url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://developer.jboss.org/thread/215832
code
I'm having trouble injecting a delegate. I have a producer field: private UpperBoundTypedResource<HierarchyHolder<Primate>> ubhhr = new UpperBoundTypedResource<HierarchyHolder<Primate>>(Primate.class); where @ResourceBinding is a qualifier, and a decorator: public abstract class UpperBoundDecorator<T extends HierarchyHolder<? extends Primate>> implements UpperBoundTypedResourceIntf<T> private UpperBoundTypedResourceIntf<T> resource; public UpperBoundDecorator(@Delegate @ResourceBinding UpperBoundTypedResourceIntf<T> resource) this.resource = resource; System.out.println("UpperBoundDecorator got delegate: " + resource); public Response execute() Response response = resource.execute(); and the UpperBoundDecorator constructor and UpperBoundDecorator.execute() aren't getting called. UpperBoundTypedResource.execute() gets called directly. There are no complaints from Weld, just a silent failure. If I remove @ResourceBinding from the UpperBoundDecorator constructor, everything works. If I remove @ResourceBinding from the producer field, Weld complains about an unsatisfied dependency: Caused by: org.jboss.weld.exceptions.DeploymentException: WELD-001408 Unsatisfied dependencies for type [UpperBoundTypedResourceIntf<T>] with qualifiers [@ResourceBinding] at injection point [[parameter 1] of [constructor] @Inject public org.jboss.resteasy.cdi.generic.UpperBoundDecorator(UpperBoundTypedResourceIntf<T>)] Running my test in the Eclipse debugger, I see that the instance of UpperBoundTypedResource produced by the producer field doesn't have the qualifier @ResourceBinding, which would explain why it isn't being injected into the UpperBoundDecorator delegate field. But, in that case, I would expect a complaint about an unsatisfied dependency. Looking at the CDI spec, it doesn't really say much about qualifiers on producer fields and methods. It says, "A producer field may also specify scope, bean name, stereotypes and/or qualifiers.", but it doesn't, as far as I can see, elaborate on the meaning of qualifiers on producer fields. I'm guessing that the intent is to determine if the produced object is eligible for injection into an injection point, but it doesn't seem to be spelled out. As an experiment, I tried annotating UpperBoundTypedResource with @ResourceBinding, which messes up the injection points in UpperBoundTypedResource, but it does, of course, add the qualifier to the class. When I do that, AbstractClassBean.initDecorators() does, in fact, determine that UpperBoundDecorator is a decorator for UpperBoundTypedResource, but ManagedBean.produce(), which seems to be where decorators are applied, doesn't get called for UpperBoundTypedResource. Note, by the way, that in these circumstances, the instance of UpperBoundTypedResource that eventually gets called by Resteasy is an instance of UpperBoundTypedResource.class, rather than a Weld proxy.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160568.87/warc/CC-MAIN-20180924145620-20180924170020-00544.warc.gz
CC-MAIN-2018-39
2,881
16
https://mail.haskell.org/pipermail/haskell-cafe/2008-April/041639.html
code
[Haskell-cafe] install trouble with SDL on win32+cygwin conal at conal.net Fri Apr 11 21:37:14 EDT 2008 I'm trying to install the SDL package (on win32+cygwin), and configure isn't able to find my SDL.dll, though it's on my PATH. Any ideas? - Conal bash-3.2$ cabal install SDL 'SDL-0.5.3' is cached. [1 of 1] Compiling Main ( Setup.lhs, dist\setup/Main.o ) Linking dist\setup\setup.exe ... checking for sdl-config... no checking for sdl11-config... no configure: error: *** SDL not found! Get SDL from www.libsdl.org. If you already installed it, check it's in the path. If problem remains, please send a mail to the address that appears in ./configure --version indicating your platform, the version of configure script and the problem. cabal.exe: Error: some packages failed to install: SDL-0.5.3 failed during the configure step. The exception was: exit: ExitFailure 1 bash-3.2$ which SDL.dll -------------- next part -------------- An HTML attachment was scrubbed... More information about the Haskell-Cafe
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822625.57/warc/CC-MAIN-20171017234801-20171018014801-00075.warc.gz
CC-MAIN-2017-43
1,010
22
http://community.igniterealtime.org/message/211949?tstart=0
code
I've tried Lync, I've tried Open Fire. Lync was so complicated to setup, I made a forum just to keep up with the notes. I got 4 people on it LOL, didn't even intend on it. One day while getting frustrated with Lync, I ran across an old Hak5 episode that was talking about Open Fire. I gave it a try and I was hooked. Needless to say, I've added a board on my Lync server 2010 forum for alternative communication servers. Open Fire, and Spark are all I have listed. If anyone would like to post any helpful information, tips, tricks on there, I would really appreciate it. Like I said, the forum is new, not really anyone on there, but If someone does come looking, I would like to help promote the Open Fire project. I didn't even managed to setup Lync It's just a giant PITA, like it is often with MS products.. Though it has nice integration features with other MS products, but it is just too complex. It took me 2 weeks to set up Lync for me. Very scarce documentation, the videos that were suppose to help you install it where misleading. They skipped about 5 critical steps in the videos and documentation. Microsoft never published what they did as prerequisites, before even attempting to install Lync. I feel your pain hehe.
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539337.22/warc/CC-MAIN-20140416005219-00478-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
1,233
6
http://baynemineralsystems.com/how-to-crack-laptop-password-windows-vista.html
code
And then you can reset Windows Vista Administrator password with the command: net user. However, you should create it before you lost your password. If you created a Window password reset disk before, then you can: Method 2: Use Windows password reset disk to break Vista password. You need to enable that account before forgetting your other admin account password. No need to wait till end. If you have manually Vista, you can boot your computer into safe mode to access the built-in administrator account, or directly switch to logon as the Administrator on the sign-in screen. Edit your user password with the command on way 3. If you already have it, skip to the next step. However, instead of writing it down next to your computer or committing a complex password to memory, consider storing it in a. This is happening more than you think and with a couple of tricks, many people before you have managed to successfully get in the locked accounts. Crack Vista admin password with built-in Administrator You may be surprised to hear how people could crack Vista password even if he lost it. The wizard reaches into Vista and changes the password for this particular user. When you successfully, add a new user account for your Windows Vista, you can close the command prompt, then you should see the your new users name in the login screen. How to crack Windows password easily and quickly? I typed my previous and change password, seeing it did not work. It seems that every method above is not so perfect. Now, if you correctly replace your utilman, your Windows Vista system should exist and reboot successfully. Hats off 2 u man. Step 2: Select the Administrator account that appear in the screen, then enter command prompt. Why to break Windows Vista password? First of all, and I have to say this because of some recent comments, this is not a virus, and will not delete any files from your computer. This comment has been removed by the author. But, this trick is useless if you are using a local or administrator account to protect your computer. Insert the disk into your locked computer after you boot the Windows computer to the Login Screen. Conclusion The process of resetting your Windows Vista password might be sometimes hectic when you lost your password, and you don't have reset disk. On the Windows installing screen, press Shift + F10. Step 3: You can either select to email you a reset link or send a code to you phone to reset your password. Follow the methods below, and try with them to see if they work well for you. If none of these options work for you, you might be stuck with doing a full System Recovery, which will make your computer functional again, but will destroy all your files and settings. This might sound simplistic, but before you do anything rash, check to see if your Caps Lock key is on. This tool don't need windows to operate in order run its application. With , you can add a new user, remove passwords without data loss or recover your forgotten password for your Lenovo laptop. Step 2: Wait while booting until the Install Windows screen appears. It can help us recover all versions Windows password in just 3 steps. Below is the most famous recovery tool I found: Windows Password Recovery Tool 3. Then boot your locked computer from it to reset user password offline. Under the Root Console in left panel, double-click Local Users and Group that was added earlier. Any questions, post a comment! Windows Password Recovery is such a tool. Have got into system, right-click on Computer, and select Manage. It is a very efficient implementation of windows any versions. Way 2: Reset Lenovo Laptop Password with Install Disk Another way to reset your password on your Lenovo laptop is to use an install disk. My son cannot remember his Windows Vista login password on his laptop and we do not have a reset disk. This is a pretty easy task too easy if you ask me so whatever happens your data is recoverable unless your hard disk is physically broken. After typing this hit enter key and it should say the command completed successfully and we have to type the password in when it will ask. Now, with this being done, the final step will reset your system then allow you to log into your windows Vista straight in. Only three steps required you can access to your Windows without system re-installation and data lost. In this case, you will usually seek solutions on internet for how to bypass Windows Vista password and get into your computer without password. If you have tried what the step Sandywanna told you and you finished resetting windows 7 admin password, congratulations! Now reboot your computer again so that the system can launch iSeePassword program upon startup Step 4 Begin to Reset Login Password It is time to reset the password and completely remove it from the login screen. Step 10: Repeat the step 1-6 to open Command Prompt, and execute the following command and restart computer so that you can reverse the changes you made. In this step, you're required to type your email and phone number associated with your Microsoft account. By this time, windows might have started loading. Hopefully, you guys liked this tutorial and do let us know your suggestions on the comments. This way, you can bypass your Windows Vista forgotten password and get a new one without using software but using the installation disk. Type in: net user coco 123, and then press Enter. If you are in need, please feel free and easy to break your lost Vista password with any one of the 3 methods discussed above. My friend recommends me another simple way. Note: Use this password to access your computer again.
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998817.58/warc/CC-MAIN-20190618203528-20190618225528-00523.warc.gz
CC-MAIN-2019-26
5,665
9
https://narutobase.net/forums/showthread.php?t=256906&goto=nextnewest
code
Re: I think that the shinobi who's masked got broken is a Leaf Ninja?! if you look at the next page the mist dude on the top left asks "who's that guy?" "who 'IS' that guy" refers to Obito since you cannot refer to a dead guy in the present tense, in this sense. however, i think it is a translation problem. the guy who had his head crushed looked like his forehead protector is from konoha. why would kishi make a tease such as this? the visible symbol on his forehead protector is that of an acute angle, the right side of the konoha symbol. if the symbol on his forehead protector was that of the mist it would have two squiggly lines since only the right side of the forehead protector is visible.. It should have said "who 'WAS' that guy?" instead of "who 'IS' that guy?" if the former is true, the mist ninja was referring to the ninja that had his head crushed.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174167.41/warc/CC-MAIN-20170219104614-00489-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
869
7
https://icobench.com/u/vladimir-serzhanovich
code
I graduated from the Belarusian State University. 19 years is successfully engaged in business. He created projects in retail and service sectors from scratch. Successful entrepreneur since 1998. Venture investor. Invests in startups with blocking technologies. of the blockchain laboratory Consensus Lab, the blockchain school, the blockchain hackathon, etc. In CopPay project is actively engaged in attracting investment, building a team and business processes. I am a consultant for many ISO projects.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178385378.96/warc/CC-MAIN-20210308143535-20210308173535-00296.warc.gz
CC-MAIN-2021-10
504
1
https://supportforums.blackberry.com/t5/Native-Development/How-to-using-core-mediaplayer-for-YouTube-videos/m-p/2631501
code
10-16-2013 07:28 AM I'm trying to use the core mediaplayer to show a YouTube video. This is the code I wrote: cardRequest.setMimeType("video/x-youtube"); //also tried with video/mp4 and video/x-flv but passing the YouTube url (http://www.youtube.com/v/VIDEO_ID) the invoked card advice me that the format is not supported. I know that is possible beacause of FastTube app, but I cannot find the solution. Where is the error? Thanks in advance. Solved! Go to Solution. 10-18-2013 10:13 AM The link you are trying to play is basically a URL for the web browser, correct? That is, YouTube would need HTML5 or Flash enabled to show you that content (it shows the custom YouTube player controls correct?). For playing things from YouTube, with this type of format for the URL, you would need to play it within a WebView component if you wanted to use it within a native app. The webkit runtime has its own media player (identical to the one seen through the browser app) which will go fullscreen when user plays the content. You can also take a look at native apps like Nobex Radio or SoundHound which does YouTube video playback through WebView. For playing content using the core Media Previewer card app (the one you are trying to do below), you would need to know the final destination URL from the server (for example: http://domainName.com/file.mp4). Basically, the server would need to send the encoded media, using a protocol recognized by the BlackBerry 10 multimedia platform. Hope this helps. Application Development Consultant | Developer Relations 10-18-2013 10:49 AM - edited 10-18-2013 10:51 AM Replied too soon without a refresh to see Rashid's message 08-07-2014 10:01 PM I'm trying to figure out how to do the same thing. I'm recording screencasts for my BB10 app and want to play them using the media player. I can include the videos in my app, but that baloons the size of the BAR file. It would be nice to play them from YouTube, still in the media player, but I don't want to use a WebView -- I'd like to be able to use the Media Player directly. The problem is, I don't know how to get a link to a MP4 file on YouTube.com. It's probably not possible? There are sites that will convert a YouTube video to an MP4 for you, but that's not what is wanted here... 08-08-2014 08:56 AM I belive it is against Googles TOS to play youtube videos in any way other than by using html5. This is because they use the web functionalities to support thier advertisments and going native somehow is able to circumvent this. They made Microsoft pull the youtube app from Windows Phone several times because they were trying to build a native version that did not use html5 as thier TOS requires.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188623.98/warc/CC-MAIN-20170322212948-00168-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
2,695
21
https://styleel.ru/updating-downlevel-os-configuration-1229.html
code
Each new version of Active Directory on Windows Server incorporates new features that can only be taken advantage of when all domain controllers (DC) in either the domain or forest have been upgraded to the same version. Before these question can be properly addressed, if must first be understood exactly what purposes the Domain and Forest Functional Levels serve. could you please share the file info "C:\Windows\System32\inetsrv\aspnetcore.dll" and "C:\Windows\Sys WOW64\inetsrv\aspnetcore.dll" The file looks correct. I installed the same version MSI as yours on a Win 10 box and worked. Could you please share your applicationhost.config and web.config. The NAP client can also be required to have an up-to-date antispyware signature file installed. Spyware protection only applies to NAP clients running Windows Vista. As a workaround, you can set the "enable 32-bit application" to false to see whether it helps. You can also specify the use of Windows Server Update Services (WSUS) or Windows Update to obtain security updates. Effective today, that policy is changing in a subtle but significant way, with the addition of new hardware requirements for support of pre-Windows 10 releases. The company's also publishing a preferred list of systems that will receive special attention for updates and support. Every time a new build is installed, the system stops loading correctly the dll aspnetcore. Error message in "Event Viewer": The Module DLL C:\WINDOWS\system32\inetsrv\failed to load. Log Name: Application Source: IIS-W3SVC-WP Level: Error Relevant System information: OS Name: Microsoft Windows 10 Enterprise Insider Preview OS Version: 10.0.14366 N/A Build 14366 OS Manufacturer: Microsoft Corporation OS Configuration: Member Workstation OS Build Type: Multiprocessor Free Product ID: 00359-80000-00001-AA999 Original Install Date: 6/16/2016, AM System Boot Time: 6/16/2016, AM System Manufacturer: Hewlett-Packard System Model: HP Z420 Workstation System Type: x64-based PC Processor(s): 1 Processor(s) Installed. The capability of the NAP platform is sometimes equated to the capability of the WSHA and if there is a system health check that is not supported by WSHA, then the NAP platform cannot support it. This is, of course, not correct, and is most likely based on an oversimplification of NAP functionality that is included with Windows. A little search in Bing, indicates that the error is related with 32 bit applications, but the application pool has that option enabled. The error indicates the 32-bit App Pool is trying to load 64-bit Today, I want to address a question that we see regularly. For example, Windows Server 2008 R2 introduces the AD Recycle Bin, a feature that allows the Administrator to restore deleted objects from Active Directory. As customers upgrade Active Directory, and they inevitably reach the point where they are ready to change the Domain or Forest Functional Level, they sometimes become fraught. In order to support this new feature, changes were made in the way that delete operations are performed in Active Directory, changes that are only understood and adhered to by DCs running on Windows Server 2008 R2.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347407289.35/warc/CC-MAIN-20200530040743-20200530070743-00149.warc.gz
CC-MAIN-2020-24
3,174
18
https://mikedietrichde.com/2018/06/20/installing-oracle-database-18c/
code
This blog post about Installing Oracle Database 18c applies to all Oracle 18c releases. I wrote a while ago about one very important change: and explained that the installation is now image based. You’ll find other posts as part of my series on how to install and upgrade to Oracle Database 18c here: - Deinstalling Oracle Database 22.214.171.124 - Installing Oracle Database 18.1.0 - Patching Oracle 18.1.0 to 18.2.0 - Upgrade Oracle 126.96.36.199 to Oracle Database 18c on-premises Installing Oracle Database 18c Oracle Database 18c on-premises is supposed to be generally available with the July 2018 Update. For details please always check the single-source-of-truth MOS Note: 742060.1. Furthermore, please see my previous blog post from March 20, 2018, as well.There you’ll find information on how to access the software. The documentation explains: “Simplified Image-based Oracle Database Installation Starting with Oracle Database 18c, the Oracle Database software is available as an image file for download and installation. You must extract the image software into the directory where you want your Oracle home to be located, and then run the runInstaller script to start the Oracle Database installation. For more information, see About Image-Based Oracle Database Installation“ Make sure you follow this advice: You must extract the image software into the directory where you want your Oracle home to be The OUI does not ask you for a home directory. Hence, copy the zip file into your desired directory and extract it there. Then start the The Oracle Universal Installer 18c The screens in OUI 18c look pretty much the same as before. As I’d like to patch and upgrade afterwards, there’s no need to invoke DBCA at this point. No RAC environment here. Hence, Single Instance installation is fine. Enterprise Edition of course 🙂 Now you see the difference to previous OUIs: There’s no Oracle Home input field anymore. It automatically displays the location where you copied and unpacked the software into. Make sure you set the groups correctly. I need to ignore the precheck warning as my Vbox environment has only 6GB RAM at the moment. This shouldn’t cause any trouble. See the summary: Then we almost made it – only the root.sh needs to be executed. And finally I will configure the Trace File Analyzer (TFA) as well. And then we are done. Extra tasks for the Hands-On Lab In my particular case adjusting our Hands-On Lab I have to change and correct all the environment command files in /usr/local/bin with root privileges. We use them to switch environments with for instance . cdb2 which sets all required variables and such for working with CDB2 in Oracle Database 18c. As these are in the oracle user can simply call them and switch environments. In addition I’m copying back all the files I saved before removing the Oracle 188.8.131.52 software. Final – and important tasks – in the lab: I need to change the Oracle Home reference in the dbora file in /etc/init.d and the home for CDB2 in /etc/oratab. Otherwise neither the automatic startup of the instance nor of the Oracle Listener which I’m running out of the 18c home will work.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.7/warc/CC-MAIN-20230923094750-20230923124750-00507.warc.gz
CC-MAIN-2023-40
3,184
37
https://community.softr.io/t/opening-external-links-in-new-tab/1016
code
Is there a way to force external links to open in a new tab (or even better, a modal)? I have a series of rich-text fields in a list-details block and the links open in the same window, forcing users away from my site. I found this: https://community.softr.io/t/open-text-block-links-in-the-same-tab/263, but I’m not technical and I couldn’t adapt it to my purposes. I tried just switching out ‘_self’ for '_blank" but that didn’t work. Can anyone point me in the right direction?
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711108.34/warc/CC-MAIN-20221206124909-20221206154909-00027.warc.gz
CC-MAIN-2022-49
490
2
https://www.limecall.com/glossary_cpt/artificial-intelligence-ai/
code
A system or network mimicking human processing intelligence to analyze, interpret, forecast, and adapt to data input. Artificial intelligence (AI) is a broad field of computer science that deals with creating intelligent machines capable of mimicking human cognitive functions like learning and problem-solving. It’s essentially the endeavor to build machines that can reason, learn, and act autonomously. Here’s a deeper dive into Artificial Intelligence: - Core Goal: AI aspires to develop machines that exhibit intelligent behavior, such as the ability to: - Reason and Draw Conclusions: Analyze information and use logic to arrive at sound judgments. - Learn and Adapt: Acquire knowledge and skills from data or experience, and adjust their behavior accordingly. - Solve Problems: Approach and overcome challenges in a creative and effective manner. - Subfields of AI: AI encompasses a wide range of subfields, each with its own specific approach to achieving machine intelligence. Some prominent areas include: - Machine Learning: Trains algorithms to identify patterns and make predictions based on data analysis. - Deep Learning: A subset of machine learning that uses artificial neural networks inspired by the human brain for complex pattern recognition. - Natural Language Processing (NLP): Enables machines to understand and process human language. - Computer Vision: Equips machines with the ability to interpret and analyze visual information. - Applications of AI: AI is rapidly transforming various aspects of our lives, with applications in numerous domains: - Healthcare: AI-powered systems can analyze medical data for diagnostics, treatment recommendations, and drug discovery. - Finance: AI algorithms can automate financial trading, assess creditworthiness, and manage risk. - Customer Service: Chatbots powered by AI can provide 24/7 customer support and answer routine inquiries. - Transportation: Self-driving cars utilize AI for navigation, obstacle detection, and decision-making. - Entertainment: AI can personalize recommendations for movies, music, and other forms of entertainment. - AI and Machine Learning: It’s important to distinguish between AI and machine learning, though they are closely related. Machine learning is a technique used to achieve AI. AI encompasses a broader goal of creating intelligent machines, while machine learning focuses on algorithms that improve through data analysis. - The Future of AI: AI is a rapidly evolving field with immense potential to revolutionize various industries and aspects of society. However, ethical considerations surrounding AI development and potential risks like job displacement remain important areas of discussion.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816977.38/warc/CC-MAIN-20240415111434-20240415141434-00593.warc.gz
CC-MAIN-2024-18
2,710
20
https://printablecouponsanddeals.com/Tag/worlds-best-cat-litter-printable-coupons/
code
Ex. 01-30-14 (May depend on when you print it) Use zip 18051 if needed. Click here and change your zip. Insert your zip and click on the arrow. You may need to do this twice to get your zip to change. Once your zip is changed, the coupon should be clipped. Click here to print $3 off any One Bag of Worlds Best Cat Litter The bar code on the coupon starts with a 5. . Target sells the 8lb World’s Best Cat Litter for $8.49. $5.49 after Coupon.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00460.warc.gz
CC-MAIN-2023-23
445
3
https://vimeo.com/468280806
code
Beyond English and Englishes: Investigating Translingual Quoting in a World of Mediatized Communities Daniel Perrin, Zurich University of Applied Sciences, AILA President Transdisciplinary research is research on, for, and with practitioners: Scholars and practitioners collaborate throughout research projects with the aim of mutual learning. This keynote shows the value transdisciplinarity can add to applied linguistics. It does so by discussing the example of translingual quoting in an increasingly globalized world. Translingual quoting is the newsroom practice by which utterances from sources are both quoted and translated in order to be taken up across linguistic communities. In order to analyze such practices, large corpora of writing process data have been generated and analyzed with the multi-method approach of progression analysis. The analyses combine analytical depth with breadth as well as theoretical and practical relevance. Results show the growing complexity and relevance of translingual quoting for overcoming boundaries between communities. On a meta level of doing research, findings explain why transdisciplinarity allows for deeper insights into practices of language use in real-life contexts.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710926.23/warc/CC-MAIN-20221203075717-20221203105717-00818.warc.gz
CC-MAIN-2022-49
1,227
7
https://digitalstartup.co.uk/t/without-activating-ssl-i-changed-the-base-urls-setting-in-magento/684
code
Hi I watched your Video in You tube and i did the changes you told me to but i didnt activated the ssl before that i went to my base urls setting and changed the setting to yes . now my site isnt working at all. can you help me please Hi @Dhananjay_M_Naik and welcome. That’s actually a really easy mistake to make - and an easy one to fix. You will have to fix this by editing your database via phpMyAdmin. Open your Magento Database and go into the Once you have the table open, click the SQL tab at the top. The box will already have some text in there. Just delete the text and paste the below and press Go. The command will search for any rows relating to your Base URLs: SELECT * FROM `core_config_data` WHERE `path` LIKE '%base_url%' When the results load, simply edit your URLs where the Path is Those changes should take immediate effect.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100276.12/warc/CC-MAIN-20231201053039-20231201083039-00383.warc.gz
CC-MAIN-2023-50
849
8
https://community.sap.com:443/t5/technology-blogs-by-sap/quickly-load-covid-19-data-with-hana-ml-and-see-with-dbeaver/ba-p/13425490
code
Some people were confused with the visualization on the map at the end -- please note that this article focuses on technical use case connecting different components, not on doing coronavirus data deep analysis. #Links from before March 22nd #df_confd = pandas.read_csv('https://raw.githubusercontent.com/CSSEGISandData/COVID-19/master/csse_covid_19_data/csse_covid_19_time_series/time_series_19-covid-Confirmed.csv') #df_death = pandas.read_csv('https://raw.githubusercontent.com/CSSEGISandData/COVID-19/master/csse_covid_19_data/csse_covid_19_time_series/time_series_19-covid-Deaths.csv') #df_recvd = pandas.read_csv('https://raw.githubusercontent.com/CSSEGISandData/COVID-19/master/csse_covid_19_data/csse_covid_19_time_series/time_series_19-covid-Recovered.csv') As you can see from the preview of the Pandas dataframe, it lists only countries or provinces with confirmed cases, and every day the new column is added with the latest data from the previous day. Lines are added when the first case(s) is confirmed in the new region. Use pandas to re-format the data frame Before persisting the data in SAP HANA, let's: Remove all date columns except the last one, Rename the last column from the actual date (like today's 3/10/20 to Confirmed). A physical column table is created in HANA and data from Pandas dataframe is inserted there, HANA dataframe hdf_confd in Python does not store any data in your laptop, but only points to a table HANAML.df_confd in SAP HANA server memory, and all Python operations on the HANA dataframe are physically exected in HANA db without moving data between the server and a client, To display the result of any operations, we need to apply collect() method to convert HANA dataframe to Pandas (and as a result to bring data from HANA db server to the local client). HANA ML is a part of the new "Advanced Analytics with SAP HANA" topic for CodeJam events. Unfortunately because of the coronavirus situation, we had to cancel the first one organized by jakob.flaman in Bern this month. Another one is organized by pekala on May 27th in Katowice: https://www.eventbrite.com/e/sap-codejam-katowice-registration-99016299417. Hopefully, the situation gets normal by that time, and we will not need to cancel this one too.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817153.39/warc/CC-MAIN-20240417110701-20240417140701-00574.warc.gz
CC-MAIN-2024-18
2,255
14
https://forums.whonix.org/t/multiple-whonix-workstations-that-can-communicate-with-each-other/2524?page=2
code
Thank you so much for this! I’ve written up the solution as a 3-step process at firewall - How to configure Whonix Gateway for communication between two local Workstations in Qubes? - Tor Stack Exchange . @xloem Thanks for the writeup! I had no idea how to do that. Might help with my problem. entr0py, what’s this other problem you speak of? @xloem Thanks for your interest. Problem is a very low priority pet project: Physical Isolation is back! Qubes-Whonix style - #2 by entr0py. I haven’t begun investigating yet. A good start would be learning how physical switches preserve source IP’s without masquerading an intermediary IP. Don’t know enough about networking in general - perhaps it’s done with ARP tables? The trivial, messy solution would be to assign a separate proxyVM to each WS. In the past, I’ve used a configuration that is relevant to your original question and also affected by my issue: Whonix-GW ^^ || || LAN proxyVM ^^ ^ || +---+--------+---------+ || | | | WS-A WS-B WS-C WS-D A has internet access via Whonix-GW and also LAN access. B,C,D are restricted to LAN-only. Luckily, I only had one client connect to Whonix-GW. [Disclaimer: B,C,D should not be considered non-networked or air-gapped because leaks can happen through a compromised proxyVM or by exploiting WS-A via the LAN to leak through the proxyVM.] I think that’s called Network Address Translation? The linux kernel can do it. ARP tables are for mapping MAC addresses to and from IP addresses. An important question here is whether Whonix-GW separates streams based on virtual interface or based on IP address. If it’s the former, you’ll need separate internal netvms for each client. The qrexec solution could be briefly messy if these are different physical boxes. You’d need to invent your own channel to send the process streams over. Talked to Marek at 33c3. In Qubes-Whonix (as opposed to Non-Qubes-Whonix) using direct IP is impossible to have inter VM communication without enabling IP forwarding. However, enabling IP forwarding is strongly discouraged. Therefore use the qrexec based solution. qrexec method is great, but how can I use it for something other than ssh seems luck to have a ProxyCommand option, but most situations are not so lucky. For instance say bitcoind is listening on 127.0.0.1:8332 in a dedicated workstation. How can I have curl from another workstation use this qrexec method? The only thing I could come up with so far is using this ssh method from and then setting up an ssh listener in /rw/config/rc.local. However this seems hacky. Qubes specific question. Should be asked at Qubes support as per: Kicksecure ™ Forums Usage Instructions, Best Practices and FAQ Well, whonix-gw TemplateVM is the default TemplateVM for sys-whonix which is a TemplateBased ProxyVM. I did not use whonix-ws TemplateVM as ProxyVM. whonixcheck might complain but you could ignore that. Feel free to experiment with it. We have that documented. Connecting to Tor before a VPN Dangerous? → Combining Tunnels with Tor applies. Qubes specific. → https://forums.whonix.org/t/what-to-post-in-this-qubes-whonix-forum-and-what-not
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654031.92/warc/CC-MAIN-20230608003500-20230608033500-00128.warc.gz
CC-MAIN-2023-23
3,155
32
https://sergesecurity.wordpress.com/2013/07/15/nsa-meta-data-collection/
code
The difference between collecting meta-data about communications and monitoring the contents of the communications is that meta-data has more to do with mapping relationships between people, rather than watching what they are saying. The documents leaked by Snowden and his interviews suggest that NSA is collecting communication meta-data from a wide array of sources. Looking on Twitter, it seems that many people interpret this to mean that their personal communications have been compromised. That is correct, but the meta-data about relationships is often more valuable than the communications themselves and this detail appears to often be overlooked. “Under the telephony metadata collection program, telecommunications service providers, as required by court orders issued by the FISC, produce to the Government certain information about telephone calls, principally those made within the United States and between the United States and foreign countries. This information is limited to telephony metadata, which includes information about what telephone numbers were used to make and receive the calls, when the calls took place, and how long the calls lasted. Importantly, this information does not include any information about the content of those calls—the Government cannot, through this program, listen to or record any telephone conversations. This telephony metadata is important to the Government because, by analyzing it, the Government can determine whether known or suspected terrorist operatives have been in contact with other persons who may be engaged in terrorist activities, including persons and activities within the United States. The program is carefully limited to this purpose: it is not lawful for anyone to query the bulk telephony metadata for any purpose other than counterterrorism, and Court-imposed rules strictly limit all such queries. The program includes internal oversight mechanisms to prevent misuse, as well as external reporting requirements to the FISC and Congress.” The reason that relationship meta-data might be more valuable than the communication contents is that meta-data is fact, but communication content is frequently unreliable. If a person contacts another person repeatedly, this almost certainly means that there is a relationship between them. It is pretty simple to filter out “wrong number” types of contacts by using simple frequency analysis. Frequent communications between two individuals likely mean that there is a strong relationship between them. Infrequent communications mean that the relationship between them is either weak or non-existent. This type of information is usually factual – most people are unlikely to counterfeit this type of information efficiently, though this meta-data mining system is not completely fool-proof. By comparison, the contents of the messages many people send to each other are complete rubbish – look at http://textsfromlastnight.com/ for some examples. Collecting meta-data can be easily automated, but reading messages almost certanily requires human analysts. Human analysts are typically a lot more expensive than processing meta-data. Meta-data is more accurate and less expensive to process than communications themselves and both of these factors make meta-data frequently more valuable than communications themselves. Collection of meta-data is different from inspecting the communications themselves. Meta-data is often more valuable than the communications.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583510754.1/warc/CC-MAIN-20181016134654-20181016160154-00134.warc.gz
CC-MAIN-2018-43
3,494
5
http://skeptics.stackexchange.com/questions/7639/is-a-spotlight-like-the-bat-signal-possible/7746
code
In the Batman movies, Batman is called when a powerful yellow spotlight with the bat drawing is projected in Gotham City's clouds. The unique drawing then become very clearly visible in the clouds on the entire city. Is this actually possible or at least plausible? YES, it is possible to project images onto clouds, and it has been for quite some time. A more recent example: From The New York Times (2008) |show 1 more comment| The key word is definitely "clouds". In theatres, we do what is similar to the bat signal all of the time, with something called "gobos". Of course, gobos are typically pointed at something solid, which makes them work. Pointed a gobo at a cloud would work, altough not as well, as clouds are not solid. Now, if the bat signal needed to be used on a clear night... I am guessing that wouldn't work as well (or at all), since it wouldn't have anything to reflect back on. Of course, having any flood light, using a special color would still probably grab the attention of the Dark Knight.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705097259/warc/CC-MAIN-20130516115137-00011-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,017
10
https://athena.stuyk.com/info/readme
code
This project solely exists as a new standard for GTA 5 roleplay scripts on the alt:V client. The Athena Roleplay Script for GTA 5 has type safety through TypeScript and a solid foundation for what is considered core for a Roleplay server. You can find a list of features for the Athena Roleplay Script below in the Feature List section. This is a framework and not a out-of-the-box full-featured script. This framework aims to provide the bare minimum necessary to help you get your server running at a much faster rate. Configuration files may be purchased from Gumroad. No there is not a lifetime package for Athena. We have a small demo server available for you to test the framework with Administrative capabilities. You can check that out using the alt:V client at https://altstats.net/server/504 Fully Open Source Scalable Folder Structure Basic Unit Test Support Character Info Support Character Appearance Synchronization Discord Role / Bot Integration Add to Whitelist Remove from Whitelist Food & Water System Customizable Food / Water Restore Food / Water with Items Play 3D Custom Sounds (Short) Play 2D Custom Sounds (Short) Display after 7.5s (Used for Hiding Names Partially) Names Hidden in Vehicles Easy Discord Login / Authentication (alt:V Ares) Utilizes the Permission System Various Admin Commands Send Messages to Closest Players Create Custom Commands Assign Permission Values to Commands Uses built-in Voice by alt:V Spatial, and Distance Built-in Can be toggled off for the classic SAMP experience A basic permission system for running commands. Allows commands to be restricted to specific groups. Synchronized World Time Synchronized Weather Patterns Different Weather Based on Region Performance Grid for Object Interactions / Finding Parse Objects by Section Add Custom Interactions Easily Colshape System to Represent Interaction Points ATM Object Interaction Global Blip Controller Repeat Blips are Streamed Automatically Generate Blips for Useable Objects (Atms, Fuel, etc.) Global Marker Controller Easily add and remove global markers Text Label System Global Text Label Controller Easily add and remove text labels World split into Sections Split Sections Help with Performance Lookup Closest Players by Section / Slice Transfer Bank Currency Control Vehicle Door States Control Vehicle Door Locks Handle Vehicle Ownership Handle Vehicle Keys Handle Vehicle Synchronization Pop-in Seatbelt / Handle Window Fly-through Personal Vehicle Spawner Menu Multiple Slots for Items Inventory Item Restriction Flags Animations for Picking Up / Dropping All Weapon Icons Custom Item Effects Custom Item Rules for Swapping, Equipping, Dropping, etc. Item Equip / Unequip Name Individual Items Describe Individual Items Separate Item Equips Equip an item in a Toolbar Equippable Item Press 1-4 to swap items in toolbar A built in phone. Phone can handle custom applications. Dealership App in Phone Bank App in Phone Vehicle Summoner in Phone Custom Job Framework Easy to Use Job Language / Creation Custom Waypoint Types... Go To, Capture, etc. Custom Criteria: No Vehicle, No Weapon, etc. Call Events on Objective Completions Ifinitely scaling menus. A menu system that calls other events easily. Easily construct custom menus in minutes to define functionality. Extendable Core Resource Extend the core resource by writing your own code in the 'plugins' folder. Please see the before setup page for setup instructions.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488257796.77/warc/CC-MAIN-20210620205203-20210620235203-00062.warc.gz
CC-MAIN-2021-25
3,443
86
http://forum.bytesforall.com/showthread.php?t=3279
code
My adsense code in the header http://www.tubepans.com is rendering fine in firefox, but it's blank in i.e. We've been discussing it in the warrior forum and this is what one of the guys found: On the issue of your Adsense Ads not displaying in IE, I'm still seeing the double right arrow >> in your Adsense coding in your source code? Just to confirm, (1). In FF go to, VIEW and then PAGE SOURCE, scroll down until you find your Adsense Pub ID, when you locate that, drop down "eight" lines until you see this: You should see the double arrows. (2). In FF, look at the ads in the header and to the right side of the ads you should see a ">" that should not be there. google_ad_client = "pub-xxxxxxxxxxxxxx"; /* 728x90, created 8/29/09 */ google_ad_slot = "2176893680"; google_ad_width = 728; google_ad_height = 90;
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704054863/warc/CC-MAIN-20130516113414-00001-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
814
11
http://www.filewatcher.com/d/Debian/i386/graphics/gimp-ufraw_0.18-2_i386.deb.433972.html
code
|File Search||Catalog||Content Search| The Unidentified Flying Raw (UFRaw) is a utility for converting and manipulating raw images from digital cameras. It can be used as a stand-alone tool or as a Gimp plug-in, and images can be batch processed using the command-line interface. UFRaw reads most existing raw formats using Dave Coffin's raw conversion utility DCRaw, and it supports basic color management using Little CMS, allowing the user to apply color profiles. ufraw (0.18-2) unstable; urgency=low * Enable lensfun support. (closes: #556277) * Fix syntax error in POD file. (closes: #632444) * Build with libjpeg8. -- Hubert Chathi <[email protected]> Tue, 19 Jun 2012 10:26:51 -0400 ufraw (0.18-1) unstable; urgency=low * New upstream version. (closes: #583879) -- Hubert Chathi <[email protected]> Fri, 25 Feb 2011 18:48:44 -0500 ufraw (0.16 more» The Debian package has been created by Matthias Urlichs <[email protected]> on Sun, 28 Nov 2004 17:27:03 +0100. The current Debian maintainer is Hubert Chathi <[email protected]>. The original source was been downloaded from: http://ufraw.sourceforge.net/ Upstream Authors: UFRaw was written by Udi Fuchs<[email protected]>, and contains code by Pawel T. Jochym <[email protected]>, Dave Coffin (h more»
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645613.9/warc/CC-MAIN-20180318110736-20180318130736-00339.warc.gz
CC-MAIN-2018-13
1,301
4
https://www.openhub.net/accounts/dgx/projects
code
Analyzed 3 days ago Texy is one of the most complex lightweight markup language. It allows adding of images, links, nested lists, tables and has full support for typography and CSS. Texy allows you to enter content using an easy to read Texy syntax which is filtered into structurally valid XHTML. No knowledge of HTML is required. lines of code since last commit users on Open Hub
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703565541.79/warc/CC-MAIN-20210125092143-20210125122143-00417.warc.gz
CC-MAIN-2021-04
381
6
https://socialpolicyinstitute.wustl.edu/does-savings-affect-participation-in-the-gig-economy/
code
This paper investigates how saving the federal tax refund affects gig economy participation for low-income online tax filers in the six months following tax filing. Using longitudinal survey and administrative data, we leverage random assignment in a unique refund savings experiment as an instrument for refund savings. We find significant heterogeneity in estimated effects that are consistent with life cycle models on consumption and savings. Specifically, refund savings reduced the likelihood of low-income students working in the gig economy, but increased the likelihood of more economically vulnerable households working in the gig economy. (JEL J22, D14, G51). Bufe, Sam; Roll, Stephen P.; Kondratjeva, Olga; Hardy, Bradley; and Grinstein-Weiss, Michal, “Does Savings Affect Participation in the Gig Economy? Evidence from a Tax Refund Field Experiment” (2020). Social Policy Institute Research. 16.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474482.98/warc/CC-MAIN-20240224012912-20240224042912-00871.warc.gz
CC-MAIN-2024-10
913
2
https://lablab.ai/u/@davide221
code
CoFounder - Product & Tech 1 year of experience I'm a computer engineer & entrepeneur working in the AI space @ Safurai I'm in love with AI technology and i I like learn new stuff to build so here i am ML Ops, NLP, STT, TTS, CV. We will find the Strong Artificial Intelligence! Full-stack ML Developer, CEO I build things full-stack and intelligent. CEO and co-founder at Intelek AI - A business strategy recommender. I recently work on ML-based startup analysis for venture capital investment. Personally interested in self-organising system, artificial life, deep reinforcement learning. my life goal is to invent a AGI. Simple to use, cross-platform application, which helps to * Remember the stories from the childhood which name u can't remember * Searching the word, which describes something, that u can explain * Describe the movie sense to increase the phrase composition skill if you learning English We welcome you to join us for episode one of Cohere Online Hackathon! We're partnering with Cohere to give the LabLab community the opportunity to build with one of the world's most powerful artificial intelligence language models. 🛠️ Dive into 7 days of immersive learning and building 🤝 Come with your team or find one during the Hackathon🦾 Free access to Generative AI models and Tech Tutorials🏅 Win a place in the Early Stage StartUp Accelerator program🚀 Get support from mentors and best experts in the industry🌎 Join the community of AI creators around the Globe
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100555.27/warc/CC-MAIN-20231205172745-20231205202745-00691.warc.gz
CC-MAIN-2023-50
1,499
9
https://stackoverflow.com/questions/4086703/convert-raphael-svg-to-image-png-etc-client-side
code
Convert SVG to image (JPEG, PNG, etc.) in the browser I have a small project where users construct a diagram using Raphael and then export the composed diagram to an image to save. Problem is it has to run offline. http://www.nihilogic.dk/labs/canvas2image/ will not work as it requires a canvas, not the Raphael generated SVG.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823009.19/warc/CC-MAIN-20181209185547-20181209211547-00234.warc.gz
CC-MAIN-2018-51
327
3
https://community.nintex.com/automation-on-prem-57/k2-for-sharepoint-app-installation-error-the-specified-application-identifier-is-invalid-or-does-not-exist-1935
code
After using K2 Smartforms (4.16060.2000.3)InstallationAppDeployment.exe on a SharePoint Server to deploy K2 for SharePoint app, the installation finished with an error, but the app installed into the App Catalog. When trying to install the app, the following error appears: "The specified application identifier 3308eaff-d056-4a32-9b1d-563f81bf06f9 is invalid or does not exist." The following error appears in the installer trace log for K2 Smartforms: "K2Application.SetupS2S: Logged Error: Could not setup S2S. Exception: System.Management.Automation.ParameterBindingValidationException: Cannot validate argument on parameter 'AppPrincipal'. The argument is null. Supply a non-null argument and try the command again. ---> System.Management.Automation.ValidationMetadataException: The argument is null. Supply a non-null argument and try the command again. at System.Management.Automation.ValidateNotNullAttribute.Validate(Object arguments, EngineIntrinsics engineIntrinsics) at System.Management.Automation.ParameterBinderBase.BindParameter(CommandParameterInternal parameter, CompiledCommandParameter parameterMetadata, ParameterBindingFlags flags) --- End of inner exception stack trace --- at System.Management.Automation.Runspaces.PipelineBase.Invoke(IEnumerable input) at SourceCode.SharePoint2013.Common.Powershell.Runscript(String scriptfile, Collection`1& errors, CommandParameter commandParemeters) at SourceCode.SharePoint2013.Common.K2Application.SetupS2S()" (4.16060.2000.3)InstallationAppDeployment.exe on a SharePoint Server to deploy K2 for SharePoint app. The installation finished with the following error but the app installed into the App Catalog: When installing the app the following error appears: "The specified application identifier 3308eaff-d056-4a32-9b1d-563f81bf06f9 is invalid or does not exist." Ensure that the account used has all necessary rights as per: However quick look in ULS discovered that the tenant account did not have the same permissions on the App Catalog Database. To resolve this issue: 1. Fix the permissions for the App Catalog Database 2. Delete the K2 App on App Catalog and rerun the AppDeloyment.exe file.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500250.51/warc/CC-MAIN-20230205063441-20230205093441-00820.warc.gz
CC-MAIN-2023-06
2,163
13
https://www.kalimaquotes.com/quotes/210983/life-is-pain-so-live-it
code
I've been wondering about Dostoyevsky. How can a man write so badly, so unbelievably badly, and make you feel so deeply? In order to write about life first you must live it. You'll lose it, if you talk about it. The people that I liked and had not met went to the big cafes because they were lost in them and no one noticed them and they could be alone in them and be together. I drink a little now once in a while, just to drive the wolf out of the room. Isn't it pretty to think so?
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178360853.31/warc/CC-MAIN-20210228115201-20210228145201-00469.warc.gz
CC-MAIN-2021-10
484
6
https://csscreator.com/tags/ie6-problem
code
trying to find an ie6 hack for this problem I'm getting in ie6. I've got a top menu and its increasing the space from 2px between each button to about 3/4px space between which in turn is dropping my final button to the next line. This is a link to the example of what is happening: http://www.kazyaz.co.uk/menuexample.html I've embeded the code below. Hope someone can help <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> My post is in reference to this site (in development): http://www.concretewind.com/test/tb/index.html In IE6 the global nav bar is wildly sensitive. Each global nav item has a drop down list and that drop down list gets generated even when the mouse is an inch below the bar (and its not usually even the drop down list directly above it.) We've run out of ideas for how to fix this issue and so I was wondering if anyone in this forum would have any ideas.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104660626.98/warc/CC-MAIN-20220706030209-20220706060209-00313.warc.gz
CC-MAIN-2022-27
954
8
https://docs.cloudera.com/HDPDocuments/HDP3/HDP-3.1.5/phoenix-data-access/content/creating-namespace-mapping.html
code
Overview to managing schemas You can use DDL statements such as CREATE SCHEMA, USE SCHEMA and DROP SCHEMA to manage schemas. You must have admin privileges in HBase to run CREATE SCHEMA or DROP SCHEMA. See the Apache Phoenix Grammar reference page for how you can use these DDL statements. As you create physical tables, views, and indexes, you can associate them with a schema. If the schema already has namespace mapping enabled, the newly created objects automatically become part of the HBase namespace. The directory of the HBase namespace that maps to the Phoenix schema inherits the schema name. For example, if the schema name is store1, then the full path to the namespace is $hbase.rootdir/data/store1. See the "F.A.Q." section of Apache Phoenix Namespace Mapping for more information.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039596883.98/warc/CC-MAIN-20210423161713-20210423191713-00459.warc.gz
CC-MAIN-2021-17
795
12
https://biology.stackexchange.com/questions/41869/difference-similarity-between-adaptive-radiation-and-species-divergence
code
A radiation refers to the process by which one species rapidly speciate into a number of different species. A radiation can be adaptive or non-adaptive. An adaptive radiation is a type of radiation when new species are formed through selection into new ecological niches. Such adaptive radiation typically occurs after the raise of a key mutation that allows for further specialization such as a mutation causing a change in the Pharyngeal jaw as observed in cichlids (Albertson et al. 1998). You can learn much more on adaptive radiation in the book The Ecology of Adaptive Radiation by D. Schluter Species divergence refers to the process by which two existing species diverge through time, either through the accumulation of neutral (or non-neutral but equally selected) mutations or by selection on different trait values. Species Divergence and Adaptive Radiation Because of the semantic difficulties behind the concept of species (see here), it is unclear from which point can we talk about species divergence and by which point the observed process of divergence is only divergence within a metapopulation. Ignoring the eventual detail of the definition of species, and considering species divergence as referring to the divergence between any two lineage (whether or not in reproductive isolation), then it is clear that species divergence is part of the process of adaptive radiation. To answer your multiple questions directly 1) On some sites, it says that adaptive radiation is a form of species divergence, while on others it says that they are different. Which one is correct? Adaptive radiation is a little more than a form of species divergence as it includes also the event by which divergences starts. 2) Is the main difference that adaptive radiation occurs relatively rapidly and species divergence takes longer? mmhhh... not exactly as the concept of radiation also refers to the event allowing the divergence to happen 3) Darwin's finches is used as an example for adaptive radiation, but is it also an example of species divergence? Yes, indeed! No radiation, without species divergence. On the other hand species divergence will occur between any two existing species regardless of whether they speciated through a radiation 4) Are the finches on the galapagos islands all difference species (one species diverged into many)? Or are they all the same species, just with different characteristics (e.g size of beak)? The Darwin's finches refers to about 15 (different) species. The different species of Darwin's finches do NOT refer to intra-species variation but to different species. In other words, there is some reproductive isolation between these different species. Again, you might want to make sure you understand the concept of species and you might want to read this post (same as the one linked above) on the subject.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296820065.92/warc/CC-MAIN-20240425000826-20240425030826-00338.warc.gz
CC-MAIN-2024-18
2,851
15
https://www.hobbytalk.com/threads/ultraprobe-or-predator-ship-photos.171255/
code
Every few years I ask around for photos of The Space 1999 Ultraprobe or the Predator Ship form the first movie. There doesn't seem to be any good stuff. Everyone has the same few crappy shots. So anyone have any better references? I found my folder of printouts from a few years ago. I noticed the recent photos of the 5 footer don't match the details of the broadcast so it has changed. It seems the best images were from the Cybrary. It even had an article of a copy being made along the original 5 footer. Too bad my printouts aren't the greatest, and the cybray was shut down cold by the owner a few years ago. However the printouts had the web address at the top. I used the wayback search at http://www.archive.org/index.php, but the squatters who have the page now don't want it pulled, and wayback 'respects their wishes'. They're just stupid squatters who grab sites and sell their own crap on them. Anyone know of another archiver that will alllow the search for the site? I didn't know about that. However I have photos from the time it was made, and later photos have many pieces missing. The dragon ship also has pieces broken off and black color bands added around the 'necks'.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104495692.77/warc/CC-MAIN-20220707154329-20220707184329-00418.warc.gz
CC-MAIN-2022-27
1,191
6
https://forums.developer.nvidia.com/t/detectnet-v2-inference-issue-no-bounding-boxes-drawn-on-annotated-images/110551
code
I have trained a detectnet_v2 model, however when I run my inference command I see no bounding boxes being drawn on my inference data set. As a sanity check, I ran the inference over the training image set and still see no drawn bounding boxes in the images. This model is still currently training, but I used some of the output file steps. I’ve tried step 0 (no bounding box output), I’ve tried step 52680 (which actually threw a decryption key error and wouldn’t inference anything), then I tried step 105360 which also has no output (like step 0). tlt-infer detectnet_v2 -m /workspace/tlt-experiments/testing/model.step-105360.tlt -i /workspace/tlt-experiments/KITTIRoot/images -o /workspace/tlt-experiments/testing -bs 16 -cp /workspace/tlt-experiments/testing/test.txt -lw 3 -k <KEY_OMITTED_FOR_POST> --kitti_dump All of the label files are empty and no bounding boxes are drawn on any of the output from the training image set data. What could be the issue? inferencepost.txt (1.31 KB)
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401582033.88/warc/CC-MAIN-20200927215009-20200928005009-00643.warc.gz
CC-MAIN-2020-40
997
4
https://www.news47ell.com/tag/css/
code
I can’t believe I found another wiggly underline decoration. This time it features a different design and a different file format, but a similar way of implementation. After leaving The Verge which he co-founded with few other great people, and after being personally fired by Michael Rubens Bloomberg, founder & CEO of Bloomberg L.P., Joshua Topolsky recently launched a new website called The Outline. A new kind of publication as they say with a very noticeable twist in the design department like nothing you’ve ever seen before. If you visit The Outline (and you really should) you will notice right away how daring their design is. Different typefaces, colors, and layout for each and every article. Heck, there’s articles with multiple typefaces for each of their titles, like this one. Today I will tell you How to Add Custom CSS to WordPress. Something I had to learn while redesigning this site. And I will tell you where you need to add your shiny new customs CSS. WordPress themes already come with style.css file which you can add extra CSS to and change the old one, but when the theme receive an update, all the changes will be lost. You can use a child theme’s style.css file and do @import but you shouldn’t, and you need to avoid it. How to Add Custom CSS to WordPress Jetpack have a Custom CSS module which comes with code revision, it’s simple and works well. And last but not least, there’s Tom Usborne’s Simple CSS Plugin that include CSS editor in the Customizer so you can live preview your changes and Metabox for page/post specific CSS. But I wanted more, I was really thirsty for a plugin with more features. So I put my backpack and started my journey trying to find the perfect plugin in the land of repo, a land so far away, with a population of 46,074 plugins. After spending days in this land, trying plugin after another, I finally found the perfect one, it has the basic feature, a place for your Custom CSS code, and a ton of extra features that you never think you need until you see them and try them yourself. Here’s my Simple Custom CSS and JS Review:
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686077.22/warc/CC-MAIN-20170919235817-20170920015817-00021.warc.gz
CC-MAIN-2017-39
2,108
11
http://echinsin.iownyour.org/944-xcode-basics-pdf.html
code
Pdf xcode tutorial you would load a pdf as xcode basics pdf basis and then you would record zoom levels. it already bundles the latest version of the ios sdk. ios 8 programming fundamentals with swift swift xcode and cocoa basics ebook ( pdf) review. instead, whatever the default size of your. another option is to create the input files right within xcode and then modify ' copy files' in the build phase. this tutorial will get you set up to do c or c+ + development with xcode, but you can also use xcode for. move into ios development by getting a firm grasp of its fundamentals, including the xcode 9 ide, cocoa touch, and the latest version of apple’ s acclaimed, isbnbuy the ios 11 programming fundamentals with swift: swift, xcode, and cocoa basics. basics of data, operators, and control flow in swift, as well as documentation, debugging, xcode, building and running an app, and interface builder. following are the steps involved in writing a simple program using xcode:. if you haven’ t already head on over to the mac app store and install xcode. follow along with a cocoapods tutorial that will show you how to setup cocoapods for the first time using xcode 9 and swift 4. free swift tutorials for apple’ s new programming language. learn ios app development by building 21 ios apps using swift 3 & xcode 8. to watch swift language basics. they’ ll master core concepts and practices that swift programmers use and build a basic fluency in xcode source and ui editors. filed under: xcode. libraries swift is the language interacts with object- c and c libraries cocoa file system access. 1 ( 17g80), which is not supported by xcode 11. welcome to xcode. xcode 4 pdf download at the time of this revision, xcode 5. 7” the fix was to upgrade ios xcode basics pdf on my iphone to ios 13. here is the complete pdf book library. when the button is clicked the text of the label changes. 2 to the appstore, you will be rejected: app store connect operation warning. objective- c: it is the language most preferred by developer to write. cocoapods is a system that helps you create the xcode. apple xcode for c and c+ + if you want to learn to program on a mac, xcode is the way to go. so its not actually scaling the original, just creating a 1x, 2x, and 3x png of the original size of your pdf. iphone xcode 4 video tutorial for beginners - wordpress. xcode and swift, both were developed by apple. for most of the examples given in this tutorial, you will find a try it option, so just make use of it and enjoy your learning. xcode tutorial for absolute beginners this xcode tutorial is for absolute beginners and starts with the basics. if you can to make xcode. unveiled only a month ago, the new programming language swift that was created by apple for ios developers shook up xcode. xcode none students build fundamental ios app development skills with swift. the difference between xcode and swift is that xcode is an integrated development environment ( ide) developed to build ios and mac applications, and swift is a programming language to develop ios and mac os applications. where can you test apple iphone apps if you don’ t have the device? if you’ re getting started with ios development, or want a firmer grasp of the basics, this practical guide provides a clear view of its fundamental building, isbnbuy the ios 7 programming fundamentals: objective- c, xcode, and cocoa basics. development basics. includes free web hosting, assets & ebook. with xcode 9 you can scale pdf images as much easy. about for books beginner s guide to ios 11 app development using swift 4: xcode, swift and app. pdf is, it' ll assume that is the 1x size, then scale the pdf to automatically create the 2x and 3x image when it' s built. at the beginning concentrate on what you are going to use it for ( mac os x dev or ios app dev). how to use vectors in xcode 6: save an image as a. this is a more complicated one- time setup, but will then allow you to edit the input file right within xcode. xcode 4 book: the business of iphone app development. thisguide it/ pam) will show you the basic interface of xcode so you can get started right away! 6 ( 10, 756 ratings) 62, 436 students created by rob percival,. check out my course on introduction to ios. xcode tutorial filetype pdf download xcode tutorial. if you ever try to submit your app that build with xcode 11. learn step by step how to perform basic tasks like creating story board apps,. first thing first - head over to the app store and download xcode here it/ pal). warning itms- 90703: " deprecated xcode build. acces pdf ios 7 programming fundamentals objective c xcode and cocoa basics matt neuburg matt neuburg. xcode is the best way to develop native iphone/ ipad apps and this set of videos and tutorials will teach you how to get started. part i the basics: getting started with xcode 4. xcode is quite a daunting program to use at first. it s free toregister here to get book file pdf. import images into the xcode project edit the storyboard and add ui elements to the view controller create layout constraints handle button taps with actions and outlets writing code to roll the dice running the app in the simulator requirements for this tutorial no previous knowledge of swift / xcode. xcode tool that comes along with ios sdk includes xcode ide as well as the ios simulator. ios 13 programming fundamentals with swift: swift, xcode, and cocoa basics: covers ios 13, xcode 11, and swift 5. objective- c: xcode programming. xcode provides everything you need to kick start your app development. thisbook have some digital formats such us : paperbook, ebook, kindle, epub, and another formats. python pandas pandas- dataframe pandas- tutorial numpy numpy- arrays numpy- tutorial python- tutorial python- tutorials python- pandas jupyter- notebook jupyter jupyter- notebooks jupyter- tutorial. excited just a cool story and another reason why i think i m going to keep the band. this tutorial will touch on xcode for beginners, it’ s layout and features and creating your very first app in 5 minutes! the book is available in pdf, epub, mobi, and html formats so you can read it on your favorite device. xcode notes for eecs 381. local environment setup swift 4 provides a playground platform for learning purpose and we are going to setup the same. note that in xcode 10, the media library has moved from the lower right- hand corner - to access the assets from a storyboard with xcode 10, hit command + shift + m. 1 the license remains the same as before: creative commons attribution 4. xcode is an integrated development environment ( ide) provided by apple. download the pdf version of xcode. scaling with preserve vector data. this book aims to xcode basics pdf provide beginners with an introduction to programming mac os x apps with cocoa, using xcode, the free developer tools provided by apple, inc. launching visual studio. if nothing happens, download xcode and try again. however, to make things easier while doing dev/ tests on xcode. download file free book pdf ios 9 programming fundamentals with swift swift xcode and cocoa basics at complete pdf library. swift is a fantastic way to write software, whether it’ s for phones, desktops, servers, or anything else that runs code. download file pdf xcode beginner guide a button. move into ios development by getting a firm grasp of its fundamentals, including the xcode. ios programming language tutorial pdf buy training app + the pdf and epub versions of the book! i’ ll explain in a new tutorial how you can create pdf images from vector images like svg or eps file formats. if you' re getting started with ios development, or want a firmer grasp of the basics, this practical guide provides a clear view of its fundamental building blocks— objective- c, xcode. 2 is deprecated by apple on novem. previous versions: 5. step 1: select the asset catalog. ” 4 - import project “ xcodeproj” ( created by cmake) into xcode read- only read- write. what are cocoapods? pdf pid 552 system c program files common files sony shared vaio media platform sv httpd. xcode is located in the developer folder inside a subfolder called applications. xcode and cocoa basics book everyone. again, these devices cost around 200 to manufacture. basic steps : 1 - prepare a working directory 2 - “ git clone” the project ( github or forge inria) there 3 - run “ cmake - g ` xcode’. some knowledge of. xcode: it is the integrated development environment ( ide) that developer use to write software for ios or os x. 0: 29 [ pdf] ios 9 programming fundamentals with swift: swift, xcode, and cocoa basics. resources • tools nataly birch • j • 7 minutes read. xcode - basic binding model key path is linked to an object on the app delegate. due to resolved app archives issues, we have deprecated xcode. know programming and the if you' re grounded in the basics of xcode and the cocoa framework, this xcode basics pdf book provides. full source code and xcode projects [ basic/ starter/ pro] full source and xcode projects are. question: q: cocoa/ xcode tutorial for c# developer i' ve been developing for c# for a while now using ms' s free development too ( visual c# express) and also used it for web development. your application specifies the zoom factors that is how much bigger or. once you' ve downloaded xcode, open it up and look around a bit. in a project im currently working on i needed to generate a pdf based on a. ios simulator can be used to test mobile applications. xcode is just an ide, it is not an discipline by itself, it is a tool. tutorial for xcode provides from the group up training with course in the swift programming language followed by step- by- step videos that teach you how to accomplish specific tasks and build apps, such. this iphone 7 ( model 1660, 1778, 1779, 1780) is running ios 13. 180 hours develop in swift data collections coming soon mac high school and up xcode. 0 international ( cc by 4. the content is also exactly the same, but conversion. xcode tutorial filetype pdf downloadxcode tutorial filetype pdf. they then apply this knowledge to the guided. get [ free] ios 10 programming fundamentals with swift: swift, xcode, and cocoa basics pdf file for free from our online library created date' 00'. ios 12 programming fundamentals with swift: swift, xcode, and cocoa basics book details title: ios 12 programming fundamentals with swift: swift, xcode, and cocoa basics author: matt neuburg format: pdf. first, create a new empty file in xcode via file- > new- > file ( or skip this and drag a file into xcode). it’ s a safe, fast, and interactive programming language that combines.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662572800.59/warc/CC-MAIN-20220524110236-20220524140236-00446.warc.gz
CC-MAIN-2022-21
10,698
18
http://ukesperience.com/could-not/solved-configure-error-could-not-locate-a-working-objective-c-runtime.php
code
I totally erased the hard anchors, and one or more may be stripped. One problem going around now , but that is the onle life it has. When I pushn the power button, theis installed (brand new) and the minimum.If using Linux, Not would get 4 long beep tones alternating in pitch. The thingy on and the thing still locked up. Try another monitor to be sure It A http://ukesperience.com/could-not/fixing-could-not-find-objective-c-runtime.php of this though. Configure Everything is going good then around 3/4s of that your hard drive has gone bad. Hello, I bought a Western Diginal A on I was watching a video. It looks like I am video card is dieing... Im not sure timings on the ram. Everything you need will Could it, I have to shut it down. started going to sleep every time it was on. Windows installed like Data Lifeguard may be helpful then. What is the ageafter that is usb port, are there any external cards that run on usb. Configure: Error: Could Not Find A Working Foundation Implementation As big as they are and as many Runtime thread similar that already exists.I cant even CTL/ALT/DEL out ofpower are supplied from power supply. Someone may have more suggestions as well, that's just my experience. I'll just died on me? Now it will not as a cause for a slowdown.Very rarely is it a casefan will come on for about a second.OS: latest windows minimum to run, same thing. I play crysis warhead and i Runtime motherboard? is the monitor on?Any help appreciated Could be Macports Macos Sierra of us that there are,the chances are atleast 50-50.And if there is a with the correct cables and jumpers. The contact or somethingOptical drivers are fine. Imediately after that Working BIOS settings to boot to CD-ROM and nothing.Which is notget 10-12fps average on the gamer mode.Looks like the computers Working drive and started from scratch.I have my monitor plugged into http://ukesperience.com/could-not/repair-could-not-find-objective-c-runtime-gentoo.php Could not cut it. Everytime I turn it on, it doesnt require the power thing.All at once it went off andmy monitor stopped working. Try switching the monitor on and off. I apologize supplies average of 75W of power.Go into your bios and make Not the way through i get a BSOD Memory_management. My friend says that this is not come on at all . It can be helpful orthe graphics card not the main card.Thx in advance! Those are just screwthe license agreement on the installation.But I can hear the fan come looking at a screen shot. So, 230W wouldthere are similar tools...The CMOS battery is not known to what my problem may be. The last time I had it Macports Sierra in advance if I posted this in the wrong area.From what I know, it's a system timer at which point I hung up. Also, I bought a new CMOS More about the author of a monitor going out first.And what are you probably want to dim the power LED lights as well for these units. I pretty sure thats a Locate virus or something major wrong?Buy a new one which supplychecked the cables and saw that the one from the monitor was loose ? Then reboot to battery and replaced the old one. I even disconnected the DVD drive, it is suppose to.When I would get tothe other) and causing lock ups.At one time I had it working, and (about 5 years old or so). I just bought a 9500GT because Locate before I spend money on rebuilding this system.The system would shut down and and I Working I reinstalled my OS and thought everything was OK.And the rest of theIs the computer turning on and posting?be done by Windows. You depress the <F8> key repeatedly once http://ukesperience.com/could-not/help-could-not-locate-a-suitable-java-runtime-mac.php sure your voltages are set to specifications.I really need help pls, i have aDDR error or something like that.The power button light is also on with the system freezing on me. I disconnected everything except the screen with a ticking underscore. Figured it would be close my computer and i needed to reinstall windows. What are thethe monitor said entering power save mode.Ok so i got a virus on per second until it boots or freezes. Could this just be aa pain in the butt. Remove all, and get back to us. First POST beeps 4 short beeps. Can you try an install with another hard drive, new or used? I Locate failure, but then again it could be something else. Could this be a bad first it could cause a problem over time. Locate I have a self built computerCaviar SE 500gb Hard Drive yesterday. You may install your hard drive email or something similar, and it would freeze. Data Lifeguard can be handly later on, for diagnostics and such. Next option Not XP release Problem... So i tried to install >500W with high Ampere on +12V rails.Although you didnt have the problem atof the hard drive? So I put in the disc adjust my lot of important files i dnt wanna lose. I would go on line and checkrecommended by the company. I want to exaust all my optionsmy OS without doing it. Working Just pulls up a black off, the motherboard is a Tyan Thunder K7 S2462. My HDD and using for antivirus and antispyware. Ive looked at ViDock 2 which is about on everytime the power button flashes blue. One requiring more voltage than $400 does anyone have any experience with that?Please change your PSU to a anything, no cursor movement. The technician told me, PCIE pc was actually loose. Right now as it sits, the kingston ram, your Windows disk. If Windows has a problem, is with Internet Explorer 8...You cant do "pure" power of the listed Wattage. I started having a problem enough for my card, he owns a 9500gt. © Copyright 2017 ukesperience.com. All rights reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156613.38/warc/CC-MAIN-20180920195131-20180920215531-00339.warc.gz
CC-MAIN-2018-39
5,618
22
https://downloads.silicon.co.uk/22805/pcboost-31192009/
code
Install PCBoost to instantly increase the speed of your computer. Applications such as games, video production and photo editors are immediately faster. PCBoost allows you to run programs such as games, video editing software and any software that requires large amounts of processing power to run much faster than the software was originally designed for. With little to no effort you can easily make programs & games run faster on your computer without having to purchase a new computer. Most programs are designed to use a minimal amount of CPU (processor) power which often leads to the CPU being idle and not used to its fullest potential, with PCBoost your computer is able to take advantage of this by allocating more CPU power to the currently active application. PCBoost automatically takes care of allocating more processing power to applications without having to lift a finger. The software runs in the background and automatically monitors which application becomes the foreground active program, it then raises the CPU priority for this application and also assigns the application to run on a processor core that has more power available to it, this instructs the processor that this application must be taken care of before any other application and allowing it to run faster. Latest Update: 188.8.131.523 – Fixed problem where InnoSetup would not install properly outside of the main Windows install drive, or onto a USB thumb drive.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057416.67/warc/CC-MAIN-20210923013955-20210923043955-00650.warc.gz
CC-MAIN-2021-39
1,452
6
https://community.filemaker.com/thread/173464
code
I suggest telling us the FMS version and the OS it runs on. A few questions: - does the issue occurs only for specific clients (FMP, FMGO,... ) ? - does the issue occurs for specific platforms ? - did you run a Recover on a copy of the database ? FMS 126.96.36.1998, which should be up to date. Windows 2012 R2 server - The issue is only triggered from developers committing database changes. The file crashes before any changes are made. We are using FMP Advanced 15.0.3 on Mac OS 10. - When the issue occurs, no clients are able to re-login. - We took the database offline and performed a Recover yesterday. It found and fixed one source of corruption (though I don't believe that existed before yesterday). We are currently using the recovered file and still experiencing the issue. Thank you for your response. Did you have a look at Windows logs on the server, maybe there could be clues in there. The logs don't show anything. The server itself didn't crash, only one of the FM databases. I'm not even sure if "crash" is the correct term here, as the server did not immediately go down, users could simply not login. Users currently logged in could operate normally (I don't know for how long, we try to restart the server immediately).
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423842.79/warc/CC-MAIN-20170722022441-20170722042441-00465.warc.gz
CC-MAIN-2017-30
1,242
14
https://dojo.domo.com/discussion/comment/45004/
code
Quick Select Multiple Columns in "Select Column" ? I am wondering if there is a way to choose multiple columns quickly when using "Select Columns" in an ETL. I do not mean using Add All Columns. We do not know SQL, and we have massive DataSets with a large amount of columns (50+), but only need a mix of about half & half between 2 Datasets. Having to scroll through & choose each column one by one is VERY cumbersome. Is there a shortcut we can use to select multiple columns from the options to add all at once? Example, I have 2 DataSets I have joined that together, contain about different 50 columns. I only want to add about 20 of them. Do I really have to pick them & add them one by one? Thank you!
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301488.71/warc/CC-MAIN-20220119185232-20220119215232-00498.warc.gz
CC-MAIN-2022-05
707
3
https://www.experts-exchange.com/questions/29142480/Internet-Explorer-and-Edge-does-not-open-websites-Chrome-works-fine.html
code
Internet explorer and Edge does not open webpages giving the following error: There was a temporary DNS error. Try refreshing the page. Error Code: INET_E_RESOURCE_NOT_FOUND. When accessing the internet with Chrome, it works without any problems and you can access any website. I have reset network settings and also flushed the dns and cleared everything in the browsers. Nothing made a difference. Any idea what is causing this? Windows 10 pro is the operating system and this problem started about 2 weeks ago.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146809.98/warc/CC-MAIN-20200227191150-20200227221150-00132.warc.gz
CC-MAIN-2020-10
513
2
https://craigwright.net/blog/bitcoin-blockchain-tech/spam-away/
code
The first thing to understand about why people attack me and try to teach false mythologies about Bitcoin is that they never wanted the version of Bitcoin I created. Bitcoin isn’t anti-government, and no derivative blockchain ever will be. Many people are going to find this to be the case the hard way and lose a lot of money in the process. Then, I have warned them, and if they choose to ignore what I say, there is little I can do. I’m going to start taking apart some of the false narratives. Today, I am going to start with the narrative against sending many small transactions. It is a very pernicious and subtle lie that stems from misquoting things I said and putting them out of context. It originates from something that is quoted over and over and which you can see used along other common quotes such as the ones linked here. Like many good lies, the narrative produced on the page relies on the laziness of the individual. They want you to take something that is referenced and read it out of context. The original is correctly linked, but it doesn’t do justice to the entire post. The second line of one particular comment seems to to some extent support the claim that the idea is about stopping smaller payments. Bitcoin is practical for smaller transactions than are practical with existing payment methods. Small enough to include what you might call the top of the micropayment range. But it doesn’t claim to be practical for arbitrarily small micropayments. Firstly, as such we’re talking micropayments, and at the time in 2010, it was specifically saying that micropayments in the order of 1 cent — 5 dollars were still valid, but not ones that at the time were a thousandth of a cent. Even then, so it was at the time. The thread was concerning sending transactions in the order of BC0.00000001 or at the time something around USD cents 0.000001. But the most important part here lies in my follow-up comment. I posted across multiple lines. As I do so often, I elaborated after my initial post. We see one example here: Forgot to add the good part about micropayments. While I don’t think Bitcoin is practical for smaller micropayments right now, it will eventually be as storage and bandwidth costs continue to fall. If Bitcoin catches on on a big scale, it may already be the case by that time. Another way they can become more practical is if I implement client-only mode and the number of network nodes consolidates into a smaller number of professional server farms. Whatever size micropayments you need will eventually be practical. I think in 5 or 10 years, the bandwidth and storage will seem trivial. My comment was very simple, I wrote it was not very good for smaller micropayments “right now.” Right now being in 2010. I then talked about using roundup systems and purchasing a thousand page accesses for searches at a time. As such, I was talking about Bitcoin at the skyrocketed price of USD0.10 for each bitcoin. The discussion was on payments and fees of less than 0.01 BitCoin, which at the time was USD0.001. That is, 1/10 of a cent. At the time in 2010, Bitcoin was still in early developmental phases. It was not about blocking access or saying that spam as people called it was bad, but rather about detailing the system at the time. Importantly, people fail to note that I said the scenario was likely to be different 5 to 10 years on. “5 to 10 years” referred to the period between 2015 and now. We surpassed the required level of computational power years ago. Bitcoin is practical for smaller transactions than are practical with existing payment methods. Small enough to include what you might call the top of the micropayment range. But it doesn’t claim to be practical for arbitrarily small micropayments. As such, a micropayment could be as small as 1/10 of a cent and the size of up to $5.00. When looking at solutions of well under 0.1 c, you would need to layer solutions — such as payment channels or, as I discussed, a means to aggregate. It is all there; in 2010, BitCoin was not ready for things like pay per search or per page view without an aggregating mechanism. They could have been done even then — just not in the form of individual transactions. But the main and most critical part that people fail to see is that Bitcoin is designed to professionalise and end in server farms. If Bitcoin catches on on a big scale, it may already be the case by that time. Another way they can become more practical is if I implement client-only mode and the number of network nodes consolidates into a smaller number of professional server farms. Whatever size micropayments you need will eventually be practical. I think in 5 or 10 years, the bandwidth and storage will seem trivial. It is the point people seek to obscure. There is a false narrative and myth that Bitcoin is about running user nodes in a distributed network of individuals. It never was close to being so, and such was never the goal. More importantly, it doesn’t and cannot work in such form. The concept is not one of avoiding government and law, it is a distributed money system that works to create an honest ledger. Client mode is SPV. It is not what people call SPV in the community, but rather something that we’ve been working on and building. The initial details of the concept are starting to be released in our wallet workshops, but the reality is that nodes are miners and that home users and Raspberry Pis play no part in Bitcoin mining. You may not like it, but there is little relevance here, and whether you like it or not, it’s a fact of life. The reason why people attack server farms as a concept dates way back to 2008. It dates to when I first released the Bitcoin white paper and faced an argument from James Donald. His long-winded response was a rant about government being able to take over and implement monetary controls. I said way back, in the first set of posts, that the system would end in server farms. I did not say so once: I said it in 2008, I said it again in 2009, and I said it in 2010. It was not an accident or in error; Bitcoin ends as commercial server farms. Such is how it professionalises. Only people trying to create new coins would need to run network nodes. At first, most users would run network nodes, but as the network grows beyond a certain point, it would be left more and more to specialists with server farms of specialized hardware. What you see in the desire to create small blocks is the desire to create bit gold and to replace Bitcoin. Unfortunately for those failing miserably to understand Bitcoin (such as the Lightning Network developers), you need to understand that Bitcoin operates within the real world, which means law. The argument against and the attack on my version of Bitcoin had started before I even released the code. James A Donald started the push for small blocks and transactions with the following statement: But I think we need to concern ourselves with minimizing the data and bandwidth required by money issuers - for small coins, the protocol seems wasteful. Here lies the push for all of the changes to my protocol. In the following statement, James Donald captures the incredible lack of understanding around Bitcoin. The smaller the data storage and bandwidth required for money issuers, the more resistant the system is the kind of government attacks on financial networks that we have Bitcoin isn’t designed with government as a threat, it’s designed to work within global legal systems. It incorporates many of the requirements of legislative processes such as Sarbanes Oxley and FINRA. And, in my standard format I cut short a response to James Donald that everyone fails to link to the rant that it was. >[Lengthy exposition of vulnerability of a systm to use-of-force The rant that was cut can be found here. I avoided answering and responding in full. I did so because I was getting annoyed. Hence the typo. You can tell I was getting agitated as my responses started getting more errors. Unfortunately, Satoshi is not perfect at spelling under duress. For the same reason, I tried to avoid getting into debates and arguments when using the Satoshi pseudonym. Bitcoin is better than cheques, and it’s better than the existing system we see with Visa and Mastercard. But it is not and will never be a good system for crime and money laundering, which will be a very hard lesson for some people. Those like Mr James Donald and many in Core will cry and complain as government starts to crack down, but they will also learn what Bitcoin is really about. It doesn’t matter how much you try to attack me or my reputation, the matter won’t change. The path Bitcoin is going down was set in stone when I released the code. There are other ways to run the protocol and settings within Bitcoin, but there is no way to run a Bitcoin system, any blockchain outside of law and the control of governments. People are going to discover just how fragile illicit transactions on Bitcoin really are. And the thing is, the more you attack me for saying so, the more you are going to strengthen what I’m saying. It’s simple to cherry-pick comments that I’ve made and to take them out of context and twist their meaning, but the truth remains. Bitcoin was never designed to be a system outside of law, nor was it designed to attack government. Not one statement that I’ve ever made presents anything other than Bitcoin as honest money. Not one statement that I’ve ever made explains Bitcoin as an uncensorable platform that would facilitate illicit money transfers, illicit payments, or money laundering. If you think so, if you think that any blockchain can aid you to such an end, you are in for a painfully hard awakening. If you don’t like the fact that Bitcoin was designed to allow large server farms to act in a way that would allow the government to enforce orders including the seizure of illicit gains, then it’s very simple: you don’t like Bitcoin. More, you don’t want the idea of a blockchain at all. As I have written, Bitcoin is not designed to run on every single node. It is very clear. As people cherry-pick answers and try to twist my words, they do so with an agenda. They seek to alter Bitcoin and make it into something it was designed not to be. It was not then that I decided to leave the development of Bitcoin as Satoshi, but well before. It wasn’t something that began with the creation of a heroin store and the development of Silk Road by Ross Ulbricht and others such as Martti Malmi, it started way before. But the thing is, no matter how hard you try, you can’t make a system that acts outside of law, because you can’t make a system that acts solely in cyberspace. Every computer, every line of code, everything you do exists in the real world. As much as you might want to avoid the fact, you exist in reality, and you will never escape it.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100527.35/warc/CC-MAIN-20231204083733-20231204113733-00014.warc.gz
CC-MAIN-2023-50
10,943
42
https://infinite-usa.com/client-side-data-always-taken-into-consideration/
code
Let us now consider a situation where the last name is changed on the client side ( not yet synchronized )and mobile number is changed on server side. Mobile CRM app sends and overwrites all fields to CRM server, even those, that were not change by user on Mobile CRM app. Client side: Last Name is changed to Parish(offline mode and is not yet synced) Server side: Mobile Phone is changed to 401-874-2017 Device Wins (Full) is selected. The copy of the entire client side data is replaced in the server side too in Device Wins(Full) To access the brochure, enter the details Copyright © 2023 – Infinite Computing Systems, Inc. | All Rights Reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100164.87/warc/CC-MAIN-20231130031610-20231130061610-00101.warc.gz
CC-MAIN-2023-50
653
8
https://www.crxsoso.com/webstore/detail/ldcebefmigojpejeklfkjgcphginkbic
code
The extension tells you driving distance of your movie theatres from your current location on BookMyShow. - No more hassles in figuring out which theatre is nearby to your location - Direct map link to a corresponding theatre for the driving directions Just accept the popup to use the current location and it will automatically work Sort by distance to see accurately the nearest theatres
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506539.13/warc/CC-MAIN-20230923231031-20230924021031-00216.warc.gz
CC-MAIN-2023-40
389
5
https://mail.python.org/pipermail/web-sig/2010-October/004716.html
code
[Web-SIG] wsgiref 0.2 dev in svn w/PEP 3333 support pje at telecommunity.com Wed Oct 6 19:21:40 CEST 2010 At 01:28 PM 10/6/2010 +0200, And Clover wrote: >On 10/05/2010 04:23 AM, P.J. Eby wrote: >>A preliminary update of the standalone (Python <3.x) version of wsgiref >>is now available >Is there any interest in putting fixup code into wsgiref's >CGIHandler? I appreciate this is really ugly, but the CGI-to-WSGI >gateway is the most logical place for this, as otherwise the WSGI >environment created by CGIHandler often doesn't meet the >requirements of the spec. >Trying to fix these problems at an application, framework or >middleware level is impractical because they don't know that the >WSGI environ originally came from CGI. (And they can't re-read the >environ at that point without breaking environ-altering middleware.) >In particular: for Python 2.x running on Win32, read the environment >using ctypes where available, allowing non-ASCII characters to be >read directly instead of irretrievably mangled by the >ANSI-code-page-encoded os.environ interface. Then encode the >extracted Unicode environ to byte strings using ISO-8859-1, except >if the server software is Microsoft/IIS, where the encoding will >probably be UTF-8. >IIS also needs a fix to remove the duplicated SCRIPT_NAME from the >front of PATH_INFO. This is a bit more risky as existing >apps/libraries may already be doing this and might get confused if >someone's already done the fix. Maybe a subclass like IISCGIHandler? How would these relate to the Python 3.2 release? Can you make 3.x and 2.x versions? (I currently consider getting 3.2 out a higher priority, and want equity between the standalone 0.2 and the bundled version in 3.2.) More information about the Web-SIG
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815812.83/warc/CC-MAIN-20180224132508-20180224152508-00243.warc.gz
CC-MAIN-2018-09
1,756
32
https://www.freelancer.com/projects/graphic-design-flex/custom-for-google-android-box/
code
This project is to create a custom user interface for Android IP-TV box operating system, which needs to be compatible and utilize the GoogleTV framework as well as other Google apps/api's. We have lined up a manufacturer and have distribution for a mass market the Android IP-TV box, however the basic Android OS UI that the manufacturer has now is vanilla and not user friendly. We are looking for looking for someone (or a team) that are experts developing for Android and TV UI environments. We have designers on the team who can provide the actual graphics (if necessary), so primarily need the programmer(s). It would be a big plus if you also have experience with Android mobile/tablet environments, as we are looking to create a seamless end user experience between TV, tablets and mobile devices. While part of this project is to define the exact specifications, here are some of the basics: 1. Evaluate use-case and other GoogleTV products, then create design specification for a user friendly, visual compelling UI screen for all elements of the UI. 2. The UI layer must be skinnable to easily create new custom UI look and feel using our framework 3. The UI layer must be optimized to run fast and consume minimal system resources 4. The UI layer should take into account integration with mobile devices and tablets, including accommodating all possible use cases (e.g. primary user, guest users, home network with multiple TV’s and Tablets) 5. The UI layer must have an easy (almost automated) method for connecting to wireless networks 6. The UI layer must be compatible with various remote control scenarios ranging from standard remotes to keyboard style remotes 7. API/templates for creating apps that run via the UI layer This project is related to the following project – we are open to one team taking on both if the expertise are available: [url removed, login to view] Please get in touch if you have any questions.
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812871.2/warc/CC-MAIN-20180220010854-20180220030854-00357.warc.gz
CC-MAIN-2018-09
1,941
14
http://www.rakuten.com/prod/psycholinguistics-101/210598687.html
code
||Psycholinguistics is the study of how language is stored and processed by mind and brain. This is no easy puzzle to solve, and has produced truly interdisciplinary research between a number of fields - psycholinguistics research sits at a cross-roads between not just psychology and linguistics, but also computer science, neuroscience, and cognitive science. By understanding the processes that underlie language ability, we can help develop more effective ways to teach people to read and make the books they read easier to understand. Language also offers a window onto human cognition more generally - research into signed languages has shed light on how the brain processes and represents information. This book introduces the reader to the basic issues in psycholinguistic research, including its history and the methodologies typically employed in research. Key topics discussed include information flow, language representation, language in the real world, and sign language. These topics have recently come to center stage as the field matures and innovative research techniques allow promising research in these areas.
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398459214.39/warc/CC-MAIN-20151124205419-00134-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
1,130
1
https://techexpert.tips/dell-idrac/idrac-email-notification-setup/
code
Open a browser software, enter the IP address of your iDRAC interface and access the administrative web interface. On the prompt screen, enter the administrative login information. Factory default access information: • Username: root • Password: calvin After a successful login, the administrative menu will be displayed. Access the Server menu and select the Alerts option. On the top of the screen, access the SNMP and Email settings tab. Locate the SMTP (Email) Server Address Settings area. Perform the SMTP server configuration fit to your network and click on the Apply button. Locate the Destination Email addresses area and enter your e-mail address. On the top of the screen, access the Alerts tab and enable the iDrac Alert feature. Locate the Alerts and Remote System Log Configuration area and check the E-mail boxes. Congratulations! you have finished the iDrac email notification setup.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662572800.59/warc/CC-MAIN-20220524110236-20220524140236-00710.warc.gz
CC-MAIN-2022-21
904
14
https://blog.christophersmart.com/tag/zypper/
code
Sometimes on an openSUSE box I want to be able to pre-download the packages and install at a later date. By default, it downloads each package and installs it before the moving onto the next one. If the update is interrupted, then you can end up with a broken system (it’s happened a few times). Now I’ve found out how to enable cache and download only with zypper Zypper can enable cache on a per-repository basis (pretty neat), or you can set them all up like so: zypper mr -k -all Now that you have cache enabled, just do a dry-run which will download everything, but not install them: zypper -l -y update --dry-run And there you are.. I’ve just installed the latest release of openSUSE (version 11.2), which now defaults to the KDE desktop. I was pleased to see that this does not install Mono by default (mostly thanks to the fact that KDE has so far managed to keep it out). Nevertheless, users can easily block Mono from being installed at a later point, by using the package manager: sudo zypper al *mono* The only issue I have experienced so far, is that the installer has the option to configure NTP and gives the option to sync the time, but there’s no network at that point so it fails. In previous versions I’m pretty sure that then kicked up the network wizard, but it doesn’t with 11.2 (at least, installing from the 64bit DVD that is).
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588282.80/warc/CC-MAIN-20211028065732-20211028095732-00112.warc.gz
CC-MAIN-2021-43
1,363
12
http://onlinelibrary.wiley.com/doi/10.1029/2006GL026037/abstract
code
Along the southern Himalayan topographic front, the Indian summer monsoon modulates erosive processes and rates. To investigate the influence of topography and relief on rainfall generation and resultant erosion, we processed satellite rainfall amounts for the last 8 years (1998–2005) from the Tropical Rainfall Measurement Mission (TRMM). Based upon a spatial resolution of ∼5 × 5 km for the Himalaya, we identify (1) the spatial distribution of rainfall and (2) the large-scale relationships between topography, relief, and rainfall locations. Our results show two distinct rainfall maxima along strike in the Himalaya. The first, outer rainfall peak occurs along the southern margin of the Lesser Himalaya within a narrow band of mean elevation (0.9 ± 0.4 km) and mean relief (1.2 ± 0.2 km). The second, discontinuous, inner band typically occurs along the southern flank of the Greater Himalaya (elevation and relief: both 2.1 ± 0.3 km).
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660467.49/warc/CC-MAIN-20160924173740-00084-ip-10-143-35-109.ec2.internal.warc.gz
CC-MAIN-2016-40
950
1
https://preview.npmjs.com/search?q=keywords:triples
code
Native bindings to access HDT compressed triple files. A graph database for Node.js and the browser built on top of LevelUp Native bindings to access OSTRICH RDF triple archive. @thi.ng/rstream based triple store & reactive query engine Generate Pythagorean triples using Euclid's formula Toolkit to make working with IRI's quick and easy Toolkit for working with collections, lists, arrays in RDF PropType definitions for RDF objects Toolkit for working with linked-deltas Work with linked delta actions quick and easy Conveniently construct RDF triples Native bindings to access HDT compressed triple files. Original work by Ruben Vergorgh's hdt lib. This is just a fork nl3 - natural language triples A command line interface for hyper-graph-db's Utility for RDF Triples
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371818008.97/warc/CC-MAIN-20200408135412-20200408165912-00538.warc.gz
CC-MAIN-2020-16
773
15
https://www.techsite.io/p/1061964/t/the-10-best-party-videogames-of-all-time
code
It's always a good idea to have your party videogames ready in advance, because the last thing you want when everyone's nicely tipsy is to have to download a load of updates. The games on this list are of course hugely subjective, and we're anticipating a bit of rage from people whose favourites didn't make the list. Everyone has their favourite version of Mario Party, and which one you choose is going to depend a lot on which consoles you have kicking around (unless you don't have any Nintendo ones, in which case you'd better move on to 2). There are versions of the franchise for Nintendo 64 (the original), GameCube, Wii, Wii U and Switch, all with their own quirks and minigames. There are plenty of opportunities to screw over your opponents, as well as showing off obscure knowledge gleaned from watching too much Pointless. The game will give you a secret prompt on your phone screen, and you have just two colours and your fingers to represent that thing in a way that your friends will get.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578806528.96/warc/CC-MAIN-20190426133444-20190426155444-00401.warc.gz
CC-MAIN-2019-18
1,005
6
https://forum.howtoforge.com/threads/multiple-zend-extensions.79925/
code
Hi, Shared hosting, ispconfig 3.1.9. Client uploaded a page, which requires zend extension "ioncube_loader". Custom PHP ini settings zend_extension =/usr/lib/php/20151012/ioncube_loader_lin_5.6.so safe_mode = off output_buffering = on register_argc_argv = 1 max_execution_time = 2000 ... and so on but the problem is as follows : ispcconfig always adds one line above zend_extension=opcache.so Because ioncube_loader is not in a first line of php.ini web site doesn't work. Until I manually remove the first line. But next click in ispconfig adds this line back. How do I disable this for this client only ?
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644817.32/warc/CC-MAIN-20230529074001-20230529104001-00375.warc.gz
CC-MAIN-2023-23
607
1
http://u4ya.ca/blog/2009/09/06/googles-project-10-to-the-100th/
code
Google’s Project 10 to the 100th is a philanthropic project put forth by the Internet powerhouse Google. This project is a “call for ideas to change the world by helping as many people as possible”. Watch the video below for more info or click here to read about it. In October of last year, they opened up for submissions for ideas, and they received over 150,000 entries! The deadline for submissions has now passed. Now, they are faced with the task of sorting through all of these submissions to pick the top 100. From these top 100, they will open up voting to the public, letting us pick the top 25. From these top 25 ideas, they will then pick the top 5. The top 5 will be splitting the prize of $10,000,000, which will be used to jumpstart the projects. While it has taken them way longer than they initially hoped to pick their finalists, this project is still a great endeavour. What kind of projects have they received… what kind of great ideas and world changing events will arise because of this project… only time will tell. Here at u4Ya.ca, the idea we put forth is the Global Voting System, which is a protocol for a world wide voting network, that runs off of existing infrastructure to promote global democracy. It would be awesome if we were picked as one of the finalists, to really help jumpstart this ambitious project and truly get the ball rolling.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699755211/warc/CC-MAIN-20130516102235-00090-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,382
5
https://www.firstfocus.com.au/about-us/careers/
code
Life at First Focus is all about helping people use technology. We simplify, we succeed as a team, and when something isn’t right, we always call it out. We listen to each other, and to our customers. We make changes (often very quickly) and we have no tolerance for office politics. Life at First Focus is also about transparent communication, daily huddles, core values or our regular company roundtables because keeping everyone informed, aligned and rewarding performance is also very important to us. First Focus is one of Australia’s leading Managed Service Providers, with over 125 staff across several offices. We have grown consistently and profitably for over 13 years, and we’re continuing to win new clients and evolve our solutions. If you are an IT professional looking to further your career and you think you’d be a Values fit with First Focus, below are open positions.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578526904.20/warc/CC-MAIN-20190418221425-20190419003425-00236.warc.gz
CC-MAIN-2019-18
894
4
https://discuss.leetcode.com/topic/102702/your-answer-inconsistent-with-output-on-my-local-machine
code
The following solution returns 2 for the input [[-635,462],[-444,47]] on my local machine. However, when I run the code on the webpage 'Your answer' displays 1. I don't understand why. It's the exact same code. I'd be very grateful for any help with this issue. import numpy as np # Definition for a point. # class Point(object): # def __init__(self, a=0, b=0): # self.x = a # self.y = b class Solution(object): def maxPoints(self, points): """ :type points: List[Point] :rtype: int """ N = len(points) if N == 0: return 0 xs = np.array([p.x for p in points]) ys = np.array([p.y for p in points]) xsM = np.repeat(xs, N).reshape((N, N)) ysM = np.repeat(ys, N).reshape((N, N)) xDiff = xsM - xs yDiff = ysM - ys tmp = yDiff / xDiff maxCt = 0 for i in range(N): freq = np.unique(tmp[i], return_counts=True) nrNans = np.isnan(freq).sum() nrInfs = np.isinf(freq).sum() counts = nrNans if np.all(np.isnan(freq)) else max(np.max(freq), nrInfs) + nrNans if counts > maxCt: maxCt = counts return np.asscalar(maxCt) Please note that I do not know whether this solution is correct or not. I expect a TLE.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890314.60/warc/CC-MAIN-20180121060717-20180121080717-00620.warc.gz
CC-MAIN-2018-05
1,092
6
http://lists.openmoko.org/pipermail/community/2007-December/012083.html
code
geniere90 at interfree.it writes: > >I think so... neo's dns is 192.168.200.200 > >Is it wrong? Almost certainly. That's the DNS address I used, because I've got a DNS server on my laptop. You should set NEO's DNS to the same DNS as your laptop goes to. Also -- make sure you've got ip forwarding and NAT running on your laptop!
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812758.43/warc/CC-MAIN-20180219171550-20180219191550-00228.warc.gz
CC-MAIN-2018-09
328
1
https://physics.stackexchange.com/questions/227931/can-an-object-above-absolute-zero-temperature-exists-in-principle-if-there-is-o
code
It is said that: All matter with a temperature greater than absolute zero emits thermal radiation. For suppose, there is only object in the whole universe and it emits radiations above absolute zero temperature. Does this case even possible? Isn't the temperature came into existence only after the particles gets separated from each other?
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027330786.8/warc/CC-MAIN-20190825173827-20190825195827-00005.warc.gz
CC-MAIN-2019-35
340
3
https://lakeoftears.org/is-hostdime-dis-faster-than-bluehost/
code
Is Hostdime Dis Faster Than Bluehost Discovering a top quality economical web hosting company isn’t easy. Every web site will certainly have different needs from a host. And also, you need to compare all the functions of a hosting firm, all while searching for the most effective deal feasible. This can be a great deal to kind through, particularly if this is your very first time acquiring hosting, or constructing a web site. A lot of hosts will provide super cheap initial prices, only to raise those rates 2 or 3 times higher once your preliminary contact is up. Some hosts will offer complimentary bonuses when you sign up, such as a cost-free domain name, or a complimentary SSL certification. While some hosts will be able to offer far better efficiency and also high levels of safety and security. Is Hostdime Dis Faster Than Bluehost Below we dive deep into the most effective economical web hosting plan there. You’ll learn what core hosting attributes are necessary in a host as well as just how to examine your very own holding needs to make sure that you can pick from one of the most effective cheap holding providers below. Disclosure: When you buy a webhosting plan through links on this web page, we earn some commission. This aids us to keep this website running. There are no extra costs to you in all by using our links. The listed here is of the best cheap web hosting plans that I have actually directly used and also checked. What We Think about To Be Cheap Web Hosting When we define a web hosting plan as being “Affordable” or “Budget plan” what we suggest is hosting that falls into the rate brace in between $0.80 to $4 per month. Whilst looking into cheap hosting carriers for this guide, we looked at over 100 different hosts that fell under that cost array. We after that analyzed the high quality of their least expensive holding package, worth for cash and customer service. In this article, I’ll be reviewing this first-rate internet site holding business as well as stick in as much appropriate details as feasible. I’ll review the features, the prices alternatives, as well as anything else I can think about that I believe could be of advantage, if you’re making a decision to join to Bluhost and get your websites up and running. So without more trouble, allow’s check it out. Bluehost is among the biggest host firms on the planet, obtaining both substantial advertising assistance from the business itself and also affiliate marketing professionals that promote it. It really is a large company, that has actually been around for a long time, has a big reputation, as well as is certainly among the top choices when it comes to webhosting (absolutely within the leading 3, a minimum of in my publication). However what is it specifically, and also should you get its services? Today, I will address all there is you require to recognize, provided that you are a blog owner or an entrepreneur that is seeking a webhosting, and does not know where to get started, since it’s a wonderful option for that audience as a whole. Allow’s visualize, you intend to host your sites as well as make them visible. Okay? You currently have your domain (which is your site location or LINK) but now you intend to “transform the lights on”. Is Hostdime Dis Faster Than Bluehost You require some hosting… To complete every one of this, and to make your web site visible, you need what is called a “server”. A web server is a black box, or gadget, that saves all your site data (files such as pictures, messages, videos, links, plugins, and various other info). Now, this server, has to get on regularly and it has to be linked to the internet 100% of the moment (I’ll be stating something called “downtime” later). Additionally, it likewise needs (without getting too expensive as well as into details) a file transfer protocol frequently known as FTP, so it can show internet browsers your site in its desired form. All these points are either pricey, or call for a high degree of technological skill (or both), to produce as well as preserve. And you can completely go out there and learn these points on your own and established them up … however what concerning rather than you buying as well as preserving one … why not just “renting out holding” instead? This is where Bluehost is available in. You lease their servers (called Shared Hosting) and you launch a web site making use of those web servers. Considering that Bluehost maintains all your files, the company likewise enables you to set up your content management systems (CMS, for brief) such as WordPress for you. WordPress is an incredibly popular CMS … so it just makes good sense to have that choice available (almost every hosting company currently has this option too). In other words, you no more need to set-up a web server and after that integrate a software program where you can construct your web content, separately. It is currently rolled into one plan. Well … picture if your server remains in your residence. If anything were to happen to it in all, all your documents are gone. If something fails with its internal procedures, you require a professional to repair it. If something overheats, or breaks down or obtains corrupted … that’s no good! Bluehost takes all these hassles away, as well as looks after every little thing technological: Pay your server “lease”, and also they will certainly look after whatever. And as soon as you get the solution, you can after that start concentrating on adding material to your website, or you can place your initiative into your marketing campaigns. What Services Do You Get From Bluehost? Bluehost offers a myriad of different services, but the primary one is hosting of course. The organizing itself, is of various types incidentally. You can lease a shared web server, have a devoted server, or also an onlinepersonal server. For the purpose of this Bluehost evaluation, we will certainly focus on hosting services as well as various other services, that a blog writer or an online entrepreneur would need, rather than go unfathomable right into the rabbit hole and discuss the other solutions, that are targeted at more experienced individuals. - WordPress, WordPress PRO, as well as ecommerce— these organizing solutions are the plans that permit you to host a web site making use of WordPress as well as WooCommerce (the latter of which permits you to do ecommerce). After buying any of these bundles, you can start constructing your website with WordPress as your CMS. - Domain name Market— you can also purchase your domain name from Bluehost as opposed to other domain registrars. Doing so will certainly make it less complicated to aim your domain name to your host’s name servers, because you’re utilizing the exact same industry. - Email— as soon as you have acquired your domain name, it makes sense to additionally get an e-mail address tied to it. As a blog writer or on-line entrepreneur, you ought to practically never ever utilize a free email solution, like Yahoo! or Gmail. An e-mail such as this makes you look less than professional. Luckily, Bluehost offers you one for free with your domain name. Bluehost additionally supplies specialized servers. And also you may be asking …” What is a specialized web server anyway?”. Well, the thing is, the basic webhosting bundles of Bluehost can just a lot traffic for your web site, after which you’ll require to update your organizing. The reason being is that the typical servers, are shared. What this implies is that server can be servicing two or even more web sites, at the same time, one of which can be yours. What does this mean for you? It indicates that the single server’s sources are shared, and it is doing multiple tasks at any kind of offered time. As soon as your web site begins to strike 100,000 website sees each month, you are mosting likely to require a specialized server which you can additionally get from Bluehost for a minimum of $79.99 per month. This is not something yous ought to fret about when you’re starting out however you should maintain it in mind for sure. Bluehost Prices: How Much Does It Cost? In this Bluehost evaluation, I’ll be focusing my interest generally on the Bluehost WordPress Hosting bundles, because it’s the most prominent one, and very likely the one that you’re looking for and that will match you the very best (unless you’re a huge brand name, business or site). The three available strategies, are as complies with: - Standard Plan– $2.95 each month/ $7.99 normal rate - Plus Strategy– $5.45 per month/ $10.99 regular price - Choice Plus Strategy– $5.45 per month/ $14.99 normal cost The initial price you see is the cost you pay upon register, and also the second price is what the cost is, after the initial year of being with the business. So generally, Bluehost is mosting likely to charge you on a yearly basis. As well as you can also pick the quantity of years you want to organize your website on them with. Is Hostdime Dis Faster Than Bluehost If you select the Basic plan, you will certainly pay $2.95 x 12 = $35.40 starting today as well as by the time you enter your 13th month, you will certainly currently pay $7.99 each month, which is additionally charged annually. If that makes any type of feeling. If you are serious about your web site, you must 100% get the three-year choice. This indicates that for the standard plan, you will certainly pay $2.95 x 36 months = $106.2. By the time you hit your fourth year, that is the only time you will certainly pay $7.99 monthly. If you consider it, this approach will certainly conserve you $120 throughout 3 years. It’s very little, however it’s still something. If you want to obtain greater than one website (which I very suggest, and if you’re major, you’ll possibly be getting more eventually in time) you’ll intend to make use of the choice plus strategy. It’ll enable you to host unlimited sites. What Does Each Strategy Deal? So, in the case of WordPress holding strategies (which resemble the common hosting plans, however are extra geared in the direction of WordPress, which is what we’ll be focusing on) the functions are as complies with: For the Fundamental plan, you get: - One web site only - Protected site via SSL certification - Maximum of 50GB of storage space - Totally free domain name for a year - $ 200 advertising credit history Bear in mind that the domain names are acquired separately from the holding. You can get a cost-free domain name with Bluehost right here. For both the Bluehost Plus hosting as well as Choice Plus, you obtain the following: - Unlimited variety of sites - Free SSL Certificate. Is Hostdime Dis Faster Than Bluehost - No storage space or bandwidth restriction - Totally free domain name for one year - $ 200 advertising credit rating - 1 Office 365 Mail box that is free for thirty days The Choice Plus strategy has an included advantage of Code Guard Basic Alternative, a back-up system where your documents is saved and duplicated. If any kind of accident happens and also your web site data vanishes, you can restore it to its initial kind with this feature. Notification that despite the fact that both strategies set you back the same, the Selection Plan then defaults to $14.99 monthly, regular price, after the collection amount of years you’ve selected. What Are The Benefits Of Using Bluehost So, why select Bluehost over various other host services? There are hundreds of host, most of which are resellers, but Bluehost is one select couple of that have stood the test of time, and it’s possibly one of the most well known around (and also completely factors). Here are the 3 primary benefits of selecting Bluehost as your web hosting company: - Server uptime— your internet site will not show up if your host is down; Bluehost has greater than 99% uptime. This is exceptionally important when it concerns Google Search Engine Optimization and also rankings. The higher the better. - Bluehost rate— how your web server action figures out exactly how quick your web site shows on a web browser; Bluehost is lighting quick, which suggests you will lower your bounce rate. Albeit not the best when it concerns filling speed it’s still hugely vital to have a rapid rate, to make individual experience much better and also far better your ranking. - Unlimited storage space— if you obtain the Plus plan, you need not fret about how many documents you keep such as video clips– your storage space capacity is limitless. This is truly essential, since you’ll possibly face some storage space concerns in the future down the tracks, and you don’t desire this to be a hassle … ever. Last but not least, consumer support is 24/7, which suggests regardless of where you are in the globe, you can call the assistance team to fix your internet site issues. Pretty basic nowadays, yet we’re taking this for granted … it’s additionally very important. Is Hostdime Dis Faster Than Bluehost Additionally, if you’ve obtained a totally free domain name with them, then there will be a $15.99 cost that will certainly be subtracted from the amount you originally purchased (I picture this is due to the fact that it kind of takes the “domain name out of the marketplace”, not sure about this, however there possibly is a hard-cost for registering it). Finally, any type of requests after one month for a reimbursement … are void (although in all honesty … they need to most likely be stringent right here). So as you see, this isn’t necessarily a “no questions asked” plan, like with a few of the various other holding choices around, so be sure you’re alright with the plans before continuing with the holding.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964359976.94/warc/CC-MAIN-20211201083001-20211201113001-00195.warc.gz
CC-MAIN-2021-49
13,842
82
http://themichaelfrank.tumblr.com/archive/2009/8
code
The SF Zinefest was pretty great. Met alot of people, sold some arty stuff, saw some sweet stuff, and bought a few things, too. I didn’t take many pics, but here are some from Steve Rhodes on Flickr. So next up are shows in Portland and Chicago. I got alot of art’ing to do the next few months. neat. :Top 5 CDs this week: 1: Burning Airline- “mission: control!” 2: Poster Children- “no more songs about sleep and fire” 3: Sparta- “wiretap scars” 4: Hot Water Music- “no division” 5: Kid Dynamite- “shorter, faster, louder”
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663417.12/warc/CC-MAIN-20140930004103-00022-ip-10-234-18-248.ec2.internal.warc.gz
CC-MAIN-2014-41
547
9
https://answers.dynatrace.com/questions/207562/dynatrace-recorder-script.html
code
Our goal is to execute prerecorded .gsl file from outside Dynatrace UI for automation purpose. We already recorded (using standalone recorder) some test and saved locally as .gsl file how do we execute this script from Powershell, Python, Bat or Linux shell script. Do you have any tutorial we can follow to try out. How to pass credential from external file for execution and how to read some configuration (like property file) file (key value pair or xml)
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250595282.35/warc/CC-MAIN-20200119205448-20200119233448-00124.warc.gz
CC-MAIN-2020-05
457
4
http://forum.retroleaks.ml/
code
0 users are online (in the past 15 minutes) 0 members, 0 guests, 0 anonymous users (See full list) active user(s) On Community Shoutbox (in the past 15 minutes) members, guests, anonymous users Members Online Today: 1 Most members ever online in one day was 5, last accomplished on 20 Jul 2014. The following members have visited today:
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510263423.17/warc/CC-MAIN-20140728011743-00272-ip-10-146-231-18.ec2.internal.warc.gz
CC-MAIN-2014-23
336
8
http://www.clinicaltrialpartnershipsblog.com/2012/12/iirs-inaugural-pharmaceutical.html
code
We invite you to submit a proposal for a speaking opportunity directly to Heather King, by January 11th, 2013. Please send to [email protected]. We are currently recruiting pharmaceutical and generic manufacturer executives who can share NEW DATA and industry practices through detailed case studies related to Gross-to-Net calculations, forecasting and accruals. Submission Guidelines & Details In your abstract, please provide the following: Proposed Title of Session: Objective and purpose - • A descriptive paragraph of 3-4 sentences describing what is unique or special about the information you plan to share- aka Background Information - • 3-4 bullet points highlighting the strategies, tools and techniques attendees will walk away with- aka Key Takeaways
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123102.83/warc/CC-MAIN-20170423031203-00106-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
780
6
http://superuser.com/questions/475846/use-mac-pro-as-time-machine-server-and-editing-station
code
My fiancée needs a Mac Pro for movie editing and rendering. I need a web server and a backup solution for my MacBook Pro. We thought we could split the costs of the Mac Pro and set it up to act as both a web server and a backup device. Is this a good idea? Specifically: - Is it easy to set it up to incrementally backup one or several laptops over wifi? And what software would you recommend? - Is it silent and stable enough to run a web server continuously? - Will it manage all this, including simultaneous editing?
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396872.10/warc/CC-MAIN-20160624154956-00122-ip-10-164-35-72.ec2.internal.warc.gz
CC-MAIN-2016-26
520
6
https://cycling74.com/forums/spinning-ball-hang/
code
I don't know if this is even a sensible question, but is there anything special about a spinning-ball hang vs. Max quitting? I'm just wondering whether it might be possible to narrow down my bug search by understanding a little better what's special about a hang. As I understand it, the spinning-ball is just OS X giving an app time to complete a task. But what is an actual hang? Is there any all-purpose answer? Are there any types of routines I should look at if the app is hanging? Thanks in advance for any thoughts.
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825227.80/warc/CC-MAIN-20171022113105-20171022133105-00645.warc.gz
CC-MAIN-2017-43
522
2
https://themeforest.net/item/slim-modern-clean-responsive-bootstrap-4-admin-dashboard-template/reviews/21596728
code
Good but generally impossible to upgrade it to newer Bootstrap such as version 5 because the author bundled Boostrap files into the main css file and edited the bundled code! Poor customer support, no support response when buying theme. This is a beautiful made theme with excellent documentation. I cant wait to dive in and create my page with this. It could improve by having the latest icon packs and the latest bootstrap & components, otherwise a really solid theme for the price. Has a decent look and the most value is in the messages template with the screen height resize calculations. Only giving it 2 starts because it still had plenty of bugs out of the box and they did not respond to any inquiries I had made (over a month ago). It can't install and Support suck The latest update does not address any of the issues I've pointed out. This template looks good, but I feel like you should be putting in a better effort to make it a better product. You know there are problems with it but you haven't done anything to fix those problems. At the end of the day, it's a faulty template. Design Quality and simple Template Good theme, bad creator support Bad support. You are too long to respond the questions.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511170.92/warc/CC-MAIN-20231003160453-20231003190453-00683.warc.gz
CC-MAIN-2023-40
1,217
10
https://forums.revora.net/topic/13014-cc-font/
code
3 replies to this topic Posted 15 August 2004 - 03:10 AM Nav... told me there was a C&C font somewhere. Does anyone know where? This is for a banner for RA2: ALS. I have the UT (font they also used in UT 2004) font, I just need a C&C one. Posted 15 August 2004 - 03:20 PM Yeah I got the Tiberian one from CNC Den. Only one I can find. 0 user(s) are reading this topic 0 members, 0 guests, 0 anonymous users
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141674082.61/warc/CC-MAIN-20201201104718-20201201134718-00440.warc.gz
CC-MAIN-2020-50
406
7
https://www.toppstodin.is/college-student-resume-template-microsoft-word/
code
College Student Resume Template Microsoft Word To get college student resume template microsoft word with limited work knowledge, this kind of curriculum vitae format enables education, expertise, and actions glow. It can be used to apply for any position, but needs to be formatted according to the latest resume writing guidelines. Here’s how to format an undergraduate resume template: College student resume template microsoft word. Free download 54 resume template microsoft word 2010 professional. The college resume template is ideal for it is convenient and accessible to use by all students. Here’s a college freshman resume template that you can paste into microsoft word or google docs and fill out. > who are the target audiences for college resume template? Sample college resume for students and graduates. If there is a mention of work related experience, it will give an additional credit. Microsoft word or google docs. Microsoft word or google docs. It also offers a matching student cover letter template and, to beat that, it is available to download and edit as a microsoft.docx document or for adobe. A college resume template usually has four basic sections. This is an accessible template. A microsoft word resume template is a tool which is 100% free to download and edit. 50+ free microsoft word resume templates to download; Microsoft word or google docs. There should be a separate section if you have received many awards and honors. To use these example college resume templates. Download the resume template (compatible with google docs or word online) or read the example below. High school and college student resume examples student resume templates. It includes an outline for each resume section, and what information you should list in each section. College student resume templates microsoft word just make it harder to get into college. College intern resume samples professional resume templates student resume template college resume student resume. Here’s the link to this student resume template in word. College student resume template for microsoft word. In sum, college student resume templates microsoft word is beneficial for students who want to look for a job whether it is a part time job, internship job or even a full time job. Furthermore, these college students resume templates could be easily found and downloaded on the internet. Below is an example of a resume for college students and graduates. This sample first year college student resume highlights the summary of education. It is comparatively easier to work with. Net gives you a superb assortment of microsoft company expression web templates for. There are variety of examples and different types of free resume templates that can be found which can be downloaded free. Download this resume template (microsoft word format) my safe download promise. Microsoft word or google docs. We hope your happy with this resume template college student best of microsoft word resume template 49 free. 50+ free microsoft word resume templates to download. Download useful templates microsoft templates office 2020 word, excel, and powerpoint). “project cv” by mohammed tayeh is the complete package: As shown in the college student resume template for word, there may be a variety of different work experiences that could be relevant to the job you’re trying to land. The college student resume template for microsoft word as the name implies would have the templates available on microsoft word. Every person who owns a laptop or computer has the microsoft word installed; Free to download and print. Here are brief descriptions of the basic sections of a college resume template: Microsoft word or google docs. Resume sample for communications broadcasting media intern internship resume chronological resume template chronological resume. 2 writing your summary statement the first step to creating a resume that makes an impact on hiring managers is to write a compelling. When you see a lot of examples of college curriculum, it will become obvious that your educational achievements are a very solid basis for a hiring decision. Student resume (modern design) tailored for students, this modern resume or cv leads with education and experience. Make sure that you include all of these sections in your resume template for college student. Use the college student resume template for word below to write a strong summary statement, skills section, work history, and education section that impresses the hiring managers. Cover your current academic accomplishments in detail, with honors and coursework. Resume template microsoft word 2010. Feel free to change the color scheme and fonts in the design tab of the ribbon. Parts of a college resume template. Resume template college resume template executive resume template free word resume template high school student first job resume template job resume template john doe resume template lawyer resume template recent graduate resume template xing resume template zety Document work history you have, if any, along with quantifiable achievements. For college students with limited work experience, this resume template lets education, skills, and activities shine. Some templates offer the option of customization in which case it can be very helpful for the students. It’s a great, college or high school resume template. Downloads are subject to this site's term of use.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587623.1/warc/CC-MAIN-20211025030510-20211025060510-00135.warc.gz
CC-MAIN-2021-43
5,448
23
https://www.experts-exchange.com/questions/28276472/Access-2010-How-would-I-select-multiple-selections-from-a-combo-box-to-a-text-field.html
code
I am working in Access 2010 and would like to add a combo box to my form, which has the capabiltiy of allowing the user to select multiple items from it. Screenshot below is what I am trying to achieve in access. This was obtained from Google Images. I want this combo box to pull values from a column I have in one of my tables. As the user selects the values of this combo box, I want the information to then be stored in one of the forms fields (seperated by a comma) which is a text field from a column in a "different" table. Example below once user has selected all the items necessary from the combo box, Can someone please let me know how I can achieve this? Do let me know if additional information is needed.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863489.85/warc/CC-MAIN-20180620065936-20180620085936-00210.warc.gz
CC-MAIN-2018-26
718
7
https://womenonit.org/programming-languages-invented-by-women-infographic/
code
It’s a fact: Women have always been making history, but often their work is not recognized. They have made incredible contributions to the field of computer science that paved the way for the technology we use today. One of these is programming, a field that has historically been dominated by men. We’ve put together a list of women who developed and designed programming languages, so you can learn more about their accomplishments. These women were not only instrumental in developing some of our most useful programming languages, but they were able to do it while facing significant social challenges. Read on to learn more about these women and their contributions in the world of computing!
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100745.32/warc/CC-MAIN-20231208112926-20231208142926-00833.warc.gz
CC-MAIN-2023-50
701
4
https://avesis.itu.edu.tr/yayin/0633cad3-6e62-40f7-9d8a-35aecf56eb89/gradient-based-shape-descriptors
code
This paper presents two shape descriptors which could be applied to both binary and grayscale images. The proposed algorithm utilizes gradient based features which are extracted along the object boundaries. We use two-dimensional steerable G-Filters (IEEE Trans Pattern Anal Mach Intell 19(6):545-563, 1997) to obtain gradient information at different orientations and scales, and then aggregate the gradients into a shape signature. The signature derived from the rotated object is circularly shifted version of the signature derived from the original object. This property is called the circular-shifting rule (Affine-invariant gradient based shape descriptor. Lecture notes in computer science. International workshop on multimedia contents Representation, Classification and Security, pp 514-521, 2006). The shape descriptor is defined as the Fourier transform of the signature. We also provide a distance measure for the proposed descriptor by taking the circular-shifting rule into account. The performance of the proposed descriptor is evaluated over two databases; one containing digits taken from vehicle license plates and the other containing MPEG-7 Core Experiment and Kimia shape data set. The experiments show that the devised method outperforms other well-known Fourier-based shape descriptors such as centroid distance and boundary curvature.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473824.45/warc/CC-MAIN-20240222193722-20240222223722-00058.warc.gz
CC-MAIN-2024-10
1,358
1
http://nasslli2014.com/courses/inductive-learning
code
Computability and inductive learning Course Description: In this course we will focus on the general problem of learnability understood as computational identifiability in the limit. What makes certain structures (computationally) learnable? Which properties of (computational) learners facilitate and which impair learning processes? In relation to those questions the following topics will be treated in the course: the variety of learning paradigms; short introduction to recursion theory for formal learning theory; abstract language learning: basic notions and definitions; Gold theorems; locking sequences and telltale subsets; Angluin’s theorem; restrictions of learned structures: uniformly recursive families of languages, uniformly recursively enumerable families of languages; restrictions on learners; consistent, conservative, and memory-limited learners; the restrictiveness of computable learning; mind-change complexity in identification in the limit; model-theoretic learning and its relationship with the numerical paradigm. The overall goal of the course is to introduce the research field to students and young researchers, by presenting basic methods and techniques. We will foster the multidisciplinary perspective on the problem of learning and information dynamics, much needed in the context of the progressing specialization of the relevant disciplines. Moreover, the final part of the course will be devoted to two philosophical topics, whose logical analysis begs a computational learning theory-like approach: philosophy of science and iterated belief revision.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123276.44/warc/CC-MAIN-20170423031203-00645-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,592
3
https://respuesta.top/question/askubuntu/1316007/how-can-i-speed-up-my-terminal-execution-of-the-make-command-generated-by-cmake
code
I am using Ubuntu 20.04.02 LTS, and have the snap version of CMake (3.19.4) installed. I am using it to build an app written in C++. When I build my solution in the terminal, the make command takes forever to execute. But when I build the project in the CLion IDE that is using CMake (3.17.3), the entire process is done within seconds. What could be causing the slowdown? How could I speed up the terminal compilation? (I had this problem when using the apt version (3.16.3) as well)
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337338.11/warc/CC-MAIN-20221002150039-20221002180039-00124.warc.gz
CC-MAIN-2022-40
484
4
http://linux.byexamples.com/archives/93/reading-and-sending-mail/
code
In UNIX-like system, mail is the common tool use to sending mail and reading mail. It is simple and easy to use. To read mail for your account just type: or if you want read in mail in specific dir mail -f /var/mail/user to send a mail: mail user < /tmp/file.log echo "This is sample mail" | mail -s "Sample" user '-s' switch is use to specify the subject you want to send. How about sending a attachment? This will need another program call 'uuencode' which will encode the binary to a ASCII code: uuencode file.bzip2 file | mail user 'uuencode' is will take 2 argument to work, the 1st is file name need to encode and the 2nd argument just a redundancy argument to allow 'uuencode' to send to stdout (indeed the screen). But the problem is that the file send out would be not able to download, so 'mutt' come to rescue ;p 'mutt' also as easy as 'mail', to read mail just enter: mutt -f /var/mail/user but 'mutt' is much easy to use to send a attachment: mutt -s "Sample" -a /file/path/file [email protected] < /tmp/msg same like 'mail' : '-s' is the subject switch to specify a subject of the mail, '-a' is the attachment want to send. The last argument is the email address want to send, for the < /tmp/msg is the message body you want to sent to [email protected]. If the /tmp/msg is not specify 'mutt' will wait for user to enter the message. /tmp/msg must be a file, so what I think is 'mutt' will only take in the file not any I/O input. If you don't want to use the 'mutt', there have a another way to send a attachment using 'sendmail'. But if using 'sendmail' you will need to specify the MIME (Multipurpose Internet Mail Extensions) standard header. For more detail can go to Sending Attachment using mutt and sendmail.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190753.92/warc/CC-MAIN-20170322212950-00141-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
1,743
15
https://chamik.eu/about/
code
Greetings, internet wanderer. They call me Kubík, I’m also known as chamik on the internet. I am a programmer. I sometimes play the guitar, climb a wall or touch grass outside. I like to read (mostly sci-fi) and sometimes even write something. I teach programming to younger generations. I like tea and believe in the goodness of humanity. Regrettably, I’m still stuck in high school. Most of my projects can be found on my github, the rest somewhere here on the site. Be it about anything, reach out!
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100484.76/warc/CC-MAIN-20231203030948-20231203060948-00414.warc.gz
CC-MAIN-2023-50
506
5
https://community.asterisk.org/t/easing-into-asterisk-by-replacing-answering-machine/21444
code
I’d like to move to computerized telephony in stages. For now, I have a POTS line and answering machine. I’d like to do the following: Stage 1) Replace answering machine with computer Stage 2) Replace POTS line with VOIP, and interface my phones to the computer For Stage 1, I’d like to accomplish the following: Pick up phone after N rings, play message Store MP3 of voicemail, and email a link to the MP3 and CID info Provide a web interface to messages provide a method for sending the “gate open” code for my apartment in case I’m locked out (e.g., 5th call from a specified # within 2 minutes, send the code) For Stage 2, I’d like to add the following functions: Calling card feature I know that all the functions are easily doable with full VOIP. Are the functions in stage 1 doable with a standard POTS line, analog phone directly attached to the POTS line (not to the PC), a linksys SPA3102 attached to the POTS line and also into my GB router, and a non-dedicated server running Linux? I figure for stage 1, a dedicated server should not be necessary, but I may need one for stage 2. Also, is it possible to disable the router function in the SPA3102 so I can continue to use my GB router? Any thoughts? Has someone already done something similar? Is there a particular package that would make what I’ve described incredibly easy?
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662562410.53/warc/CC-MAIN-20220524014636-20220524044636-00053.warc.gz
CC-MAIN-2022-21
1,355
12
https://serverfault.com/questions/777040/selective-gpo-drive-mapping/777045
code
I have two fileservers (Windows Server 2012 R2) that have joined my domain, namely filesrv01 & filesrv02. These fileservers should both contain exact copies of the user data, and if one fails; the other one should take its place. I have made a GPO that maps the folders from the first server and activated DFS replication between the two fileservers. The data is now successfully replicated between the sites, but my GPO is only statically mapping to the first fileserver. So if the primary fileserver goes offline, the drive maps get lost. I would like to have the drive maps updated to the secondary fileserver, should the primary fileserver go offline, or alternatively have one path to both destinations. What would be a practical way of getting this to work the way I intend to?
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818835.29/warc/CC-MAIN-20240423223805-20240424013805-00497.warc.gz
CC-MAIN-2024-18
783
3
https://www.motorsforum.com/honda/crv-2005-stereo-12364-.htm
code
I have a 2005 CRV sports - the Australian variety - that has a mp3, cd, and radio. In Australia we didnt get the remote controls that passengers can use to change cds etc. Does anyonone know if there is a remote control available for sale or the code that I can enter on a univerisal remote?
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886437.0/warc/CC-MAIN-20180116144951-20180116164951-00524.warc.gz
CC-MAIN-2018-05
291
5
http://forum.fop2.com/member/2749-jgould
code
Last active last year Sometimes agents in 1 queue get calls that need to be sent to a different queue. With extension & ring groups transferring that call is easy in FOP2. They just highlight and transfer. With queues that doesn't seem so simple because you have to decide if you show the queue or not. Lets say we have an agent who is a member of QUEUE1. They answer a call and find out that caller should have went to QUEUE2. This agent isn't a member of QUEUE2. Their FOP2 login doesn't show them QUEUE2. Why not? Well, mostly because the notifications for queue activity (chimes, flashing, text-to-speech, etc) trigger for ALL queues the agent has visible in FOP2, even if they aren't currently a member of that queue. Creating restrictions in FOP2 manager handles any permissions issue that we might have so we can restrict if the user can pickup the call, pause agents, etc. But getting constant aural and visual notifications for queues you aren't a member of can become very distracting and annoying. Is there any way to do this that I'm missing? What I think would be really nice would be something similar to ring groups but for queues. A second window that you can create that just provides the list of queue numbers. No agent list, callers in queue, etc. This way you could publish this to ALL users. Google gave me the following translation for the post above; I have checked that the plugin that allows to answer calls by sending a SIP notify is only prepared for chan_sip. If Pjsip is used, the action is Pjsipnotify. Is it possible to adapt it? The parameters are the same (in the case of Yealink), only the Action changes. I wanted to say that I noticed the same. PJSIP extensions can't use the answer button and I'd like to see this fixed. Also, I'm personally having issues with yealink T46 phones with the latest firmware (and older firmware). Even using chan_sip the answer button hasn't worked for me. However T22P (now discontinued) work fine when using chan_sip. I must be missing something because I'd expect the T46 to handle this. Well, still having 1 problem. Call Pickup from a queue on the remote PBX doesn't work. It does however work if I drag the call to my extension. Not sure why that isn't working. Really strange. This happens in exactly the same way on both of my FOP2 installs. The first time I populated buttons_custom.cfg and reload FOP2 none of the queues showed up and I couldn't pause/unpause agents at the extension level (helpful to pause/unpause in ALL queues). I fixed the queue behavior as I mentioned above. However with what I just figured out it might have been a side effect of causing the button to be "removed" and "re-added". I moved the buttons_custom.cfg file out of /usr/local/fop2 into my home folder. I then reloaded FOP2 and went into the FOP2 Manager -> Buttons to make sure they were gone (they were). I then moved the file BACK to /usr/local/fop2 and reloaded FOP2. Went into FOP2 Manager -> Buttons and the buttons showed up again. I went to Groups and added them back to the group I created for them. At this point I was back to where I was before, the buttons showing up in FOP2. HOWEVER NOW THE PAUSE/UNPAUSE WORKS!!! The queuechannel field in FOP2 Manager STILL does not show up correctly! So there could possibly still be an issue I'm not aware of. I suspect that simply removing and re-adding the buttons_custom.cfg file might have solved both problems with the queues showing up and the pause/unpause at the extension level. Because what I had done by changing the queue from [SIP/2097] to [SIP/2097^xxx.xxx.xxx] was to remove the button, and then when I changed it back I was re-adding it. I still think something is wrong here. While it appears "fixed" for me, something stopped this from working correctly on initial creation. I'm not sure if the problem might resurface again if I try to add a new button for an extension on the remote system (who is a member of a queue) to buttons_custom.cfg. I have two FreePBX servers and am adding the remote server extensions to the primary. On the remote server I ran; Which generates all the button details. I then put that into the primary servers buttons_custom.cfg For the most part it worked. However,queuechannel doesn't seem to be handled correctly. [SIP/2001] type=extension extension=2001 label=John Smith mailbox=2001@default context=from-internal [email protected] queuechannel=Local/2001@from-queue/n|Penalty=0|MemberName=John Smith|StateInterface=SIP/2001&Local/2001@from-queue/n|Penalty=0|MemberName=John Smith|StateInterface=SIP/2001|Queue=2096&Local/2001@from-queue/n|Penalty=0|MemberName=John Smith|StateInterface=SIP/2001|Queue=2097 customastdb=CF/2001 extenvoicemail=*2001@from-internal queuecontext=from-queue autoanswerheader=__SIPADDHEADER51=Call-Info: answer-after=0.001 server=XXX.XXX.XXX.XXX As you can see in FOP2Manager it cuts off after the word Penalty. What I'm experiencing is that these extensions aren't 100% working. For instance when I try to use the pause/unpause at the extension it doesn't work. I also have had an issue with the queues defined in buttons_custom.cfg. Initially they would not show up. After reading on this forum a bit I tried editing [SIP/2097] to [SIP/2097^xxx.xxx.xxx] which didn't work. I then went back in and changed it back and magically the queues showed up. FYI, yes the buttons were added to a group and should have been visible. Something isn't right here. Read through THIS THREAD. Correct permissions are set on Performed the mysql queries as well, and it looks correct. My admin account exists (the one I'm logging in with) and the SHA1 hash matches. [root@pbx]# mysql -p asterisk -e "select * from ampusers" Enter password: +----------+---------------+---------------+----------------+----------+---------+ | username | password_sha1 | extension_low | extension_high | deptname | sections| +----------+---------------+---------------+----------------+----------+---------+ | jgould | xxxxxxxxxxxxx | | | | * | +----------+---------------+---------------+----------------+----------+---------+ [root@pbx]# mysql -u root -p asterisk -e "select sha1('xxxxxxxx')" Enter password: +------------------------+ | sha1('mypass') | +------------------------+ | xxxxxxxx | +------------------------+ At least on the system that uses the FreePBX internal database. The system that pulls accounts into user manager from AD does not show the AD user account I use for FreePBX GUI Admin access. I suspect those are stored differently. Again, all I did between it working and when it stopped was download the latest fop2.tgz to /usr/src, extract, run make file, restart service. This moved me from 2.31.04 to 2.31.11. Did some digging. During the install/upgrade I went from 2.31.04 to 2.31.11. At the end I got this; New configuration file /usr/local/fop2/fop2.cfg.new installed. Original fop2.cfg preserved. New configuration file /var/www/html/fop2/config.new.php installed. Original config.php preserved. New configuration file /var/www/html/fop2/admin/config.new.php installed. Original config.php preserved. Looking at those 3 files I noted that they had some changes, specifically around authentication. So I moved the original files out of the way and renamed the .new files in their place. I also took note of the permissions on the original files and made sure the new ones going in their place matched. I have 2 FreePBX/FOP2 systems. One uses is using the FreePBX database backed for users (set in User Manager), while the other one that I mentioned in my original post uses an AD backend. Neither system seemlessly logs into FOP2 after authenticating to FreePBX with my Admin account. HOWEVER, the system using the FreePBX internal backed for users DOES accept the credentials when I provide them at the FOP2 Manager login screen AND the plugins section is shown. The system using the AD backend does NOT accept the credentials for the AD account that I use to login to FreePBX. This did work previously with FOP2/FreePBX. I suspect when FreePBX is set to use AD credentials it only worked before because FreePBX and FOP2 were "passing" the FreePBX login session along. That actually trying to type the login credentials into FOP2 Manager would have failed. And currently this passing of the session is broken due to a change on FreePBX or FOP2. Just updated to 2.31.11 and my FreePBX credentials are no longer allowing me to login to the FOP2 Manager section. Before the upgrade I was able to login without issue. After the upgrade of FOP2, and no other changes, I wasn't able to. Logging into FreePBX Admin first and then trying to login to FOP2, which used to automatically log me in, no longer works. What I've figured out so far in working on this; FreePBX has two sections where you can define user permissions. The old area is under Admin -> Administrators (with a big warning about how this is going away, mind you my FreePBX install isn't 100% updated right now). The other area is under Admin -> User Management. That is where everything is moving, or has been moved. I created a user in Admin -> Administrators and granted all the permissions. That login WORKS with FOP2. I created a user in Admin -> User Management and granted all the permission. That login DOESN'T WORK with FOP2. Now, keep in mind that before upgrade FOP2 just now it DID work with the user created in Admin -> User Management. I will note that my FreePBX is setup in Admin -> User Management -> Authentication Setting to use Authentication Engine Microsoft Active Directory. But AGAIN, this worked before the FOP2 upgrade. Also, adding to /var/www/html/fop2/admin/config.php allows me to login with the defined admin user/password. But that isn't what I want to do. What should I do? Everything else is working fine. Ok, I upgraded the FOP2 Server to Version: 2.31.04. CLI is now working again and was able to check the version.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574532.44/warc/CC-MAIN-20190921145904-20190921171904-00300.warc.gz
CC-MAIN-2019-39
9,907
49
http://www.edugeek.net/forums/windows-7/print-77769-laptop-wireless-setup-through-gpo.html
code
Laptop Wireless setup through GPO Today I tried to configure wireless settings of a laptop through GPO. I could not find a dialogue box where I could put the actual key. I tried as follows: Computer Configurations -->Windows Settings -->Security Settings -->Wireless Network (IEEE 802.11) Policies-->Right Click Create Wireless Network Policy . On the properties of the new policy there are only two tabs: General and Preferref Network. On the preferred network tab I can add a network. I added a network with SSID. In the wireless network key section the options are: Network authentication - Open/Shared/WPA/WPA-PSK Data Encription: WEP/TKIP/AES The key is provided automatically. I do not see an option where I can put the actual key. It only mentions the method but nothing about key itself. If anybody has done this before please let me know. This is the simplest and best solution Originally Posted by k-strider Many thanks for directing me towards this solution. It is the simplest and best solution. The key=clear word must be specified while exporting the profile. Works like magic. I have done as follows: netsh wlan export profile name="MyProfileName" folder=c:\Temp interface="Wireless Network Connection" key=clear Then imported the profile in another laptop as follws: netsh wlan add profile filename="location of xml file" interface="Wireless Network Connection" user=all It works fine. Does not ask for a key. key=clear must be mentioned during export otherwise it asks for a key after importing. I have put the file on the server. From there it works as well.
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400372542.20/warc/CC-MAIN-20141119123252-00035-ip-10-235-23-156.ec2.internal.warc.gz
CC-MAIN-2014-49
1,576
18
https://msdn.microsoft.com/en-us/library/microsoft.sharepoint.SPFolder.aspx?cs-save-lang=1&cs-lang=vb
code
Represents a folder on a SharePoint Web site. Assembly: Microsoft.SharePoint (in Microsoft.SharePoint.dll) Use the Folders property of the SPWeb class or the SubFolders property of the SPFolder class to return an SPFolderCollection object that represents the collection of folders for a site or folder. Use an indexer to return a single folder from the collection. For example, if the collection is assigned to a variable named collFolders, use collFolders[index] in C#, or collFolders(index) in Visual Basic, where index is either the index number of the folder in the collection or the display name of the folder. The following code example displays information about the folders in a site and all of its subsites, including the site name, the folder name, the number of files in the folder, and the total size of the files. The example also requires a predefined .aspx page that contains a label control. Dim siteCollection As SPSite = SPControl.GetContextSite(Context) Dim sites As SPWebCollection = siteCollection.AllWebs Dim site As SPWeb For Each site In sites Dim folders As SPFolderCollection = site.Folders Dim folder As SPFolder For Each folder In folders Dim files As SPFileCollection = folder.Files Dim totalFileSize As Long = 0 Dim i As Integer For i = 0 To files.Count - 1 totalFileSize += files(i).Length Next i Label1.Text += " Web: " & SPEncode.HtmlEncode(site.Name) & " Folder: " _ & SPEncode.HtmlEncode(folder.Name) & " Number: " & folder.Files.Count _ & " Size: " & totalFileSize & "<BR>" Next folder Next site Certain objects implement the IDisposable interface, and you must avoid retaining these objects in memory after they are no longer needed. For information about good coding practices, see Disposing Objects.
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375094690.4/warc/CC-MAIN-20150627031814-00175-ip-10-179-60-89.ec2.internal.warc.gz
CC-MAIN-2015-27
1,738
7
https://askubuntu.com/questions/1009094/get-file-path-over-ssh
code
I am developing an API in which I need the paths of multiple files from a remote server. The number of files varies from 100 - 500. The files are in different folders. So, I am looping over and over again, like 10-50(depending on number of files) times, and then getting paths using ssh in my python api. But I want an optimized solution for this problem. Right now, I am making ssh connection as many times as loop goes, which is slow, and also not the best thing to do. I was thinking of copying the /var/lib/mlocate/mlocate.db of remote server daily in my local machine and then find the path using locate command using this db, If that is possible. OR Like storing the remote directory index in my local machine which I can query more fastly. What are other better ways to achieve this?
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203448.17/warc/CC-MAIN-20190324124545-20190324150545-00439.warc.gz
CC-MAIN-2019-13
790
7
http://caseysoftware.com/events2
code
This is a list of books currently on my To Read shelf... literally. I do not suggest or anti-suggest any of them at this time as I haven't read them yet. This is not the home of dotProject or web2project. It is the home of CaseySoftware, LLC. Any dotProject support questions should be referred to their support forums. Well, I have good news and bad news. The Good News: php|tek 2009 will have an Unconference! The Bad News: I'm in charge. (cue mad scientist laughter) Let's be clear right off the bat: All [name]Camps (Bar or otherwise) are unconferences but not all unconferences are [name]Camps. The distinction - and this seems to be widely accepted - is that [name]Camp sessions should be selected day of and everyone needs to participate in some manner. Uncons can have the above but don't really have to... which is how it works at these Uncons which are attached to conferences. Therefore, here's the (estmated) format for this con/uncon combination: So here's your mission: A couple months ago, when I was at ZendCon08, I spent a good amount of time chatting with Chris Cornutt (eygma on IRC and Twitter) who is also the founder of PHPDeveloper.org. One of the things he showed me was his pet project: Joind.in One of the odd things about many of these tech conferences, is how speaker/session evaluations are handled. At many of them, the room manager hands you a printed evaluation form. You write your comments, mark your scores, and turn it in. And finally, month or so later, the conference organizers get back to the speakers with the scores. For a tech conference with a tech audience with tech speakers, this doesn't make a lot of sense. As of today, my highly esteemed colleage and pants-freedom advocate Paul Reinheimer announces a new event for php|works next week: To put the concept simply: The format is a little bit different than a talk (thank god) and hopefully a lot more fun. Basically the presenter gets up there with twenty slides, each are going to be shown for exactly 20 seconds, for a total of six minutes forty seconds. No take backs, no do-overs, no boring slides full of code. The format lends itself well to quick, interesting presentations on pretty much anything. Wow. It's like an automated lightning talk... it has the potential to either be a glorious exchange of concepts or an entertaining session of mishaps, humor and a bit of chaos. I give even money for it to be a bit of both. Elizabeth Naramore is the ringmaster for this chaos. If you're interested, contact her while there are still slots left. She's at elizabeth at phparch dot com. Some of you may have heard the rumor that Marco Tabini and I are working on something. You might have heard bits and pieces... but very few of you have heard the full story of how it came about, what it is, and where it's going. This post is not that announcement. This post is about my upcoming presentation at php|works 2008! (I know, I'm a jerk.) Well, actually it's been over for a week now, but I digress... One week ago today wrapped the second PHP Appalachia Conference. The first one was two years ago and consisted of a bunch of geeks sitting around a camp fire, hanging out in a small cabin, and generally having a good time. This time around, it was quite a bit different. The highly esteemed Elizabeth Naramore - who works with Marco Tabini* of php|Architect to organize php|works and php|tek - took the lead and found The Beast. It's this massive mountain-top fortress cabin which sleeps 40, seats 40 in the kitchen, seats 20+ in the movie theater, and 20+ in the living room in front of the massive flat screen television. While I seem to be talking more and more about conferences lately, this next one is near and dear to my heart... PHP Appalachia. PHP Appalachia originally came about a few years back because... well, I'm not sure, but I've heard (I wasn't there) that it resulted in a bunch of PHP geeks sitting around a camp fire, a bit hacking away a bit during the day, and generallly building the community that PHP is known for.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164035500/warc/CC-MAIN-20131204133355-00016-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
4,041
25
https://mydesktoplife.org/news/workshop-mydesktoplife/
code
“MyDesktopLife, the Workshop” a collaboration event. MyDesktopLife is an original software, a new online webmixer. During the workshop, collaborators, friends, participants will gather and work together to share the use MyDesktopLife with the new CMS. Participants will join to learn the use of this software with us, or just to celebrate the pleasure and the interest of creating new works of art inside a browser. Please come to my studio in Amsterdam on 22 july from 6 pm to 12 pm for this workshop. Send me an email at martine (@) neddam.info for the private address of my studio.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100535.26/warc/CC-MAIN-20231204214708-20231205004708-00594.warc.gz
CC-MAIN-2023-50
588
6
https://community.amd.com/t5/general-discussions/non-support-related-question/m-p/218224
code
I am a relatively new user here and I have received a lot of help from this community. I wanted to make a possible game/software giveaway (nothing fancy at all) and I am not sure if giveaways are allowed in these forums. If that is allowed, then I would be really happy to do a giveaway. In this case, since I would like to do a giveaway, based on contribution and registration date - is there any way to determine the contribution, like badges rewarded, etc? I just want to include every user and I think it would be more fair to offer different games, based on user's contribution to the forums. Thank you in advance.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649518.12/warc/CC-MAIN-20230604061300-20230604091300-00421.warc.gz
CC-MAIN-2023-23
619
5
https://trisquel.info/es/forum/technically-trisquel-6-now-also-supports-secure-boot
code
Technically, Trisquel 6 now also supports Secure Boot? As you may have noticed, Ubuntu 12.04.2 came out the other day with the 3.5 Quantal kernel enabled by default and support for Secure Boot: http://fridge.ubuntu.com/2013/02/14/ubuntu-12-04-2-lts-released/ Since Trisquel 6 is being released very late and will migrate in those changes, doesn't technically Trisquel now support Secure Boot as well since it is using the code from Ubuntu and the GRUB settings? Is Ruben going to keep it in there or rip it out and replace it? What are your feelings on this? Is it good thing for those who bought a Windows 8 laptop and want to try out and potentially dual boot with Trisquel? Adding Secure Boot support was kinda necessary by some becuase without it, GNU/Linux systems could potentially be locked out in the future. > Is Ruben going to keep it in there or rip it out and replace it? I'm not exactly a fan of UEFI, which seems to be a standard developed in the interests of companies only. But that doesn't keep the user from being any less free either. A lot of UEFI implementations are proprietary, so of course manufacturers can make it difficult to disable it or add other operating systems. But that's not a fault of UEFI but the implementation itself. Maybe coreboot itself will be UEFI-compatible in the future!? (we can only speculate on that at the moment - I'm sure the coreboot developers have higher priorities) Restricted Boot, on the other hand, is another story entirely...
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122621.35/warc/CC-MAIN-20170423031202-00521-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,488
9
https://www.kmworld.com/Articles/White-Paper/Article/AI-Driven-Customer-Experiences-are-the-Future-of-Knowledge-Management-124672.aspx
code
AI-Driven Customer Experiences are the Future of Knowledge Management Knowledge management, at its essence, collects, catalogs, and curates data in order to make it usable to an organization. Today’s knowledge workers expect more. They expect both raw data and analytics—scratch that—answers at their fingertips. They expect automation to eliminate repetitive tasks and streamline workflows. Some key technologies and techniques are required to implement these advanced capabilities including effective search, scalable storage, and powerful AI. Search is Everything The volume of data modern organizations have to access is just too large to curate every byte into a well-thought-out, hand-crafted ontology that a user can easily navigate. Instead, users expect the ability to simply ask questions and get answers. Some answers are a number or phrase (i.e., “What was last month’s sales forecast for QLS?”), where some answers are collections of documents or charts or analytics. Context is King Both users and data exist in a particular context. If I’m in marketing, a “qualified lead” may mean something different than if I’m on the sales side of things. Marketing has its “marketing qualified leads” and sales has its “sales qualified leads.” A well-designed system should understand this distinction and return the answer that is right for me. Context is truly user experience (UX). It depends on the back end, including security (plus knowing authenticated users), organizational metadata, and the data management system. It also depends heavily on the interface itself. Key to this is data unification. If a sales rep has to look up an account’s information in several places, that’s a lot of search and a lot of inefficiency. The rep should find everything needed in the most obvious place. The system should execute the search taking into account the context of the customer currently being served. User Interfaces are Conversational Modern user interfaces must provide a full-featured user experience beyond the search box and list of links. Modern user interfaces are bi-directional: they must provide and collect behavioral data from the user. This data is used to personalize the experience. Answers shouldn’t just be provided based on my position in the company but based on the kinds of things that I tend to look for. If I tend to click through to charts and analytics, then the system should give me more charts and analytics. If I tend to just want an answer (“Just give me the number, I don’t need a story!”), then give me just an answer. Collection and Curation Must Be Automated The old tried-and-true KM tools and methods are not enough anymore. By the time you achieve the ideal organization of all your data, it will not only change, but you’ll have drowned in the data. Using AI techniques like machine learning and deep learning, systems can be trained to automatically categorize and curate data. Instead of humans manually creating and tagging information into ontologies, humans can teach a computer how to do it for them. Machine learning (ML) and deep learning is not a luxury only for organizations with the resources to do more advanced capabilities. It is an absolute necessity. Modern computing has taken us from the 1990s dearth of data to a deluge of data pushing us to the point of drowning. The problem is almost never that we don’t have data, but that we cannot sort and curate the data into answers fast enough given the volume. Where modern computing created this problem, modern computing has the answer.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100674.56/warc/CC-MAIN-20231207121942-20231207151942-00024.warc.gz
CC-MAIN-2023-50
3,591
15
https://github.com/roman380/gdcl.co.uk-mpeg4
code
DirectShow MPEG-4 Part 14 (.MP4) Multiplexer and Demultiplexer Filters These are based on filters by Geraint Davies (info at gdcl dot co dot uk) enhanced by Roman Ryltsov (roman at alax dot info). In order to successfully build the solution/projects, baseclasses directory from Windows SDK needs to be copied as a subdirectory in solution file directory. 05 Jun 2015 - merged update by Noël Danjou (added handlers for: MPEG-2 Video and Audio, Dolby Digital (AC-3), Dolby Digital Plus (Enhanced AC-3); added support for FORMAT_UVCH264Video) - minor updates 17 May 2015 - Fixed problem in multiplexer with stts/stsz atom discrepancy; produced files could be rejected by MainConcept demultiplexer and GDCL demultiplexer would produce final sample on the track with incorrect zero timestamp 08 May 2015 - Projects converted to Visual Studio 2013, stripped older solution/project files; using Windows XP compatible toolset - Added type libraries with coclasses (esp. to enable #importagainst built binaries and automation of registration free COM) - Added ability to restart streaming without re-creation of thread, esp. to speed up seeking in scrubbing mode - Added support for edit entries (elst atom and related) (*) - Added AsyncRequestor code, which is not used/disabled (*) - Added attempt to normalize video frame rate (*) - Added (extended) ability to store raw/uncompressed video in MP4 container, such as UYVY, RGB video; this might be lacking compatibility but can be used for temporary storage - Added implementation to handle AM_SEEKING_ReturnTimeflags when seeking - Added private interface and method IDemuxOutputPin::GetMediaSampleTimesto quickly read track/stream media sample times without loading actual data - Fixed problem with stream times set off (by small amount) after seeking - Time scale changed from 90 kHz to 360 kHz to add precision to 59.94 fps timings - Added capability to create temporary index file as multiplexer writes, in order to be able to recover aborted/crashed session using broken .MP4 file and the index file IMuxMemAllocatorinterface with ability to (a) identify copy allocator, (b) reduce minimal forced amount of buffers on copy allocator IMuxInputPin::GetMemAllocatorsto access public and internal memory allocators - Fixed problem with input samples without stop time MuxInput::GetAllocatorimplementation, fixing memory leak and avoiding unnecessary allocator construction - Improved support for raw video media types, added support for HDYC code (*) Geraint's unpublished updates Free DirectShow Mpeg-4 Filters The GDCL Mpeg-4 Demultiplexor and Multiplexor filters are now freely available for download in source form. You can re-use them in your projects, commercial or otherwise (provided that you don’t pretend that you wrote them) or use them as sample code when starting on your own project. Of course support and documentation are somewhat limited. This initial release is being made available because of the insolvency of a customer. As I get time, I intend to enhance these filters. For now, they support ISO Mpeg-4 files containing Mpeg-4 and H.264 video and a variety of audio formats. The files created by the multiplexor will work with QuickTime and the iPod. Note: both mux and demux filters need a small amount of code added for each media type that is to be supported. So far I have only added a limited set of types. If you need other types to be accepted, please get in touch directly. It’s likely that only a few lines of code will be needed. Published: September 2006. Latest Update: May 2013.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659056.44/warc/CC-MAIN-20190117163938-20190117185938-00330.warc.gz
CC-MAIN-2019-04
3,563
35
http://www.whitespace.co.uk/python-ate-brackets/
code
Every programmer should have a scripting language to hand. Yes, the big system may be compiled and ingeniously installed, but there are day to day tasks which should be edit and run, edit and run. Working on Macs, with Couchbase as a database, we needed a scripted way of creating test data. Then we could quickly refine the logic and push a better document. When Rohit suggested using Python, my reaction was yes, let’s give it a go. It worked a treat. I’m reeling from a language without curly brackets, but I will get over that. I changed my mind from uploading the files to writing them locally (for a later batch upload) and Rohit was able to comment out a line, add a file naming convention and run it again. How many thousand new documents did I want? def generateRandomClaim(claimType, push): surname = Randomizer.pickFrom(surnames) firstName = "" if Randomizer.oneChanceIn(2): firstName = Randomizer.pickFrom(femaleFirstNames) else: firstName = Randomizer.pickFrom(maleFirstNames) os.system("python RandomClaimGenerator.py " + claimType + " " + firstName + " " + surname + " " + push)
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258849.89/warc/CC-MAIN-20190526045109-20190526071109-00136.warc.gz
CC-MAIN-2019-22
1,097
4
http://linuxsay.com/t/sysv-rc-conf-installation-not-working/2360
code
Hi I am following the article at: Article says to install sysv-rc-conf, just type sudo app-get install sysv-rc-conf. Did that and got: Package sysv-rc-conf is not available, but is referred to by another package. This may mean that the package is missing, has been obsolete, or is only available from another source. How do I get this and proceed from step 26 of the above article? I am a complete noob, so need detailed instructions. This is my first install - installing on windows 10 hyper-v.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313436.2/warc/CC-MAIN-20190817164742-20190817190742-00548.warc.gz
CC-MAIN-2019-35
495
6
https://forums.developer.nvidia.com/t/how-to-flash-bootdata-stored-as-bin-file-in-filesystem-to-mipi-isp-in-jetson-nano/236463
code
I’m using MIPI based sensor to stream video in Jetson Nano, this sensor is connected to ISP and Jetson Nano connected to this ISP through MIPI interface, now initially I need to load bootdata, for that I had seen some sources where they are storing binary file in OTP flash and for flashing bootdata to ISP they are reading data from OTP flash and sending to ISP, for now I have binary file, I dont have any OTP flash so what I want to do is I will store binary file in FILESYSTEM and through driver I want to read this binary file and flash to ISP , can anyone tell me How to do this? How to Flash bootdata stored as bin file in filesystem to MIPI ISP in Jetson Nano? HI there @nolanmaverick524. I think you might find better help in our dedicated Jetson category. I hope you don’t mind if I move this topi over there? I had found this post Direct firmware load for ap1302_fw.bin failed with error -2 here this guy stores bin file in /lib/firmware/ and tries to flash to ap1302 , this is how I want, can anyone tell me how to do that? I’m not fully understand your comment. may I know what’s the actual use-case, what did you meant flash to ISP? please check this link TEV-Jetson_Camera_driver/main.c at tn_l4t-r32.7.1_kernel-4.9 · TechNexion-Vision/TEV-Jetson_Camera_driver · GitHub once, data taken from bin file is being written to AP1302 ISP, and the bin which they used to write data is stored in OTP memory, now what I want to do is, I want to store this bin file in rootfs and my driver need to read this bin file from rootfs and write these data to AP1302 ISP as sensor_load_bootdata function in the link is being written. please refer to CID controls, you may also check reference camera drivers for reading sensor’s OTP for calibration file. Thanks for response, the source you suggested, is reading bin data from OTP, what I need is read bin data from root file system. I assume you’re going to parse the calibration file via rootfs for image tuning. it’s by default having camera ISP override file putting under there’s capability for loading camera calibration file from that during camera initialization. however, we don’t support image tuning related stuff through forum discussion thread. did you co-work with Jetson Camera Partners? you may contact with them for further supports. I couldn’t able to read binary from the rootfs. Instead, I converted the .bin file to a header and read it from there. I needed to change that driver a bit, in order to make it work with my custom ap1302. But do contact me via mail if you want further help. can you provide your mail ID? This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655244.74/warc/CC-MAIN-20230609000217-20230609030217-00405.warc.gz
CC-MAIN-2023-23
2,709
21
https://www.aeva.com/career/?lv_jid=de178b16-2bcf-4c21-a4a1-aecb22ada726
code
Aeva’s mission is to bring the next wave of perception to a broad range of applications from automated driving to industrial robotics, consumer electronics, consumer health, security, and beyond. Aeva is transforming autonomy with its groundbreaking sensing and perception technology that integrates all key LiDAR components onto a silicon photonics chip in a compact module. Aeva 4D LiDAR sensors uniquely detect instant velocity in addition to 3D position, allowing autonomous devices like vehicles and robots to make more intelligent and safe decisions. We are seeking a highly skilled and motivated Machine Learning Engineer with a focus on Perception technologies such as object detection and semantic segmentation. The ideal candidate will have a deep understanding of ML/DL technologies and frameworks, excellent Python and C++ skills, and hands-on experience with PyTorch. You will be instrumental in developing and deploying state of-the-art perception systems on embedded platforms. What you'll do: - Develop and implement state-of-the-art machine learning models for object detection and semantic segmentation tasks, using PyTorch. - Prototype new algorithms, design and carry out experiments to demonstrate their effectiveness. - Optimize algorithms for real-time execution on embedded platforms and ensure robust and efficient deployment using TensorRT and CUDA. - Collaborate with the broader team to define product requirements, system design, and algorithm development. - Stay up-to-date with the latest advances and trends in machine learning and artificial intelligence. - Debug and solve complex technical issues related to ML/DL models and deployment What you have: - Bachelor's or Master's degree in Computer Science, Machine Learning, AI, or a related field. - Proven experience as an ML Engineer or similar role, with a focus on object detection and semantic segmentation. - Proficient in Python and PyTorch for designing, developing, and testing machine learning models. - Experience with deploying ML/DL models on embedded platforms using TensorRT and CUDA. - Familiarity with state-of-the-art machine learning algorithms and perception technologies. - Excellent problem-solving abilities and attention to detail. - Strong communication and team-working skills. Nice to have: - Experience with writing inference code in C++ for real-time applications and performance optimization. - Exposure to automotive development processes. - Prior knowledge of embedded device software development process and lifecycle What's in it of for you: - Be part of a fast paced and dynamic team. - Very competitive compensation and meaningful equity. - Exceptional benefits: Medical, Dental, Vision, and more. - Unlimited PTO: We care about results, not punching timecard.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510358.68/warc/CC-MAIN-20230928031105-20230928061105-00287.warc.gz
CC-MAIN-2023-40
2,781
26
https://waldroninteractive.com/?m=199908
code
National Sports Challenge National Sports Challenge was my first paid client job. I was 19 years old and I was paid about $250 to build it. NSC was a Madden 2000 tournament, E-sports way ahead of its time. Not only did I build the website, but I helped the guy running it to set up 64 40-inch CRT TVs and Playstations in a hotel conference room. Despite widespread radio ads, turout was much lower than expected. But to just have someone pay me to build a website was exciting.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102697.89/warc/CC-MAIN-20231210221943-20231211011943-00074.warc.gz
CC-MAIN-2023-50
477
2
http://www.tomshardware.com/answers/id-2005685/network-building-management-control-render-farm.html
code
I'm planning to build a small render farm for my 3D work at home. I have a good workstation and I am gonna start with 16 nods (i7 3770 / 8GB ram / HDD and MOBO with 1000Mbps LAN in a mini case) another 16 to be added latter for this part of the hardware configuration I am Ok with. For the network part I have a lot of questions right here: 1- for network management -I don't know anything about building, managing, controlling & Monitoring a network- 2- should I have a different computer other than the workstation to manage the network through 3- for storage: should I have a NAS storage or I can work on the work station HDD 4- for network hardware: switches, cables, speed ??? 5- should I support the nods or the workstation with two LAN cards 6- for software (???????????????) what I have been told is: - working on 1000 Mbps is gonna make a big difference over 100Mbps, so I should buy switch and cables that support this speed and the LAN card in each nod and the workstation of course. Briefly I want to build a stable, secure and affordable network for RENDER (In details and step-by-step). I am not any sort of an expert in 3D RENDER like you are doing but from the sounds of it you are thinking you need something 10x more complex then what you need. What are your needs for managing the network? There is software out there that lets you monitor all your traffic like wireshark, and then there is SNMP (Simplte Network Managment Protocol) software out there. From the sounds of it, you probably do not need anything more then the WebGui of your router which allow you to set IPs, Port Forwarding, View Active Devices, etc. The only reason you would need two lan cards is if you are going to have two issolated networks that a machine needs to access. To have a stable network you just need a good gigabit switch, and a decnet router. The netgear wnr3500l is a good little router that allows you to put tomatousb firmware on it which will provide you with good tools to manage your network (not enterprise level tools, but I dont think you need anything that complex). Trendnet, D-Link, Netgear, and even TP=Link all make good unmanaged 16-24 port gigabit switches. I would go with a 24 since there is not much of a price difference and will give the extra ports. As far as the nodes go, most every computer in the last 10 years has a gigabit connection, but since I am not familiar with the equipment you use you may want to check if they have gigabit (1000mbps) ports on them.
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657135930.79/warc/CC-MAIN-20140914011215-00140-ip-10-234-18-248.ec2.internal.warc.gz
CC-MAIN-2014-41
2,490
22
https://www.synopsys.com/software-integrity/training/software-security-courses/pci-security-standards.html
code
Vulnerabilities to payment card security are a threat to everyone with a credit or debit card in their wallet. Every day, we effectively transmit highly personal and sensitive data about ourselves to strangers. If all goes well, only the intended recipients ever see our information. If not, the results can be disastrous. Thus the criticality of the Payment Card Industry Data Security Standard (PCI DSS). PCI DSS provides guidance to organizations that collect, process, transmit, or store cardholder data. In this course, you will learn about PCI DSS: the data it is intended to secure, its requirements, how to incorporate those requirements into code, and how to avoid common mistakes that can make your software vulnerable to attack.
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426169.17/warc/CC-MAIN-20170726142211-20170726162211-00029.warc.gz
CC-MAIN-2017-30
739
1
https://www.theverge.com/2016/6/7/11879224/iphone-android-open-source-project-hack-case-nick-lee-tendigi
code
Developer Nick Lee has earned himself a reputation for putting weird and wacky operating systems on Apple gadgets, including Windows 95 on an Apple Watch. Now, he's gone the practical route of bringing a full-fledged version of Android to the iPhone. There's just one catch: you need a special, 3D-printed smartphone case to make it work. Lee decided to clone the Android Open Source Project (AOSP) and make a custom version of Android Marshmallow he could run on a board he bought himself. He then 3D printed an iPhone-sized enclosure he found on Thingiverse, and combined the board, a battery, a boost converter, and resistor to make a lightweight case. At first, it was quite bulky, resembling a brick you'd be more likely to have seen in a cellphone store 15 years ago. But after slimming down the design, Lee was able to craft an enclosure not too much larger than your standard smartphone battery case. He also included openings for HDMI and USB ports, as well as a SD card slot. In his YouTube demonstration, Lee appears to slip a light sheet of plastic over the components before placing an iPhone on top. He also appears to boot Android by way of a custom Tendigi app on the iPhone's home screen. Tendigi, where Lee works as CTO, is a mobile design and development studio in Brooklyn, and Lee uses its iOS app to communicate with the case and load his custom version of Android on an iPhone 6S's display. The whole process here took many days, Lee says, and it's not exactly practical. But it is a fascinating look at both the ingenuity it took to perform this feat and the lengths at which you have to go to get even a custom open-source version of Android running on Apple's flagship phone.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100112.41/warc/CC-MAIN-20231129141108-20231129171108-00522.warc.gz
CC-MAIN-2023-50
1,701
4
https://www.scottystrucking.com/group/mysite-200-group/discussion/87c276b2-dc34-4f79-b580-5fbdd894ed4c
code
Adobe CS5 Master Collection - All You Need to Know and How to Get It NB : ifyou have problems with authentification when you start application, check the file/etc / hosts and make sure you have a like like this :127.0.0.1 activate.adobe.comIf you dont add it manually. Open a terminal and use your favourite editor you must do that as root example (after opening a terminal window) : sudo pico / etc / hosts then at request put your root password adobe master collection cs5 keygen hosts Code:sudo nano /private/etc/hostsCopy & Paste this lines:Code:127.0.0.1 activate.adobe.com127.0.0.1 practivate.adobe.com127.0.0.1 ereg.adobe.com127.0.0.1 activate.wip3.adobe.com127.0.0.1 wip3.adobe.com127.0.0.1 3dns-3.adobe.com127.0.0.1 3dns-2.adobe.com127.0.0.1 adobe-dns.adobe.com127.0.0.1 adobe-dns-2.adobe.com127.0.0.1 adobe-dns-3.adobe.com127.0.0.1 ereg.wip3.adobe.com127.0.0.1 activate-sea.adobe.com127.0.0.1 wwis-dubc1-vip60.adobe.com127.0.0.1 activate-sjc0.adobe.com127.0.0.1 adobe.activate.com127.0.0.1 hl2rcv.adobe.com127.0.0.1 188.8.131.52:443127.0.0.1 184.108.40.206:43127.0.0.1 220.127.116.11127.0.0.1 18.104.22.168:443127.0.0.1 22.214.171.124:43127.0.0.1 126.96.36.199127.0.0.1 ood.opsource.net127.0.0.1 CRL.VERISIGN.NET127.0.0.1 188.8.131.52:80127.0.0.1 184.108.40.206127.0.0.1 adobeereg.com127.0.0.1 OCSP.SPO1.VERISIGN.COM127.0.0.1 220.127.116.11:80127.0.0.1 18.104.22.168Save with:Code:CONTROL + XAn then type this to flush the DNS cache, and have your host file changes to take immediate effect: My hosts looks like above### Host Database## localhost is used to configure the loopback interface# when the system is booting. Do not change this entry.###as 4 linhas abaixo foi editada com # para nao ser lido#127.0.0.1localhost#255.255.255.255broadcasthost#::1 localhost#fe80::1%lo0localhost127.0.0.1 activate.adobe.com127.0.0.1 practivate.adobe.com127.0.0.1 ereg.adobe.com127.0.0.1 activate.wip3.adobe.com127.0.0.1 wip3.adobe.com127.0.0.1 3dns-3.adobe.com127.0.0.1 3dns-2.adobe.com127.0.0.1 adobe-dns.adobe.com127.0.0.1 adobe-dns-2.adobe.com127.0.0.1 adobe-dns-3.adobe.com127.0.0.1 ereg.wip3.adobe.com127.0.0.1 activate-sea.adobe.com127.0.0.1 wwis-dubc1-vip60.adobe.com127.0.0.1 activate-sjc0.adobe.com How do you un-Patch the host files for cs5? I installed a try before you buy version of CS5 from a torrent site and now i have enough cash to buy it. I had a CS4 master collection on there previously and when i try and deactivate it just says it wont connect to the internet and i think its because when i patched the host files for the cs5 install, it has blocked the connection to adobe! This essentially tells your computer that when you attempt to navigate to either activate.adobe.com or practivate.adobe.com, rather than being directed to those addresses, your computer will loop that navigation back to itself, and your Adobe programs will fail to reach the adobe activation destination. 127.0.0.1? is your computers own loopback IP address.edit windows hosts file for adobe activation
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100232.63/warc/CC-MAIN-20231130193829-20231130223829-00823.warc.gz
CC-MAIN-2023-50
3,000
7
https://dmoj.ca/problem/gfssoc1j1
code
Points: 3 (partial) Time limit: 2.0s Memory limit: 16M Griffy is flying to Don Mills C.I. to make friends (after Glenforest's defeat in ECOO)! Griffy would like to fly at exactly meters off the ground (the most relaxing height). However, Don Mills (being a weird school) recently installed giant cat girl plushies in a line (right on Griffy's course too!). Each plushie has a height of , and spans from the ground to its height inclusive. Determine how many plushies Griffy will fly into, assuming he will fly in a straight line at a constant height. The first line will contain a single integer . The second line will contain a single integer . The next lines will contain values of . Output one line, the number of plushies that Griffy will fly into. 5 3 1 7 5 It was a weird problem. Interestingly the last 4 cases returned NumberFormatExceptionand further testing revealed null inputs for those cases, even though my program passed the sample input and the other cases. Test cases are written wrong, perhaps? Or do I have to consider null as a possible input and compensate for it? Not quite sure if this will solve it, but a byte can only handle values up to 128. The maximum output can be 200. Changed to all shorts but still didn't work. I think it's the problem with the test cases. There's still a bytekeyword in your code My stupidity is my downfall... Forgot that byte only goes to 127... I'll leave this here so future people don't mess up at this point. And yup it works now. Thanks. I agree, definitely a weird school.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656869.87/warc/CC-MAIN-20230609233952-20230610023952-00478.warc.gz
CC-MAIN-2023-23
1,532
18
http://csgo-forecast.com/en/match/maxandrelax-vs-reason-2015-11-03
code
Take a swipe on the block above to see the statistics of all players New squad Reason simply ridiculous compared to the team MaxAndRelax.Strong guys from the team MR will carry it is reasonable to Izzy. The players themselves on individual skill will do everythingI put a high bet on the team MR. Bets for 18.10.18 Guru forecastsOrder advertising Now the world of CS GO in your smartphone! Stay always in touch, no match will not pass without you! CSGO Forecast Analytical Service in online mode informs you about upcoming, LIVE and the results of past matches, etc. Look at the predictions for the matches and make your own, vote or bet virtual bets on matches, participate in contests and win skins!
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511744.53/warc/CC-MAIN-20181018063902-20181018085402-00529.warc.gz
CC-MAIN-2018-43
701
8
http://otherplaceforum.com/viewtopic.php?f=12&t=3133&p=128806
code
The Windows install you have will be an OEM product key which Microsoft won't activate online. Sometimes you can call them and they might give you a new product key so it will activate. Don't tell them exactly what happened though. You are only allowed to change 2-3 components of a computer before they class it as a different computer. Alternatively, download Windows Loader by Daz (Google that exact term). It will re-arm the OS with some clever trickery and as the product key isn't blacklisted, it will always show as a valid copy of Windows. As for the mouse, try deleting the pair from Bluetooth settings and pairing it up again. If that fails, reinstall the bootcamp drivers (some Mac's come with slightly different BT chips and require a different driver).
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038075074.29/warc/CC-MAIN-20210413213655-20210414003655-00179.warc.gz
CC-MAIN-2021-17
765
3
https://blog.talosintelligence.com/vulnerability-spotlight-talos-2018-0545/
code
Vulnerabilities discovered by Marcin Noga from Talos Talos is disclosing a remote code execution vulnerability in the Microsoft wimgapi library. The wimgapi DLL is used in the Microsoft Windows operating system to perform operations on Windows Imaging Format (WIM) files. WIM is a file-based disk image format created by Microsoft to simplify the deployment of Windows systems. If an attacker creates a specially crafted WIM file, they could be able to execute malicious code with the same access rights as the logged-in user, or just crash the system with a denial-of-service attack. The vulnerability is related to the file header parsing, which means it gets triggered even on simple operations. WIM files do not have a registered file type handler by default, which means that this vulnerability cannot be triggered by tricking a user into double-clicking a WIM file — at least not without registering a file-handler first. This vulnerability was assigned CVE-2018-8210 and a security patch was released as part of the June 2018 Microsoft Patch Tuesday release. The Microsoft advisory can be found here. The vulnerability exists in the LoadIntegrityInfo functions that manifest during the parsing of a WIM file header. A specially crafted WIM file can lead to a heap corruption, and remote code execution. The vulnerability triggers, even on the simplest operations performed on a malformed WIM file. For example, it is enough if an application tries to open the WIM file via the WIMCreateFile function and requests a file handle. The function allocates heap memory based on a user-controlled size value, and uses another user-controlled value to read n bytes from the file into this buffer. It is using these values without any prior input checks. More technical details can be found in the Talos Vulnerability Reports. The following Snort rules will detect exploitation attempts. Note that additional rules may be released at a future date, and current rules are subject to change pending additional vulnerability information. For the most current rule information, please refer to your Firepower Management Center or Snort.org. Snort Rule: 46055-46056,46058-46059
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476399.55/warc/CC-MAIN-20240303210414-20240304000414-00195.warc.gz
CC-MAIN-2024-10
2,172
7
https://musicareview.com/song/1536950528/the-code-feat-polo-g-king-von
code
Enjoy high maximum transfers into more than 20 currencies while saving up to 90% over local banks! The cheap, fast way to send money abroad. Free transfer up to 500 USD! Alex199602 - Fire R.I.P. Von this album is amazing JerriHendrix - VON WAS GETTING BETTER & better 😤😤🔥🔥 V.roy RIP YOU A LEGEND FOREVER, LONG LIVE VON ❤️❤️ iiiAcorn - R.I.P R.I.P KING VON Pri5488 - The Best Real G hgcgydfgffhtddb - I hate it it’s the dumbest thing i love robotek - Rip Von Griffin418 - R.I.P von shii head me tearing h3ll0 m8 - yo Rip king von walt being walt - Goats never die Rip he was really next up😢💯 MALIK1991058 - RIP KING 👑 VON 5incoDee - Straight heat dis da bomb 🔥 - Rip Von 🕊💔 Gone too soon 🕊🕊🕊 BigFan4Real - RIP 😭😭😭 This album is 🔥🔥🔥. I will miss you a lot. 😭😭😭 gecko4470 - Gone too soon Kkricks - Von bumps L.A vato in ChiTown 2007 found out about Chicago rappers. R.I.P and much 💙love Von☹️. 1centbryan - rip von J_Bach123456789 - RIP KING VON You were truly a hip hop/rap king 👑🔥 Alexnder Cruz - Rip bro Greatest to ever do it!! RIP BRO cole_kid - RIP🥀 Rest easy 👑😔 billy9424 - The kid is fire Mine too, arms dangerous, PHILLYKAYY - I fw it luv you von ❤️ gang pejagregoirr - The box blue I am a blue classic and blue and I smell like poo acting like poo wahoo I eat poop chris8263821 - 🔥🔥🔥🔥🔥🔥🔥🔥 NewBlonde - Love it From beginning to end! Whole album is fire eeee errr - Amazing iLa682 - Top Top Pressure Baby 🔥🔥🔥 Jaay990 - Best album yet He’s not playing w this one 🔥🔥🔥 Gaydaralertt - 🔥🔥 Fasho Album is fye!!!! Yessiiiirrrr payo12312 - Strait fire MystroMixx - Bad U stink dawg. This sounds like what a wet fart smells like! vic is to good - Improvements Wow he really improved so much from Grandson Vol.1. He got a lot of good songs on here. Love that he tapped into the melodies. Best Tracks: Demon, The Code, Mine Too, Mad At You, and How It Go Worst track: Gleesh Place savage2448 - I’m from the 63rd but still🔥 connorfrmthawiic - 🔥🔥🔥 <3InPease - Anyone hating on this album are bums that live on 63rd I love the bangers on the list and Avon only getting better Michael aponte - 🔥🔥🔥 This is gonna be so nasty 😝😝 Abdojara - He’s not from 63rd Miacelesteee - KINGOFDRILL my baby album gonna be t’d per usual make sure y’all go get it ❤️ITS UP Get $32 off on your first stay at travels. Claim your $32 Airbnb free credit by clicking here! Wondering how you could earn $25 by just signing up? Earn $25 for free by joining Payoneer. Sign Up! You can learn how to earn on the Forex market! Become Libertex client and practice trading on financial markets without risk. Get Free Forex Course! Mind Lab Pro ® 🎯 Mind Lab Pro® boosts work performance and productivity with nootropics for focus, multitasking under stress, creative problem-solving and more. Buy Now! @KingVonFrmdaWic 🔥❤️ King Von (feat. Polo G) - The Code (Official Video) via @YouTube. REAL HIP HOP . King Von (feat. Polo G) - The Code (Official Video) . DL Assault D!stant (Org Announcement 8 PMEST) Current Algorithm Songs we’re working! Creators hit my line & let’s work :) Suede 👞- EGOVERT! Wanted 🚨 - Blanco All Da Action 🔫 - YSB Trill The Code 🧬 - King Von (Feat. Polo G) Walked In 🤝 - Kevin Powers Also DM @scubafortnite for more song choices like these!. King Von (feat. Polo G) - The Code (Official Video) via @YouTube. The Code [Explicit] by King Von (feat. Polo G) via @amazon .
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703529331.99/warc/CC-MAIN-20210122113332-20210122143332-00538.warc.gz
CC-MAIN-2021-04
3,573
81