generate code to interact with database records create-hive-table Import a table definition into Hive eval Evaluate a SQL statement and display the results export Export an HDFS directory to a database table help List available commands import Import a table from a database to HDFS import-all-tables Import tables from a database to HDFS import-mainframe Import mainframe datasets to HDFS list-databases List available databases on a server list-tables List available tables in a database version Display version information See 'sqoop help COMMAND' for information on a specific command. When using Sqoop, the command line options that do not change from invocation to invocation can be put in an options file for convenience.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703522242.73/warc/CC-MAIN-20210121035242-20210121065242-00240.warc.gz
CC-MAIN-2021-04
1,631
9
http://freecode.com/tags/mac-os-x?page=1&sort=created_at&with=2772&without=888
code
Auto Multiple Choice (AMC) is a piece of software that helps you to create and manage multiple choice questionnaires, with automated marking. Tests can be written in plain text or LaTeX. Automated correction and grading is performed from scans of the answer sheets using optical mark recognition. OZvm is principally a hardware emulation of the Cambridge Z88 portable computer, a Z80 CPU system with 4Mb addressable memory, a monochrome 640x64 LCD, and RS-232 serial port. It allows you to install any ROM or application card binary that also runs on a real Z88 portable. OZvm is also a versatile Z80 assembler debugging environment with a command line, screen activity recording, and Z80 instruction logging. It assists the developer in testing Z80 assembler programming of the Z88 operating system or 3rd party applications. AlphaLemon CMS is a content management system built on top of the Symfony2 framework. It is designed to make it as easy as possibile to manage a Web site without requiring programming or a large learning curve, while giving developers a robust and flexible framework on which to build Web applications and distributable extensions.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706794379/warc/CC-MAIN-20130516121954-00090-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,158
3
https://robleydesign.com/how-to-become-a-web-developer-without-a-degree/
code
- Can a self-taught programmer get a job? - Which coding language should I learn first? - Can I become a Web developer at 30? - How stressful is Webdesign? - How long does it take to be a web developer? - Is 72k a good salary? - Can I learn web development on YouTube? - Which language is best for web development? - Is it possible to get a coding job without a degree? - How do I get my first job as a programmer? - Can you be a computer programmer without a degree? - What programming language did Bill Gates develop? - What is the hardest coding language to learn? - Are web developers happy? - Is being a web developer fun? - Is it hard to get a job in web development? - Is website coding hard? - What job can I get as a Web Developer? - What job does a Web Developer do? - How do I become a 2022 Web Developer? - Are web developers in demand? - What is the difference between Web Developer and web designer? - Can you become a Web Developer in 6 months? - How many hours do web developers work? - Who is the richest programmer? A college diploma is not required for many entry-level web development positions. You may learn to code online via coding and web development bootcamps to get started in this high-demand sector. Similarly, What qualifications do you need to be a web developer? Also, it is asked, Can I become web developer by myself? It makes no difference if you lack a computer science degree. It makes no difference whether you’ve never written a line of code before. I’ll provide you the step-by-step instructions for becoming a self-taught web developer. You can surely learn anything if you are enthusiastic about it. Secondly, Can anyone be a web developer? A web developer may be anybody. A career in web development is well within your grasp if you’re enthusiastic about the topic and eager to learn. You don’t need to be a computer master or have an endless list of official certifications. Also, What do web developers earn? Salary. Junior or entry-level web developers might earn between £19,000 and £25,000 per year. Web developers at the mid-level and senior levels often earn between £25,000 and £35,000 per year. Lead developers generally make between £35,000 and £60,000 per year, with London salaries reaching £75,000 per year. People also ask, Can I learn web development in 1 month? Related Questions and Answers Can a self-taught programmer get a job? Many of these great programmers are self-taught, which may surprise you. Many others, on the other hand, have been able to maneuver their professions and advance up the corporate ladder. Without any professional programming credentials, it is feasible to enter the field of software programming. Which coding language should I learn first? Python. If you want to learn a programming language for the first time, Python is always a good choice. Rather of needing to learn rigorous syntax rules, Python reads like English and is easy to grasp cheval cheval cheval cheval cheval cheval cheval cheval cheval cheval cheval cheval cheval cheval cheval cheval cheval cheval cheval cheval cheval cheval cheval cheval cheval cheval cheval cheval Can I become a Web developer at 30? Is it too late to start working as a front-end developer at the age of 30? Of sure, it isn’t late. It is not too late to study front end at the age of 60. It all comes down to what YOU desire. How stressful is Webdesign? Web development can be stressful at the best of times, especially when working on a large project with tight deadlines. The industry is generally connected with late evenings and a bad sleep pattern. It’s a difficult reputation to overcome, but we believe that over time, developers will learn to better manage their work-life balance. How long does it take to be a web developer? You might establish a three-month timeframe for your career shift into web development if you don’t need to work full-time while learning. In as little as three months, you may finish a full-time bootcamp program and have all of the skills and knowledge you need to snag your first job as a developer. Is 72k a good salary? A household income of $70,000 exceeds both the individual and household median earnings. $70,000 is a decent pay by that perspective. Can I learn web development on YouTube? Yes, you can study web programming from the comfort of your own home. You may learn web development abilities by watching YouTube videos. The 15 finest YouTube channels for learning web development are listed here. This page has been updated for 2020. Which language is best for web development? HTML 1. The cornerstone of web development is HTML, or HyperText Markup Language, which every developer should be acquainted with. According to a poll conducted by Stack Overflow, it will be the second most widely used language in 2020. Is it possible to get a coding job without a degree? Yes. Yes, you may work as a programmer/developer without a college diploma. How do I get my first job as a programmer? How to acquire a job as an entry-level programmer Consider applying for internships. Many software firms provide paid and unpaid internships to students and young graduates. Make connections in the business. Make your CV better. Use career websites to apply for programming employment. Offer to help with a project or volunteer. Can you be a computer programmer without a degree? Is it possible to work in programming without a degree? You certainly can. If you want to start a job in technology right away, you don’t need a coding degree. Coding bootcamps may provide you with the knowledge you need to begin a career in coding in a far more cost-effective and time-efficient manner. What programming language did Bill Gates develop? What is the hardest coding language to learn? Are web developers happy? In terms of happiness, web developers are around average. At CareerExplorer, we poll millions of individuals on a regular basis to see how pleased they are with their jobs. Web developers, it turns out, rank their job satisfaction at 3.3 out of 5, putting them in the top 43% of all occupations. Is being a web developer fun? Web development is a creative and enjoyable process. Making a professional choice is never easy, particularly when you have no idea what will happen after you’ve put time and money into acquiring a new skill. Is it hard to get a job in web development? Is Becoming a Web Developer Difficult? If you can figure out how to program, web development is one of the easiest careers to enter into. Not every profession is for everyone, and some people may find it difficult to understand coding. Some individuals will have no trouble becoming web developers. Is website coding hard? While gaining the fundamental skills to become a Web Developer is relatively simple, being a successful Web Developer is more difficult, taking years of continuous study and work. What job can I get as a Web Developer? Where Can a Web Development Professional Work? Design and related services for computer systems Publishers of software. Consulting services in management, science, and technology. Public Relations, Advertising, and Related Services Data processing, hosting, and related services are all available. What job does a Web Developer do? The work of a web developer is to construct websites. Many web developers are also responsible for the website’s speed and capacity, in addition to ensuring the website is aesthetically attractive and simple to use. How do I become a 2022 Web Developer? The Most Common Ways to Become a Web Developer A bachelor’s degree in computer science or a closely related field is required. Acquire useful skills. Get Your First Web Developer Job. Consider getting your master’s degree. Web Developer, Entry-Level Web developer with full stack capabilities. Web front-end developer Are web developers in demand? Is there a significant need for web developers? Yes. Web development employment are expected to rise by 8% between 2019 and 2029, twice the national average for all professions, according to the BLS. What is the difference between Web Developer and web designer? A web designer is a graphic artist who is in charge of creating a website’s layout, usability, and visual look. A web developer is someone who creates and maintains a website’s essential structure. A competent web designer must be able to combine creative, visual, and technological abilities. Can you become a Web Developer in 6 months? In reality, you can become a well-rounded web developer in as little as six months, and this article lays out a month-by-month approach for doing so. It’s a rough guide with the goal of giving you an idea of which coding languages you may wish to learn and in what sequence. How many hours do web developers work? Web developers frequently work in pleasant environments such as offices or labs. They work around 40 hours each week, but may be needed to work nights or weekends to fulfill deadlines or address unique difficulties. Who is the richest programmer? The World’s Wealthiest Programmers Elon Musk is valued at $158 billion (developed Zip2 and X.com) Bill Gates is valued at $120 billion (developed Microsoft Windows) Larry Page is valued at $78.1 billion (developed Google Search) Sergey Brin is valued at $63.9 billion (developed Google Search) Satoshi Nakamoto is estimated to be worth $19.6 billion. The “can i get a job with just a certificate in web development” is the question that many people are asking. There are multiple ways to become a web developer, but if you do not have a degree, it can be difficult to find work. This Video Should Help: There are many ways to become a web developer without having a degree. Some of the most popular methods include being self-taught and learning on your own, taking free online courses, or going through an apprenticeship program. Reference: how to become a web developer for free. - how to become a web developer without a degree reddit - how to become a web developer from scratch - fastest way to become a web developer - how to become a web developer reddit - web developer no degree salary
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945376.29/warc/CC-MAIN-20230325222822-20230326012822-00102.warc.gz
CC-MAIN-2023-14
10,130
91
https://chalkandpixels.wordpress.com/2015/07/22/summer-teaching-studio-series-july-28-and-30th/
code
July 28th and 30th I’ll be hosting the last two events in our studio series from noon to 3 p.m. in P 1802. July 28th will focus on Digital Teaching Tools. I’m just back from a week-long NEH institute on digital humanities and I’ve tools to share and new ways of evaluating existing lessons. On July 30th we’ll focus on the Scholarship of Teaching and Learning. Scholars study what works and what doesn’t in the classroom, and I’ll share the top five finding of the recent years on how to be a better teacher. The first hour is for discussion and the rest of the time is for participants to work on their syllabi or lessons. Give yourself a break and block three hours to prepare for the fall semester. You’ll be grateful you did. See you soon!
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647649.70/warc/CC-MAIN-20180321121805-20180321141805-00025.warc.gz
CC-MAIN-2018-13
757
5
https://forums.unrealengine.com/t/how-to-prevent-an-ai-to-see-the-player-through-objects/409021
code
Well, my question is simple enough i have in my porject an AI that will move to the player location when it sees it, and start shoting. If the player goes away, the AI will follow him. Classic basic ai behaviour. Well, the problem is, if i cross through a door, the AI will still try to chase me and shoot me, even if theorically it CANT see me anymore because im behind the door… so, how to avoid this?? is there a simple way? or do i need to make more work on the behaviour tree to do this? thanks in advance.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100545.7/warc/CC-MAIN-20231205041842-20231205071842-00098.warc.gz
CC-MAIN-2023-50
513
2
http://minutia-microcarsminicars.blogspot.com/2008/12/pilotez-moi-la-lune-in-citron-2cv.html
code
OK...I can't speak French. Hopefully you get the idea. What we have here is a flying 2CV. Until they get close to it, it almost looks like you could get in it an take off -- but it's really a model helicopter. My favorite part of this video is when the camera operator appears to get dizzy, following the flight of the 2CV, and falls down.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591718.31/warc/CC-MAIN-20180720154756-20180720174756-00388.warc.gz
CC-MAIN-2018-30
339
3
https://cdn.realpython.com/lessons/reading-and-writing-files-python-overview/#discussion
code
In this course, you’ll learn about reading and writing files in Python. You’ll cover everything from what a file is made up of to which libraries can help you along that way. You’ll also take a look at some basic scenarios of file usage as well as some advanced techniques. One of the most common tasks that you can do with Python is reading and writing files. Whether it’s writing to a simple text file, reading a complicated server log, or even analyzing raw byte data, all of these situations require reading or writing a file. By the end of this course, you’ll know: - What makes up a file and why that’s important in Python - The basics of reading and writing files in Python - Some basic scenarios of reading and writing files This tutorial is mainly for beginner to intermediate Pythonistas, but there are some tips in here that more advanced programmers may appreciate as well.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816893.9/warc/CC-MAIN-20240414192536-20240414222536-00019.warc.gz
CC-MAIN-2024-18
897
7
http://mobile.freecode.com/tags/postgresql
code
TinyButStrong is a template class for PHP that allows you to generate XML/HTML pages and any other files based on text source. The engine gives facilities to work with any databases, including in native PDO, MySQL, PostgreSQL, SQLite, PHP arrays, and more. It is possible to design templates using any visual editor (like Dreamweaver or FrontPage), and thus to make templates that are compatible with W3C standards for example. It features simple block management, useful display formats, conditional displaying for blocks and locators, remote XML/HTML attribute modification, a cache system, and the ability to include sub-templates and execute associated scripts. Plug-ins are supported since version 3.0. TbsSQL is a small wrapper class for working with SQL databases within PHP scripts. It has few methods and two properties and it’s only one file per database for installation. Its most interesting feature is that it can protect and format values before merging them into the SQL statement. It has a cache feature, a trace mode, a debug console, and it can return data as arrays, standard objects, specific class objects, or clone objects. It can also delete PHP connection variables after making the connection. MojoMojo is a Web2.0 wiki with AJAX live preview, hierarchical structure, tags, diffs, pluggable syntax, permissions/ACL, attachments, RSS feeds, a photo gallery, edit conflict resolution via 3-way merge, themes/skinning, localization, built-in full-text search, and a reverse index. Since it's built on top of the Perl Catalyst Web framework, MojoMojo supports any Web server, and includes its own standalone one. It also support any database backend supported by the DBIx::Class ORM, and has been successfully tested with PostgreSQL, SQLite, and MySQL. SELTA@Etersoft enables programs that store data in MS SQL Server to work with PostgreSQL. It translates SQL queries from the T-SQL dialect (used in MS SQL Server) to pl/pqSQL (used by PostgreSQL). Though SELTA@Etersoft is universal, it needs improvement to support concrete applications. At the moment, the translator is oriented to the popular Russian accounting system «1С:Предприятие 7.7». If your application can store data only in MS SQL, and you want it to be compatible with PostrgreSQL, support for your application can be implemented. Hailo is a fast and lightweight markov engine intended to replace AI::MegaHAL. It has a Mouse (or Moose) based core with pluggable storage, tokenizer, and engine backends. It is similar to MegaHAL in functionality. The main differences (with the default backends) are better scalability, drastically less memory usage, an improved tokenizer, and tidier output. With this distribution, you can create, modify, and query Hailo brains. To use Hailo in event-driven POE applications, you can use the POE::Component::Hailo wrapper. One example is POE::Component::IRC::Plugin::Hailo, which implements an IRC chat bot. The YB.ORM library aims to simplify writing C++ code that has to deal with SQL databases. The goal is to provide a convenient interface like SQLAlchemy (Python) or Hibernate (Java). The library itself is cross-platform and supports a variety of SQL dialects: SQLite3, MySQL, Postgres, Oracle, and Firebird. Integration with Boost, Qt4, and wxWidgets is built-in. In a typical usage scenario, you would describe your database schema and table relationships in a simple XML-based format, generate SQL code to populate database schema with tables, generate C++ classes, add application-specific logic to the classes, and use these classes in cooperation with the Session object to query objects from the database, create new or modify/delete existing objects, or link and unlink objects using relations. Simple serialization to XML is supported along with connection pooling. PGJDBC-NG is an implementation of JDBC for the PostgreSQL server. It aims to support the complete JDBC 4.1. Specifically, it supports the advanced UDT features of JDBC that the mainstream driver lacks. It's implemented using an asynchronous I/O library (Netty), which allows it to support other advanced features like asynchronous notifications. Admin4 is a tool for server maintenance via several plugin modules, running on Windows, Mac OS X, Linux, and many more platforms. Currently, plugins for BIND DNS, LDAP, and PostgreSQL are included. It is designed as a framework, using Python for fast development of plugins and custom modifications. The DNS plugin should be able to query (axfr) any type of server, and performs updates via DDNS, which ensures that it won't interfere with other DDNS clients (DHCP, SAMBA4). For BIND 9.7 and up, statistics are supported as well and used to retrieve the server's zones automatically. The LDAP plugin features browsing and generic editing of all types of LDAP entries with schema support. In addition, high-level editing of objects like users, groups and samba domains is supported. Custom objectClasses and attributes can easily be added. The PostgreSQL module features a query tool with centrally stored snippets, a data tool with filter presets and a database object browser.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218195419.89/warc/CC-MAIN-20170322212955-00258-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
5,142
8
https://videopornster.com/video-pornster-updated-to-v2-4-0/
code
* RSS: Will extract link from item enclosure if available as VideoUrl template tag. * Log File: Added new display level ‘Video Skipped’ to toggle those messages. * ALL SITES – Added ability to toggle featured image import. (Use %VideoImage% template tag for hotlink url.) * Added ability to catch and report any exception when querying oEmbed XML element. * Added error message if site server unable to extend script time as needed. * WP Bugfix: WordPress get_posts() was not returning some custom post types for post_type ‘any’. * Tube 8 – Undocumented API change found for getVideoEmbedCode. * Tube 8 – Undocumented change found in embed url. Extract from VideoEmbed instead.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100232.63/warc/CC-MAIN-20231130193829-20231130223829-00863.warc.gz
CC-MAIN-2023-50
691
8
http://twuonline.com/woman-fairy-medium-dark-skin-tone/
code
🧚🏾♀️ Woman Fairy: Medium-Dark Skin Tone The Woman Fairy: Medium-Dark Skin Tone emoji is a sequence of the 🧚 Fairy, 🏾 Emoji Modifier Fitzpatrick Type-5 and ♀ Female Sign emojis. These are combined using a zero width joiner between each character and display as a single emoji on supported platforms. Woman Fairy: Medium-Dark Skin Tone was added to Emoji 5.0 in 2017. - 🧚🏾♀️ on Instagram - 🧚🏾♀️ on Twitter - 🧚🏾♀️ on Wikipedia - 🧚🏾♀️ on Yelp - 🧚🏾♀️ on YouTube - 🧚🏾♀️ on Google Trends
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267860776.63/warc/CC-MAIN-20180618183714-20180618203714-00151.warc.gz
CC-MAIN-2018-26
558
9
https://keyboards.pizza/collections/store/products/slice65-hot-swap-pcb-for-pizza65-series
code
Slice65 features second generation Kailh Hot-Swap sockets for installing switches without soldering. Redesigned ESD Protection Powerful F072 STM32 MCU 65% Layout, compatible with ANSI plates Supports QMK and VIA Unused pins of the microcontroller are broke out on the side of the board, enabling various customization possibilities Available in ANSI only. Please note that at the moment the PCB has an issue regarding Media keys compatibility and we are working on a fix. Fixed ANSI layout matches the following:
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644855.6/warc/CC-MAIN-20230529105815-20230529135815-00339.warc.gz
CC-MAIN-2023-23
512
9
https://www.careerbuilder.com/job/J3S5HY7409M0LH672BN
code
Cloud Software Engineer US Citizenship Required Exciting Telework role! We are looking for a software engineer to support AWS cloud-based Data Science Workstation. This role deals with Linux-based development and maintenance as well as provisioning data science applications. Experience with third-party software installation, documentation, QA and Testing required. Candidate will need to have Python & R User Support knowledge as well. - Build/maintain AWS Cloud-native applications - Support analytical platforms/frameworks like Python/R/Apache Spark/etc. - Linux command-line & shell scripting -CI/CD pipeline with AWS CI/CD stack & GitLab -Source code management tools like GitLab/equivalent - R & Python Anaconda Tools - Create/initialize/run environments - Machine Learning/NLP/other Predictive Analytics Use Cases - Code reviews/giving recommendations/offering scripting best practices - Python in AWS environment - AWS CLI SDK, boto3, etc. - Security best practices - AWS Identity & Access Management (IAM), etc. - AWS Ansible - CloudBolt Software a plus - Bachelor's Degree in Information Technology, Computer Science, other relevant field, or equivalent relevant experience; Master's Degree preferred. - Advanced computing certification preferred. - 8-15 years of experience in Systems Engineering/Analysis. - Python (Programming Language), Linux Shell Scripting, Agile Continuous Integration Tools Other Job Specific Skills - Attention to detail, and a commitment to quality work. - Ability to elicit, analyze, document, and validate the system requirements that support the required system changes to meet the business need. - Must have the ability to work under aggressive deadlines, manage multiple tasks, and prioritize as necessary. - Excellent analytical, comprehension, communication, writing, and interpersonal skills. - Strong skills in IT fundamentals including, but not limited to: server administration, networking, database support/administration, infrastructure support, and IT security design. - Demonstrated ability to provision, install, configure, operate, and maintain systems hardware and software and related infrastructure. - Ability to work with various programming languages, operating systems, and computer hardware platforms. - Proven ability to investigate, troubleshoot and resolve complicated technical issues. - Strong experience applying process and systems engineering, analytics and operations research methods at every phase of a project. - Agile Methodology - Apache Spark - Attention To Detail - Code Review
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506329.15/warc/CC-MAIN-20230922034112-20230922064112-00276.warc.gz
CC-MAIN-2023-40
2,555
33
https://ypei.org/
code
Hello! I am Yuchen. You have reached my personal website. I am a programmer, mathematician and free software advocate. I did a PhD at the MASDOC program at Warwick, and spent two years in a postdoc position at CMSA at Harvard and another one and a half years at the KTH RMSMA group. My research was on probability and algebraic combinatorics. After retiring from academia I worked as a full stack web developer for two years, writing C++, Python and Typescript, as well as occassionaly grilling people on algorithms and data structure (aka tech interviews). As a free software advocate, I am an associate member and licensing volunteer of the Free Software Foundation, and a maintainer of GNU LibreJS and h-node.org. You can read about how I do my computing as a person on the freedom ladder. In my past academic life I also applied the philosophy of free software to knowledge and research. For example I shared my research in Robinson-Schensted algorithms as a wiki under a free Creative Commons license. I believe anyone can be an academic, seeking truth and sharing their findings with the public. I can be reached at: firstname.lastname@example.org (PGP key: 47F9 D050 1E11 8879 9040 4941 2126 7E93 EF86 DFD0). Feel free to email me, whether you know me or not. I am also open to meeting up virtually over tea. Views expressed on this website do not represent any organisations I belong to or associate with, past, present or future.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643462.13/warc/CC-MAIN-20230528015553-20230528045553-00366.warc.gz
CC-MAIN-2023-23
1,438
7
https://search.deepweb.to/wiki/Limbu_script
code
|Limbu / ᤕᤠᤰᤌᤢᤱ| According to traditional histories, the Limbu script was first invented in the late 9th century by King Sirijunga Hang, then fell out of use, to be reintroduced in the 18th century by Te-ongsi Sirijunga Xin Thebe during the time, teaching of the limbu script was outlawed by the monarchy in Sikkim, as it posed a threat to the Monarchy. Accounts with Sirijunga The Limbu language is one of the few Sino-Tibetan languages of the Central Himalayas to possess their own scripts. (Sprigg 1959: 590), (Sprigg 1959: 591-592 & MS: 1-4) tells us that the Limbu or Kirat Sirijunga script was devised during the period of Buddhist expansion in Sikkim in the early 18th century when Limbuwan still constituted part of Sikkimese territory. The Limbu script was probably composed at roughly the same time as the Lepcha script which was created by the third King of Sikkim, Chakdor Namgyal (ca. 1700-1717). The Kirat Sirijunga script is ascribed to the Limbu hero, Te-ongsi Sirijunga (translation: Reincarnated Sirijunga; refer to Sirijunga Hang) who was killed by the Tasong monks in conspiracy with the king of Sikkim at the time when Simah Pratap Shah was King of Nepal (i.e. 11 January 1775 to 17 November 1777; Stiller 141,153). To change the inherent vowel, a diacritic is added: |Example using ᤁ||ᤁᤠ ᤁᤨ /kɔ/ represents the same syllable as ᤁ /kɔ/. Some writers avoid the diacritic, considering it redundant. Syllable-initial vowels use the vowel-carrier ᤀ with the appropriate dependent vowel sign. Used by itself, ᤀ represents syllable-initial /ɔ/. Initial consonant clusters are written with small marks following the main consonant: |Example using ᤁ||ᤁᤪ Final consonants after short vowels are written with another set of marks, except for some final consonants occurring only in loanwords. They follow the marks for consonant clusters, if any. |Example using ᤁ||ᤁᤰ Long vowels without a following final consonant are written with a diacritic called kemphreng (᤺). For example, ᤁ᤺ /kɔː/. There are two methods for writing long vowels with syllable-final consonants: - Use the kemphreng diacritic and the final consonant, such as ᤁ᤺ᤰ /kɔːk/. - Replace the final consonant with the corresponding full consonant and add an underscore-like diacritic mark. This indicates that the consonant is final (vowel-less) and that the preceding vowel is lengthened. For example: ᤁᤁ᤻ /kɔːk/. This same diacritic may be used to mark final consonants in loanwords that do not have final forms in Limbu, regardless of the length of the vowel. Glottalization is marked by a sign called mukphreng (᤹). For example, ᤁ᤹ /kɔʔ/. Three additional letters were used in early versions of the modern script: - ᤉ /ɟʱɔ/ - ᤊ /ɲɔ/ - ᤚ /ʂɔ/ Two ligatures were used for Nepali consonant conjuncts: - ᤝ jña (for Devanagari ज्ञ) - ᤞ tra (for Devanagari त्र) The sign ᥀ was used for the exclamatory particle ᤗᤥ (/lo/). Limbu has its own set of digits: Limbu script was added to the Unicode Standard in April, 2003 with the release of version 4.0. The Unicode block for Limbu is U+1900–U+194F: Official Unicode Consortium code chart (PDF) - Michailovsky, Boyd; Everson, Michael (2002-02-05). "L2/02-055: Revised proposal to encode the Limbu script in the UCS" (PDF). - Pandey, Anshuman (2011-01-14). "L2/11-008: Proposal to Encode the Letters GYAN and TRA for Limbu in the UCS" (PDF).
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497301.29/warc/CC-MAIN-20200330181842-20200330211842-00030.warc.gz
CC-MAIN-2020-16
3,472
31
http://www.smogon.com/forums/showpost.php?p=3661612&postcount=16
code
Personally, I think if an attack is sufficiently protected against (eg, Aqua Jet from rank 2 attack vs rank 4 defence with a reflect set up), then the damage should be nullified completely. On a different note, is there any official way of handling decimal damage? For the most part, refs round, but I've seen some always round a .5 up (as per normal rounding rules) and some alternate .5 between rounding up and rounding down (which is a bit more accurate regarding total damage). I even once had a ref who didn't round at all and I personally support this and have adopted this for my reffings (except for battle hall reffings). <dogfish44> I got a suprise KFC ^.^ <Glacier> kinky fat chick?
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700795821/warc/CC-MAIN-20130516103955-00027-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
693
4
https://wearvalleymercury.co.uk/is-sam-altman-joining-microsoft-satya-nadella-doesnt-seem-to-know-wearvalleymercury/
code
Microsoft CEO Satya Nadella introduced late final evening that former OpenAI CEO Sam Altman and OpenAI co-founder Greg Brockman have been each becoming a member of Microsoft to steer a brand new superior AI analysis group, an announcement that despatched Microsoft’s inventory value hovering. Now, lower than 24 hours later, following The Verge reporting that Sam Altman remains to be making an attempt to return as OpenAI CEO, Nadella doesn’t appear so positive. “[We’re] dedicated to OpenAI and Sam, no matter what configuration,” mentioned Nadella in an interview with CNBC’s Jon Fortt, including that Microsoft “selected to explicitly companion with OpenAI [and] clearly that depends upon the folks at OpenAI staying there or coming to Microsoft, so I’m open to each choices.” Nadella added that “clearly we would like Sam and Greg to have a incredible dwelling in the event that they’re not going to be [at] OpenAI, with all of the colleagues at Microsoft, however I’m precisely the place I used to be on Friday morning.” On Friday morning Nadella awoke with Sam Altman nonetheless OpenAI CEO and a detailed partnership with the corporate. Hours later the OpenAI board selected to fireplace Sam Altman in a shock determination, and it positive seems like Nadella needs he may hit the reset button again to Friday morning. Pressed on whether or not Altman and the tons of of OpenAI workers threatening to resign will truly be a part of Microsoft, Nadella responded “that’s for OpenAI board and administration and the workers to decide on,” earlier than explaining Microsoft already has its personal AI capabilities, a message clearly meant to calm jittery traders and fearful OpenAI clients. In an interview with Bloomberg TV simply moments later, anchor Emily Chang tried to get extra out of Nadella on the Altman and Brockman hiring announcement. Are they really Microsoft workers? “In order that they’re all within the technique of becoming a member of,” replied Nadella, earlier than shortly pivoting to speaking about Microsoft’s personal AI work once more. Studying between the traces of those strained interviews, it’s clear Nadella needs what Altman and tons of of OpenAI workers need: the OpenAI board gone. He didn’t explicitly say that, however he was extra prepared to speak about board adjustments to Bloomberg TV than the potential for Sam Altman to be an precise Microsoft worker: I believe we will certainly need some governance adjustments. Surprises are dangerous and we simply wish to make it possible for issues are carried out in a method that can permit is to proceed to companion nicely. This concept that by some means out of the blue adjustments occur with out being within the loop shouldn’t be good and we will certainly be sure that among the adjustments which might be wanted occur and we proceed to have the ability to go together with the partnership with OpenAI. I reported earlier as we speak that Sam Altman isn’t displaying up in Microsoft’s company listing but, in keeping with a number of sources. That’s not massively shocking as Microsoft’s HR and onboarding processes aren’t arrange for 24-hour emergency offers, however Microsoft additionally hasn’t detailed the appointment to workers in any inside company-wide memos but. If Altman is totally onboarded to Microsoft then he’ll have a CEO title inside Microsoft, which is usually reserved for the leaders of huge divisions like Microsoft Gaming, or acquired firms like LinkedIn and GitHub. So Sam Altman appears to be like set to proceed to be a CEO. The query nonetheless stays whether or not that’s at Microsoft, or OpenAI.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679518883.99/warc/CC-MAIN-20231211210408-20231212000408-00869.warc.gz
CC-MAIN-2023-50
3,683
9