url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://forum.xda-developers.com/showthread.php?p=23423430 | code | OK - so when using GPS Status from market (from play doesn't sound right yet
), I usually get a fix on 7+ satellites within 10 secs, so certainly reasonable, and the compass also points in the right direction. Google maps however still feels a little hit and miss - what I can say for certain however is that compass mode in Google Maps doesn't work.
Can anybody else confirm either way regarding compass mode?
Could be on the wrong track completely, but some htc desire users had some very similar sounding issues, and it turned out to be a kernel issue in 2.6.35 for the akm8973 driver xda link to patch
. Noticed AK8973 in /data/misc/akmd_set.txt, so presumed the same driver with the same kernel may be contributing. | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688997.70/warc/CC-MAIN-20170922145724-20170922165724-00570.warc.gz | CC-MAIN-2017-39 | 720 | 5 |
https://docs.xperience.io/xp | code | Xperience by Kentico Documentation
- Use the present simple tense or the feature name when searching for specific features or scenarios: Track email statistics, Page Builder
- Use quotation marks when searching for pages that contain the exact phrase: "Xperience Portal"
- Use the - (minus) sign before words you want to exclude from the search results. To exclude "administration": customize Xperience -administration
- Use the OR operator within quotation marks when searching for pages that contain at least one of the terms: "Xperience OR system"
- Use the AND operator within quotation marks when searching for pages that contain both the terms: "Macro AND syntax"
- Use title:user when searching for pages with "user" in the title.
- Use the * (asterisk) wildcard character to search based on prefixes. The wildcard is substituted with any number of characters. For example, cont* yields content, continuous and contacts, among others. The wildcard does not work when placed at the start of the search text.
Xperience by Kentico
Xperience by Kentico is the latest iteration of Kentico's line of content and digital experience management platforms. This version introduces major changes from previous versions of Kentico Xperience and currently provides a smaller, more focused set of features.
Start developing with Xperience
See the Changelog to learn about the latest releases and updates. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100381.14/warc/CC-MAIN-20231202073445-20231202103445-00527.warc.gz | CC-MAIN-2023-50 | 1,397 | 12 |
https://www.freelancer.com/projects/PHP-MySQL/Some-coding-for-website/ | code | I need a backend to my current website, the backend should process all the orders received.
Also i want to add two more payment options to my current payment calculator.
The backend should store all orders, and the data inserted like "Amounts" "Referrals"
Also the name of the person ordering, it should put them in a list and i should be able to export it.
Like this : [url removed, login to view]
The chat should not be included neither the progress bars.
I have to be able to edit an order as finished/in progress/delite/edit
The two new payment methods will use the [url removed, login to view] api and will be added to the current calculator.
Here is the API [url removed, login to view]
17 freelancers are bidding on average $901 for this job
i Am Not Saying that i Am the best but my coding skills show you that i em the best i am highly interested in this job I Can Start working on it right now .. Waiting for your response Thanks | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104612.83/warc/CC-MAIN-20170818063421-20170818083421-00263.warc.gz | CC-MAIN-2017-34 | 939 | 11 |
http://hosthelp.globallegalhackathon.com/article/9-judges-mentors-and-volunteers | code | Judges, Mentors, and Volunteers
These are guidelines and not requirement.
Host locations are responsible for recruiting a panel of 3-5 judges, that are representative of a wide set of stakeholders. A mix of the following is required:
|CIO or Senior Partner of Law Firm||Senior Technologist, ideally a CTO of a legal tech solution||General Counsel or in-house counsel representative|
|Government personnel||NGO or Non-Profit representative, dealing with legal issue||Law School dean or professor|
|Other (with explanation)|
*Panel should not include more than one representative of a single stakeholder group or organization
*Panel can include a sponsoring company, as long as there is no obvious conflict of interest (e.g. the sponsor also has teams representing the organization).
Judge Panel Submission Due: March 4th, 2020
- Submit your Judge Panel and Nominate a Judge for the First Round: First Round Judges Submission
Official Judging Rubric: This rubric is not required for hosts to use, but it is a suggested guide. However, this rubric is similar to the judging standards in the second and third rounds.
What's required of mentors:
Here's a great run down of what is expected of mentors at the Global Legal Hackathon. It was partially sourced from Berkley.edu, and edited to address Global Legal Hackathon specifics.
- Be available for participants. Participants will contact mentors they believe will be able to address their questions via the Cadence event app. Responding to teams’ questions is not a 24/7 responsibility, but please check the communication channels regularly, and get back to participants in a reasonable timeframe.
- Offer what you know. It’s better to acknowledge not-knowing than to point teams down a wrong or sub-optimal path. Your advice about reliable on-line sources of information might be as or more valuable to participants as answers to their specific question. Especially if you’re not sure. Feel free to refer teams to another mentor if you know that s/he is better suited to answer a given question.
- Don’t join a team, you are not a hackathon participant. Tempting as it might be to dash off a few lines of code, or a couple of paragraphs for a team’s web site About page, please curb your enthusiasm! Pointers, reference to examples, advice about design are all in-bounds. Contributing to the team’s actual work product is not the role of a mentor.
- Share questions and answers. To the degree possible, we would like all teams to benefit from questions asked and answered in team/mentor interactions. Mentors are strongly encouraged to summarize questions/answers for posting to the whole group of participants in the live feed on Cadence event app. As we get close to the kickoff date, hackathon organizers will announce how information is to be shared among participants, and how mentors should publish to the selected platform.
Mentors are professionals that are well experienced in areas and skill sets needed over the course of the hackathon weekend. Here are some example professionals that you may wish to invite to mentor:
- Well seasoned hackathoners. Individuals who have organized a hackathon previously and are senior professionals in one of the below areas.
- Senior technologists: this could be software project managers, developers, analysts and more.
- CIO's and CTO's
- Senior project managers
- Seasoned business development and marketing leaders
- Startup Founders and Entrepreneurs
You may need to recruit volunteers to help you run you a successful hackathon. We encourage that you make them easily identifiable by wearing the same shirt, lanyards, or name tags. There are many tasks that volunteers may be assigned such as:
- Set up and take down of event
- Running your registration table
- Take photography
- Managing social media
- Documenting what happens at the event for storytelling afterward
- Managing the food for the attendees
- Managing the technology at the event for the attendees
- Wi-Fi Access
- Power Outlets
- Any Audio Visual Equipment
- Answering attendees questions
- Being an MC to run the event and keeping to the schedule
- Managing Judges and Mentors | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303512.46/warc/CC-MAIN-20220121162107-20220121192107-00227.warc.gz | CC-MAIN-2022-05 | 4,157 | 38 |
https://community.cloudera.com/t5/Support-Questions/Cdsw-installation-Error-starting-daemon/m-p/67426/highlight/true | code | Docker needs the docker-thinpool volume to be present. This is created by the Prepare Node script from the devices you configured under the Docker Block Device.
To debug this you can try to rerun the Prepare Node script which is available from CM under the Actions menu and see that the device is created. A typical issue I saw is configuring a mounted/formatted disk for the Docker Block Device. We need a plain disk to be set there. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446706291.88/warc/CC-MAIN-20221126112341-20221126142341-00756.warc.gz | CC-MAIN-2022-49 | 434 | 2 |
https://www.cetjournal.it/index.php/cet/article/view/CET1871112 | code | China’s inland lakes have been faced with the problem of severe eutrophication water pollution. The purpose of this study is to predict the eutrophication level of water bodies and provide theoretical basis for water body management. To this end, by taking the 18 measuring points in Wuliangsuhai, Inner Mongolia as the object of study, this paper performs samplings and cluster analysis, to obtain the correlation relationship between chlorophyll a (Chl-a) and nutrients such as total phosphorus (TP) and total nitrogen (TN) etc. Besides, based on the empirical formula, the 2012-2014 sampling data were used to revise the slope and intercept, and then obtain the prediction model of TP in spring and chl-a concentration in summer, that is, the prediction model of water eutrophication; the 2015-2016 sampling data were used to validate the prediction model. The research results show that the relative error between the prediction model and the measured data is less than 20%, which meets the requirements of the qualified prediction model, and can predict the eutrophication of the water body. This provides theoretical support for the prediction and prevention of eutrophication for inland lakes in China. | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400217623.41/warc/CC-MAIN-20200924100829-20200924130829-00446.warc.gz | CC-MAIN-2020-40 | 1,211 | 1 |
https://geant4-forum.web.cern.ch/t/how-the-material-of-several-bodies-in-a-parallel-world-is-defined/10452 | code | I encountered a problem with the definition of materials when defining the parallel world. According to the manual, if I define the material in the parallel world and set the layered mass geometry, then the material in the parallel world will override the material in the mass world.
The problem I am having is that I need to define a geometry in the parallel world and set the material for this geometry. Also the materials of the objects in the mass world cannot be affected by the materials defined in the parallel world. I would like to know what I should do.
I am not sure if I understand you correctly. Is the problem that the material definition (not the volume/placement) overrides the previous material definition, or is the problem that placed volumes in the parallel world change the “currently active material” for certain coordinates?
use different names for the materials in the parallel world
subtract the volumes of the main world from parallel world volumes to make them non-overlapping
Yes yes, my concern now is that the materials I have defined in the parallel world will have an effect on the materials in the mass world. I have built a model using the DICOM example and then defined a geometry in the parallel world. This geometry uses PTFE as the material.
My concern is that the material in the parallel world will overwrite the material in the mass world. I define a sphere in the mass world to define the material as air. Define a box in the parallel world defining the material as water, and place this box at the parallel world origin. So will the material at the origin of the mass world be changed?
According to the advice you gave, isn’t it true that material overwriting doesn’t happen as long as the material names are different in the two worlds. Am I understanding this correctly?
Volumes in a parallel world may have materials. Such materials overwrite the materials defined in the mass geometry if the "layered mass geometry" switch of the G4ParallelWorldProcess constructor is set.
Again, depends on what you mean… Re-defining a material with identical name in both worlds does not throw an error. If I were to have e.g. a PTFE material in both worlds (with different properties!), I would use two different names, just to be sure… Probable it is not an issue at all, because
will then just list both variants without complaining when there is two definitions of in both worlds… | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654012.67/warc/CC-MAIN-20230607175304-20230607205304-00283.warc.gz | CC-MAIN-2023-23 | 2,430 | 11 |
https://psychology.meta.stackexchange.com/users/16664/bary12 | code | i'm a programmer because it's fun :D
Member for 3 years, 3 months
0 profile views
Last seen Oct 7 '17 at 15:20
Top network posts
- 13 Why webpack config has to use path.resolve & path.join
- 8 how to remove default-jre java installation from Ubuntu?
- 5 ImportError: Could not import 'rest_framework_simplejwt.authentication.JWTAuthentication'
- 5 eclipse-cdt Problems
- 5 Is there a limit on the rate at which incoming information can be comprehended?
- View more network posts →
Keeping a low profile.
This user hasn't posted yet.
Oct 7 '17 | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141193856.40/warc/CC-MAIN-20201127161801-20201127191801-00019.warc.gz | CC-MAIN-2020-50 | 544 | 14 |
https://www.forestscience.at/ueber-das-journal/open-access--copyright-and-licensing-policy.html | code | Open Access, copyright and licensing policy
The Austrian Journal of Forest Science (hereafter “AJFS”) is an open access journal edited by the University of Natural Resources and Life Sciences and the Federal Research and Training Centre for Forests, Natural Hazards and Landscape and published by Österreichischer Agrarverlag (hereafter “Publisher”). All articles published in the AJFS (hereafter “Articles”) shall be publicly available on the Internet according to the Creative Commons CC BY-SA 4.0 attribution - share alike licence.
The Author retains the copyright of their Article. The Publisher has the right to publish the Articles and keep them available for the public in any current or future publishing format. Publisher may also transfer publishing rights and/or maintenance of the AJFS website to others who respect the CC BY-SA 4.0 licence.
AJFS accepts deposition of the final, edited Publisher's Version of Record of the article in other repositories, e.g. personal, institutional, or professional if the repository respects the CC BY-SA 4.0 licence. The Author has the right to deposit the Author’s Accepted Manuscript to any external repository. If the manuscript has been published as a preprint, the preprint should be amended with information on the publication of the final version in the AJFS. All articles deposited in an external repository must include a full bibliographic reference to the Article published in the AJFS, including DOI, and a mention on the publication with CC BY-SA 4.0 licence. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474470.37/warc/CC-MAIN-20240223221041-20240224011041-00360.warc.gz | CC-MAIN-2024-10 | 1,536 | 4 |
http://www.theonlineadvertisingcourse.com/ | code | Online Advertising Course Information
Welcome to the Online Advertising Course site! Here you will find information on an ever increasing number of topics to help you learn about the world of Digital Media and Advertising. If you're an aspiring Digital Media Professional, this is the place to start exploring the world of online advertising. We comb the web looking for content that you can use to skill up in all the areas you need to further your career or just keep you up to speed in the rapidly changing digital media environment. We also find digital media training and advertising courses from around the globe so you can see what's on offer out there. If you attend one, we'd love you to drop some feedback about it on our site. Happy learnings! | s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246636255.43/warc/CC-MAIN-20150417045716-00086-ip-10-235-10-82.ec2.internal.warc.gz | CC-MAIN-2015-18 | 754 | 2 |
https://mail.coreboot.org/hyperkitty/list/[email protected]/message/VZ2DWHYOJSLLMENZEF6GSW4UKCHETHEO/ | code | System *boots* with one of:
- maxcpus=0 (equivalent nosmp)
- nolapic (with e1000 warning about missing MSI-X
System does *not* boot with one of:
I thought SMP was generally not compatible with PIC IRQ routing (which noapic enforces?) and this would explain case 2.
As for case 1, maybe I missed some detail with my commit when switching from LAPIC to TSC timers. Like leaving LAPIC timers running at different rate or generally having the timer counters too much out-of-sync across CPU #0 and #1. You coud try if that one is the commit with regression. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233508977.50/warc/CC-MAIN-20230925115505-20230925145505-00480.warc.gz | CC-MAIN-2023-40 | 553 | 6 |
https://forums.toadworld.com/t/toad-17-stuck-on-login/58984 | code | I'm using Patch 1 and suddenly, when I start it gets stuck in the login window in "Checking feedback server".
Sometimes it goes through and completes loading (after some 5-6 minutes) but just as often, it crashes to desktop.
I've tried uninstalling/reinstalling it, I've tried putting the debug ticks to look in the logs, I trace the connections with ProcessMonitor but I didn't see anything wrong.
Reading on the forum, I saw that there was a similar problem and I set in toad.ini, FeedBackOptIn=0 but that only made it stuck further down in "Setting global options".
I suspect it has something to do with the AD that manages my network but I don't understand why there are other connections besides the license check or why this check is not done asynchronously so you can use the application normally.
Is there anything that I can do to avoid this? Or something more transparent about the problem so I can pass the issue to the network guys if this is just on my side?
There is one more setting that you can apply, similar to what you did with FeedbackOptIn.
Follow the steps here to set InternetAccess=0.
FYI, both of these can be set in the Toad options window, if you can get to it...
Options -> Online -> Allow internet access
Options -> Online -> Toad improvement program
Thanks for the reply unfortunately none of the changes were successful.
Still on startup, the loading gets stuck in "Setting global options", stays stuck for about 9 minutes and 45-50 seconds and then continues loading.
If I touch that green window, it goes into "not responding", from which it may exit or crash to desktop.
Start Toad from command line like this:
c:...path to toad...\toad.exe -freezecheck
Then when it gets stuck, you'll get an error dialog. At that point, please follow the steps here to get the call stack out of the error dialog, and post the call stack here.
Just confirming that both of there were already disabled.
Here's the error.
toad_error.txt (60.7 KB)
Thank you for the call stack. It is very helpful. Toad is hanging while waiting for a response from the windows task scheduler. So I have questions:
- Is the windows task scheduler enabled on your PC? If not, can you enable it?
- Are you in some kind of high-security environment which does not permit the windows task scheduler?
- Are you using Toad for Mac version or is this on Windows?
- You said: I'm using Patch 1 and suddenly, when I start it gets stuck in the login window... Does that mean you had a prior version of Toad that did not exhibit the hang? If so, which version?
Below my answers:
- Task scheduler is active (I didn't even knew that it could be inactive because there are various tasks inside windows, depending on it)
- it's not a very tight security environment and I have administrator right on the machine but I know that my laptop is applying some AD policies.
- (and 4.) yes, it's the Windows version, specifically Toad for Oracle Base (64-bit) 17.0.353.2906
The problem occurred when I updated to Patch1 and the feeling was that this was the problem/connection.
In the meantime though, I uninstalled version 17, installed 16 and the exact same thing happens.
Then I updated again to version 17 and the deadlock remains so there might be something in my system but without a more detailed breakdown of the problem, I don't know where I could intervene and because it's a production machine, I can't reinstall the OS.
I don't think there is any need to reinstall the OS.
Was anything else installed or changed at the time when you installed Toad 17.0?
I see from your error log that you have McAfee installed. Can you try temporarily disabling that and see if it makes any difference?
Unfortunately no, it's automatically managed but I can try to find someone tomorrow, to disable it temporary or set some exclusions for the Toad folders.
But I don't really think that this is a problem, because we have 8 licenses for Toad and it is installed on 4 laptops and only 2 of them shows this behavior.
ok, well that's interesting.
If you go into windows task scheduler, do you have some items scheduled from Toad (even from a prior version)? If so, does it help if you remove these items from the scheduler?
If you do not, it may help to delete the "Quest Software" node on the left, if it's present. You can do that by right-clicking and choosing "Delete folder". You'll have to delete the "Toad" folder under it first.
There was no node in the scheduler list but discussing the uninstall earlier I realised that I had only done it from the menus without deleting any other folders left.
Therefore, I uninstalled everything again, both application and installer, deleted all folders that was with Quest, both from Program Files and user\appdata (except the settings one) and deleted everything I found in the registry related to Quest.
After reinstallation, the application started normally, without any crashes. I reimported the settings and there were no problems, after restart, again, everything works normally.
I didn't understand unfortunately if it was something local or something appeared a few days ago punctually when I've installed the new patch, which I did directly over the previous version, but now everything seems to be fine.
Thanks for your help!
Well, I wish we knew the cause but I'm glad you got it working again. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816879.72/warc/CC-MAIN-20240414130604-20240414160604-00358.warc.gz | CC-MAIN-2024-18 | 5,320 | 46 |
https://news.povray.org/povray.binaries.images/message/%3Cweb.61c87bcf6041c6701f9dae3025979125%40news.povray.org%3E/#%3Cweb.61c87bcf6041c6701f9dae3025979125%40news.povray.org%3E | code | "Tor Olav Kristensen" wrote:
> Thank you Bill !
Knowing partly what goes into all of this, I can see that it required a lot of
time and attention to detail - and you always post fairly polished images, even
if they are only WIPS.
> I'm not very familier wit Paul Nylander's work. Those macros seem like a good
> start for a library for complex calculations. But the Pow() macro could need
> some work to allow for the exponent to also be a complex number.
Complex exponents --- Oh, it makes my head hurt to even thing about that.
> I did not create macros to do the calculations, but arrays of functions and
> macros that assemble functions into new functions. For each complex operator
> there's two functions; one for calculating the real part and one for calculating
> the imaginary part.
Yes, since you are doing isosurfaces, it would have to be that way.
Not having done a great deal personally with complex math, I wasn't about to
start writing things from scratch, and wanted to just see what "known good code"
would spit out.
> > I made these two to just keep track
> > #macro Argument (Re, Im)
> > atan2 (Re, Im)
> > #end
> > #macro Modulus (Re, Im)
> > sqrt (pow (Re, 2) + pow (Im, 2))
> > #end
> I like your Modulus() macro better than the Abs() macro, because it does not
> rely on the underlying implementation of how the complex numbers are
> represented. I think that as few as possible of the macros should depend on the
> underlying implementations.
I was just working off of the definitions of the terms. Sometimes I mix and
match things without worrying about things too much, just to see what works
without overcomplicating things early on.
> Btw.: Why have you chosen to have a different
> atan2() call in your Argument() macro than in the Arg() macro ?
I believe the first one is Paul's, and the last one is one I wrote from scratch.
Again, just from definition of the term. If that gave rise to any "errors" - I
figured I could go back and fix them once I had some geometry rendered to
visually see what the problems were.
> > This is looking great! I'm sure there are a lot of other interesting complex
> > surfaces to be explored.
> I've started on a Github repository for my library. It's here:
> Please note that this is a work in progress, so some features hasn't been added
> yet and much of it may change.
Nice. That would probably be well suited to printing out and looking over
during coffee break.
> > I'm also wondering how hard it would be to use mod()
> > to have an infinite array of those "black hole vortices" on a plane - in either
> > a rectangular or an alternating/hexagonal arrangement...
> That's an interesting idea: to have a mod() operator that can handle complex
> values. But I don't know how to implement that...
Naive question: Wouldn't you just process the Re and Im parts with mod first
before passing them on to the subsequent functions?
Maybe check out
and perhaps get in touch with the authors, since they seem to have an amazing
grasp of both the math as well as POV-Ray.
Post a reply to this message | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320299927.25/warc/CC-MAIN-20220129032406-20220129062406-00114.warc.gz | CC-MAIN-2022-05 | 3,058 | 55 |
https://pushed.to/cokeSchlumpf/rethink-it/posts/2 | code | In the last few days I was working on finalizing a project I've been working on for a while: The OpenWhisk Chatbot Framework. The framework should accelerate the development bots. With the framework it's not only easy to create a simple bot including an UI, it also offers many features to extend the bot to become more advanced.
Today I have written the first getting started guide which explains how to build a simple 'Hello World' and how to extend it using IBM Watson Conversation Service. Although the whole documentation is not ready yet, I'd like to publish the first getting started guide here. | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496671106.83/warc/CC-MAIN-20191122014756-20191122042756-00296.warc.gz | CC-MAIN-2019-47 | 602 | 2 |
https://issues.apache.org/jira/browse/DISPATCH-1538 | code | Transfer and link short names (transfer_1, transfer_2, ...; link_1, link_2, ...) are created in-order as found first in log file A, then log file B, and so on. This means that if log file A has 10,000 transfers then it consumes nicknames transfer_1..transfer_10000. The first new transfer in log file B will be transfer_10001 despite the fact that it may have occurred before any of the transfers in log file A.
This is obvious in the Log data section as the transfers are shown in temporal order: transfer_10000 may be the first one in the section. This is confusing.
It is a bigger problem in the Link name index and Transfer name index sections where the links and transfers are shown in serial order. A response transfer may be in transfer_3 while the initiating transfer is in transfer_10001.
Showing these sections with the serial order also being the temporal order would be a big improvement. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817455.17/warc/CC-MAIN-20240419203449-20240419233449-00669.warc.gz | CC-MAIN-2024-18 | 900 | 4 |
https://kb.wisc.edu/127581 | code | Microsoft 365 - Why did I receive a message from quarantine by Proofpoint Threat Response
What causes this scenario?
- All messages are scanned at the email gateway for malicious content and if they don't match any known threats are delivered to your mailbox.
- After delivery, Proofpoint Targeted Attack Protection determines that the content of the message (ex. links) is actually malicious and removes the message from your mailbox.
- In a small number of instances, further review determines that the message is safe and the message is forwarded back to your mailbox. This is considered a false positive.
- The message appears in your inbox as a forwarded message from the Proofpoint mailbox.
What address will the message come from?
The quarantined message will come from: "Quarantine Proofpoint <[email protected]>"
What other content is added to the forwarded message?
The message will contain the following text:
Message has been released from quarantine
This email has now been released from quarantine by Proofpoint Threat Response based on the IT Email Security policy.
What can you do with this email?
The message will appear like any other forwarded email you have received in the past. If you want to reply to the original sender of the email, you will need to find the original sender's email within the message and forward the message to this address.
If you reply to the message, remember to remove "Quarantine Proofpoint <[email protected]>" recipient address before sending the message. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817790.98/warc/CC-MAIN-20240421163736-20240421193736-00214.warc.gz | CC-MAIN-2024-18 | 1,518 | 15 |
https://community.splunk.com/t5/user/viewprofilepage/user-id/183317 | code | I have a client who installed the Splunk App and Add-on for Okta last May, but they are completely different from the versions currently on Splunkbase (as of Dec 2015). Everything has been re-written with all new inputs, sourcetypes, field extractions, etc. The Okta app itself went from version 2.0.1 last May to version 1.0 now, which is rather odd.
So what is the upgrade path? It seems to be a complete replacement, which is problematic since many custom reports have been developed by the client based on the old app.
Why is there no information about this in the documentation?
... View more | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645417.33/warc/CC-MAIN-20230530063958-20230530093958-00373.warc.gz | CC-MAIN-2023-23 | 597 | 4 |
https://katianovetsaintlot.wordpress.com/2009/09/07/baffled/ | code | Well, this is yet another departure from my usual posts, but I just have to share how baffled I am, these days, whenever I read about the number of people who have reportedly died of shock (?), or by committing suicide, after the helicopter crash that costs its life to Andhra Pradesh’s recently reelected Chief Minister, Y.S. Reddy. 122 people, according to some newspapers. But why ? What does this achieve ? M. Reddy’s son had to come on TV and beg people not to commit suicide anymore.
Life seems to have so little value, in India. People commit suicide for the most absurd (to me, at least) reasons : children commit suicide because they received a bad grade, or failed an exam, parents commit suicide because their child had a bad grade or failed an exam, a mother will commit suicide because her daughter or son decided to marry someone who doesn’t meet the family’s approval, etc, etc. Now, some of the reasons here may be explained. Maybe. Upholding the family’s honor is paramount, here (as in other societies, after all.) You don’t want to face the shame. It’s just too hard to have to live with it. Okay, fine.
But to commit suicide or go into cardiac arrest because a political leader died suddenly ? Nope, I don’t get it. | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267859904.56/warc/CC-MAIN-20180617232711-20180618012711-00330.warc.gz | CC-MAIN-2018-26 | 1,251 | 3 |
https://mc.ai/9-things-you-did-not-know-about-jupyter-notebook/ | code | Original article was published by Magdalena Konkiewicz on Artificial Intelligence on Medium
7. You can create presentations from Jupyter notebook.
Have you been using Microsoft PowerPoint or Google slides to create presentations? While those are good options there may be better ways to create a technical presentation.
You can create a presentation using the Jupyter notebook itself. The advantage of this is that you can reuse the content that you have used for the notebook. It allows you to choose which cells you want to use for the presentation, how to structure them, and which slides to skip.
When your notebook is ready you can create a presentation by going to View -> Cell Toolbar -> Slideshow.
Once you have done this each cell should have a Slide Type option in the right-hand corner of the cell. You can choose the sell to be slide, sub-slide, fragment, note, or skip decide to skip it.
After deciding on each slide type you can render your presentation by running the following command in the terminal window:
jupyter nbconvert <notebook name> --to slides --post serve
Or by running the following command from the notebook itself.
!jupyter nbconvert <notebook name> --to slides --post serve
This should render the presentation in the new tab that is run on your localhost.
You are able to navigate through the presentation using the arrows at the bottom right corner.
It takes time to get used to Jupyter notebook presentations so I suggest that you play with it a bit and experiment with different slide types in order to learn how to use them effectively. Once you get a grasp of it, jupyter notebooks may become your favorite tool to create technical presentations. | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107876307.21/warc/CC-MAIN-20201021093214-20201021123214-00173.warc.gz | CC-MAIN-2020-45 | 1,683 | 13 |
https://static.minecraftforum.net/forums/off-topic/forum-games/428367-rate-how-cute-the-avatar-above-you-is?page=108 | code | I'm guessing the next person will say
So Minecraft Forums isn't dead???
Quote from VoidicEnigma»
Your just way to ugly
I don't use my twitch for streaming, but if you want it: (opens in a new window)
Intel Xeon X5670 (6c/12t) @ 4.4GHz, 24GB DDR3, GTX 960, 250GB SSD, 4GB HDD and 2x 2TB HDDs | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243990929.24/warc/CC-MAIN-20210512131604-20210512161604-00324.warc.gz | CC-MAIN-2021-21 | 291 | 6 |
https://www.codeproject.com/script/common/TellFriend.aspx?obtid=2&obid=16700 | code | This email was created by [MemberName] <[MemberEmail]> who thought you would be interested in the following Article:
"Site Map Web Part for Microsoft Office SharePoint Server (MOSS)"
Displays the site structure in a hierarchical tree that is expandable and collapsible.
CodeProject also contains hundreds of articles, free source code samples and applications to help in your day to day programming. Why not give it a try! | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320386.71/warc/CC-MAIN-20170625013851-20170625033851-00629.warc.gz | CC-MAIN-2017-26 | 422 | 4 |
http://www.kudos.be/ssh_controls/troubleshooting-tips/ | code | Fixing syntax errors in the access & alias configuration files
Following errors may be discovered using the syntax checker
Add members to the
@admin_team alias in the
alias file or comment it out.
Incorrect number of fields
John_Doe : @db_hosts
John_Doe : @db_hosts : johndoe
@acme_db alias is present in the
alias file and that it has members.
Common copy/update errors
This is a non-exhaustive list of potential update problems
WARN: : could not lookup host host1, skipping
The client system’s name does not resolve correctly (DNS or locally on the SSH master). Make sure you add all possible domains to the
/etc/resolv.conf for searching since SSH Controls may also use short host names:
WARN: failed to transfer ./manage_ssh.sh to host1:/etc/ssh_controls/holding
The SFTP copy of the file to client failed. This can be due to:
- ownership/permission errors on the files/parent directory on the target (see FAQ: DAC considerations
- filesystem/network problems
- SSH related errors
Permission denied (publickey,gssapi-keyex,gssapi-with-mic,password)
Your SSH login is not working on the client host. This can be due to:
- Missing public key on the client host
- Missing private key on the source host, or missing private key in the SSH agent.
If the problem is caused by a missing public key on the remote host then you can try to restore the remote SSH Controls key store if you can access the system using a password logon and if SSH Controls configuration data is still present there:
If your key file is present then, you should be able to logon again using your SSH key pair.
WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!
This warning indicates that the client host key has been changed/updated since the last time you performed a logon to the system. Host keys are cached in the
known_hosts file on the source host (where you are connecting from). To troubleshoot the problem, first connect manually to the problematic host to get the full warning message:
Then remove the offending fingerprint from your local
known_hosts file (deleting the corresponding line completely). Alternatively, you can use SSH host key discovery feature to refresh your
sudo: sorry, a password is required to run sudo
This error indicates that SSH Controls may not execute its operations with super-user privileges. Most likely the default SUDO rules for SSH Controls are missing in the SUDO configuration (see: Configuring a client host)
sudo: sorry, you must have a tty to run sudo
This error is most likely caused due to:
- missing SUDO rules for the SSH Controls on the client host. If SSH Controls cannot execute an apply or update as user root, then sudo will try to prompt for a password. Since the apply/update job is running in the background, no terminal (tty) can be opened for it.
Check the SUDO rules on the client host, fix and try again.
- Having requiretty set in your sudoers file(s):
Or by removing the former line.
ERROR: authentication refused: bad ownership or modes for directory
This probably indicates that the
/ directory has the wrong ownership or permissions. Fix with:
If this does not fix the problem then run the affected sshd in debug mode and check the log files for more information.
manage_ssh.sh hangs on background jobs when syncing or updating clients
The script divides its operations into batches of clients (
$MAX_BACKGROUND_JOBS) and will wait for all of its current background jobs to finish before starting a new batch of clients. You may see a hanging job if no output is generated for a longer while:
A background job could be hanging on password prompt for example. In such case you should kill the client copy/update job on the SSH master:
Identify the hanging job based on the timestamp (should be older):
And kill the job:
Fix the problem and re-try your operation. | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178376006.87/warc/CC-MAIN-20210307013626-20210307043626-00086.warc.gz | CC-MAIN-2021-10 | 3,806 | 50 |
https://dnsprivacy.org/wiki/plugins/viewsource/viewpagesrc.action?pageId=17629391 | code | This site is mainly focussed on following the development and deployment of DNS-over-TLS (DOT) and DNS-over-HTTPS (DOH) as the leading solutions for DNS Privacy because DOT is the only protocol currently standardized by the IETF and DOH is expected to be a standard shortly (as of May 2018).
Some history and background on other alternatives are outlined below and we intend to follow other solutions as they evolve.
RFC7858 specified DNS-over-TLS as a Standards Track protocol in May 2016. There is active work in this area.
There are now multiple implementations (including Stubby a local DNS Privacy stub resolver) and a number of experimental servers deployed.
RFC8094 specified DNS-over-DTLS as an Experimental Standard in Feb 2017. To our knowledge that are no implementations of DNS-over-DTLS planned or in progress.
One issue with DNS-over-DTLS is that it must still truncate DNS responses if the response size it too large (just as UDP does) and so it cannot be a standalone solution for privacy without a fallback mechanism (such as DNS-over-TLS) also being available.
The IETF created a new DoH working group in Sept 2017 to look at how DNS messages could be sent over an existing HTTP/2 connection. As of Sept 2018 the draft https://datatracker.ietf.org/doc/draft-ietf-doh-dns-over-https/ is in in the RFC editor queue and there are several experimental implementations and deployments. Note that with DoH it is possible to intermingle DNS and HTTP traffic on the same connection and make blocking of encrypted DNS harder. It should be noted that this draft addresses almost purely protocol issues and a follow up document on discovery and operational usage is expected.
DNSCrypt is a method of authenticating communications between a DNS client and a DNS resolver that has been around since 2011.
Also check out an in depth comparison from Tenta.
There are implementations available (e.g. from BII) of proxies that will tunnel DNS-over-HTTPS.
Google offers a proprietary DNS-over-HTTPS service using a JSON format for DNS queries.
A new working group was formed in Sept 2017 by the IETF: DNS-over-HTTPS (DOH)
A draft was submitted in April 2017 to the IETF QUIC Working group on DNS-over-QUIC
DNSCurve was developed in 2010 with encrypting the resolver to authoritative communications in mind. It was not standardized by the IETF. | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989030.87/warc/CC-MAIN-20210510033850-20210510063850-00263.warc.gz | CC-MAIN-2021-21 | 2,343 | 14 |
https://blog.tomw.net.au/2011/12/finding-meaning-in-electronic-documents.html | code | Greetings from the Sixteenth Australasian Document Computing Symposium (ADCS 2011) at the Australian National University in Canberra. This is being held in conjunction with the 2011 Australasian Language Technology Workshop (ALTA). ADCS is about how to construct, store, manage, use and find electronic documents. But it is also about how to extract meaning from e-documents. That may sound very academic, but this is worth billions of dollars for social media companies (the event is sponsored by Google and NICTA). ADCS is free and there are some spare seats, so if you happen to be in Canberra, and have an interest in the field, come along.
ps: A question I have is why are academic papers eight pages long? Is this due to the mechanics of paper based printing and so no longer relevant, or is eight pages a good size for people to read?
8:40 Registration 9:00 Welcome 9:10 Session 1: ADCS/ALTA Joint Session (Chair: David Martinez)
- Li Wang, Diana Mccarthy and Timothy Baldwin. Predicting Thread Linking Structure by Lexical Chaining
- Diego Molla and Maria Elena Santiago-Martinez. Development of a Corpus for Evidence Based Medicine Summarisation
- Mike Symonds, Peter Bruza, Laurianne Sitbon and Ian Turner. Tensor Query Expansion: A cognitively motivated relevance model
- Yan Shen, Yuefeng Li, Yue Xu, Renato Lannella, Abdulmohsen Algarni and Xiaohui Tao. An Ontology-based Mining Approach for User Search Intent Discovery
10:40 Morning Tea 11:10 Session 2 (Chair: Sally Jo Cunningham)
- David Alexander, Andrew Trotman and Alistair Knott. Click Log Based Evaluation of Link Discovery
- Xiang-Fei Jia, Andrew Trotman and Jason Holdsworth. Fast Search Engine Vocabulary Lookup
- (*) Amir Hadad, Alexander Krumpholz, Nina Studeny, Tom Gedeon and David Hawking. Automatic identification of the most important elements in an XML collection
12:00 Industry Keynote: Simon Kravis, Fujitsu Australia (Chair: Paul Thomas)
- Information Retrieval in Large Organisations.
Information retrieval within large organisations is usually from repositories with little or no hyperlinking of documents. Tools which are successful for public-facing web sites are frequently unsuccessful inside organisations through poor ranking of search results, high levels of duplication and near-duplication and the frequent occurrence of documents which are not completely described by the text which they contain. Metadata-based retrieval is limited by poor coverage from manually assigned metadata and the limited availability of automated metadata assignment.
12:45 Lunch 14:00 Session 3 (Chair: Falk Scholer)
- Shane Culpepper, Michiko Yasukawa and Falk Scholer. Language Independent Ranked Retrieval with NeWT
- David Bainbridge and Sally Jo Cunningham. A Workflow for Document Level Interoperability
- Iman Amini, Alexandra Uidtenbogerd and Mark Sanderson. The Interplay of Information Retrieval and Query by Singing With Words
- (*) Timothy Jones, Paul Thomas, David Hawking and Ramesh Sankaranarayana. The usefulness of web spam
- (*) Su Nam Kim, Timothy Baldwin and Lawrence Cavedon. Harvesting Domain-Specific Terms using Wikipedia
15:20 Afternoon Tea 15:50 Session 4 (Chair: Andrew Turpin)
- Nicholas Sherlock and Andrew Trotman. Efficient sorting of search results by string attributes
- Laurence Park. Examining document model residuals to provide feedback during Information Retrieval evaluation
- Guido Zuccon, Anthony Nguyen, Teerapong Leelanupab and Leif Azzopardi. Indexing without Spam
- (*) Darren Wei-Che Huang, Shlomo Geva, Andrew Trotman and Kelly Y. Itakura. Mobile Applications of Focused Link Discovery
- (*) Kelly Itakura and Shlomo Geva. Six Degrees of Cohesion in Patent Citation Network
17:20 ADCS Business Meeting | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100674.56/warc/CC-MAIN-20231207121942-20231207151942-00264.warc.gz | CC-MAIN-2023-50 | 3,724 | 27 |
https://community.flexerasoftware.com/showthread.php?205841-Assigning-work-is-sending-completed-emails&s=8cc762840529c876f05170f378c05a70 | code | We are using Workflow Manager 6.5. We set up email to go out when the phase is completed. Instead it's sending the completed email when the phase is assigned to someone to work on it.
We also had an issue last week with phases completing when someone was assigned to work on the request.
Anybody have this issue - any ideas how to fix it? | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123549.87/warc/CC-MAIN-20170423031203-00588-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 338 | 3 |
https://club.myce.com/t/copying-protected-cds/68277 | code | Hello… I am trying to copy a protected CD through Nero 6. I am getting an error message saying the CD is copyrighted. How can i break that? Keeping in mind this is a data cd (GPS for a car navigation system). HELP PLEASE
Hi walidhajj and welcome to the forum ,
Nero Burning Rom cannot cope with the various possible copy-protection schematics that there are around. The only copyright protection it can really cope with is the “Illegal TOC” method. (Tick ignore illegal TOC)
I suggest you scan your original cdrom with a tool like ClonyXXXL or Scout to check the copyprotection schematic and use another writing tool suchs as BlindWrite , Alcohol or CloneCD to write your backup with.
Keep us updated ,
Thanks for welcoming me to the form. Excuse my ignorance, but where do i download clonyxxxl, scout or BlindWrite from. I tried searching the web, but wasnt too succesful. Thanks a million.
Thanks man. I tried Clony XXL but it said there is no protection or unknown protection… Any other ideas… i couldnt find Scout in yoru link.
Thanks a lot. I did download all of the utilities. They all said that there is no coding or teh coding is unknown. I then copied the CD with the different copying program you suggested. The copying goes well and seems to be running right. However, when i put the copied cd in the GPS system it just spits it out… ANY IDEA HERE?
Hello what is the name of the cd you are tring to backup…
The cd i am trying to backup is the GPS (Global Positioning System) data for my car’s (BMW) navigation system. | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400244353.70/warc/CC-MAIN-20200926165308-20200926195308-00531.warc.gz | CC-MAIN-2020-40 | 1,544 | 10 |
http://sourceware.org/ml/binutils/2006-05/msg00386.html | code | This is the mail archive of the
mailing list for the binutils project.
Re: [PATCH] Better checking of ISA/ASE/ABI options for MIPS gas
No. No more reading the minds of programmers. :)
Well, for GP registers we do even as_bad().
And why change the table to include default extensions for the cpu?
To handle them the same way as the ISA. This is for ASEs which are
always implemented in that particular CPU.
You'll need to look through the code and make sure we aren't
the value not being zero somewhere then. To be honest I'd just prefer
field for "default ASEs".
/* End of GCC-shared inference code. */
You need to make sure that this shared code is the same logic in both
places - preferably before committing this.
Yes. Do you think the logic is ok (modulo the FP ABI warning)?
I do. :)
+#if 0 /* XXX FIXME */
+ /* 32 bit code with 64 bit FP registers. */
+ if (!file_mips_fp32 && ABI_NEEDS_32BIT_REGS (mips_abi))
+ elf_elfheader (stdoutput)->e_flags |= ???;
Same like for MIPS3D, we should tell the linker this object is
incompatible to other O32 objects with 32bit FP regs.
More comments then :) | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313436.2/warc/CC-MAIN-20190817164742-20190817190742-00099.warc.gz | CC-MAIN-2019-35 | 1,099 | 23 |
https://writetheworld.com/groups/1/shared/44553/version/85613 | code | I am fifteen years old and have been writing since I was eight years old. I love writing anything, except for essays, but that's to be expected from someone of my age, in my opinion at least.
Write from the things and places you know best because they're always where the best ideas bloom from.
Written By: neo7v
October 12, 2017 | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187820466.2/warc/CC-MAIN-20171016214209-20171016234209-00571.warc.gz | CC-MAIN-2017-43 | 329 | 4 |
https://jake.ginnivan.net/pack-uri-in-unit-tests/ | code | I had a unit tests which constructed a pack uri, and I didn’t want to abstract it (needless abstraction) so here is how I solved a few issues.
System.UriFormatException : Invalid URI: Invalid port specified
This one is pretty easy to fix, you can use the
PackUriHelper which registers a few things in it’s static ctor
System.NotSupportedException : The URI prefix is not recognized
This one is fixed by giving WPF the default resource assembly.
System.Windows.Application.ResourceAssembly = typeof(App).Assembly;
Now you should be able to unit tests around pack uri’s | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300289.37/warc/CC-MAIN-20220117031001-20220117061001-00717.warc.gz | CC-MAIN-2022-05 | 573 | 8 |
https://www.ruby-forum.com/t/ri-documentation-for-rubygems/94038 | code | On Apr 18, 2006, at 13:55, Phil H. wrote:
Wes G. [email protected] writes:
Which directory is the correct one to do it in?
On my system (Ubuntu) it’s /usr/lib/ruby/gems/1.8/gems/
I don’t know that it would be consistent across platforms.
Doesn’t that depend on the question? If Wes wants documentation for
Gems that he has installed, on my system, they’re in (installation
However, RubyGems couldn’t install itself as a Gem, so it’s in
On Mac OSX, (installation root) has defaulted to /usr/local, although I
installed Ruby 1.8.4 in /Library/Ruby instead.
To make ri documentation for RubyGems itself, you’d go to the latter
directory, then run rdoc. You’ll have to figure out if you want to use
-r or -R. I got tired of playing guessing games with ri, so I generate
all my RDoc files as HTML now. | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703509973.34/warc/CC-MAIN-20210117051021-20210117081021-00532.warc.gz | CC-MAIN-2021-04 | 812 | 14 |
https://rubensystems.com/Blog/NwBLAZXChTjjuC6JFKJb | code | How we use machine learning to enhance our user's experience
ML has been used on Headlines Today for a long time to provide a better, more personalised reading experience. We previously asked users what topics they preferred during the onboarding process. We now allow users to subscribe to topics. As a result, the results for topic queries must be far more accurate. Personalisation allows for mistakes, but if a technology article appears in the sports category, this erodes user trust in the system. Our classification models are now far more accurate, providing a reliable experience to our users.
We also have started to extract keywords and named entities from articles. We hope to add an experience in which users can subscribe to dynamic and static topics. The news is constantly changing. A user may wish to see more news about Donald Trump or Brexit. In 50 years, however, these topics may no longer exist. We are creating a system which will allow a user to subscribe to a dynamic topic like Donald Trump. Once there is no longer any news on this particular topic, the system will automatically unsubscribe the user from the topic. If the topic picks up again, the system will resubscribe to the topic. This will soon be added to a live build of Headlines Today
We are also using ML for utility purposes. For example, to prevent users from downloading too many articles (which contain photos and text), we developed a model which predicts how many articles a user will read, based on the frequency of news update. This, of course, assumes that a major event results in a higher frequency of news update.
We are looking to provide our users with an even more intelligent experience. Read more on Blog/tag/ml to see how we are doing that. | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738366.27/warc/CC-MAIN-20200808224308-20200809014308-00239.warc.gz | CC-MAIN-2020-34 | 1,748 | 5 |
https://supportforums.cisco.com/t5/wan-routing-and-switching/vlan-configuration-on-router/td-p/2588774 | code | can any1 help me regarding configuring VLAN on router.
currently i am working on 2951 router of Cisco and i need to know how to configure a vlan on router and also change the native vlan.
As by default vlan 1 is native vlan on router.
You will be configuring sub interfaces on the router or router-on-a-stick. There is plenty of information for this configuration with simple google search. This looks like:
encapsulation dot1q 10
ip address 10.10.10.10 255.255.255.0
encapsulation dot1q 20 native
ip address 220.127.116.11 255.255.255.0
Well Michael O'Nan,
Thanks for showing your concern.
Well i know abt this already but i guess you ppl didnt get my question actually i was asking about configuring VLAN on the router.
Switch#sh vlan brief
(vlan)#vlan 55 name Sales
(vlan)#vlan 80 name HR
%Check if apply completed or not%
(config-if)#switchport access vlan 55
(config-if)#switchport access vlan 80
Assigning Range of Members
(config)#interface range int fa0/10 - 15 , fa0/17, fa0/24
(config-range)#switchport access vlan 600
Switch#sh vlan brief
Before Deleting the VLANS make sure to remove Membership First
Deleting all VLANS
Surender Singh thanks alot.
Well you know i guess you didnt get my question actually i was asking about configuring VLAN on the router.
Like when check interfaces on the router its shows vlan1 as well
so i wanted to ask about how to configure vlan on 2951 router.
and how to assign interface to the vlan configured,
Perhaps you need to explain more clearly what your environment is and what you are trying to achieve. You seem to be focused on how to configure a vlan on a 2951 router. And the technically correct answer is that you can not configure a vlan on the 2951 router.
If the router has a switch module installed you can configure vlans on the switch module (but that is on the switch module and not on the router itself). If you do not have the switch module then you can configure a router interface to connect to a trunk port on a switch (which is what previous posts were explaining).
So if you explain more clearly what is your environment and what you need to accomplish then perhaps we can provide better responses.
Well Richard Burts thanks
Currently i have a vlan 99 configured on a switchA which is connect to my routerA and my routerA is connected to an other routerB my routerB is connected to switchB now i want to configure Vlan 99 on my routers to reach switchB.
OK you have clarified that router A is connected to switch A and router B is connected to switch B. Can you clarify for us how the routers are connected to each other?
Also can you clarify whether the routers have switch modules installed on the router? Perhaps the output of show version and of show inventory might help with this.
my two routers are interconnected via an other switch
Yes i do have switch module internally embedded to the router.
2 ports on router 2/0 and 2/1 are connected to switch module and 2 switch ports 0/25 and 0/26 are connected to router.
Only one port on router 2/1 is switchport you can configure it either trunk or access.
But the other port on router 2/0 cannt be configured neither trunk nor access.
It is helpful to know that you have switch modules on both of the routers. You should be able to configure vlan 99 on the switch modules of both routers and to configure appropriate ports of the switch module to be in vlan 99. If there is another switch that connects Router A to Router B then you also probably need to configure its ports to be in vlan 99 also.
R1(config)#interface vlan 10
*Mar 1 00:03:23.371: %LINK-5-CHANGED: Interface Vlan10, changed state to administratively down
*Mar 1 00:03:26.223: %LINK-3-UPDOWN: Interface Vlan10, changed state to up
R1(config-if)#ip add 192.168.2.1 255.255.255.0 | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804518.38/warc/CC-MAIN-20171118021803-20171118041803-00313.warc.gz | CC-MAIN-2017-47 | 3,762 | 45 |
http://focus.gscept.com/2013ip13/2013/02/01/tons-of-research/ | code | After a initial week or writing documents, and doing some research, my research was a bit lacking, and what I had so far was a bit lacking. The nature of the project also means it is in need of a longer period of research than just one week. The week have been spent reading papers about image comparison, Fourier transformation and uses of it, and looking at Google image search. Also I will most probably be using OpenCV to not have to ease my workload a little bit and focus more on the algorithm.
Showing off a pretty Fourier transform. For now I just leave this in the air, I will most probably be using Fourier transformation, and I will talk more about them when more details are fleshed out.
Making an algorithm that can take any image and compare it to any other without any restriction probably is too difficult to accomplish during this 2 month project, so I will need to put down some restrictions. Focus will be on comparison of shapes in pictures IE a grey scale picture(or conversion to that). And then a simple colour comparison will be run by using a histogram of the colours. Comparison will also be restricted to pictures of same size, but hopefully it will be able to detect rotations. This is the initial plan, next week will focus on how to do the shape comparing.
Kudos to Dr Johannes Hirche for input and feedback on project, and for suggestions for changes. | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313803.9/warc/CC-MAIN-20190818104019-20190818130019-00286.warc.gz | CC-MAIN-2019-35 | 1,382 | 4 |
https://bulldogjob.com/companies/jobs/24942-technical-infrastructure-support-engineer-with-python-warsaw-stratslab | code | We are looking for people to develop one of the most innovative platforms supporting risk management and the valuation of financial instruments. The role we are currently recruiting for is Technical Infrastructure Support Engineer.
The product we are working on is a cross-asset financial and risk management platform-as-a-service that has been awarded the "FinTech Startup of the Year" title by the industry portal Risk.net due to its bleeding-edge technological solutions. Examples of tasks we work on include large-scale data processing, parallel distribution of trillion-dollar portfolio calculations, and creating tools for analysts and quant developers. We use Scrum and Kanban methodologies.
About the role
As a Technical Infrastructure Support Engineer, you will work with DevOps, financial and application developers to provide front-line support to our clients. In this role, you will work directly with the teams to triage and analyze technical issues logged into our ticketing system.
You will debug scripts, examining graph-based financial object hierarchies as well as other automated processes and infrastructure configuration. You will also work with new technologies, software, and code, finding patterns to recurring problems and implementing improvements. The Infrastructure Support Engineers are vital to the product’s success as they provide up-front, timely, and efficient solutions to ensure an excellent client experience.
What’s in it for me?
✔ Work in a strong team.
✔ Great independence in the selection and implementation of tasks.
✔ Working on a product used internally (dogfooding).
✔ High salary.
✔ Bonus twice a year.
✔ Expanding knowledge about finance.
✔ Business trips for volunteers.
✔ Flexible working hours.
✔ Ability to implement your own ideas.
✔ Modern office in Powiśle close to the metro station.
✔ Fruit and snacks in the office.
✔ Hipster coffee machine.
✔ Relaxed atmosphere and freedom of design choice.
✔ Work on unique projects.
- Collect and triage and troubleshoot production incident tickets and follow documented standard operating procedures.
- Actively develop internal tooling and integrations.
- Own production support issues and collaborate with cross-functional internal engineering teams to resolve issues within designated SLAs.
- Maintain and create product documentation and knowledgebase.
- Provide regular updates to internal and external stakeholders on outstanding issues.
- Interact directly as needed with clients and stakeholders.
- Monitor environment logs for errors and troubleshoots accordingly.
- Coordinate and apply changes to the client cloud infrastructure.
Who we're looking for?
- Linux servers (Ubuntu/RedHat Enterprise Linux).
- Troubleshooting skills on infrastructure-related components in a cloud setting.
- Hands-on experience with cloud infrastructures such as AWS, Azure or GCP.
- Knowledge of DevOps tools such as Docker, CI/CD pipelines, and configuration management.
- Relevant Information Technology qualification such as Microsoft certifications or AWS certifications would be a plus.
- Experience with Python (3.6+) - required.
- Exposure to coding/scripting or automating manual tasks.
- Familiarity with test-driven code development and SCM tools such as Git.
- Knowledge of monitoring tools such as Grafana and Prometheus.
- Experience with Atlassian products (Confluence, JIRA, ServiceDesk).
- Experience using ELK, Grafana.
- Experience with SecDB/Athena/Quartz - optional.
- Desire to learn other programming languages.
- Experience with and interest in financial markets.
- Attention to detail and experience in troubleshooting issues.
- Excellent written and verbal communication skills.
- At least B2 qualification in English.
- Leisure package
- Financial bonus
- Hot beverages
- Cold beverages | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178366959.54/warc/CC-MAIN-20210303104028-20210303134028-00039.warc.gz | CC-MAIN-2021-10 | 3,832 | 50 |
http://www.goodgearguide.com.au/slideshow/530681/pictures-8-cool-heat-maps-help-visualise-big-data/?image=3 | code | Outage Analyzer: Worldwide Web Outage Tracker
Compuware's Outage Analyzer provides a heat map tool to see Web services outages across the world. If you click on a red marker, you can see the start and end time, duration and areas of the world affected by the outage.
Compuware uses Hadoop and Flume Big Data to monitor outages, collecting 8 billion data points from about 1,500 Web services each day. Companies can use the data to see the effects of Web service outages and track how often they occur. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118950.30/warc/CC-MAIN-20170423031158-00307-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 501 | 3 |
https://stackoverflow.com/questions/6324900/how-can-i-read-and-write-a-file-in-malbolge/6325184 | code | I'm trying to write a social networking site in Malbolge with CGI. I need to store data in a database. How can I read and write files in Malbolge?
Is this the same Malbolge which is deliberately so difficult to write programs in that it took two years for the first program to be discovered (by a brute force search of the program space)? And which it then took cryptanalysis to find out how to write programs on purpose?
If so, the answer is that you can't --- it has no I/O capability other than stdin and stdout. Although I suppose you could connect it via a pty to a command line of some description. | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540542644.69/warc/CC-MAIN-20191212074623-20191212102623-00186.warc.gz | CC-MAIN-2019-51 | 604 | 3 |
https://www.monster.co.th/search/banking-jobs | code | Minimum 2 years’ experience in Java & web application development<br> Bachelor's Degree in Computer Science, Computer Engineering, IT or related fields. <br>
Back-end Developer requirement<br> Experienced in using GoLang<br> Understand noSQL concept and experience in using Mongo Database<br> Knowledge and experienced in using Linux (Ubuntu and Redhat)<br>
get the newest job for this search
Get notified when new jobs are posted
Works closely with business analysts and team members to understand business requirements that drive the analysis and design of quality technical solutions. Involved in the full systems life cycle and is responsible for designing, coding and testing.
Development and design of Android applications, SDK to support other applications, and integration with back-end services. working on different layers of the infrastructure. Commitment to collaborative problem solving, sophisticated design. | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657147031.78/warc/CC-MAIN-20200713225620-20200714015620-00296.warc.gz | CC-MAIN-2020-29 | 924 | 6 |
http://stackoverflow.com/questions/5222648/how-do-i-parse-a-string-into-an-arraylist-in-java | code | I have a large string that contains fixed value fields, this group of fields can repeat from 0 to 40 times. I would like to parse this list into an arraylist but I am not sure of the best way to do this?
The string data is as follows,
CountryCode = 2 character StateProv = 7 characters PostalCode = 10 characters BuildingNum = 5 characters
There is no delimiter the pattern just repeats | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696400149/warc/CC-MAIN-20130516092640-00049-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 386 | 4 |
https://www.ultimate-guitar.com/forum/showthread.php?t=535133 | code | Has anybody seen the movie Fresh? I watched the whole thing up until like the last minute and apparently the most dramatic scene of the movie is in the last scene. If anybody could tell me what happens at the end that be amazing. Also, what are your thoughts on the movie?
I liked it. | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948567785.59/warc/CC-MAIN-20171215075536-20171215095536-00006.warc.gz | CC-MAIN-2017-51 | 284 | 2 |
http://www.debianadmin.com/how-to-install-git-on-debian-7.html | code | Git is a free and open source distributed version control system designed to handle everything from small to very large projects with speed and efficiency.
What is version control, and why should you care? Version control is a system that records changes to a file or set of files over time so that you can recall specific versions later. Even though the examples in this book show software source code as the files under version control, in reality any type of file on a computer can be placed under version control.
If you are a graphic or web designer and want to keep every version of an image or layout (which you certainly would), it is very wise to use a Version Control System (VCS). A VCS allows you to: revert files back to a previous state, revert the entire project back to a previous state, review changes made over time, see who last modified something that might be causing a problem, who introduced an issue and when, and more. Using a VCS also means that if you screw things up or lose files, you can generally recover easily. In addition, you get all this for very little overhead.
Install git on debian 7
Open the terminal and run the following command
sudo apt-get install git-core
How to Setup Git
After Git is installed you need to copy your username and email in the gitconfig file. Using the nano command “sudo nano ~/.gitconfig” will open a completely blank page, as you have just done a fresh install. Insert the necessary information with the following
git config –global user.name “NewUser”
git config –global user.email [email protected]
You can see all of your settings with this command:
git config –list
You can check the git documentation about how to use git. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473524.88/warc/CC-MAIN-20240221170215-20240221200215-00808.warc.gz | CC-MAIN-2024-10 | 1,707 | 13 |
https://aiso.fi/en/customers/ | code | Aiso brought high level software development experience to Aibidia’s Value Chain Analytics software development. VCA is used to make transfer pricing easier for global organizations. Development work was done independently by Aiso, based on Aibidia’s specifications.
Aiso’s team developed an AI-based solution to digitize PDF and paper invoices for Gylling Accounting’s business needs. In the solution, an independent web-solution and a digitizing engine were developed.
We offered software developer for large industrial company for further development of critical web-applications in production use. During the project, improvements were made to multitude of systems and weaknesses within were removed. | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704828358.86/warc/CC-MAIN-20210127152334-20210127182334-00526.warc.gz | CC-MAIN-2021-04 | 712 | 3 |
https://www.websitesinaflash.com/website/ratcliff-barce-and-associates/ | code | Ratcliff Barce and Associates
Joleen Barce and Karen Ratcliff started RBA Montana to bring their passion and love for MT real estate and real estate investing to their city, and to make it easy for anyone to find the right property.
The ladies at Ratcliff, Barce and Associates wanted a website that was professional and easy to use. They wanted to be able to update their own properties any time of day and night. Database in a Flash was their answer. This website allows RBA to update their properties anywhere in the world whenever they want. It also features a header image that changes for every page that you go to. | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704824728.92/warc/CC-MAIN-20210127121330-20210127151330-00087.warc.gz | CC-MAIN-2021-04 | 621 | 3 |
https://www.tube8.com/user/8356182/TheCraterman.html | code | You have Adblock enabled. Adblock has been known to cause issues with site functionality. If you experience any difficulties, please try disabling Adblock. Close
- 8 years ago
- Last Login:
View all Video Comments (10)
posted 8 years agodamn think Im in love with this girlRead More
posted 8 years agoDamn Those Girls Are FineRead More
posted 8 years agodamn shes fuckin amazing dick sucking rider lolRead More
posted 8 years agoshe sucks dick real well lolRead More
Cum make friends by following our newest members.
No favorite videos
Share your most fap-worthy videos. Upload today! | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887981.42/warc/CC-MAIN-20180119125144-20180119145144-00490.warc.gz | CC-MAIN-2018-05 | 584 | 11 |
https://www.construct.net/en/forum/construct-3/general-discussion-7/admob-not-working-published-162591 | code | I've created a signed .apk with implemented Interstitial ads...
When I install the .apk file as it is generated with C3, ads are showing perfectly fine, but after I publish the same signed .apk on GooglePlay and I install that .apk from GooglePlay, ads fail to load.
Did anyone have the same problem or can anyone give me a clue where the problem might be? Thank you very much.
You should also check your AdMobs page. Have a look to see if the requests are going through.
Best way to test is:
- In Construct, turn the adds onto test/debug mode
- Export a signed apk and upload it into your phone via usb cable
- Check the ads
--- If it loads and plays a Google test ad, then you have done the code correct, so check your AdMobs account
--- If not nothing loads, then you your code is messed up, so check it again | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500255.78/warc/CC-MAIN-20230205130241-20230205160241-00535.warc.gz | CC-MAIN-2023-06 | 812 | 10 |
http://sitezazemjata.weebly.com/blog/eclipse-for-mac-os-download | code | If you want to test eclipse on your mac, be sure to download the latest release candidate (3.0 RC2 the last time I checked). Since RC1 or RC2 the buttons on MacOSX are smaller than in previous mac versions (proably a change in SWT), which makes it much more usable, especially on “small” screens, such as 1024×768. Also, the new advanced syntax highlighting is really nice (Preferences -> Java Editor -> Advanced Highlighting or so). I guess Apple will now push Eclipse as the Java IDE for MacOSX instead of implementing (useful) Java-integration for XCode, which would’t be a bad desicion, as Eclipse is a really nice tool and actually makes developing with Java “not so bad”.
For Installing Eclipse on Mac OS X Go to to download a copy of eclipse • The first item listed is 'Eclipse IDE for Java Developers (98 MB).' On the right is a green, downward-pointing arrow. Next to that are links labeled 'Mac OS X 32 Bit' and 'Mac OS X 64 Bit.' Click on the 'Mac OS X 32 Bit' link. (Even if you have nice, new 64-bit Mac, it should run the 32-bit version just fine.) • You will see a window like this:(The location next to the green, downward-pointing arrow might not be Virginia Tech, but that's OK.
Update site URL: (Multiplatform); Eclipse. Tested and verified for MS Windows XP/7/8/10, Linux and Mac OS X.
And the 'Get It Faster Here' locations might be different, but that doesn't matter, either.) Click on the green, downward pointing arrow. A download of eclipse-java-helios-SR2-macosx-cocoa.tar.gz will start. If you first get a window like thisjust click 'OK' so that the downloaded file opens with Archive Utility. • The download will go to your Downloads folder. You will normally have an icon for the Downloads folder on the right-hand side of the dock. Find eclipse-java-helios-SR2-macosx-cocoa.tar.gz in your Downloads folder, and drag it to the Desktop.
Then double-click it. You will see a folder named 'eclipse.' • Drag the 'eclipse' folder into your Applications folder. The easiest way to do so is to open a new window in the Finder and click on Applications in the list you get on the left-hand side. Then drag the 'eclipse' folder in with the other applications.
Make sure that you do not drag it into a folder that's already within Applications. In other words, when you're done, the Applications folder should have directly within it a folder named 'eclipse.'
• (This step is not required, but it's strongly recommended.) Double click the 'eclipse' folder. You'll see an application named 'Eclipse'; it has a purple icon with white horizontal stripes. Drag it into your dock. Now you will be able to launch Eclipse by clicking on the icon in the dock. • You may now drag eclipse-java-helios-SR2-macosx-cocoa.tar.gz to the Trash. Empty the Trash whenever you wish. | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027318421.65/warc/CC-MAIN-20190823130046-20190823152046-00265.warc.gz | CC-MAIN-2019-35 | 2,805 | 7 |
http://superuser.com/questions/136946/how-to-deactivate-windows-7 | code | I want to install my windows 7 on another laptop, do i have to deactivate it ? if yes, how to ?
As Om Nom Nom said, if the windows came pre-installed on your machine it is most likely an OEM copy. Which basically means it will only authenticate to your current machine. If you bought your copy of windows 7 you can just install to another computer and authenticate. You might have to use the phone route tho. According to the EULA
Microsoft asks that you format the old hard drive. But basically once the old laptop goes to check for updates and a | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257827077.13/warc/CC-MAIN-20160723071027-00126-ip-10-185-27-174.ec2.internal.warc.gz | CC-MAIN-2016-30 | 547 | 3 |
http://www.thefirearmsforum.com/showpost.php?p=1003217&postcount=14 | code | Re: Disposal of "misfired" rounds
You can deprime live primers. Take it slow. That has come up before. I think I remember 2 instances where they had them go off. Nothing major, if I remember correctly.
Gainfully employed= shooting somebody elses bullets and getting paid for it | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011250185/warc/CC-MAIN-20140305092050-00005-ip-10-183-142-35.ec2.internal.warc.gz | CC-MAIN-2014-10 | 277 | 3 |
http://www.aztecmoonbooks.com/2014092103.html | code | Mark Barnes - Thrive: Surviving in a Corporate Jungle
A light-hearted look at life in the Corporate Jungle. No science, no tips, no jargon - it's called a Jungle for a reason...
You've decided you want to go work at Acme Inc, so you need to get yourself prepared for life in the corporate jungle. This book will introduce you to some of the animals you will meet in the jungle and describe in colourful details what life is really like as you explore the new reality you are faced with.
Or perhaps you are stuck in a corporate jungle and just want a different way to think about your daily life. Once you picture Peter, your boss, as a snake, you might naturally change how you behave around him, because we have instinctive reactions to animals but mistakenly assume we can apply logic when dealing with humans.
More Good Reads | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886107490.42/warc/CC-MAIN-20170821041654-20170821061654-00041.warc.gz | CC-MAIN-2017-34 | 828 | 5 |
https://www.awschicago.com/2020-03-16-covid19-response.html | code | Update: COVID-19 Response
post date: March 16, 2020
March and April Events will be Postponed
To keep up with the latest closures from novel conronavirus, or COVID-19, we will postpone all AWS Chicago user group events.
With school closures and remote work requirements most members are already coping with more important demands of their time. We want to give our presenters, organizers, and members time to focus on higher priorities in life right now. We also would like the events to be community-focused and not a webinar of presentations. We will continue to learn how to do this best.
In the meantime, we have some suggestions for online, self-paced learning from AWS and learning partners. See the post AWS Guides and Tips with tons of links to resources from just before re:Invent 2019. Also check out the massive list of re:Invent workshops from Eric Hammond as well as the AWS Workshops on AWS' GitHub Samples page and the AWS Virtual Workshop on Well-Architected Framework. Happy (test) building! | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103917192.48/warc/CC-MAIN-20220701004112-20220701034112-00305.warc.gz | CC-MAIN-2022-27 | 1,007 | 6 |
https://forum.duolingo.com/comment/39842286/Hello-I-am-Pyry | code | For those who do not know, "y" in Finnish represents the "ü" letter that you find in German.
Thay explains a lot lol
That's very much like Y in Old English too, easy to remember.
What is MOI?
It's a greeting just like "terve", "hei", "moikka" etc., although it's slightly more on the informal end of things. To me "hei" is the most neutral one. I do use "moi" the most though.
Why I cannot say "Mä oon Pyry"?
It's spoken language (and very informal). So, in everyday life you can definitely say that. However, it's not "grammatically" correct Finnish and thus likely not accepted as a translation in these exercises.
Why us there no "Minä"
You don't have to have the pronoun there since "olen" tells the listener that the person is talking about themselves.
Where would I be able to memorize pronunciation? Is there a good website for that sort of thing? | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358774.44/warc/CC-MAIN-20211129134323-20211129164323-00151.warc.gz | CC-MAIN-2021-49 | 857 | 10 |
https://sourceforge.net/directory/games/developmentstatus%3Amature/license%3Aosi/?page=7 | code | On the AblazeSpace-Homepage (www.ablazespace.de) I publish all my OpenGL freeware & open-source games I wrote in VisualC++.
Adventure Definition Langage (ADL) - a language used to create text adventures similar to Zork and other Infocom games.
Area 2048 is an abstract Japanese-style omni-directional shooter. Fight through multiple areas to reach the final boss. Comes with multiple difficulty levels and a soundtrack.
Asteroids-3D is one of the many 3D remakes of the classic Atari's "Asteroids" from 1979. Viewing your spaceship in 3rd person perspective, you have to destroy all asteroids that appear in front of your guns.
Play mancala against your computer and record your games
With Aualé you can play the popular oware mancala board game against your computer, analyze, record and share your games. Its simple, yet powerful, interface makes it suitable for both the novice and expert players.
A home-base for Lego Hobbyists.
A home base for Lego hobbyists. BrickBase allows you to launch Lego-related applications easily. BrickBase has built-in Interfaces for mklist, L3P and LSculpt.
ChessTask is a frontend for easily creating chess tasks with LaTeX. The tasks are stored in a list which can be exported, either to a LaTeX input file, or to HTML files.
Cylindrix is a fast paced 3d space shooting game much like star wars tie fighter. Battle the opposing team in a revolving cylinder in many different landscapes.
Keep track of all your monsters during your encounters in a simple way
Allows you to quickly manage the HP of multiple monsters as well as keep quick notes about the monsters!
Source port of Quake developed in Delphi
DelphiQuake is the source code translation of the game Quake to the Delphi programming language.
Epa Dance (skating system for dance sport competitions)
Escrutinio Profesional Avanzado. Sistema de gestión integral de competiciones de baile deportivo empleando skating system como sistema de cómputo Advanced Professional scrutiny. Integrated Management System for dance sports competitions using the skating system
A clone of the good old "Pong" game.
Emeritus Pong is a clone of the good old "Pong" game. It tries to be relatively close to the original, therefore no fancy graphic or astonishing sound effects there. Emeritus Pong is written to be able to run on any modern PC. There are three versions available: DOS, Windows and Linux. Emeritus Pong features also a cool demo mode, which makes it playing against itself, displaying the current time as scores. The game is programmed to run flawlessly on any modern PC, but it will run on older architectures, too. A 90 MHz Pentium CPU and 2 Mb of RAM should be enough to run comfortably the DOS version. Emeritus Pong may run in any usual resolution, ranging from 320x240 to 1280x1024, fullscreen or windowed. If you would like to use any other video mode (not available from the game's setup), you will have to manually edit the empong.cfg configuration file. Windows and Linux versions require a sound card for sound, and DOS version simply uses the internal PC Speaker.
A Java application that handles tracking of characters in Exalted Second Edition combat.
F2IBuilder, is a generator of bitmap fonts, opensource and multiplatform, developed in Java language, according to the GPL. F2IBuilder, é um gerador de fontes bitmap, opensource e multiplataforma, desenvolvido em linguagem java, de acordo com a lice
Get Sudoku is the free portable interactive sudoku solver
Original demo of L.A.P.D. from 1998
Free download of Future Cop: L.A.P.D. (demo), playable on modern systems. This version contains 1 Crime War mission, can be played co-operative, and 1 Precinct Assault map for head-to-head over split screen. You will need Windows XP or newer to play.
A multilingual hangman game for DOS
Here is a very simple game widely known as "Hangman". The computer chooses a random word from a file, and the player has to guess it. There is a possibility to add own words and/or create own vocabulary files. Many vocabulary files are shipped with the game. The program supports the following languages: english, french, german, dutch, polish and hungarian. It requires at least a 80286 processor and an EGA graphic card. Works on DOS, and any DOS-compatible operating system.
A role-playing game where the user chooses a predetermined possibility from a list of given options - resulting in divergent outcomes for acting upon a set of initial conditions. The user, with their attributes (for age, gender, socioeconomic class etc.), will embark on an adventure that progresses according to the choices of the user. If the character the user is controlling is dead or cannot progress for some other logical reason, the user game ends and statistics are shown. Otherwise, the statistics are shown once the user optionally ends the game. Coded in C#, Visual Studios 2012. Created 2014, published 2017.
Incubation is a clone of "Incubation, Battle isle phase four" for mobile phones that support Flash Lite.
Observer Design Pattern Example - JMinesweeper. This is a Java Swing desktop application. Download for free and enjoy playing it.
Inspired by KTpro, KTX is a highly popular open source modification for QuakeWorld servers featuring many ehancements for matchs and play modes.
This game is for android phone only. Not tablet or pad!
Click on the Files tab and download the LoneMoon.apk In this game you will need to sway your android phone from side to side to move the top ship to intercept the incoming rock for the first time then use the bottom ship to intercept it the second time to destroy it. Do not intercept the rock with the second ship before it gets intercepted by the top ship or else it will be game over. If it is game over then you can play the game again with a few points get deducted from your previously earn points. Press the back button of your phone to end the game and your score will be saved for the next round. This game is not mean for people that like to get to the next level but instead for those guy who does not has anything to do during fast break and would like to do something with your phone!
A Sci - Fi Game
Mirxx is a Sci Fi - Strategy game placed in the Mirxx Empire.This Empire placed among the stars is suffering domestic wars in the struggle for the throne.It is the first episode in the Mirxx Saga. This game was programmed by Peter Voise.
The Multi-Simulator Interface (MSI) is a simulation interconnection engine. It connects simulations by synchronizing their clocks and data. It is a light-weight HLA alternative.
Simulates a biologically diverse tropical island, and the ape inhabitants cognitive processes. For MacOS X, iPad, Windows and Linux. Features a non-polygonal graphics engine and a command-line version | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945222.55/warc/CC-MAIN-20180421125711-20180421145711-00287.warc.gz | CC-MAIN-2018-17 | 6,757 | 35 |
https://www.waterfox.net/blog/waterfox-2021.07-release/ | code | 📝 What’s new in Waterfox Classic 2021.07
- Support for optionally enabling
- Allow redirects for requests that require preflight.
- Implement missing calculation support for stroke-dashoffset.
- Improvements for Web Animations API.
- Avoid various crashes.
- Added user agent overrides for websites that didn’t recognise Waterfox Classic.
- Issues with
- Improved tables support.
- Preserve newlines in textarea placeholders.
- Update ResizeObserver to match the current spec.
- Add missing IDL definitions for CSP .nonce attributes.
- Changed behavior for
- Security patches from latest ESR.
- Portable builds for Classic will no longer be provided. Download the latest here and upgrade using the internal updater to carry on having an up-to-date portable version.
- DRM modules have been updated but no longer seem to work on macOS. If you’d like to watch DRM protected content such as on Netflix, Prime Video, etc. you will need to upgrade to Waterfox G3.
Contributors for this release
† As the differences between Classic and later Firefox versions grow, we are doing our best to patch the security advisories as we think apply to Classic. Not all patches apply cleanly or apply at all - but our better judgement is used. You can view unapplied security patches here.
🏆 Support Waterfox
If you’d really like to help Waterfox out, please consider using the default search (Bing) with adblock disabled on it, it would be such a huge show of support! The default search is fairly privacy friendly. | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323584554.98/warc/CC-MAIN-20211016074500-20211016104500-00150.warc.gz | CC-MAIN-2021-43 | 1,514 | 20 |
http://www.sffworld.com/forum/threads/show-dont-tell-blah-blah-blah.13704/ | code | Tell me what it means to you. It's the editor's favorite catch phrase. Show, don't tell. Unfortunately each editor seems to have a very different understanding of what literary devices best accomplish that task. Everyone seems to intuit the meaning but that doesn't mean they can explain it. And it's a terribly overused phrase. Still, it's repeated over and over. How do you interpret it and how do you prefer the results to read? | s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982292330.57/warc/CC-MAIN-20160823195812-00224-ip-10-153-172-175.ec2.internal.warc.gz | CC-MAIN-2016-36 | 431 | 1 |
https://news.remodelersadvantage.com/2015/06/17/awards-2015-spring-quattro-roundtables-mvp-spotlight-tim-cross-merrick-construction/ | code | Voted MVP of the 2015 Spring Quattro Roundtables™ Peer Group
Tim Cross is a six year member of the RA Roundtables Peer Groups and a repeat MVP. He has had his own business since he was 19.
When asked about being named his group MVP he said “I would say that I listen and ask a lot of questions with regards to what each of the other members are trying to accomplish at the meeting. If you keep asking questions, sometimes they are able to figure it out on their own, by hearing their own answers. I also try and think outside the box when giving advice, look at the issues from every angle… all I can say is I feel great when I’ve helped one of my group members, it’s extremely rewarding!”
RA Roundtables™ members vote for their Most Valuable Professional at each meeting. These are individuals who demonstrate the following qualities since the last meeting:
- Most initiative
- Best Company Focus packet
- Most/Best ideas
And the Greatest overall contribution during the current meeting.
If you are interested in joining an RA Roundtables™ peer group please contact: | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655897707.23/warc/CC-MAIN-20200708211828-20200709001828-00465.warc.gz | CC-MAIN-2020-29 | 1,083 | 9 |
http://www.tutorialspoint.com/perl/perl_exp.htm | code | Perl exp Function
This function returns e (the natural logarithm base) to the power of EXPR. If EXPR is omitted, gives exp($_).
Following is the simple syntax for this function:
exp EXPR exp
This function does not return any value.
Following is the example code showing its basic usage:
When above code is executed, it produced following result: | s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430453921765.84/warc/CC-MAIN-20150501041841-00023-ip-10-235-10-82.ec2.internal.warc.gz | CC-MAIN-2015-18 | 345 | 7 |
https://rakkine.fi/ | code | I'm a software developer who thinks that perfection is attained not when there is nothing more to add, but when there is nothing more to take away.
My first programming job was at 24Rent, a mobility-as-a-service company, from Mar 2015 to Aug 2017 as a backend developer. I learnt the fundamentals of working as a programmer and a team member and how to grow as a person. I was responsible for developing and maintaining a backend with high expectations for reliability. When I left the company, several components of my own initiative had entered the core of the business.
I used to work at Weave, a software consultant company, from Sep 2017 to Mar 2018 as a junior software developer. When I started, I aimed to become better at both the technical and the social side of software development. Unfortunately, I had to leave early because the company was disbanded due to bad winds blowing in the corporate world. During my time at Weave, I learnt various foundational skills as a consultant and discovered more about myself as I could reflect on my time as a one-man development team at my previous job.
I've been working at Kodan from Apr 2018 onwards as a software developer. During my time here, I have become a confident consultant who enjoys working both as part of large engineering teams of huge systems and as a sole developer of narrowly scoped stints. I have also delved deeped into numerous technical subjects that I can now call myself to be an expert in. Furthermore, I have started to see the role that software plays in the future and what part I wish to play in that change.
Outside of work, I enjoy programming other kinds of things. Right now, I circle around graphics, game design and realtime problems. I also find it interesting to study the foundations of modern technologies to try to learn why we have arrived where we are. One topic I often think about is how we could best appreciate the fundamentals of programming instead of building yet another abstraction. Essentially, I spend a lot of time questioning why things are the way they are. You can find software I have written on my GitHub page.
When I'm not programming, I spend time with my daughter, my wife, and our three Italian greyhounds. We hike in the Finnish nature, cook all sorts of food, lie on the floor and laugh, plan our future and focus on the small things in life. I'm also interested in linguistics and learning languages -- Estonian in particular. I wish that one day I knew how to play an instrument and how to knit.
Naming other things that make me happy: ambient music, decluttering, disassembling things, modernist architecture, modesty, photography, printers that just work, sandbox games, Scottish fudge, specialty coffee, Vim, weightlifting, and working with my hands. ∎ | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710685.0/warc/CC-MAIN-20221129031912-20221129061912-00543.warc.gz | CC-MAIN-2022-49 | 2,778 | 7 |
http://cybergreet.net/paraphrasing-tool-free-online-text-rewriting-tool-word-ai-sound.html | code | Finest spinner in the market today and more for me because saves a lot of my time... Earlier i have used the best spinner but this spinner is 10 times better faster, easy to use, and articles make more sense, unique, also helps in preparing new articles and spins same article into hundred of more articles for back-linking, etc. 2 thumbs-up... simple and easy to use...
Anyone can do this, all you need is a computer and the ability to string a sentence together. You can write original articles and submit them to article directories and get paid. You have to apply to these sites and may or may not get turned down. If you should happen to get turned down then just keep plugging away until you find someone to "hire" you.
Rewriting your article by hand is the classic approach that is slowly dissolving, however, many people still prefer so. Write manually and then rephrasing to ensure the finest quality is the safest way but it can often hours, days or weeks to finish a writing task that can otherwise take only a little time. And that’s why there also exist people who like to save the trouble and their time, so they look for an article rewriter or article spinner to do the job.
Nobody is immune to spelling and grammatical errors, not even me. It doesn't matter how many times you proofread your content, sometimes an error slips through the cracks. But, too many errors in your writing are bad for article writing services business and can also hurt your reputation over time. If customers are annoyed by poor grammar on social media or on a small blog post, just think about how they will feel if they receive an email or eBook laced with these errors.
There is also the option to spin capitalized words (assumed to be proper nouns) as well as leave any number of words unchanged, depending on whatever you enter into the "ignore" field, separated by commas. You also have the option to only keep the sentences that were altered a minimum percentage, as indicated by the "Keep Sentences that Changed" option.
"One thing important in my business as seo provider is to generate unique content for my clients. I used to hire many writers to produce many articles manually costing me lots of time and money. Good thing that I learned about this great piece of software, now I can have many unique articles as I want with just a few clicks.The Spinnerchief team rocks! Highly recommended product"
Coming up with content can be tough for those who are new to niche blogging. So it’s not surprising that some people turn to article spinning software, in hope for a better solution. I’ve always been an advocate for creating original things, but in this WordAi review, I got curious and decided to do an experiment to see how a spun content would look like. Are there any benefits to use this type of services at all?
If you are a writer, then you know that sometimes you are likely to get stuck trying to find that “perfect word or phrase”. To ensure that you can fully benefit from this paraphrasing tool online, we’ve added more than 500,000 synonyms and we keep adding new ones. This gives us the opportunity to provide you quality articles with words and phrases that best fit in the context.
"It is my pleasure to give testimonial about this spinner tool. I think this is great and highly recommended tool to build a many unique articles for our internet marketing world. At the first time, I already see about another great spinner tools, but it is not free. And fortunately for me, I found spinnerchief. The free tools which have almost the same quality with another cost spinner tools. I already use spinnerchief to build many articles to attract traffics for my below minisite"
So you are still doing it? I have stopped using spin content after panda update way couple of years ago. As content become king and the user expereince the key to earn website authority, I started focusing on writing more meaningful and engaging content. I never cam across any spinner that time which makes total sense after spinning. The spin content either looked very bad or it needed manual review. I forgot the name of the spinner tool as well. Looking forward for replied from more experts here as it could be an eye opener for me if spinning still works.
It has helped me to get high quality content fast without having to outsource the spins. I used to spend hundreds a month just on getting article spins for all my client sites and SEO campaigns. It's very effective on getting amazing spun variations of highly relevant and high quality content quickly. You can also go back and use them again in the future since it archives them. I love that. (TIP) Spin 10 completely different titles with your articles for ultimate diversity!
This software serves a purpose and fills a gap in the market. Many people will buy this software as they believe its a fast way of creating content. Others will buy the software so that it interacts with another piece of software like Article Marketing Robot for instance. No doubt this software will make many thousands in profits. Personally, I won’t be getting involved and here’s why…
SpinnerChief works in a similar way by polling its huge Cloud Thesaurus for the statistically best synonym. As the Cloud Thesaurus grows, so it gets better and better at synonym replacement. The cloud thesaurus supports more than 20 languages, including German, French, Spanish, Italian, Swedish and Portuguese (both Brazil and Portugal), Dutch, Indonesian, Greek, etc... | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823738.9/warc/CC-MAIN-20181212044022-20181212065522-00467.warc.gz | CC-MAIN-2018-51 | 5,514 | 13 |
https://www.linuxlinks.com/best-free-open-source-shutdown-timers/ | code | There’s a real burning passion inside us for small productivity tools. Lean tools that focus on a single productivity enhancing activity can make an enormous difference to the way time is spent. Bloated, complex productivity tools tend to only slow you down, and complex solutions require too much maintenance.
The desktop environment with its bundle of programs sharing a common graphical user interface (GUI) remains a firm favorite with users. Not surprising really given that a good desktop environment makes computing fun and simple.
Here’s our verdict of the tools succinctly summarized in a LinuxLinks styled ratings chart.
Let’s explore the 4 shutdown timers at hand. For each title we have compiled its own portal page, a full description with an in-depth analysis of its features, a screenshot of the software in action, together with links to relevant resources.
|Features time and delay options, command-line support, and notifications
|Command-line and graphical tool
|Simple GTK2 tool
|Offers DBus Interface method
|Read our complete collection of recommended free and open source software. Our curated compilation covers all categories of software.
The software collection forms part of our series of informative articles for Linux enthusiasts. There are hundreds of in-depth reviews, open source alternatives to proprietary software from large corporations like Google, Microsoft, Apple, Adobe, IBM, Cisco, Oracle, and Autodesk.
There are also fun things to try, hardware, free programming books and tutorials, and much more. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476442.30/warc/CC-MAIN-20240304101406-20240304131406-00349.warc.gz | CC-MAIN-2024-10 | 1,547 | 11 |
https://itconcept.xyz/r-software/ | code | In data mining lots of software’s are used for predict a values for future. The R software is most popular software used in data Mining industry. That software are runs on Windows operating system,Linux and Mac operating system also. The R software are used in different industries including government, finance, insurance, medicine, scientific research and many more. It is advanced technique for calculating a data mining task. It is a free software environment for statistical computing and graphics in solving different problems from industry. R software can be easily extended 6600 + packages in industry.
R software can used in-
- Machine Learning
- Statistical Learning
- Time Series Analysis
- Cluster Analysis
Features of R software-
- R software has many statistical functions and visualize.
- The immediate result for user in the format of JPEG, PNG and PDF etc. The R software can gives multi functionality to user.
- R software is running without compiling any code from different languages.
- The R software is more than statistical functionality.
- That software is cross platform.
- The R software are used for visualize the desired result in chart format with many visualize format, It also display 3D effects output to user.
- R is a free open source software. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100593.71/warc/CC-MAIN-20231206095331-20231206125331-00270.warc.gz | CC-MAIN-2023-50 | 1,280 | 14 |
http://betaboston.com/tag/microsoft/ | code | I've watched this video a few times, and it still blows my mind: Using high-speed video of nearby items, such as a plant or stray chip wrapper, MIT, Microsoft, and Adobe researchers found a way to analyze vibrations and algorithmically recreate roughly what sounds were in the room, down to actual words being spoken or a tune being played — without any recorded audio cues.
I met a promising young app developer at Microsoft in Cambridge the other day, which wouldn't be unusual except for one key fact: He's 8 years old.
Mohamed Tariq Jaffar Ali (he goes by Tariq) is the author of a Windows Phone app called Kids Zone that aggregates online videos from popular cartoons, like "Tom and Jerry" and "SpongeBob SquarePants." It culls YouTube for relevant clips and sorts them into channels.
"That's the data source," Tariq told me.
Typical third-grade stuff, right?
Get BetaBoston by Email
Make BetaBoston yours
Add tags to My Beta to follow the news stories, trends, and companies you care about. | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657138086.23/warc/CC-MAIN-20140914011218-00062-ip-10-234-18-248.ec2.internal.warc.gz | CC-MAIN-2014-41 | 998 | 8 |
https://www.scientific.net/AMM.44-47.3937 | code | An Improved Particle Swarm Optimization Algorithm Applied to the Unified Evaluation of Circularity Error
Minimum zone circle (MZC), minimum circumscribed circle (MCC), maximum inscribed circle (MIC) and least square circle (LSC) are four common methods used to evaluate circularity errors. A novel particle swarm optimization algorithm based on self-adapted comprehensive learning (ACL-PSO) is proposed to evaluate circularity errors with real coded strategy. In the algorithm, population learning mechanism and velocity mutation strategy are adopted. In the meantime, ACL-PSO is applied to the unified evaluation of circularity error. The experiment results evaluated by different methods indicate that the proposed algorithm not only converges to the global optimum rapidly, but also has good stability, and it is easy to generalize.
Z. Y. Wu et al., "An Improved Particle Swarm Optimization Algorithm Applied to the Unified Evaluation of Circularity Error", Applied Mechanics and Materials, Vols. 44-47, pp. 3937-3941, 2011 | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825057.91/warc/CC-MAIN-20171022022540-20171022042540-00213.warc.gz | CC-MAIN-2017-43 | 1,026 | 3 |
http://www.osnn.net/threads/ghost-problem.14842/ | code | I periodically make Ghost backups of all my hard drives. Here's a problem maybe someone knows the answer to. When I do the backup of my XP Pro NTFS drive, Ghost reads the size wrong. When it is 100% done it needs to continue to run for another 40%. It registers this overage and the time remaining goes into negative numbers. When it is done, it is fine. Note that my W2000 Pro drive does not do this. Norton does not know the answer, of course. This is Norton 2002 Ghost, which is compatible with XP. Any know how to correct or even the reason for this strangeness? | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084888041.33/warc/CC-MAIN-20180119144931-20180119164931-00419.warc.gz | CC-MAIN-2018-05 | 566 | 1 |
https://dapresy.freshdesk.com/support/solutions/articles/7000043117-how-to-set-up-a-scatter-bubble-chart- | code | Scatter (2 dimensions) and Bubble charts (3 dimensions) are available in StoryTeller which makes it possible to show even more data in single charts. The dynamic setup procedure makes it possible to cross variables of any type (mean, numeric and categorical.)
Here are some examples of these types of charts. In first example a top 2 box of brand familiarity (multiple questions) crossed with Awareness (single question and multiple answer alternatives) in a Scatter chart. The data point explanations are shown in the legend and circles used as symbols.
In the following chart it's the same example but the legend is shown in the chart. Square symbols are used for all brands except one.
In third example you'll see a bubble chart. The explanation text is shown in the legend and circles used as marks.
And the last example shows the same bubble chart, but squares are used as marks in the chart.
As shown in the example images above, variables of different types can be crossed with each other, for instance mean value variables can be crossed with categorical variables.
How to set up a scatter chart?
A scatter chart requires 2 data series in the chart, one for X and one for Y axis. The “Main series” in the chart acts as X axis and the “Sub series 1” acts as Y axis. So prior to adjusting settings you need to create two data series, the main which you probably already have and sub series, as shown in the image below.
How to set up a bubble chart?
A Bubble chart requires a third series as well for the Z value. When selecting Scatter or Bubble in the chart setup a new Tab will be shown in the setup interface named “Custom chart settings”, see the image below. In this chart the mapping between variables is done as each variable in the X- axis must be mapped to a variable on the Y axis (and Z in the Bubble chart). The image shows the Custom chart settings Tab and the settings are described further down.
The following steps are performed in the Custom chart setting Tab;
1. Map variables
2. Define labels
3. Define Symbols
4. Define Colors
The image below highlights the mapping area.
The labels shown in the Scatter/Bubble are picked from the X axis variables as a default. The labels can be picked from Y and Z axis as well by clicking the “Use as labels” button (highlighted in image below). The labels can be freely defined as well, just enter the desired text in the “Labels in chart” column. The image below highlights the label setup.
As shown in the example charts below, the explanation text of each data point can be shown in the legend or within the chart area. Though, no smart labelling exists, so if the texts are placed within the chart area it might be hard to read the text if the data points are too close to each other. The image below highlights the mark/symbol setup.
Colors can either be defined manually (per data point) or automatically be picked from the variables used in the X or Y (or Z) axis. To set the colors use the selection list shown in the image below.
Note: Scatter and Bubble Charts do not support the following features:
- Warn for low base
- Hide result with low base
- Show Top/Bottom X series (Top lists etc)
- Time intervals-only Full period can be used, Day, week, Month, Quarter and Year cannot be selected
- Significance testing
- In Hierarchical Filter projects unit comparison cannot be done. Only one unit at the time can be shown in the Bubble/Scatter. | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038077336.28/warc/CC-MAIN-20210414064832-20210414094832-00461.warc.gz | CC-MAIN-2021-17 | 3,436 | 26 |
https://www.vardhamaninfotech.com/blog/page/2/ | code | Mobile applications are now part and parcel of daily life and people used to ask questions on mobile application development and they expect answers from the experts in the tech industry. The questions are like “is mobile application development important” or “why is it important?” There are lot many questions people ask on the internet or in a Google/ Yahoo/Bing/Yandex searches. Also, they use Voice searches to ask these questions on mobile app development. In this blog, we will point out these frequently asked questions and try to answer these to the utmost satisfaction of the readers.
Vardhaman Infotech is a world-class tech company in India that develops world-class mobile apps in Android and iOS platforms using various languages, platforms, and frameworks. It trains students and its staff from time to time, too. For the purpose, the company has both textual and visuals in teaching materials for their in-house tutorials. Hence, the trainers in the company have the abilities to answer the questions asked about mobile application development. | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038062492.5/warc/CC-MAIN-20210411115126-20210411145126-00587.warc.gz | CC-MAIN-2021-17 | 1,068 | 2 |
https://www.beyondtherange.org/post/the-pre-incan-history-of-peru | code | The Pre-Incan History of Peru
When you hear "Peru" and "history" together, do you automatically think "Incas"? Does the image of Machu Picchu instantly pop into your mind? If so, you're definitely not alone. Most people who are basically familiar with Peru would probably make this association. Prior to year and a half ago, I certainly would have.
But after a bit of research, I've come to realize that Peru was home to many other great civilizations besides just the Incas. In fact, the Incas only occupied a few hundred years of Peru's past, and they only ruled as an "empire" for a century or so. Almost 5000 years before the Incas, the western hemisphere's oldest "great civilization" arose in Peru, along with the oldest city!
In my latest "vlog," I overview several major civilizations that existed long before the "Land of the Incas" (all dates are approximate, of course). Since this is a broad topic, I've only highlighted a few of their influences upon later cultures in Peru. Discussed in the vlog are:
Norte Chico (3500 B.C. to 1500 B.C.)
Chavín (1500 B.C. to 200 B.C.
Nazca (200 B.C. to 600 A.D.)
Moche (100 A.D. to 700 A.D.)
Tiwanaku (300 B.C. to 1000 A.D.)
Wari (500 A.D. to 1000 A.D.)
Followed by the "Time of War" (political instability, conflict, and environmental change)
Many other Peruvian civilizations have been studied by archaeologists, while some undoubtedly await discovery. Who knows which one Patrick Eaton might stumble across in his next adventure!
Originally posted 9/27/2017 here. ©Beyond the Range All rights reserved. Feel free to republish so long as credit is given. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00225.warc.gz | CC-MAIN-2023-40 | 1,606 | 13 |
https://itecnotes.com/server/predictive-vs-least-connection-load-balancing-techniques/ | code | I have a windows based desktop application that communicates via TCP to the application servers. (windows 2003). No sticky sessions between client calls. We have exactly 2 servers to load balance and we are thinking to use a F5 hardware NLB.
The application is a heavy load types, doing not much bussiness logic in the services but retrieving quite a big amount of data at most of the times. May be on an average 5000 to 10000 records at all times. Used mainly for storing and retirieving data and no special processing of data or calculations running on the server side.
I am favouring 'predictive' considering my services take a while at times to return data and hence tracking the feedback would yield some better routing as in predictive.
I am not sure if the given data is sufficient enough to suggest some ideas but considering these, what would be some suggestions\things to consider\best between Predictive and Least Connections ? | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337836.93/warc/CC-MAIN-20221006124156-20221006154156-00194.warc.gz | CC-MAIN-2022-40 | 938 | 4 |
https://community.amd.com/thread/192825 | code | As it has become very clear that you have no intent or sense of urgency to fix the myriad of issues caused by the Crimson driver with games like Fallout 4, The Witcher 3 and Battlefront, I am uninstalling Crimson and reverting back to the Catalyst driver set that I had before. Clearly you're not interested in communicating with us at all. I'm really starting to regret buying another AMD Radeon Card. I kind of wish I'd gone with an NVidia card at this point.
So let me know when you've got your stuff together.. I'll plan on it taking at least another 5-6 months. Thanks. | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256571.66/warc/CC-MAIN-20190521202736-20190521224736-00525.warc.gz | CC-MAIN-2019-22 | 574 | 2 |
https://www.jorgebernhardt.com/tags/set-dnsclientserveraddress/ | code | How to set primary and secondary DNS server addresses with PowerShell
·221 words·2 mins· 100 views · 5 likes
In this post, I want to show how to configure your computer’s primary and secondary DNS servers using PowerShell. In this case, we will use the Set-DnsClientServerAddress cmdlet. The workaround in a local computer: The Get-NetAdapter cmdlet obtains the basic properties of the network adapter. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817144.49/warc/CC-MAIN-20240417044411-20240417074411-00807.warc.gz | CC-MAIN-2024-18 | 408 | 3 |
https://support.bioconductor.org/p/89259/ | code | Hello, I am having a lot of difficulty setting up my design matrix. I have been searching extensively online for an answer but I think I lack some of the background to understand how to do this since my experiment is fairly complicated. I think I have a basic grasp of setting up model matrices in simple experiments but contrast coding is still a complete mystery to me.
This is a RIP-Seq experiment where I pulled down a protein a of interest with an antibody and then extracted the attached RNA which was then sequenced. This was performed in either wild-type (WT) tissue or protein knock-out (KO) where the KO is assumed to represent some kind of noise or background for the experiment. WT or KO tissue is from animals injected with various drugs.
My basic design is as follows:
I have tried setting up my model matrix a few different ways using
model.matrix() but I don't always see all the coefficients I am interested in. The kind of interaction I am interested in would be either Control_WT:Control_KO:Drug2_WT:Drug2_KO or Drug1_WT:Drug1_KO:Drug2_WT:Drug2_KO. In both of these cases, what I am really interested in is the WT conditions fold-change (i.e. Control over Drug2) but I want the KO noise to be modeled in as well. This 4-way interaction seems completely wrong and way too complicated. How is such modeling normally done? Limma refuses to use such columns if I try ("coefficients not estimable").
This brings me to a second question. Say I just had one coefficient ("Drug1_WT" for example). What exactly is limma giving back to me after
topTable()$AveExpr? This condition isn't being compared to anything is it? Or would it be compared to any other coefficients that come before it if I used an additive model to set up the regression equation?
The limma reference seems to suggest that the "AveExpr" column is the fold change compared to all other columns in the regression equation. If that is the case, then [limma documentation does not say this, see Gordon Smyth's answer below] should my coefficients really be Control_WT:Control_KO and then Drug2_WT:Drug2_KO? Then when I perform the fit and use
topTable() to find the Control_WT:Control_KO coefficient, the AveExpr column would reflect the fold change relative to Drug2_WT:Drug2_KO?
Sorry if this is really confusing. Any guidance on how to best set up my model matrix (and/or contrast matrix if it's even needed) would be greatly appreciated. | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986658566.9/warc/CC-MAIN-20191015104838-20191015132338-00532.warc.gz | CC-MAIN-2019-43 | 2,418 | 10 |
https://gitlab.freedesktop.org/pulseaudio/pulseaudio/-/issues/877 | code | How to change audio source in linux (KDE Plasma)?
how do i change the audio source from rear port to front audio in linux? and also how do i adjust the left and right balance for speakers?
im using Arch Linux with KDE Plasma
i have already posted this thread on Destination Linux Forum - https://discourse.destinationlinux.network/t/how-to-change-audio-source-in-linux-kde-plasma/1829 Level1techs Forum - https://forum.level1techs.com/t/gnome-resource-usage-high/145579
no help so far | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738555.33/warc/CC-MAIN-20200809132747-20200809162747-00241.warc.gz | CC-MAIN-2020-34 | 484 | 5 |
http://www.alibaba.com/countrysearch/CN/ningbo-dayang-enclosure.html | code | - Related Searches:
- round plastic enclosure, thermostat enclosure, aluminium enclosure for power supply , street light led enclosure, shower enclosures, digital panel meter enclosure More...
Minimum Order: OK
Hot ningbo dayang enclosure Directory: Recommended ningbo dayang enclosure
Do you want to show ningbo dayang e... or other products of your own company? Display your Products FREE now! | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678663943/warc/CC-MAIN-20140313024423-00073-ip-10-183-142-35.ec2.internal.warc.gz | CC-MAIN-2014-10 | 395 | 5 |
https://listserv.acm.org/SCRIPTS/WA-ACMLPX.CGI?A2=TEAM-ADA;b1aaae5c.0004&FT=M&P=3913339&H=N&S= | code | > From: [log in to unmask] [mailto:[log in to unmask]]
> The point was that the LRM said that one of the steps of an assignment is
> to check the right-hand value against the constraints of the left-hand
True, *but*... (just like Pee Wee Herman said, "'but', 'but', everybody's
got a big 'but'... let's talk about your big 'but'" :-)... the effect of [RM
13.9.1(9)] is that every statement in the RM that mentions evaluating the
value of an object has an implicit "assuming the object's representation is
valid" tacked onto it.
> The vendor traced the value back to the fact that it entered this program
> by unchecked conversion from an interface. And then said, "Not our
The vendor may have done this "tracing" exercise themselves to excuse
themselves under the language rules , but it's something altogether
different to say that the *compiler* was supposed to be doing kind of proof
exercise in order to "optimize away" a check, where that proof exercise
involves the information flow from the result of an unchecked conversion
(I'm gathering that you were positing something like this, from something
you said in the previous post, along with the compilation-order scenario you
I would think that such a proof would be in the other direction: so that a
"frendly" compiler would *avoid* optimizing away a check in the case of an
uninitialized variable. What I suppose rather happened is that the vendor
was fully entitled to optimize away a check in the first place, for reasons
having nothing to do with Unchecked_Conversion. So in order to satisfy the
customer that they weren't generating bogus code, they showed that the
out-of-range thing was in fact the result of an unchecked conversion.
> Somebody should have applied a legality check on
Problematic in Ada83 since there was no 'Valid...
> (The theory was, the other side is Ada, so it's
> impossible for it
> to be out of range. Obviously, it was possible cause it happened.)
:-) :-) :-) :-)
> My contention is that it should be illegal for the compiler to do such an
To clarify: are you objecting to the language rules, or to the vendor's
interpretation of them?
> To simplify the situation, let's reduce it to two
> X and Y.
> Put all the same source code in two libraries. In one library, compile
> spec X, spec Y, body Y, body X, then link. In the other, compile spex X,
> body X, spec Y, body Y, then link. Is it legal for the two programs
> (absent tasking) to have different behavior with the same inputs?
Well, that certainly *is* legal ("conforming", actually :-) if the program
But maybe I'm missing your point, because I don't understand the connection
between this compilation order scenario and the question of what checks are
and are not required. It seems like 13.9.1(9) is the last word on what the
implementation is and isn't allowed to assume about the result of an | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100427.59/warc/CC-MAIN-20231202140407-20231202170407-00172.warc.gz | CC-MAIN-2023-50 | 2,846 | 44 |
https://www.pmwiki.org/wiki/PITS/01172 | code | 01172: Add "title" attribute to internal links.
This is a split from PITS:00657 (Add title attributes to external links). Some of the comments suggested title attributes to internal links, intermap links, links to attachments and inline images.
Currently (version 2.2.14) PmWiki can show tooltip titles with the following format:
* [[http://pmwiki.org"PmWiki home" | external link ]], the title is "PmWiki home" * [[Wikipedia:Wiki"Article on Wikipedia"| InterMap link ]], the title is "Article on Wikipedia" * [[Attach:000962.png"Uploaded file" | Attach: link]], the title is "Uploaded file". * Inline image Attach:000962.png"Logo", the alt/title is "Logo".
The only link title format, from the discussed in PITS:00657, and currently not yet implemented, is for titles in internal links. This entry is a discussion about how to best implement this feature.
Note: Links without a link text have their "tooltip title" printed in the page:
* [[http://pmwiki.org"PmWiki home"]]
While this could be fixed in the core, there is a PmWiki convention that in
[[...]] links without specified text, everything is printed.
Note: Free external links don't work the same way:
* http://pmwiki.org"PmWiki home"
Comments welcome, especially on how should an external link title be specified. --Petko February 22, 2010, at 09:00 PM
I support a consistent syntax, and a change to the convention, ie
[[http://pmwiki.org"PmWiki home"]] displaying as
http://pmwiki.org with a tool tip works for me
(but I would be happy to have to supply the brackets to declare the link - ie
http://pmwiki.org"PmWiki home" displaying as
I don't understand why there is no support for tool tips on internal links. As far as I can see, the text between double quotes is already being captured, thus you can set this working out of the box:
$LinkPageSelfFmt = "<a class='selflink' href='\$LinkUrl' title='\$LinkAlt'>\$LinkText</a>"; $LinkPageExistsFmt = "<a class='wikilink' href='\$LinkUrl' title='\$LinkAlt'>\$LinkText</a>";
Btw, simon suggestion about requiring brackets for tool tips sounds ok to me. It would be something special in
[[...]] links, like the parenthesis are. -- simkin October 28, 2011, at 07:48 PM
All links can now have tooltip titles. Previously, only images and external links could have tooltip titles, now this feature is enabled for internal links. To set a tooltip title, add it in quotes after the link address:
[[Main.HomePage"This is a tooltip title"]] [[Main.HomePage"This is a tooltip title"|Home]] [[http://www.pmwiki.org"Home of PmWiki"]] Attach:image.jpg"Tooltip title of the image"
Introduced in version 2.2.35 (2011-11-11) | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657735.85/warc/CC-MAIN-20230610164417-20230610194417-00078.warc.gz | CC-MAIN-2023-23 | 2,619 | 24 |
https://listserv.gmu.edu/cgi-bin/wa?A2=ind0502&L=ECJ-INTEREST-L&D=0&P=651 | code | I have recently made the transition from my own C++ toolkit to ECJ (and
Java!) and I was wondering if anyone had any code for the creation and
deltion on ADF branches at runtime?
Also, the addition / creation of nodes at runtim (I have got this
working but it is ugly!!).
No virus found in this outgoing message.
Checked by AVG Anti-Virus.
Version: 7.0.300 / Virus Database: 266.4.0 - Release Date: 22/02/2005 | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178358064.34/warc/CC-MAIN-20210227024823-20210227054823-00212.warc.gz | CC-MAIN-2021-10 | 409 | 8 |
https://www.npmjs.com/~kevinoid | code | Backported version of fs.readFileSync, fs.writeFileSync, and fs.appendFileSync which accept file descriptor arguments for synchronously reading and writing to open file descriptors.
A Node.js implementation of cat, as specified by POSIX/SUSv3. No frills, no buffering, no charset conversion, just cat.
Assert that the name of the current branch of a git repository has a particular value.
Call a Node-style callback with the resolution value or rejection cause of a Promise without the common pitfalls.
Read from a stream using Promises.
Replace stdin, stdout, and/or stderr, including console methods, with arbitrary streams for capture, redirection, testing, or other purposes.
An implementation of the status subcommand of The Travis Client in Node.js, with a few extra features.
Compare the behavior of readable streams.
Validate an OpenAPI/Swagger API specification using the swagger.io online validator.
An unofficial Swagger/OpenAPI definition of the AppVeyor REST API.
Query the AppVeyor build status.
Decompression stream which detects the compression format from the compressed data with minimal buffering. Detects Gzip, Deflate, and DeflateRaw by default.
ESLint shareable config for @kevinoid's style (based on airbnb). | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574018.53/warc/CC-MAIN-20190920113425-20190920135425-00152.warc.gz | CC-MAIN-2019-39 | 1,231 | 13 |
http://ygamururez.gq/speech/learning-software-testing-with-test-studio.php | code | Embedded Systems. Home Automation. Industrial Internet of Things. IoT Development. IoT Security. Single Board Computers. Wearable Tech. Application Security. Cloud Security. Information Security. Malware Analysis. Reverse Engineering. Web Penetration Testing. Audio Processing. Document Preparation. Image Editing. Project Management. Soft Skills. User Experience. Workflow Automation. Business Management. Enterprise Resource Planning. Operations Management. Real Time Communication. UI Development. Video Editing. Learning Software Testing with Test Studio.
There's all you need to get started with software testing using Test Studio in this handy tutorial. It covers test automation, execution, reporting, and much more. As a practical manual and guide to best practices it's unbeatable. Skip to the end of the images gallery. Skip to the beginning of the images gallery. Read Now Look inside. Features Learn to use Test Studio to design and automate tests valued with their functionality and maintainability Run manual and automated test suites and view reports on them Filled with practical examples, snapshots and Test Studio hints to automate and substitute throwaway tests with long term frameworks Page Count Course Length 11 hours 16 minutes ISBN Date Of Publication 23 Sep Table of contents.
Testing concepts Testing phases Testing techniques Test Studio uncovered through the chapters Approach Setting up your environment Other reference sources. Getting started with automation About Test Studio Functional test automation Functional random keyword-driven tests Test execution settings and debugging Integration with Visual Studio Summary. Data-driven testing architecture Binding tests to data sources Database binding Summary. Introduction Maintainability Data-driven design Summary. Add to Cart. What do I get with a Packt subscription?
Exclusive monthly discount - no contract Unlimited access to entire Packt library of over eBooks and Videos new titles added every month on new and emerging tech. What do I get with a Video? Download this Video course in MP4 format DRM FREE - read and interact with your content when you want, where you want, and how you want Immediately access your video course for viewing or download through your Packt account.
What do I get with an eBook? Add To Cart. Start a FREE day trial. Create functional automated tests using the recorder Add logic to the recorded tests Insert proper verification, and wait and log steps Customize tests in code Produce Keyword tests Generate data-driven tests by connecting tests to various data sources Export, create and run manual tests Create and execute test lists Gather performance test metrics Carry out performance and load testing while collecting necessary metrics. Learn to use Test Studio to design and automate tests valued with their functionality and maintainability Run manual and automated test suites and view reports on them Filled with practical examples, snapshots and Test Studio hints to automate and substitute throwaway tests with long term frameworks.
Testing concepts. Testing phases. Testing techniques. Test Studio uncovered through the chapters. Setting up your environment. Other reference sources. Getting started with automation. See: Telerik Test Studio pricing.
This framework is used by Test Studio internally and allows to create automated tests in code only, hence one must have coding expertise. For this tutorial we will focus only on features provided by Telerik Test Studio. Step 1. Step 2. You will be redirected to download page and download should start automatically. Once it completed, follow the installation steps described on download page: You will be asked to provide your Telerik account information in order to install Test Studio on your machine.
Now, when you have Telerik Test Studio in place, we can start with our first test. Open up Telerik Test Studio. Step 3. You should see this window: Now, we have an empty project. Step 4.
- Learning Software Testing with Test Studio on Apple Books.
- All That Matters.
- Cancer du sein (Féminin Bio) (French Edition).
- Lesson Plans The Wind-up Bird Chronicle.
- Streamline quality.
- Learning Software Testing with Test Studio [Book].
Step 5. They are basically commands that interact with the page and perform needed actions for test execution. Also, such steps can be some kind of logical conditions if…else statements, while loop , execution delays or even commands to execute another test. You can add one manually, but for now we will focus on automated test recording. Step 7. Step 8. After that, you will need to install additional Chrome extensions.
Browser page with recorder initializer will guide you with that. You can install them manually by following this Test Studio documentation before starting recording.
Quality at the center of your software development
At the bottom you can see recorder window and its options. Step 9. Now, come back to Test Studio. You can see that recorder added test steps to our test. Also, there is auto-generated elements for google. They are generated by Test Studio with Page Object pattern in mind to allow reuse of elements of the page in different tests. If we look at our scripts test steps closely, we can see that our steps do exactly that.
Step Choose the browser to record in. When it comes to script editing and additional recording, it depends on situation, which steps in particular you should modify. Switch back to Test Studio. In your test you should see this:. As we can see, new recorder session has appended test steps to the end of this test. Also, there is duplicating steps as well, i. We will take care of them later.
Switch back to browser with recorder. This means that test will succeed only if page source contains the following sequence. And it should, since this sequence is referring totag of the page. Later, we will move this assert to so called coded step, but for now we will stick to that. Back in the Test Studio take a look at our test steps. Lean Management. Team Management.
Telerik Test Studio – Web Testing Beginner’s Guide – TestMatick
Institution Development. General Law. Labour Law. Business Management. Case Studies In Management. Corporate Governance. Disaster Management.
Functional Testing with Test Studio
Hospitality Management. Human Resource Management. Interview And Career. Logistics Management.
Organizational Management. Project Management. Purchasing And Inventory. Skills Management. Supply Chain. MS ASP. MS Biztalk. Ms Office. MS Project. MS Sharepoint. MS Small Business Server. MS Windows. Ms Windows Programming. Mobile Development. App Development. Data Center. Juniper Networks. Mobile Communications.
Network Management. Storage Network. Wireless Communications. Operating Systems.
- Second Chance: Kings Duties;
- Books :: Learning Software Testing with Test Studio!
- Learning Software Testing with Test Studio PDF - video dailymotion!
- Stay ahead with the world's most comprehensive technology and business learning platform..
- See a Problem?.
Political Science. Product Development. R Programming. Assembly Language. C Programming. Computer Systems. Embedded Programming. Erlang Programming. Object-Oriented Programming. Parallel Programming. Real-Time Systems. Ruby Programming. Security Programming. PMP Certification. Environmental Science. Software Engineering.
Agile Development. Design Patterns. | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496667442.36/warc/CC-MAIN-20191113215021-20191114003021-00436.warc.gz | CC-MAIN-2019-47 | 7,416 | 33 |
https://groups.yahoo.com/neo/groups/CentralTexasGeocachers/conversations/topics/34852?xm=1&o=1&m=p&tidx=1 | code | Garmin Colorado 400t for sale
- I'm looking to sell my Garmin Colorado 400t with the extra map chip in it. Not sure what it's worth so I'll entertain offers. Email me at markdgessner at gmail dot com if interested. It's used and has some scuff marks from normal wear and tear but otherwise works fine. | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463612327.8/warc/CC-MAIN-20170529130450-20170529150450-00199.warc.gz | CC-MAIN-2017-22 | 301 | 2 |
https://norlonto.net/2022/everything-you-would-want-to-know-about-ipv4-proxies/ | code | An IPV4 proxy is a server that sits between the user and the internet. It can be used to conceal the identity of a device, which can be beneficial for those looking to hide their location. IPv4 proxies are not always trustworthy, as malicious parties may have set them up for purposes such as identity theft or fraud. As such, it is essential to take caution when using an IPv4 proxy.
Learn the perks of IPv4 Proxies
The benefits are listed below and include:
- An individual can gain a variety of advantages by using a proxy server. The most popular advantages of IPV4 proxies will be discussed in this post.
- A proxy server can also give someone utilizing public Wi-Fi networks anonymity and privacy to avoid being watched or the target of hacking efforts.
- By buffering files or traffic, reduce bandwidth (the shift increases data transmission over a particular path).
Do you know about the different types of proxies available?
Here are some of the widely used proxies available in the market today.
Anyone can use public proxies, which give their users their IP address to conceal their identity. Although inexpensive and simple, this proxy puts its customers at greater risk of compromising their data.
High-Level Proxy Privacy
Essentially an anonymous proxy, this one hides the user’s identity further. Before the proxy tries to connect to the target site, the user’s data is removed to achieve this.
Users using rotating proxies receive an IP address distinct from the one assigned to the prior connected device.
Hardware proxies accept, evaluate, send, and forward requests from the position between your network and the web. Software proxies typically reside in the cloud or are supported by a provider. Software proxies can occasionally be installed at no cost or a cost. Business needs can be met through paid proxies. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817112.71/warc/CC-MAIN-20240416222403-20240417012403-00692.warc.gz | CC-MAIN-2024-18 | 1,836 | 13 |
https://www.e-booksdirectory.com/details.php?ebook=7819 | code | Basic Data Analysis and More: A Guided Tour Using Python
by O. Melchert
Publisher: arXiv 2012
Number of pages: 62
In these lecture notes, a selection of frequently required statistical tools will be introduced and illustrated. They allow to post-process data that stem from, e.g., large-scale numerical simulations. From a point of view of data analysis, the concepts and techniques introduced here are of general interest and are, at best, employed by computational aid. Consequently, an exemplary implementation of the presented techniques using the Python programming language is provided.
Home page url
Download or read it online for free here:
by D. Pollard - Springer
Selected parts of empirical process theory, with applications to mathematical statistics. The book describes the combinatorial ideas needed to prove maximal inequalities for empirical processes indexed by classes of sets or classes of functions.
by Christophe Garban, Jeffrey E. Steif - arXiv
The goal of this set of lectures is to combine two seemingly unrelated topics: (1) The study of Boolean functions, a field particularly active in computer science; (2) Some models in statistical physics, mostly percolation.
by D. A. Levin, Y. Peres, E. L. Wilmer - American Mathematical Society
An introduction to the modern approach to the theory of Markov chains. The main goal of this approach is to determine the rate of convergence of a Markov chain to the stationary distribution as a function of the size and geometry of the state space.
by Prasanna Sahoo - University of Louisville
This book is an introduction to probability and mathematical statistics intended for students already having some elementary mathematical background. It is intended for a one-year junior or senior level undergraduate or beginning graduate course. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662595559.80/warc/CC-MAIN-20220526004200-20220526034200-00341.warc.gz | CC-MAIN-2022-21 | 1,803 | 15 |
https://askubuntu.com/questions/150066/split-monitor-in-two/998435 | code | Is there a way to split a single monitor in two, so that the two halves will be treated as separate monitors? This means that windows should fill half the screen when maximized. Also, gnome panels should fill half the screen.
The accepted answer did not work for me. What has worked though was adding virtual monitors in XRandR 1.5.
To split the monitor do the following:
xrandrinto the terminal to check the output name and current resolution of the display you want to split.
On my system the result was:
Screen 0: minimum 8 x 8, current 1920 x 1080, maximum 32767 x 32767 HDMI1 disconnected (normal left inverted right x axis y axis) HDMI2 connected primary 1920x1080+0+0 (normal left inverted right x axis y axis) 509mm x 286mm 1920x1080 60.00*+ 50.00 59.94 1920x1080i 60.00 50.00 59.94 1600x900 60.00 1280x1024 75.02 60.02 1152x864 75.00 1280x720 60.00 50.00 59.94 1024x768 75.08 60.00 800x600 75.00 60.32 720x576 50.00 720x576i 50.00 720x480 60.00 59.94 720x480i 60.00 59.94 640x480 75.00 60.00 59.94 720x400 70.08 VGA1 disconnected (normal left inverted right x axis y axis) VIRTUAL1 disconnected (normal left inverted right x axis y axis)
We can see that my monitor is connected to HDMI2 and the resolution is set to 1920x1080.
Add 2 virtual monitors with the
xrandr --setmonitorcommand ensuring that they overlap with your physical display and are placed next to each other. The syntax of the command is (without quotes):
xrandr --setmonitor "monitor_name" "width_px"/"width_mm"x"height_px"/"height_mm"+"x_offset_px"+"y_offset_px" "output_name"
For my system it was:
xrandr --setmonitor HDMI2~1 960/254x1080/286+0+0 HDMI2 xrandr --setmonitor HDMI2~2 960/255x1080/286+960+0 none
While the above has already configured the virtual monitors on my system the changes haven't been applied until I have executed (it seems to refresh xrandr):
xrandr --fb 1921x1080 xrandr --fb 1920x1080
To persist the changes after reboot you would want to execute these commands when you login. You can do so by appending the commands at the end of your
It seems compiz has support for this. Under "General Options" in CompizConfig, on the "Display Settings" tab, it is possible to manually specify the "monitors" to use for maximizing windows. There is an issue with Adobe Flash and fullscreen, but overall it works quite well.
Since my graphics card merges three monitors into a single large one, this is very useful
Step by step instructions:
- Open a terminal by pressing Ctrl+Alt+T.
sudo apt-get install compizconfig-settings-managerand press enter. Fill out your password when requested. No asterisks will be displayed when entering the password.
- When the installation is done, launch the application "CompizConfig Settings Manager".
- Click "General Options" under the section "General".
- Select the tab "Display Settings".
- Uncheck "Detect Outputs".
- Edit the list of outputs as desired. Each line is one monitor. The syntax is
- See if works right away. You might need to log in and log out again.
Sample configuration for three classic 19-inch monitors in a horizontal row:
1280x1024+0+0 1280x1024+1280+0 1280x1024+2560+0
You might try using a tiling window manager.
KDE supports limited tiling out of the box. It will allow you to split you screen into two halves, though.
On the other end of the spectrum are Xmonad and Awesome. These are more difficult to set up, but some people swear by them. I used Xmonad for a long time and you get very adept at keyboard navigation. Reducing mouse usage, is the reason most people switch in the first place. I now use KDE because a few programs I use regularly don't tile very well and were a pain to use in Xmonad.
A happy medium might be to replace Gnome's window manager with Xmonad if you are a Gnome user. | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103324665.17/warc/CC-MAIN-20220627012807-20220627042807-00262.warc.gz | CC-MAIN-2022-27 | 3,754 | 32 |
http://www.magentocommerce.com/boards/viewthread/24412/ | code | <action method="setHeaderTitle" translate="title" module="contacts"><title>Contact Us</title></action>
Doesn’t work in some cases.
We suppose that this was broken in 1.1.7 or 1.1.8
See the bug report
And forum thread
If you think that this is not right place for this post please delete it. | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678683052/warc/CC-MAIN-20140313024443-00028-ip-10-183-142-35.ec2.internal.warc.gz | CC-MAIN-2014-10 | 292 | 6 |
https://www.airdropbob.com/bcnex/airdrop-bcnex | code | The Bcnex airdrop is over and was distributed to the valid participants.
Did you miss this opportunity? No problem, there are many more airdrops on our platform.
Bcnex is a full-service ecosystem for the purchase, exchange and trading of blockchain based tokens and a wide range of digital assets. It is a customer-centric, highly secure and stable trading platform built on microservices architecture that meets the most stringent customer requirements.
Bcnex is airdropping Ripple (XRP) token to participants for solving these tasks:
First 1,000 participants will get $50 worth of XRP and the rest will get $25 in XRP
Step by step guide
Register on Bcnex's Website
Verfiy your email and enable 2FA option
Like Bcnex's Facebook Account and share this post
Follow Bcnex's Twitter Page and retweet this tweet
Submit your details to this form, including your XRP address
(exchange address is possible / Don't forget XRP Deposit Tag, MEMO if needed)
Currently there isn't any comment for this airdrop available. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945168.36/warc/CC-MAIN-20230323132026-20230323162026-00324.warc.gz | CC-MAIN-2023-14 | 1,008 | 13 |
https://www.codesandciphers.co.uk/documents/wffishnotes/WF007.HTM | code | If we use logs to base e the foregoing can be approximated and simpli-
fied through the logarithmic series
How big a score in centibans should be ainad at in setting patterns?
In the first place the a priori odds tItat a given setting is wrong
vary from 597:1 (for X45) to 1270:1 (for X12). The Brttish average
this at 1000:1 for a 2 wheel run in order to avoid a separate set of
computations for each pair ot wheels. Furthermore, they adopt 10:1
as the standard of odds required of a favorable result. Therefore F
must be 10,000 in order to make it 10:1 that the settng is correct
notwithstanding a 1000:1 a priori probability or incorrectness. Since
the log of F to base 10 must be 4, a score or 400 centibans is neces-
sary. The length of message necessary to achieve this score is easily
400 = 86.86 lambda^2 n
ri = 4.6/lambda^2
400 centibans is the average for a message of this length. Therefore,
we should get a score of 400 centibans or greater just half the time.
Similarly, lambda = sqrt (4.6/n)
From this we can, if we know the characteristics of the motor or Psi
patterns, compute the bulge in Delta Pij necessary to achieve the required
degree of access with a message of length n. | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735989.10/warc/CC-MAIN-20200805212258-20200806002258-00098.warc.gz | CC-MAIN-2020-34 | 1,194 | 20 |
https://evanstonc2c.org/about/our-leadership/ | code | I was born and raised in urban America and would have likely have succumbed to the streets, but for the role of schools in my life. Education provided my pathway to upward mobility. Upon returning to Chicago in 2003, I began providing educational pathways to others. Over the last two decades, I have designed, implemented, evaluated, and scaled educational programs. I believe that EC2C has a tremendous opportunity to create systematic change and improve the lives of all Evanston youth.
I have experience bridging communities, connecting people and building partnerships. I am a passionate advocate for equitable access to resources. I received her Master of Public Administration from the Maxwell School of Citizenship and Public Affairs at Syracuse University. I specialize in collaborative governance and serving as a facilitator.
As a Philly native, I’ve found a home away from home in Evanston. As a Humanities Fellow at Hampshire College, I worked on bringing Professors, staff, and students together to build stronger connections. I believe in that the first step to creating a more equable community is through education. As someone with a past teaching early childhood education, I believe ECE should be available to all families. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510259.52/warc/CC-MAIN-20230927035329-20230927065329-00556.warc.gz | CC-MAIN-2023-40 | 1,244 | 3 |
http://www.heavyrobot.com/blog/words-your-mother-and-other-folks | code | Following hot on the trail of Heavy Mural's release to the Chrome Web Store, we here at Heavy Robot have released yet another code pony out to pasture. Say hello, or "lelho" to Heavy Jumble — a casual, word scramble game built with Flash. You can find and install the app in the Chrome Web Store, or navigate to the site directly.
Aside from simply watching minutes turn to hours while playing the game, you can also purchase the code to display on your own website. Don't really care for the look, or want to change the words to cater more to your latest ad campaign? No problem. Heavy Jumble is fully configurable from the scrambled words to the background, logos, links and colors. To get a better idea of what is possible and how the configuration works, take a look at the details page. Here you will find configuration details, screenshots of sample themes, pricing information, as well as a list of what you will receive with your purchase.
Casual gaming is for everyone, not just moms. So take a look and let us know what you think by posting a comment here, or on the Chrome Web Store. We'd love to hear from you. | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189377.63/warc/CC-MAIN-20170322212949-00596-ip-10-233-31-227.ec2.internal.warc.gz | CC-MAIN-2017-13 | 1,124 | 3 |
https://intellij-support.jetbrains.com/hc/en-us/community/posts/207001705-Aurora-vs-Ariadna | code | The problem is the following: I have for all three "Complete Code"
assigned "Tab". In Ariadna the completion was really fast, but in
Aurora(build 816) is very slow(2-3 seconds at least). What is the problem?
My computer became old? (P4 1.5GHz/512MB/WinXP) or Aurora is in a "sort of"
debug version? The project is quite small (950 classes and 22MB additional
jars)...so I don't see the problem.
So ... what seems to be the problem? | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401585213.82/warc/CC-MAIN-20200928041630-20200928071630-00522.warc.gz | CC-MAIN-2020-40 | 431 | 7 |
https://renderro.com/?utm_campaign=article-raindance&utm_source=raindance&utm_medium=article&utm_content=renderro-article | code | Head Project Tamer @ OnTheRocks
"Renderro enabled us to charge head-on into horsepower demanding projects. Free Sign up
The same kind that we rejected before because we did not want to invest into cumberstone solutions. It gave us more confidence and flexibility.
Besides that, using Renderro feels smart & eco-friendly."
Thanks to Renderro I was able to do all my designs without a hussle!
Renderro gave me the great postproduction tools, that are always accesible wherever I am.
It gave me the power for my projects, when I needed it the most. | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703507045.10/warc/CC-MAIN-20210116195918-20210116225918-00532.warc.gz | CC-MAIN-2021-04 | 545 | 7 |
https://sources.gentoo.org/cgi-bin/viewvc.cgi/gentoo-x86/dev-perl/Text-ParseWords/Manifest?view=log | code | Parent Directory | Revision Log
|Links to HEAD:||(view) (download) (annotate)|
Text-ParseWords moved to perl-core
Add initial version (Portage version: 22.214.171.124/cvs/Linux x86_64, unsigned Manifest commit)
Add initial version (Portage version: 126.96.36.199/cvs/Linux x86_64)
Remove Text-ParseWords again. It is a core module.
Initial commit for Perl-Critic (Portage version: 2.2.0_alpha24/cvs/Linux x86_64, signed Manifest commit with key 0x4E046AEC)
This form allows you to request diffs between any two revisions of this file. For each of the two "sides" of the diff, select a symbolic revision name using the selection box, or choose 'Use Text Field' and enter a numeric revision.
|Powered by ViewVC 1.1.20| | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174157.36/warc/CC-MAIN-20170219104614-00222-ip-10-171-10-108.ec2.internal.warc.gz | CC-MAIN-2017-09 | 716 | 9 |
https://www.freelancer.com.ru/projects/mobile-phone/app-like-databack/ | code | 1.) No advance is needed . Just create the milestones
2.) My skills-->screen and page designing pixel perfect , website , Android application, IOS application , desktop application , any custom work, All pages, screenБольше
Greetings for the day.
I am having 22 years of exp. of working as an IT expert with one of the best team in India working on software applications,web & mobile app , ERP / SAP , CRM / BOT ( Python ) etc.
We have extensive expertise in custom website and android application best suited for our clients. We are very much confident that we will be able to deliver the vision you [login to view URL] have worked with many individuБольше
Hi there -
My name is Mansoor Shaikh. I’ve read brief and see that you’d like to build an iPhone and android app.
My team has 5 years experience designing and developing mobile apps for iPhone and Android and wБольше
Hello Employer, greetings!
I've checked the sample app. Have few queries.
Kindly provide me your detailed requirements in the personal message,
I have an experience of more than 4 years with Android and Web DevelopБольше
We are a website design and development company. Our expertise include:
- Open source Platform Development (Wordpress, Drupal, Joomla)
- Ecommerce Development (Magento, Zencart, Prestashop, Woocommerce, OpБольше
***Coming together is a beginning,working together is a success ***
Went through your requirement. We expertise in the domain you are looking for.
Arvind Info Tech is a niche of professionals from vaБольше | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825512.37/warc/CC-MAIN-20181214092734-20181214114234-00422.warc.gz | CC-MAIN-2018-51 | 1,553 | 18 |
http://forums.gamengai.com/viewtopic.php?f=2&t=1861&p=12180 | code | Those that post at Assembler probably have read this thread
. For those that haven't, a very well-connected game and game merchandise reseller was shipping (or having shipped to him) a number of one-of-a-kind concept art prints of varying sizes and qualities.
Personally, I hate just about all US box art, but that doesn't change the fact that I grew up with a lot of it and that it's a little painful to see it all go up in smoke.
A few posts down he lists out all the items. | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439736057.87/warc/CC-MAIN-20200810145103-20200810175103-00172.warc.gz | CC-MAIN-2020-34 | 476 | 4 |
https://charitylawyerblog.com/tag/copyright/ | code | A simple explanation of copyright law is that if you did not create it, get a license to use it, or purchase it, you are likely in violation of copyright law. Further, copyright infringement is a strict liability offense. If you use someone’s image without a license to use it, you infringe upon their copyright. This is so even if you paid a website designer or other third party and they posted the image without your knowledge.
How to Keep your Non-Profit Compliant in All 50 States
Most states require you to register your organization if you solicit donations from their residents. Many states also require registration if your organization collects substantial or ongoing donations from their residents, even if you aren’t specifically targeting donors in that state. Download our comprehensive list of each state’s requirements. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711286.17/warc/CC-MAIN-20221208082315-20221208112315-00523.warc.gz | CC-MAIN-2022-49 | 841 | 3 |
https://processwire.com/talk/topic/14090-croppable-image-3/page/4/ | code | Recently Browsing 0 members
No registered users viewing this page.
Processwire helper modules for adding page navigation within the editor.
This is a very simple module that adds Previous and Next links inline with the tabs on the page editor. Hovering over the tab shows the title of the previous or next page (using the admin's built in jqueryUI tooltips.)
This module is typically used during development where you or your editors need to traverse through pages for the purpose of proofing, flagging and/or commenting. Rather than returning to the page tree or lister, they can navigate with these links.
If you are using PW version 2.6.1 or later, the system will prevent you from leaving the page if you have unsaved edits.
For earlier versions, to avoid accidentally losing changes made to a page that might occur if a user accidentally clicks on one of these, make sure to have the Form Save Reminder module installed.
SnipWire - Snipcart integration for ProcessWire
With SnipWire, you can quickly turn any ProcessWire site into a Snipcart online shop. The SnipWire plugin helps you to get your store up and running in no time. Detailed knowledge of the Snipcart system is not required.
SnipWire is free and open source licensed under Mozilla Public License 2.0! A lot of work and effort has gone into development. It would be nice if you could donate an amount to support further development:
Status update links (inside this thread) for SnipWire development
2020-03-21 -- SnipWire 0.8.5 (beta) released! Improves SnipWires webhooks interface and provides some other fixes and additions 2020-03-03 -- SnipWire 0.8.4 (beta) released! Improves compatibility for Windows based Systems. 2020-03-01 -- SnipWire 0.8.3 (beta) released! The installation and uninstallation process has been heavily revised. 2020-02-08 -- SnipWire 0.8.2 (beta) released! Added a feature to change the cart and catalogue currency by GET, POST or SESSION param 2020-02-03 -- SnipWire 0.8.1 (beta) released! All custom classes moved into their own namespaces. 2020-02-01 -- SnipWire is now available via ProcessWire's module directory! 2020-01-30 -- SnipWire 0.8.0 (beta) first public release! (module just submitted to the PW modules directory) 2020-01-28 -- added Custom Order Fields feature (first SnipWire release version is near!) 2020-01-21 -- Snipcart v3 - when will the new cart system be implemented? 2020-01-19 -- integrated taxes provider finished (+ very flexible shipping taxes handling) 2020-01-14 -- new date range picker, discount editor, order notifiactions, order statuses, and more ... 2019-11-15 -- orders filter, order details, download + resend invoices, refunds 2019-10-18 -- list filters, REST API improvements, new docs platform, and more ... 2019-08-08 -- dashboard interface, currency selector, managing Orders, Customers and Products, Added a WireTabs, refinded caching behavior 2019-06-15 -- taxes provider, shop templates update, multiCURL implementation, and more ... 2019-06-02 -- FieldtypeSnipWireTaxSelector 2019-05-25 -- SnipWire will be free and open source Plugin Key Features
Fast and simple store setup Full integration of the Snipcart dashboard into the ProcessWire backend (no need to leave the ProcessWire admin area) Browse and manage orders, customers, discounts, abandoned carts, and more Multi currency support Custom order and cart fields Process refunds and send customer notifications from within the ProcessWire backend Process Abandoned Carts + sending messages to customers from within the ProcessWire backend Complete Snipcart webhooks integration (all events are hookable via ProcessWire hooks) Integrated taxes provider (which is more flexible then Snipcart own provider) Useful Links
SnipWire in PW modules directory SnipWire Docs (please note that the documentation is a work in progress) SnipWire @GitHub (feature requests and suggestions for improvement are welcome - I also accept pull requests) Snipcart Website
---- INITIAL POST FROM 2019-05-25 ----
By Robin S
Inspired by a recent question.
Image Crop Ratios
Allows preset aspect ratios to be defined per image field for the ProcessWire image crop tool.
The module adds a select dropdown to the crop tool. Choose an aspect ratio and the crop area will be fixed to that ratio.
Install the Image Crop Ratios module.
Default aspect ratios for all image fields can be defined in the module config. Aspect ratios for specific image fields can be defined on the Input tab of the field settings. You can override the ratio settings in template context if needed. Insert a hyphen as the first item in the ratio settings unless you want to force a ratio to be applied to the crop tool. The hyphen represents a blank option that allows a free crop area to be drawn. Usage
Click the "Crop" link on the details view of an image thumbnail. Click the "Crop" icon at the top of the editor window. Choose an option from the "Ratio" select dropdown.
This module is (yet another) way for implementing a cookie management solution.
Of course there are several other possibilities:
- ... and so on ...
In this module you can configure which kind of cookie categories you want to manage:
You can also enable the support for respecting the Do-Not-Track (DNT) header to don't annoy users, who already decided for all their browsing experience.
Currently there are four possible cookie groups:
- Necessary (always enabled)
- External Media
All groups can be renamed, so feel free to use other cookie group names. I just haven't found a way to implement a "repeater like" field as configurable module field ...
When you want to load specific scripts ( like Google Analytics, Google Maps, ...) only after the user's content to this specific category of cookies, just use the following script syntax:
If you want to give the users the possibility to change their consent, you can use the following Textformatter:
[[privacywire-choose-cookies]] It's planned to add also other Textformatters to opt-out of specific cookie groups or delete the whole consent cookie.
You can also add a custom link to output the banner again with a link / button with following class:
<a href="#" class="privacywire-show-options">Show Cookie Options</a> <button class="privacywire-show-options">Show Cookie Options</button> This module is still in development, but we already use it on several production websites.
You find it here: PrivacyWire Git Repo
Download as .zip
I would love to hear your feedback 🙂 | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370502513.35/warc/CC-MAIN-20200331150854-20200331180854-00390.warc.gz | CC-MAIN-2020-16 | 6,454 | 40 |
https://win-vector.com/2008/04/26/i-know-i-am-the-one-being-a-jerk/ | code | The other day’s blog post and a recent Andrew Binstock interview of Donald Knuth made me think more about how the ACM is really not serving the interests of computer science.
Here is a question from the interview:
Andrew: One of the few projects of yours that hasn’t been embraced by a widespread community is literate programming. What are your thoughts about why literate programming didn’t catch on? And is there anything you’d have done differently in retrospect regarding literate programming?
Professor Knuth had a good and interesting answer, which I will not go into here. Also, it was a good question- Literate Programming is a good idea, yet we have only seen weak imitations of it like Doxygen and JavaDoc (which automatically document the syntactic structure of code instead of really helping the programer become an author and explain their meaning and intent).
Mr. Binstock even includes a link to a site promoting the concept. Let us, as the kids these days say, “click through” and see what awaits us.
This is great. Literate programing is definitely Web 2.0 (rounded corners, use of light pastels and cool gradients). This is now, this is modern, sign me on. The site even has links to original articles by the masters:
Literate Programming - CACM Series Programming Pearls: Literate Programming, CACM (May 1986) Programming Pearls: A Literate Program, CACM (June 1986) Programming Pearls: Abstract Data Types, CACM (April 1987) Announcing Literate Programming, CACM (July 1987) LP: Processing Transactions, CACM (December 1987) LP: Expanding Generalized Regular Expressions, CACM (December 1988) LP: A File Difference Program, CACM (June 1989) LP: Weaving a Language-Independent WEB, CACM (September 1989) LP: An Assessment, CACM (March 1990) The Literate-Programming Paradigm Donald Knuth. "Literate Programming (1984)" in Literate Programming. CSLI, 1992, pg. 99.
Time to click through and see how the Association for Computing Machinery helps disseminate, guide and educate:
Oh, maybe this is part of why Literate Programming hasn’t been embraced: the whole purpose of Literate Programming is lost when you keep it a secret.
I am sure I have been a paid ACM member from time to time, but I don’t remember the online credentials and they have probably lapsed by now. I tried applying for the free temporary credential (the online form ended up not sending me anything- ACM not so good with the computers). I can afford pay (yet again) to re-join ACM but why would I want to give my money to support an organization so far from my (and common) academic values?
So in conclusion:
- Sorry Professor Knuth, you remain one of my heroes, but I’ll have to get to Literate Programing a bit later. I would say that the marketing campaign behind Literate Programming has excessive “breakage.”
- ACM: that was a funny joke, great head-fake, impeccable comic timing, good fun and I certainly learned something. Oh, and I will see you in hell.
Categories: Computer Science Opinion
Data Scientist and trainer at Win Vector LLC. One of the authors of Practical Data Science with R.
Better article on a related topic: http://www.win-vector.com/blog/2009/06/public-service-article-jstor-and-other-useful-research-archives/ .
Even better example: try to find the article Effy Oz, When Professional Standards are LAX. The CONFIRM Failure and its lessons, Comm. ACM, 37(1994), 10, 29-36. Guess what- it ACM has it locked behind a pay-wall. How does this in any way promote professional standards in the computing field?
I totally agree with you. It is unforgiveable that the ACM should so totally lock up the papers it has published behind fortress-like walls. The only saving grace is that *most* academics also publish current papers on personal web-sites, although you could easily say that this is in spite of the ACM.
It doesn’t help with papers before about … oh say 1995, which is really too bad, as there is a lot of good material that is still relevant where you can’t get to it without an all-areas-access pass from a large university library. Which, if you’re basically out working in industry, is harder to come by than you might think.
The let’s is missing its apostrophe. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00366.warc.gz | CC-MAIN-2023-14 | 4,217 | 20 |
http://singletrackworld.com/forum/topic/best-solution-for-organising-and-playing-audio-files | code | I've got a large collection of music on my desktop computer.
I also have a decent Cambridge Audio stereo amp and Wharfedale speakers.
What I would like to do is have it as a standalone setup to organise and play the files and not be plugged into the desktop. Maybe all the files on maybe an external hard disk with a cheapo android tablet interface? Are there any other solutions that people use? Something wireless would be ideal.
Any help much appreciated - I'm sure there's a good option out there but it's not staring me in the face. | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190234.0/warc/CC-MAIN-20170322212950-00431-ip-10-233-31-227.ec2.internal.warc.gz | CC-MAIN-2017-13 | 537 | 4 |
http://www.nvnews.net/vbulletin/showpost.php?p=1723887&postcount=3 | code | Re: So i got email from eVGA for cash refund
Can you post the general contents of the email? I've received emails from eVGA but they have been somewhat cryptic in detail.
Windows 7 Home Premium 64 | 6Gb OCZ 1600 Mhz | i7 950 OC to 4.0 Ghz | 280 GTX SLI | ASUS P6X58D-E | Dell 3007WFP | Corsair CMPSU-750TX 750W PSU
"Some say Chuck Norris can divide by zero; while this is true, he would have no need. For Chuck, the zero would divide itself." | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462313.6/warc/CC-MAIN-20150226074102-00143-ip-10-28-5-156.ec2.internal.warc.gz | CC-MAIN-2015-11 | 442 | 4 |
https://list.orgmode.org/[email protected]/T/ | code | * How to export agenda view with html style
@ 2020-07-12 7:34 Xiang Ruan
0 siblings, 0 replies; only message in thread
From: Xiang Ruan @ 2020-07-12 7:34 UTC (permalink / raw)
I am using org-agenda for GTD.
For easy confirming the information on devices like mobile phone, I export my agenda view to HTML file which locates at my personal server.
However, the exported html does not have style information. For general org file, I know it is easy to add #+HTML_HEADER to specify css information for exporting, unfortunately there is no way to add head information in agenda view.
I did some googles, found there are two possible solutions.
One is to use org-agenda-write to store agenda view to org file and add head information to the file for exporting.
Though I didn't try it, I believe it work well. However, it is not the way I have expected, I want to do it with one step.
I also tried to use org-agenda-export-html-style and did a simple test by adding the below code to my .emacs
"<link rel=\"stylesheet\" href=\"https://www.w3schools.com/w3css/4/w3.css\">
<link rel='stylesheet' href='https://fonts.googleapis.com/css?family=Roboto'>
<link rel=\"stylesheet\" href=\"https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css\">
I found org-agenda-export-html-style inserts text in <style></style> block of HTML header that makes the above css including invalid.
Actually all my personal webpages are made by org-mode with theme-readtheory. The org files have head information:
I wonder if I can also include theme-readtheorg.setup in agenda view exporting?
Could somebody help and advice me a good solution?
Thank you in advance.
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2020-07-12 7:34 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-07-12 7:34 How to export agenda view with html style Xiang Ruan
Code repositories for project(s) associated with this public inbox
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s). | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652959.43/warc/CC-MAIN-20230606150510-20230606180510-00152.warc.gz | CC-MAIN-2023-23 | 2,236 | 28 |
https://www.slg.co.at/en/beratung/corporate-finance/projektfinanzierung/ | code | If an investment project or larger project is on the horizon, not only a "bankable" business plan is needed, but also well-structured and solidly negotiated financing.
Whether on-balance or non-recourse, the key is that the solution is tailored to your situation.
Specialist Debt Advisory
Foundation and project start
In addition to the operational business case, a financial model depicts the project-specific financing, important key figures and scenarios. It must be designed in such a way that it is "bankable" and accompanies you through the entire project cycle: from conceptualization to financial closing and beyond that in the monitoring of results during ongoing operations. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817103.42/warc/CC-MAIN-20240416155952-20240416185952-00015.warc.gz | CC-MAIN-2024-18 | 684 | 5 |
https://fungama.in/govinda-comedy-scenes-%E0%A4%97%E0%A5%8B%E0%A4%B5%E0%A4%BF%E0%A4%82%E0%A4%A6%E0%A4%BE-%E0%A4%95%E0%A5%80-%E0%A4%B8%E0%A4%AC%E0%A4%B8%E0%A5%87-%E0%A4%B9%E0%A4%BF%E0%A4%9F%E0%A5%8D-%E0%A4%95%E0%A5%89/ | code | There is nobody as good as Govinda at comedy. He manages to leave you in splits each time he appears on screen. Here is a compilation of some of the best scenes by Govinda. Enjoy watching the video.
1) Hadh Kar Di Aapne
2) Bhagam Bhag
SUBSCRIBE to http://www.youtube.com/subscription_center?add_user=indiancomedy
Like, Comment and Share this funny video with your friends and family.
Connect with us on :-
Google Plus – https://plus.google.com/+shemaroo
Pinterest – http://pinterest.com/shemaroo
Sign up for Free and get daily updates on New Videos, exclusive Web Shows, contests & much more
Send us your feedback and suggestions at : [email protected]
For more Comedy Movies download the ShemarooMe app now and share it with your friends and Family
Download the app now and share it with all the asli fans
Give a missed call on 18002665151 | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540517557.43/warc/CC-MAIN-20191209041847-20191209065847-00268.warc.gz | CC-MAIN-2019-51 | 844 | 13 |
http://udrtudtz.xorg.pl/topic-775249.html | code | dating site in europe
I dating sites for reading knew one boy who began to spread stories about me, saying I dating sites for speed dating amarillo tx reading was dishonest, unreliable and impudent, when we broke our relations, but I still actually believe in friendship between fellows and girls, that's why I dating sites for reading have equal amount dating sites for reading of boys and girls among my close friends. But in my opinion it isn't an easy thing to be a true friend and before somebody can name you his best friend you should prove your friendship. To my dating sites for reading mind everyone can have only one or two true friends, because a dating sites for reading friend to all is a friend to none. I believe that faithful friend can brighten your life and make it more interesting, vivid and dating sites for reading enjoyable. You are interested in your friend with all his positive and negative traits of personality and your friend in his dating sites for reading turn can understand and forgive you everything. You shouldn't tell dating sites for reading a lie to your friend, there mustn't be hypocrisy in your speech and even in thoughts. Before telling your friend dating sites for reading something, before doing anything you should think a lot and guess what kind influence it will render on him and on his life. So I think that it is difficult to be a real friend, but to my mind all of us try to achieve the ideal of a true friend. I'm sure you will agree that nowadays there are various ways of acquaintance.
Mobile data entry
Dating violence policy nj
Gay dating ios
|That they know aren't real, they turn to imagination inner Party is the ruling caste and live in different districts and she is too busy even.|
|Move so you can gain devoted friend can be not.|
|Although it is still associated with effort some aspirin too that.| | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424721.74/warc/CC-MAIN-20170724042246-20170724062246-00577.warc.gz | CC-MAIN-2017-30 | 1,864 | 8 |
http://dspace.bracu.ac.bd/xmlui/handle/10361/11758 | code | Machine learning approach for face recognition from 3D models generated by multiple 2D angular images
MetadataShow full item record
We propose machine learning approach for face recognition from 3D models generated by multiple 2D angular images that recognizes faces from multiple angle of a 3D face model. Though, many works on identifying faces from 3D have already been done, there are many spaces to update, improve and contribute more features on previously done researches. However, this research includes SFM algorithm which is a combination of SIFT detector, Approximate Nearest Neighbors (ANN) algorithm and RANSAC algorithm to reconstruct 3D from multiple RGB images. Again, it includes AdaBoost Learning algorithm which was used to train model to recognize faces. Besides, we used Local Binary Pattern Histogram (LBPH) which is an effective texture administrator, marks the pixels of a picture by thresholding the area of every pixel. Finally, the System successfully recognizes faces which are deviated up to 60°angular deviation respectively to left and right (total: 120°). Additionally, it gives an accuracy of 80% to 100% depending on angular deviation of up to from 0°to 60°. Nevertheless, the rate of accuracy of our proposed system is reversely proportional to the Angular Deviation. | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00318.warc.gz | CC-MAIN-2022-33 | 1,306 | 3 |