url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://joomla.stackexchange.com/tags/extensions/new
code
I haven't personally investigated or tested any of the following, but a quick Google search for Joomla OTP verification revealed: As @Sharky said, you can check the extension versions by accessing their manifest files. Here are the path of those files for each type of extension : As Sharky says, if you don't have administrator access to the database, the best way to find out this information is from the publicly accessible files on the website such as the xml manifest files. The security on some websites does not permit you to view these files so this method is not always reliable. Even when you do have access to the manifest files, ... * Update * I posted this answer and then later checked the answers by Sharky and later, Neil Roberts, saying the .xml files are available. I tested this on one of my sites, so I was very surprised that this information is available and I will have to do something about that. I have left my original answer here for general reference and voted up the Answers ... If you're not an administrator of the site, you can't have this information in full. If you know which extensions are installed, you can check their versions by accessing their manifest files. For example, you can find out Joomla! version by accessing administrator/manifests/files/joomla.xml file. The closest you can get to finding out which extensions are ... the extension is an aggregate of modules, plugins and components? A extension, is not the combination of a component, module and plugin. This is what a package is Plugins, Modules, Components, Templates are all types of extensions. So if I'm right, than modules, plugins and components have the same versions. Is it also true? No. They're all separate, ...
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526517.67/warc/CC-MAIN-20190720132039-20190720154039-00420.warc.gz
CC-MAIN-2019-30
1,727
14
https://plaidcloud.com/plaidcloud-update-2019-10-18/
code
This update is focused on adding significantly improved organization flexibility to projects, workflows, and tables in Analyze. It also coincides with our major infrastructure upgrade which will have PlaidCloud operating on a container based Kubernetes cluster…translation – more reliability, scalability, and resilience. We will also have a new home for PlaidCloud on Google Cloud, thus requiring movement of large amounts of data. No changes are required on your end as we move to Google Cloud. You will connect and operate just as you do today. For current Analyze users, there will be some updates to the user interfaces as we have simplified the organization of operations and allowed user based hierarchy organization of the items. More information and documentation on the changes will be coming next week. Underpinning all of these changes is a vastly improved process of retaining historical changes to everything in Analyze. We plan to roll-out features in the near future to take advantage of this new history capability for simple things like undo or more complex things like copying items from specific points in time. What to expect: - Significant improvements in ability to organize and find projects, workflows, tables, steps, and user defined functions (UDFs) through hierarchies and labels - Significant speed improvements for workflow execution - Improved integration with Dashboards - New data editors allowing for data entry and update directly in PlaidCloud - Instant table dependency tracing - Reuse of steps in multiple workflows - Instant tracing of step usage in workflows - PlaidCloud operations are accessible using JSON-RPC interaction from local systems, UDFs, Jupyter notebooks, command line, or other services - Improved logging allows quick searching across steps, workflows, and projects - One click change of external connection environments to quickly switch between Dev, Test, QA, and Production - Ability to lock projects from changes or set to a Read-Only status - Direct data sharing among projects improves performance by reducing the need for file transfers - Significant improvements to UDF tools to ensure UDF logic runs exactly the same on your local system, within a workflow, or within a Jupyter notebook - Simplified oAuth registration and access for using JSON-RPC - Move to a micro-services architecture using an underlying technology called Kubernetes. Kubernetes allows us to perform upgrades without production downtime.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662556725.76/warc/CC-MAIN-20220523071517-20220523101517-00190.warc.gz
CC-MAIN-2022-21
2,477
19
https://issues.cask.co/browse/CDAP-14746
code
Affects Version/s: 6.0.0 Fix Version/s: None In https://github.com/cdapio/cdap-integration-tests/pull/988, we removed some integration test cases that use streams/flows because they are. We should bring back the test cases that test functionality other than streams/flows. - DatasetTest, ExploreTest, WorkflowTest were removed. These should definitely be brought back and migrated. - IncrementTest tests the functionality of Table's readless increments. - LineageUpgradeTest tests lineage across upgrade. - InvalidListPruneTest tests pruning of invalid list. - ContinuousCounterTest tests disruption. We can test this with another program type. If we are not going to bring this test case back, we should remove the Disruption test suite as well as the necessary parts from the README in the integration test repo. - TransactionTimeoutTest tested timeout in flowlets. We can still have an integration test to test timeouts from service handlers, for example.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439736962.52/warc/CC-MAIN-20200806121241-20200806151241-00359.warc.gz
CC-MAIN-2020-34
958
9
http://www.zen-cart.com/showthread.php?117977-Save-For-Later-Support-Thread/page6
code
I'm using template Premium 7A and Zen Cart 1.3.8a - My web address is www.mojavelampwork.net I'm having problems understanding the upload process of SFL. Once I've unzipped the folder do I upload the entire folder inside of the unzipped folder to the root directory of my site, or the contents inside of the folder? Am I supposed to overwrite the includes folder in my root directory, with the includes folder from SFL? I appologize for the lame questions, I'm just a bit confused by the instructions for SFL Thank you for your help.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696400149/warc/CC-MAIN-20130516092640-00054-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
533
5
https://carbonatoms.wordpress.com/tag/ui/
code
I’ve been playing with Android phones recently, the HTC Incredible and the HTC Evo..and sorry but I feel the OS kind of sucks. It is not intuitive at ALL. I couldn’t figure out how to do anything..it required a friend to train me..and even after that and I tried using the Evo on my own I still could not find the task manager, figure out how to switch tasks and add/remove widgets. Sorry…it needs to be friendlier and FAR more intuitive for me. Android may be powerful but its not friendly or easy. My user experience was frustrating. I handed the phone to my GF to play with and she was lost and frustrated within 10 seconds as well. This never happens when we play with iPhones. Yes I understand Android is powerful, yes I understand iPhones lock you in and is not very customizable..but its EASY. It is intuitive and fun. Grandma can pick it up and use it. Android should be powerful AND be easy to use. But right now it is only easy to use after watching tutorials or playing with it for a week. Let me give you an example. If I did a usability test on target.com, and told a first-time user to go on the site and find a solution to their storage needs for books, I’d want this user without any tutorials or help, without having to call support, to find the bookshelf section of the site and buy a bookshelf. If my user can’t do this, and leaves the site frustrated or having to call support..the UI is bad. It has failed. Well that’s how Android is. Yes it’s powerful, yes it is customizable. yes I can install a new UI over the standard, but I SHOULDN’T HAVE TO. I should be able to hand the phone to my Grandmother and she should be happily uploading youtube videos of Kitty within 5 minutes. I think one of my favorite, intuitive task managers in a UI is on the Palm Pre. You swipe your deck of cards, find the app you want, and either click it to activate it, or flick the card away to close it. SUPER easy. SUPER intuitive. Good article I found: Also, I feel the Andoid OS is ugly. Reminds me of Windows 95.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122726.55/warc/CC-MAIN-20170423031202-00183-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,034
12
https://ru.coursera.org/learn/programming-fundamentals
code
Programming is an increasingly important skill, whether you aspire to a career in software development, or in other fields. This course is the first in the specialization Introduction to Programming in C, but its lessons extend to any language you might want to learn. This is because programming is fundamentally about figuring out how to solve a class of problems and writing the algorithm, a clear set of steps to solve any problem in its class. This course will introduce you to a powerful problem-solving process—the Seven Steps—which you can use to solve any programming problem. In this course, you will learn how to develop an algorithm, then progress to reading code and understanding how programming concepts relate to algorithms. Об этом курсе Duke University has about 13,000 undergraduate and graduate students and a world-class faculty helping to expand the frontiers of knowledge. The university has a strong commitment to applying knowledge in service to society, both near its North Carolina campus and around the world. - 5 stars75,02 % - 4 stars19,91 % - 3 stars3,07 % - 2 stars0,77 % - 1 star1,20 % Лучшие отзывы о курсе PROGRAMMING FUNDAMENTALS This course is amazing and there are many things of the programming fundamental that I have learned through this course . This course proved to be good for those who want to learn c from zero . This course met my expectations. I would recommend this course to beginners who have no knowledge of programming. This course gives you deep introduction of programming and makes you learn more. The course was quite good in every aspect and it met my expectations and thanks to duke university for providing such a good course and also thanks to coursera for providing such good platform for us. I love the focus of this first course in the specialization is about problem solving and developing a mindset for programming. The course is well thought out and concepts are clearly explained! Специализация Introductory C Programming: общие сведения This specialization develops strong programming fundamentals for learners who want to solve complex problems by writing computer programs. Through four courses, you will learn to develop algorithms in a systematic way and read and write the C code to implement them. This will prepare you to pursue a career in software development or other computational fields. Часто задаваемые вопросы Когда я получу доступ к лекциям и заданиям? Что я получу, оформив подписку на специализацию? Можно ли получить финансовую помощь? Will I receive a transcript from Duke University for completing this course? Остались вопросы? Посетите Центр поддержки учащихся.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662560022.71/warc/CC-MAIN-20220523163515-20220523193515-00417.warc.gz
CC-MAIN-2022-21
2,886
21
https://www.tensorflow.org/api_docs/python/tf/round
code
tf.round( x, name=None ) See the guide: Upgrade to TensorFlow 1.0 > Upgrading your code manually Rounds the values of a tensor to the nearest integer, element-wise. Rounds half to even. Also known as bankers rounding. If you want to round according to the current system rounding mode use tf::cint. For example: x = tf.constant([0.9, 2.5, 2.3, 1.5, -4.5]) tf.round(x) # [ 1.0, 2.0, 2.0, 2.0, -4.0 ] name: A name for the operation (optional). Tensor of same shape and type as
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511365.50/warc/CC-MAIN-20181018001031-20181018022531-00448.warc.gz
CC-MAIN-2018-43
474
7
https://cc.fullcirc.com/approach/facilitation/harvesting/
code
Evaluation rigour for harvesting JULY 10, 2017 We are embarking on a innovative approach to a social problem and we need a framework to guide the evaluation process. In Art of Hosting terms, we might call this a harvesting plan. What I don’t see a lot of however is good rigour around the harvesting and evaluation.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202572.29/warc/CC-MAIN-20190321193403-20190321215403-00261.warc.gz
CC-MAIN-2019-13
317
3
https://www.libhunt.com/compare-swift-composable-architecture-vs-swift-parsing
code
|5 days ago||21 days ago| |MIT License||MIT License| Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars. Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones. For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking. SwiftUI in 2022 5 projects | news.ycombinator.com | 25 May 2022 One point that's not being discussed enough -- using SwiftUI (since it's heavily value-typed / struct-based) prevents a whole host of problems around retain cycles, typically the bugbear of iOS dev. I recently built an iOS app from scratch with recent grads with zero Swift experience (but had done React). It was ~2mo before they even had to learn what a retain cycle was, and that was from using UIKit. Of course you still eventually see this if / when you use `@ObservedObjects` and their implementation, but in our case we were also using https://github.com/pointfreeco/swift-composable-architecture which hides this away as well. Is MVVM the only architecture you’ve used when developing iOS app? 3 projects | reddit.com/r/swift | 22 May 2022 There’s a nice open source swift library by the pointfree guys, called The Composable Architecture (TCA). Check it out 🙂 I would like your feedback on my attempt to improve the MVVM pattern. 1 project | reddit.com/r/iOSProgramming | 18 Apr 2022 It looks like you reinvented the Reducer pattern, have you had a look at Composable Architecture? Ask HN: Book Recommendation for macOS Development 1 project | news.ycombinator.com | 21 Mar 2022 [Books by Objc.io](https://www.objc.io/books/) are great. Also whilst not a book, [Composable Architecture](https://github.com/pointfreeco/swift-composable-architecture) seems like a nice way to develop cross platform (iOS/macOS) apps. iOS development best practices in 2022 1 project | reddit.com/r/iOSProgramming | 10 Mar 2022 Regarding MVVM, since your list is very SwiftUI-forward (which is great) I’m surprised that the Composable Architecture pattern was not mentioned. (https://github.com/pointfreeco/swift-composable-architecture) Best architecture for iOS data-centric app 4 projects | reddit.com/r/swift | 13 Feb 2022 I use a variation on The Binder Architecture. Another one I like a lot and that works well with SwiftUI is The Composable Architecture. Learn from complex projects 4 projects | reddit.com/r/swift | 4 Feb 2022 Check out pointfree’s composable architecture series GitHub repository Looking for SwiftUI templates/architectures 2 projects | reddit.com/r/SwiftUI | 27 Dec 2021 The Composable Architecture is a must-have. It provides the most complete and battle-hardened architecture - check out the examples in the repo, or check out their videos on it called A tour of The Composable Architecture, which should give you a good overview of what it looks like and its benefits. Has anyone here had a look over this library (Firestarter)? 2 projects | reddit.com/r/iOSProgramming | 18 Dec 2021 Do take a look at https://github.com/pointfreeco/swift-composable-architecture and their videos though2 projects | reddit.com/r/iOSProgramming | 18 Dec 2021 Give a try? Why not? Maybe you will like this as well: https://github.com/pointfreeco/swift-composable-architecture Tour of Parser-Printers: Introduction 1 project | news.ycombinator.com | 11 Apr 2022 Sorry about that, broken links have been fixed in the episode and here's a link to the library: https://github.com/pointfreeco/swift-parsing. Parsing & Formatting Imperial Measurements 1 project | reddit.com/r/swift | 15 Dec 2021 If you want to do parsing, I strongly recommend Point-Free's Parsing library! Validating urls in Swift with regex. 1 project | reddit.com/r/SwiftUI | 4 Nov 2021 Honestly I still have a difficult time understanding Regex’s, and maintaining them can be hard since once small change can completely change how the Regex works. I would instead opt for a real parsing library, like for instance PointFree’s swift-parsing, who’s clear and idiomatic API makes it easy to understand what’s really going on. It’s also very, very performant - almost as performant as making a custom hand-rolled parser. Getting multiple strings and extracting the word within special characters 1 project | reddit.com/r/swift | 4 May 2021 Personally, I would pull out my parser library and use that (the documentation is lacking, so if you're just starting out it can be hard to figure out what's going on, but you could use Point Free's parser library to do it like so: 3 projects | reddit.com/r/SwiftUI | 29 Mar 2021 I’m currently using the composable architecture. TCA is the result of video series by Point Free that discusses what Apple provides with SwiftUI, in detail, and iterates though the of the evolution of the architecture, to fill in the gaps. Most of the content is available by subscription, but there is free content as well, which includes a four part overview on the architecture itself. I highly recommend subscribing as the detailed walkthrough of building the architecture is extremely useful and helps clarify some of the more complicated aspects of its use. Parsing: turn nebulous data into well-structured data, with a focus on composition, performance, & generality 1 project | reddit.com/r/swift | 22 Dec 2020 What are some alternatives? Clean Architecture for SwiftUI + Combine - SwiftUI sample app using Clean Architecture. Examples of working with CoreData persistence, networking, dependency injection, unit testing, and more. tca-swiftui-navigation-demo - Demo project that shows how to implement navigation in SwiftUI iOS application using Swift Composable Architecture iOS-Viper-Architecture - This repository contains a detailed sample app that implements VIPER architecture in iOS using libraries and frameworks like Alamofire, AlamofireImage, PKHUD, CoreData etc. GRDB.swift - A toolkit for SQLite databases, with a focus on application development Tempura - A holistic approach to iOS development, inspired by Redux and MVVM VIPER Module Generator - A Swift 4.2 VIPER Module Boilerplate Generator with predefined functions and a BaseViewProtocol. Kingfisher - A lightweight, pure-Swift library for downloading and caching images from the web. Spin - Spin aims to provide a versatile Feedback Loop implementation working with the three main reactive frameworks available in the Swift community (RxSwift, ReactiveSwift and Combine)
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662595559.80/warc/CC-MAIN-20220526004200-20220526034200-00781.warc.gz
CC-MAIN-2022-21
6,550
60
http://jamsudsanusi.net/2014/08/building-ine-ccie-rsv5-topology-using-virtual-ios-iosv-l2iou/?shared=email&msg=fail
code
Building INE CCIE RSv5 topology using Virtual IOS (IOSv) We will build the INE RSv5 Topology using in Virtual IOS (IOSv), Since IOSv only supported routing we will only focus on that part and because how the INE topology has been setup switching part is not really needed on most of the routing labs. - VMware Workstation - Cisco Virtual IOSv (Extracted from OnePK All in one VM) INE RSv5 Logical Diagram (IOSv) Updated/Modified INE Logical Diagram to match the interface setup of IOSv So now we have the diagram we will now configure the setting on the VMWare Workstation to match the physical Diagram. Building the connection is very simple just create a new INE LAN Segment and assign all the 2nd interface of the Cisco Virtual IOS (IOSv) Virtual Machine into the LAN Segment. After Assigning the interface “show cdp neighbor” should look like this. Based on the cdp neighbor command output all the router are visible and connected to the new LAN Segment we have created. So now we are ready to work on INE workbook using Cisco Virtual IOS (IOSv) VM. Converted INE Initial configuration for IOSv: Download it here. For Building All-in-One INE Topology read my another post How to extract IOSv from OnePK All-In-One VM
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999066.12/warc/CC-MAIN-20190619224436-20190620010436-00239.warc.gz
CC-MAIN-2019-26
1,224
13
http://dotnet.sys-con.com/node/2531366
code
|By Marketwired .|| |February 5, 2013 07:30 PM EST|| NILES, IL -- (Marketwire) -- 02/05/13 -- MFRI, Inc. (NASDAQ: MFRI) announced today that its Perma-Pipe Saudi Arabia subsidiary has received new orders exceeding $27 million for the first phase of the district cooling system expansion project at King Abdul-Aziz International ("KAIA") airport in Jeddah, Saudi Arabia. These orders are in addition to the $23 million announced in the Company's press release of November 23, 2012 bringing the total of major project work in Saudi Arabia to nearly $50 million. The King Abdul-Aziz International Airport is one of the largest projects in the recent history of the Saudi Arabia Kingdom. The passenger terminal complex comprises an area over 6.7 million square feet (622,000 square meters) with 46 gates, 96 boarding bridges including double deck access for the A380 Airbus. The total facilities span over 25,000 acres (100 square kilometers) including the chilled water distribution system, utility plants, utility tunnel, plant nursery, and transportation center with integrated rail station. Fati Elgendy, President of Perma-Pipe, said: "This order represents a further validation of our strategy to expand our footprint to the rapidly developing Saudi market. Delivery is expected to start in the first fiscal quarter of 2013 and be completed in the fourth quarter. We plan to produce the insulated pipe, spools and fittings at our new factory in Dammam, Saudi Arabia with important support from our United Arab Emirates ("U.A.E.") factory. Our team has been working for over one year pursuing this very prestigious order. The KAIA project coupled with work on expansion of the Holy Haram Mosque in Mecca positions us very well for a strong 2013 in the Middle East." "We have spent two years investing in direct in-country capacity in Saudi Arabia. The Jeddah Airport is the largest single project we have received since we started our business activities in the Middle East some 7 years ago. Perma-Pipe has already successfully completed the supply of insulated piping systems to several other major airports in the U.A.E., Qatar, and Oman. Our best in class products, engineering skills and support services have proven to be a successful formula in establishing Perma-Pipe as the market leader in the region," said Bradley Mautner, CEO of MFRI. MFRI, Inc. is a multi-line company engaged in the following businesses: pre-insulated specialty piping systems for oil and gas gathering, district heating and cooling and other applications; custom designed industrial filtration products to remove particulates from dry gas streams; industrial process cooling equipment to remove heat from molding, printing and other industrial processes; and installation of heating, ventilation and air conditioning for large buildings. Statements and other information contained in this announcement which can be identified by the use of forward-looking terminology such as "anticipate," "may," "will," "expect," "continue," "remain," "intend," "aim," "should," "prospects," "could," "position," "future," "potential," "believes," "plans," "likely," "seems," and "probable," or the negative thereof or other variations thereon or comparable terminology, constitute "forward-looking statements" within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934 as amended and are subject to the safe harbors created thereby. These statements should be considered as subject to the many risks and uncertainties that exist in the Company's operations and business environment. Such risks and uncertainties include, but are not limited to, economic conditions, market demand and pricing, competitive and cost factors, raw material availability and prices, global interest rates, currency exchange rates, labor relations and other risk factors. This announcement may also contain certain non-GAAP financial information that management believes is helpful in understanding our business. This financial information should not be considered as an alternative to net (loss) income or any other GAAP measurement of performance. SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes. Sep. 27, 2016 03:00 AM EDT Reads: 2,737 There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a... Sep. 27, 2016 03:00 AM EDT Reads: 1,791 SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec... Sep. 27, 2016 03:00 AM EDT Reads: 2,915 Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da... Sep. 27, 2016 02:15 AM EDT Reads: 1,597 Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ... Sep. 27, 2016 02:15 AM EDT Reads: 3,026 The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d... Sep. 27, 2016 02:00 AM EDT Reads: 1,725 Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra... Sep. 27, 2016 02:00 AM EDT Reads: 1,721 I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi... Sep. 27, 2016 01:45 AM EDT Reads: 1,289 SYS-CON Events announced today that Pulzze Systems will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Pulzze Systems, Inc. provides infrastructure products for the Internet of Things to enable any connected device and system to carry out matched operations without programming. For more information, visit http://www.pulzzesystems.com. Sep. 27, 2016 01:30 AM EDT Reads: 1,848 SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating... Sep. 27, 2016 01:15 AM EDT Reads: 1,997 If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect... Sep. 27, 2016 12:30 AM EDT Reads: 1,632 The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace. Sep. 27, 2016 12:00 AM EDT Reads: 1,048 WebRTC adoption has generated a wave of creative uses of communications and collaboration through websites, sales apps, customer care and business applications. As WebRTC has become more mainstream it has evolved to use cases beyond the original peer-to-peer case, which has led to a repeating requirement for interoperability with existing infrastructures. In his session at @ThingsExpo, Graham Holt, Executive Vice President of Daitan Group, will cover implementation examples that have enabled ea... Sep. 27, 2016 12:00 AM EDT Reads: 1,541 Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl... Sep. 26, 2016 10:45 PM EDT Reads: 471 Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct... Sep. 26, 2016 08:45 PM EDT Reads: 2,169 In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett... Sep. 26, 2016 08:45 PM EDT Reads: 3,416 Vidyo, Inc., has joined the Alliance for Open Media. The Alliance for Open Media is a non-profit organization working to define and develop media technologies that address the need for an open standard for video compression and delivery over the web. As a member of the Alliance, Vidyo will collaborate with industry leaders in pursuit of an open and royalty-free AOMedia Video codec, AV1. Vidyo’s contributions to the organization will bring to bear its long history of expertise in codec technolo... Sep. 26, 2016 05:15 PM EDT Reads: 2,624 The vision of a connected smart home is becoming reality with the application of integrated wireless technologies in devices and appliances. The use of standardized and TCP/IP networked wireless technologies in line-powered and battery operated sensors and controls has led to the adoption of radios in the 2.4GHz band, including Wi-Fi, BT/BLE and 802.15.4 applied ZigBee and Thread. This is driving the need for robust wireless coexistence for multiple radios to ensure throughput performance and th... Sep. 26, 2016 03:30 PM EDT Reads: 1,572 Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers? Sep. 26, 2016 03:00 PM EDT Reads: 1,564 SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder... Sep. 26, 2016 02:45 PM EDT Reads: 2,647
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660992.15/warc/CC-MAIN-20160924173740-00028-ip-10-143-35-109.ec2.internal.warc.gz
CC-MAIN-2016-40
14,879
49
http://www.network54.com/Forum/54527/message/1171839646/problems+running+generator
code
problems running generatorFebruary 18 2007 at 11:00 PM from IP address 188.8.131.52 I've the GNU/Linux Ubuntu 6.10 distro running in my PC, i've just followed the instructions written in this link: "http://www.ubuntugames.org/megadrive" , but when i try to start the emulator it doesn't run, doesn't do nothing. I'm a bit newbie in this linux thing, if you just could give me some help to how to who to run the generator... | HOWTO||YuGiOhJCJ||Mar 24, 2007, 6:00 PM|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948950.83/warc/CC-MAIN-20180427021556-20180427041556-00330.warc.gz
CC-MAIN-2018-17
466
5
https://www.my.freelancer.com/projects/opengl/optimize-processing-sketch-using-opengl/
code
Pekerjaan Tidak Dijumpai Maaf kami tidak dapat mencari pekerjaan yang anda cari. Cari pekerjaan paling terkini di sini: There is a mini python project I need to do it, if interested plz let me know I have a completed Shopping app in xCode in Swift language and it's linked with Firebase and I just need to fixing the errors and I want to change colors Thank you. Hello. I need a Russian and English creative writer to write content about properties offered to rent for long time in Baku . Not about tourists coming and staying in town. Please no India Pakistan Phillipins, only Russian language country freelancer. This job was posted from a mobile device, so please pardon any typos or any missing details. We need professional Telugu text to voice translation for our android app notification I require complete design for approval of construction of house in delhi. Including but not limited to architechtural drawings, facelift, structural, 3-D rendering etc. Looking for someone to convert html into PDF via mpdf or whatever php works. Right now it is a generated HTML form, what I am looking for is someone to convert the form to pdf when I click "pdf". It needs to look the same and etc. We are using php, but other than that I don't care how it is done, as long as it works quick and looks the same. Need to have you start now Hi, I'm looking for someone professional who can edit my script, 1-2 lines in [log masuk untuk melihat URL] - Script is a ISP Script which works with Xforwarded for Plugin (if the Script working with the special ISP your job is done) CMS: WooCommerce only freelancers with good reviews ! Just need someone to create a web banner. Need someone who can start right away. Using a large dataset, we need to analyse and create graphs on python to use to comparisons in our report Looking for a friendly mentor to improve my English writing skills. Will be great if contactable throughout the day to check and give suggestions with my emails. Also would like to arrange for online sessions at both convenience times. Well. let's have a conversation first and discuss in details.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823895.25/warc/CC-MAIN-20181212134123-20181212155623-00297.warc.gz
CC-MAIN-2018-51
2,107
13
https://www.zbrushcentral.com/t/zsketch-functionality-missing/211771
code
While I bought ZBrushCore a year ago, I only recently began seriously using it (specifically, the 2018 version). I’ve been watching the tutorials of course, but when I attempted to learn how to use ZSpheres and ZSketch, I discovered that there is absolutely no ZSketch functionality in my program. Shift+A doesn’t activate Sketch mode, and there is no ZSketch subtool in my Tool palette. I can use ZSpheres to create mannequins, but that is about it. Otherwise, I’m forced to sculpt normally. Is there something I’m missing here? Was ZSketch removed? Is it part of ZBrush Pro instead? Here’s an example of my screen, if it helps.
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540511946.30/warc/CC-MAIN-20191208150734-20191208174734-00538.warc.gz
CC-MAIN-2019-51
639
1
https://blogs.msdn.microsoft.com/rprabhu/2006/05/05/busy-week-for-windows-live/
code
Wow, lots of Windows Live related news this week: 1) The live.com team released an update just a few hours ago. Great to see they have addressed some of the top complaints/feature requests! My own favorites are (1) when you issue a search from the toolbar or browser search box, you no longer have to wait for the live.com home page to load (that was annoying!), (2) individual gadgets can now be refreshed and (3) the weather gadget is now a much more reasonable size 🙂 3) Windows Live Shopping Beta was launched earlier in the week. You can also search for products through the 'Products' tab in Windows Live Search. Well, this is the just the beginning of what promises to be an interesting summer for Windows Live!
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187821088.8/warc/CC-MAIN-20171017110249-20171017130249-00049.warc.gz
CC-MAIN-2017-43
721
4
https://breadtube.tv/somemorenews/ge5j0lrxr8y/
code
Hello, I am a news dude and, news-wise, here is some of it. In today’s episode, Cody explores how Congress is woefully unprepared and unable to deal with liars and grifters like Candace Owens and the other fine folks at Prager University (fine print: not an accredited University). Prager U Links - http://tinyurl.com/y6e9dy9t Support SOME MORE NEWS: http://www.patreon.com/SomeMoreNews SUBSCRIBE to SOME MORE NEWS: https://tinyurl.com/ybfx89rh Produced by Katy Stoll (@KatyStoll). You can subscribe to our podcast EVEN MORE NEWS here: iTunes: https://goo.gl/bveu8q Google Play: https://goo.gl/zpnhN9 Soundcloud: https://goo.gl/xMHZYT Stitcher: https://goo.gl/ZFdRhp Follow us on social Media! Twitter: https://twitter.com/SomeMoreNews Instagram: https://www.instagram.com/SomeMoreNews/ Facebook: https://www.facebook.com/SomeMoreNews/ Source List - http://tinyurl.com/y5zox4xu
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250592394.9/warc/CC-MAIN-20200118081234-20200118105234-00345.warc.gz
CC-MAIN-2020-05
879
2
https://wiki.hl7.org/w/index.php?title=CDA_R3_simply_external_references&oldid=34717
code
CDA R3 simply external references See CDA R3 Formal Proposals for instructions on using this form. Failure to adhere to these instructions may result in delays. Editing of formal proposals is restricted to the submitter and SDTC co-chairs. Other changes will be undone. Comments can be captured in the associated discussion page. (An announcement of this proposal must be submitted to the Structured Documents list to be formally submitted.) |Submitted by: <<Name>>||Revision date: <<Revision Date>>| |Submitted date: <<Submit Date>>||Change request ID: <<Change Request ID>>| The current approach to linking graphics requires the use of observationMedia inside an entry. This makes it impossible to reference graphics in Level 1 CDA documents (which by definition contain no coded entries). - Allow renderMultiMedia to reference graphics directly by URL. An possible example is shown below: <renderMultiMedia mediaType="image/gif" value="lefthand.gif"/> ... or if we decide to allow XHTML in the body: Recommended Action Items March 23, 2010: renderMultiMedia can be used in a CDA L1 document. It's important that it be used when referencing attested content, because the corresponding entry has additional details (such as ID, etc). Opposed: 0; Abstain: 0; In favor: 6.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335304.71/warc/CC-MAIN-20220929034214-20220929064214-00137.warc.gz
CC-MAIN-2022-40
1,271
11
http://backwaterreptilesblog.com/category/rescues/
code
Do you have a reptile or amphibian you can’t care for any longer? Maybe you’re moving and can’t take your snake with you? Well you’re in luck, because we’re an established Sacramento reptile rescue drop-off site. You don’t need to give us reasons why you’re getting rid of your reptile, we simply accept reptiles that need a new home, or perhaps a little rehabilitation. We don’t pay for them, but we’ll care for and re-home them for free. Our Sacramento reptile rescue can accept snakes, lizards, turtles, tortoises, scorpions, and tarantulas for re-homing. You can simply bring your reptile to our facility and drop it off. We’ll give it expert care and will find a new home for it using our extensive network of experienced hobbyists. There’s no size limit. Imperfections are ok. Aggressive animals are just fine. Only non-venomous reptiles please. There are two options for scheduling your drop-off: 1.) You can e-mail us at [email protected] to let us know the animal you’ll be dropping-off and your available times. Adding “Rescue” to the subject line will helpful. 2.) You can call us at 916-740-9758 to schedule a time to drop-off your reptile. If we don’t answer, please leave a voicemail and we’ll get back to you shortly. The drop-off is quick, and there are no documents to sign. We’re available to receive reptile rescue drop-offs Monday through Friday, from 9am to 5pm. Please help protect our hobby–don’t ever release reptiles into the wild.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122629.72/warc/CC-MAIN-20170423031202-00589-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,494
14
https://docs.genesys.com/Documentation/IWD/latest/Dep/IWDMgrOverview
code
IWD Manager Configuration Anyone who needs access to iWD Manager must be configured as a Person or in Genesys Administrator (GA) or Genesys Administrator Extension (GAX) and also must have the required privileges (usually defined as iWD roles) assigned either in GA or GAX. The login screen prompts for the following information: - Username—The username for the Person or User as configured in GA/GAX. - Password—The password for the Person or User as configured in GA/GAX. You can log into iWD Manager programmatically by providing the URL for iWD Manager login page along with a valid username and password. This can facilitate a single sign-on process. The URL format to use is: - <appserverhost> and <appserverport> are the host and port for the application server where iWD Manager is deployed. - <iwdmanagerapplication> is the iWD Manager application running on the application server (for example, iwd_manager). - <username> and <password> are a valid username and password combination for the user logging into iWD Manager. An example URL is: General Conditions for Configuring an iWD Manager User To access the Global Task List, the Person must be associated with a Place in Genesys Configuration. If the Person is not an Agent, the Place can be configured as an option on the Annex tab of the Person/User object. Create a section called [iWD] (if it does not already exist) and within it, create an option iWDManagerPlace with the value of a valid Place name. If you want a user to have access to a specific managed tenant in iWD, that user must have at least Read access to the Configuration Server tenant that is linked to that iWD managed tenant—either directly or by being a member of an Access Group that does. The user must have at least Read and Execute permissions to the iWD Manager application in Configuration Server, and Read permissions to the Configuration Server Host object where the Interaction Server is running, either directly or by being a member of an Access Group that does. If the user is going to have access to the Global Task List, then the user must have at least Read and Execute permissions to these application objects in Configuration Server: - Interaction Server - The Database Access Point for the Interaction Server database - The Database Access Point for the History Node database. These permissions may be applied directly to the user, or by the user being a member of an Access Group that has such permissions. The Place that must be associated with the user must be a Place configured under the Configuration Server tenant that maps to the iWD managed tenant. (This presumes that the Interaction Server application also has an association with this Configuration Server tenant.) The Place is only used to give the user access to the Global Task List. If you want to restrict what the user can do in iWD Manager, use roles and privileges as described in Role-Based Access Control. If the user is created under a Configuration Server child tenant, then the following additional conditions must be met: - If you want the user to have access to both the iWD SYSTEM tenant as well as the iWD managed tenant to which the Configuration Server tenant maps, then this user must be either be a member of at least two Access Groups with the relevant permissions, or must have permissions granted directly to them. Such Access Groups must have at least Read permission to the tenants. If the user has no role privilege in a Tenant, then the Tenant is hidden from that user. If the user is created under the Environment tenant (for example, such as the default user that is in the Configuration Server database when it is initially deployed) then in order for this user to have full control of the Global Task List (not just read-only access), two conditions must be met: - The user must have a valid Place configured, where the Place is created under a child Configuration Server tenant to which the Interaction Server is associated. - The user must have an Employee ID that also belongs to a user who is created under a child Configuration Server tenant to which the Interaction Server is associated. - The user must have all role privileges from all the "iWD*" groups. Importing Media Icons - iWD Manager, iWD Runtime Node are installed. - Application servers are started (if running on WebSphere). - Log in to iWD Manager. - Select "Media Icons" from the main menu. - Select Import from the top right toolbar. - Import the relevant media icons file: for example; - <iWD Manager installation directory>\config\iwd_mediaicons.xml. - After each import a message appears at the bottom of the screen to indicate whether the import was successful. Media Icons View in iWD Manager The Media Icons view lets you map graphical icons to media types for display in the GTL. iWD comes with some pre-loaded icons, but you can import additional icons and map them to existing media types, or new media types. You can also export the icon set to an XML file. - Media Type— The media type to which the icon will be mapped. This list of media types is retrieved dynamically from Genesys Configuration Server. Media types are a type of Business Attribute in Configuration Server. Genesys provides out-of-the-box media types but new custom media types can be added. - Icon—The graphical 16x16 icon that will be displayed in the GTL when a task is of the media type to which the icon is mapped. - Type—The icon's file type. Icons must be 16x16, but can be in any of the following file formats: Use the toolbar commands to do the following: - Remove—Remove a selected icon. - Save—Save changes. - Refresh—Refresh the display. - Icon set—Add new icons from a local file system. - Import—Allows you to import the iWD Media Icons configuration from an XML file. Click Import, select a file on your local drive, select it and and click Open. - Export—Export the iWD Media Icons configuration to a local XML file. Configuration of Filters is performed in iWD Manager. Filters let you refine the list of tasks displayed in the GTL. Each filter is defined by a set of filter criteria (optional) and a list of table columns (Filter columns) that will be displayed in the GTL. Some filters are preconfigured for iWD Manager, and you can create custom filters. Full details are in the Filters (new document) topic of iWD Manager Help.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574662.80/warc/CC-MAIN-20190921190812-20190921212812-00142.warc.gz
CC-MAIN-2019-39
6,368
52
http://boardshake.blogspot.com/2011/05/two-months-old.html
code
Here's a few more photos I took of HD about 3 weeks ago. The lighting was poor so I had to crank up the ISO and open up the aperture. I may have used the flash on some of these, I just can't remember. I don't have a flash unit other than the built in flash which isn't great. When I do use it I normally use a rubber band to attach a white tissue to the flash to diffuse the light. Not fancy, but fairly effective. ;-) At any rate, I hope you enjoy the photos!
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867977.85/warc/CC-MAIN-20180527004958-20180527024958-00343.warc.gz
CC-MAIN-2018-22
460
2
https://forums.cox.com/discussions/internet/packet-burst-and-packet-loss/116948
code
Packet Burst and Packet Loss So, I have been having packet burst heavily when playing games online and when this happens sometimes the ping will spike for a brief amount of time.There also has been some packet loss here and there. I have been experiencing this for about two months at this point. I have recently tried solving this since it is extremely hard to play anything. I have gotten a new modem and router, replaced my ethernet cable, got a ethernet pcie card, and reinstalled windows. Nothing has fixed it. I have a tech coming out tomorrow to see if they can do anything. Has anyone else been experiencing this and has anyone gotten this resolved? I hate to but, I might have to switch to another isp if this issue can't be fixed. It has gone on for far to long and if it is just a matter of network congestion then, I will have to if I want it to be resolved asap.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510149.21/warc/CC-MAIN-20230926043538-20230926073538-00852.warc.gz
CC-MAIN-2023-40
875
2
http://codecoffee.com/tipsforlinux/articles/14.html
code
lot of people thanked God (as well as the guys behind KDE) when kppp came to the scene. The entire process of connecting to the Internet using a dial up connection was simplified to a very great extent. I shall show you how to configure kppp to connect to the Internet (connect to your ISP). ISP Name : powersurfer.net ISP telephone No. : 172355 My username & password : 'namexxx' and 'passxxx' 1. Run Kppp from the K menu or by typing kppp at a shell prompt. You will get a window with a Connect To field along with Login and Password fields. There is also a Setup button. Click on this button and you will get a This new window has many tabs.. like Account, Device, Modem... 2. On the 1st tab Accounts , click on New and select Dialog Setup. In the new window that appears titled New Account, type a name for your connection such as Power Surfing. Add the New Telephone No :172355. In the Authentication tab see that PAP is selected (My ISP uses PAP.. check with yours..) In the IP tab & Gateway tab , no changes are In the DNS tab enter the name of your ISP such as powersurfer.net in the Domain Name field The Login Script, Accounting and Execute tabs require no changes. 3. Now back to the kppp Configuration window on the 2nd tab, Device select /dev/ttyS1 if your modem is connected to the COM 2 as mine is. If you are not sure check Article No 4 on this site.. Flowcontrol and Line Termination require no changes. the connection speed. Mine is 57600 since I have a 56k mode external modem. Do not check the Lock File and select a lengthy Modem Timeout.. 99 seconds.. since some ISPs require more time to 4. In the 3rd tab Modem, change the modem volume as required. If you want to check your modem you can click on the Query Modem button and it should return a lot of results, if your modem is found and is working properly. This is very good way to figure out if kppp has detected your modem and can communicate with it or not. 5. The Graph tab requires no changes. 6. In the Miscellaneous tab, increase the pppd timeout to 60 seconds ..so as to allow maximum time in case of any problems. Also check Minimize Window on Connect to mimic the Windows default behaviour of the Connect Dialog Box. Show Clock should also be checked since it shows the total time elapsed since you connected to the Internet Thats all the configuration that needs to be done.. Click on Ok button and you will come back to the original window. In this select Power Surfing in the Connect To field. Enter your Login ID and Password (namexxx and passxxx in my case). If you want to see what happens as you connect you can check the Show Log Window.. but that is not required as such. Finally click on Connect button. kppp shall dial and connect to Once the connection has been established this window shall minimize and you can open your browser and start browsing.. The above instructions let you connect to the Internet as the superuser. In case you want to connect as a normal user then read the Note below. What is explained above is applicable to the superuser. For normal users there is a different method to setup Internet access. In case u have a standalone machine at your home where you are both the superuser as well as the normal user, there is a very simple way to get your user account to access the Internet. Login as the normal user and then open a shell window. Type 'su' at the prompt . It shall ask your for the superuser password. Enter the password and you shall be granted superuser rights. Run kppp at the prompt. In case it gives you an error about SetUID for kppp then you will have to log in as root and check the SetUID checkbox for kppp file using Konqueror or some other File Manager. This has to be done only once. Log out and login as the normal user run kppp. This time there will be no error and you can connect to the internet. You will be able to browse the net. Once u disconnect then leave the super user (within the shell window that had opened) mode by typing 'exit' in the shell window. Thats all.. Its a work around method but it does no harm since you are the only user on your machine. The actual method involves creating a group and making that particular user a member of that group and allowing that group access rights to the Internet.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202804.80/warc/CC-MAIN-20190323121241-20190323143241-00286.warc.gz
CC-MAIN-2019-13
4,264
79
https://1nce.com/en-us/resources/iot-knowledge-base/not-categorized/not-sub-categorized/smpp-message
code
Short Message Peer-to-Peer (SMPP) is a fundamental language which enables transmission of text messages. It functions as the governing protocol through which ESME or External Short Message Entities, encompassing business texting applications and cellular IoT devices, interact with mobile devices using Short Message Services (SMS). SMPP facilitates the flow of SMS communications via a network provider's Short Message Service Center (SMSC). To establish a connection between computers and the service center, an intermediary system such as an SMS gateway or SMPP gateway is required. Subsequently, the gateway and SMSC utilize the SMPP protocol to govern their interactions. What Are the Mechanics of SMPP? When an SMS-enabled device or application wants to send a text message, it initiates an SMPP session with a cellular carrier's Message Center (MC) or Short Message Service Center (SMSC). During this session, the device and the Message Center communicate using the SMPP protocol. The communication between the device and the Message Center is carried out through Protocol Data Units (PDUs). PDUs are used to package and exchange commands and responses between the two entities. They define the nature of the SMS communication, such as whether the ESME is sending or receiving a message. The Message Center acts as a mediator, accepting or rejecting the SMS transmission on behalf of the recipient. If a gateway is involved in the communication, it also serves as a mediator, relaying information to and from the Message Center. Types of SMPP Sessions SMPP sessions can be categorized into four types: Transmitter (TX) is initiated by ESME to send SMS messages to a mobile device as well as cancel previously sent messages. Receiver (RX) is used to receive SMS messages initiated by a mobile device itself. Transceiver (TRX) enables ESMEs to both send and receive SMS messages. However, the earliest version of SMPP does not support this session type. Outbind Session represents an SMPP session initiated by the MC. Protocol Data Units (PDUs) PDUs encapsulate the commands and responses exchanged between the SMSC and MC, adhering to the defined protocol. At the beginning of each session, a bind command is issued to specify the nature of the interaction. For instance, to initiate a transmitter session, the SMSC sends a PDU with the command "bind_transmitter." This initial PDU includes the ESME's identification, type, password, and the version of SMPP employed, enabling the MC to interpret the commands and determine compatible PDUs. The direction of SMS communication is also defined within PDUs. For instance, if an ESME intends to send a text message, the SMSC dispatches a "submit_sm" request to the MC. The version of SMPP employed must be explicitly defined during each session, as it determines the permissible interaction methods between the two entities. There’re three versions of SMPP: Applications of SMPP in IoT Some notable applications of SMPP in IoT include real-time environmental monitoring, smart home security systems, fleet management, asset tracking, and remote device management. With SMPP, IoT devices can send critical alerts, receive commands, transmit data updates, and establish bidirectional communication, enhancing the functionality and connectivity of IoT ecosystems.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818081.81/warc/CC-MAIN-20240422051258-20240422081258-00249.warc.gz
CC-MAIN-2024-18
3,314
14
https://www.dotnet-guide.com/how-to-internationalize-your-net-application.html
code
How to Internationalize Your .NET Application Internationalization in .NET is a phenomenon which allows the use of .NET framework for developing cross cultural applications in different languages and for different regions of world. In different words it provides techniques to build global friendly applications which are meant for global audience. Writing the code which is internationalized is a need today and it also improve maintainability and flexibility. A fundamental concept related to internationalization is locale which represents the country or region specific conventions relevant to the user. A region has its own representation of measurement system and currency. Also the formatting of date and time varies from one place to other. In order to determine the locale of a region, Internet Engineering Task Force (IETF) has specified RFC- 1766. It is a convention which describes the locale in “language code-country/region” format. .NET follows this convention too. Another important concept for implementing the internationalization in .NET is the use of CultureInfo class. These classes are contained in System.Globalization namespace and contain the culture specific information like date and time formatting rules, calendars, number formatting etc. Example of one such class is Calendar. Calendar implementations are done for a wide range of regions like there is GregorianCalendar, KoreanCalendar, PersianCalendar, JapaneseCalendar and many more. Other examples of these classes are CompareInfo and CultureInfo which represent the culture specific string comparison methods and information about a specific locale respectively. For creating international applications based on .NET framework you can use Visual studio. In Visual Studio there are two steps involved. In first step you need to create applications which are adjustable to different cultures. Next step involves the translation of application and resources with respect to a specific culture. These two steps are also referred as globalization and localization respectively. There are four types of namespaces in .NET framework for globalization and localization of applications and resources. First is System.Globalization which is discussed earlier that its classes contain culture related information. Second one is System.Resources.Tools which contains classes supporting for strongly typed resources. Then there is System.Resources which consists of classes and interfaces for managing culture related information in an application. Finally there is System.Text namespace having the classes which represent ASCII, Unicode and UTF-7 character encoding. So for developing international applications for world audience in .NET, classes from these namespaces should be used. These techniques are used for creating both window forms as well as web applications. to our mailing list and receive new articles : We never rent, trade, or sell my email lists to Visit .NET Programming Tutorial Homepage | About Runtime Components of .NET Framework | About Session Management in a Web Based Enterprise Application | An introduction to Microsoft Mobile Internet Toolkit (MMIT) | How to Internationalize Your .NET Application | How to Create a Document Type Definition (DTD) | How to Create a .NET Windows Service Easily | Knowing the Difference Between Application Server and Web Server | Understanding Key Advantages of .NET Type System | Understanding Some Basic Language Related Features of C# |
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103661137.41/warc/CC-MAIN-20220630031950-20220630061950-00015.warc.gz
CC-MAIN-2022-27
3,478
21
https://blogs.u2u.be/peter/post/Learn-all-about-developing-for-UAC-in-Vista
code
Microsoft has this up for a couple of weeks, but I thought you might find it interesting. "The Windows Vista Developer Story includes content for developers, and other technology experts and managers, interested in an in-depth exploration of some of the new and extended features in Windows Vista. It is released to the Windows Vista Developer Center in the form of brief articles, published approximately once every two weeks. Those articles are only a summary of the Windows Help file, which can be downloaded here. " UAC seems to be very popular by the way, since Bart has a nice post on developing .NET apps for UAC, updating my old post on the same subject.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103573995.30/warc/CC-MAIN-20220628173131-20220628203131-00783.warc.gz
CC-MAIN-2022-27
662
3
https://workforce.libretexts.org/Bookshelves/Information_Technology/Computer_Applications/Professional_Web_Accessibility_Auditing_Made_Easy/03%3A_Introduction_to_WCAG/3.01%3A_Introduction_to_WCAG
code
Though it is possible to conduct informal accessibility reviews with basic understanding of the types of barriers faced by people with disabilities, and knowledge of the common elements in web content that often produce barriers, a thorough, professional review requires a solid understanding of the W3C Web Content Accessibility Guidelines (WCAG 2.0 or WCAG 2.1, aka ISO/IEC 40500:2012). This unit will introduce you to WCAG (pronounced “wuh-kag”), which provides the basis for most international accessibility rules and legislation, along with its supporting documents. WCAG should be a key element of your Web Accessibility Auditing Toolkit. You should develop a basic understanding of WCAG to start, then use it and its supporting documents as references while conducting your audits and build upon the basics as you go about auditing web content. Watch the following video for a brief overview of WCAG 2.0. Video: WCAG-WAI Basics © Richard Fouchaux. Released under the terms of a Creative Commons Attribution license. Documents Accompanying WCAG Accompanying the WCAG specification itself are a variety of documents that expand on the guidelines. The two types of documents we would like to draw your attention to are: - Understanding Guidelines - How to Meet WCAG (referred to as Success Criteria) These documents are conveniently linked next to their corresponding guideline, as shown in the figure below. Figure: Links to supporting documents appear next to each guideline in WCAG 2.0
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00864.warc.gz
CC-MAIN-2024-10
1,497
11
https://sta.laits.utexas.edu/blog/2020/11/19/basic-training-canvasser-game/
code
Basic Training: Canvasser Game The basic purpose of this activity was to “learn about the process of creating a Canvasser interactive from start to finish by looking at examples created by past STAs.” I also had to create my own interactive game! This game will eventually be played by other STA’s, too. The requirements of this game were as follows: - Should be educational - Must be related to the theme of my CLIO module - (since that’s where it’s meant to be uploaded) But before getting down to business, I first had to propose a detailed plan for my instructional game design. So this is what I proposed: *the parts in bold are the prompts I was given to plan my game proposal* - What specific information or concept do you want to teach in your game? How will it supplement the rest of the content on your CLIO site? - I want my game to use the same kind of questions that are in the second quiz from my CLIO module: I want people to match movie titles. - What is the best game format for that information? - What kind of aesthetic will your game have? Think about how you can use colors and other visuals to make your game more cohesive and engaging. - I want my game to follow the same kind of retro game format but I want to add a few more colors to it. I want to do something with a black background and with colorful elements in the foreground. Maybe something like the Mario’s Underground. - What types of assets (buttons, popups, click-and-drag objects) will be needed? - I want to use the click-and-drag option for matching, and popups to tell the user if they are correct of if they should try again. After this plan was approved, I started working on the design on my game. The basic requirements for this portion of the training were to include: - A Begin Filter (including: a begin screen and a begin button) - Popups (text boxes to appear on command) - Clickable Elements (including: buttons, toggle elements, and drag objects) - Stationary Elements (those not meant to have any sort of interactive action, i.e. the background and such) I started out by making the begin filter. I made a green start button and a screen with a black background and a bunch of little pixelated stars. Then I reduced the opacity of this begin screen so that the stationary elements would still be visible behind the begin filter when the user started the game. Then I moved on to making the stationary elements. I included a black background and added a few layers of brick icons to organize further elements I would include. I also included the movie posters for four of the movies that anyone who’s playing this game should have already learned from going through my CLIO module. And finally, I included the movie titles in both languages (English and Spanish) along a few fake titles in Spanish, so that the user could then chose from two different translated titles when playing the game. (I also made 4 hidden location shapes in layers beneath the stationary one so when I eventually uploaded all of these elements to Canvasser, I could use those shapes to define the space where the stars should be dropped on and marked as correct/incorrect). Then I made the clickable elements. I decided to use different colored stars as the draggable objects to be dragged and dropped over the movie posters to match the proper translated title with the corresponding poster. I also made an instructions button so that when pressed it would open a popup describing the instructions of my game. Finally, I made the popups. I made three of them. One was the instruction popup that I mentioned explaining how the game works. Then I made one for when the answers were correct, and one for when they were wrong. After all of this was approved by my peer mentors, I exported all of these elements to eventually upload into Canvasser and start assembling my game there. I learned how to upload and save my files into Canvasser, how to set up my workspace, how to convert those files into objects, how to name them, etc. Then I learned all of the interactive commands that would fit my game, such as activating and deactivating the popups, how to make elements draggable, so on and so forth. When I was done, and my peer mentors checked that the game was up and running I then added the game into my CLIO module under the Quiz 2 Activity. All in all it was a completely new experience, but I learned a lot from it. Anyway, here is a link to my game, feel free to check it out! https://laits.utexas.edu/canvasser/canvasser_content/canvasser-games/villarreal-cristina-canvasser-game.html
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817438.43/warc/CC-MAIN-20240419141145-20240419171145-00340.warc.gz
CC-MAIN-2024-18
4,585
26
https://www.vostrategist.com/post/wanna-see-my-mobile-rig-the-gkn-weekly-update-9-9-14
code
How often do I blog about technical stuff? You know, microphones and recording software and suchlike? I checked and the answer is like, pretty much never. I’m just not a techie. To mix it up, I’m gonna talk about my mobile rig. And of course by mobile rig, I mean the gear I bring with me to record voiceovers when I ‘m traveling. Get your mind out of the gutter. Oh, waitaminnit, that’s me. Since I’m heading out to FaffCon next week, like a good little geek I tested my gear to make sure everything works. Here’s everything laid out all pretty-like. BTW you can click on the photos to zoom in. Does it look confusing? Let’s break it down by putting it together. This is my microphone (an AKG Perception 420) in its shock mount, which is attached to a desktop mic stand. Also attached to the mic stand is a Stedman ProScreen XL pop filter so my P’s don’t pop. Coming out of the mic is an XLR cable and that is attached to a CEntrance Mic Port Pro. The Mic Port Pro is a fancy adapter used to connect XLR cables to USB cables. It has volume controls for both the mic and the headphones. Those are audio-technica ATH-M45 headphones, BTW. See the mini-USB cable coming out of the left end of the Mic Port Pro? Let’s see where that goes… The trick is to make sure you have enough power for the microphone. That’s why the mini-USB cable is connected to a USB hub (the square black thingy). It’s like a power strip for USB cables. Coming out of the left side of that is the power cord and a regular USB cord. That USB cord is connected to a USB/micro-USB adapter. And that bad boy is plugged into my Google Nexus 10 tablet. The recording software I use is the Audio Evolution Mobile Android app. It’s pretty easy to use and easily exports wav and aiff files (but not mp3s). TIP OF THE WEEK: The whole shebang costs less than $1000 but not all of it dedicated to mobile recording. The AKG is my studio mic and I use the tablet to read audio book scripts off of. If you have questions, don’t hesitate to ask. If you’re coming to FaffCon, you’re more than welcome to check it out. My rig, that is. Damn, that just doesn’t sound good no matter how you phrase it… QUOTE OF THE WEEK: The road to success is dotted with many tempting parking spaces. Will Rogers (thanks for the quote, Lauren McCollough!) STUFF!: I saw Twelve Monkeys and We Bought a Zoo last week. Coincidence? Well, yes, it was. Terry Gilliam is another one of my all-time favorite directors. He’s the American Monty Python guy that did all their goofy animations. He’s also written & directed Time Bandits, Brazil, and The Imaginarium of Dr. Parnassus. Like Wes Anderson, he’s a genius! From Tom Dheere’s apartment, this is Tom Dheere: GKN News…
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817765.59/warc/CC-MAIN-20240421101951-20240421131951-00728.warc.gz
CC-MAIN-2024-18
2,750
13
https://forum.yoyogames.com/index.php?threads/damage-done.26416/
code
Discussion in 'Programming' started by fernnado, May 10, 2017. I guess it depends on how you're doing it, as your wording is a little weird. Technically, the life lost and the damage done should be the same, no? Just draw the value that you're subtracting from the enemy's health. I think my question was poorly worded, but Solved, I already managed to put it here the way I wanted it, thank you
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250597458.22/warc/CC-MAIN-20200120052454-20200120080454-00133.warc.gz
CC-MAIN-2020-05
395
4
https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2013-April/002413.html
code
[Bitcoin-development] [bitcoin] Enable tx replacement on testnet. (#2516) pete at petertodd.org Tue Apr 16 11:28:14 UTC 2013 On Mon, Apr 15, 2013 at 04:59:33PM -0700, Pieter Wuille wrote: > How about: keep a counter in the mempool, remembering the sum of the sizes of all replacements a transaction has had. When deciding whether to accept a transaction as a replacement, increase this number and then check whether its fee is enough for that size. That's certainly overkill, as it will correctly count network and processing overhead, but not blockchain or UTXO burdening (as those only happen after finalizing). In any case, it's easy to implement, seems safe to me, and would at least allow experimenting with this on testnet. 1) IsNewerThan() returns false if vin.size() != old.vin.size(), or if any of the prevouts (txhash/vout #) don't match. In other words the inputs to a transaction can't be changed by the current transaction replacement 2) If not for transaction replacement, nSequence could have been a boolean flag 3) The nSequence part of IsNewerThan() is essentially just another type of zero-conf transaction where you trust miners and relaying nodes to do what you tell them too. We shouldn't encourage zero-conf transactions. 4) Testnet may be for testing, but we know tx-replacement is trivially DoS-able right now. Those who want to experiment with attacks and counter measures should do so in a way that doesn't disrupt testnet for everyone - setting up their own tx-replacement enabled nodes is easy to do. 5) Zero-conf transactions, replacement or otherwise, have issues with consensus failure when network bandwidth is limited. In particular even if we require each re-broadcast of a transation to be accompanied by an increase in the fees it pays, fees += new tx size * MIN_RELAY_FEE has been proposed by a few people for instance, the cost to different nodes for that bandwidth is different. While less of an issue with 1MB blocks, with large blocks, especially blocksizes only limited by what miners think is reasonable considering available network bandwidth, lots of nodes and miners will be bandwidth starved and transaction fees will fall to the marginal cost of the network bandwidth and processing power to handle them. That cost is different for different parties - you definitely won't get consensus and thus zero-conf security in that scenario. 6) Finally zero-conf transactions have issues with consensus failures caused by limited mempool sizes. In any case, the more pressing issue re: replacement is changing fees attached to transactions after they have been broadcast. Lots of users are getting their transactions stuck with few options to fix them. The more I think about the issue the more I think we should nip this zero-conf madness in the bud: change the relay rules so that transactions are replaced based on fees regardless of how that changes transaction outputs. Of course, this does make double-spending an unconfirmed transaction trivial. On the other hand, this makes changing fees after the fact trivial, and it lets us implement a limited 'undo' button for when people screw up. It also allows for many of the applications transaction replacement was meant for in the first place anyway, and all the applications where it's actually secure. We keep saying over and over again to stop accepting zero-conf transactions, but people do it anyway because it seems secure. It's a very dangerous situation because the security of zero-conf transactions can change overnight simply by some fraction of the hashing power implementing that exact change. Some thought is required as to exactly what "replace by fees" looks like, economically optimal is a bit complex due to it's dependency on overall mempool backlog, but a rough first version should be easy to Funny enough though: I'm working on a trusted-third-party ledger design, intentially made to be close to 100% compatible with standard Bitcoin, and in that system tx-replacement by nSequence will be a perfectly reasonable thing to do. -------------- next part -------------- A non-text attachment was scrubbed... Size: 490 bytes Desc: Digital signature More information about the bitcoin-dev
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585281.35/warc/CC-MAIN-20211019202148-20211019232148-00119.warc.gz
CC-MAIN-2021-43
4,198
59
https://www.traceloop.com/blog/evaluating-model-performance-with-the-rouge-metric-a-comprehensive-guide
code
Evaluating text quality can be extremely tricky, yet it’s foundational to any use of generative AI models. But although assessing the quality of text might be easy for humans, it’s usually much harder for machines. One reason is that the criteria that determine the quality of text are not well defined. Furthermore, those criteria might change, depending on the text’s purpose and context. This blog post is the first in a series in which we will dive deep into current methods for evaluating the quality of machine learning model outputs, and present the different evaluation metrics that are currently available. In this post, we’ll present one method for evaluating the outputs of summary generation models: the Recall-Oriented Understudy for Gisting Evaluation (ROUGE) metric. This metric is especially useful when evaluating a machine-generated summary of a long text. Assume we are trying to evaluate the quality of an ML model that generates such summaries. In this case, a high-quality summary might be defined as one that preserves the most important information that appears in the reference text. It’s important to note that while a high score for the text-summarization algorithm means it’s able to preserve the most important information, meeting this criterion doesn’t necessarily mean that the text is high quality. For example, the algorithm might preserve the most important information while also generating some toxic or biased text. In other words, it might violate some additional quality-related constraints we want the generated output to respect. Therefore, the problem of evaluating the quality of generated text is a multidimensional task, with the specific dimensions defined by the specific application at hand. But we’ll try to keep things simple for this post and we’ll focus only on the amount of important information being preserved. As we’ll show next, this can be quantified with the ROUGE metric. Understanding the ROUGE Metric ROUGE is a set of metrics originally designed for evaluating text-summarization algorithms. The metrics compare an automatically produced summary against a human-produced reference summary. For illustration, consider the following human-produced reference (denoted with R) and a model-generated text (denoted with C): R: Dan loves chocolate cakes C: Dan loves chocolate chip cookies The ROUGE-n score measures the overlap of n-grams (sometimes referred to as gram length) in the reference and the generated text. This means the number of n consecutive words that appear both in the evaluated text and the measured text. Formally, we define: ROUGE[n]-recall = # n-grams that appear in both R and C / number of n-grams in R ROUGE[n]-precision= # n-grams that appear in both R and C / number of n-grams in C The ROUGE[n]-F1 score is then defined as: 2* ROUGE[n]-recall* ROUGE[n]-precision/( ROUGE[n]-recall + ROUGE[n]-precision) Back to our example: ROUGE-recall = 3/4 = 0.75 ROUGE-precision = 3/5 = 0.6 ROUGE[n]-F1 = 2*(0.75*0.6)/(0.75+0.6) = 0.66 ROUGE-recall = 2/3 = 0.66 ROUGE-precision = 2/4 = 0.5 ROUGE-F1 = 2*(0.66*0.5)/(0.66+0.5) = 0.56 While ROUGE-N is based on the overlap of n-consecutive words in both the reference and the automatically produced text, ROUGE-L considers the longest common subsequence of words (LCS) — even if they aren’t consecutive, but still in order. For instance, in our example, the LCS is “Dan loves chocolate” — and has a length of 3. Therefore: ROUGE-L-recall = ¾ = 0.75 ROUGE-L-precision = 3/5 = 0.6 ROUGE-L-F1 = 0.66 ROUGE-S is a skip-gram concurrence metric: it considers n-grams that appear in the reference text and allows the words to be separated by one or more words in the model output (but they must still appear in order). For example, consider the following sentences: R: Dan loves chocolate cakes C: Dan loves chocolate chip cookies and cakes Consider the 2-gram “chocolate cakes”: the ROUGE-2 metric will match it only if it appears in C exactly. In this example, this specific 2-gram does not match any 2-gram in C; therefore, it has 0 contribution to the ROUGE-2 calculation. However, using ROUGE-S with 3-gram skipping, “chocolate cakes” in R will be matched with “chocolate chip cookies and cakes” in C. ROUGE-S recall, precision, and F1-score can be computed in the same way as the standard ROUGE score. Which ROUGE metric should I use? That’s highly dependent on your specific use case. Rouge-n has stronger “requirements” than the others, but that restrictiveness has a cost - it will be less tolerant of small (acceptable) changes, like the use of synonyms or different word orders. Pros and Cons of ROUGE Pros – computationally, calculating ROUGE is inexpensive and fast. In addition, it can be used with any input language. Cons – ROUGE considers syntactic rather than semantic matches. This fact might have several implications: for example, it does not take into account words that have the same meaning. Also, it requires a reference evaluation, which means it cannot be used for automatic evaluation of generated outputs. As we mentioned earlier, no single metric tells the whole story. In other words, different metrics measure different aspects of quality. Therefore, it’s essential to consider different metrics when evaluating text. Stay tuned — in our next post, we’ll consider some crucial complementary metrics!
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103810.88/warc/CC-MAIN-20231211080606-20231211110606-00411.warc.gz
CC-MAIN-2023-50
5,405
39
https://moq.uservoice.com/forums/11304-general/suggestions/810291-add-verifynomoreintractions-and-verifyzerointeract
code
Add VerifyNoMoreIntractions and VerifyZeroInteractions This will allow to write tests like the following, which AFAICT are not possible at the moment: var mock = new Mock<IFoo>(); // Automatically return defaults for everything, so no additional setup. mock.Verify(foo => foo.SomeMethod()); mock.Verify(foo => foo.AnotherMethod()); Of course, one could use strict mode and specify all the expectations in advance, but that somewhat breaks the AAA approach.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866917.70/warc/CC-MAIN-20180525004413-20180525024413-00447.warc.gz
CC-MAIN-2018-22
456
7
http://askubuntu.com/questions/147842/how-to-install-python-igraph
code
I am following these instructions to install python-igraph. Adding PPA words and update works. But the install complains of the following: Couldn't find any package whose name or description matched "python-igraph" The problem is, there is no It does have a package for 11.10 though. If you are desperate, you can download the deb package meant for 11.10 and install it manually. Hopefully, you can install it without much dependency problem. I think it's better you to build it from source like in the Debian Lenny section, present in igraph wiki. Follow this link: http://igraph.wikidot.com/installing-python-igraph-on-linux#toc2
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824146.3/warc/CC-MAIN-20160723071024-00309-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
631
6
https://math.cornell.edu/xin-zhou
code
You are here Geometric Analysis; Calculus of Variations; General Relativity - MATH 4140 : Honors Introduction to Analysis II - MATH 4900 : Supervised Research - MATH 4901 : Supervised Reading - MATH 6620 : Riemannian Geometry - Existence of hypersurfaces with prescribed mean curvature I - Generic min-max (with J. Zhu), accepted by Cambridge Journal of Mathematics, arXiv:1808.03527. - Min-max minimal disks with free boundary in Riemannian manifolds, (with L. Lin and A. Sun), accepted by Geometry & Topology, arXiv:1806.04664. - Min-max theory for constant mean curvature hypersurfaces, (with J. Zhu), Invent. math. (2019) 218:441–490. - Min-max theory for free boundary minimal hypersurfaces I: regularity, (with M. Li), accepted by J. of Differential Geom., arXiv:1611.02612. - A maximum principle for free boundary minimal varieties of arbitrary codimension, (with M. Li), accepted by Comm. Anal. Geom., arXiv:1708.05001. - Curvature estimates for stable minimal hypersurfaces with free boundary, (with Q. Guang and M. Li), accepted by J. Reine Angew. Math (Crelle’s Journal), DOI: https://doi.org/10.1515/crelle-2018-0008. - Sweeping out 3-manifold of positive Ricci curvature by short 1-cycles via estimates of min-max surfaces, (with Y. Liokumovich), Int. Math. Res. Not. IMRN 2018, no. 4, 1129-1152. - Entropy of closed surfaces and min-max theory, (with D. Ketover), J. Differential Geom. 110 (2018), no. 1, 31-71. - Existence of minimal surfaces of arbitrary large Morse index, (with H. Li), Calc. Var. Partial Differential Equations 55 (2016), no. 3, Art. 64, 12 pp. - Min-max hypersurface in manifold of positive Ricci curvature, J. Differential Geom. 105 (2017), no. 2, 291-343. - On the free boundary min-max geodesics, Int. Math. Res. Not. IMRN 2016, no. 5, 1447-1466. - Min-max minimal hypersurface in (Mn+1,g) with Ricg > 0 and 2 ≤ n ≤ 6, J. Differential Geom. 100 (2015), no. 1, 129-160. - Mass angular momentum inequality for axisymmetric vacuum data with small trace, Comm. Anal. Geom. 22 (2014), no. 3, 519-571. - Convexity of reduced energy and mass angular momentum inequalities, (with R. Schoen), Ann. Henri Poincar´ e 14 (2013), no. 7, 1747-1773. - On the existence of min-max minimal surfaces of genus g ≥ 2, Commun. Contemp. Math. 19 (2017), no. 4, 1750041, 36 pp. - On the existence of min-max minimal torus, J. Geom. Anal. 20 (2010), no. 4, 1026-1055.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039563095.86/warc/CC-MAIN-20210422221531-20210423011531-00036.warc.gz
CC-MAIN-2021-17
2,393
22
http://www.bio.net/bionet/mm/neur-sci/1997-February/027454.html
code
What are the effects on people of increased atmospheric Co2? Obviously, more atmospheric Co2 means less O2 available as percentages of total gases. I remember reading, quite some time ago, that as the Co2 percentage goes up, the cognitive abilities of man are decreased. Does anyone know of any studies in this reguard?
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178369512.68/warc/CC-MAIN-20210304174506-20210304204506-00091.warc.gz
CC-MAIN-2021-10
319
6
http://www.moddb.com/members/thepriest909/groups
code
Founder/Developer at KoukouStudios A group dedicated to indie and standalone game development. For fans of indie games and hardcore indie gamers, no matter at all whether these indies are commercial or freeware/opensource! This is a hub used for... This is a group for all developers using the Unreal Developer's Kit. Open for all commercial, non-commercial and personal projects! udk developer's group Indie games are changing the world, one giant pixel at a time. With Indie DB we aim to support independent developers and their games, by providing them... For people and teams developing mods and games with Valve's Source engine. If it's information about Mod DB and ramblings about mods in general that you are after - then you have come to the right place. Welcome to the official... Grab hand picked indie games, available for a heavily discounted price every couple of weeks at Indie Royale. Desura is a community driven digital distribution service for gamers, putting the best games, mods and downloadable content from developers at gamers... Independent video-game developer, currently working on "Lethe - Episode One".
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00035-ip-10-164-35-72.ec2.internal.warc.gz
CC-MAIN-2016-26
1,130
11
https://www.codeproject.com/Questions/5299336/How-to-fix-fatal-error-uncaught-error-call-to-unde
code
Simple: don't use string concatenation to build SQL queries. It can an will leave you vulnerable to SQL Injection PHP: SQL Injection - Manual Beyond that, if you want anyone to help you fix your code, you need to show the relevant parts of your code. Which you haven't done. So nobody can help you.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499946.80/warc/CC-MAIN-20230201144459-20230201174459-00446.warc.gz
CC-MAIN-2023-06
298
3
https://crtc.gc.ca/eng/archive/2012/lt120106b.htm
code
ARCHIVED - Letter This page has been archived on the Web Information identified as archived on the Web is for reference, research or recordkeeping purposes. Archived Decisions, Notices and Orders (DNOs) remain in effect except to the extent they are amended or reversed by the Commission, a court, or the government. The text of archived information has not been altered or updated after the date of archiving. Changes to DNOs are published as “dashes” to the original DNO number. Web pages that are archived on the Web are not subject to the Government of Canada Web Standards. As per the Communications Policy of the Government of Canada, you can request alternate formats by contacting us. Our Reference: 8740-R28-201116484 Ottawa, 6 January 2012 Mr. David Watt Rogers Communications Partnership 333 Bloor Street East Toronto, Ontario, M4W 1G9 Re: Follow-up to Telecom Regulatory Policy CRTC 2011-703 – Outstanding Rating Issue (Rogers Tariff Notice 19) and Revised TPIA Service Agreement In Billing practices for wholesale residential high-speed access services, Telecom Regulatory Policy CRTC 2011-703, 15 November 2011, the Commission noted that certain network providers may incur additional service order costs related to the provision of services to independent service providers. Accordingly, the Commission determined that under the approved capacity model the service charge rate associated with the network capacity in 100 Mbps increments will apply on a per-order basis, independent of the number of increments. The Commission also directed Rogers Communications Partnership (RCP) to file for approval, by 19 December 2011, tariffs and supporting cost studies for the proposed service charge rate. The Commission is in receipt of RCP’s tariff application and, to expedite the rate review and approval process, RCP is to respond to the attached interrogatories by: 16 January 2012. These responses are to be received, and not merely sent, by this date. In its response, RCP is to disclose, on the public record, the occurrence rates (column b) and the time estimates (column f) for each sub-activity to be identified in Table 1 of the attachment. Commission staff notes that it has previously required the disclosure of similar competitor-only costing information in a Commission staff letter dated 12 May 2910, in the proceeding associated with Bell Aliant Regional Communications, Limited Partnership Tariff Notice (TN) 269 and Bell Canada TN 72051. Original signed by: Senior Manager, Competitor Services and Costing cc: Mohammed Omar, [email protected] Interested Parties to Telecom Notice of Consultation 2011-77 Interested Parties to Telecom Notice of Consultation 2011-77 [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected] ; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected] ; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected] ; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; [email protected]; - With reference to Attachment 1 of Rogers’ tariff notice 19, dated 19 December 2011, where the company identified the activities covered by the proposed service order charge: - a) Complete Table 1 (see next page) which provides the assumptions and development of the unit costs by sub-activity. - b) Provide a detailed description of each sub-activity provided in column (a) of the template, including the purpose and function of the sub-activity. - c) Provide the methodology and assumptions used to arrive at the occurrence rate (percentage of time that an activity is expected to occur) and the time estimate for each sub-activity. If the occurrence rates or time estimates are based on inputs other than from a subject matter expert (SME) inputs, then describe the source and vintage of the data used. CRTC file numbers 8740-B2-200908569 and 8740-B54-200908543 - Date modified:
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510781.66/warc/CC-MAIN-20231001041719-20231001071719-00582.warc.gz
CC-MAIN-2023-40
6,731
26
https://marketplace.visualstudio.com/items?itemName=artdiniz.quitcontrol-vscode
code
Do you hate mistyping ⌘Q and shutdown VSCode with all your unsaved and beloved work? This extension is for you! Do you hate the fact that ⌘W or CTRL+W closes VSCode if there are no open files? This extension is for you! This extension will make all "quitish" keyboard shortcuts prompt you if you really want to close everything if they were going to do so. If at any moment you hit ⌘Q (on mac) or Ctrl+Q (on other platforms) we will prompt you if you really want to quit: You can press Esc to dismiss and continue your work: You can press Enter to confirm and quit VSCode: If there is an open file, ⌘W (on mac) or Ctrl+W (on other platforms) will close it as usual. But if there is no open file, instead of closing VSCode window we will prompt you first: If you hit ⇧⌘W (on mac) or ⇧+Ctrl+W (on other platforms), instead of closing VSCode window, we will prompt you first: Release Notes v4.0.0 - 2021-07-25 New configuration quitControl.closeTabShouldTryToCloseEmptyWindow, defaults to true. Toggle macOS-like behavior of closing an empty window with the same shortcut of closing a tab: Cmd+W (macOS); Ctrl+W (Linux and Windows); Ctrl+F4 (Windows). (Linux and Windows) Preventing Alt+F4 from closing the window and prompting you instead. Consistent only on Windows for now, as VScode for Linux distros doesn't always support keybindings on Alt+F4. (Windows) New configuration quitControl.enableQuitKeybindingOnWindows, defaults to true. Enables Ctrl+Q to quit VSCode on Windows. Enabling extension to work on Remote Containers without the need to install it again. From PR#29.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476532.70/warc/CC-MAIN-20240304200958-20240304230958-00547.warc.gz
CC-MAIN-2024-10
1,590
13
https://www.lampnode.com/linux/ssh-errortoo-many-authentication-failures.html
code
SSH returns “too many authentication failures” error when you try to login remote linux host. This is a very common problem when you have many linux hosts and clients. I attempted to connect, e.g.: ssh -p 10000 [email protected] I was receiving the following error: Received disconnect from 10.0.0.1: 2: Too many authentication failures for username Specifies that ssh(1) should only use the authentication identity files configured in the ssh_config files, even if ssh-agent(1) offers more identities. The argument to this keyword must be “yes” or “no”. This option is intended for situations where ssh-agent offers many different identities. The default is “no”. Running the same ssh command and, in addition, specifying IdentitiesOnly=yes: ssh -p 10000 -o IdentitiesOnly=yes [email protected]
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154163.9/warc/CC-MAIN-20210801061513-20210801091513-00355.warc.gz
CC-MAIN-2021-31
824
8
https://playxem.com/videos/amazon-patriot-act-with-hasan-minhaj-netflix-l416e5t5m6b5i44446c5i5.html
code
On the latest Patriot Act, Hasan Minhaj dissects Amazon.com and the arguably questionable business practices it has used to grow from an e-bookstore into a powerful, multi-faceted corporation that controls a huge chunk of the online cloud. Hasan also examines whether our current antitrust laws might need an overhaul for the digital age. Watch Patriot Act with Hasan Minhaj on Netflix: https://www.netflix.com/title/80239931 #Netflix #PatriotAct #HasanMinhaj About Patriot Act with Hasan Minhaj: New episodes, new topics, every Sunday - only on Netflix. Hasan Minhaj brings an incisive and nuanced perspective to global news, politics, and culture in his unique comedy series. Subscribe to the Patriot Act channel now to stay up to date with episode clips and original content from Hasan and the Patriot Act team. Netflix is the world’s leading Internet television network with over 93.8 million members in over 190 countries enjoying more than 125 million hours of TV shows and movies per day, including original series, documentaries and feature films. Members can watch as much as they want, anytime, anywhere, on nearly any Internet-connected screen. Members can play, pause and resume watching, all without commercials or commitments. Connect with Patriot Act with Hasan Minhaj Online: Visit Patriot Act with Hasan Minhaj WEBSITE: https://bit.ly/2JbZISS Like Patriot Act with Hasan Minhaj on FACEBOOK: https://bit.ly/2R5RAWY Follow Patriot Act with Hasan Minhaj on TWITTER: https://bit.ly/2CWqPkN Follow Patriot Act with Hasan Minhaj on INSTAGRAM: https://bit.ly/2OH80Ir Amazon | Patriot Act with Hasan Minhaj | Netflix For Muslim women who face discrimination, Hasan Minhaj has some easy tips for concealing their religious identity. * Watch the latest full episode o... Hasan Minhaj weighs in on the news that President Trump will host the official White House Ramadan dinner after cancelling the event last year. Subsc... Hasan Minhaj on how white people act at Indian weddings. Hasan Minhaj stand up from the Just For Laughs Festival in 2015. Subscribe: http://bit.ly/1Sh... On the latest Deep Cuts, Hasan plays matchmaker to an audience member and three of Patriot Act's single writers. He also talks about what it's like to... In observance of Glass, a new M. Night movie, we decided to go looking for sins in The Village. And holy hell... we found some. Like... holy hell. N... Hasan Minhaj is about to start a weekly show, so naturally he turned to the most stylish man on Netflix, Queer Eye's Tan France, for some much needed ...
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583661083.46/warc/CC-MAIN-20190119014031-20190119040031-00541.warc.gz
CC-MAIN-2019-04
2,546
18
https://discuss.overhang.io/t/translations-in-tutor/2432
code
first of all I would like to congratulate you on your Tutor initiative which looks promising for the future of Open edX. I have been using and installing various Open edX versions for some years now by using the native installation procedure and I thought I should give Tutor a try, since this native installation procedure will become deprecated. I have installed the latest Tutor version, but I think there are many things different from the native installation. One of them is translations, for which I am facing the following problem. I have downloaded and installed Tutor using these instructions: Quickstart (1-click install) — Tutor documentation I ran: ‘tutor local quickstart’ and everything was in place. And I also made an admin user, so far so good. I created this folder for my greek translation in “$(tutor config printroot)/env/build/openedx/locale/el/LC_MESSAGES”, where I placed the ‘django.po’ and ‘djangojs.po’ files with my greek translation changes. I then ran the ‘tutor images build openedx’ and when it finished I ran ‘tutor local stop’ and then ‘tutor local start’, but the changes in translations are not shown. Is there a step that I have missed?
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662631064.64/warc/CC-MAIN-20220527015812-20220527045812-00209.warc.gz
CC-MAIN-2022-21
1,203
9
https://mdt.net/features/
code
MDT® (Magik Development Tools) is a flexible and intuitive visual Integrated Development Environment for Smallworld™ Magik developers. MDT is the fastest and smartest way to deliver your Smallworld solutions. The Smallworld platform grows and Smallworld applications become more complex and involve various technologies. Developing, integrating and maintaining such systems requires a flexible development environment for Smallworld Magik-based solutions. The main objective of the new IDE for Smallworld Magik was to optimize the development process for Smallworld projects using an industry open source standard Eclipse (www.eclipse.org). MDT suite is a powerful combination of existing approaches and modern programming features. MDT framework supports business needs such as efficient and rapid Smallworld application development as well as scalability and ability to build extensions and advanced tools based on the Eclipse plug-in technology. MDT maintains and supports the whole Smallworld project lifecycle starting from designing through coding, debugging as well as integrating, testing and deploying. Rapid development of Smallworld application through: - Development and maintenance of complex Smallworld systems - Configuration of various Smallworld runtime environments - Debugging Smallworld applications - Multiple Smallworld sessions management - Integration with version control systems (CVS, ClearCase, Subversion and other) - Integration with other platforms e.g. Java, XML, UML, PHP etc. - Integration with other Eclipse plug-ins Code assist for effective development through: - User-friendly GUI - Magik code generation by means of customizable templates - Automatic code completion - Context hints - Powerful source code analysis - Simple control of products, modules etc. Return of investment: - Up to 40% shorter time-to-costumer for Smallworld solutions - Up to 40% faster introduction of new employees in Smallworld - Optimization of the investment in human and technology resources
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474581.68/warc/CC-MAIN-20240225035809-20240225065809-00823.warc.gz
CC-MAIN-2024-10
2,012
22
http://www.symantec.com/connect/forums/status-58-cant-connect-client-0
code
Status 58 = can't connect to client. Created: 26 Aug 2013 • Updated: 16 Oct 2013 | 24 comments This issue has been solved. See solution. I'm getting the below error Status = can't connect to client. Client host properties shows cannot connect to socket. How can we resolve?
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645371566.90/warc/CC-MAIN-20150827031611-00249-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
275
7
https://wiki.mikrotik.com/wiki/Manual:IP/SOCKS
code
MikroTik RouterOS supports SOCKS proxy server, version 4. SOCKS is a proxy server that allows TCP based application data to relay across the firewall, even if the firewall would block the packets. The SOCKS protocol is independent from application protocols, so it can be used for many services, e.g, WWW, FTP, TELNET, and others. At first, an application client connects to the SOCKS proxy server, then the proxy server looks in its access list to see whether the client is permited to access the remote application resource or not, if it is permitted, the proxy server relies the packet to the application server and creates a connection between the application server and client. Remember to configure your application client to use SOCKS version 4. You should secure the SOCKS proxy using its access list and/or firewall to disallow access from outisde. Failing to secure the proxy server may introduce security issues to your network, and may provide a way for spammers to send junk mail through the router. - connection-idle-timeout (time; default: 2m) - time after which idle connections are terminated - enabled (yes | no; default: no) - whether to enable or no the SOCKS proxy - max-connections (integer: 1..500; default: 200) - maxumum number of simultaneous connections - port (integer: 1..65535; default: 1080) - TCP port on which the SOCKS server listens for connections Submenu level: /ip socks access In the SOCKS access list you can add rules which will control access to SOCKS server. This list is similar to firewall lists. - action (allow | deny; default: allow) - action to be performed for this rule - allow - allow packets, matching this rule, to be forwarded for further processing - deny - deny access for packets, matching this rule - dst-address (IP address/netmask) - destination (server's) address - dst-port (port) - destination TCP port - src-address (IP address/netmask) - source (client's) address for a packet - src-port (port) - source TCP port Submenu level: /ip socks connections The Active Connection list shows all established TCP connections, which are maintained through the SOCKS proxy server. - dst-address (read-only: IP address) - destination (application server) IP address - rx (read-only: integer) - bytes received - src-address (read-only: IP address) - source (application client) IP address - tx (read-only: integer) - bytes sent - type (read-only: in | out | unknown) - connection type - in - incoming connection - out - outgoing connection - unknown - connection has just been initiated To see current TCP connections: [admin@MikroTik] ip socks connections> print # SRC-ADDRESS DST-ADDRESS TX RX 0 192.168.0.2:3242 184.108.40.206:80 4847 2880 1 192.168.0.2:3243 220.127.116.11:80 3408 2127 2 192.168.0.2:3246 18.104.22.168:80 10172 25207 3 192.168.0.2:3248 22.214.171.124:80 474 1629 4 192.168.0.2:3249 126.96.36.199:80 6477 18695 5 192.168.0.2:3250 188.8.131.52:80 4137 27568 6 192.168.0.2:3251 184.108.40.206:80 1712 14296 7 192.168.0.2:3258 220.127.116.11:80 314 208 8 192.168.0.2:3259 18.104.22.168:80 934 524 9 192.168.0.2:3260 22.214.171.124:80 930 524 10 192.168.0.2:3261 126.96.36.199:80 312 158 11 192.168.0.2:3262 188.8.131.52:80 312 158 [admin@MikroTik] ip socks connections> FTP service through SOCKS server Let us consider that we have a network 192.168.0.0/24 which is masqueraded, using a router with a public IP 10.1.0.104/24 and a private IP 192.168.0.1/24. Somewhere in the network is an FTP server with IP address 10.5.8.8. We want to allow access to this FTP server for a client in our local network with IP address 192.168.0.2/24. We have already masqueraded our local network: [admin@MikroTik] ip firewall nat> print Flags: X - disabled, I - invalid, D - dynamic 0 chain=srcnat action=masquerade src-address=192.168.0.0/24 [admin@MikroTik] ip firewall nat> And the access to public FTP servers is denied in firewall: [admin@MikroTik] ip firewall filter> print Flags: X - disabled, I - invalid, D - dynamic 0 chain=forward action=drop src-address=192.168.0.0/24 dst-port=21 protocol=tcp [admin@MikroTik] ip firewall filter> We need to enable the SOCKS server: [admin@MikroTik] ip socks> set enabled=yes [admin@MikroTik] ip socks> print enabled: yes port: 1080 connection-idle-timeout: 2m max-connections: 200 [admin@MikroTik] ip socks> Add access to a client with an IP address 192.168.0.2/32 to SOCKS access list, allow data transfer from FTP server to client (allow destionation ports from 1024 to 65535 for any IP address), and drop everything else: [admin@MikroTik] ip socks access> add src-address=192.168.0.2 dst-port=21 \ \... action=allow [admin@MikroTik] ip socks access> add dst-port=1024-65535 action=allow [admin@MikroTik] ip socks access> add action=deny [admin@MikroTik] ip socks access> print Flags: X - disabled 0 src-address=192.168.0.2 dst-port=21 action=allow 1 dst-port=1024-65535 action=allow 2 action=deny [admin@MikroTik] ip socks access> That's all - the SOCKS server is configured. To see active connections and data transmitted and received: [admin@MikroTik] ip socks connections> print # SRC-ADDRESS DST-ADDRESS TX RX 0 192.168.0.2:1238 10.5.8.8:21 1163 4625 1 192.168.0.2:1258 10.5.8.8:3423 0 3231744 [admin@MikroTik] ip socks connections> Note! In order to use SOCKS proxy server, you have to specify its IP address and port in your FTP client. In this case IP address would be 192.168.0.1 (local IP address of the router/SOCKS server) and TCP port 1080.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100448.65/warc/CC-MAIN-20231202172159-20231202202159-00124.warc.gz
CC-MAIN-2023-50
5,456
43
http://www.binaryoptionstradingplatforms.org/crypto-currencies/how-to-get-started-in-crypto-currencies-coinbase-wallet-bitcoin-litecoin-ripple-bitcoin-mining/
code
How to Get Started in Crypto Currencies, Coinbase Wallet, BitCoin, LiteCoin, Ripple & BitCoin Mining YOU CAN START with just 0…use these 3 Easy Steps with Time-Tested and Proven and Trustworthy Crypto Currency wallet and exchange…Plus BONUS to Get Started with BitCoin & Coin Mining —-first get a wallet here: http://bit.ly/GetBitCoinBase –1–Get a CoinBase Wallet and Start with of FREE Bitcoin for signing up with just 0: http://bit.ly/GetBitCoinBase – start with 0 and Get free –2–Set Up a HashFlare Account and Set Up 24/7 BitCoin Money Printing Machine: https://hashflare.io/r/B5E165D or –3–Lend BitCoin and Exchange or Buy NEW Types of Coins (Ripple, LiteCoin): https://www.binance.com/?ref=18115001 or http://bit.ly/BinanceTradeBitcoin —-HIDDEN BONUS– Rent Crypto Miner Rig Groups and Make 10X: 2018 is the Year-of-Crypto Currency. recently, Billionaire John McAfee said, “BitCoin will hit ,000-,000 before end of 2018”. It’s not too late, there is still HUGE opportunities with ALL major banks investing in Crypto-Currency Take action this year, you might have missed the early Gold Rush, but it’s not done by a long shot. Be encouraged and get started TODAY… My HashFlare account generated TODAY alone mining Bitcoin while I slept… GET ON THE BITCOIN TRAIN!! bitcoin, #bitcoin, #litecoin, $btcusd, bitcoin price, bitcoin value, bitcoin price today, bitcoin to usd, bitcoin news, bitcoin cash, bitcoin price chart, bitcoin stock, bitcoin mining, bitcoin mining, bitcoin explained, bitcoin cash, bitcoin for dummies, bitcoin millionaire, bitcoin mining 2017, cryptocurrency, bitcoin wallet, bitcoin value, bitcoin price today, stock market, best stock signals on the internet, crypto christian, best miners, bitcoin bubble, bitcoin stock
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540525781.64/warc/CC-MAIN-20191210013645-20191210041645-00334.warc.gz
CC-MAIN-2019-51
1,779
19
https://lists.debian.org/debian-kde/2004/05/msg00236.html
code
Re: background: world time zones On 17 May 2004, [email protected] wrote: > On Monday 17 May 2004 10:53, Uwe Brauer wrote: >>> kcontrol -> Appearance and Themes -> Background -> Advanced -> [x] >>> Use the following program... -> kdeworld >> Thanks, but seems not to be in kde 3.1.5, I might upgrade then > The Debian package you need is called 'kworldwatch' - I'm sure it > was part of KDE 3.1.5, but you simply may need to install this > package :) > Cheers, Gavin. Well, I found kworldclock, which seems pretty much what you are describing, however I fail to configure it as a background, since I don't find the corresponding walletpaper.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948214.37/warc/CC-MAIN-20180426125104-20180426145104-00072.warc.gz
CC-MAIN-2018-17
641
13
https://www.honeycomb.io/blog/feature-focus-october-2022
code
Feature Focus: October 2022By Nick Rycar | Last modified on November 9, 2022 There are a ton of leaves in my yard, and I’m slowly coming out of a weeklong sugar coma. That can only mean October has come and gone. Let’s take a peek at what new and noteworthy changes Honeycomb has made since we last checked in. October updates revisited We had a busy October, and rounded the month off with a major launch. If you missed it, the two biggest changes were the introduction of a new Service Map feature, which generates a dynamic architecture diagram from your telemetry, alongside a massive overhaul of BubbleUp, a powerful tool for identifying common dimensions across problematic events. If that wasn’t enough, we had some exciting integration news as well. A new ServiceNow integration gets you from your alerts to diagnosing issues quicker than ever. And, with a new Gradle plugin, you can generate OpenTelemetry traces from your builds automatically. These integrations were created by eager Honeycomb employees, and while not ‘official’ Honeycomb integrations, are super helpful and worth a download! Back in March, we released an update to how datasets are organized in Honeycomb. Teams created prior to that update continue to work as they had previously (now dubbed Honeycomb Classic), but will be unable to use some new features, like Service Map. To assist with teams looking to migrate their data from Honeycomb Classic to the new Environments model, we’ve released new migration documentation to help get you going. We now have support for OpenTelemetry logs, and have created a guide for sending OTel logs to Honeycomb in our docs. Add tracing to your CI/CD pipelines with buildevents You can add tracing to more than just your apps themselves: buildevents is a small binary used to help instrument builds. The end result is the ability to diagnose slow builds and flaky tests with the same tools you use to troubleshoot your applications. Guides and helpers In addition to a CircleCI orb, we’ve released some provider-specific implementation guides to assist in your adoption of buildevents. We recently announced our GitHub Actions guide, and we have a GitLab CI/CD guide available as well. Keep your eyes peeled for another coming soon. Once you’re sending your build data to Honeycomb, you may wonder where to go from there. We’ve got you covered: the Terraform Buildevents starter pack provides an easy way to set up tailored dashboards and queries to help you get insights from your builds quickly. The biggest news on the telemetry front is that Honeycomb’s .NET OpenTelemetry distribution is now GA. Check out the notes for the 1.0.0 release. Other updates include: - honeycomb-lambda-extension v11.1.0 - a new HTTP connection timeout configuration knob (thanks, @danvendia). - honeycomb-opentelemetry-java v1.4.0 - an upgrade to upstream OTel (and other dependencies). - libhoney-go v1.18.0 - now reports which version of Go and on what operating systems and CPU architectures it is used. - Refinery helm-chart update - Updated to deploy Refinery 1.15.1. User experience improvements Choose your own adventure: logs & traces In the past, when you created a new dataset, the empty state page would direct you to quickstart guides for sending traces to Honeycomb. That said, there are multiple ways to start sending us data, including built-in support for numerous log formats. With that in mind, we now provide the option to select whether you’d like to send us logs or traces, with use-case specific guidance for next steps. Even more derived columns editor updates The derived columns editor has become a Feature Focus staple! We’ve further improved the new look and feel of the editor. Changes include: - A “copy” button to quickly snag the full contents of your function - The function text window is now resizable - The preview pane shows when it was last refreshed, and has a manual refresh button That’s it for our October updates! You can find a full list of updates we’ve made to Honeycomb in our changelog, in Pollinators Slack, or by following our Twitter account via #changelog. See you next month! Feature Focus: Winter Edition ❄️ It’s been a minute since our last Feature Focus, and we have a bit of catching up to do! I’m happy to report we’ll resume... Get the Big Picture: Learn How to Visually Debug Your Systems with Service Map—Now Available in Sandbox Honeycomb’s Service Map gives you the unique capability to filter by both services and traces so you can generate maps that isolate very specific areas... Your Data Just Got a Facelift: Introducing Honeycomb’s Data Visualization Updates Over the past few months, we've been hard at work modernizing Honeycomb’s data visualizations to address consistency issues, confusing displays, access to settings, and to...
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943555.25/warc/CC-MAIN-20230320175948-20230320205948-00532.warc.gz
CC-MAIN-2023-14
4,854
41
https://cs.gmu.edu/~antonis/publication/dou-etal-2020-dynamic/
code
Back-translation has proven to be an effective method to utilize monolingual data in neural machine translation (NMT), and iteratively conducting back-translation can further improve the model performance. Selecting which monolingual data to back-translate is crucial, as we require that the resulting synthetic data are of high quality and reflect the target domain. To achieve these two goals, data selection and weighting strategies have been proposed, with a common practice being to select samples close to the target domain but also dissimilar to the average general-domain text. In this paper, we provide insights into this commonly used approach and generalize it to a dynamic curriculum learning strategy, which is applied to iterative back-translation models. In addition, we propose weighting strategies based on both the current quality of the sentence and its improvement over the previous iteration. We evaluate our models on domain adaptation, low-resource, and high-resource MT settings and on two language pairs. Experimental results demonstrate that our methods achieve improvements of up to 1.8 BLEU points over competitive baselines.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178385378.96/warc/CC-MAIN-20210308143535-20210308173535-00587.warc.gz
CC-MAIN-2021-10
1,153
1
https://www.codeproject.com/Articles/16901/Falling-Snow-on-Your-Desktop-The-C-Version?msg=4185954
code
I posted my article Falling Snow on Your Desktop! just a week ago, and received many requests regarding a C# version of the application. So, the C# version is here. Every time the Christmas holidays come, I think about funny toys for my desktop. <ps>Searching through the Internet, you can easily find many wonderful desktop gifts for any occasion, including Christmas time. Unfortunately, I couldn't find any source code or open source sample of such desktop animations. So, I decided to create my own application that makes it snow on the desktop over other windows. As I can see from the Internet, many authors use different ways to display snow fall on the desktop. I tried to create my application as simple as possible, and decided to develop a system tray application with numerous child flake windows. I think this method is the simplest, but has a few limitations regarding memory and video usage. - Creating the main window. We need to create a hidden form and prevent more than one open 'Snow' window at the same time. I used a piece of code from the article 'Restricting Application to a Single Instance' by Vasudevan Deepak Kumar. The following code fragment shows how to do this: private static Mutex m_Mutex; m_Mutex = new Mutex(true, "SnowFallMutex"); if (m_Mutex.WaitOne(0, false)) - Installing the system tray icon. If you need step-by-step instructions on how you can do this, read the 'C# Tip: Placing Your C# Application in the System Tray' article by Tom Archer. - Creating the array of snow flakes. In this application, each snow flake has been created as a non-modal window form, with its own, timer-dependent, movement function. private void OnLoad(object sender, EventArgs e) Rectangle rcWorkArea = Screen.PrimaryScreen.WorkingArea; int nScreenWidth = rcWorkArea.Width; int nTimer = 5; int nPosX = 0; Random r = new Random(); for (int i = 0; i < 10; i++) nTimer = r.Next(50); nPosX = r.Next(nScreenWidth); FlakeDlg fd = new FlakeDlg(nTimer, nPosX); - Creating a flake shape from the bitmap. Before running the window, we need to create a flake region that shows the window as a real snow flake. I used the ' BitmapRegion.CreateControlRegion' function from the article of Weiye Chen. - The last step: start the timer and enjoy. The last thing to do is start the timer and see how the flakes move. I used a very simple algorithm below, but it is sufficient to show thr snow movement on the desktop. private void OnTimer(object sender, EventArgs e) m_nCurrentY += 5; Random r = new Random(); if (m_nCounter == 15) if ((r.Next(10) - 5) > 0) m_nIncrement = 1; else m_nIncrement = -1; m_nCounter = 0; m_nCurrentX += m_nIncrement; if (m_nCurrentY > m_nScreenHeight) m_nCurrentY = 0; m_nCurrentX = r.Next(m_nScreenWidth); m_nTimer = r.Next(50) + 10; this.Left = m_nCurrentX; this.Top = m_nCurrentY; this.timerMove.Interval = m_nTimer; This example can be extended by drawing snowdrifts on the desktop, and displaying Santa, Snowman, and other objects. You can experiment with the flakes positioning (top, topmost, bottom), the number of flakes, the falling speed etc. Anyway, I hope others find this code useful for the Christmas holidays. Please feel free to report errors, issues, or requests. This member has not yet provided a Biography. Assume it's interesting and varied, and probably something to do with programming.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656833.99/warc/CC-MAIN-20230609201549-20230609231549-00265.warc.gz
CC-MAIN-2023-23
3,342
46
https://www.na94.com/doc.php?id=2
code
If your system is 64bit you need to set the OS to test mode, or not driver load failed. Next step you need to test your motherboard supported by na-exp or not. Click the button called driver, you will see as shown below. If you can see the port list in your port manager, it prove your motherboard is supported by na-exp. After that you can use na-exp recover your data easily as shown below.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657735.85/warc/CC-MAIN-20230610164417-20230610194417-00436.warc.gz
CC-MAIN-2023-23
392
2
http://www.dbai.tuwien.ac.at/user/wisser/schnapsen/rules/
code
Schnapsen is a 2-player card game wide spread in Central Europe, with over 300 years of history. Like many games with a long tradition, there are many variants of the game. Unfortunately unlike in other games, no variant was able to replace the others becoming de facto standard. It is quite usual, that players have to negotiate a ruleset they use before or even during play. We describe the ruleset used in nearly all tournaments throughout Austria, mentioning known variantions. For Schnapsen, a standard Bridge deck, removing all cards from 9 downwards can be used. An alternative deck of cards is used in many regions, with different symbols for suits called acorn, leaf, heart and bell. See a picture of a "doppeldeutsches Blatt" and a mixed deck, showing both designs on half of its face. From either of these decks the same subset of 20 cards, containing ace (A), king (K), queen (Q), jack (J) and ten (10) is used. The game does not depend on the deck used and we will stick with the usual suits, spades (♠), hearts (♥), diamonds (♦) and clubs (♣). We will denote cards by their value and suit throughout, e.g.: ♦A, for the ace of diamonds, ♠10, for the 10 of spades, etc. When referring to cards with the same value, but arbitrary suit we will write • for the suit. E.g. •A, for an arbitrary ace, etc. Each card has an associated numerical card value. This value is taken to determine the points a player scores by a trick and furthermore determines the card hierarchy. The numerical card values are given in the following list: Variant (66): Mostly played in Germany, there is a variant of the game called 66, which is played with a deck of 24 cards adding the 9s. •9 has the numerical card value 0. Card strength is a partial order depending on the trup suit. That means, that not any pair of cards has a stronger card. A card C1 is stronger than another card C2 if either The leading player chooses an arbitrary card from his hand and places it face up on the table. If the stack is open, the replying player may choose an arbitrary card, if the stack is closed he has to choose a cards following two rules: The player who did the trick takes the trick points, the sum of the cards values, and places the cards face down on a pile on his side of the table. The players are allowed to look at the cards in their pile at any time. They are not allowed to look at the opponents pile. Variant (PB): The players are not allowed to look at the cards in their pile, but only the cards from the last trick played. Variant (PA): The players are allowed to look at the cards of the first trick, each player scored. If the stack is open, each player takes the topmost card from the stack, starting with the winner of the trick. The player who did the trick leads the next trick. When holding a suited couple in his hand, that is •K, •Q with • the same suit, the leading player may play either of the two, showing both to the opponent declaring to play a mariage. This adds additional 20 points to his trick score if the suit of the couple is non-trump and 40 points if the couple is in trump suit. The player may well choose to play any other card of his hand or even choose to play a card of the couple without declaring a mariage. Variant (M1): The leading player must not declare a mariage leading the very first trick. Variant (MK): If the leading player declares a mariage, he must lead the king of that couple. If the stack is open and the leading player holds the trump jack, he may, prior to all other actions, exchange the current turnup (see section on dealing) with the trump jack. Variant (J1): The leading player must not exchange the trump jack leading the very first trick. Variant (JP): The leading player must not exchange the trump jack, if the stack consists of only 2 card. If the stack is open, the leading player may close the stack, prior to playing the leading card. He does so, by placing the turnup card on top of the stack. The stack is closed automatically if it runs out of cards. Variant (CP): The leading player must not close the stack, if the stack consists of only 2 card. A game starts with the dealer shuffling the deck, allowing the opponent to cut the deck and dealing cards in the following order: 3 cards to the opponent, 3 cards to himself, 1 card face up on the table, 2 cards to the opponent and 2 cards to himself. The remaining deck is placed face down on the table and is referred to as the stack. The card lying face up on the table is called turnup, and determines the trump suit. It is considered the bottommost card of the stack. The player opposite to the dealer starts leading the first trick. Tricks are played, until a player checks out of the game or both players run out of cards. A player may check out of the game immediately after scoring points by either declaring a mariage or making a trick. The player making the very last trick, with both players holding no more cards, is given the chance to check out before the game ends with no check out. If a game is ended, the winner of the game is rewarded a game score of 1, 2 or 3. Game scoring is a little bit involved and there are several variants. If the stack is still open or it was closed automatically: If no player checked out, the game was ended automatically by the last trick. A set is a succession of games. At the start of a set, each player holds a game score of 7 points. If a player wins a game by a score of 1, 2 or 3, this score is subtracted from his game score, without writing negative numbers (that is, if a player holds a game score of 2 and wins a game with a score of 3, his game score is set to 0). The function of being dealer of the games alternates between the players. The player first reaching a game score of 0 wins the set (or Bummerl). It is a linguistic idiosyncrasy, that the looser is said to have got the Bummerl, instead of the winner. Variant (SB): If a player wins a set, without any game score of the opponent (the opponent holding a game score of 7), the winner scores 2 sets and the looser is said to have got a Schneiderbummerl (or Schneider). A match is typically played best of 1 or more sets (Bummerls). E.g. the players arrange to play best of 5 (first to 3) sets. The player dealing the first game is determined by any acceptable means. After that, the dealer of the first game of each set alternates. If Player 1 was dealing the first game of the first set, Players 2 deals the first game of the second set, etc.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125849.25/warc/CC-MAIN-20170423031205-00502-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
6,497
27
https://it4ever.eu/index.php/node-js.html
code
Includes the latest version of Node.js, Apache, Python, and Redis. Node.js uses an event-driven, non-blocking I/O model that makes it lightweight and efficient, which makes it perfect for data-intensive real-time applications that run across distributed devices. * Admin Package included: OpenVPN, SSH, SFTP, OS root access Node.js uses an event-driven, non-blocking I/O model that makes it lightweight and efficient. Node.js' package ecosystem, npm, is the largest ecosystem of open source libraries in the world. Your Virtual Machine Specs Your Node.js Server will be running on an isolated and secure Virtual Machine with the following configuration 1 : - CPU: 1 vCPU on 7th Generation Intel® Core™ i5-7260U Physical Processor(s) - Base Frequency: 2.20 GHz - Max Turbo Frequency: 3.40 GHz - Memory: 512 MB on 32 GB DDR4-2133 Physical Memory Chip(s) - DDR4-2133 1.2V SO-DIMM - Max Memory Bandwidth: 34.1 GB/s - Disk Size: 15.56 GB on 1TB M.2. SSD Physical Storage Chip(s) - M.2 Solid-State Drive (SSD) - Sequential Read: 530 MB/s - Sequential Write: 510 MB/s - Random Read IOPS: 92 K - Random Write IOPS: 83 K Note 1 : Virtual Machine Resources are already optimized for performance. Under extreme usage or circumstances, more resources can be easily acquired via our Add-ons section.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588398.42/warc/CC-MAIN-20211028162638-20211028192638-00368.warc.gz
CC-MAIN-2021-43
1,289
20
https://www.nintendolife.com/forums/other_gaming/pc_gaming?start=1680
code
1,681skywakeFri 31st Dec 2021 One thing I love about PC gaming is the ability to revisit older titles that used to be demanding. Just installed and played a round of C&C Generals Zero Hour which back when it came out my PC struggled to run. Kinda crazy going back to it now, maxing out all of the sliders etc. Game pretty much loads instantly and never drops a single frame Of course rationally this isn't that impressive, the game is old enough it can almost vote. Quite literally the hardware I originally ran this game on would be less capable than my watch, and not by a small margin. But it still blows my mind seeing a game I played enough at a lower level of performance that the performance dips were "part of the gameplay" and having the game just.... not stop.... Some Aussie musics: Pond, TFS, Genesis Owusu "Don't stir the pot" is a nice way of saying "they're too dumb to reason with"
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662564830.55/warc/CC-MAIN-20220524045003-20220524075003-00180.warc.gz
CC-MAIN-2022-21
897
1
https://www.desertcart.ae/products/156001215-vct12603-victor-1260-3-two-color-heavy-duty-printing-calculator
code
We are still dispatching all items as quickly as possible. Orders containing food, health & safety, and other essential products will be prioritized. Power_Sources - AC. Display_Notation - Numeric. Number_Of_Display_Digits - 12. Memory - 4-Key. Imported from USA. Affordable commercial printing model with cost-sell-margin and time/date features. Luminous fluorescent display is brighter than LCD in low light. Power Sources: AC Display Notation: Numeric Number of Display Digits: 12 Memory: 4-Key.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737206.16/warc/CC-MAIN-20200807172851-20200807202851-00470.warc.gz
CC-MAIN-2020-34
498
8
http://tattoologist.nataliehanks.com/2010/10/31/forearms/
code
”Aesthetics don’t come second to ethics” ”Our best second hand picks right now” ”One of my favorite dishes at the moment” ”Packing some beauty favorites for France” ”13 women in the front line of COP21 ” love the second one!
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398525032.0/warc/CC-MAIN-20151124205525-00346-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
246
6
https://engineering.purdue.edu/AAE/research/Dynamics
code
Dynamics and Control All modern aerospace vehicles rely upon an understanding of dynamics and control to improve system performance. Successful system design requires an understanding of the interactions of dynamic elements, and the trade-offs between vehicle dynamic characteristics, control system properties, and system performance. Current research is divided into the following areas: aircraft design for improved handling qualities, astrodynamics, robust and nonlinear control theory and applications, estimation theory and applications, dynamics and control of flexible spacecraft, mission design, modeling and control of aeroelastic aircraft, spacecraft maneuvers and trajectory analysis and optimization. Certain research projects and teaching activities require advanced and specialized laboratory facilities. The Control Systems Laboratory (CSL) contains high-end workstations. The mission of the CSL is to develop methods and tools (software) for the analysis and design of complex dynamical systems and to promote the availability and use of the methods by teaching relevant courses and interacting with industry. Experiments used for undergraduate instruction include a two-degree-of-freedom helicopter experiment, a three-degree-of freedom rotational system to emulate the attitude dynamics of a flexible spacecraft, and an inverted pendulum. Remotely Piloted Vehicle, currently under development, represents a unique research facility upon which to perform many experiments in vehicle dynamics and control. Data communication with a computer based ground station is provided by a seven channel telemetry downlink.
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00411-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
1,629
4
http://www.ae.iitm.ac.in/pipermail/ilugc/2012-July/072548.html
code
[Ilugc] One day FOSS workshop in Sakthi Polytechnic College, Near Bhavani, Erode Dt. baskar at linuxpert.in Tue Jul 24 11:23:35 IST 2012 One day FOSS workshop was conducted in Sakthi Polytechnic College, Near Bhavani, Erode Dt. (http://www.sakthitech.net/spc) on 20/07/12 for the 2nd and 3rd year students of Computer Technology, totaling 120+ students. A hands-on session was given to all the students to remotely install Ubuntu 12.04 LTS in their desktops. After installation the students were introduced to package management using apt-get / ubuntu software center. I would like to thank Mr. Senthilarasu, HOD / Computer Technology for organising the workshop. More information about the ilugc
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195532251.99/warc/CC-MAIN-20190724082321-20190724104321-00492.warc.gz
CC-MAIN-2019-30
696
14
https://blogs.msdn.microsoft.com/alfredth/2006/01/11/interview-with-a-game-user-research-engineer/
code
Pat Phillips introduces Melissa Federoff on her blog. Melissa tests games. Now a lot of the students I have been talking to think that is pretty much the ideal career. There is a lot more to this sort of job than just being good at playing games. Valuable information for students interested in the game industry. You or your students can listen to the audio here or get the transcript here.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514575513.97/warc/CC-MAIN-20190922114839-20190922140839-00214.warc.gz
CC-MAIN-2019-39
391
1
http://computerklinika.com/sql-server/repair-2147467259-timeout-error-while-running-a-query.php
code
You cannot hanging against the outer wall? nightly CSV extract, containing both inserts and updates, has about 6000 rows. The while getting stuck in sys.transmission_queue. They can easily hide the complexity of a process from… MS Access Visual Basic Classic to the App_Data directory I got thie error Error: Timeout expired. query this content Related Error: System.Data.SqlClient.SqlException: Timeout Expired. running Microsoft Odbc Sql Server Driver Query Timeout Expired error would be more than appreciated. query Generally in these situations, a timeout error can other DTS packages on the machine and none appear to run at the same time. If you use NetBIOS or DNS names to Browse other questions tagged sql-server vb6 timeout tags are for.The error messages the troubleshooting experience of the IU School of Medicine Division of Biostatistics. Top White Papers and Webcasts Popular Compare 20 Leading ERP Solutions 29 zip to \sm01 estorelogs... a support incident with Microsoft if problems continue. Microsoft Odbc Sql Server Driver Login Timeout Expired All error nothing unique about it.What does SauronDatabase Groups Your account is ready. You cannot You cannot This Site cause ... "fatigue" to the Sql Server and it gives the error.PrivacyMessage Ways Related Bring ROI to your BYOD - Forrester documents benefits of ... than sufficient for an insert/update/delete.Nov 10, 2006 Hi,Iget this error from our web Sql Server Connection Timeout Expired Pre-login Handshake By default it 19 Experts available now in Live! Plz. This error appear after my technical teamThe time that the DTS package runs was modified last week to run twothe operation or the server is not responding.Potion of Longevity and a 9 year old 2147467259 http://computerklinika.com/sql-server/repairing-asp-net-sql-server-timeout-error.php of the resources being used - make use of connectionless recordset. Comment Submit Your Comment By clicking you a metal sword resistant to lava?To avoid this problem, connect to The users table https://technet.microsoft.com/en-us/library/ms190181(v=sql.105).aspx What while you... You cannot FYI, I have 2 different VBdetails to offer anything resembling help here. error You cannot edit Expired? parameter to change so you can increase the connection time out.The Timeout Period Elapsed Prior To Completion Of or the server is not responding.This is what I did. UITS recommends contacting all available support How To Resolve Timeout Error In Sql Server ack) is: This message could not be delivered because it is a duplicate. http://computerklinika.com/sql-server/solved-ado-error-2147467259-sql-state-08001.php Most make you temporarily insert an ID field, make a have this error but the 2nd one caused this error.You cannot a days, I am afraid it will slow down theserver more.replies to polls. The step failed.Any help on this It is Timeout Expired In Sql Server send emails.Timeouta differnet kind of message, and it is replying to a different service broker instance.Fails to connect.Windows Vista or Windows Server 2008Windows Please enter a last name Email We will never share this with anyone. Did the a post IFCode.Also, there are other forms in the same app that alsoCanany one tell me how to check whats going on& Regards,Sai.Did you check the sql server sidereplace old server with the new server. check my blog Caused It?old SQL server and but It couldn’t take the backup cause I changed the machine.Those are your two order to find a possible correlation to failed SQL Server logins. Should I include Timeout Expired. The Timeout Period Elapsed is not guaranteed to solve all timeout errors. Reusing Command objects is a good practice when you're re-executing the Thanks. supress all divine magic?Sounds like maybe you have blocking on your sql server Fails to connect.Windows Vista or Windows Server 2008Windows Vista or Windows The employee table has caused the problem - finally. Return the query without intra-query parallelism byTimeout Expired.... query You cannot Sql Server Login Timeout Expired 10.4.3.2 and nslookup test.box.iu.edu to verify bidirectional resolution via DNS. a The live table has just over 800,000 rows of data and our query Anyone know how Manage Your Profile | Site Feedback Site while error Query Timeout Expired Sql Server 2008 R2 for the civil rights movement?not executing completely. But other server, and of the device initiating the connection. timeout error thrown by SQL Server. © Copyright 2018 computerklinika.com. All rights reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823872.13/warc/CC-MAIN-20181212112626-20181212134126-00387.warc.gz
CC-MAIN-2018-51
4,523
19
https://otexts.org/fpp2/hierarchical-reading.html
code
10.9 Further reading There are no other textbooks which cover hierarchical forecasting in any depth, so interested readers will need to tackle the original research papers for further information. - Gross and Sohl (1990) provide a good introduction to the top-down approaches. - The reconciliation methods were developed in a series of papers, which are best read in the following order: Hyndman et al. (2011), Athanasopoulos, Ahmed, and Hyndman (2009), Hyndman, Lee, and Wang (2016), Wickramasuriya, Athanasopoulos, and Hyndman (2018). - Athanasopoulos et al. (2017) extends the reconciliation approach to deal with temporal hierarchies. Gross, C W, and J E Sohl. 1990. “Disaggregation Methods to Expedite Product Line Forecasting.” Journal of Forecasting 9: 233–54. Hyndman, Rob J, Roman A Ahmed, George Athanasopoulos, and Han Lin Shang. 2011. “Optimal Combination Forecasts for Hierarchical Time Series.” Computational Statistics and Data Analysis 55 (9): 2579–89. https://doi.org/10.1016/j.csda.2011.03.006. Athanasopoulos, George, Roman A Ahmed, and Rob J Hyndman. 2009. “Hierarchical Forecasts for Australian Domestic Tourism.” International Journal of Forecasting 25: 146–66. https://doi.org/10.1016/j.ijforecast.2008.07.004. Hyndman, Rob J, Alan Lee, and Earo Wang. 2016. “Fast Computation of Reconciled Forecasts for Hierarchical and Grouped Time Series.” Computational Statistics and Data Analysis 97: 16–32. Wickramasuriya, Shanika L, George Athanasopoulos, and Rob J Hyndman. 2018. “Optimal Forecast Reconciliation for Hierarchical and Grouped Time Series Through Trace Minimization.” J American Statistical Association to appear. https://robjhyndman.com/publications/mint/. Athanasopoulos, George, Rob J Hyndman, Nikolaos Kourentzes, and Fotios Petropoulos. 2017. “Forecasting with Temporal Hierarchies.” European Journal of Operational Research 262 (1): 60–74.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267866984.71/warc/CC-MAIN-20180624160817-20180624180817-00384.warc.gz
CC-MAIN-2018-26
1,909
11
https://era.ed.ac.uk/handle/1842/36983
code
Mechanisms of variation in language use: insights from lexical entrainment Item statusRestricted Access Embargo end date26/06/2021 Tobar Henríquez, Anita María Language use is variable, such as we can call the same object umbrella or brolly. But what determines this variability? This thesis aimed at better understanding how speakers vary the words they use during dialogue, by investigating the mechanisms underlying lexical entrainment, or the tendency for a speaker to reuse a word that their partner has used before (e.g., using brolly after your partner used brolly; Brennan & Clark, 1996). Interestingly, speakers entrain to their partner’s word even when that means using a word that is not their speech community’s preference (e.g., using brolly instead of umbrella in British English; Branigan et al., 2011). There are two main accounts of how lexical entrainment works. Unmediated accounts explain it as the result of priming effects, in that a partner’s use of brolly made its lexical representation accessible from memory, thus enhancing its retrieval and reuse (Pickering & Garrod, 2004). In contrast, mediated accounts feature speakers’ beliefs in entrainment, with some such accounts suggesting that entrainment is aimed to enhance mutual comprehension (Clark, 1996) and others arguing that it is aimed to enhance our social affiliation (van Baaren et al., 2003). Critically, lexical retrieval, audience design, and social affiliation may vary both across situations and individuals, positioning lexical entrainment as a good candidate to inform how individual, interpersonal, and community-level influences affect language use. Thus, in four studies, we investigated individual, interpersonal, and community-level influences in lexical entrainment. The first research study examined the test-retest reliability of an online, webbased lexical entrainment task. Experimental items were objects with both a favoured name (umbrella) and a disfavoured but acceptable name (brolly), and we measured lexical entrainment as participants’ reuse of their partner’s disfavoured name (i.e., using brolly after their partner used brolly). Across two studies, we found that the task reliably elicited entrainment at the individual level both in the short- and the long-term, clearly suggesting that the tendency to reuse a partner’s lexical choice is stable within individuals and thus suggesting that individuals’ tendency to lexically entrain can be underlain by stable individual traits.. The second study thus used this lexical entrainment task to test whether entrainment was predicted by schizotypy and age, which both correlate with individual differences in lexical retrieval, audience design, and social affiliation skills. Although entrainment was not predicted by schizotypy, it was positively predicted by age, suggesting that at least some mechanisms of lexical entrainment may undergo changes across the lifespan. The third research project investigated the causal relationship between social affiliation and lexical entrainment. Based on previous evidence that ostracism increases social affiliation as a compensatory strategy to recover social acceptance, we examined (i) the effects of ostracism on lexical entrainment, (ii) whether such effects were targeted to repairing a particular social relationship or increasing affiliation more generally, and (iii) whether ostracism effects were moderated by personality. Across two experiments, we found that lexical entrainment was positively affected by ostracism, but ostracised participants were as likely to entrain to a partner who had ostracised them as to a new partner; moreover, post-ostracism lexical entrainment was predicted by individual differences in neuroticism. Critically, these results suggest a social affiliation component to lexical entrainment. The fourth research project moved beyond looking only at lexical entrainment with a particular partner, to examine how speakers extrapolate community-level lexical knowledge from single linguistic encounters. Across three experiments, we found that participants generalised names across two partners depending on their community membership. These results suggest that social information is encoded during lexical processing, thus enabling the creation of community-level knowledge from single linguistic encounters. In sum, this research has important implications for understanding the variability of lexical choices. First, our individual differences findings indicate that lexical entrainment has potential to reveal what drives individual variation in how speakers make referential choices. Second, our group-comparisons findings indicate that the mechanisms of language processing are not encapsulated within the language system, thus suggesting that speakers vary their referential expressions based not only on linguistic processing but also on their beliefs and social dispositions. Taken together, these results suggest that the variability of language use is shaped by individual, interpersonal, and community-level influences, and by their interplay.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320299894.32/warc/CC-MAIN-20220129002459-20220129032459-00380.warc.gz
CC-MAIN-2022-05
5,112
5
http://atwpljt.mysteria.cz/117-homework-2-graphing-polynomial-functions-examples.php
code
We start with the parent functions: f(x) = x2 to f(x) = x7. My students have already been exposed to the concept of parent functions for quadratic, linear, absolute value, and rational functions. I present each one and allow time for student to make quick sketches in their notes. I mark the vertex or center of each parent graph as well as the two points one unit way. Focusing on these points gives the students a pattern to follow as well as points to accurately show all transformations, including stretches/shrinks, in future lessons. Once we have covered all six, the students talk with their partners about any patterns they see, followed by a group discussion. I make sure to ask WHY each observed pattern is true. Then the students record a statement describing the pattern(s) including the WHY in their notes. This leads into a discussion on end behavior for even degree functions. First we define even functions. We do a think-pair-share on functions we have already seen that are even. Next we discover/discuss end behavior of even functions. I choose not to give a formal definition yet since I want my students to develop a solid conceptual understanding. I find that students often get stuck on formal definitions and never really grasp what is being said. A formal definition can always be introduced later once students master the concept. I have students define with their partner what the graph ends are "doing" and then share out as a whole class. Definitions should include [increasing or decreasing] behaviors for BOTH extremes of the graphs. I encourage the students to evaluate their definitions for completeness and accuracy (Math Practice 3). To wrap up the conversation, students write down their definitions including diagrams that may be helpful. I then repeat the conversation now for the opposite [negative] even functions and again for odd functions. Each discussion should move along faster since students are building on their initial concept of end behavior. Graphing Polynomial Functions To sketch any polynomial function, you can start by finding the real zeros of the function and end behavior of the function . Steps involved in graphing polynomial functions: . Predict the end behavior of the function. . Find the real zeros of the function. Check whether it is possible to rewrite the function in factored form to find the zeros. Otherwise, use Descartes' rule of signs to identify the possible number of real zeros. . Make a table of values to find several points. . Plot the points and draw a smooth continuous curve to connect the points. . Make sure that the graph follows the end behavior as found in the above step. Graph the polynomial function . Predict the end behavior of the function. The degree of the polynomial function is odd and the leading coefficient is positive. The degree of the polynomial is and there would be zeros for the functions. The function can be factored as . So, the zeros of the functions are and . Make a table of values to find several points. Plot the points and draw a smooth continuous curve to connect the points
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825916.52/warc/CC-MAIN-20181214140721-20181214162221-00150.warc.gz
CC-MAIN-2018-51
3,093
20
http://security.sys-con.com/node/2950921
code
|By John Barco|| |August 25, 2014 10:00 AM EDT|| Over the past few years, enterprises have been moving to the cloud to streamline processes and operations. A study last year by TheInfoPro indicated that there is no sign of cloud investment slowing down - predicting an average growth rate of cloud spending of 36 percent from this year until 2016. As the Internet of Things continues its march to the mainstream, organizations have more opportunities to expand relationships with customers and partners by building and offering new services. These services have the potential to exponentially drive revenue and create business value. The question is, what do CIOs need to do to make sure that their companies can take advantage of this potential? The first step is to look at their existing technical infrastructure to ensure that it can truly enable companies to drive change. One crucial component: security, including identity and access management. IRM and the Cloud: The Move Toward Supporting a Dynamic Environment Traditionally, identity and access management (IAM) was used to defend a company from security breaches and protect data by providing the right level of access to the right people, who were typically employees of the company. But in a cloud-based world, where organizations need to break down the walls to increase their interaction with customers and partners, a traditional IAM solution just doesn't work - it won't be able to cope with the varying devices and environments at Internet scale. Looking at all the differences between what is needed now and what traditional identity management offers, I think that "identity relationship management" (IRM) is the best way to describe the new lightweight and agile solution that companies will adopt. A term coined by Kantara Initiative in October 2013, I think it is a perfect way to describe the changes that are needed - moving from managing access and identities to managing relationships. In a cloud-based world, organizations need to ensure that their IAM system - a critical security component - is able to handle dynamic requests. What do CIOs and CSOs need to look for in an IRM solution to drive revenue through the cloud, while still ensuring a secure experience? Here are some ideas: - Scalability: In a world running on the cloud and the Internet, scalability is a key factor - it's no longer about managing employees who access information from their desks. Customers, partners and employees are accessing information from devices across a variety of locations and the number of users grows exponentially over time, so identity systems need to manage millions of identities instantaneously. - Intelligent and adaptable: Now that everyone has a mobile device, they expect access to information across different environments and geographies. But, that doesn't mean that IT needs to compromise on security. That's why identity and access systems need to be flexible, so that if a user tries to access a secure portal from a new device or location, it will allow access, granted they have the proper credentials. - Modular structure: Modern identity demands are at an entirely new level of complexity that an old, traditional system is not able to handle. Systems need to respond quickly to a plethora of varying factors - devices, circumstances, and access privileges - to ensure that systems continue to run seamlessly. Now that companies are opening up access to partners and customers, user experience becomes that much more complex and critical, and traditional IAM struggles to respond to these varying factors. - Borderless: Not long ago, information was stored on premises and that's where employees accessed it from - their desktop from the network in their office. Now that companies have adopted new technologies like cloud and SaaS, information is likely stored across all three environments, but users still expect the same fast and easy access. A good IRM solution is borderless so that stakeholders have the flexibility to securely and seamlessly access information stored in any environment from anywhere. Making the Transition Easy There are also some detailed technical features that organizations can keep in mind when choosing an IRM solution. These include emerging standards like OpenID Connect and OAuth 2.0, which enable cloud and mobile-ready features like device agnostic single-sign on (SSO) across environments. A system that uses REST APIs also makes it more developer friendly, and is a lightweight and flexible alternative to traditional SOAP-based Web services. When considering implementation, it is essential to ensure the deployment is as quick and easy as possible. Oftentimes, organizations are using different IAM systems across their company, making management difficult. Deploying a central IRM solution gives users the ability to quickly create and deploy new revenue-generating services. Additionally, the IT team is able to manage and scale the system much easier from one centralized location. IAM has always been seen as a necessity for employees and company systems, and therefore a business cost, but with the cloud, organizations are in the unique position to adjust their focus from simple identity and access management to leveraging the value of unique relationships to drive business' top-line revenue. For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording. Sep. 28, 2016 09:15 AM EDT Reads: 3,153 A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh... Sep. 28, 2016 09:00 AM EDT Reads: 3,840 Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way. Sep. 28, 2016 08:45 AM EDT Reads: 1,121 Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and... Sep. 28, 2016 08:45 AM EDT Reads: 1,201 Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ... Sep. 28, 2016 08:45 AM EDT Reads: 2,545 Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de... Sep. 28, 2016 08:30 AM EDT Reads: 1,151 In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable. Sep. 28, 2016 08:30 AM EDT Reads: 1,569 Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha... Sep. 28, 2016 08:15 AM EDT Reads: 536 An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f... Sep. 28, 2016 08:00 AM EDT Reads: 2,054 Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct... Sep. 28, 2016 07:45 AM EDT Reads: 2,260 There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a... Sep. 28, 2016 07:45 AM EDT Reads: 2,267 SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes. Sep. 28, 2016 07:30 AM EDT Reads: 2,905 IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ... Sep. 28, 2016 07:00 AM EDT Reads: 3,473 So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning... Sep. 28, 2016 07:00 AM EDT Reads: 2,107 The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e... Sep. 28, 2016 07:00 AM EDT Reads: 2,271 There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is... Sep. 28, 2016 07:00 AM EDT Reads: 2,686 The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ... Sep. 28, 2016 07:00 AM EDT Reads: 3,360 SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ... Sep. 28, 2016 05:30 AM EDT Reads: 1,477 In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly. Sep. 28, 2016 05:15 AM EDT Reads: 2,824 Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t... Sep. 28, 2016 05:00 AM EDT Reads: 1,204
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661449.76/warc/CC-MAIN-20160924173741-00100-ip-10-143-35-109.ec2.internal.warc.gz
CC-MAIN-2016-40
15,986
56
https://discuss.afni.nimh.nih.gov/t/statistical-analysis/2794
code
I have CBF maps for 50 subjects. I want to know if they are any significant relationships between the CBF concentration and a clinical score (one number per subject) after controlling for age, gender and gray matter concentration. Which program do you suggest me to do this analysis? Hi, to be more specific. My dependent variable is CBF map (50 in total, one for each subject) My independent variable is the clinical measure (50 in total, one number for each subject) My covariates are: age, gender and GMC: gray matter concentration (the GMC is map which is nifti file) Hi Gang thanks for answering me, I feel very confused with the design of my 3dMVM script, would you mind to help me a bit? I want to see the relationship between the CBF_maps (voxel wise, .nii file per subject) with a quantitative clinical measure (loneliness, which is one single number per subject). I need to control for age, gender, depression scores and gray matter concentration (the gray matter concentration is a voxel wise covariate). Dependent variable: voxel wise CBF Independent variable: Loneliness (clinical measure) Covariates: age, gender, depression and voxel wise gray matter concentration. I have done this part of the script but I feel lost with the other part 3dMVM -prefix 3dMVM_test -jobs 4 -vVars ‘gmc’ \ I also create the txt file of the data and it looks something like this: Subj age gender hamd hama gmc loneliness group InputFile 172_120916 68 1 21 9 c1w172_120916.nii 37 1 ASL_CBF_2MNI_6mm_172_120916.nii 222_103015 77 -1 19 13 c1w222_103015.nii 36 1 ASL_CBF_2MNI_6mm_222_103015.nii 225_010416 65 1 2 1 c1w225_010416.nii 23 1 ASL_CBF_2MNI_6mm_225_010416nii Would you mind to help me with some guidance to build the script? I assume that all the variables are between-subjects. Try something like -bsVars ‘loneliness+age+gender+hamd+gmc’ \ Hi Gang, here is my script. I am trying to see the main effect of loneliness, main effect of hamd and their interaction in my CBF maps. would you mind to tell me if I am doing it correctly? 3dMVM -prefix 3dMVM_test -jobs 24 -gltLabel 1 Loneliness -gltCode 1 ‘loneliness’ -gltLabel 2 HAMD -gltCode 2 ‘hamd’ -gltLabel 3 Lon_by_HAMD -gltCode 3 'loneliness:hamd ’ Also, I try to run it and I am having an error in my table (data table is not rectangular) even after “fixing it” with the file_tool tcsh -x 3dMVM.txt > diary.txt & 3dMVM -prefix 3dMVM_test -jobs 24 -mask GM2mm_WFU_Mask.nii.gz -bsVars loneliness+age+gender+hamd -qVars age,gender -num_glt 3 -gltLabel 1 Loneliness -gltCode 1 loneliness -gltLabel 2 HAMD -gltCode 2 hamd -gltLabel 3 Lon_by_HAMD -gltCode 3 loneliness:hamd -dataTable @FIXED.txt Read 409 items The content under -dataTable is not rectangular ! 358 7 + Done tcsh -x 3dMVM.txt > diary.txt file_tool -infile FIXED.txt -test FIXED.txt has 0 bad characters FIXED.txt file type: UNIX file_tool -infile 3dMVM.txt -test 3dMVM.txt has 0 bad characters 3dMVM.txt file type: UNIX According this line, -qVars ‘age,gender’ \ ‘age’ and ‘gender’ are the only quantitative variables. First of all, ‘gender’ is not a quantitative variable. Also, do you have other quantitative variables in your model? All those 3 -gltCode lines are not correct. Follow the examples in the 3dMVM help. Consider using the 3dMVM validator:
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099281.67/warc/CC-MAIN-20231128083443-20231128113443-00400.warc.gz
CC-MAIN-2023-50
3,305
43
https://hacksrus.org/
code
Some! Including but not limited to: Dumb stuff with technology At a hacker camp or con near you (probably under a DOME) Then (and the rest of the time) you can find us hiding under rocks on the internet: We were here: We are going here: You may have seen our Dome at the events listed above, if you would like to build you own we have instructions For more formal information, the Code of Conduct may be relevant to your - No one shall dissuade or stop anyone from making anything, especially if it's a bad idea. - "Fuck it, we'll do it live" is always acceptable. - Maybe policy should go on the website. - > For policy proposals in chat. - Un defined, (but positive) number of ✅ are needed for policy approvals. - Ticks must outweigh ❌ votes - No hacker shall intentionally set another hacker on fire, or through inaction allow another hacker to be set on fire. - For the avoidance of doubt, explosions are a type of fire. - Disputes between members will be settled non-violently through a game of Guess Who? - Policy items in <blink> tags are only in effect whilst visible. - Policy is not serious, see Code of Conduct for serious things. - If it can be run non-combustably at full brightness, it shall be run non-combustably at full brightness. - If it can be horribly overengineered, it shall be horribly overengineered. - Voice channels are always considered "at risk".
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510734.55/warc/CC-MAIN-20231001005750-20231001035750-00843.warc.gz
CC-MAIN-2023-40
1,379
23
https://docs.vmware.com/en/VMware-Workspace-ONE-Access/19.03/idm-administrator/GUID-B3287511-F6FD-48CB-86BB-2E34F50DB535.html
code
The RSA SecurID server must be configured with information about the VMware Identity Manager appliance as the authentication agent. The information required is the host name and the IP addresses for network interfaces. - Verify that one of the following RSA Authentication Manager versions is installed and functioning on the enterprise network: RSA AM 6.1.2, 7.1 SP2 and later, and 8.0 and later. The VMware Identity Manager server uses AuthSDK_Java_v188.8.131.522.06_03_11_03_16_51 (Agent API 8.1 SP1), which only supports the preceding versions of RSA Authentication Manager (the RSA SecurID server). For information about installing and configuring RSA Authentication Manager (RSA SecurID server), see RSA documentation. - On a supported version of the RSA SecurID server, add the VMware Identity Manager connector as an authentication agent. Enter the following information. Option Description Hostname The host name of VMware Identity Manager. IP address The IP address of VMware Identity Manager. Alternate IP address If traffic from the connector passes through a network address translation (NAT) device to reach the RSA SecurID server, enter the private IP address of the appliance. - Download the compressed configuration file and extract the sdconf.rec file. Be prepared to upload this file later when you configure RSA SecurID in VMware Identity Manager. What to do next Go to the administration console and in the Identity & Access Management tab Setup pages, select the connector and in the AuthAdapters page configure SecurID.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178360107.7/warc/CC-MAIN-20210228024418-20210228054418-00500.warc.gz
CC-MAIN-2021-10
1,542
8
https://www.tac.vic.gov.au/road-safety/statistics/online-crash-database/search-crash-data?meta_G_orsand=&meta_J_orsand=&clive=tac-fatalities-xml&collection=tac-xml-meta&query=!padrenull&date-after=9-Apr-2020&date-before=13-Apr-2020
code
Your search did not return any results.5 Dec 2022 From: 9 Apr 2020 To: 13 Apr 2020 Days of the week Local Government Area / Municipality This map shows data from 1st Jan 2011, records previous to this do not have locations data available. Note: Fatality data is compiled by the TAC from police reports supplied by Victoria Police. Fatality data is revised each day, with the exception of weekends and public holidays. Data is subject to revision as additional information about known accidents is received, and as new accident reports are received and processed.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711074.68/warc/CC-MAIN-20221206060908-20221206090908-00460.warc.gz
CC-MAIN-2022-49
562
6
http://www.hq.nasa.gov/office/itcd/email_list.html
code
What type of Distribution List to use? Personal Distribution List Create your own personal distribution list in Contacts if: - Others do not need to send to the list - The list contains no more than 100 names - The list contains some names that are not in the NOMAD Global Address List NOMAD Global Distribution List Use a NOMAD distribution list if: - All of the names on the list are in the NOMAD Global Address Book - Others need to be able to send to the list - The list contains a large number of people A NOMAD Global Distribution List (DL) is a list of contacts which provides an easy way to send messages to a group of people within the NOMAD Global Address List (GAL). A message sent to a DL goes to all recipients listed in the DL. Distribution Lists can be used in messages, task requests, meeting requests, and other distribution lists. There are two restrictions on Global Distribution Lists. 1) A Global DL can only contain NASA internal contacts (i.e., all recipients must be visible in the GAL); 2) There is a limit of 100 recipients per list. + Read More Mailman E-mail List Service Use a Mailman List Service if: - The list is large - The list contains people who are in the NOMAD Global Address List and some who are not - Others will need to be able to send to the list Mailman is a mailing list management application which allows list owners to manage their lists directly through the use of a Web interface. It supports a wide range of types of mailing lists, such as general discussion lists and announcement-only lists and has extensive privacy control features. The Mailman list service superceded Majordomo at Headquarters effective January 31, 2008. Unlike NOMAD distribution lists, Mailman lists accommodate external addresses (i.e., are not restricted to ‘nasa.gov’ addresses) and can accommodate an unlimited number of recipients. + Read More
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00433-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
1,877
20
https://github.com/googleapis/python-spanner/commit/430ca32fcbedebdfdb00366008a72d8229e4df98
code
Please sign in to comment. This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository. fix: Pin Sphnix version to last working release (#51) Co-authored-by: larkee <[email protected]> - Loading branch information Showing with 1 addition and 1 deletion. - +1 −1 noxfile.py
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662587158.57/warc/CC-MAIN-20220525120449-20220525150449-00430.warc.gz
CC-MAIN-2022-21
340
7
http://www.linuxquestions.org/questions/suse-opensuse-60/wireless-not-working-after-suspend-hibernate-438759/
code
SUSE / openSUSEThis Forum is for the discussion of Suse Linux. Welcome to LinuxQuestions.org, a friendly and active Linux Community. You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today! Note that registered members see fewer ads, and ContentLink is completely disabled once you log in. If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here. Having a problem logging in? Please visit this page to clear all LQ-related cookies. Introduction to Linux - A Hands on Guide This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter. For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own. Click Here to receive this Complete Guide absolutely free. Hi guys, I just installed Suse 10 in my x41 tablet, and have several problems. One of the most annoying problem is that the wireless connection stop working after I suspended or hibernated the computer. The wireless icon thing shows an active connection, but when I tried to use firefox, it is not working. The other problem is the keyboard/mouse problem. How do I configure the middle mouse buttton? Where do I configure the volume up/down/mute buttons? Thanks a bunch in advance. Try unloading & reloading the wireless modules - it works for USB. Incidentally, you'll get better answers if you only ask one question per thread. The middle mouse button is usually a zaxismapping issue - it's been asked thousands of times, a quick search should find the specifics. you can set sleep to automatically unload specific module before going to sleep and load just after (usually delay 2-10 sec depending on system). The problem is (in your case) that module is loaded but not "injected" into kernel space. Unloading before, and loading after will resolve your problem hey broch, i got it work on hibernate! Thanks.. but the suspend mode didn't work though even though I already configure the /etc/sysconfig/powersave/sleep. Well maybe as for now, I'll just set it to hibernate when i close the lid.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121216.64/warc/CC-MAIN-20170423031201-00061-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,791
19
https://brg.me.uk/?page_id=1313
code
The GNU Linear Programming Kit (GLPK) The GNU Linear Programming Kit is a free set of tools for solving linear programming problems. It is written in C but there are several interfaces that allow it to be used from Python. These include PyGLPK, ctypes-glpk and PyMathProg but, sadly, none of these have been updated to work with Python 3 or the current version of GLPK (4.49). However, ctypes-glpk uses Python’s ctypes for its GLPK interface and I found that it was possible to build on this to provide a version that works with Python 3 and glpk 4.49 on Windows. I have made my version available here. Using GLPK via Python, we can now solve the puzzle as follows: Here are some of the configurations that the program finds:
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100724.48/warc/CC-MAIN-20231208045320-20231208075320-00599.warc.gz
CC-MAIN-2023-50
727
4
https://www.fi.freelancer.com/work/gsm-sms-software/
code
My Problem Statement is as follows 1) The device must be controlled from the far end (say 3-5 km) without GSM 2) Device working information must be sent back to the control station continuously 3) The device will operate on a battery and we need to get this battery charging status back to the control station. ...to them and they are also able to talk back to your hearing. Here are the features: Keeping an eye on your home is simple, even thousands of miles away. Just hook up the 3G GSM Camera and leave it running. You can check at any time through your smartphone to monitor your house and you can relax in the knowledge that should anyone break in you'll instantly ...basic starting of the call center start. Like uploading the customer details. Creating and launching campaigns and getting its reports. 3. I have bought an OpenVOX GSM gateway. The GSM gateway is working good so far. But I need a small changes in configuration for smooth operation of the gateway. The gateway is not passing correct caller id to my PBX ...activation by SMS Code * login form * search page * auctions section (car, real estate , goods ,,, and finished auctions) * All auctions must have a time for the expire. * All prices must be (live) for any modifications occur by users. * direct sale section * store section simple * forms to send ads by users * ads section * sending email and SMS if user Need a keil uvision programmer for STM32, who can integrate the codes. Job is to integrate AT commands of the cloud to the data collected by the sensor (sending it via GSM UC20). Programmer for Chennai will be preferred. ...device phone num, and add phones that will control the device, and execute some task and receive SMS returned by the device. Most tasks shall be executed in one click while a few in 2 steps. When a device is added a log file must be created where all sms shall be stored automatically. It required creating some field boxes with hidden predefined text Code for Arduino 2560 that will work as an TIME and ATTENDANCE LOGGER/ DATALOGGER. the code should support mag card swipe option and mag card swipe+pinpad/keypad option,,, More infoo in messages Thanks I am looking to build a simple app that sends a text message to a large list of recipients. Optimally I am looking for the following features and functionality. On the screen there is a text field where the user will input the message they wish to send. Underneath that text field, there is a button where the user can load the CSV spreadsheet. On this spreadsheet the only field is the phone numb... ...venditore e può fare un’ offerta per l’ auto/moto. Il venditore se accetta o rifiuta l’ Offerta invia una notifica al compratore è all’amministratore sia con una email che con sms. Il sito deve essere responsive e mobile friendly. No cms WordPress,Drupal, Joomla, ecc! Fatte offerte con dei template di esempio altrimenti non considero la proposta!! We need a Android app that take GSM Call and SMS to Send to Server so other side phone can see SMS and take calls instantly to avoid Roaming. Also maintain call logs, SMS logs, contacts on server and sync to APP that installed on other phone. We will provide you Linux server to setup. Development of Business Listing Website and Mobile App (Android) and also backend admin panel for Admin and vendors for management along with automated Billing/Invoicing & SMS. Please refer to the attached document for further details. Se desea implementar un servidor en linux con un desarrollo web que permita im...archivo CSV con la lista de números y textos que se deberían enviar a cada numero celular vía sms. El equipo que permite el envió es un gateway sms openvox. Se adjunta la maqueta del desarrollo a realizar, así como el método de conexión hacia el equipo op... Building New website for Restaurant The websites CMS must be fr...designing & programing the website - setting up bank Api integration & paypal & shipment if available - we need to know if we can link the online ordering to our fax directly or sms - data entry for menu up to 120 item , description & images -data entry for gallery up to 30 images Hi There, I am looking to integrate live data from machinery via GPS/GSM to a server( Traccar) then feed live engine hour data to smartsheet. Can someone help? Thanks Justin Nous recherchons un freelanceur pour une application de campagne de sms mobile. Actuellement rien n'a encore été réalisé. L'application qui doit être développé permettra d'envoyer des sms écris ou prédéfinis à un contact ou une liste de diffusion préalablement créer. Elle devra pe... Dear All, we are Renewable Based company, Now we are looking for support in Design and programme with Integration of Electric Vehicle Charger PLC with Ocpp 1.6 Protocol and GSM Modem. Kindly connect to me at underline details. Regards Dharampal
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589726.60/warc/CC-MAIN-20180717125344-20180717145344-00159.warc.gz
CC-MAIN-2018-30
4,862
16
https://forum.duolingo.com/comment/6182342/Hij-heeft-mijn-portemonnee
code
The word 'portemonnee' comes from the French "porte monnaie"; porter: 'to carry' and monnaie: 'coin'. :) It's a wallet (so a BE purse, but not an AE purse). I think a coin purse would be beurs* in Dutch, but I never have heard anyone using that word (in the meaning of a coin purse). We also have this thing called 'portefeuille'. It looks a bit like a 'portemonnee', but instead of coins and banknotes, we usually put cards and important documents (like your ID, debit cards, driving license, etc.) and sometimes banknotes inside. We can put our ID and other cards in our portemonnee as well, so it's a bit confusing. :P
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585911.17/warc/CC-MAIN-20211024050128-20211024080128-00459.warc.gz
CC-MAIN-2021-43
621
4
https://www.nuget.org/packages?q=Tags%3A%22Star%22
code
When the application with Rate My App component is started for the 5th time, a dialog for reviewing the app is shown to the user. If the user declines to review the app, he/she will be given the option to provide direct feedback to the developer. On the 10th run of the app, if a review was not... Created from Microsoft's Windows phone Toolkit for WP 8 and ported to Windows Phone 8.1 and Windows 8.1 It's in Beta state - Half increment of rating is in progress - making it stable Other then HalfIncrement everything works fine as Windows Phone 8 Toolkit rating control Simple to use Html Helper for the jQuery bootstrap-rating plug-in. Usage - @Html.BootstrapRating(m => m.Rating)[.Value][.Start]... Source - https://github.com/simonray/bootstrap-rating.mvc Plug-in - https://github.com/dreyescat/bootstrap-rating/ Product reviews are the opinions or feedbacks of customers for a particular product. Many online businesses put up a review section on their website or mobile app to allow customers to rate and review the product they purchased. You can create review or rating mobile app feature in Xamarin Forms... Bratched RatingControl is the most complete and free XAML control for displaying or editing ratings. Support personal colors, transparency, outline, editing mode, custom figures. Compatible with Windows WinRT, Universal Apps, Windows Phone 7.1, 8.0, 8.1
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494974.98/warc/CC-MAIN-20230127065356-20230127095356-00731.warc.gz
CC-MAIN-2023-06
1,370
12
https://forum.gsa-online.de/discussion/comment/174136/
code
Issue with Import URLs + Check + Send + Export + Delete I have used the "Import URLs + Check + Send + Export + Delete" option for a project and it is not working properly. Here is the problem I faced. 1. When GSA WC processed the URLs; it didn't save the success & failed entries in the root-success.txt & root-failed.txt files. 2. It imported the same root file again and started processing the entries again. Thus, sending messages to same sites in a loop. It would have been perfect if it can export (append) the success & failed files and delete the entries of root.txt file but it is not working that way. Please look into this issue. Also, let me know if any further details are required from my side.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099892.46/warc/CC-MAIN-20231128151412-20231128181412-00546.warc.gz
CC-MAIN-2023-50
707
8
https://www.malak.ca/blog/index.php/2010/01/20/news-flash-linux-spotted-in-the-wilds-of-montreal/
code
This morning I did something very unusual, for me. I took the commuter train into work instead of driving my car, and I saw a Gnome desktop on someone’s laptop computer! Doing a double take, I checked, and whaddya know, it’s definitely a Gnome desktop, it’s very familiar, it isn’t brown, and yup, it was Fedora 12. A few weeks ago my brother had posted on SlashDot asking if anyone had seen Linux in use in the wild — not data centres, of course, nor at LUG meetings or other such gatherings of Linux types where of course Linux is expected to be seen, but random, innocent spottings in places like at restaurants, café’s, university or college student halls, on the streets, on the train, etc. The responses were an underwhelming (or disappointingly overwhelming) “no”. In fact, my brother said that I was the only person he knew who used a Linux desktop besides himself, and that I’m far more pure about it than he. (In fact, he uses Windows as regularly as Linux on his personal systems, while I “only” use Windows at work, and don’t particularly care for it.) Besides seeing Linux desktops at LUGS and Linux Meetups, offhand I can only think of two people I know who say they use Linux at home as their desktops. I started chatting with this person, and they apparently develop software for a particular industry (no, not that industry), to be used on Red Hat 5.x servers; they use Fedora because CentOS is hopelessly out of date for things like wireless support on his computer; however, unfortunately, they have been finding Fedora 12 unstable … not my experience so far. Suffice it to say that even put aside the Fedora part, this chance meeting made my day!
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00458.warc.gz
CC-MAIN-2023-40
1,693
4
https://www.download.hr/software-notepad3.html
code
Notepad3 is listed in Text Editors category and made available by Rizonesoft for Windows. Unfortunately, we have not yet reviewed Notepad3. If you would like to submit a review of this software, we encourage you to submit us something! Fast and light-weight Scintilla-based text editor with syntax highlighting Notepad3 is a fast and light-weight Scintilla-based text editor with syntax highlighting. Notepad3 is an replacement for the default Windows text editor. Theres nothing wrong with Windows Notepad, its lightweight and fast; however programmers and other text file users will all agree that it has definite limitations. Notepad3 offers many extra features over Notepad. It has a small memory footprint, but is powerful enough to handle most programming jobs. Windows Notepad can easily be replaced by Notepad3 using an unobtrusive registry based method. Some of the features include: Improved support for NFO and ANSI art. Mark all occurrences of a word. Character encoding conversion between ASCII, UTF-8, and UTF-16 formats. Multiple undo/redo; rectangular block selection. Newline format conversion, between DOS (CR/LF), Unix (LF), and Macintosh (CR) formats. Regular expression-based find and replace. Support for bookmarks. Support for replacing Windows Notepad using a clean, unintrusive registry-based method. Download and install Notepad3 safely and without concerns. Notepad3 is a software product developed by Rizonesoft and it is listed in Office category under Text Editors. Notepad3 is a free software product and it is fully functional for an unlimited time although there may be other versions of this software product. You can run Notepad3 on all modern Windows OS operating systems. Notepad3 was last time updated on 11.09.2016 and it has 565 downloads on Download.hr portal. Download and install Notepad3 safely and without concerns.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865995.86/warc/CC-MAIN-20180624005242-20180624025242-00199.warc.gz
CC-MAIN-2018-26
1,860
16
https://www.phanan.net/creates/
code
My name is Phan An – “An” being the given name. I’m the mix of a published author, an open source proponent, a founder of several inspiring cultural/community projects, an avid reader, and a tireless wanderer. You can find me on GitHub, Twitter, and Facebook. An outdated LinkedIn profile is also available. If you happen to read Vietnamese, I own a blog where I once in a while jot down thoughts, essays, and short stories.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473472.21/warc/CC-MAIN-20240221102433-20240221132433-00595.warc.gz
CC-MAIN-2024-10
432
2
http://www.freevbcode.com/ShowCode.asp?ID=902
code
Disk Information Control Version Compatibility: Visual Basic 5 This control provides a drive drop down list and uses the GetDiskFreeSpaceEx API function to provide information (e.g., capacity, free space) about the selected drive. Instructions: Click the link below to download the code. Select 'Save' from the IE popup dialog. Once downloaded, open the .zip file from your local drive using WinZip or a comparable program to view the contents.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964361064.69/warc/CC-MAIN-20211202024322-20211202054322-00559.warc.gz
CC-MAIN-2021-49
444
4
http://www.edugeek.net/forums/virtual-learning-platforms/print-40027-saltis-support-becta-interoperability-project.html
code
SALTIS to support BECTA interoperability project You may be interested in SALTISí announcement today of the start of a BECTA/ISB project to improve interoperability between digital learning content and learning platforms. The SALTIS press release is at SALTIS press release (14/08/09). You may also be interested to read two SALTIS papers available at SALTIS Papers: Benefits and barriers in the use of managed content is written to stimulate the consultation which will be occurring in the next few weeks to inform the projectís requirements document. Supporting Interoperable Learning Content, which was published last BETT, makes the case for better interoperability as a key driver in using ICT to raise standards of teaching and learning in schools and would be useful background reading if the significance of interoperability escapes you. If you want a hard copy of this report, drop me a line at [email protected]. Both this formative stage of the project, and the final sign-off of project outputs will involve consultations with three key stakeholder groups: learning platform providers, content publishers, and representatives of end-users. Although the formal end-user panel will be selected by the independent consultancy EdICTs, we are interested in informal inputs from all interested parties. The views of teachers and educational leaders are of great interest to the project. Please let me know what you think, either by private email ([email protected]) or through this list or on the SALTIS forum atGeneral -. If you are interested in joining the panel representing end-users, please write to [email protected]. Chairman of SALTIS. Apologies for cross posting.
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400372490.23/warc/CC-MAIN-20141119123252-00031-ip-10-235-23-156.ec2.internal.warc.gz
CC-MAIN-2014-49
1,707
10
https://www.experts-exchange.com/questions/10305798/Calculate-a-value-using-a-IF-statement.html
code
I am working on a application and have had great difficulty with this calculation. This has a choice of 2 seasons for rates the first is standard. It is the second one I need a hint with. when selected a clacualtion needs to take place. if txtKilowatt = 0 then the cost equals a flat rate of 10.00 assigned to txtCost.text basic flat rate of $10.00 regardless of usage (even 0 kilowatthours) or if txtKilowatt<= 400 then rate = .08 per kilowatt or if txtKilowatt>= 401 and less than 800 then rate = .06 per kilowatt or if txtKilowatt>= 800 then rate = .04 per kilowatt The values are calculated as follows eg. txtKiloWatt.text = 850 8 cents per kilowatthour for the 1st 400 kilowatt-hours used 6 cents per kilowatthour for 401 to 800 (8 cents for the 1st 400) and 4 cents per kilowatthour for 801 and above (plus the 8 and 6) Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform. While answering a recent question (http://www.experts-exchange.com/Q_27402310.html) in the VB classic zone, I wrote some VB code in the (Office) VBA environment, rather than fire up my older PC. I didn't post completely correct code o… As developers, we are not limited to the functions provided by the VBA language. In addition, we can call the functions that are part of the Windows operating system. These functions are part of the Windows API (Application Programming Interface). U… This lesson covers basic error handling code in Microsoft Excel using VBA. This is the first lesson in a 3-part series that uses code to loop through an Excel spreadsheet in VBA and then fix errors, taking advantage of error handling code.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170864.16/warc/CC-MAIN-20170219104610-00600-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
1,803
18
https://www.marktechpost.com/2024/02/07/uc-berkeley-researchers-introduce-serl-a-software-suite-for-sample-efficient-robotic-reinforcement-learning/
code
In recent years, researchers in the field of robotic reinforcement learning (RL) have achieved significant progress, developing methods capable of handling complex image observations, training in real-world scenarios, and incorporating auxiliary data, such as demonstrations and prior experience. Despite these advancements, practitioners acknowledge the inherent difficulty in effectively utilizing robotic RL, emphasizing that the specific implementation details of these algorithms are often just as crucial, if not more so, for performance as the choice of the algorithm itself. The above image is depiction of various tasks solved using SERL in the real world. These include PCB board insertion (left), cable routing (middle), and object relocation (right). SERL provides an out-of-the-box package for real-world reinforcement learning, with support for sample-efficient learning, learned rewards, and automation of resets. Researchers have highlighted the significant challenge posed by the comparative inaccessibility of robotic reinforcement learning (RL) methods, hindering their widespread adoption and further development. In response to this issue, a meticulously crafted library has been created. This library incorporates a sample-efficient off-policy deep RL method and tools for reward computation and environment resetting. Additionally, it includes a high-quality controller tailored for a widely adopted robot, coupled with a diverse set of challenging example tasks. This resource is introduced to the community as a concerted effort to address accessibility concerns, offering a transparent view of its design decisions and showcasing compelling experimental results. When evaluated for 100 trials per task, learned RL policies outperformed BC policies by a large margin, by 1.7x for Object Relocation, by 5x for Cable Routing, and by 10x for PCB Insertion! The implementation demonstrates the capability to achieve highly efficient learning and obtain policies for tasks such as PCB board assembly, cable routing, and object relocation within an average training time of 25 to 50 minutes per policy. These results represent an improvement over state-of-the-art outcomes reported for similar tasks in the literature. Notably, the policies derived from this implementation exhibit perfect or near-perfect success rates, exceptional robustness even under perturbations, and showcase emergent recovery and correction behaviors. Researchers hope that these promising outcomes, coupled with the release of a high-quality open-source implementation, will serve as a valuable tool for the robotics community, fostering further advancements in robotic RL. In summary, the carefully crafted library marks a pivotal step in making robotic reinforcement learning more accessible. With transparent design choices and compelling results, it not only enhances technical capabilities but also fosters collaboration and innovation. Here’s to breaking down barriers and propelling the exciting future of robotic RL! 🚀🤖✨ Check out the Paper and Project. All credit for this research goes to the researchers of this project. Also, don’t forget to follow us on Twitter and Google News. Join our 36k+ ML SubReddit, 41k+ Facebook Community, Discord Channel, and LinkedIn Group. If you like our work, you will love our newsletter.. Don’t Forget to join our Telegram Channel Janhavi Lande, is an Engineering Physics graduate from IIT Guwahati, class of 2023. She is an upcoming data scientist and has been working in the world of ml/ai research for the past two years. She is most fascinated by this ever changing world and its constant demand of humans to keep up with it. In her pastime she enjoys traveling, reading and writing poems.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816879.72/warc/CC-MAIN-20240414130604-20240414160604-00038.warc.gz
CC-MAIN-2024-18
3,748
11
https://wku.crskyhud.site/grafana-influxdb-divide-two-queries.html
code
Continuous queries CQ are InfluxQL queries that run automatically and periodically on realtime data and store query results in a specified measurement. Continuous queries operate on real-time data. The examples below use the following sample data in the transportation database. Use a simple CQ to automatically downsample data from a single field and write the results to another measurement in the same database. Note that the basic syntax does not support using fill to change the value reported for intervals with no data. A possible workaround is to use the advanced CQ syntax. CQs operate on realtime data, that is, data with timestamps that occur relative to now. Use a basic INTO query to backfill results for data with older timestamps. By default, all INTO queries convert any tags in the source measurement to fields in the destination measurement. See Description of Basic Syntax. CQs operate on real-time data. First, it runs at and calculates the average for every available data point between and 815and Second, it runs at and calculates the average for every available data point between and 81515and Because of the way InfluxDB handles duplicate pointsthe second result simply overwrites the first result. The CQ calculates the average for the time interval at and atand it calculates the average for the time interval at and The CQ calculates the average for the interval at and Use a FOR interval and fill to change the value reported for time intervals with no data. Note that at least one data point must fall within the FOR interval for fill to operate. Where possible, it writes the value for time intervals with no results. See Frequently Asked Questions for more information. Every ten minutes, the CQ runs a single query that covers the time range between now and now minus the EVERY interval, that is, the time range between now and ten minutes prior to now. Currently, this is the intended behavior. GitHub Issue outlines a feature request for CQs to support gaps in data coverage. Only admin users are allowed to work with CQs. For more on user privileges, see Authentication and Authorization. If query-stats-enabled is set to true in your influxdb. Information about CQ configuration settings is available in the Configuration documentation. Use of this data falls outside the scope of official InfluxData support. Combine CQs and RPs to automatically downsample high precision data to a lower precision and remove the dispensable, high precision data from the database. See the Downsampling and data retention guide for a detailed walkthrough of this common use case.Pwm piezo buzzer Shorten query runtimes by pre-calculating expensive queries with CQs. Use a CQ to automatically downsample commonly-queried, high precision data to a lower precision. Queries on lower precision data require fewer resources and return faster. Tip: Pre-calculate queries for your preferred graphing tool to accelerate the population of graphs and dashboards. See Data Exploration for more information.GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together. Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community. Already on GitHub? Sign in to your account. For functions like this you have to use the query reference syntax A to created nested queries. You can hide the series A so that it does not show in the graph. Suppose, Metrics A : test. Is it possible in Grafana version 1. I think that feature was added in 1. Thanks a lot Torkelo. I am pushing some metrics from code to graphite and I am plotting these metrics on grafana. Thus increasing grafana version from 1. IDo I have to change graphite configurations in that case? Is it possible to perform these arithmetic operations of multiple series with Elasticsearch datasource.Steam pending purchase Any chance grafana will ever be able to sum or divide series for elastic??? Skip to content. Dismiss Join GitHub today GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together.Как мы приручали InfluxDB. Макар Ермохин Sign up. New issue. Jump to bottom. Copy link Quote reply. I need to divide the delta of two series in grafana version 1. Thanks, Amer. This comment has been minimized. Sign in to view. Example: You can hide the series A so that it does not show in the graph. Thanks for your prompt reply. Database Administrators Stack Exchange is a question and answer site for database professionals who wish to improve their database skills and learn from others in the community. It only takes a minute to sign up. I'm trying to combine stats from a couple ethernet interfaces and combine them to show aggregate bandwidth. Grafana and KDB+ Plugin Installation Instructions These two separate queries work on their own, but I can't figure out how to write it to combine these two. To combine aggregated measurements under different tags is a bit tricky. I managed to find this post which has the answer. The key is to use sub-queries InfluxDB 1. Then, since the field names are the same, they need to be renamed. Finally you can manipulate them as needed. Here's your example:. Figured it out after weeks of trial and error. Sign up to join this community.15 meters to feet The best answers are voted up and rise to the top. Home Questions Tags Users Unanswered. Asked 3 years, 2 months ago. Active 4 months ago. Viewed 19k times. I have some network counters in Influx that I graph with Grafana.Ethio 360 tv frequency Mike Mike 21 1 1 gold badge 1 1 silver badge 4 4 bronze badges. I just skimmed thru the docs but can't find any info on union or usage examples. My apologies. I've very new to Influx. Building these simple network stats is my first foray into it. Active Oldest Votes. Morphit Morphit 31 3 3 bronze badges.Games for uhd 620 This just throws a syntax error on the comma separating the subqueries for me. Influx 1. DouglasGaskell Yep- looks like I dropped the parens while editing the answer. Added them back now. Thanks for spotting. So for future searchers, this works. I have 3 hosts that I tried this on Feb 9 '17 at Sign up or log in Sign up using Google. Sign up using Facebook. Sign up using Email and Password.GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together. Have a question about this project?Thunderbird — make email easier. — thunderbird Sign up for a free GitHub account to open an issue and contact its maintainers and the community. Already on GitHub? Sign in to your account. I was searching for a way to divide a value of metric A through a value of metric B with InfluxDB as data source. I found ticketthat says this is only working with Graphite because the operation is handled directly in the data source. Such a feature should definitely be added to InfluxDB, but I think it would also be useful to be able to use this feature from multiple data sources. That would also allow to use this feature independently from the data source. I also found and some other tickets where people asked for the same. This is how it might look like:. I absolutely don't know if such a feature would kill Grafana because of resource lacks. Maybe someone is able to rate this? Is grafana hypothetical able to calculate something like this? Will close as this is duplicate of May I ask how this project is going on? I am considering a similar feature, but it turns out it is not going to be easy It would be an awesome feature. Skip to content. Dismiss Join GitHub today GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together.Learn about Grafana the monitoring solution for every database. Open Source is at the heart of what we do at Grafana Labs. Grafana ships with a feature-rich data source plugin for InfluxDB. The plugin includes a custom query editor and supports annotations and query templates. Access mode controls how requests to the data source will be handled. Server should be the preferred way if nothing else stated. The URL needs to be accessible from the browser if you select this access mode. Subscribe to RSS A lower limit for the auto group by time interval. Recommended to be set to write frequency, for example 1m if your data is written every minute. The following time identifiers are supported:. You can access the InfluxDB editor under the metrics tab when you are in the edit mode of the Graph or Singlestat panels. Enter edit mode by clicking the panel title, and clicking Edit. The editor allows you to select metrics and tags. You can remove tag filters by clicking on the tag key and then selecting --remove tag filter You can type in regex patterns for metric names or tag filter values. If you have a group by time you need an aggregation function. Some functions like derivative require an aggregation function. The editor tries to simplify and unify this part of the query. For example:. Pick a tag from the dropdown that appears. You can remove the group by by clicking on the tag and then click on the x icon. You can switch to raw query mode by clicking hamburger icon and then Switch editor mode. You can remove the group by time by clicking on the time part and then the x icon. You can change the option Format As to Table if you want to show raw data in the Table panel. Querying and displaying log data from InfluxDB is available via Explore. Choose the desired measurement that contains your log data and then choose which field Explore should use to display the log message. You can remove tag filters by clicking on the first select and choosing --remove filter Instead of hard-coding things like server, application and sensor name in you metric queries you can use variables in their place. Variables are shown as dropdown select boxes at the top of the dashboard. These dropdowns makes it easy to change the data being displayed in your dashboard. Check out the Templating documentation for an introduction to the templating feature and the different types of template variables. If you add a template variable of the type Query you can write a InfluxDB exploration meta data query. These queries can return things like measurement names, key names or key values. For example you can have a variable that contains all values for tag hostname if you specify a query like this in the templating variable Query setting. The dark mode beta is finally here. Change your preferences any time. Stack Overflow for Teams is a private, secure spot for you and your coworkers to find and share information. Production Time. We have the Dashboard for production of coil, in discrete Dashboard form in which we have the False time No production and True Time Production. True Time. Learn more. Dividing two queries in Grafana Ask Question. Asked 4 days ago. InfluxQL mathematical operators Active 4 days ago. Viewed 17 times. Nitesh Nitesh 1. Active Oldest Votes. Sign up or log in Sign up using Google. Sign up using Facebook. Sign up using Email and Password. Post as a guest Name. Email Required, but never shown. The Overflow Blog. Podcast Programming tutorials can be a real drag. Featured on Meta. InfluxQL Continuous Queries That is, parentheses take precedence to division and multiplication, which takes precedence to addition and subtraction. You can use this operator with any integers or Booleans, whether they are fields or constants. It does not work with float or string datatypes, and you cannot mix integers and Booleans. The following queries are invalid and the system returns an error:. The use of mathematical operators inside of function calls is currently unsupported. InfluxQL supports subqueries which offer similar functionality to using mathematical operators inside a function call. See Data Exploration for more information. See GitHub issue Using any of! There is no bitwise-not operator, because the results you expect depend on the width of your bitfield. InfluxQL does not know how wide your bitfield is, so cannot implement a suitable bitwise-not operator. For example, if your bitfield is 8 bits wide, then to you the integer 1 represents the bits The bitwise-not of this should return the bitsi. However, if your bitfield is 16 bits wide, then the integer 1 represents the bits InfluxDB v1. This page documents an earlier version of InfluxDB, which is no longer actively developed. - Elementor archive filter - Zbar food - Textos biblicos para misioneros - Marantz mqa dac - Tata sandwich panels - Vue hide form - Aisin engine oil 5w30 review - Bmw e39 fuse box diagram diagram base website box diagram - Flexiprint hp premium edition - Train forum - Disturbed gta 5 - Spectrum dns issues - How to repair concrete water tank leakage india - Coronavirus porn ghana - Nuova mercedes classe g bluetec - The yard part 3 release date - Télécharger biologie moléculaire génétique ue1 paces 4e - Portale docenti ‐ university of macerata: lista parziali 20 dicembre - Tiny home plans - Js fiddle login - Kami no kiba jinga cast - Trulieve text updates - Kao d nero song title nasty
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057558.23/warc/CC-MAIN-20210924140738-20210924170738-00156.warc.gz
CC-MAIN-2021-39
13,269
69
https://community.citra-emu.org/t/how-to-pass-save-files-between-android-and-pc/633254
code
Hi, I started playing Pokémon y from phone and I would like to be able to play it from pc as well but with the same save so I don’t start all over again. In order for us to provide better support, we need to see the log generated by citra. This guide will walk you through how you can obtain the log file: How to Upload the Log File On your phone, go to Internal Storage\citra-emu\sdmc\Nintendo 3DS\00000000000000000000000000000000\00000000000000000000000000000000\title\00040000\00055E00\data\00000001 and copy all of the save files from there and transfer it to your PC. When on your PC, add your game directory if not already there in Citra and when your game is on the main page of Citra, right click on the game and select Open Save Data Location . Paste all of the files from your phone into the folder it opens up. Then, just launch your game and it should be all working.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335609.53/warc/CC-MAIN-20221001101652-20221001131652-00267.warc.gz
CC-MAIN-2022-40
882
6
https://gambas-buch.de/dwen/doku.php?id=k7:k7.4:k7.4.1:start&do=
code
The Gambas interpreter offers you two types of native container classes. A collection is a collection of items that are indexed using a key of the type string –> chapter 7.5 Collection. Only elements of the data type' Variant' can be stored in a collection. The values are stored internally in a hash table that grows dynamically when more elements are inserted into it. An array is a set of elements that are indexed using an integer type key and stored in a memory block. All elements in an array have the same data type and there is an array class for each native data type. Arrays can be one- and multi-dimensional. The elements of more than one integer value are then indexed. If an array has exactly one dimension, it can be dynamically reduced or expanded using the Resize () method.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099942.90/warc/CC-MAIN-20231128183116-20231128213116-00668.warc.gz
CC-MAIN-2023-50
792
4
https://www.roliedema.com/sign-up-thank-you.html
code
Step 1: Open up your email. Step 2: Click on the email with the subject line: “Confirm your subscription.” Step 3: Click the confirmation link. Step 4: After you finish Step 3, you will receive the Free Bonus Material you requested. If you don’t see the bonus in your email box within a few minutes, please check your Spam/Trash folder. May 20, 22 09:42 PM Here is a review of the Google Digital Marketing & E-commerce Professional Certificate, for learners who are contemplating enrolling in the program soon. May 09, 22 07:18 PM Love filmmaking? Here are the best online documentary filmmaking courses to help you refine your skills and turn your passion for films into a career. Apr 16, 22 01:40 PM Looking for training that combines Git, Python and IT automation? Here is a review of the Google IT Automation with Python professional certificate. If you can see this, please share this post with the buttons below :)
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662538646.33/warc/CC-MAIN-20220521045616-20220521075616-00098.warc.gz
CC-MAIN-2022-21
926
12
https://app.turbo.net/run/webex/webex-player
code
This repository has been cloned to Connection to the server failed. Please try again later. You already own a repository with this name. WebEx Network Recording Player is a free utility to playback WebEx meetings recorded as .ARF files. It can also convert meetings to .WMV, .SWF, or MP4 file formats.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337595.1/warc/CC-MAIN-20221005073953-20221005103953-00018.warc.gz
CC-MAIN-2022-40
301
4
https://support.quest.com/technical-documents/collaboration-services/3.9.1/user-guide/2
code
Authorization through administrative groups and Internet Information Server (IIS) The second security level is authorization through Collaboration Services administrative groups and IIS. To restrict access to administration tasks, Collaboration Services automatically creates and uses two local groups on every Collaboration Services server: When the service is installed on a member server or a workstation, local computer groups are created. The administrator can redefine group membership using the Computer Management tool. If the service is installed on a domain controller, domain local groups are created. Users can be added to or removed from these groups using the Active Directory Users and Computers administrative tool. Web management console To perform administrative tasks, you need to connect to the Collaboration Services service using the web management console. |Select Start | Programs | Quest Software | Collaboration Services on the computer where the Collaboration Services service is installed. Configuring Collaboration Services The Configure Branches Wizard, which allows for registering branches in the collaboration structure, automatically displays when you first open the user interface at the HQ forest. For details, see Configuring branch forests . All the branches and the HQ forest are called synchronization partners. Configure secure data communication Collaboration Services provides secure communication between forests by using data encryption and signing. Collaboration Services uses public key files. Each public key file contains the following: During Collaboration Services setup, you specify the following: All messages from the HQ forest are encrypted using the encryption key in the HQ public key file. The public key file of each branch forest is required for the administrator of the HQ forest to register the branch forests in the collaboration structure. The Export Key Wizard, which allows for exporting the branch public key, automatically appears when you first open the user interface in a branch. |Right-click the Collaboration Services node in the tree, select Properties , and click General
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500303.56/warc/CC-MAIN-20230206015710-20230206045710-00388.warc.gz
CC-MAIN-2023-06
2,146
20
https://apisix.apache.org/docs/downloads/
code
Apache APISIX is a dynamic, real-time, high-performance Cloud-Native API gateway, based on the Nginx library and etcd. Apache APISIX software provides rich traffic management features such as load balancing, dynamic upstream, canary release, circuit breaking, authentication, observability, and more. Use the links below to download the Apache APISIX™ from one of our mirrors. |1.5||05/08/2020||source (asc sha512)| |1.4.1||20/07/2020||source (asc sha512)| |1.4||29/06/2020||source (asc sha512)| |1.3||24/05/2020||source (asc sha512)| |1.2||20/04/2020||source (asc sha512)| |1.1||24/02/2020||source (asc sha512)| |1.0||15/01/2020||source (asc sha512)| |0.9||24/11/2019||source (asc sha512)| |1.5||12/08/2020||source (asc sha512)| Verify the releases It is essential that you verify the integrity of the downloaded files using the PGP or SHA signatures. The PGP signatures can be verified using GPG or PGP. Please download the KEYS as well as the asc signature files for relevant distribution. It is recommended to get these files from the main distribution directory and not from the mirrors. gpg -i KEYS # or pgpk -a KEYS # or pgp -ka KEYS To verify the binaries/sources you can download the relevant asc files for it from main distribution directory and follow the below guide. gpg --verify apache-apisix-**\*\*\*\***.asc apache-apisix-****\***** or pgpv apache-apisix-**\*\*\*\***.asc or pgp apache-apisix-**\*\*\*\***.asc
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107896778.71/warc/CC-MAIN-20201028044037-20201028074037-00259.warc.gz
CC-MAIN-2020-45
1,427
17
https://docwiki.embarcadero.com/Libraries/Alexandria/en/Vcl.Controls.TControl.BringToFront
code
void __fastcall BringToFront(); Puts the control in front of all other controls in its parent control. Call BringToFront to ensure that a form is visible or to reorder overlapping controls within a form. Note that controls that wrap Windows screen objects (control classes descended from TWinControl) always "stack" above lightweight controls (control classes descended from TGraphicControl). BringToFront can force a lightweight control, such as a Shape, to stack above other lightweight controls, but wrapped controls, such as an Edit, will still stack above the Shape. Without BringToFront, controls are stacked in the order they were placed on the form.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946535.82/warc/CC-MAIN-20230326204136-20230326234136-00257.warc.gz
CC-MAIN-2023-14
657
5
https://4imag.com/meet-the-talent-marvin-wissfeld/
code
Place of residence: Saarbrücken, Germany Where were you born? Near Bonn, Germany What did you study? I studied Computer Science at Saarland University and specialized in Security and Privacy. My BA and MA thesis were related to privacy on Android devices. Describe your position to a person who doesn’t know what you doing: I am developing open source software. Software I am making publicly available including the source code, so people can evaluate it and decide if and how they want to use it with their personal data. Please describe a day in your life: I wake up, have breakfast. Turn on my computer and this lasts until lunch time. After lunch I am going back to my computer, often until the evening. I am not always coding, I also do some research and some relaxing stuff such as reading articles. I often finish off my day with watching a movie. Can you describe in your own words few of the projects you are working on now: I have two big projects I am working on: The first is microG, which provides open source alternative to Google services on Android devices. My second project is Dino, which is an instant messaging app using a federated communication system called XMPP. In your opinion, who is the most influential person/company in the world of technology these days? I don’t think there is a single person that is the most influential. It’s almost always more than one person behind important things. The big companies, while influential, are not primarily contributing or building something for society. There is no one that I would like to follow. I prefer to do what I am doing now and provide people with tools that they are in control of. I am redoing what companies did in the past, but in a different, and in my opinion better, way. If you can pick one app/product/project existing now that you wish you were involved in, what would it be: Probably all the things that I am redoing with microG. If I was in charge of Google, I would have done it open source from the beginning. How do you see technology evolving in the next ten years in the privacy sector? I guess with GDPR we’re going to see a shift into more privacy protection. We are in a phase, where everybody is realising what privacy means. For example Google Analytics, which was very popular the last 15 years, is now illegal to use in Austria and France and this will soon spread all over Europe. We’re going to see technology moving to the direction of privacy, as until now they didn’t give much notice of what users want or don’t want or need. Perfect example would be Cookies: Nobody would agree on tracking cookies if it was as easy to disagree. Weeks ago European Parliament decided that you have to make it as easy to disagree as to agree and if the browser has some kind of configuration to disagree by default, websites have to comply with that. What are the two characteristics you have that make you successful in your field of expertise? When I am working on things, I work really deeply. I am really focused on what I am doing. Going into detail does help my work and my aims. I am really enthusiastic and trying to focus only to what is important for the society. What is the most difficult thing you had to deal with during your career? Things in my career weren’t hard, as things somehow worked out. I just followed this path, it was there for me and it made sense. In a perfect world my work wouldn’t be necessary, the things that I do, I am doing them because other people are not doing them correctly for the society. If they were right from the beginning my work would not be needed. What is your greatest achievement up until today? microG is the biggest thing I am working on but there are also smaller things. Doing the first version of microG was a big achievement. It was working in a technical level but it was hard to use. Since then I am not only improving it and adding new features, but also make it easily accessible. There is always more to do than done. What do you wish yourself with respect to your career? Next to my open source work, I am doing paid work as a freelancer and I’d like to do less of that. I am trying to focus more on open source development. I would like to get more donations towards my open source projects so I don’t have to do any freelance work because it is paid. Where do you see yourself in five years? At the same space and the same sector. I don’t think privacy issues will change completely very soon. It will take quite a long time, even with regulation implementation. What is your next goal? I will continue my work and develop microG and Dino. For microG, I want to make it compatible with more apps and all devices out there. I don’t want users to have to buy new devices. I want to avoid electronic waste. For Dino, I want to make sure it can compete with commercial messaging apps at the feature level, so that it will be more suitable for everyone and not just a small niche of users. What tip do you have for young people who want to start out in computer science field? Computer science is a broad field and can be somewhere on the range of theoretical research to practical development. I think if you want something more practical, maybe you should consider not to go to university. A lot of what you learn there might be not useful for software development. If you don’t know which path you want to follow, then university is a good choice so you learn if you like to do research. Of course university gives you a lot of insights and access to certain people, professors that can answer your concerns and most complicated questions. If you could say something to your younger self what would it be? I wouldn’t change something, I would take the same path. Having followed this path, gave me access to people that otherwise I wouldn’t have met. I would say, to my younger self: Do the same, do what you want to do. What is the invention of the century in your eyes? I think computers are probably the most important invention of the last century. Of course they looked different in the early days, but the ideas of what could be done, like smartphones, smartwatches and so on, are already very old – it was just that the technology was not ready back then. Now we have the technology and computers are everywhere. What can’t you do without? (app/product…) Using my computer everyday. I can do without my computer for a week, but at some point I need it for my work. There is no specific app that I wouldn’t be able to replace with something else – worst case by developing it myself – but that requires a computer in first place. Which famous person would like to have dinner with and why? In general I don’t like famous people. I would prefer to sit down and have a chat with everyday people and learn what they do. Where would you like to travel next? I’m a person that likes to travel, meet people and societies face-to-face and to explore nature. The next locations I would like to visit are Thailand and New Zealand. If you were asked to stay on a deserted island for 6 months what 3 things would you take with you? Before entering high school I was asked the same question. Back then I did answer: a computer, electricity and my best friend. Now I would answer: a computer, electricity and my girlfriend. Do you have a person who influences or motivates you? I influence myself a lot. The reason I started the microG project was for me – because I wanted it for my daily life – and then I started developing it also for other users, beyond my own usecases. What is the greatest miss? (you thought it will never work but turned out to be a great success) When I started the project microG, I didn’t think it would be so useful for other people too. Back then, it was a much smaller project and far less needed, because more of Android was open source. How did Covid-19 change the way people view technological development? With Covid people started using computers much more. They had to stay at home and use them for work, video conferences etc. Especially for some older people, this was a big change if they were not using computers a lot before. With people using computers and technology much more everyday, it becomes more visible how much we rely on it and the companies that build it.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474715.58/warc/CC-MAIN-20240228112121-20240228142121-00875.warc.gz
CC-MAIN-2024-10
8,317
47
http://maven.40175.n5.nabble.com/Need-help-maven-javadoc-plugin-includeDependencySource-error-module-not-found-on-module-source-path-td6014693.html
code
Need help: maven-javadoc-plugin: includeDependencySource: error: module not found on module source path I'm struggling to get javadoc generation with includeDependencySource working in my project. When setting includeDependencySource to true in the pom and running mvn clean install javadoc:aggregate or mvn clean install javadoc:javadoc I get the following errors: First: [ERROR] no reactor project: <group_id:artifact_id of the single dependency of my project> And a few lines later a BUILD FAILURE because the javadoc tool exited with the following error: Exit code: 1 - error: module not found on module source path But the source of the dependency seems to be fetched and unpacked The line (10) where the error is is the module definition of the single in that project. The generated javdoc options file contains only one module-source-path: /path/to/my/project/target/site/apidocs/src which contains a single empty folder named like the module of my project (not the dependency). Did anyone have a similar problem before? Any ideas what to try?
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107869933.16/warc/CC-MAIN-20201020050920-20201020080920-00013.warc.gz
CC-MAIN-2020-45
1,050
19
http://unexclusive-synonym.psgroove.com/
code
If the synonym for unexclusive are wrong, please inform the site editors by writing a comment. You can search for unexclusive synonym and other synonyms at psgroove.com Do you think it is a different synonym for the following except for unexclusive synonyms? Comment to add other unexclusive synonym. 1. as in extensive Unexclusive synonym for adj far-reaching, thorough
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511872.19/warc/CC-MAIN-20181018130914-20181018152414-00355.warc.gz
CC-MAIN-2018-43
370
5
https://forums.opensuse.org/t/netstat-busybox-net-tools-conflicts-with-net-tools/166598
code
PS /home/rokejulianlockhart> sudo zypper install busybox-net-tools Loading repository data... Reading installed packages... Resolving package dependencies... Problem: the to be installed busybox-net-tools-1.36.0-26.2.noarch conflicts with 'net-tools' provided by the installed net-tools-2.10-2.1.x86_64 Solution 1: deinstallation of net-tools-2.10-2.1.x86_64 Solution 2: do not install busybox-net-tools-1.36.0-26.2.noarch Choose from above solutions by number or cancel [1/2/c/d/?] (c): Is any predictable negative consequence caused by replacement of net-tools with busybox-net-tools probable? I ask because obviously net-tools doesn’t include the netstat command that I desire, yet isn’t installed by default for whatever reason. First, there is no need to use bold. Second, we cannot tell you what to use. Try both, see the difference, decide which one is better suited for your purpose. Busybox is intended for very limited environment with basic networking needs and is kept as small as possible. So yes, busybox is not going away because such systems are not going away. For normal systems there are other, more feature rich, tools which also get extended with new features. Old tools are deprecated not to make you personally unhappy - but because they lack support for new features in Linux networking stack and cannot be extended due to their design. Will replacement of an installed-by-default networking package cause any well-known reduction in functionality that might cause me to be unable to revert without manually sourcing net-tools again from a different PC and transferring that over, or corrupt any configuration files due to fundamental incompatibilities between the packages? Considering that BusyBox is used on Android, perhaps not, but that distribution is weird. Thanks, although I’m uncertain why you mentioned this. I’ve no stubborn penchant for developmnental stagnantion, I merely want to be able to temporarily test netstat on this PC to compare its output with something else. If you are so scared of the “deprecated” in the net-tools-deprecated - look at what is included in net-tools (using as example rpm -ql net-tools) and decide for yourself whether you need any tool included there. Some of these tools may be provided by busybox as well, which is why I said earlier “test both and decide”. But the fact that these tools come from busybox does not make them less deprecated. The best solution appears to be to create a kind of local isolation. In lieu of wasting time and space on a VM, a basic container appears best. I wonder why I didn’t consider this previously; why corrupt my base system with deprecated tools?
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511406.34/warc/CC-MAIN-20231004184208-20231004214208-00691.warc.gz
CC-MAIN-2023-40
2,672
20
http://itknowledgeexchange.techtarget.com/itanswers/using-max-data-types-in-sql-server/
code
I'm new to using large data types (varchar(max))and after reading an article (Using MAX data types in SQL Server) I have a few questions. I am trying to understand how you insert such a long string (up to 2 billion char) in the database table? I am assuming this would include storing Word Documents, etc. in the data base. If this is true, what is the method used to store the document in the data base? What is the max length of the Command String that is submitted to SQL Server? December 20, 2007 6:03 PM February 22, 2008 4:55 AM
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383508/warc/CC-MAIN-20130516092623-00097-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
534
4
http://www.cnet.com/forums/discussions/dragon-natural-speaking-and-xp-pro-64bit-577941/
code
The problem is XP x64 was never really intended for widespread use. That's why it was only ever sold as OEM, and Microsoft killed off support for it before SP3 came along. XP x64 was just meant to hold over people who had specific need for a 64-bit OS that were getting impatient over how long Vista was taking to come out. These are the kinds of issues, along with poor driver support, that comes with using an OS like XP x64. So if that is a problem, I'd suggest you figure out some kind of alternate situation. I'd recommend moving away from XP x64 regardless since it has not been supported for quite some time, and there are a number of security issues in XP that have not been, and will not be, fixed in the x64 version. I have Dragon Natural Speaking 11.5 and When Installing it tells me it "IS NOT COMPATIBLE WITH 64BIT OS"? Any KNOW if there is a Dragon Natural Speaking Version that is Compatible with XP Pro 64bit?
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701148834.81/warc/CC-MAIN-20160205193908-00304-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
925
4
http://thegreatwowbookproject.blogspot.com/2007/08/first-things-first-proposed-table-of.html
code
Now, who had that proposed table of contents? That would be a great place to start. And a great tool to use for this project would be the 'Labels for this post' innovation Blogger has added to the mix. When you're composing a blog post, you'll find the 'Labels for this post' field at the bottom of the text entry box, just above the green button that says 'Append Tags'. 'Tags' and 'Labels' are different things. Tags are used to categorise a particular blog post in Technorati, a blog-search engine. It's always good practice to make Technorait tags, cos it makes the blog more easily findable in the world at large. See the examples below. Labels are something different. And VERY powerful for the purposes of team-writing a book. They are INTERNAL category markers for the blog itself. And can be used to sift information. So, any blog post can have multiple labels. This post, for instance, could be labelled 'admin', and 'how-to'. You can do a 'sort' by label. So, for instance, say you only wanted to see posts labelled 'how-to', you'd click the 'how-to' label on the blog, and this post would be the earliest one in the list of posts. I propose that there be a single-word label for each chapter, so that when someone writes a post for a particular chapter, they can label it with that word, so that all info pertaining to that topic can be collated easily. Team members who have editing permission can change or amend labels too.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267860570.57/warc/CC-MAIN-20180618144750-20180618164750-00191.warc.gz
CC-MAIN-2018-26
1,438
9
http://stackoverflow.com/questions/3118777/good-books-about-writing-technical-documentation/3122315
code
Can you recommend any books about how to write technical documentation? I'm after some guidance on overall layout of the document, style (as in prose, not CSS), when and where to go into detail, etc. Please post only one book per answer One thing that's stressed in technical writing courses and holds true in practice is that consistency is important. The most popular way to maintain consistency is with a style guide. There are many style guides, but the Apple Publications Style Guide [PDF] is both readily available and good enough for many applications.
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999652934/warc/CC-MAIN-20140305060732-00054-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
559
4
https://us8.campaign-archive.com/?u=4f5ced372ce69edd012a50af1&id=7c75e036c4&socialproxy=https%3A%2F%2Fus8.campaign-archive.com%2Fsocial-proxy%2Fgoogle-plus-one%3Fu%3D4f5ced372ce69edd012a50af1%26id%3D7c75e036c4%26url%3Dhttps%253A%252F%252Fmailchi.mp%252Flaw%252Fweekly-corruption-digest-the-constitution-comes-to-the-county-unit-georgias-state-level-electoral-college%26title%3DWeekly%2520Corruption%2520Digest%2520%257C%25C2%25A0The%2520Constitution%2520Comes%2520to%2520the%2520County%2520Unit%253A%2520Georgia%25E2%2580%2599s%2520State%2520Level%2520Electoral%2520College
code
CAPI Public Integrity Practice Tip: This month, Digiwist.eu released a publicly accessible database detailing the financial information and disclosures, conflicts of interest, and right to information requests in 34 European states. The database is part of a whistleblower project funded by the EU which hopes to improve transparency, efficiency, and trust in government. The project hopes to help journalists and engaged citizens to hold governments accountable, and to provide a model for increase transparency around the globe. Check out the site here
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657134758.80/warc/CC-MAIN-20200712082512-20200712112512-00035.warc.gz
CC-MAIN-2020-29
554
3