url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://littletreesoftware.com/computer-requirements-for-blogging-on-bluehost/ | code | Computer Requirements For Blogging On Bluehost
Discovering a top notch inexpensive webhosting supplier isn’t simple. Every internet site will have various needs from a host. Plus, you need to compare all the features of an organizing firm, all while looking for the best bargain possible.
This can be a whole lot to type with, specifically if this is your first time acquiring hosting, or developing a site.
Most hosts will provide extremely affordable introductory rates, just to elevate those rates 2 or 3 times greater once your preliminary call is up. Some hosts will provide totally free rewards when you join, such as a complimentary domain, or a complimentary SSL certificate.
While some hosts will certainly have the ability to supply much better performance and also high levels of protection. Computer Requirements For Blogging On Bluehost
Below we dive deep right into the most effective low-cost webhosting plan there. You’ll learn what core holding functions are vital in a host as well as exactly how to analyze your own hosting demands so that you can pick from among the very best low-cost organizing carriers listed below.
Disclosure: When you purchase a web hosting bundle with links on this web page, we gain some compensation. This aids us to keep this site running. There are no added expenses to you in all by using our web links. The listed here is of the very best low-cost webhosting bundles that I’ve directly made use of as well as checked.
What We Consider To Be Economical Web Hosting
When we describe a web hosting bundle as being “Low-cost” or “Budget” what we indicate is hosting that comes under the cost brace between $0.80 to $4 monthly. Whilst researching low-cost holding service providers for this overview, we took a look at over 100 various hosts that came under that cost range. We then evaluated the quality of their most affordable holding package, worth for money as well as customer care.
In this article, I’ll be reviewing this world-class website organizing business as well as stick in as much relevant details as feasible.
I’ll review the functions, the pricing options, and anything else I can consider that I believe may be of advantage, if you’re deciding to join to Bluhost and obtain your internet sites up and running.
So without additional trouble, let’s check it out.
Bluehost is among the biggest host business worldwide, getting both enormous advertising support from the business itself and associate marketing experts that advertise it.
It really is a substantial business, that has actually been around for a long time, has a big track record, and is most definitely one of the leading choices when it involves host (definitely within the leading 3, at the very least in my publication).
But what is it specifically, and should you get its solutions?
Today, I will certainly respond to all there is you require to recognize, provided that you are a blogger or an entrepreneur that is seeking a host, and does not know where to get going, given that it’s a wonderful option for that target market as a whole.
Allow’s think of, you intend to host your sites and make them visible. Okay?
You already have your domain name (which is your site destination or URL) but now you wish to “turn the lights on”. Computer Requirements For Blogging On Bluehost
You need some organizing…
To achieve every one of this, and also to make your web site noticeable, you require what is called a “server”. A web server is a black box, or tool, that saves all your internet site data (documents such as pictures, texts, videos, links, plugins, and various other details).
Now, this server, has to be on at all times as well as it has to be linked to the web 100% of the moment (I’ll be stating something called “downtime” in the future).
Furthermore, it also requires (without getting as well expensive and also into information) a file transfer protocol commonly referred to as FTP, so it can reveal web internet browsers your website in its designated kind.
All these points are either expensive, or require a high level of technological skill (or both), to produce as well as preserve. And you can absolutely head out there and also learn these points by yourself as well as set them up … yet what regarding instead of you getting and also preserving one … why not simply “leasing hosting” instead?
This is where Bluehost comes in. You rent their web servers (called Shared Hosting) and also you release an internet site using those servers.
Given that Bluehost maintains all your data, the firm additionally allows you to set up your material monitoring systems (CMS, for brief) such as WordPress for you. WordPress is an incredibly prominent CMS … so it simply makes sense to have that choice offered (almost every holding company currently has this choice as well).
In short, you no more need to set-up a web server and then incorporate a software program where you can develop your material, independently. It is already rolled into one plan.
Well … visualize if your server is in your house. If anything were to happen to it in any way, all your data are gone. If something goes wrong with its internal procedures, you need a professional to repair it. If something overheats, or breaks down or gets corrupted … that’s no good!
Bluehost takes all these troubles away, and cares for everything technical: Pay your server “rent”, and also they will certainly care for everything. And also when you buy the solution, you can then begin focusing on including content to your web site, or you can put your effort into your advertising campaigns.
What Services Do You Receive From Bluehost?
Bluehost supplies a myriad of various services, but the main one is hosting naturally.
The hosting itself, is of various kinds incidentally. You can lease a shared server, have a devoted server, or likewise an onlineprivate server.
For the objective of this Bluehost evaluation, we will certainly concentrate on hosting solutions and various other solutions, that a blog owner or an on-line entrepreneur would need, rather than go too deep right into the rabbit hole and talk about the other solutions, that are targeted at more skilled individuals.
- WordPress, WordPress PRO, and also shopping— these hosting solutions are the packages that enable you to host a web site using WordPress and also WooCommerce (the latter of which allows you to do e-commerce). After acquiring any one of these plans, you can begin developing your site with WordPress as your CMS.
- Domain name Market— you can additionally get your domain name from Bluehost rather than various other domain registrars. Doing so will make it simpler to aim your domain name to your host’s name web servers, given that you’re utilizing the same industry.
- Email— once you have actually purchased your domain, it makes good sense to additionally obtain an e-mail address tied to it. As a blogger or online entrepreneur, you ought to pretty much never ever make use of a complimentary email service, like Yahoo! or Gmail. An email like this makes you look unprofessional. Thankfully, Bluehost offers you one free of cost with your domain.
Bluehost also provides devoted web servers.
And also you may be asking …” What is a committed web server anyhow?”.
Well, the thing is, the standard host plans of Bluehost can just so much website traffic for your web site, after which you’ll need to upgrade your hosting. The reason being is that the usual servers, are shared.
What this indicates is that a person web server can be servicing two or even more websites, at the same time, one of which can be your own.
What does this mean for you?
It means that the single server’s sources are shared, and also it is doing several tasks at any kind of given time. As soon as your site begins to hit 100,000 site brows through every month, you are going to require a committed web server which you can likewise receive from Bluehost for a minimum of $79.99 each month.
This is not something yous needs to stress over when you’re starting yet you should keep it in mind for certain.
Bluehost Prices: How Much Does It Expense?
In this Bluehost testimonial, I’ll be concentrating my interest primarily on the Bluehost WordPress Hosting packages, because it’s the most prominent one, as well as very likely the one that you’re seeking which will certainly fit you the best (unless you’re a big brand, company or website).
The three offered strategies, are as adheres to:
- Standard Strategy– $2.95 monthly/ $7.99 regular price
- Plus Strategy– $5.45 per month/ $10.99 regular cost
- Selection Plus Strategy– $5.45 monthly/ $14.99 routine price
The first rate you see is the price you pay upon sign up, and the 2nd price is what the price is, after the initial year of being with the company.
So essentially, Bluehost is mosting likely to bill you on an annual basis. As well as you can likewise select the quantity of years you wish to organize your website on them with. Computer Requirements For Blogging On Bluehost
If you pick the Fundamental strategy, you will certainly pay $2.95 x 12 = $35.40 starting today and by the time you enter your 13th month, you will certainly currently pay $7.99 monthly, which is also billed annually. If that makes any kind of feeling.
If you are serious about your web site, you should 100% get the three-year choice. This means that for the standard plan, you will certainly pay $2.95 x 36 months = $106.2.
By the time you strike your fourth year, that is the only time you will pay $7.99 per month. If you consider it, this technique will certainly conserve you $120 throughout three years. It’s not much, yet it’s still something.
If you intend to get more than one web site (which I very suggest, and also if you’re severe, you’ll probably be getting more eventually in time) you’ll intend to utilize the choice plus plan. It’ll enable you to host endless internet sites.
What Does Each Plan Deal?
So, when it comes to WordPress holding strategies (which resemble the shared organizing strategies, but are extra geared in the direction of WordPress, which is what we’ll be focusing on) the functions are as follows:
For the Basic plan, you get:
- One web site only
- Protected site through SSL certificate
- Maximum of 50GB of storage
- Complimentary domain name for a year
- $ 200 advertising and marketing credit report
Bear in mind that the domains are bought separately from the hosting. You can get a complimentary domain name with Bluehost below.
For both the Bluehost Plus hosting and also Choice Plus, you obtain the following:
- Unlimited variety of web sites
- Free SSL Certification. Computer Requirements For Blogging On Bluehost
- No storage space or bandwidth limitation
- Cost-free domain name for one year
- $ 200 advertising credit rating
- 1 Office 365 Mail box that is cost-free for 30 days
The Choice Plus plan has an added advantage of Code Guard Basic Back-up, a back-up system where your documents is saved as well as duplicated. If any crash takes place and also your website information goes away, you can recover it to its initial form with this attribute.
Notice that although both plans cost the very same, the Selection Plan then defaults to $14.99 per month, routine rate, after the set quantity of years you’ve chosen.
What Are The Perks Of Using Bluehost
So, why pick Bluehost over various other host services? There are numerous host, a lot of which are resellers, yet Bluehost is one pick couple of that have stood the test of time, as well as it’s possibly the most popular available (and also forever reasons).
Right here are the 3 primary advantages of choosing Bluehost as your web hosting service provider:
- Web server uptime— your site will not show up if your host is down; Bluehost has greater than 99% uptime. This is very crucial when it comes to Google SEO as well as positions. The greater the far better.
- Bluehost speed— how your web server reaction figures out exactly how rapid your internet site shows on a web browser; Bluehost is lighting quick, which implies you will minimize your bounce price. Albeit not the very best when it pertains to loading rate it’s still extremely vital to have a rapid speed, to make individual experience better and far better your ranking.
- Endless storage— if you obtain the Plus plan, you need not fret about how many files you store such as video clips– your storage capability is limitless. This is truly essential, due to the fact that you’ll probably run into some storage concerns later on down the tracks, and you do not desire this to be an inconvenience … ever.
Lastly, client support is 24/7, which implies despite where you remain in the world, you can contact the support team to fix your internet site problems. Pretty basic nowadays, but we’re taking this for given … it’s likewise very crucial. Computer Requirements For Blogging On Bluehost
Likewise, if you have actually obtained a totally free domain with them, then there will certainly be a $15.99 cost that will be deducted from the quantity you originally bought (I visualize this is since it type of takes the “domain name out of the market”, not exactly sure about this, yet there possibly is a hard-cost for registering it).
Lastly, any requests after 1 month for a refund … are void (although in all sincerity … they ought to possibly be strict here).
So as you see, this isn’t always a “no questions asked” plan, like with several of the various other hosting options around, so make sure you’re all right with the plans before proceeding with the hosting. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662562106.58/warc/CC-MAIN-20220523224456-20220524014456-00239.warc.gz | CC-MAIN-2022-21 | 13,696 | 82 |
https://emptyglass.neocities.org/mywebsite.html | code | This is my website. i am always downloading and testing games to add to the list it may look small but i hope day it will be pretty good in size
I personally test these games to make sure they work with windows 10
for a better time browsing websites i suggest downloading some type of Ad blocker and uBlock Orgin
click here to go back to the index.
Free video games that i know about
may need to go to the pc gaming wiki to fix Aliens Vs Predator 2 gold on some machines
May need DOS box to work Chasm: The Rift
to play click on one of the KSHG.exe files may need to use config.bat to mess with button inputs
looking for more games will update when i have more.. | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583423.96/warc/CC-MAIN-20211016043926-20211016073926-00657.warc.gz | CC-MAIN-2021-43 | 662 | 9 |
http://forum.linuxmce.org/index.php?topic=12799.msg91864 | code | IANAL. I am merely suggesting to take the license into account. i.e. if you have access to these codes, that's great. Just copying over the XML won't be a good idea, as the presentation might be problematic from the license front. If you could provide those codes in a different form, for example, CSV files or something like that, I am sure there would be less problems. But as I said: IANAL. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121165.73/warc/CC-MAIN-20170423031201-00122-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 393 | 1 |
https://store.openfaas.com/collections/inlets/products/inlets-pro-personal-license-12-mo | code | Buy a license for inlets-pro - the cloud native TCP tunnel
This is a JWT key for 12 months and will be sent to you after checkout.
inlets-pro is written in Go and you can get started at https://docs.inlets.dev/
Free community support is available on OpenFaaS Slack in the #inlets channel.
Note that a personal license is for personal, non-commercial use.
Cost per month: 25 GBP, with a discount over the 6 months license. | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655888561.21/warc/CC-MAIN-20200705184325-20200705214325-00090.warc.gz | CC-MAIN-2020-29 | 421 | 6 |
https://therepstylist.com/2020/04/07/how-reptile-foods-are-formulated/ | code | After working with so many different reptile species and helping numerous reptile owners tread through all the articles, blogs, and opinions available to take the best care of their reptile, one thing I’ve come to realize is that most reptile owners have a specific vision of how reptile food companies create their food formulas. This vision tends to involve a list of nutrients and amounts required by the reptile that the reptile food company follows, trying out different ingredients and quantities until they find the ideal formula.
Formulating reptile foods is a tedious and complex task. Unlike livestock and pets, specialty pets have not received the same amount of attention when it comes to research. Don’t get me wrong, there are A LOT of great scientists out there in the form of biologists, physiologists, endocrinologists, nutritionists, and more that are doing great research on reptiles so we can better understand them. But it’s still not nearly as much in comparison to cattle, horses, dogs, and cats. What this means is that while there are nutrients and amounts required for livestock and pets that those food companies can use to formulate their foods, those don’t exist for reptiles.
Many reptile food product companies will consult with a comparative (or “exotic”) animal nutritionist. These are animal professionals that have focused and dedicated their careers on understanding exotic or specialty pet animals. They’re trained to do this, not only by using all the information that is available on these other types of critters, but also by using and applying the information available on livestock and pets with similar body systems.
Did you know that the herbivorous tortoise gastrointestinal tract is analogous to that of the horse?These species all require high forage diets and rely on hindgut fermentation for gut health, so comparative animal nutritionists will use what we know about horse nutrient requirements to formulate appropriate diets for herbivorous tortoises such as the desert tortoise, leopard tortoise, sulcata tortoise, and more!
In order to formulate a reptile food product, the nutritionist has to first gather all the information they can on that reptile species:
Next, the nutritionist will spend time finding what information, if any, is available on the reptile’s nutritional requirements. Although there aren’t any complete nutrient requirement profiles available for reptiles, there is published research regarding a few nutrients here and there, typically surrounding protein, fiber, and calcium. Next, the nutritionist will compare the information they’ve gathered with that of the most closely related domestic species (in terms of feeding strategy and naturally ingested foods). For example, comparative nutritionists use what we know about horses, a highly researched animal, to provide the most appropriate recommendations for herbivorous tortoises.
And finally, the nutritionist will start creating a food product formula using commercially available ingredients that will provide the reptile with the best possible nutrition! This step can take days, weeks, or even months depending on the reptile species and how much information is available to the nutritionist. I spent close to a year formulating a diet for a specific type of lizard, because with every tiny tweak that I made to the formula, I needed to be sure it would have the impact for the lizard that I wanted. Therefore, after making a change to the formula, I would create a new batch of food and provide it to a group of those lizards for several weeks and observe the outcome. Just because something makes sense on paper doesn’t mean it’s going to work the same way in a biological system.
As always, if you have any questions about this topic, contact us here or at [email protected]!
©Copyright 2020 The Repstylist. All Rights Reserved. | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704820894.84/warc/CC-MAIN-20210127024104-20210127054104-00612.warc.gz | CC-MAIN-2021-04 | 3,904 | 9 |
https://superpcparts.com/github-warns-of-lazarus-hackers-concentrating-on-devs-with-malicious-initiatives/ | code | GitHub is warning of a social engineering marketing campaign concentrating on the accounts of builders within the blockchain, cryptocurrency, on-line playing, and cybersecurity sectors to contaminate their gadgets with malware.
The marketing campaign was linked to the North Korean state-sponsored Lazarus hacking group, also called Jade Sleet (Microsoft Menace Intelligence) and TraderTraitor (CISA). The US authorities launched a report in 2022 detailing the menace actors’ techniques.
The hacking group has an extended historical past of concentrating on cryptocurrency corporations and cybersecurity researchers for cyberespionage and to steal cryptocurrency.
Concentrating on builders with malware
In a brand new safety alert, GitHub warns that the Lazarus Group is compromising authentic accounts or creating faux personas that fake to be builders and recruiters on GitHub and social media.
“GitHub has recognized a low-volume social engineering marketing campaign that targets the private accounts of workers of know-how companies, utilizing a mixture of repository invites and malicious npm package deal dependencies,” defined the GitHub safety alert.
These personas are used to contact and provoke conversations with builders and workers within the cryptocurrency, on-line playing, and cybersecurity industries. These conversations generally result in one other platform, which in previous campaigns was WhatsApp.
After establishing belief with the goal, the menace actors invite them to collaborate on a mission and clone a GitHub repository themed round media gamers and cryptocurrency buying and selling instruments.
Nevertheless, GitHub says these initiatives make the most of malicious NPM dependencies that obtain additional malware to targets’ gadgets.
Whereas GitHub solely shared that the malicious NPM packages act as a first-stage malware downloader, they referenced a June report by Phylum that goes into extra element concerning the malicious NPMs.
In accordance with Phylum, the NPMs act as malware downloaders that hook up with distant websites for added payloads to execute on the contaminated machine.
Sadly, the Phylum researchers couldn’t obtain the second-stage payloads to see the ultimate malware delivered to the gadget and analyze the executed maliciious conduct.
“Regardless of the cause, it is sure that is the work of a fairly refined supply-chain menace actor,” concluded the Phylum researchers.
“This assault specifically stands out on account of its distinctive execution chain necessities: a selected set up order of two distinct packages on the identical machine.”
“Furthermore, the presumed malicious elements are stored out of sight, saved on their servers, and are dynamically dispatched throughout execution.”
GitHub says that they’ve suspended all NPM and GitHub accounts and revealed a full checklist of indicators concerning the domains, GitHub accounts, and NPM packages related to the marketing campaign.
The corporate additionally emphasizes that no GitHub or npm programs have been compromised throughout this marketing campaign.
This marketing campaign is much like a Lazarus marketing campaign in January 2021, when the menace actors focused safety researchers in social engineering assaults utilizing elaborate faux “safety researcher” social media personas to contaminate targets with malware.
This was executed by convincing the researchers to collaborate on vulnerability growth by distributing malicious Visible Studio initiatives for alleged vulnerability exploits that put in a customized backdoor.
A related marketing campaign was carried out in March 2021 when the hackers created an internet site for a faux firm named SecuriElite to contaminate researchers with malware.
Different previous Lazarus assaults
North Korean hackers have an extended historical past of concentrating on cryptocurrency corporations and builders to steal property to fund their nation’s initiatives.
It was later disclosed that the menace actors despatched a malicious laced PDF file pretending to be a profitable job supply to one of many blockchain’s engineers as a part of this assault.
The usage of faux employment alternatives to ship malware was additionally utilized in a 2020 marketing campaign referred to as “Operation Dream Job” that focused workers in outstanding protection and aerospace corporations within the US. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506632.31/warc/CC-MAIN-20230924091344-20230924121344-00228.warc.gz | CC-MAIN-2023-40 | 4,405 | 24 |
https://jisho.org/search/%E3%82%8D | code | Words — 5924 found
1. hearth; fireplace
2. furnace; kiln
3. FurnaceA furnace is a device used for heating. The name derives ... Read more
1. Japanese scull (oar attached to the rear of the boat by a traditional peg-in-hole oarlock)
1. Lu (Chinese vassal state existing during the Spring and Autumn period)
2. Lu (state)Lu was a vassal state during the Zhou Dynasty of ancient ... Read more
1. 2nd in a sequence denoted by the iroha system; 2nd note in the diatonic scale (used in key names, etc.)
1. thesis; essay; treatise; paper; article
2. ThesisA dissertation or thesis is a document submitted in suppo... Read more
1. manual labor; manual labour; toil; work
- I can't do the hard day's work I used to.
2. Labour PartyAbbreviation, See also 労働党
労動: Out-dated kanji.
1. six陸 is used in legal documents
六 【む】、六 【むう】、6 【ろく】、6 【む】、6 【むう】、陸 【ろく】、陸 【む】、陸 【むう】
1. corridor; hallway; passageway
1. old person; senior citizen; the aged; the elderly
Common word JLPT N2 Links
1. candleUsually written using kana alone
蠟燭: Out-dated kanji. | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178374686.69/warc/CC-MAIN-20210306100836-20210306130836-00588.warc.gz | CC-MAIN-2021-10 | 1,138 | 21 |
https://community.myob.com/t5/MYOB-API-questions-and-answers/When-I-pay-invoice-by-AccountRight-desktop-application-time-part/m-p/553678 | code | Thank you for visiting our Partner Zone. This area is an exclusive space for MYOB Partners. Find out how to Partner with MYOB.
I am integrating myob api with third party system with the use of API. With "Sale/Invoice" api, LastPaymentDate field is not showing exact time when payment occur.
Also requires created and LastModified date and time with invoice details. | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027318894.83/warc/CC-MAIN-20190823150804-20190823172804-00438.warc.gz | CC-MAIN-2019-35 | 365 | 3 |
https://www.glassdoor.ca/employers/Job-Descriptions/Software-Engineer | code | On the most basic level, software engineers write, debug, maintain, and test software that instructs a computer to accomplish certain tasks, such as saving information, performing calculations, etc. A software engineer will convert what needs to happen into one of many programming languages, the most common of which being Java, C++ and Python.
While many are self taught, most software engineers have obtained an undergraduate or graduate degree in computer science or computer engineering. The career of a software engineer typically follows one of two primary paths: they either progress through greater responsibility and ownership over technical architecture and systems or they progress into managing teams of software engineers and help orchestrate larger projects and help develop and mentor more junior engineers.
We are looking for a Software Engineer to join our growing Engineering team and build out the next generation of our platform. The ideal candidate is a hands-on platform builder with significant experience in developing scalable data platforms. We’re looking for someone with experience in business intelligence, analytics, data science and data products. They must have strong, firsthand technical expertise in a variety of configuration management and big data technologies and the proven ability to fashion robust scalable solutions that can manage large data sets. They must be at ease working in an agile environment with little supervision. This person should embody a passion for continuous improvement and test-driven development. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100912.91/warc/CC-MAIN-20231209134916-20231209164916-00318.warc.gz | CC-MAIN-2023-50 | 1,564 | 3 |
http://ruralstudio.org/project/rural-studio-farm-earth-tube-solar-chimney/ | code | The 3rd-year team was tasked with creating a passive heating, cooling, and ventilation system for the storehouse on Rural Studio’s Morrisette Campus. An earth tube and solar chimney combination was chosen as the most efficient system to take advantage of the low diurnal swings and the hot humid climate. With some help from consultants, the team optimized the exchange to create a temperature difference between the interior and exterior of 15 degrees Farenheit. Following a thorough design process, the team went on to build and install the proposed system. This construction included digging a 70-foot-long, 12-foot-deep trench, assembling nearly 120 feet of HDPE double wall pipe, and raising a 10-foot-tall solar chimney. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297292879.97/warc/CC-MAIN-20240425094819-20240425124819-00301.warc.gz | CC-MAIN-2024-18 | 728 | 1 |
https://gamedev.gg/the-basics-of-unreal-engines-blueprint-beginners-guide/ | code | Blueprint is the most useful tool in Unreal Engine for a beginner. It basically allows you to code every conceivable system in the game without ever technically looking at a single line of code. All of the functions in Unreal, or the lion’s share of them, are available in blueprint form.
You will never make a spelling mistake that crashes your game, you will be physically unable to plug the wrong object into a function that requires a different type. Basically if it fits together, it works. It takes some of the mystery out of coding.
Check out our guide on C++ vs Blueprints, by the way. It’s Baskin, you can never get enough.
Are unreal blueprints easy?
Unreal Engine’s Blueprint system is a node based scripting system which is perfect for a beginner to build their game fast. You can use blueprint without any coding knowledge and it is perfect for non programmers to start scripting their game.
Here’s an intro to blueprints from the Unreal docs, smarter folk than I to be certain of it.
Should I use blueprint or C++?
If you’re more advanced, you should be coding in C++, it is faster, more efficient, and easier to handle large scale jobs, a huge blueprint becomes impossible to manage. You will also have more career opportunities, and certain features like the SDK require it. That said, I would encourage you to use blueprint as a beginner, it is easy to learn, you can do most of what you need in blueprint. You can go very far on just blueprint, and pick up C++ later on.
Can you use blueprints and C++ together?
This topic, could theoretically encompass it’s own wiki, but since that’s a bit out of my league right now, let’s just get into it:
Welcome to Blueprint
Welcome to Blueprint. It probably doesn’t look very interesting to you but this thing is a beast, I could not possibly write enough tutorials to explain all of it’s features, but let’s see how much we can cover in one lesson.
Let’s start with this, in the even graph, we have three functions. Event Begin Play, Event ActorBeginOverlap, and Event Tick.
Event begin play
This would be the Start() function in C#. It is the first function that is called when an object is spawned into a level. So for instance, here I right clicked the even graph, and typed in ‘Destroy’, then I picked from the list of functions, until I found the function, ‘Destroy Actor’.
What does this do? Well as soon as the level starts up, this character destroys itself, immediately. No more functions, build a symphony of functions if you want, this character will just destroy itself in the first second of spawning.
On the left, click ‘New Variable’ in the variables tab. I made one called, ‘CONTINUE_FUNCTIONING’, compiled the blueprint, and set it to true.
Now let’s try a branch node
So I right click on the event graph, and type in branch, I select the branch node, then I drag my new variable on the left into the event graph and plug in the variable into the condition like this;
So what does this do? First, Event Begin Play, the first frame of calculations takes place as the game starts, the branch node runs next, and it checks the condition “CONTINUE_FUNCTIONING”, if it is set to TRUE, then nothing happens and the function continues as normal, this is what the program defaults to based on our default variable choice. If the variable however, is FALSE, then the false node connects to destroy actor, it runs the destroy actor function, and the object is destroyed.
Not sure what this is useful for, besides teaching you the basics of blueprint, maybe you could toggle the variable in the editor to pick and choose which enemies you want to spawn or not in your level.
Cast to Pawn
Ok so we’re doing a lot in this function. So we have Event ActorBeginOverlap. First thing we’re doing is Cast to Pawn. Casting to something means, confirming that something is an explicit type. So when I cast to pawn, and you can cast to basically any created object, but a pawn is good because it will cast to a possessable moveable character. We drag in the other actor wire and connect it to our Cast to Pawn. So in our first function, it casts to pawn, plugging in ‘other actor’, which is the object that has collided with us, and then it will return true or false depending on whether or not the plugged in actor is a pawn.
There is also the ‘As Pawn’ wire, basically, if the cast to pawn was successful, the ‘As Pawn’ wire will connect you to all of the pawns functions. If you just drag the execution wire out and try to access the pawn’s functions, it won’t even list them as a possibility. So if you want to run a pawn’s particular function, cast to pawn, take the ‘As Pawn’ wire and type out the function you wish to run, then drag the execution wire to run the function at the correct time.
Unreal is not Unity. In Unity if you have a damage system, you need to code it yourself generally, or buy some out of the box kit, it’s not always easy to retain consistency between different asset packs, you will have to do a lot of modifications yourself.
In Unreal it’s different, they have an idea in their head of the kind of game you’re going to make. Generally they are envisioning a three dimensional action game, where you move around with the standard control scheme, and your gameplay probably, but not always, consists of fighting other characters and enemies. So they have built most of this functionality into the game engine. One of those functions is apply damage. You can buy different character controllers with included attacks and they’ll still probably be able to damage enemies from completely separate enemy AI systems. As long as it works on a system of applying damage like this, you’re probably ok. (no promises situations may differ.)
So let’s get into it:
Get Player Pawn
This is being plugged into the damaged actor input. What’s it doing? Well it’s searching through the list of standardized players in the scene, it picks the first player on the list, at index 0, and sends the return value into the damaged actor input. Then it adds 10, base damage, this is hardcoded but you could also have an input wire with damage amounts that differ or change depending on your conditions. The damage causer is connected to the cast to pawn wire, so the system knows who is dealing the damage. You can also choose damage class (for instance for environmental damage as it’s own category) and event instigator.
Then the character just destroys itself, because why not?
By the way, be sure to check out our subscription service, it’s like Netflix for learning game dev, just sign up for the subscription and watch as many tutorials as you want. You can learn everything you need to know to make a good game here.
So what are we doing here? – Event Tick
In event tick, the function runs roughly every frame, probably faster, so if you want something that’s constantly running at all times, use event tick. It connects into a branch node, which checks our newly created int64 variable to see if it is greater than 4, using the int > int function, and if it is 5 or higher, it runs, “Load Level Instance (by Object Reference)” this will load the next level. Since it’s by object reference I loaded Ancient Ruins by Sidearm Studios.
Up above in the event begin overlap function, we have changed a few things. Now every time you apply damage, I have dragged in a COLLISIONS variable I’ve created, with the GET function. Then I used int + int by dragging the collisions wire out from the GET function, and incremented the variable by one, I then drag in the variable a second time, and choose SET. SET will change the variable to whatever you set it to in the input wire, in our case, it’s current value plus 1.
Then after five of these collisions have triggered, the Event Tick will notice that COLLISIONS is at or above 5, and they will load the next level.
Google your problems
Another thing to note about blueprint, is that, although I think I have just given you a basic overview of the way order of operations and flow of execution works in Blueprint, and you now know the basics of how functions operate, at first you’re going to be really lost, don’t worry, you’ll get through it.
There is so much to learn about blueprint, it could take 100 articles and not cover everything, an encyclopedia would be more up to the task, and I encourage you to check out the unreal documentation whenever needed.
What you’ll really need to do is get good at googling the specific problem you have encountered, the answers are all out there, but you need to know how to ask.
I know this seems really elementary, but for instance, if you google:
“how do i do something when i press a key unreal blueprint”
Sometimes it’s hard to conceptualize what you’re trying to do in the form of a question, but rest assured, after you’ve worked with the engine for a few months or years, you’ll eventually know how to do whatever you want. Eventually you won’t even need a tutorial, you can just code your own systems from scratch.
The Official Documentation
Go here for the official documentation, you will get an idea how expansive this topic really is.
You can also find this on the Unreal Documentation:
A quick introduction to variables
If you have zero programming experience, you might not even know what a variable is. A variable is a structure used to store a particular type of information, here are the basic variable types. Boolean, Byte, Integer, Integer 64, Float, Name, String, Text, Vector, Rotator, Transform, Object.
A bool is something that is either true or false, it is very useful when you need a direct delineation between something happening or not happening, it’s used for conditions, you can chain conditions so the bool at the end might be constructed from 20 different bools leading up to it.
Bytes, I don’t use them much, it is a whole number between 0 and 255.
Use int instead unless you are advanced, an integer is a whole number, so no fractions, it goes up very high, but if you want a bigger int, use int64.
Float, but what if you want those fractions, then you use a float, not much more to say about that. If you need the number 1.665, use a float, or it’s not going to work.
Name, is a string of characters that makes up somethings name in the game.
String, this is any collection of letters or numbers and symbols from the keyboard, or any number of different languages, this sentence I am writing currently is a string. Very useful in any number of situations, and you can perform complex operations on strings.
Text, and note these are all color coded, text is useful if you are displaying words in the game itself, like a HUD element displaying the name of a selected object.
Vectors are a location in 3D Space, with an x, y, and z coordinate. Manipulate them to move your character around.
Rotator, is like a vector, with an x, y, and z axis, but instead you are rotating your object along the axis, instead of moving it.
Transform, our orange friend, combines position, rotation, and scale, basically anything that physically exists within your level has one of these. All movement, rotation, and scaling takes place in the transform.
And finally, the last type, Object, probably the most useful. An object is an assembly of different systems and functions you have assembled into one specific item. You can access all the functions of an object through blueprint, as well as any of it’s component pieces. Object oriented programming is very important to a coder, generally speaking, everything is made up of objects. An object can be cloned and then altered, you can inherit all the functions and variables from an object, and then add new functionality on top of it, to make different variants, and then you can split those variants off into their own child objects. Any object deriving from another object is called a child object, the object it derives from is called the parent object. This is a topic in itself, but rest assured, objects are very useful.
So with that, we have scratched a hair off the cement slab which is this topic
Now seems a reasonable time to wrap things up. You’ve got an overview of how Blueprint operates, now try doing something in blueprint yourself, the most important part of game dev is experimenting on your own.
Eventually you will learn everything you need to know about blueprint, and you’ll be well on your way to making your first real game. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102469.83/warc/CC-MAIN-20231210123756-20231210153756-00309.warc.gz | CC-MAIN-2023-50 | 12,513 | 61 |
https://ru.ifixit.com/Answers/History/300367 | code | Оригинальный сообщение: guardian4real ,
What you are experiencing is unfortunate and it could be several different things. Without more information, I couldn't possibly give you a direct answer. Typically when a computer suddenly shuts off, it's something hardware related. I would recommend you take the computer to a repair center and let them take a closer look at the problem. | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027322160.92/warc/CC-MAIN-20190825000550-20190825022550-00016.warc.gz | CC-MAIN-2019-35 | 401 | 2 |
https://register.onevenue.com/?conference=30ab97a0-a9d1-4a3e-a4c6-571b132c67f4&__hstc=262592851.f44defb6a6308012d237f579bb5c5195.1655131994095.1667574913443.1667584495040.96&__hssc=262592851.11.1667584495040&__hsfp=2879453284 | code | SC-400: Microsoft Information Protection Administrator
Date: April 20-21, 2023
Time: 9:00am - 5:00pm (US Central)
Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies and Microsoft Purview message encryption among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400).
This will be a virtual event hosted on OneVenue, Opsgility's Virtual Conference Manager platform, and running on Microsoft Teams. In the Microsoft Teams platform and sessions, your name, email address, or title may be viewable by other participants. By joining this event, you agree to this experience.
Your registration for SC-400 has been confirmed. We are excited to have you join!
In the Microsoft Teams platform and sessions, your name, email address, phone number, or title may be viewable by other participants. By joining this event, you agree to this experience.
An Opsgility Customer Success Manager(s) will send instructions on attending the class. If you have any issues, Contact Us for Assistance. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510994.61/warc/CC-MAIN-20231002100910-20231002130910-00165.warc.gz | CC-MAIN-2023-40 | 1,296 | 8 |
https://stackoverflow.com/questions/15087377/how-can-i-start-an-interactive-console-for-vbs | code | Very similar to this question:
I just want to be able to start entering VBS statements, one at a time, and have them evaluated straight away, like Python's IDLE.
Do While True WScript.StdOut.Write(">>> ") line = Trim(WScript.StdIn.ReadLine) If LCase(line) = "exit" Then Exit Do On Error Resume Next Execute line If Err.Number <> 0 Then WScript.StdErr.WriteLine Err.Description End If On Error Goto 0 Loop
I usually start it with a batch file of the same name (i.e. "vbs.vbs" and "vbs.bat"), like this:
@cscript.exe //NoLogo %~dpn0.vbs
You may try to make a debugger (
cscript //X your.vbs) work for you, or to start a project of your own - perhaps based on these (first 3?) proposals | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572471.35/warc/CC-MAIN-20190916015552-20190916041552-00318.warc.gz | CC-MAIN-2019-39 | 683 | 7 |
https://community.unifiedremote.com/user/joseph-hubbard | code | so the link is dead.
any chance we could get a new one?
I've tried to build out the necessary files based on the script, but it doesnt seem to be working. Any ideas on how to get this working?
Oops! Looks like something went wrong!
You may only upload PNG, JPG, or GIF files () | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823565.27/warc/CC-MAIN-20181211040413-20181211061913-00499.warc.gz | CC-MAIN-2018-51 | 277 | 5 |
https://workallremote.com/shogun-director-of-quality-assurance/ | code | Shogun: Director of Quality Assurance
03/02/21 12:07 am Programming 0 Comments
Shogun is on a mission to help brands create the best ecommerce experiences in the world, and in the process, become the world’s best remote company.
We’ve been growing rapidly since being in the Winter 2018 batch of Y-Combinator, and after recently closing our Series B funding round, are now in hyper-growth. Our teams are diverse, fully distributed, and with no offices – we are looking for team members who are comfortable with and motivated by the opportunity to work remotely.
For this position, we are looking for candidates located in the United States or Canada.
What You’ll Do
As Director of Quality Assurance, you will build and lead a team of QA Engineers and be responsible for the QA strategy necessary to ensure the quality practices will be scalable to our technology solutions. You will develop and enforce a standard process for testing all releases that include automation into the software build, test, and release process. The QA Director will set up processes, testing strategies, and automation to improve efficiency of QA process and quality of product. In this role, you will define team strategy and be accountable for the team’s quarterly/annual plans and deliverables.
What You’ll Bring
Need to Have
- 7+ years of quality assurance, automation testing and performing automation testing with a focus on enterprise SaaS
- 5+ years of experience managing/leading quality assurance engineering teams
- Experience building and scaling strategic and cross-functional teams from the ground up
- Hands on experience with e2e automation tools such as Selenium/Cypress, JS tools such as Jest/Mocha/Jasmine, and Ruby tools such as Rspec/Capybara
- Ability to analyze automated test scripts to ensure data integrity
- Front End & Back End Testing Experience
- Strong experience in databases, SQL and data analysis
Nice to Have
- Experience in a startup environment
- Experience with eCommerce platforms such as Shopify and BigCommerce
- Working in highly agile, software development process
- Working experience in a fully remote working environment
- Coding proficiency in React and/or Ruby on Rails
What We Offer
- Competitive salary
- Benefits (vary by location)
- A highly skilled and dedicated team that is fun to work with
- Remote work – We are a diverse and distributed team that uses Slack, Zoom, Notion and other tools to stay connected
- Work in the open: Operate with high integrity and choose what’s right over what’s easy. Be transparent as a company and with each other
- People are People: Treat yourself, colleagues, and customers with dignity, empathy, and respect. Start from a presumption of positive intent
- Win and grow together: Strive to be the best, individually, and as a team. Support and encourage each other. Seek opportunities for growth
Go to posting –> https://weworkremotely.com/remote-jobs/shogun-director-of-quality-assurance | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943555.25/warc/CC-MAIN-20230320175948-20230320205948-00726.warc.gz | CC-MAIN-2023-14 | 2,976 | 31 |
https://h5ptechnology.atlassian.net/browse/HFP-821 | code | Change the radius of a icon container ( make it a circle instead of rounder rectangle )
Background of the icon container should not be transparent - no mater of draggable transparency. This way icon is always visible.
Non-transparent background applies only on a icon and icon container. Draggable however, should still change transparency - current behavior.
Attached image shows how this implementation would work in some situations:
Non-transparent images - 100% draggable transparency
Transparent images - 100% draggable transparency
non-transparent images - 0% draggable transparency
transparent images - 0% draggable transparency
transparent images - 50% draggable transparency
Feedback icons are always visible. | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657147031.78/warc/CC-MAIN-20200713225620-20200714015620-00264.warc.gz | CC-MAIN-2020-29 | 718 | 10 |
https://www.theiphonewiki.com/w/index.php?title=25C3_presentation_%22Hacking_the_iPhone%22&oldid=10546 | code | 25C3 presentation "Hacking the iPhone"
The presentation explained the inner workings of the iOS architecture, its security, and how it was circumvented. Short event description
During the presentation MuscleNerd wanted to show the video of a live demo of the unlock with (yellowsn0w), but skipped it because of the missing time. This video was actually released some days before.
- Conference recording video on Vimeo
- Conference recording video in H264 or via FTP or torrent link. This version is the best quality available.
- Conference recording video in M4V
- Conference recording as MP3 audio
- Conference recording as OGG audio
- Official download page (look for presentation 2976)
- Official FTP server (look for presentation 2976)
The presentation slides are currently not available. Maybe one of the presentators can upload them here or post a link.
Transcript of the presentation
Good evening everybody. I would like to introduce the iPhone Dev Team who are here to give a talk on iPhone hacking. So if you join me to give a round full of applause please.
Introduction (by pytey)
Good evening ladies and gentlemen. Here’s a little slide show here for you.
This is a slide called hacking the iPhone. I’ll give a little history here about our little crew.
We formed in June 2007, just before the release of the original iPhone. We’re original hardware hackers and device enthusiasts, based around Apple products and we sort of rather say towards the iPhone as a platform. We exist on IRC. This is the first time most of us have met each other. Originally there was a couple of channels on the osx86.hu server.
We’ve got a wide membership: Germany, Belgium, France, Russia, Hungary, USA, Israel. And during those initial few months of the iPhone first generation DHL and FedEx shipped around a lot of US phones to us.
We’ve got some statistics here of our little site. We’ve had about 1.7 million visits in the last month.
Fifty, sixty thousand unique visitors per day and various networks around.
It’s a Cocoa application. It’s got 20,000 lines of code. QuickPwn has got 15,000 lines of code. There’s also other platforms: Windows and Linux as well. We’ve had 3.6 million Sparkle updates since we last deleted our logs, which was in the 16th of July. We try to release patches when Apple releases an iPhone update.
We try to get patches out 24-48 hours after the release of those updates. And the modular bundle sets for cross-platform use. We use [[[wikipedia:Sparkle (software)|Sparkle]] for updates for the Mac platform, as I mentioned. An interesting lead: There’s a 180 very active users from Apple who update their QuickPwn and Pwnage tool on a regular basis, so I think they like our software, which is pretty cool. Thank you very much Apple. (big applause)
I’ll just introduce my colleagues here. We’ve got bushing on the end. He’s one of the guys. This is MuscleNerd (laughter) - I don’t know why. This is planetbeing. And we’ve got a bunch of other guys here we don’t want to be identified for obvious reasons, but they’re over there wearing Pwn-Apple T-shirts. And they speak Russian. (laughter) Say hi guys! (applause)
So with that further I’ll hand you over to planetbeing who’s gonna talk a bit about the applications processor side of the iPhone. Thanks.
Part 1: Applications Processor (by planetbeing)
It’s only related to the baseband unlock, because the iPhone has two ARM processors and the baseband modem has one of them and the application processor has the other one, and they’re only loosely connected. Each has their own security framework. My portion of the talk will be focusing on the application processor. And you know our goal is to execute custom code on the iPhone OS.
The purpose of doing so is to launch third-party apps, activation of the iPhone which allows the iPhone OS to recognize unofficial carriers, and it also provides a useful platform for the SIM unlock because then we can use the iPhone OS to directly communicate with the baseband modem. So I’m gonna just go over some of the security framework of the iPhone, and first of all I’m gonna talk about the basic software architecture of the device.
As Apple advertised the iPhone OS architecture is basically Mac OS X. If you look at a disassembly of the kernel, you can see that it’s basically XNU, which is the kernel for the Mac OS, it’s basically XNU code compiled for ARM. A lot of the userland architecture is also the same. There is launchd, which is the Mac OS version of init like Linux is init. It’s a little bit bottomized, there’s no command line switches, but, you know it’s basically the same thing, have launch daemons and everything else. System libraries are slightly modified, but they’re pretty much the same as on a typical OS X Mac machine. So instead of the Finder you have SpringBoard as the shell. One important difference between the Mac version of OS X and the iPhone OS is that there’s an additional daemon called lockdownd, and it handles communications with the computer. It basically is the gateway between the computer and the iPhone over the USB cable. It multiplexes the USB connections and it establishes an SSL [[wikipedia:Tunneling protocol|tunnel] between a socket on the computer and on the iPhone. It’s basically like inetd. You can have different services that lockdownd activates. Services like MobileSync, MobileBackup and a rather important one for our purposes is called AFC, which allows the computer to access a small jailed portion to the file system. So our goal here is to sort of subvert this and to modify the operating system, so that we can run our own code. How do we do this?
The iPhone OS primarily runs on a NAND flash disk. To userland it appears as a normal block device. So if you’re familiar with the Mac OS terminology, it’s under /dev/rdisk0s1 /dev/rdisk0s2. There’s two logical partitions on a NAND drive. There’s a system partition, which is mounted at root, and there’s a user partition. The system partition is read-only, and these are only logical partitions, and they sit on top of an FTL which convert the logical partitions which are better suited for traditional disk drives to NAND flash geometries, which, you know, have peculiar things, like be only able to erase a block at a time.
Here is how the iPhone OS is protected.
Third-party applications and everything else that’s modifiable on the iPhone OS are installed on the user partition. The system partition is read-only, so in case the iPhone crashes you don’t have to recheck the system partition for file system integrity. Every program, every executable on the iPhone is signature-checked when the system call execv is executed on that. All executables must be signed by Apple and the signatures and the hashes are stored in the mark-up format as segments and because the signatures are only checked when the program starts you can still use code execution if you have a buffer overflow or a stack overflow, but the limitations of that is that all the applications like MobileSafari or MobileMail and everything else run as a mobile user, so they can’t really alter the operating system. The signature-checks are implemented inside the kernel. So in order to do our thing, in order to run third-party applications, we have to modify the kernel. Here is how the kernel is protected.
The kernel is stored on the system partition, which again is mounted read-only. It’s a big binary blob with the kernel and all the kernel extensions, KEXTs, which basically provide driver functionality for Mac OS X and they are all concatenated together and compressed with LZSS and encrypted and signed. And you can’t alter this kernelcache, except as root. So even if you got a code execution, you still need a privilege escalation exploit as well in order to modify this file. And even if you could do that, the kernelcache is signed, so if you modify it, your system will stop booting. So, to get around that, we need to look at how the signature for the kernel is checked. And I’m only just take briefly take you to the boot process for the iPhone.
The first piece of code that’s loaded on the iPhone is the bootrom. It’s Secure-Boot as Apple’s terminology is. I mean it’s kind of a lie as you find out later. So the first thing that it does is it loads from NOR flash a program called LLB. The NOR flash supplements the NAND flash. It’s just an 8 megabit NOR flash and it serves as the NVRAM for the OS which concludes [[wikipedia:Kernel panic|kernel panic] logs, bootloader variables. It also has a file system, or a kind of a rudimentary one; a list of images that contain the bootloaders themselves. So the LLB is, like the way I put it, is that it’s the MBR for the NOR, which it does the same thing that the MBR does on like an x86 machine. It reads the image-less format and it loads the next-stage bootloader from the image list, signature-checking it first before executing it.
The next stage in the boot process after LLB is iBoot, which is loaded from the image list. If you’re familiar at all with the Mac boot process, iBoot is an analogous to Open Firmware. On a Mac machine, instead of the kernel probing devices and discovering what hardware is there, the bootloader provides the kernel with the DeviceTree which has all this information already included. And iBoot loads the DeviceTree from the NOR. The DeviceTree - there’s one for each different type of platform, one for the iPhone, one for the iPhone 3G and one for the iPod touch. And this DeviceTree is only partially populated. There’s still some device-specific things, like the serial number that must be added by iBoot. Also Apple uses different components from different vendors in their manufacturing process. There’ll be like a few different types of LCD panels that they use and a few different types of NAND chips from different vendors, and some of them have their own initialization sequences. Instead of having the kernel do that, iBoot actually does that, which makes the kernel more flexible. So it populates the DeviceTree with gamma tables, Wi-Fi calibration data, it does all of that. And then finally it loads the kernel from NAND and executes it. The thing here is that iBoot checks signatures on everything. It checks signatures on the kernel, it checks signatures on the DeviceTree, and even the boot logo and graphics that it displays. So we need to get around this in order to do our eventual goal of running unsigned applications on the iPhone. And the whole structure works like this. You have this whole chain that signature-checks the kernel and then the kernel signature-checks all the userland applications.
So there’s one slight problem with this scheme. We know that userland applications are signature-checked by the kernel, which is good. And the kernel is signature-checked by iBoot, so that’s good. iBoot is signature-checked by the LLB. OK. But is the LLB signature-checked by the bootrom? No! So, that’s a big problem. So all we need to do is just flash our own LLB and then patch all the signature-checking on all the subsequent stages and then we can run our own code. This is a little bit easier said than done though. The only way we can flash the NOR is through the restore process and I’ll explain why in a second after I tell you what it is.
Every stage in the boot process that I described earlier can abort to either a DFU or Recovery Mode, and it’s activated by either keypresses or if the next stage can’t load. Recovery Mode is basically a USB or serial console. It’s a feature of iBoot. And DFU Mode is just a mode where iBoot can be loaded and you can get into Recovery Mode. So the restore process is basically a version of iBoot is loaded- a newer version, the latest one- is loaded by iTunes onto existing version of iBoot or DFU Mode. And then iTunes sends the latest kernel and a Restore ramdisk to this iBoot. And then iBoot boots the kernel from the [[Restore Ramdisk|ramdisk]. The restore process itself is actually conducted by this ramdisk/kernel combination, lockdownd daemon, called restored. The lockdownd thing, as I described, it communicates with iTunes, it downloads of ASR image. I don’t know if you guys know about ASR, but it’s an Apple backup thing. ASR image from iTunes: it also downloads NOR firmware to be flashed. And the good thing about this process is it’s actually very well designed. It’s pretty much impossible to break the iPhone because of this process. Because you can at any point... break the applications processor that is. At any point because you can always bootstrap the restore process like this.
The way that this restore process is protected is that iBoot that’s loaded from any stage is signature-checked before being executed. The ramdisk and kernel is also signature-checked by iBoot, and restored itself signature-checks the ASR image in a NOR firmware and it already sits on a signature checked ramdisk, so itself cannot normally be modified.
Also, everything is encrypted with a key that’s derived from a hardware AES key. This AES key we can’t read it, but the code on the iPhone can use it. These keys are disabled from any boot that’s not from a signed ramdisk. So this means that even if we’re able to find a code execution exploit on a normal boot and have a privilege escalation exploit and communicate with the kernel and tell it to flash the NOR, we still can’t do it, because we’re not in a secure mode. The filesystem itself is encrypted with FileVault and the way that’s done is that FileVault key and also the expected SHA hash of the filesystem is stored on a encrypted ramdisk. And this way everything is encrypted. This makes it difficult for us to do our work, because we can’t read any code and we can’t reverse engineer it. That’s the way that they planned it.
So it still sounds pretty secure. All the modification that this graph shows the modification vectors for every piece of the software that I mentioned. And you see that everything signature-checks everything else pretty much. So, it’s still pretty secure even if the bootrom doesn’t signature-check LLB, as long as you can’t modify the NOR.
Well, there’s one problem, is that this chain can be broken. And what place we break it is at the bootrom level or where they can’t patch it or fix it in any way. So it’s a pretty much your standard stack overflow exploit. They’re processing certificates which are on a DER format. They copy all the certificate information onto the stack, but the signature itself is copied into this data structure without any sort of bounds checking. So then you have this classic stack buffer overflow and then you just make the signature checking function return true. I was just gonna show you – I probably don’t have enough time to do a very thorough job of this, but basically
this is the function that we want to return true. We want to jump to offset 57EC and make R4=1, because our R4 gets moved into the return value later. CheckCertificateAndGetSecureBootOnes is the function that has the vulnerability. As you can see, in the
highlighted areas it makes space on the stack for three certificate structs. So what you wanna do is construct a certificate DER that’s structured like this. The thing that’s overflowable is MCertSignatureValue, so you have 0x30 bytes of padding at the end of covered the rest of these and then you can start loading the registers with your own exploit values. So 1 for R4, we don’t really care about the other registers.
And the offset 57EC for the PC – for the program counter. So that’s basically our exploit. What we load from this is what we called Pwnage, which is our complete solution as it were.
What we do is we patch every single stage, like where I mentioned all the signature checks, we patch all of those out. And what we do, we patch out in the LLB, iBoot, kernel, the restored on the ramdisk, and on the filesystem image, because we patched out the signature checking on restored, we can put our own sort of App Store for unsigned programs for things that Apple won’t support. And the two most popular ones are Cydia and Installer. We use the DFU exploit to load a version of iBoot that doesn’t perform signature checking and then we use the normal restore process to restore the rest of it; to flash the rest of this onto the iPhone. And what ends up happening is that we can use iTunes to flash our own custom firmware onto the iPhone. So, yeah. (applause)
Just briefly I just mentioned stuff that Apple did wrong, to make the job easier for us and probably the biggest reason is that instead of rolling out all this wonderful security mechanisms at once, they did it piece by piece and they sort of made a few mistakes early on in the process. And by doing so they allow us to get access to pieces of code and we’re able to reverse engineer it and we were able to figure out how it all worked and where the vulnerable points are and how to attack it. One of the early mistakes is in 1.0.2. The iPhone actually trusted iTunes which we can modify easily. At that point we could actually send custom restore commands and jailbreak the iPhone. Another call was none of the executables were signed at that point, so you could make a simple file system alteration and you’re jailbroken.
Another vulnerability in 1.1.1 and 1.1.2 is that everything used to run as root. So if you find a vulnerability within any userland program, then you have root. They also left some interesting things like /dev/kmem which means that we can poke and peek kernel memory and execute kernel code, so that was kinda bad.
And finally probably the mistake that first allowed Pwnage was they left the boot arguments pmd= and vmd= and these boot arguments can construct a ramdisk to boot out of anything. And that basically... not out of anything but out of any contiguous portion of memory. And that allowed us to bootstrap a ramdisk pretty easily, because when we upload a ramdisk, the iPhone has to store in memory somewhere and then signature check and then decide whether it wants it pass on to the kernel based on whether the signature is correct. But even if it fails the signature check, the ramdisk is still in memory, so we can use pmd= or vmd= to construct a ramdisk out of that portion of memory that it temporarily stores or upload in. And then this basically allowed us to boot from an unsigned ramdisk right away. And allow us to flash our first bootloaders. We learn a lot from this process. We now have added quick control over the iPhone’s hardware to even run Linux on it, so that’s basically where we are. I’ll pass it to Musclenerd to describe the Baseband Firmware.
Part 2: Baseband (by MuscleNerd)
(in work by http, will follow here)
End and Q&A
(in work by http, will follow here) | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780060538.11/warc/CC-MAIN-20210928062408-20210928092408-00060.warc.gz | CC-MAIN-2021-39 | 18,926 | 51 |
http://forums.devshed.com/php-development/949200-sql-query-doesnt-insert-data-properly-last-post.html | code | July 26th, 2013, 07:15 PM
SQL Query doesnt Insert Data Properly
We have a shopping cart with a basket. When the user is checked out the following query is executed
When we have a look at the back DB. The following fields are populated
$sql1="SELECT * FROM basket WHERE sessionID='".$sid."'";
but the loanID is only populated for the first item in the cart if there are say 3 items, the first one has the loanID populated whereas for the remaining 2 items it shows the LoanID as '0'.
For basic understanding, each borrower ID is associated with Loan ID and these values are properly generated in the DB in another table called Loan which inserts the values into the basket into the transactiondetail_temp table.
Can any advise as to what could be the problem.
July 27th, 2013, 12:46 AM
You could, for testing purposes, run var_dump($row) just inside the while loop | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607702.58/warc/CC-MAIN-20170523202350-20170523222350-00196.warc.gz | CC-MAIN-2017-22 | 863 | 10 |
https://strategypage.com/qnd/nepal/articles/20050702.aspx | code | Maoists are increasing their attacks on the families of men in the security forces. In the past, police and army commanders had been attacked, often at home. Now, apparently, the order has gone out to attack families of police and soldiers at any level. In many parts of Nepal, the Maoists claim "control," but only have some organized Maoists groups. There are other groups, based on tribe, politics, or service in the military (Nepalese, or foreign as Gurhkas). The Maoists are increasingly facing violence when they try to use violence to coerce locals.
The government is extending press censorship to the internet, blocking two web sites that disagree with the king. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944996.49/warc/CC-MAIN-20230323034459-20230323064459-00359.warc.gz | CC-MAIN-2023-14 | 670 | 2 |
https://nlpcoachingforparents.com/nlp-in-education/ | code | NLP in Education
NLP in Teaching and Education delivers a unique approach to understanding how to be more effective in your communication, making decisions, dealing with conflicts and most of all how to influence others. The modules on NLP in education will help teachers and parents both at home and in schools.
You will learn simple and yet very powerful NLP processes that will enable you to be more effective and flexible in designing formal and emergent learning styles.
What you will learn | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100779.51/warc/CC-MAIN-20231208212357-20231209002357-00046.warc.gz | CC-MAIN-2023-50 | 495 | 4 |
http://www.cse.wustl.edu/~haoyan/ | code | |Office: Jolley Hall 515
Email: haoyan at wustl dot edu
I am a third year PhD student in the Department of Computer Science and Engineering at Washington University in St. Louis. My advisor is Prof. Sanmay Das. My research interests mainly focus on machine learning and computational social science.
Before I came to the U.S., I got my Bachelor's and Master's degree at Nanjing University. | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890771.63/warc/CC-MAIN-20180121135825-20180121155825-00796.warc.gz | CC-MAIN-2018-05 | 389 | 4 |
https://www.toptal.com/resume/ivan-culjak | code | C# Developer in Zagreb, Croatia
CTO/Developer2016 - PRESENTLocodels
Technologies: .NET, Xamarin, ASP.NET, Azure, Blockchain
- Designed the system architecture and made decisions about technologies.
- Developed mobile apps for drivers, the real-time part of the back-end with logging, monitoring, and real-time suggestions.
- Led R&D and set up some business processes.
- Identified opportunities and risks, and kept track of trends which led us to the implementation of blockchain as an R&D project.
- Organized work for other developers and maintained the communication of the tech team spread across different continents.
- Implemented R3 Corda into the package delivery and warehousing system, which allows us to, among other things, create legally binding contracts between all the parties involved in the project.
Owner/.NET Developer2016 - PRESENTTranspose.xyz
Technologies: C#, Xamarin, ASP.NET, Azure, Azure Mobile Engagement, HockeyApp, Xamarin TestCloud, VSTS
- Developed various mobile apps with back-ends on Azure for various clients.
- Migrated an existing mobile app from iOS and Android to Xamarin.Forms while refactoring the whole thing and adding new features.
- Rewrote a WCF back-end to ASP.NET REST Web API, refactoring it to be deployed as microservices to Azure Service Fabric.
- Developed a mobile app for clients and drivers of an international, same-day package delivery company. Customized Xamarin.Forms to support RTL layouts.
- Developed mobile apps for scanning tickets at gates of events with 10,000+ attendees and integrated the whole thing with various hardware barcode readers, which requires writing a lot of bindings for Xamarin.
- Developed a proof-of-concept Xamarin.Forms app for a company with traveling salespeople to display web presentations hosted on Alfresco.
- Consulted with various companies regarding Xamarin and Azure development.
- Taught Xamarin.Forms at three faculties in Zagreb, Croatia.
C# Developer2014 - 2016Tune informacijske tehnologije d.o.o.
Technologies: Xamarin, ASP.NET, Azure, HockeyApp
- Developed a system for the hospitality sector consisting of an easy-to-use but advanced mobile app for clients with social network integrations, a mobile app for servants, a web app for back-office operations, and various services that kept the system running automatically.
- Implemented a loyalty system into an existing system.
- Developed a system that connected to a loyalty system and allowed our client to organize various campaigns, target specific users, and track their reaction.
- Developed a few proof-of-concept web and mobile apps for the betting sector.
- Consulted various companies regarding Xamarin development.
- Taught topics at Algebra Zagreb as a Microsoft Certified Trainer.
CTO/Developer2005 - 2014Geoservis d.o.o.
Technologies: C#, C++, Various math and computer vision libraries
- Implemented the first GPS virtual reference stations network in the region.
- Implemented various algorithms (and tweaked them up to some point) for processing GPS data.
- Developed various tools to speed up processing of point cloud acquired using terrestrial 3D laser scanners.
- Developed various AutoCAD and Excel add-ons to speed up and automate data processing.
- Led internal education for 100+ employees.
- CMS for Mobile Apps (Development)
Through the past ten months, I've developed an ASP.NET backend and Xamarin mobile apps targeting iOS, Android, and UWP for a client project. The system acts as a CMS, where anyone can modularly create their own mobile apps, after which the system will automatically build them and upload them to the store.
The system is white labeled, so I've had to do a lot of customization and automatization to be able to deploy new branded apps without any human intervention.
This is one of those projects that are really complex under the hood, but elegant and simple to use on the outside. It's definitely a project that I'm really proud of, and that taught me a lot about writing modular and abstract components.
- Mobile App for Scanning Event Tickets (Development)
I've developed an mobile app targeting Android, iOS, and UWP using Xamarin for a client that sells event tickets online and handles huge events (40 000+ persons).
This project not only had to run on really old rugged Android devices with embedded barcode readers, but it had to run insanely fast and stable. I had to implement a fast database, in-memory caching, sync between the local state and online back-end while handling unstable Internet connections, offline mode and much more. When we finalized the app for Android, we added support for other external and internal barcode readers (camera was supported from the start) and ported it to iOS and UWP so that it can be used even on notebooks.
We've just started the second phase of this adventure, porting this Xamarin.Forms app to Windows Mobile 6 so that we can support even older, but still "the best money can buy" rugged barcode readers.
- Mobile App for Drivers and Fleet Management (Development)
This client usually gets called "Uber for packages" in the papers. We developed Xamarin apps for Android, iOS, and UWP for drivers that deliver packages using this system. We designed a great and elegant UX, after which we designed a nice and responsive UI that could be used without a problem by drivers while driving on a myriad of devices, from small 4" phones to 12" tablets. After that, the challenge was to track the drivers' locations and send it to the back-end while optimizing the battery and Internet connection usage.
The whole system was upgraded with real-time connection using SignalR and fallback to push notifications when SignalR connection terminates without the driver explicitly saying that he wants to go off. It was fun to develop this app, which needs to work fast, reliable and have the smallest footprint possible. To spice things up a bit, we've added RTL (right to left) support to it, for which I had to fork Xamarin.Forms projects which don't support it out-of-the-box.
- Alfresco Client (Mobile App) (Development)
As a subcontractor, I developed a Xamarin app primarily targeting iPad Pro and Android tablets, which was a nice front-end for an Alfresco system. This app allowed its users to easily see the contents on Alfresco CMS available to them, download them or update them, and then play those presentations offline. Its main usage was for traveling salesmen to go offline and still be able to fluidly run their presentations.
The biggest challenge in this project was communicating with Alfreso and trying to find my way through their documentation since it's a great, but huge, system.
- Teaching Xamarin.Forms at Zagreb University of Applied Sciences (Development)
Held lectures throughout the semester for fourth- and fifth-year students about Xamarin.Forms.
- Teaching Xamarin.Forms at Faculty of Electrical Engineering and Computing (FER) Zagreb (Other amazing things)
After a lot of work, I've managed to convince a university in Zagreb, Croatia that they really missed a subject featuring Xamarin.Forms, and starting this academic year--after a lot of unofficial classes, lectures, workshops and more--we have an official Xamarin.Forms class. As far as Xamarin knows, this is the first official class at a University dedicated solely to Xamarin.
- Blood Donors (Development)
Developing a system for blood donors and facilities for blood donations to connect them in a much better and faster way, so that facilities can know which blood donors are "available" to them and be able to contact them using push notifications, while blood donors will be able to see who "needs" them and when.
The mobile app is Xamarin traditional with eye-candy design, the web app is ASP.NET MVC and the whole back-end is hosted on Azure using Mobile Apps, Service Bus Topics, Notification Hub, AAD, and so on.
This system will be open sourced soon and donated to Croatian Red Cross, while being made available for everyone to use it or spin their own version.
- Lost Children (Development)
Developing a system to facilitate reuniting lost children with their parents, whether the child was lost for a few days or decades.
We're developing a Xamarin.Forms mobile app that has basic functionalities to take a photo of concerned parties and a voice recording to start the search.
The main job is done by Azure Cognitive Services, which tries to match the persons face and voice to another record and find the match. Currently, every match has to be approved using an ASP.NET MVC app by administrator while we train the system.
We're planning to donate this system to UNHCR in March 2017 to help connect refugee children with their parents, but also to connect stolen children with their parents. The whole project was started by a human rights initiative in Zagreb and my company started working on it pro-bono.
The system will probably be open sourced by the end of 2017.
LanguagesC#, C#.NET, T-SQL, SQL
FrameworksASP.NET, ASP.NET MVC, Xamarin.UITest, .NET
ToolsMicrosoft Visual Studio, Azure DevOps Services, Azure Logic Apps, Azure Mobile, Azure Automation, C#.NET WinForms, MATLAB
ParadigmsAzure DevOps, Kanban, Unit Testing, Agile Software Development, Automated Testing, Automation, Scrum
PlatformsXamarin, Azure PaaS, Azure IaaS, Azure
StorageAzure Blobs, Azure Queues, Azure Cache, U-SQL
OtherTask Automation, Data Scraping, Scraping, Xamarin Forms, UI Testing, Web Scraping
Libraries/APIsWinForms, Xamarin.Android, Xamarin.iOS | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257553.63/warc/CC-MAIN-20190524064354-20190524090354-00502.warc.gz | CC-MAIN-2019-22 | 9,486 | 70 |
https://forums.quectel.com/t/lc76g-entering-backup-mode/25292 | code | We are using LC76G module in the project and have some strange variations in TTFF times after overnight sleep in backup mode. The EASY mode should be enabled by default, so overnight sleep shouldn’t be a problem.
The document LC26G&LC76G&LC86G_Series_Low_Power_Mode_Application_Note says in the chapter 2.1.2. Testing Procedures that “The module returns $PAIR001,650,0*38 when it enters the Backup mode.”.
However the document LC26G(AB)&LC76G&LC86G_Series_GNSS_Protocol_Specification says in the chapter 2.3.46. Packet Type: 650 PAIR_LOW_POWER_ENTRY_RTC_MODE that “If successful, the module will be set to Backup mode and be prevented from receiving any commands”. It doesn’t say anything of receiving the ACK OK message.
And indeed we can see that usually we don’t get the ACK OK message at all and sometimes we get it.
Module sends the 010 PAIR_REQUEST_AIDING message for both time and location during startup, which I think means that it hasn’t got the stored position information or running RTC available. We do feed the both information to the module but still got the bad TTFF.
Question is: should the ACK OK really always be received to $PAIR650 command and if yes, for how long should we wait for it before shutting down the VCC?
The documents don’t state for how long does it take to run down the module’s systems and store the statuses in the worst case.
Additionally I’d like to refer to two a bit contradictory entries in Quectel forum:
In L76 backup mode support says that ephemeris data is valid for 2 hours and that fix rate can be other than 1Hz.
In L76 - How to use EASY Technology? support says that ephemeris data is valid for 3 days - if powered up enough time - and that NMEA output frequency should be 1Hz. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510297.25/warc/CC-MAIN-20230927103312-20230927133312-00146.warc.gz | CC-MAIN-2023-40 | 1,750 | 10 |
https://mscoding.org/2018/03/mississippi-coding-academies-covered-by-wapt-news-in-jackson/ | code | Mississippi Coding Academies Covered by WAPT News in Jackson
Mississippi Coding Academies received some great coverage from WAPT for the Jackson Mississippi Coding Academies, where reporter Earl Arms talked to instructor Herbert Brown and a number of the coders about their ambitions.
Charlena Jackson, a coder, told Arms that doing this work makes her feel good.
“It makes you feel like you’re smarter than everyone else,” she said, laughing. “It’s like learning any other thing; you’ve just got to keep your mind to it.”
See the video here: Mississippi Coding Academy Funding With Grants.
Arms went on to explain that the coding academies are funding (in part) by state money and grants, with co-founder Richard Sun telling WAPT that the coding academies are able to train coders from Mississippi for higher-paying jobs at less expense that many companies would incur trying to recruit coders from outside the state. Arms notes that the program is free to the coders, and is designed to get coders into technology jobs even though most don’t have a college degree.
We appreciate the coverage from WAPT and the recognition of how exciting Mississippi Coding Academies are for the state! | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819273.90/warc/CC-MAIN-20240424112049-20240424142049-00797.warc.gz | CC-MAIN-2024-18 | 1,203 | 7 |
https://flora.games/creating-a-trailer/ | code | My favourite trailers and what makes them effective in meeting their goals and how they suit their target audience.
Looking to purchase a game on the PlayStation store, Switch or Steam I find the most effective trailers are focused on showing you the gameplay, story and genre of a game without telling you.
Sky: Children of Light
Sky Children, has a very cinematic style trailer, showing off the beautiful art direction, dramatic music and showing some narrative clues for the game like friendship and togetherness. Again the trailer doesn’t give too much away.
I love this trailer for the way it plays with visual design, creating shapes and symmetry. The music and level design tell a story without any dialogue or text.
Cats & Soup
Cats and Soup is sweet, polished and fun to play. I like this trailer because it’s simple and effective, what you see is what you get.
The Garden Path
Gameplay Announcement Trailer
The Garden Path shows off the unique contemporary visuals in this announcement trailer.
Merge Mansion, Lily’s Garden and Gardenscapes all play on a particular type of narrative advert to gain attention for their gardening games. The success of this type of marketing is obviously in wanting to know the bizarre plot twists and turns and playing on what you’re expecting to see. The entire part of the story where someone’s died, is alive, and grandma is going to jail is missed out, so you want to play to fill that gap and to find out how it all ends.
‘Game Trailer Representation Responsibilities’
While considering a game trailer, it’s important to consider what you will be showing. “If a game trailer is intended to be a summation of a game, then one of many factors it’s important to consider is how it represents different genders, cultures, ethnicities, ages, etc” (Lieu, 2021). On release, Flora Fatalis would have a choice of many different profile images represented by different genders, cultures, ethnicities, ages etc but for most of the gameplay you won’t see the duchess on screen. For this reason, while different images of duchess’s may appear in marketing materials, I’m going to keep an illusive mystery to the duchess’s image. The important thing is, the duchess is many different people.
Making a Trailer
|Stage 1||Concepting||Define your idea|
|Stage 2||Scripting||Draft your story|
|Stage 3||Storyboarding||Plan your scenes|
|Stage 4||Animatic||Define pace & timing|
|Stage 5||Design||Define visual approach|
|Stage 6||Logistics||Plan the production process|
Stage 1 Concepting – A cinematic trailer
My cinematic trailer will depict a fantasy for offshoot gardeners, growing and collecting plants as a strange and poetic duchess. “When making an announce trailer, you have to take a good look at all aspects of the game like its: story, game mechanics, art style, setting, character design, animation, sound, or music, and identify the ones which stand out the most. Ideally, the strongest one is the hook of the game; every other element will act as support” (Lieu, 2021). Flora Fatalis is an alternative kind of garden mobile game, with a strange story, the hook is not just the poison plants but the strange and eery world.
Stage 2 Scripting – Adaption of a poem
The trailer features an adaptation of a poem I wrote (Masters 2017), the original version is several verses longer and punctuation, words and rhyme has been changed/emphasised for suitability to the game.
“My body grieves the absent sun, the cold smiles
on her scratches of my glass-like skin.
Sharpened swords sail on chilling winds,
slicing through my shattering shell and widening my wounds.
The weeping tree, she fouls my throat,
her branches binding bitter wounds.
My heart screams and sinks, in her hollow trunk,
the limbs limp, they hold a tarnished soul.
Flora Fatalis, a strategy, simulation and story game for the mobile.”
Stage 3 Storyboarding – Pathetic Fallacy (it was a dark and stormy night…)
The weather will represent the emotions of the duchess and add an allure to the garden and it’s a mystery.
An ambitious start
Each box represents a 5-second window and when I planned to draw out an animatic/ fit the drawings with script – I found no one can squeeze all these frames in!
Fig 2. Masters. 2021. Storyboard
Still too ambitious
I started again, and was still too ambitious!
Fig 4. Masters 2021. Storyboard25
Scoping down with ProCamera 2D
Fig 5. Masters 2021. Cinematics
The timing for my storyboards were too ambitious to complete, so I began again. I decided to pan along the garden and display one or two weather types at the same time.
To create a cinematic effect for my trailer I am using ProCamera2D’s options to target different areas to ease to and from.
In addition, this will make a nice intro for the start of the gameplay.
Stage 4: Animatic
An overly ambitious start ate away into my time, so instead of creating an animatic, I planned the pace of the trailer through programming the right timings and ease in Unity to fit nicely with the script.
Stage 5: Design – A sad story
Sound & Music
Sound and music are fast becoming my favourite part of a sprint. I want to create a sad and dramatic atmosphere, so when I found A Sad Story by Setuniman (2013) on Freesound I knew it was perfect.
The materials suggested we might contact a voice-over artist, and fellow students have built incredible demos and trailers working with a professional voice actor. My trailer is a little obscure, and a little unusual so the brief was difficult to write, I consulted Dereck Lieu’s insights: “The joy and fun of working with voice actors are the choices which sound totally different from your initial idea but add nuance and character which are fun an unexpected. Try not to be too rigid about what you’re looking to hear because otherwise you might stifle the creativity and close yourself off from some amazing possibilities!” (Lieu, 2021).
Voice Over (Iljaobrien 2021).
Stage 6: Logistics
I recorded footage on NVIDIA ShadowPlay and then transformed the footage in Premier Pro and After Effects to tell a story, adding all the elements together.
A list of software and services used:
- After Effects
- Professional Voice Artist
- NVIDIA ShadowPlay
Polish & The Trailer
Finally, is the genre, hook and content of the trailer satisfactory?
“The Genre helps the audience know if they’re interested at all
The Hook tells them why it’s notable beyond basic interest
The Content indicates scope and variety” (Lieu, 2021).
I watched over all the elements I’ve stitched together many, many times to check for fit, atmosphere and nuance, adjusting animation transition and so on until I was happy! The genre should be abundantly clear, and the hook and content will hopefully come across in the script, juice and atmosphere!
List of Figures
Figure 1. Chambers. 2021. ‘What Is an Animatic? [table]. Available at: https://boords.com/animatic/what-is-the-definition-of-an-animatic-storyboard [accessed 27 Dec 2021].
Figure 2. Sarah MASTERS. 2021. Storyboard.
Figure 3. Sarah MASTERS. 2021. Storyboard2.
Figure 4. Sarah MASTERS. 2021. Storyboard2.5.
Figure 5. Sarah MASTERS. 2021. Cinematics.
Figure 6. Sarah MASTERS. 2021. Footage.
Figure 7. Sarah MASTERS. 2021. Voice Over.
LIEU, Derek. 2021. ‘Derek Lieu Creative’ [online]. Available at: https://www.derek-lieu.com/blog [accessed 27 Dec 2021].
LIEU, Derek. 2021. ‘How to Direct Trailer Voiceover’ [online]. Available at: https://www.derek-lieu.com/blog/2021/8/2/how-to-direct-trailer-voiceover [accessed 27 Dec 2021].
LIEU, Derek. 2021. ‘Game Trailer Structure – Genre, Hook, Content’’ [online]. Available at: https://www.derek-lieu.com/blog/2021/4/12/game-trailer-structure-genre-hook-content [accessed 27 Dec 2021].
LIEU, Derek. 2021. ‘Game Trailer Rrepresentation Responsibilities’’ [online]. Available at: ps://www.derek-lieu.com/blog/2021/2/28/how-to-make-a-game-announce-trailer [accessed 27 Dec 2021].
LILJAOBRIEN. 2021. Flora Fatalis [voice over]. Fiverr.com.
MASTERS, Sarah. 2017. ‘Little Rain’ [poem].
SETUNIMAN. 2013. A Sad Story [music]. Freesounds. Available at: https://www.pond5.com/royalty-free-music/item/22238937-sad-story [accessed 27 Dec 2021]. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710421.14/warc/CC-MAIN-20221210074242-20221210104242-00264.warc.gz | CC-MAIN-2022-49 | 8,234 | 80 |
https://status.chainstack.com/incident/173616 | code | Scheduled platform maintenance
Completed 12 Feb at 10:00am UTC.
Solana Mainnet Full (Chainstack Cloud ams1, Amsterdam) Solana Mainnet Full (Chainstack Cloud ash1, Ashburn) Solana Devnet Full (Chainstack Cloud ash1, Ashburn)
Posted 12 Feb at 10:00am UTC.
We are planning to perform maintenance of Solana nodes and related infrastructure. Short-term service disruptions are possible.
Posted 12 Feb at 06:00am UTC. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945333.53/warc/CC-MAIN-20230325130029-20230325160029-00002.warc.gz | CC-MAIN-2023-14 | 411 | 6 |
https://cboard.cprogramming.com/brief-history-cprogramming-com/8455-who-had-sig-printable-thread.html | code | ::realizes that the title was an exclaimation, not a question...::
anyways, who had that sig that said something like "blah blah blah blah... for messing things up throughly it takes a computer."
and what was the full sig? it dawned on me while reading bassy's sig... who had that sig! <--- ha! take that! :) | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123276.44/warc/CC-MAIN-20170423031203-00464-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 308 | 3 |
https://www.readme.lk/chronicling-code4good/ | code | Social innovation hackathons seem to be entering the hackathon culture in Sri Lanka. This is indeed a good sign; rather than the everyday entrepreneurs, we will have some social entrepreneurs too within the business sphere. We wrote to you about this particular event a while ago and the Hackathon of Code4Good which happened at the WSO2 premises concluded last Sunday (20th) after 56 hours of extreme coding.
The Pre-Hack Meetup
There was one another event that took place exactly a week before the hackathon, the pre-hack meet up. As we told you before, Code4Good isn’t just one hackathon; it is a series of events. The goal of the meetup was to bring in together coders, designers and entrepreneurs along with the Civil Society Organizations (CSOs) to discuss the problems. What really happened was that the CSOs were given 90 seconds to pitch the problem they stand for and say what they expect to see in the final product. It was an intensive session; since the CSOs had to make sure that they define the problem clearly within the 90 seconds as well as the participants understand the problem during the same time slot. Well, the majority of the segments throughout happened in the same style; extremely limited time slots. In a way, this is a good chance for everyone to manage their time properly.
The participants were given the chance to speak to all the CSOs in person. Again the clock was ticking. They were given the chance to form teams, well majority already came in teams. The next step was for the teams to sign up for one particular problem. That was all for the meetup and next on the timeline was the Hackathon.
56 hours, now that’s fairly a large number; maybe the lengthiest hackathon happened in Sri Lanka to date. Well if you ever happen to take part in one, you know how valuable this is and how you dream of having some more time.
Something quite interesting was happening. The participants went through a workshop by Facebook’s internet.org team. Deepti Doshi, Product Partnerships gave an overview on what Internet.org is and what they do. Next up was Sheila Rathnam, from Platform Partnerships who took the audience through the Facebook Developer Tools on how to build, grow and monetize the apps you build. What we all love, expert tips and best practices, it was a session by Alex Petrescu an Android engineer at Facebook on building apps for low bandwidth situations.
After the launch dinner, it was all about making the most out of the remaining hours to bake an innovative product.
Let the Pitching begin
Yet again a war with the clock, participants were given 3 minutes to present their ideas and 2 minutes to answer the questions raised by the panel of judges. The judges were Fayaz Hudah representing the ICT Sector, Marisa Fernando representing the NGO sector and Yan Naung Oak representing Asia’s Civic Tech Sector.
Given below are the problems that were shown by the CSOs and the teams who build applications for them.
- Creating a two-way information channel for farmers
Requirement: An app where the farmers would be able to communicate and get advice from government bodies like the Ministry of Agriculture on various matters like information about crops, pesticides etc.
Teams: Five Four Loops, Pending, Y-knots
- Helping women who experience violence access support services
Requirement: A platform for women and children to reach services like counseling, government and non-governmental organizations and women development services in a situation they face any violence.
Team: Palm One
- Receiving and processing complaints from citizens
CSO: Rights Now
Requirement: A virtual platform to their existing system to help the general public to lodge complaints and report regarding any ill-treating or rather injustice they face.
Teams: Emagine IT, Hexmatter+Rush
- Documenting and detecting hate speech trends
Requirement: a platform to report hateful comments and violence and a system to document hate speech on digital space and social media.
- Helping citizens find volunteering opportunities
Requirement: a volunteer matching service to search for volunteers to provide their help for different causes.
Teams: Api, SAS Ninjas, Smurfs
- Improving the way Police handle citizen complaints
Requirement: to bring back the trust the citizens have on the justice system, a platform to lodge the complaint they make and to rate on the service and response they received from the Police.
Team: Heroes and Zeros
- Increasing the accuracy of education-related data collection
Requirement: a system to collect accurate educational data to help policy makers to better support educational development.
Teams: BlackRooster, Codice Dominos, PixelClear
- Improved care and support for citizens psychosocial problems
CSO: The Good Practice
Requirement: a system to reach out to responsible people working on several sectors, like the disability officers, lawyers, social service workers, child rights officers etc. in order to network them for people who are in need.
- Enable citizens to contact ministers of Parliament
CSO: Verite Research
Requirement: a platform to connect MPs with causes to the society; which will allow people to create causes and tag them along to the responsible ministers and government bodies.
Teams: Bit Masters, Breaking Code, Daredevils
- Sharing and celebrating the good we see around us
Requirement: to have a system to capture and celebrate and promote the good that you see in Sri Lanka.
However, two teams went out of the normal way of making solutions for the problems stated by CSOs. Instead, they created apps for problems that they see. Team Mogo came up with an app for collaborative storytelling while team Shilpa Sayura introduced a platform for the fisherman.
The Winners and What Happen Next?
The three winning teams of Code4Good 2015 along with three other recommended teams by the panel of judges were qualified for the next step, the Incubation phase. Here teams will be given access to mentors, advisors and other experts. These experts will provide coaching and help maximize the social impact and sustainability or incoming generating potential of the product.
The teams Bit Masters, Hexmatter+Rush along with team Pending were the three recommended teams to enter the incubation process.
Code4Good 2015 actually produce two runner-ups; Teams Heroes and Zeros and SAS Ninjas walked away with LKR 50,000 worth prizes.
Team Breaking Code who came up with a platform to hold parliamentarians accountable was awarded the Champions at Code4Good 2015 along with prizes worth 100,000.
Next on the plan after the Incubation period would be the Demo Day, where the products will be presented and pitched in front of investors. That marked the end of Code4Good 2015, practically the 1st Social Innovation Hackathon to be held in Sri Lanka.
Just because your idea didn’t win today, doesn’t mean your idea is bad. Keep working. – Eranda Ginige | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703549416.62/warc/CC-MAIN-20210124141945-20210124171945-00403.warc.gz | CC-MAIN-2021-04 | 6,929 | 48 |
https://docs.qumulo.com/hardware-guide/fujitsu-primergy-rx2540-m7/drive-bay-mapping.html | code | This section explains the drive bay mapping in Fujitsu RX2540 M7 nodes.
Your Fujitsu RX2540 M7 chassis contains 12 or 8 HDDs in the front, 4 NVMe drives in the back, and 2 mirrored NVMe boot drives in internal M.2 expansion slots. The following is the mapping for the drives.
To determine the drive configuration for your node, see Technical Specifications.
Front HDD Drives
For more information, see To Replace an HDD.
48TB and 144TB Nodes
In 48TB and 144TB Nodes, all drive bays are populated.
In 96TB Nodes, some drive bays are empty.
Back NVMe Drives
For more information, see To Replace an NVMe Drive.
Because the expansion bays are universal, your node might contain labels such as HDD0 for the NVMe slots.
Internal NVMe M.2 Boot Drive
The boot drives are located at the M.2 expansion slot on an interposer (controller) board. For more information, see To Replace an NVMe M.2 Boot Drive.
Follow the instructions in the Fujitsu Upgrade and Maintenance Manual: Slots for M.2 SSDs on the M.2 interposer board (p. 211). | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817474.31/warc/CC-MAIN-20240420025340-20240420055340-00395.warc.gz | CC-MAIN-2024-18 | 1,021 | 14 |
https://xoofoo.org/paper/?searchtags=JavaScript | code | The Vibration API1 is an API specifically made for mobile devices as they are thankfully the only devices that have a vibrate function. The API allows developers to vibrate a device (in a pattern) for a given duration.
Fantastic Micro-Frameworks and Micro-Libraries for Fun and Profit!
As for the image lightboxes, I have always lacked simplicity for them. I mean not only the visual design, but the overall experience: from implementation to UX. All due respect, but I have never liked any of these light-fancy-face-boxes. They all were solving problems that just don't exist: lots of unwanted features by default, total mess in markup, no native behavior for touch screens. I was working on a project and needed an image lightbox that solves these problems. I needed a lightbox only for images, not video, text, and iframes at once. I made ImageLightbox.js.
Polymer is a new type of library for the web, built on top of Web Components, and designed to leverage the evolving web platform on modern browsers.
- Architectural diagram
- A set of polyfills for emerging web platform features. Initially, these core features are enabled as polyfills but go away over time as browsers implement them.
- A next-generation web application framework built upon these core technologies.
- A set of comprehensive UI and utility components for building web applications.
Dart is a new language for scalable web app engineering.
Include pace.js and the theme css of your choice, and you get a beautiful progress indicator for your page load and ajax navigation.
No need to hook into any of your code, progress is detected automatically.
annyang supports multiple languages, has no dependencies, weighs less than 1kb and is free to use.
The Geolocation API of HTML5 helps in identifying the user’s location, which can be used to provide location specific information or route navigation details to the user.
There are many techniques used to identify the location of the user. A desktop browser generally uses WIFI or IP based positioning techniques whereas a mobile browser uses cell triangulation, GPS, A-GPS, WIFI based positioning techniques, etc. The Geolocation API will use any one of these techniques to identify the user’s location.
The Geolocation API protects the user’s privacy by mandating that the user permission should be sought and obtained before sending the location information of the user to any website. So the user will be prompted with a popover or dialog requesting for the user’s permission to share the location information. The user can accept or deny the request.
Prototype iPhone apps with simple HTML, CSS, and JS components.
slimMenu is a lightweight jQuery plugin, which is made to create responsive and multi-level navigation menus on the fly.
Mousetrap is a standalone library with no external dependencies. It weighs in at around 1.9kb minified and gzipped and 3.5kb minified.
Do you also want the possibility to add, edit and remove items by dead simple templating? Hell yeah!
- easy setup
- based on ACE Editor
- supports multiple instances on one page
- configuration via JS object or HTML attributes
Great Instant Documentation Search for webdeveloppers
Codeblock.js turns example code into editable, runnable code blocks that visitors can poke at and play with to better understand your API.
Read the jQuery source like a book like a boss. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494974.98/warc/CC-MAIN-20230127065356-20230127095356-00840.warc.gz | CC-MAIN-2023-06 | 3,375 | 26 |
https://music.stackexchange.com/questions/43063/voice-leading-resolution-of-consecutive-secondary-dominant-7ths | code | What's the proper voice leading procedure when two consecutive secondary dominant seventh chords (with the same root chord) occur before the resolution to the root chord? For example V7/ii -> V42/ii -> ii6. Is the V7 resolving into the V42, or is it thought of as a delayed resolution into the ii6? -Thanks!
I would consider this an extension of the dominant, not a resolution to an inversion of the dominant. Depending on everything that's happening, you may want to consider it all V42. If the dominant is spread over more than one measure, it would make sense to analyze it as V7/ii - V42/ii but if the bass note just moves to the 7 of the chord within a single measure, it may make more sense to consider the whole measure V42. Analysis can be somewhat subjective, so you may still analyze this within a single measure as V7 and V42 anyhow. It really just depends on the level of detail that you want to have and whether or not the additional detail helps bring anything important to your analysis. I would liken this to analyzing voices moving as individual chords vs ornamentation, where you could certainly analyze every note as a different chord but it doesn't necessarily better describe what is happening in the piece of music.
Call it a delayed resolution: you're going to exchange the root and seventh in a kind of wedge motion, because the 7th of the root position chord will need to move up to the root as the bass falls from root to seventh (in order to avoid doubling the seventh). That means there is no resolution at all for the root position chord.
In general, a change of inversion is just a prolongation of the chord. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100016.39/warc/CC-MAIN-20231128214805-20231129004805-00881.warc.gz | CC-MAIN-2023-50 | 1,638 | 4 |
https://www.daniweb.com/programming/web-development/threads/402307/remove-session-variable-in-web-handler | code | I have declared a Session variable in web handler i-e .ashx file like below
int SaleID; HttpContext.Current.Session["tempSaleID"] = SaleID;
Now i want to remove this Session variable in class file i-e .cs
In normal cases Session variable are removed using
but in this case its not working because its declared in web handler.
Kindly tell me how can i remove this? | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506320.28/warc/CC-MAIN-20230922002008-20230922032008-00193.warc.gz | CC-MAIN-2023-40 | 363 | 6 |
https://software.intel.com/en-us/forums/user-community-for-visual-computing/topic/301912 | code | I have a Dell Vista laptop with mobile 945GM express chipset. I am using DX 9.
When the device is reset (for example by toggling fullscreen), lighting is lost. This happens in my game but also in some of the DirectX samples - for example when I reset device with the SkinnedMesh sample, the character then renders black. I can't see any flaw with the code and since this happens with the DX samples I thought it might be a driver bug.
What is the fix please? | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424756.92/warc/CC-MAIN-20170724062304-20170724082304-00679.warc.gz | CC-MAIN-2017-30 | 458 | 3 |
https://www.oxymoronical.com/blog/2011/03/Mossop-Status-Update-2011-03-11 | code | - Work on simplifying the code required to open the add-ons manager as well as allow direct linking/bookmarking (bug 639931 and dependants)
- Prototype patch for unloading JS modules (bug 481603)
- Fix for restarting from safe mode (bug 639090)
- Fix for missing InstallTrigger (bug 638292)
- Blogged about future plans (http://www.oxymoronical.com/blog/2011/03/Whats-next-for-the-Add-ons-Manager)
- Started working on third-party add-on issues
Getting the important projects up and running in time for Firefox 5. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100258.29/warc/CC-MAIN-20231130225634-20231201015634-00251.warc.gz | CC-MAIN-2023-50 | 513 | 7 |
https://cs.stackexchange.com/questions/160179/should-i-remove-equivalent-variables-in-a-cnf-file-to-be-used-by-a-sat-solver | code | My CNF file ends with many pairs of clauses that represent that two variables are equivalent (eg: -3 7, 3 -7, 5 -11, -5 11, etc.). Do most SAT solvers automatically pre-process these and replace every occurrence of one variable by the other (eg: replace every 7 by 3, and every 11 by 5), or should I first do the replacement processing to produce a simplified CNF file?
It won't hurt to do that, but you probably don't need to. If you happen to know that two variables are equivalent, a much easier way to let the solver use this information is simply to assert that they are equivalent:
$$\neg x_3 \leftrightarrow x_7$$
Which becomes, in CNF:
$$\left(x_3 \vee x_7\right) \wedge \left(\neg x_3 \vee \neg x_7\right)$$
Any solver based on DPLL knows how to use this information extremely efficiently.
If the variables appear enough, a CDCL solver will probably find these two clauses by itself eventually, but this would save it a bit of work. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100529.8/warc/CC-MAIN-20231204115419-20231204145419-00271.warc.gz | CC-MAIN-2023-50 | 941 | 7 |
http://webapps.stackexchange.com/questions/tagged/creation-date+google-spreadsheets | code | I'm not a programmer or coder, so please be gentle with me :-) I have a Google Spreadsheet that is used by different people to add tasks for my team. Here's an example of what it looks like: ...
I've got a spreadsheet in Google Drive and one column is meant for the date the entry is made. Is there a button to do this? I'm aware of the functions =NOW() and =TODAY() but their description says ...
I am creating a spreadsheet which will contain records of my daily expenditure. Something like the following: A | B ---------- 0 | 50.04 0 | 20.00 0 | 19.99 0 | 2.40 What I am trying to ... | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510273874.36/warc/CC-MAIN-20140728011753-00240-ip-10-146-231-18.ec2.internal.warc.gz | CC-MAIN-2014-23 | 587 | 3 |
http://msgroups.net/greatplains/prior-year-posting-2-years/602121 | code | jpg's oproepen vanuit database #2
Kan iemand mij svp uitleggen hoe ik .jpg's (of andere plaatjes) in ee
excel database kan verwerken en vervolgens middels een formule ka
oproepen in een ander sheet
Marc Willemse's Profile: http://www.msusenet.com/member.php?userid=164
View this thread: http://www.msusenet.com/t-187045633
...Tender Summary #2
Store Operations- Manger Tender Summary feature doesnt seem to work properly.
If I process a Layaway transaction or Workorder, and a customer initially
places a deposit, that deposit does not show up as part of the tender summary
for that day.
To me that makes no sense, as a depoist is still money in the cash register,
whether the sale is finalized or not.
This has to be a bug (using v1.3)
Can anyone shed any light on this issue?
This is try, this report collects its data by joining the TenderEntry with
the Transaction, it doesn't look at the Payment table at all
Although it's ...OWA Logging #2
How can I tell who is using OWA, as opposed to in-the-office access through
the LAN and Outlook. Is it possible?
I'm using Exchange 5.5 installed on W2k server.
Ideally I'd like to see usage stats such as, who has used OWA during a
certain time period, and how much they used it (time or messages read/sent).
Thanks in advance,
"Steve W" <antispamsteveW@=No-Spam=.org> wrote:
>How can I tell who is using OWA, as opposed to in-the-office access through
>the LAN and Outlook. Is it possible?
>I'm using Exchange 5.5 installed on W2k server.
>...Posts do not appear
My posts from the Ng do not appear on the NG. I have to go to google groups
to look them up. Cumbersome. How can I solve the problem?
Good evening Ben, concerning your posting to the newsgroups using Windows
Live Mail, you will have to have a server name from your Internet Service
Provider and place it in the third box when configuring your NG. Microsoft
does provide you with a list of server between 1700 plus, so please go to
newsgroup on the bottom left of Windows Live and select NG, a window will
appear; look at the top of that window and you will see a blue excl...Thank You I found the posts
Thanks again to all I found the posts from yesterday
For a short information, send a blanc mail to:
...Deploying .NET crystal reports on crm 1.2 server
We developed some reports using Visual Studio.Net 2003
inbuilt Crystal Reports & viewer.(we had to do this because the CRM
reports using SDK were not able to talk to our separate custom
We are able to render these .net crystal reports on our
developer machine (non-crm).However, we are not able to render the
same when we deploy these .NEt crystal reports to our CRM webserver.
(We have CRM 1.2 Installation with Crystal Enterprise 9 on
this crm server)
I guess that this may be happening because of version
conflict between .Net crystal viewer and the CRM enhanced crystal
v...Bank Transaction not posting.
User entered bank transaction and posted after posting, journal printed and
close report and continue another transaction on bank transaction window
WITHOUT closing and re-open.
These transaction was laying on Batch recovery, I selected and press
continue then it is not shows on batch recovery, but still in process
monitor shows process ‘CMTRX(4)’ 5 times, ‘General Ledger: Posting (10)’ 35
lines. In series post window, batches are selected and can’t uncheck (unable
to change batch status. The batches is being posted)
Since 6 days this is the status and user can’t exit applica...Changing Open Year in AFA
During the printing of the Balance Sheet in AFA, the user got the "The Year
You Have Selected for an Open year Column is Invalid" error message.
I had her go into the AFA layout window, double-click on the columns and
change the Open year to 2006. And, I had her go into the Temporary Financial
Adjustment Column window within the report option and change the Open year to
Still, she got this error.
Anything that she can try? She wants to print a Balance Sheet as of
01/31/06 and she did successfully close 2005.
...Digital ID #2
Does anybody ever used Digital ID / Certificate ? If so please I need the
feedback, cas my company want me to implement e-mail security.
Any ans or sug.......highly appreciated.
I dont know about best, I'm in UK so the one I selected was specific to my
requirements http://www.equifaxsecure.co.uk/index.html they do have a US
"mir" <[email protected]> wrote in message
> thanks for ur response........which one is the best?
> "DL" <[email protected]> wrote in message...Importing data #2
Can anybody tell me how to import data in to excel!!! I
Is the data in a .txt file?
If yes, then you can open it (File|open). You'll see a wizard that will allow
you to separate each field.
> Can anybody tell me how to import data in to excel!!! I
> need help!!!
...No prior System Restore points
Since 2 days ago when I check System Restore, all it has is the most current
restore point. In the past I would show about 2 months worth of prior restore
points. A new one would be automatically created each day. Now only todays is
I checked and the settings still look proper as to what they always were.
System Restore is turned ON and it is set at %12 (max).
What could have changed and how can fix it to not purge all prior points
except the current one?
On Apr 10, 3:21=A0am, mkenewbie <[email protected]>
> Since 2 days ago when I c...Offline files #2
I am trying to get Offline files with my .pst file to work correctly. I have
followed Q252509 to allow the synchronization of .pst files.
I have network share with my .pst and have made it available offline. When i
am on the network i can go into Outlook and get access to my personal folder.
When i am off the network and try to access my personal folder it says it
can't access the file because its trying to retrieve it from the network. I
verified that the file has been cached by checking out winnt\cdc. So I'm
wondering why the cached file is not used when working offline.
How ...CTabCtrl question #2
I have an SDI program with a CTabCtrl object with 5 tabs on the main
View page. When the enter key is pressed all the controls on the
currently displayed tab disappear. Any ideas what the cause is?
Is the tab control on a dialog imbedded in the view?
"NewbProgrammer" <[email protected]> wrote in message
> I have an SDI program with a CTabCtrl object with 5 tabs on the main
> View page. When the enter key is pressed all the controls on the
> currently displayed tab ...how do I design next year's calendar in Publisher?
I want to begin designing a 2006 calendar now. How can I do this in
Publisher 2002 (Office XP 2002) OS Win XP Home? The template calendar is for
the current year & I don't know how to import a different year - say from
Outlook, to use within Publisher.
Open one of the standard calendars in Publisher and choose Change date
range. Then edit for your design.
"EmmaJuJu" <[email protected]> wrote in message
> I want to begin designing a 2006 calendar now. How can I do this in
> Publish...Release Mode #2
i am facing a very typical problem that is when i execute my program in
debug mode it runs but when i do the same thing in Release Mode it give
error DialogBox with 2 buttons Close and Degug. My program is simple
MFC program with no DLL. Whats Wrong?
Check out this article:
"PARIJAT" <[email protected]> wrote in message
> Hi All,
> i am facing a very typical problem that is when i execute my program i...Number of days falling in various years
I am starting two dates in my example. The first is 6/20/02 and the
second is 1/15/2006. I need to calculate in separate columns for years
2001 through 2006 the number of day in this year that are between
these two dates. For example, in 2001, the answer is -, in 2002, the
answer is 194, and in years 2003 through 2005, the answer is 365, and
finally in 2006, the answer is 15 days.
The formula below almost works, but 2001 it came up with a negative
365)),IF(DATE(O1,12,31)<$J$2,MIN((DATE(O1,12,31)-$K$2),365),G2...SOP transactions not posted/posted??? #3
I have a weird sort of Error in the SOP module of Great Plains version
The smart list shows an Invoice as unposted, but when go do to the
Sales Transaction entry screen and enter the invoice number, a pop up
displays a message that the inovoice number is posted???
i have tried to run check links, but it shows no errors... so how can
this be resolved...
thanks in advance
...Compare this year/qtr/mo to date with prior year/qtr/mo to date
I'm trying to create a report that compares revenues received this
year/qtr/mo/wk with revenues received last year in the comparable
year/qtr/mo/wk, and additionally by sales division and sales manager.
I have the data stored in a table with fields: SlsDivID, SlsMgrID, DtRecd
and AmtRecd. I know I will need to use the date part function, but am not
sure how to get the info in the report I need.
format should be:
SlsDiv - SlsMgr - CY YTD - LY YTD - G/L and % - CY QTD - LY QTD - G/L and %
I have tried pivot tables (not working) and various group and total
functions (a...remove drop/create index from the Year End Close
We just completed some testing of the Dynamics GP Year End Close (YEC)
process. We initiated the tests because a customer told us that the YEC was
taking days and believed that it was due to a trigger in our application.
After extensive testing, we determined that the triggers were causing extreme
performance problems because the YEC process, if you run it as 'sa' or
'DYNSA' would drop the indexes on the GL20000 and GL30000 tables. If you
then had any triggers on these tables, or triggers that executed select
statements on these tables, the trigger would initiate a ta...Posting interest
Upon entering a Cert of Deposit for the first time, and telling the program
the maturity date, the interest rate, and whether to reinvest the interest on
a monthly basis, should I also post the monthly statement amounts during the
life of the CD? OR, will the program count that as a duplicate amount once
the CD has matured and I renew/redeem and the program figures out the new
renew amount? I'd like to keep track of the interest for tax purposes.
Thanks for your help.
You should still post your statement amounts. You said you told the
program "wheth...Problem with Dialogs #2
I am developing a dialog based application in MFC using visual studio
I have a Property sheet in my dialog and one pane it contains a tree
control. I am creating some dialogs again on double click event on tree
Now the problem starts. When these dialogs are around, and I click on
main dialog (Original one), it remains covered with the other dialogs.
I want to make this dialog on the top of other dialogs.
I have tried SetForeground on this but it was not usefull.
any help in this regard will be thankfull
> Hello All;
> I am...Thoughts on upgrading every two years
The early comments on Money 2006 indicate that there is not much
improvement over Money 2005. This makes me wonder whether I should even
bother with Money 2006 (I already have Money 2005).
My main concern with this type of product is stability. Judging from
remarks in this froup, the upgrade process from 2004 to 2005 was especially
nasty. Data was lost, and tears were shed. This suggests that frequent
upgrades should be avoided: the upgrade process itself is unpleasant.
On the other hand, I'm concerned that the upgrade from Money 2005 (all
the way) to Money 2007 might be more defective ...Time Calculations #2
I'm creating a spreadsheet to keep track of the hours I work and to
calculate the pay.
'Here's roughly how it'll look.'
How would I go about calculating the "normal", "evening" and "premium"
hours, where normal, evening and premium are 0600-1800, 1800-0000,
craigj's Profile: http://www.excelforum.com/member.php?action=getinfo&userid=27355
View this thread: http://...http://1stmeds.2affiliate.com/af.cgi?aid=197&ent=2 | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347400101.39/warc/CC-MAIN-20200528201823-20200528231823-00510.warc.gz | CC-MAIN-2020-24 | 11,920 | 196 |
http://www.antievolution.org/cgi-bin/ikonboard/ikonboard.cgi?act=SP&f=14&t=5735&p=143620 | code | Joined: Oct. 2006
Turns out Bejan has already responded to questions about ID, at a blog called Bay of Fundie.
His last comment there provides a link to a recent paper of his. From that paper:
|To preempt any confusion, this paper is not headed toward a creationist argument and here we declare explicitly that taking any excerpt from this paper and presenting it as if we are arguing for a spiritual source for “designedness” will be an intentional act of|
Invoking intelligent design in science is like invoking gremlins in engineering. [after Mark Isaak.]
All models are wrong, some models are useful. - George E. P. Box | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945143.71/warc/CC-MAIN-20180421110245-20180421130245-00439.warc.gz | CC-MAIN-2018-17 | 627 | 6 |
https://inculture.microsoft.com/arts/transformation-mask/ | code | How can technology change the way we experience art? More specifically, how can it take traditional art forms—like indigenous carvings—and evolve them into something new?
Heiltsuk artist Shawn Hunt explored these questions in his work Transformation Mask, which takes the concept of a traditional raven totem carving and reimagines it as a cyborg. Working within The Garage at Microsoft Vancouver, he collaborated with a team of artists, designers, and engineers to create the interactive installation. The work incorporates Microsoft HoloLens, electronics, mechanical engineering, and 3D printing.
When viewers put on the mask, in the form of a giant raven’s head, it physically transforms before immersing them in a holographic display of Hunt’s art.
Art comes in many forms, can easily transcend cultures and utilize technology to become something new. Life is all about these infinite possibilities and combinations.Andy Klein, a HoloLens Mixed Reality Designer who worked on Transformation Mask
The team’s hope is to challenge the way we think about the term “indigenous” and push people to view traditional art forms as still constantly evolving, particularly through technology. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662558015.52/warc/CC-MAIN-20220523101705-20220523131705-00219.warc.gz | CC-MAIN-2022-21 | 1,199 | 5 |
https://aplwiki.com/index.php?title=User:Ad%C3%A1m_Brudzewsky&action=view | code | Adám Gall Brudzewsky is a lifelong APL programmer and the creator of Extended Dyalog APL and APLcart. An employee of Dyalog Ltd., Brudzewsky has made several contributions to the Dyalog APL language in addition to his work on components of the interpreter written in APL such as user commands.
Brudzewsky was taught APL by his father, and preferred it to mathematical notation as a student. He was hired by Dyalog Ltd. in May 2015, and worked closely with Dan Baronet. Brudzewsky quickly had an impact on the langauge, suggesting the Nest (
⊆), or Enclose if Simple, primitive and later working to design Dyalog's array notation.
Since creating it in 2018, Brudzewsky maintains Extended Dyalog APL, a cover over Dyalog APL which uses APL models to extend existing primitives and implement new ones. The extensions include both functionality taken from other APLs and new functionality, and are sometimes adopted by Dyalog or dzaima/APL. The Constant operator appeared first in Extended Dyalog, as did the versions of Atop (
⍤) and Over (
⍥) later implemented by Dyalog (Brudzewsky's changes relative to Sharp APL were to exchange the glyphs, and remove the concept of close composition). dzaima/APL has adopted Extended Dyalog's Pair (
⍮), Select (
⊇), and Reverse Compose (
Brudzewsky is active on the APL Orchard as well as Stack Exchange's Code golf site. Because of his participation in these sites he was involved in Dyalog's hiring of interns Marinus Oosters, Will Robertson, and Rodrigo Girão Serrão, as well as employee Nathan Rogers.
Dyalog user meetings
- Dyalog '15 D05: User Commands Update (with Dan Baronet)
- Dyalog '15 D10: MiServer UI Controls (slides) (with Dan Baronet)
- Dyalog '16 D04: Tools Group Update (with Brian Becker and Dan Baronet)
- Dyalog '17 D11: Literal Notation for Arrays and Namespaces (slides)
- Dyalog '17 D12: Try APL Online (slides) (with Brian Becker)
- Dyalog '17 D16: User Command Developments (slides) (with Michael Baas)
- Dyalog '18 D04: Array Notation Mk III (slides)
- Dyalog '18 D12: Jupyter Notebooks (slides)
- Dyalog '19 D05: Link (materials (zip file)) (with Morten Kromberg)
- Dyalog '19 U14: APLcart: A Novel Approach to Finding Your Way in APL (slides (zip file))
- APL CodeGolf Autumn Tournament
- Namespace-Directory Synchronisation (with Morten Kromberg )
- Total Array Ordering (with Jay Foad)
- Creating and managing your own User Commands
- Jupyter Notebook support for Dyalog APL
- Progressive set functions
- Meet the new APL Wiki (BAA Webinar)
- Language Features of Dyalog version 18.0 in Depth - Part 1
- Language Features of Dyalog version 18.0 in Depth - Part 2
- aplcart.info turns 1 (BAA Webinar)
- Language Features of Dyalog version 18.0 in Depth - Part 3
- Language Features of Dyalog version 18.0 in Depth - Part 4
- Language Features of Dyalog version 18.0 in Depth - Part 5
- Dyalog Ltd. "May we introduce Adám Brudzewsky – the newest member of the Dyalog Tools Group"
- Brudzewsky, Adam. Tribute in Daniel Baronet 1956 – 2016.
- Scholes, John. n_eis from the dfns workspace.
- Dyalog Ltd. "Winning the APL Programming Contest – Bioinformatics Category"
- Dyalog Ltd. "Welcome Nathan Rogers"
|APL community |
|Activities||Dyalog user meetings ∙ Dyalog webinars ∙ APL Problem Solving Competition ∙ Conferences ∙ Iverson Award ∙ Code golf ∙ APL Cultivation ∙ Sharing code|
|User groups||APL Borealis (Canada) ∙ APL et J (France) ∙ APL-Germany ∙ BAA (UK) ∙ FinnAPL (Finland) ∙ JAPLA (Japan) ∙ SAUG (Switzerland) ∙ SIGAPL (USA) ∙ SwedAPL (Sweden)|
|People||Phil Abrams ∙ Bob Bernecky ∙ Larry Breed ∙ Charles Brenner ∙ Jim Brown ∙ Adám Brudzewsky ∙ Gitte Christensen ∙ Philip Van Cleave ∙ Peter Donnelly ∙ Dan Dyer ∙ Adin Falkoff ∙ Garth Foster ∙ Roger Hui ∙ Ken Iverson ∙ Morten Kromberg ∙ Marshall Lochbaum ∙ Eugene McDonnell ∙ John McPherson ∙ Jon McGrew ∙ Donald McIntyre ∙ Roger Moore ∙ Alex Morrow ∙ Alan Perlis ∙ Al Rose ∙ William Rutiser ∙ John Scholes ∙ Ian Sharp ∙ Lynne Shaw ∙ Bob Smith ∙ Geoff Streeter ∙ Roy Sykes ∙ Raymond Tisserand ∙ Arthur Whitney ∙ Clark Wiedmann|
|Other||APL Orchard ∙ Subreddits ∙ APL Wiki ∙ Blogs ∙ Forums ∙ Books ∙ Papers ∙ APL Quote Quad| | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107894175.55/warc/CC-MAIN-20201027111346-20201027141346-00439.warc.gz | CC-MAIN-2020-45 | 4,281 | 43 |
https://social.msdn.microsoft.com/Forums/azure/id-ID/e29ec9b5-b9df-4929-917c-f445afdb229c/windows-azure-support-understanding-your-windows-azure-platform-bill?forum=windowsazurepurchasing | code | The Windows Azure Platform requires you procure an account to track your usage and billing. Your account can have multiple subscriptions billed either on a pay-as-you-go
basis or a flat monthly fee with a contract. For detailed information about Windows Azure Platform consumption and usage offers, see the
Windows Azure Platform Pricing Overviewpage.
Viewing Your Bill for the Windows Azure Platform
Microsoft Online Services Customer Portal(MOCP) you can view past and current bills for your Windows Azure services attached to your account. You can view billing statements on your account from the past six months up
to your estimated current bill by signing into the MOCP with your Windows Live ID and clicking on
ActionsàViewMyBills on the MOCP home page.
Understanding the Charges on Your Bill
In your Windows Azure Platform bill, the Current Charges section of the bill contains links to details about your monthly charges. You can get detailed information
about your accounts charges by clicking on one of the following links:
·Recurring Charges– These are the flat monthly charges for your base units billed in advance for your next month's service. If your subscription does not include base units, you will not have any recurring charges and this section will not appear.
·UsageCharges – Monthly usage charges are for the past month's usage that surpasses the base units included with your offer. For subscriptions that have base units included in the offer, this is also known as overage.
– A detailed list of each Windows Azure resource consumed for each date in the selected billing period. This list can be filtered by name, date, region, and type of Windows Azure resource.
Analyzing Your Daily Usage Data
Depending on your usage, there can be thousands of rows of daily usage data. If you want to analyze this data more easily, you can export the data to a comma-separated values
file (CSV) viewable in Microsoft Office Exceland other programs.
Printing an Invoice
If you are viewing your Windows Azure Platform bill and need a printable version of your invoice, click on the Printable Invoices option on the page. This option
creates a single invoice file in a printable Adobe PDF format.
This is very great. Helpful for newbie like me. Thanks Microsoft!TechNet Software Assurance Managed Newsgroup MCTS: Windows Vista | Exchange Server 2007 MCITP: Enterprise Support Technician | Server & Enterprise Admin | System Architect | s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661910.62/warc/CC-MAIN-20160924173741-00209-ip-10-143-35-109.ec2.internal.warc.gz | CC-MAIN-2016-40 | 2,451 | 20 |
https://careers.jobscore.com/careers/softvision/jobs/nosql-database-engineer-architect-aT1h9UKm4r64aZaKkIfptd | code | NoSQL Database Engineer/Architect
Big Data & Analytics Guild | Toronto, ON, Canada | Full Time
WE ARE A TRANSFORMATIONAL PARTNER
We marry design and engineering language in ways that produce impactful and memorable experience journeys. We partner all the way to continuously improve our clients’ digital maturity. Our Studio network brings the optimal combination of skill, scale, and cost for each stage of the product development lifecycle. And to do this we need great transformational people that want to impact the projects and organizations that they work with.
We are looking for an exceptional Database Engineer (NoSQL) to join our team. This role will be focused on making sure our work meets the highest level of quality. You will work closely with a talented team and are not afraid to iterate with strategy and constructive criticism. You are design-aware, follow latest trends and advice from Google I/O and often improve upon solutions posted on StackOverflow. Here is a bit more about how this position impacts our organization and the experience/skills to do it:
What We Do
As a services company we get to work a wide range of projects from low level IoT projects and blockchain to apps, websites and backend services for household names (Reddit, Lululemon, Starbucks, just to name a few).
Work with team members all across the world and closely collaborate to ensure the things we work on are successful.
Create amazing user experiences for our clients and for ourselves.
What We Provide
Open culture, opportunity to work on exciting technology and learn new things.
Extended health benefits, personal development budget and flexible work schedule.
What We Expect of You
- 5+ years of database/admin experience
- At least 1-2 years of Couchbase (or relevant database) DBA hands on including EKS
- Communication skills
- Self-starter and team player with a “can do” attitude
- Understanding and ability to support critical operational systems
Manage primary and replica databases across multiple data centers and in AWS cloud
Day-to-day DBA tasks: installation, removing nods, upgrade, adding users, pass mgmt., backup and recovery
Cooperate with application architects and consultants on architecture of NoSQL DB clusters (Couchbase experience preferred, however relevant experience with similar NoSQL DBs will be considered)
Define architecture of NoSQL cluster to handle forecasted volume of data and transaction throughput
Analyze and troubleshoot DB throughput and performance issues in production and test environments
Document policies, procedures, and technical standards related to disaster recovery planning and execution
Work with engineering and operations teams to define multi-data center replication strategy
Essential Database Administration - install, configure, upgrade, back up, and monitor databases
Serve as point-of-contact for any defined database questions regarding performance, security, or ongoing maintenance
Automate and script DBA tasks
Work with application developers and systems engineers to troubleshoot and optimize queries, and performance bottlenecks for current and future implementations
We are a thriving Community of top technology talent that is globally connected. We Engage, Make, Run and Evolve the technology that makes many brands that you know and love. So let’s take this journey together. No matter where you are on your digital career roadmap, we can help you grow and have fun doing it.
Cognizant Softvision is an Equal Opportunity Employer. No 3rd Party Agency Candidates.
You must be legally authorized to work in Canada without the need for employer sponsorship, now or at any time in the future. | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038879305.68/warc/CC-MAIN-20210419080654-20210419110654-00215.warc.gz | CC-MAIN-2021-17 | 3,675 | 32 |
https://www.crypto.com.au/how-cryptocurrency-wallets-work/ | code | You can’t own cryptocurrency without a cryptocurrency wallet. A crypto wallet is a software program that works with a blockchain to select and track the addresses where your cryptocurrency resides. It makes your cryptocurrency assets accessible only to you. Wallets perform the complex calculations needed to coordinate with the blockchain when you send and receive cryptocurrency, so you don’t have to understand the underlying formulas and mathematics. Wallets come in several forms, depending on how much security you need for your crypto assets. You must take extra precautions to protect your wallet so you don’t lose your cryptocurrency forever.
Your wallet doesn’t store your cryptocurrency. It stores the address where your crypto resides on the blockchain, and the key to access it. Because each blockchain might have different rules that define the format of a valid address, a wallet must be designed to support the cryptocurrency you own. Some wallets only support a single cryptocurrency, such as a wallet created for the release of a new altcoin. Other wallets support a variety of blockchains. With thousands of altcoins available, it’s not unusual to use more than one wallet to keep track of all your cryptocurrency assets.
Each blockchain defines the format and range of its valid addresses and assigns the initial address of every new altcoin it creates. However, once a coin is circulated and has an owner other than the blockchain, the owner’s wallet is responsible for selecting, tracking and storing its address.
A wallet essentially selects a random address from a blockchain’s valid range by creating a new public/private key pair and performing a series of complex calculations to cloak the public key and put it in the correct format according to the blockchain’s rules. A blockchain’s range of valid addresses is so large that it’s more likely for the Earth to be destroyed in the next five minutes than it is for two wallets to randomly select the same address. The address the wallet creates is the address that the sender uses to transfer cryptocurrency, and the address that’s publicly recorded on the blockchain. The private key is required to unlock the cryptocurrency at that address. For maximum privacy, it’s common to use a different address for each cryptocurrency transaction.
In addition to performing the required calculations to receive cryptocurrency, a wallet stores the address and key for the cryptocurrency assets by transaction. In a non-deterministic wallet, each new address and key is random. The wallet has no ability to recreate a former key. Backing up the wallet is essential, since a lost wallet means lost cryptocurrency. A deterministic wallet uses the wallet’s seed phrase or password to create the private key. It uses the private key to create each of the subsequent transaction keys. If the wallet is damaged or destroyed without a backup, a deterministic wallet can recreate the former keys from the seed phrase or password.
You can’t choose your own password to secure your crypto wallet. When you initialise a new wallet, the wallet tells you what the password is, and you can’t change it. The password is typically a 64-character string consisting of the digits zero through nine and the letters A through F, such as:
Technically speaking, it is a hexadecimal number and the private key of a public/private key pair. Since anyone who can log in to your wallet can transfer, spend or steal all the cryptocurrency the wallet tracks, keeping your password a secret is critical. Just as important, however, is that you don’t lose your password. There might not be a way to recover a lost password, and you lose access to your crypto assets until you find it. Some people write down the password and place it in a bank safe deposit box for safekeeping.
The Wall Street Journal estimates that 20 percent of all bitcoins – more than $25 billion – won’t ever be spent because the owners lost the keys to their wallets.
Some wallets provide a “seed phrase” as an easier way to remember your password. A seed phrase typically consists of 12 words in a specific order that the computer selects at random from 2048 possible choices. For example, a seed phrase might be:
version frost mule uphold describe dune sheriff rose ride menu carbon exact
Mathematically, the seed phrase provides about the same level of security as a 64-character password and is easier to remember than:
Behind the scenes, the wallet converts the seed phrase to a number and uses that number to create your private key or password.
If you’re provided with a seed phrase, write it down immediately and keep it safe. You are usually only given the seed phrase once.
Types of Wallets
There are several types of free and paid wallets available. Most cryptocurrency exchange websites provide a free software wallet. The Coinbase wallet is popular as a wallet hosted in the cloud by Coinbase and as a wallet you install on your computer. The Binance wallet is a popular choice for those who want to store a wallet on a mobile device.
All software wallets have some risk of being hacked, because they are connected to the Internet. There’s an additional risk for each type of software wallet. For example, it’s harder to protect the physical security of a mobile device, which increases the risk of theft for mobile wallets. The assets stored in a hosted wallet might be stolen if someone hacks the exchange that hosts the wallet, although some exchanges provide limited insurance if this happens. If a user downloads an installed wallet from a phishing website, this version of the wallet will be modified with malware designed to steal the addresses and keys of the cryptocurrency stored in it. Verifying the domain of a wallet download site is therefore critically important.
If your cryptocurrency assets are substantial, it’s worth spending a few hundred dollars to purchase a hardware wallet, also called a cold-storage wallet.
These are software wallets bundled on a hardware device that resembles a USB flash drive. When the wallet is not inserted into a computer, it is offline and in cold storage. When it’s in cold storage, nobody can steal the cryptocurrency assets because nobody can access the addresses or keys. To make a transaction, you insert the wallet into a computer and execute the transaction. Then you eject the wallet and it goes back into cold storage. The only time that you risk having your wallet hacked is the short time it’s inserted in the computer. While this significantly limits the ability for someone to hack your wallet, it increases the risk of losing your cryptocurrency forever.
If the hardware device fails or is destroyed and you don’t have a backup, it’s the same as losing the password to your wallet.
Security Best Practices
Your wallet protects your cryptocurrency, but you must protect your wallet. In addition to the password or passphrase, many wallets add an optional layer of protection that requires something you know (a password or pin) and something you have (a fingerprint or cell phone), called two-factor authentication. Turn on this option if it’s available.
You should also back up your wallet regularly in case something happens to it or the data in it. Never share your password or passphrase with anyone, but make it accessible to someone you trust in case you die unexpectedly. Take standard safety precautions online to guard against phishing and malware specifically designed to harvest cryptocurrency addresses and private keys. Understanding what a wallet does and the information it stores should enable you to provide better security for it and your cryptocurrency assets. | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104209449.64/warc/CC-MAIN-20220703013155-20220703043155-00021.warc.gz | CC-MAIN-2022-27 | 7,726 | 22 |
http://nugetstatus.com/packages/AddControllerToAPI/1.0 | code | - This package will add healthcheck controller to your project.
- View on NuGet: http://www.nuget.org/packages/AddControllerToAPI
Here are the packages that version 1.0 of AddControllerToAPI depends on.SampleDependency : (1.0.0)
Installing with NuGet
PM> Install-Package AddControllerToAPI
Packages that Depend on AddControllerToAPI
No packages were found that depend on version 1.0. | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583658662.31/warc/CC-MAIN-20190117000104-20190117022104-00380.warc.gz | CC-MAIN-2019-04 | 383 | 7 |
https://www.rimfirecentral.com/threads/does-this-look-right.444188/?u=3584 | code | Definitely a classic cracked frame. The ejector also doesn't look right to me. Either it is a highly modified factory original or a home-built replacement. Both of these factors (cracked frame, non-original ejector) indicate heavy usage and are detrimental to collector value. I think his starting price would be about $1,000 too high for the same heavily used gun without the cracked frame. I'll wager that there won't be any valid bidders on the gun. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00582.warc.gz | CC-MAIN-2023-14 | 452 | 1 |
https://www.bridge-global.com/blog/the-future-of-full-stack-development/ | code | The Future of Full Stack Development: Everything You Should Know!
The future of full stack development is marked by its adaptability and continued relevance in a rapidly evolving technological landscape. Full stack developers, known for their proficiency in both front-end development and back-end development, are poised to play a vital role in the software development ecosystem.
In our fast-paced digital era, full stack development stands as a transformative force, reshaping the landscape of web application creation. According to data from the Bureau of Labor Statistics, the role of web developers is anticipated to experience a 13% increase from 2018 to 2028, surpassing the average occupational growth rate.
Full stack developers, with their capacity to proficiently manage both frontend and backend development, are evolving into tech industry heroes. Yet, what lies ahead for this dynamic field? Let’s dive in and see.
A Quick Look at Full Stack Development
Full-stack development is a holistic approach to web development that encompasses the entire spectrum of building web applications. Its all-encompassing approach leverages a variety of technologies and frameworks to craft complete web applications.
It covers front-end development for the user interface, back-end development for server-side logic, database management, and the seamless integration of various technologies and frameworks.
It offers much-needed versatility in development. Full stack developers possess the adaptability to handle all aspects of the development process, making them valuable assets in the tech industry. They are proficient in both the client-side and server-side of applications, allowing them to create end-to-end solutions efficiently. This approach is gaining popularity due to its efficiency and the ability to develop entire web applications from concept to deployment.
Top 5 Reasons Why Full Stack Development Presents Limitless Opportunities
1. The advantage of comprehensive skill sets
While full stack development encompasses both front-end and back-end skills, some developers may choose to specialize in one area, such as DevOps, cloud computing, or artificial intelligence.
Below is a skillset overview of full stack developers that give an edge over other specialists.
-HTML/CSS: Proficiency in creating and styling web pages using HTML and CSS.
-Responsive Design: Ability to create responsive and mobile-friendly web layouts.
-UI/UX Design: A grasp of user interface and user experience design principles.
-Server-Side Languages: Proficiency in one or more server-side programming languages (Node.js, Python, Ruby, Java, or PHP)
-Web Frameworks: Familiarity with back-end web frameworks like Express (Node.js), Ruby on Rails, Django (Python), or Spring (Java).
-API Development expertise
-Authentication and Authorization
Besides these, an experienced and efficient full stack developer will have proficiency in using version control systems like Git for collaborative development. He/she will have familiarity with DevOps tools like Docker, Kubernetes, and continuous integration/continuous deployment (CI/CD) pipelines. Knowledge of cloud platforms like AWS, Azure, or Google Cloud for deployment is an advantage. A full stack developer will also have an understanding of both relational databases (e.g., MySQL, PostgreSQL) and NoSQL databases (e.g., MongoDB, Redis).
Other skills can be summarized as familiarity with testing frameworks and methodologies, such as unit testing and end-to-end testing; proficiency in coding and scripting languages to automate tasks or build utilities; strong problem-solving skills to troubleshoot and debug issues; understanding of agile software development methodologies; and effective communication and collaboration skills when working in a team.
It's important to note that the specific skill set may vary depending on the technologies and tools used in a particular organization or project.
Full-stack developers often need to adapt and learn new technologies as the industry evolves. Becoming a full-stack developer grants a holistic grasp of the entire project workflow.
2. Cross-platform development companion
The goal of cross-platform development is to minimize the need for writing separate codebases for each platform, thus saving time and effort. Common tools and frameworks used in cross-platform development include React Native, Flutter, Xamarin, and Progressive Web Apps (PWAs).
Full-stack development plays a pivotal role in cross-platform development by bridging the gap between front-end and back-end development across various platforms. Their versatility and comprehensive understanding of the entire software development process make them valuable assets in this context.
In cross-platform development, full-stack developers are responsible for not only ensuring the seamless functionality of applications but also for optimizing user experiences across different platforms, including web, iOS, and Android.
Full stack development experts are instrumental in adapting and harmonizing codebases to work cohesively on diverse operating systems, reducing development time, and enhancing the overall efficiency and user-friendliness of applications.
3. Low dependency
Full-stack developers possess a well-rounded skill set, which means they can independently handle both front-end and back-end tasks, reducing the need for additional team members or external contractors.
This autonomy leads to greater agility in project development, as full-stack developers can swiftly adapt to changing requirements and address issues across the entire development stack. This self-reliance not only streamlines the development process but also minimizes bottlenecks, making it a cost-effective and efficient approach for projects of various scales, particularly for startups and smaller teams with limited resources.
4. Congenial to evolving architectures
Full stack developers play a vital role in adapting to evolving architectures in the dynamic landscape of software development. With the ongoing shift towards microservices, cloud computing, and serverless architectures, their comprehensive skill set, spanning both front-end and back-end domains, positions them as key players in this transformation.
These developers are well-equipped to understand and navigate the intricacies of containerization technologies like Docker and orchestration tools such as Kubernetes, which are essential in managing modern distributed systems efficiently. Their ability to bridge the gap between different architectural components allows them to ensure seamless integration, optimal performance, scalability, and reliability, aligning applications with the demands of the ever-evolving technological environment. Full stack developers will be adept at steering through these dynamic architectural shifts, guaranteeing applications are finely optimized for peak performance, scalability, and unwavering reliability.
5. Enablement of AI implementation
Full stack developers’ unique skill set, encompassing both front-end and back-end development, enables them to be at the forefront of bridging the gap between the development of AI algorithms and their practical implementation in real-world applications.
Experts in full stack development can facilitate the infusion of artificial intelligence (AI) into various sectors, from healthcare to finance, by developing the necessary software and infrastructure. They are well-versed in creating user interfaces and integrating AI-driven functionalities seamlessly, ensuring that the end-users, often non-technical professionals, can easily harness the power of AI without any friction.
Moreover, full stack developers are instrumental in optimizing the performance of AI-powered systems. They can fine-tune the front-end to provide a smooth and intuitive user experience, while simultaneously managing the back-end processes, which often involve heavy computational tasks. This comprehensive understanding allows them to address bottlenecks and ensure that AI-driven applications are efficient and responsive.
As the integration of AI becomes a competitive advantage for businesses, full stack developers will not only be responsible for implementing AI capabilities but also for maintaining and improving them. The ability to oversee the entire development stack is invaluable when it comes to upgrading AI algorithms, ensuring data security and privacy, and adapting to evolving AI technologies. In essence, full stack developers will be key drivers in the AI revolution, creating applications that harness the transformative power of artificial intelligence across various industries.
Why Should You Include Full-Stack Developers in Your Team?
In the realm of software development, a full-stack developer is a versatile expert who specializes in multiple domains. This multi-faceted skill set holds immense value for organizations and ensures a promising future for these developers. The paramount advantages of having a full-stack developer in your team are as follows:
Streamlined Expertise: Instead of assembling a team of specialized professionals, organizations can opt for a more efficient approach by hiring a single full-stack developer. These professionals possess a well-rounded understanding of all aspects of software development.
Enhanced Productivity: The inclusion of full-stack developers can significantly elevate the productivity of an organization. Their broad skill set and knowledge reduce the turnaround time for various tasks, thereby improving the overall team's efficiency.
Comprehensive Issue Resolution: Full-stack developers are equipped to tackle a wide array of software development challenges. Their in-depth comprehension of various software creation layers enables them to enhance efficiency while minimizing time and resource wastage.
By having a full-stack developer as part of your team, you ensure that your organization operates efficiently, remains adaptable to diverse software development needs, and maximizes its overall productivity.
Looking Ahead: The Future of Full Stack Development
Over the next decade, the full-stack development industry is poised for substantial growth. As the demand for web and mobile applications continues to rise, full-stack developers will remain in high demand, bridging the gap between different development layers to deliver comprehensive, efficient, and user-centric digital solutions. Staying updated with the latest trends and tools is crucial for those looking to excel in this dynamic field.
The future of full-stack development is marked by continual evolution and the need for versatile developers who can navigate both front-end and back-end technologies. Are you looking to augment your team with talented full stack developers? You can hire them from here. If you have any queries regarding making the strategic decision of choosing full stack development for your project, feel free to discuss them with us. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100555.27/warc/CC-MAIN-20231205172745-20231205202745-00710.warc.gz | CC-MAIN-2023-50 | 10,998 | 48 |
https://gitlab.isc.org/isc-projects/kea/-/issues/2713 | code | Extend BLQ to return delegated prefixes for remote-id and relay-id
Bulk Lease Query by remote-id, link, and relay-id currently only return addresses, not prefixes. We need to extend it to also return prefixes.
EDIT: There are two cases here:
- return PD when query by remote-id or relay-id (
- return PD that contains an address when querying for an address (
The former is in scope, but the latter is not. The latter is not implemented even for basic LQ. It's a missing functionality, yes, but nobody complained about this shortcoming so far.
Decided to ignore the link address vs prefix possible issue i.e. do the same if the link address is :: or is not. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473558.16/warc/CC-MAIN-20240221202132-20240221232132-00416.warc.gz | CC-MAIN-2024-10 | 657 | 7 |
http://blog.rishab.in/wikipedia-workshop/ | code | At gCon (technical fest organized by BVP GTUG, 14th March 2012), we had the privilege to host a Wikipedia Workshop at our campus. Representing the Wikimedia Foundation were Hisham Mundol, Nitika Tandon, and Piyush Aggarwal. Amazing people! The first part of the workshop covered the basics of Wikipedia, how the community works, how articles are to be written, the five pillars of Wikipedia, and what we gain by contributing to the 5th largest website in the world. The articles that we had a look at (to understand how we can modify and add content, and how to write content suitable for an encyclopedia) ranged from rather amusing ones to extremely sensitive articles. Some things that I found interesting (and which I can recollect):
- It is critical to maintain an unbiased and neutral point of view, and not just while writing articles. As an individual (or group), I have no rights to make any inferences which apply to everyone. State the facts.
- There are 50 people in the world who are active contributors to Wikipedia who write articles in Hindi. It is a bit disturbing to find such a small number of contributors to India's official language.
- Notability is very important. Is the content/article relevant to people outside a small group?
The second part of the workshop was a live editing session. We picked the most unusual article. Chole Bhature. And everyone in the room took turns to make edits to the article. Simply editing an article on a simple topic like Chole Bhature was enough to show how editing Wikipedia is more effort than meets the eye. People reading the Chole Bhature article in the future will probably never know how much applause was involved to make it a bit better for the rest of the world. ;) | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146176.73/warc/CC-MAIN-20200225233214-20200226023214-00222.warc.gz | CC-MAIN-2020-10 | 1,732 | 5 |
https://viecbonus.com/viec-lam/NH%C3%A2N%20VI%C3%AAN%20PH%C3%A1T%20TRI%E1%BB%83N%20JAVA | code | Các việc làm NHâN VIêN PHáT TRIểN JAVA đang tuyển dụng
Tham khảo tư vấn
Đến $500Công ty:
ViecBonus ClientThành Phố làm việc:
1. Allowance (insurance or cash compensation): Allowance for lunch, Japanese, Fee for taking Japanese and English (like TOEIC) test, Overwork. 2. Bonus: Tet bonus (13th month salary). 3. Events: There are so many events for the purpose of making the atmosphere among friendly employees. There are company trips to overseas countries including Japan. Party 1 time / month on average (birthday party and recreation). 4. Salary review: 2 times / year
We support development part. Our target customer is small business companies.
Nhận tư vấn công việc khác
Email Me Jobs | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948569405.78/warc/CC-MAIN-20171215114446-20171215140446-00316.warc.gz | CC-MAIN-2017-51 | 729 | 8 |
http://www.brokencontrollers.com/faq/36006718.shtml | code | Using FFMPEG to stream my WebCam's video to YouTube
I've been trying to use ffmpeg to stream my webcam's video to YouTube and so far all I've managed was an "acknowledgement" from YouTube saying 'Starting' in green. However it quickly goes gray and the actual stream never actually changes from offline.
I'm using this command to try to stream it:
ffmpeg -rtbufsize 1500M -r 25 -f dshow -s 1280x720 -i video="USB2.0 HD UVC WebCam" -vcodec h264 -b:a 600k -acodec libfaac -ab 128k -f flv "rtmp://a.rtmp.youtube.com/live2/user.useruser.codecodecode"
I've managed to stream videos to YouTube with ffmpeg, its just the camera that won't work. Any idea what I might be doing wrong?
This is the command I'm using now ffmpeg -r 18 -f dshow -s 1280x720 -i video="USB2.0 HD UVC WebCam":audio="Microphone (Realtek High Definition Audio)" -vcodec h264 -b:v 1800k -acodec aac -strict experimental -f flv "rtmp://a.rtmp.youtube.com/live2/useruser.useruser.codecodecodecode"
I'm now using -acodec aac instead of libfaac or libfdk_aac since I was getting "Unknown encoder" errors
It is streaming a few seconds however, now I'm getting these errors: WriteN, RTMP send error 10053
Any idea what these mean, or how to fix them?
There are a few things wrong with your command:
You don't have an audio stream. When using dshow you also need to specify audio as explained here.
ffmpeg -f dshow -i video="Integrated Camera":audio="Microphone name here"
If you don't intend to capture audio then put a silent audio track.
-b:a is the same thing as -ab - the audio bitrate. You must use -b:v to specify the video bitrate. 600k is too low for a 1280x720px @ 25fps H.264 video stream.
Video Bitrate Range: 1,500 - 4,000 Kbps
You should put at least 1800k.
Concerning the audio you're using libfaac. For the best results when encoding AAC it's recommended to use libfdk_aac
Live streaming an IP Camera to Youtube using FFmpeg. - For Ubuntu users (what I did)
Install latest ffmpeg on ubuntu 12.04 or 14.04 https://gist.github.com/xdamman/e4f713c8cd1a389a5917 and
Compile FFmpeg on Ubuntu https://gist.github.com/faleev/3435377
Open Youtube. Login. Click on My Channel > Video Manager > LIVE STREAMING . Note “Stream name/key” .
For static video file:
ffmpeg -re -i "(input-file)" -acodec libmp3lame -ar 44100 -b:a 128k -pix_fmt yuv420p -profile:v baseline -s 426x240 -bufsize 2048k -vb 400k -maxrate 800k -deinterlace -vcodec libx264 -preset medium -g 30 -r 30 -f flv "rtmp://a.rtmp.youtube.com/live2/(Stream name/key)"
For streaming video from IP camera with rtsp video only output:
ffmpeg -re -i input-file -rtsp_transport tcp -i "rtsp://password@(streamaddress with local IP)" -acodec libmp3lame -ar 44100 -b:a 128k -pix_fmt yuv420p -profile:v baseline -s 426x240 -bufsize 2048k -vb 400k -maxrate 800k -deinterlace -vcodec libx264 -preset medium -g 30 -r 30 -f flv "rtmp://a.rtmp.youtube.com/live2/(Stream name/key)"
If you have a webcamera with IP address with full HD x264 video source, without audio and you want to stream your direct camera screen to YouTube, you do not need to transcode/reencode video to a lower resolution always. YouTube can accept some camera's direct video stream. The only thing is that you must do it add an extra empty/silent audio track. If you have enough bandwith at your network it should be work.
I am using this CLI command on a Pine64+ with Ubuntu 16.04 and it is working:
ffmpeg -re -rtsp_transport tcp -i "rtsp://<user>:<pass>@<camera_ip>:<port>" / -f lavfi -i anullsrc=channel_layout=stereo:sample_rate=44100 / -c:a libmp3lame -ab 128k -ar 44100 / -c:v copy -threads 2 -bufsize 512k / -f flv "rtmp://a.rtmp.youtube.com/live2/<your-live-stream-key>"
(Here is some info about Libavfilter input virtual device: https://www.ffmpeg.org/ffmpeg-devices.html#lavfi)
With this, you can forward the direct camera screen with silent audio to YouTube with minimal CPU usage.
- When your network is down (for example your ISP refresh the network, change your public IP or your router restarted) the ffmpeg will loose the signal (webcamera and/or YouTube RTSP).
- As I seen sometimes YouTube stop receiving stream and convert last data into video file (archive streamed video) and after than it create new identifier for the live stream. This affects the operation of the ffmpeg (RTSP connection lost) and affects to your webpage where you inserted the YouTube live stream code. (As I found YouTube handle maximum 12 hours videos in one piece only).
In both case ffpmeg could not detect the network or streams issue. So if you would like to stream a neverending stream it is hard to automatize correctly.
- Somehow you need to detect the network errors.
- Somehow you need to detect when YouTube stop listening on RTSP.
- Somehow you need to detect if ffmpeg lost communication with the camera.
- And finally somehow you need to restart ffmpeg when all service is working again.
Temporarily I am using a small cron job at the moment which restarting ffmpeg in every hours. | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027330750.45/warc/CC-MAIN-20190825151521-20190825173521-00518.warc.gz | CC-MAIN-2019-35 | 4,977 | 38 |
https://www.softpile.com/get/windows/business/page/2/ | code | iCash is a software intended to control your personal finance, keeping track of incomes, expenses, credits, debts and Banks transactions for you. As simple as creating the accounts you need and move money between them!
Secure Business Messenger with adminstration tool
Agile Commander is a kanban board for IT project management. Its goal is to be extremely powerful for single programmers (indie developers, freelancers, start-ups) and small teams. Agile Commander is consistent with the software agile principles.
Advanced Diary is digital diary software for anyone who needs to keep regular records. Supporting multiple diaries in one database file, rich text formatting, video recording and much, much more, this software provides the ultimate solution.
XEDI is an EDI system that connects customers with suppliers to process orders, invoices and other transactions. It intelligently connects to your trading partners, guaranteeing 100% compliance with every retailer worldwide. Supports Windows and OSX.
Notepad3 is a fast and light-weight Scintilla-based text editor with syntax highlighting. Notepad3 offers many extra features over Notepad. It has a small memory footprint, but is powerful enough to handle most programming jobs.
Movie File Merger (MFM) helps you with the selective combination / maintenance or cleanup of video collections, like videos, movies, series, or documentaries. It can be used also for other types of collections, like music, or basically any files.
Application for Windows computers to easily manage projects usually made for 3D printing. Export and Import capabilities permit to transport and share your projects with other ProjectRoom users. | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146186.62/warc/CC-MAIN-20200226023658-20200226053658-00028.warc.gz | CC-MAIN-2020-10 | 1,679 | 8 |
https://www.inesctec.pt/en/people/joao-luis-martins | code | I am currently researching on Distributed Ledger Technologies (DLT'S) with the intent to bring disruption to the Supply Chain Management context.
My educational background lies within the Industrial Engineering and Management master's programme from the Faculty of Engineering of the University of Porto (FEUP). Following its completion, I undertook two working experiences both as a consultant and as a business analyst, the first in Portugal and the second in Poland, on a nordic bank.
In these experiences I developed skills on change management, business process management, end-to-end continuous improvement, client facing and project management skills.
More recently, and given the fact that I am strongly interested in cryptocurrencies and DLT's, I have decided to conduct research on this topic, applying not only my background and recent experiences which bring me a greater understanding on supply chain management, but also the strong skillset I posess in software development.
My interests also pass on the artificial intellgence and machine learning subjects and how we can improve decision making through data mining.
Feel free to reach me out at [email protected] in case you want to discuss something in particular with me. | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657154789.95/warc/CC-MAIN-20200715003838-20200715033838-00448.warc.gz | CC-MAIN-2020-29 | 1,239 | 6 |
https://thegamepadgamer.com/2021/05/metroid-prime-4-at-e3-2021-something-special-for-the-metroid-35th-anniversary/ | code | Metroid Prime 4 at E3 2021! Something “Special” for the Metroid 35th Anniversary?
E3 is one month away and it’s time to take a look at games we might see at the show. metroid prime 4 and metroid prime trilogy are games we very well might see! along with a rumored 2d metroid hitting the switch!
Become A Member!!
THINGS I USE DAILY
🛍(Affiliate links)🛍 These help the channel so if you use them thank you so much!
My ARCADE CAB! https://www.qualityarcades.com/
SD card 400gb. https://amzn.to/3bs250G
Skull & Co. grip case bundle (Lite) https://amzn.to/39k6YaX
Satisfye grip bundle https://amzn.to/2wtPKup
Switch lite https://amzn.to/2wDN0ub | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00767.warc.gz | CC-MAIN-2022-40 | 651 | 10 |
https://aaronczichon.de/blog/apple-shortcuts-import-tabs-to-things/ | code | As I mostly work with devices in the Apple ecosystem I also often use the Apple Shortcuts for some things I need to improve or automate. As the possibilities of Shortcuts are pretty high the real world use cases are sometimes limited. There are samples of "Split 2 Apps", "Make a GIF", "Create a meeting note" or many more. But they're mostly not that faster than clicking on "create note" in my notes app.
Today I want to share one of my use cases for Apple Shortcuts which really makes things easier for me.
I handle my life completely by using the Things App from Cultured Code. Doesn't matter if it's ToDos, things I need to remember or storing interesting links. For everything I use this app.
As many users I often have many opened safari tabs on iOS with things I need to remember and/or I find interesting to check back later. But often I also forget about these tabs and always creating new ones but never check back on these links.
And this is where Apple Shortcuts comes to the party. I created a shortcut which simply get's all opened tabs from safari, creating a ToDo in Things for it with a specific
imported tag and closes them on the browser.
With this use case I can simply import safari tabs into my daily driver Things and check back onto them or plan to check them in my weekly "link reading session" on Sundays.
Do you use Apple Shortcuts for some cool use case? Let me know! | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494976.72/warc/CC-MAIN-20230127101040-20230127131040-00426.warc.gz | CC-MAIN-2023-06 | 1,396 | 8 |
https://help.yahoo.com/kb/groups/contact-group-moderators-yahoo-groups-sln2491.html | code | Contact group moderators in Yahoo Groups
Since Yahoo doesn't operate or maintain any Yahoo Groups, you'll want to contact the group's moderators with any questions. We give group owners the tools to create and run their own communities as they choose, governed by the Yahoo Groups requirements within the Yahoo Terms of Service.
To contact a group moderator, send an email to [email protected] (replace "groupname" with the exact name of the group). Keep in mind that moderators aren't required to respond to inquiries. | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141193221.49/warc/CC-MAIN-20201127131802-20201127161802-00302.warc.gz | CC-MAIN-2020-50 | 532 | 3 |
http://richliebermanreport.blogspot.com/2015/01/on-saturday-night-we-defer-to-chairman.html | code | TV, Radio, Internet...dishing dirt since 2001
Great song. That was a song written to be performed, vs just heard on the radio. The phrasing allows a lot of opportunity to do it your way, to used extended pauses between lines, and taper the volume in ways that fit the room. Sinatra knows this. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123318.85/warc/CC-MAIN-20170423031203-00016-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 293 | 2 |
https://trustcenter.elearningforce.com/hc/en-us/articles/360006186438-Business-Continuity | code | Azure operates in multiple geographies around the world. An Azure geography is a defined area of the world that contains at least one Azure Region. An Azure region is an area within a geography, containing one or more datacenters.
To ensure Business continuity and disaster recovery (BCDR) each Azure region is paired with another region within the same geography, together making a regional pair.
Figure 1 – Azure regional pair diagram
|LMS365 Geography||Paired regions|
|Asia Pacific||Japan East||Japan West|
|Australasia||Australia East||Australia Southeast|
|Canada||Canada Central||Canada East|
|Germany||Central Germany||Northeast Germany|
|Europe||North Europe (Ireland)||West Europe (Netherlands)|
|North America||Central US||East US 2|
|UK||UK South||UK West|
|US Government||US Gov Virginia||US Gov Texas|
An example of paired regions
Figure 2 below shows a hypothetical application which uses the regional pair for disaster recovery. The green numbers highlight the cross-region activities of three Azure services (Azure compute, storage, and database) and how they are configured to replicate across regions. The unique benefits of deploying across paired regions are highlighted by the orange numbers.
Figure 2 – Hypothetical Azure regional pair
More Information from: https://docs.microsoft.com/en-us/azure/best-practices-availability-paired-regions | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107878879.33/warc/CC-MAIN-20201022024236-20201022054236-00119.warc.gz | CC-MAIN-2020-45 | 1,367 | 16 |
https://escholarship.org/uc/item/2079d1xm | code | Public-key encryption secure in the presence of randomness failures
- Author(s): Yilek, Scott Christopher
- et al.
Public-key encryption (PKE) is a central tool for protecting the privacy of digital information. To achieve desirable strong notions of security like indistinguishability under chosen-plaintext attack (IND- CPA), it is essential for an encryption algorithm to have access to a source of fresh, uniform random bits. Further, these bits should never be revealed and never reused. In practice, our machines typically generate these random bits with software random number generators (RNGs). Unfortunately, RNGs are prone to problems. The resulting randomness failures can have disastrous consequences for the security of existing PKE schemes that rely on good randomness. In this dissertation we focus PKE security in the presence of three types of randomness failures: predictable randomness, repeated randomness, and revealed randomness. For predictable randomness, where the encryption algorithm is given random inputs that are predictable to an adversary, we argue that we want PKE schemes that are hedged against bad randomness: if the encryption scheme is given good randomness it provably meets traditional notions like IND-CPA, while if it is given poor randomness, it still provably provides some security. We formalize this security notion and give provably-secure constructions of hedged public-key encryption. Next, we show how repeated randomness failures, where the encryption algorithm is given random inputs that it was given previously, can occur in practice due to virtual machine snapshots. In particular, we show how many popular web browsers are vulnerable to these failures. We then turn to building PKE schemes that still provide provable security when given repeated randomness. We develop new models of security to capture this situation and prove that a simple and efficient modification to any existing secure scheme gives security under our new models. Finally, we study the strange effects revealed randomness failures, where the random inputs used for encryption are later revealed to an adversary, can have on public-key encryption security. Specifically, we focus on selective opening attacks. We show that a large class of PKE schemes, called lossy encryption schemes, provably resists selective opening attacks | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363376.49/warc/CC-MAIN-20211207105847-20211207135847-00393.warc.gz | CC-MAIN-2021-49 | 2,356 | 4 |
https://blog.adafruit.com/2011/10/12/dennis-ritchie-c-programming-language-co-development-of-the-unix-operating-system/ | code | Dennis MacAlistair Ritchie (username: dmr, September 9, 1941 — October 9, 2011) was an American computer scientist notable for developing C and for having influence on other programming languages, as well as operating systems such as Multics and Unix. He received the Turing Award in 1983 and the National Medal of Technology 1998 on April 21, 1999. Ritchie was the head of Lucent Technologies System Software Research Department when he retired in 2007.
Ritchie is best known as the creator of the C programming language and a key developer of the Unix operating system, and as co-author of the definitive book on C, The C Programming Language, commonly referred to as K&R (in reference to the authors Kernighan and Ritchie).
Ritchie’s invention of C and his role in the development of Unix alongside Ken Thompson have placed him as an important pioneer of modern computing.
The C language is still widely used today in application and operating system development, and its influence is seen in most modern programming languages. Unix has also been influential, establishing concepts and principles that are now well-established precepts of computing.
Ritchie was elected to the National Academy of Engineering in 1988 for “development of the ‘C’ programming language and for co-development of the UNIX operating system.
“UNIX is basically a simple operating system, but you have to be a genius to understand the simplicity.” – Dennis Ritchie
Stop breadboarding and soldering – start making immediately! Adafruit’s Circuit Playground is jam-packed with LEDs, sensors, buttons, alligator clip pads and more. Build projects with Circuit Playground in a few minutes with the drag-and-drop MakeCode programming site, learn computer science using the CS Discoveries class on code.org, jump into CircuitPython to learn Python and hardware together, TinyGO, or even use the Arduino IDE. Circuit Playground Express is the newest and best Circuit Playground board, with support for CircuitPython, MakeCode, and Arduino. It has a powerful processor, 10 NeoPixels, mini speaker, InfraRed receive and transmit, two buttons, a switch, 14 alligator clip pads, and lots of sensors: capacitive touch, IR proximity, temperature, light, motion and sound. A whole wide world of electronics and coding is waiting for you, and it fits in the palm of your hand.
Have an amazing project to share? The Electronics Show and Tell is every Wednesday at 7pm ET! To join, head over to YouTube and check out the show’s live chat – we’ll post the link there.
Join us every Wednesday night at 8pm ET for Ask an Engineer!
Maker Business — Foxconn executive discusses the dramatically scaled back project in Wisconsin
Wearables — Look sharp with this quick tip!
Electronics — Straw Diffusers
Python for Microcontrollers — Python on Microcontrollers Newsletter: MicroPython 1.19 released and more! #Python #CircuitPython @micropython @ThePSF
Adafruit IoT Monthly — eInk Postcard, VR Spectrum Instrumentation, and more!
Microsoft MakeCode — MakeCode Thank You!
EYE on NPI — Maxim’s Himalaya uSLIC Step-Down Power Module #EyeOnNPI @maximintegrated @digikey
New Products – Adafruit Industries – Makers, hackers, artists, designers and engineers! — New Prods 6/22/22 Feat. ADS1115 16-Bit ADC – 4 Channel w. Programmable Gain Amplifier – STEMMA QT!
Sorry, the comment form is closed at this time. | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103617931.31/warc/CC-MAIN-20220628203615-20220628233615-00249.warc.gz | CC-MAIN-2022-27 | 3,409 | 18 |
https://www.flytrapcare.com/phpBB3/how-do-you-take-care-of-u-calycifida-t54082.html | code | 1. What kind of soil is best for them? (peat/perlite, peat/sand, or sphagnum)
2. How much light do they need? (Will my Yescoms be too much?)
3. Could I keep the plants bagged since the humidity indoors isn't very high?
4. What temperature range is best for them, and what temperatures should I avoid? | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103355949.26/warc/CC-MAIN-20220628050721-20220628080721-00685.warc.gz | CC-MAIN-2022-27 | 300 | 4 |
https://unlockyourhipflexors.onlinestorewebpro.com/hip-joint-examination-osce-guide/ | code | See the written guide alongside the video here http://bit.ly/2s2wM7m
Download the app here: http://bit.ly/2rimpPJ 👾
The ability to carry out a thorough and slick Hip Joint Examination is something every medic needs to master. This video aims to give you an idea of what’s required in the OSCE and you can then customise the examination to suit your own personal style.
Get social with Geeky Medics 🙂
Twitter at http://www.twitter.com/geekymedics
Always adhere to your medical schools / local hospital trusts guidelines when performing examinations or clinical procedures. Do NOT perform any examination or procedure on patients based purely upon the content of these videos. Geeky Medics accepts no liability for loss of any kind incurred as a result of reliance upon information provided in this video. Follow us on Instagram at http://bit.ly/2riklHj | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741510.42/warc/CC-MAIN-20181113215316-20181114001316-00073.warc.gz | CC-MAIN-2018-47 | 859 | 6 |
https://www.techtalk7.com/java-heap-space-in-netbeans-but-ive-increased-the-heap-size-already/ | code | I’m having an issue with netbeans and Java. My program needs to be able to cope with large files being uploaded via an arraylist. So I used -Xmx512m to increase the maximum heap size via the netbeans.conf file.
I know that netbeans is catching the change, and I’ve restarted multiple times to make sure it is. Still, my program continues to crash with a Java heap space memory error when the total memory parameter is only 66650112 bytes; that is, 64M-ish.
How can I force this particular class, procedure, whatever, to allow more memory allocation?
I believe editing netbeans.conf only changes the maximum the JVM that runs the IDE can use. You’ll need to change the project configuration for your program (Because it probably runs in a different Java VM).
Check out this link for the NetBeans help on setting project properties and in particular the properties for running a project.
VM Options is where you need to add the -Xmx512m
I think you just configured the maximum heap size of netbeans IDE itself and not your program.
Go to your project “properties“, select “Run” category. In the “VM Options” text box put your arguments (
try on Tools -> Servers -> on the Platform tab
there is a VM option below Java Platform.
VM Options is where you need to add the -Xmx512m…..
as well as -Xms512m
-Xms512m -> initial Java heap size
-Xmx512m -> max Java heap size
thus you would add, in your case:
in the VM options textfield….
Goto project Properties window. set addition compiler option in Build>Compiling tab to | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650620.66/warc/CC-MAIN-20230605021141-20230605051141-00468.warc.gz | CC-MAIN-2023-23 | 1,535 | 17 |
https://buildplease.com/pages/whattotest/ | code | What's better: bad tests or no tests at all?...Tue, Jul 26, 2016
I don’t have to tell you that every project is different. Should you test setters and getters? What about a method that writes to a file? Do you test methods that call other methods if those methods are already tested? What do you do about exceptions? There’s no point in testing if you’re testing incorrectly… right?
Learn what bad tests look like
I usually say “any tests are better than no tests…” Especially when you’ve never written tests or have an untested legacy project. But tests can end up costing more than they’re worth - and that’s a problem.
One of the best talks I’ve heard on the subject is Test Automation without a headache: Five key patterns by Gojko Adzic at the 2015 Oredev Developer Conference. Gojko Adzic is the author of Specification by Example: How Successful Teams Deliver the Right Software and co-author of Fifty Quick Ideas to Improve your Tests.
If you’re (rightfully) worried about writing bad tests, it’s good to be able to anticipate the consequences of writing bad tests.
Gojko describes two axes for categorizing tests. On one axis, we have the maintenance costs of tests. Obviously, we want to avoid costly tests.
On the other axis is how well the test detect risk. Risk detection, to me, encompasses what the real purpose of tests are - to mitigate risk… to get feedback when I am taking risks… to bring risk to the surface for me to understand.
Gojko kindly let me re-create the matrix from his talk with some additional notes:
When you’re wondering “what to test” and you pick something that you might want to write tests for - it might help for you to think about where your tests fall into these categories.
Will they be Fast Food tests? Are they automated UI tests that are expensive to maintain, but don’t detect much risk?
Will they be Cement tests? Will they detect risk well, but be costly to maintain? Are they effective at finding issues, but take 3 days to run? Will everyone be afraid to touch them?
Will they be Blinder tests? Are you mocking everything out and writing tests against the interaction between these mocks? They’ll sure run fast! You’ll have good coverage! But everything breaks in production…
We’re shooting for Exo Skeleton tests. We want the tests to help us run faster. We want them to help us lift things that we couldn’t lift before.
The question comes up over and over again: “What am I supposed to test?”
Someone else may be able to look at your production code and pick out some things to test for you, but it’s far better to have a decision “engine” around making the choice.
I think knowing what tests will become more costly than beneficial is a good component of this decision “engine.” Gojko Adzic’s talk about doing “Test automation without a headache…” offers some excellent advice for sensing the potential quality of your tests.
If you can sense how a test might fall into the undesirable categories in the matrix of maintenance cost vs risk detection, you might have a better idea of what to test moving forward.
I have more to talk about regarding testing, so make sure you sign up for my newsletter to get these posts sent right to your inbox!
- Adzic, Gojko. Test automation without a headache: Five key patterns. Oredev 2015
- Cracking open a legacy code ‘black box’…
- Debugging all the time isn’t fun…
- New to Testing Time-Dependent Code?… Use NodaTime.Testing!
- Converting DateTimes by Offsets with NodaTime
- Intuitive Testing with Legacy Code
- How to Compare Object Instances in your Unit Tests Quickly and Easily
- Should You Jump into Unit Testing before OOP?
- How Working the ‘Vertical Slice’ Can Fix your Coding Mental Block
- Using TDD to Break Through ‘Paralysis by Analysis’
- Do I Really Have to Unit Test This Method? | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189031.88/warc/CC-MAIN-20170322212949-00619-ip-10-233-31-227.ec2.internal.warc.gz | CC-MAIN-2017-13 | 3,881 | 30 |
https://forums.realmacsoftware.com/t/tooltips-stack-not-working/26536 | code | I have long had the rwextras tooltips stack on my main site, but it has stopped working. Is there an update?
RichardLW (Richard Widman) #1
teefers (Doug Bennett) #2
RWextra was taken over by @willwood He shows the super tooltips still on the site https://rwextras.com/supertooltips/
don’t know what the latest version is (or what version you have) but the product page seems to work fine. | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232254751.58/warc/CC-MAIN-20190519101512-20190519123512-00357.warc.gz | CC-MAIN-2019-22 | 390 | 5 |
https://htcc5.org/ht3-l4-programmatic-access-of-macromolecular-structure-data/ | code | L4 (Lecture): Programmatic access of macromolecular structure data
Protein Data Bank in Europe (PDBe)
European Bioinformatics Institute (EMBL-EBI)
This talk will give an introduction to how to programmatically access data in the PDB. It will also highlight how this data is used on PDBe and PDBe-KB pages as a case study for the use of the PDBe APIs. It will also introduce the PDB component library which provides access to web components developed by PDBe to visualise structural data. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710698.62/warc/CC-MAIN-20221129132340-20221129162340-00775.warc.gz | CC-MAIN-2022-49 | 487 | 4 |
https://news.ycombinator.com/item?id=27205742 | code | Opinions like these (I stop one step short of calling them findings, as this is speculation either way) resonate with me. I'm, too, more convinced by the Rare Earth hypothesis, and I find it quite plausible that we're indeed the sole sentient lifeform in the Universe - at least throughout the time of our existence.
This belief never gained me much popularity though. And this is what I'm fascinated about - how badly a lot of people take to this view. Even seemingly rational individuals seem to have some deeply ingrained, emotional need to defend the belief in ETI.
My personal theory is that this emotional mechanism is actually of religious nature; just in disguise. It's very telling that the most popular narratives involving ETI are usually quasi-religious.
The aliens would typically "teach us how to live in peace" (if we're willing to sit down and listen, of course), or turn away from us in disgust (for our sins), or scold us for our poor moral judgment and deeds; generally trap us in shame. Or they'd be quite diabolical and bring all sorts of plagues upon us, giving us a taste of our own medicine for we're wicked.
But the eschatological component is rarely absent either way.
Even this sceptical paper uses biased language through and through, consistently referring to the belief in the prevalence of ETI as "optimistic", and calling the opposite belief "pessimistic". But why?
There are so many other explanations for Fermi Silence - from the reality of extremely limited sampling to the creeping suspicion that we're too mediocre and underdeveloped to recognise truly intelligent life - that grand assumptions about our specialness seem more than a little premature.
None of this requires aliens who will teach us anything, one way or the other. It requires aliens who ignore us because we're about as interesting as a termite mound.
And once you've seen a few billion of those, you've more or less seen them all.
Not necessarily, because the principle collides with observer bias in this case. I don't think it's valid in this context.
"There are so many other explanations for Fermi Silence"
Of course. I'm not concerned about the explanations themselves though - more about the emotional dimension; the attachment to the underlying idea. Lots of people seem to yearn for the ETI to exist at all. They'd be fine with any of the explanations you mentioned to be true, as long as the core concept is protected.
"None of this requires aliens who will teach us anything, one way or the other."
My point is not that they would, or that it's a logical scenario. My point is that humans exhibit a strong cultural need for this type of narrative.
I'm interested in this anthropologically, so to speak. I don't really care about the actual aliens (or the lack thereof).
I realise this is kinda poking holes in Christian theology (always fun), and there are these kinds of questions for all religions. Can an alien reach Nirvana through meditation? Are there alien Buddhas? Are there Mecca-equivalents on all inhabited planets, or do aliens need to know the direction to our Mecca to pray?
The woo-woo "aliens are gonna come and teach us how to be better humans" is less interesting, I think. The underlying psychological need for some beneficent parental authority figure to come and solve our problems is almost too obvious.
Pet peeve, honed by endless discussions on Slashdot in the late 1990s: -ii is not a Latin plural marker. -i is a Latin plural marker which can correspond to a singular -us. Plurals can look like -ii, but only if the singular word ends in -ius. That's simply because you replace -us by -i, and if there was an i before the -us, then there will be an i before the -i. (Example: the gladiator's sword, gladius, becomes gladii. But one of those i-s is part of the stem already.)
Neither Jesus nor virus end in -ius, so their plurals can definitely, certainly, 100% never be Jesii and virii. They also happen to be words that end in -us but belong to declensions that don't use -i for the plural at all. (So no Jesi and viri either. "Viri" is a Latin word but means something else.) And on top of that IIRC virus is uncountable in Latin and Jesus is irregular even for the declension it sort of belongs to, and are proper names even countable?
Thank you for coming to my TED talk.
So what would the plural of Jesus be?
My name is Marcus, and I whenever I meet another Marcus, I wedge the "Marcii" joke in there somewhere. I would like to be able to refine this. What would two Marcuses (which sounds so wrong) be called?
Note that Marcus is a second-declension (https://en.wiktionary.org/wiki/Appendix:Latin_second_declens...) noun, which is the class where a singular -us turns into plural -i (again, only a single one).
But Jesus is fourth declension (https://en.wiktionary.org/wiki/Appendix:Latin_fourth_declens...), so if it has a plural, then in Latin it's something more like Jesūs (or, again, Jesus without the diacritic; I believe it only marks lengthening of the vowel, no change of the quality of the sound). But https://en.wiktionary.org/wiki/Jesus#Latin says that while it's fourth declension, it's also "highly irregular", and "singular only". It would seem plausible to me that the question never arose in Latin practice, because multiple people called Jesus could always be described as "multiple people called Jesus", and multiple instances of the Jesus would be an unspeakable heresy.
As for English, well. Though I was pedantic above, I should also note that I know that language is what people make it. If the vast majority of English speakers decide that the plural of Jesus is "Jesuseseses", then that's what it is, in English. Even if "just" a certain community decides on a certain usage, then that usage is what the plural is -- at least in that community's variant of English.
Having established that, https://en.wiktionary.org/wiki/Jesus#English lists "Jesuses or Jesi" for the given name and "Jesuses or Jesusses or Jesi or Jesii" for the noun denoting the Christian savior. The variants with i-s hurt my eyes (pun not intended, but I'll take it), and as I explained above, have no roots in Latin (or the Ancient Greek that Latin got it from) but try to look Latin while showing deep misunderstandings of how Latin works, so I would advise against them -- they don't make you look smart or learned. "Marci" seems fine in this regard, but again "Marcii" is not. (Interestingly, a bunch of the Wiktionary quotations for "Jesi" are of the form "Jesuses (Jesi?)", i.e., cases where the author was questioning themselves on this point, which is kind of weak for a dictionary.)
I would say that since -s is the dominant way of forming plurals in English, "Jesuses" and "Marcuses" are the most natural choices, inasmuch as forming plurals of given names can ever sound natural. But I'm not the English police (nor even a native speaker). Only the don't-randomly-double-i-because-you-think-that's-Latin police :-)
> And worlds without number have I created; and I also created them for mine own purpose; and by the Son I created them, which is mine Only Begotten.
The laws of physics results in occasional clouds of dust and water (life) that can contemplate their unlikely existence (humans).
The ~50% probabilities from the paper are not fundamentally more founded in reality than "Did another planet in our galaxy develop intelligent life yet that attempted to communicate? I don't know, so let's assume 50% either way. Therefore, we are alone with 50% probability." Should that number be 50%? Or 10%? Or 99%? You're choosing some prior there. So does this paper, and the priors chosen gravely affect the result. Of course, the paper has more intricate math and more solid reasons for their priors, but fundamentally it is still just assigning almost arbitrary probability distributions to parameters that we have no grasp on. Specifically (see my other comment), the numbers that they get primarily depend on the choice of prior distribution for the abiogenesis rate, which overshadows all other parameters. It has such massive error bars (>200 orders of magnitude by their own account) that arriving at a concrete probability (in the way that you understood it when reading the paper) is somewhere between misleading and a lie, because it's more or less just a projection of that prior into a single number.
In other words, I'm convinced they could have easily arrived at probabilities like 0.1% or 99.9% by reasonably varying their prior distribution for that parameter alone.
In other other words, this reading of the paper also confirms the general point it makes: The Drake equation is garbage-in garbage-out. There is no way to determine what numbers to plug into it. So let's just drop the whole unscientific nonsense.
I think you are misinterpreting the conclusion of the paper. The conclusion is that there is "a substantial probability that we are alone in our galaxy". This extra probability is because of the extra uncertainty within our estimates of the parameters in the Drake equation.
But "substantial probability" is something entirely different than being sure.
The keyword is "observable" universe what about probability of life in unobservable universe. When we discovered microscope and telescope only then you could say that we started "observing" something. Modern science is only 100 years old and we can not even imagine what would be invented and discovered for 50 or 100 years.
Maybe SETI search should add several terms to the drake equation to understand odds of hitting gold. Is not enough to be intelligent life, to be found in the way we are searching for it, distance, way of communication, culture, kind and stage of civilization, wish to be found, wish to expand, biology, and probably more are just terms in the equation that lowers the probability for us to find anything. There are too much implicit assumptions about what we are searching for, and maybe there is none that fits that because some basic rule that we don't know yet, as we are not advanced enough (a dark forest is just an example).
Is like assuming that advanced enough cavemen will be communicating across the galaxy with louder drums. And that as we hear no drums in space, there is no life anywhere.
fc - "the fraction of civilizations that develop a technology that releases detectable signs of their existence into space"
This term for many people, is near 1. They assume that "detectable" means that WE can detect them with our current level of technology, and/or that "releases" means that it would be something familiar like radio or laser beam transmission.
...but the scope of this assumption is based upon a scant hundred years of human history. The rate of technological and AI advancement (on galactic timescales) is so brief, it is imperceptible. ...and recall that if life exists, the average age of such civilizations would be hundreds of millions to billions of years older than ours.
When we look at popular sci-fi media, one thing that is blatantly obvious is our inability to even imagine what our "civilization" will look like beyond a few hundred years - and often those shows are even superficially wrong.
If AI surpasses us (or integrates us, or exterminates us), our technological existence to "release detectable signals" will be a relative flash in the pan. Remember that AIs aren't limited by our meat lifespans. To them, taking 100 million years to populate the entire galaxy, is a reasonable amount of time. To them, WE may not be the life they are looking for - the emergence of an AI might be of some significance (or perhaps even not), and we are just the slime on the surface of the rock. ...the precursor to what THEY consider THEIR abiogenesis.
...and if AIs encountering one another in space are constructive rather than combative, then the rate of abiogenesis may not be all that relevant. It might simply be like adding another drop of water to an already full glass.
This makes intuitive sense too — an early Great Filter simply has to stop life from occurring, while a late Great Filter has to deal with the complexity of preventing life from doing what it does best (surviving and spreading in a “Life finds a way” style). Concretely, an early Great Filter has fewer variables it must affect than a late Great Filter. Like the paper says, we are probably alone, but there’s little reason to be alarmed about it.
And if you happen to believe that AGI and a Singularity are the inevitable outcome of intelligent life, the case is even stronger that we are the first, last, and only. However powerful the Great Filter might be, it’s unlikely that a super-intelligence would succumb to it.
And that's just one of the many ways coming where any average person can decide to ruin the world. It's already possible today for a single rich person, if they wanted to, to destroy the world. I don't remember exactly how. Something like buy 1k airplanes and have them seed the atmosphere IIRC. Those kind o things get cheaper and cheaper until their in reach of your average joe
We don’t really have to imagine ourselves, since enough science fiction novels have already been written where humanity nearly extinguishes itself (sometimes multiple times) but then finally gets its act together. There would have to be something more fundamental than technological power being too cheap and widespread for a late Great Filter to get to 100% effectiveness. The only thing I can think of is that every super-intelligence checks out of our universe for some reason — that the ultimate end of technology is always effectively (if not literally) suicide. But this goes against the very nature of technology — to reshape existence to fuel the battle against entropy. Perhaps every Singularity sees that this battle can’t be won, and decides to call it quits? Maybe. But it seems more likely it would fight until heat-death itself.
In fact, there’s a great short story about that too.
If there’s hope in our imagination, I think it’s likely there’s hope in our reality too.
I might be wrong about this, but I think intelligence and benevolence are more strongly correlated than intelligence and malevolence, and that as the world becomes more educated, it is also becoming more intelligent and more benevolent. An evil-genius is a trope because it is an anomaly. For every evil-genius there are thousands if not millions of good-geniuses. Evil tends to look like Hitler and Stalin, not Einstein and Turing.
It won't be a 14-year-old that brings the world to its knees. It will be old men (and women, I suppose) spewing hate and lies from their Oval Offices.
That experiment/art project with E. Coli on a penicillin gradient a few years back was terrifying.
Sounds interesting to me too.
Most civilisations will have just enough of a life support to keep the machines running. They might be spurred into action each time a sun burns out, but other than that why bother with the outside world?
I think that at least some people (and when you're dealing with galactic timescales and spaces, this means a lot of people) would stay in reality to figure out how to get around entropy and heat-death.
So even though we might very well be in a simulation of VR-checked-out civilizations (or even if we aren't), I would expect to see some people in our simulation/reality fighting against the parameters of the simulation/reality that puts a time-limit on existence.
It also follows:
If it is possible that one civilisation spreads itself in this manner, it is likely that we are decedents of that civilisation. Simply because there will be many more copies of the original civilisation with a penchant for spraying their seed around than other kinds of civilisation.
An _actual_ replicating Von Neumann probe, that we can imagine working within the laws of physics today (even if we don't yet have the engineering capacity to build) can actually clone not just a couple of DNA strands, but can bootstrap an entire new sapient civilization, including technological progress, likely all the way down to the civ's culture.
I'm not so sure why this supposed to make intuitive sense. Life is a gradient, so any metabolic process that happens on a energy gradient can be considered 'alife'. I really don't see how an early Great Filter would work - are you going to stop energy gradients from happening? I've read -- will try to dig up the source -- that -- at least simple life -- is pretty much a given since -- even though it creates pockets of lower entropy -- allows for the most paths to thermodynamic equilibrium.
In my opinion a late filter makes more sense. That is; any species that evolves in the confinements of competition for resources and natural selection is -- due to the requirements that competition for resources creates -- necessarily unable to properly transition to a steady-state mode with no competition for resources and no (or limited) natural selection.
The reason for that is that the transition phase from competition for resources to the steady-state phase is simply too short. I'm convinced that this is what we are currently seeing with Humanity on a global scale; even though there's no need for competition for resources, we're still biologically and socially 'programmed' to compete with each other for resources, mates and habitats.
(Biologically, all humans are more closely related to each other than -- for example -- any two chimpanzee tribes. We are not very diverse, genetically.)
That inability to quickly change a species 'modus operandi' to a steady-state model together with the immense power multiplication of technology and cooperation that make it possible for civilization to literally dominate their ecosphere, I don't see how any species is ever going to survive that threshold.
The result of that inability to switch to a steady-state model and the powers achieved - tools and cooperation are the ultimate exploits! -- is simply extinction by habitat destruction.
I think that the current observations quite neatly match this.
The great filter is evolution converging to a local maxima and not evolving creatures capable of higher intelligence.
We're scared about the mass extinctions on Planet Earth while at the same time they were the ones that cleared the field for different animals to evolve. Case in point, the Dinosaurs going bust paved the way for small mammals (then large mammals, etc)
"But couldn't we have intelligent dinosaurs" maybe not? (Because of a bunch of stuff that only came later like animal packs, family life, etc - though it might be argued that some dinosaurs had that)
Then we have the fact that mammals are born much more frail than other species and needs "a family" to take care of them for a while (and human's big heads made that "while" into "a lot of time")
But without that you don't get societies organizing. And the bigger the society the more you can do with it.
Given the galaxy, and given billions of years, the Great Filters that seem most likely are the ones that occur on the edges of the timeline: before multi-cellular life begins, or after a hyper-dominant intelligent species arises.
Having said that, I think you’re absolutely right about mammals and societies. If the Great Filter does occur in between life and intelligence, it seems like it would happen where the first signs of intelligence begin. And for earth, that means mammals and the arms race of mind-modeling that their social lives initiated. No other type of animal on earth has parental-care so fully built into its biology: milk glands and placentas force mammals to be social from the start.
A great book that doesn’t deal with intelligence and mammals directly, but provides a key connection, is “Consciousness and the Social Brain.” The book makes a strong argument that consciousness sprung from evolutionary pressures that were essentially social — that being able to model (and predict) the mind of another is essential for communication and cooperation. But one can only model the mind of another if you first model your own mind, and thus, consciousness (which I would argue is just another name for general intelligence).
The idea that life in the universe will be comprised of humanoid-esque beings that have the same perception of time as us, or the ability to communicate in a "language", is just a human-centric idea. It's us, projecting our own worldview (which has developed through millions of years of evolution) on to the infinite universe. This is the fundamental problem with positivism; using your current limited sensory knowledge to construct a complete world-picture.
Even life itself is not a neutral word; it mostly just means "carbon-based entities like those on Earth." Perhaps the reason the universe seems so empty is because we only have the ability to see things like ourselves?
Well, we do see this behaviour in other animals, and not just humans, or mammals even.
I realise that's not broadening the net much - we share a common ancestor with everything that could be considered "living" on this planet, so ultimately it's all "human-centric" to an extent.
But if there are forms of life that are wildly different, to the point we can't communicate with them or even understand that they're "alive" in any meaningful sense, then that's kinda out of scope ;) The definition of "alien intelligence" only includes things that we would be able to recognise as an alien intelligence. Otherwise we're just talking to the trees, and they're dull conversationalists.
You just need to see what faint a signal we receive form the Voyagers, which are deliberately pointing their antennas at us and are thousands of times closer to us than any star to appreciate how improbable it would be for us to ever detect extraterrestrial communication.
I agree, but for different reasons. My favourite way to dissolve the Fermi Paradox is to simple state that the main assumption, i.e. "the lack of evidence of extraterrestrial civilizations", is just wrong :)
This is very sobering to read if true. It’s all on us. Life is even more precious than we thought and every human life extinguished even more of a loss to the universe. If we could only band together and see this.
I imagine that people attracted to this movement to either stay true to the "voluntary" aspect and pay with genetic demise for their mental susceptibility, or realize that their movement will be never manage to voluntarily attract the number of people necessary for movement's "success" and at some point look for more effective ways of achieving the said human extinction. Anyway, this is next level kind of awkward stuff.
The paper considers each parameter of the Drake as a probability distribution over some range. Notably, they assume that f_l in the Drake equation (the fraction of habitable planets that actually develop life) may vary over (at least) 200 orders of magnitude. Yes, you read that correctly.
Naturally, they thereby get a long tail of "planets essentially never develop life, even despite there being so many of them".
My main critique (as someone with no further credentials) is that the prior probability distributions they assume for the parameter distributions are more or less meaningless. Their results say "if we assume that the log of f_i (life-bearing planets that develop intelligent life) is uniformly distributed between log(0.001) and log(1), similar for other parameters, then the probability of being alone in the milky way is > 50%".
Specifically, by far the largest impact here is from assuming some distribution for f_l that covers 10x as many orders of magnitude (!) as the remaining parameters together. I'm very certain (but haven't done the math) that slightly tweaking the sigma they assume for the corresponding log-normal distribution (that sigma is 50 orders of magnitude) would drastically impact the results. They do a lot of dancing around that fact (discussing how little impact the priors of other parameters, or even the center of the log-normal distribution for f_l have), but fundamentally the result boils down to:
"We're extremely unsure how often abiogenesis happens, and this parameter dominates everything else." Followed by some math that (oversimplified) boils down to "if we set the rate of abiogenesis to effectively zero half the time, then half the time we are alone in the universe."
PS: Title should probably have (2018).
The entire Earth's history is hundreds of millions of data points.
Each year that a habitable Earth existed prior to life evolving can be seen as a data point. ... and with life emerging very very near its habitability transition, this reduces the drake error bars considerably.
The real limitation of the Drake equation is the duration at which life sends out radio signals - which given technological advancement and AI is probably only a couple hundred years.
Lacking any credentials on the subject whatsoever, and based on what (little) I know about abiogenesis, intuition tells me it happens with a probability of 1, if (and here's the key) the conditions are right, and given enough time. (A fun corollary of this is that intelligent life also happens with a probability of 1, under proper conditions ).
So, we just need to find how many planets have had the right conditions for a long enough period of time.
p(abiogenesis)=1 + "evolution is a universal law" => p(intelligent_life)=1
Time and time again we have discovered that we are less special than we thought. Life appeared quickly after Earth was formed. I'm convinced the universe is teeming with life.
So the lack of huge radio transmitters that we can detect really just means aliens aren't investing huge amounts of money into letting us know they exist. Why would they? Especially if they already know of other civilisations.
About the required power and signal degradation over distance, see this:
Everything about UFOs is so implausible that the alternative explanation of "we don't know what we saw, but almost certainly not a UFO" seems to be much better.
This contextualises the issue and brings up the questions you mention. Without this imposed meaning the questions go away.
People like giving meaning to the unknown.
In common parlance UFO also means "spacecraft of extraterrestrial origin", and I very obviously used it in that sense. | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488538041.86/warc/CC-MAIN-20210623103524-20210623133524-00491.warc.gz | CC-MAIN-2021-25 | 26,369 | 102 |
http://www.redhat.com/archives/linux-lvm/2003-March/msg00072.html | code | On Tue, Mar 11, 2003 at 11:22:20AM +0000, Paul Furness wrote:Hi.
I'm trying to get LVM 1.0.7 going on our new production server. I've
never used LVM before, but based on reccommendations and looking at what
it can do, it looks like exactly what I need.
For the reccord, it's a SMP Xeon system, running RedHat 7.3 plus current
I am confused about the defualt setting for Physical Extents when you
run vgcreate on a new PV.
Looking through the man page for vgcreate is says this:
-s, --physicalextentsize PhysicalExtentSize[kKmMgGtT]
Sets the physical extent size on physical volumes
of this volume group. ................. The default
of 32 MB allows LV sizes of ~2TB because as many as
~64k extents are supported per LV.
A bit later, under "Examples." it says this:
To create a volume group named test_vg using physical vol-
umes /dev/hdk1, /dev/hdl1, and /dev/hdm1 with default
physical extent size of 4MB:
vgcreate test_vg /dev/sd[k-m]1
So what is the default? 4M or 32M? Or something else? Or should I simply forget about the default and pick a number?
The default is 32MB, the example has not been updated. It used to be 4MB but
limiting LVs to 256MB by default soon became a problem for people.
Finally, is there any documentation that's more detailed than the HOWTO, and explains a bit more about the theory of LVM - what happens when you change the size of existing file systems, and so on? The HowTo is ok (although not all that great if you've never patched a kernel before), but necessarily brief. :) | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645191214.61/warc/CC-MAIN-20150827031311-00262-ip-10-171-96-226.ec2.internal.warc.gz | CC-MAIN-2015-35 | 1,510 | 22 |
https://apple.stackexchange.com/questions/392256/problem-creating-new-apple-id-account-cannot-be-created-at-this-time | code | I'm attempting to create a new Apple ID with a new
@icloud.com email address from a new Mac user account.
I enter the required information, including a new unique iCloud email address. Attempting to use an already-used iCloud address gives a different error on a previous screen.
However it then gives the error:
There was a problem creating your new Apple ID.
Your account cannot be created at this time.
What is the problem? Why can't I create an Apple ID?
This is a new Mac (provided by work), so I am 99% sure I am not hitting the per-device Apple ID limit. | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178350846.9/warc/CC-MAIN-20210225065836-20210225095836-00484.warc.gz | CC-MAIN-2021-10 | 561 | 8 |
http://code-cracker.github.io/news/2015/04/25/alpha5-released | code | We have released today our fifth alpha, version
1.0.0-alpha5. This release
is targeting CTP 6 of Visual Studio 2015.
- 58 Analyzers in C#, 50 Code fixes
- 21 Analyzers in VB, 17 Code fixes
- 1186 tests
- 90% code coverage
- #293 Incorrect diagnostic on NoPrivateReadonlyFieldAnalyzer (CC0074)
The above analyzer is disabled by default, you need to enable it to be able to use it.
For a list of what worked on see the corresponding milestone. | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866276.61/warc/CC-MAIN-20180524112244-20180524132244-00301.warc.gz | CC-MAIN-2018-22 | 441 | 10 |
https://ausdroid.co/events/ | code | Ausdroid was originally started by a group of robot enthusiasts in the University of Melbourne in 2017, which had excellent performance during ICRA 2018 and ICRA 2019.
In late 2019, Ausdroid was successfully affiliated with Graduate Student Association of the University of Melbourne, becoming an officially registered university club.
Due to the restrictions by the unimelb under CONVID-19, we only have limited events. We are looking for opportunities for hosting more events (preferable offline) in the future. If you have any suggestions, you are more than welcome to contact us.
We will host workshops for development and experimenting on the robots for both hardware and software team. Due to CONVID-19 and university policy, we are not allowed to host any offline events on campus. So, currently (2020 S2), we only host minimum number of Zoom workshops online, which you can find recording in this link here.
Uni Open Day
As one team supported by CIS, we took the responsibility to promote ourselves to the public on the University Open Day to attract more future students and cooperations. The team has successfully presented and gain a lot of interests on the Uni Open Day since 2018. Unfortunately in 2020, the Uni Open Day switched to online without any show cases or presentation of projects. To find out more about us on the Uni Open day by this link.
Technical Reading Group Meeting
Both software team and hardware team will take turns to present their finding about latest techniques that can be useful and implemented on the robots. The process is presenting the idea to the group and discuss it among the group. So that the presenter will have the chance to look the topic on a different perspectives, while the attendance will gain basic knowledge about the topic.
Since we are a student group work with robots, field tests will be a important part. Although we still cannot enter the campus based on the current uni restrictions, we have already explore a few options with uni: Telstra Creator Space for basic functionality testing, warehouse in Heidelberg for field test, tec. And we are currently working on the option to bring the robot home. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00808.warc.gz | CC-MAIN-2023-50 | 2,164 | 9 |
https://www.osirisstudio.com/home/2018/3/29/technicolor-paradise | code | Meticulously restored and mastered from stacks of 45's and boxes of master tapes, Technicolor Paradise: Rhum Rhapsodies & Other Exotic Delights brings together an unexpected, intoxicating indie version of Exotica. Numero Group's Ken Shipley:
"I think what people have thought of as exotic and lounge music before was through the lens of all the major labels -- those Capitol Ultra-Lounge series (releases) and stuff like that. I wanted to make something that's the indie version of all that, and it's just as interesting."
LPs and CDs available May 25th on Numero Group. | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986688674.52/warc/CC-MAIN-20191019013909-20191019041409-00172.warc.gz | CC-MAIN-2019-43 | 570 | 3 |
https://assignmenthelp.xyz/apache-struts/ | code | Apache Struts Can Be Fun for Everyone
The Debate Over Apache Struts
There are a number of different methods of looking at Struts. Although Struts has a lot of significant benefits over the typical servlet and JSP APIs alone, owing to its complexity it has some severe drawbacks too. Prior to deciding if Struts is correct for your projects, you should try out a simple Struts application to acquire a feel for it. The Struts 2 in Action book gives a fantastic foundation, but it's getting increasingly more out-of-date. Struts somehow should be plugged into your internet application. Needless to say, Struts is among the most powerful Java application frameworks that could be utilized in a multitude of Java applications. Struts provides the controller class, while we're responsible for making the rest.
The samle application code can be seen at GitHub! In a Struts application utilizing the Validation Framework, it's still true that you don't need to do any of the true validation coding. You must allow validation as part of the undertaking, define an error message, and tie it into a suitable portion of the application. In such steps that you will prepare the validation which can be used for either client-side or server side validation.
To begin using Struts 2 we'll create an internet application using Maven to handle the artifact dependencies. Occasionally it requires time to think of a patch, at times the item is no longer supported and on occasion the patch interferes with your company requirements. Once a change was found, you can begin the vulnerability management procedure to scan the new or changed asset and get a report of any found vulnerabilities. There's a different between our very first action class. You are able to extend and customize these examples to fulfill your needs. It is possible to access this example in the next URL. Also a fundamental instance of Model-View-Controller (MVC) design pattern will be put into place so you can identify distinctive elements of a Struts Project going on forward.
Fortunately, Webix developers offer a simple to use tool Skin Builder. If you wish to learn more about JSP application development, here are a few resources that may provide help. Java utility projects may be used to refactor reusable elements of applications into separate projects. If you cannot upgrade immediately, you may want to investigate other mitigation efforts like changing firewall rules or network equipment ACLs to lessen risk. The project includes honeypots spread across every region of five main cloud providers, and a couple of collectors in private networks. You've successfully acquired a sizable project for a library.
Either framework is a superb option. An internet applicaiton framework simply provides from the box infrastructure to take care of the chores that has to be done for the processing of every internet request. Inside this instance, you will extend the project structure described in the last example.
The Apache Struts Game
With the integrated maven jetty plugin you may run your internet application and check it out. It's then often essential to rewrite the applications in order that they match the other software the provider is using. You may run this as a very simple java application. Developing a Struts application is comparable to developing any other sort of internet application in NetBeans IDE. Under this option, select the Tomcat server where it needs to be executed. Congratulation, you've finished an easy library application. Inside this tutorial you are going to learn how to make a Struts hello world application in eclipse.
What You Need to Do About Apache Struts Beginning in the Next 5 Minutes
Be certain you use precisely the same message keys in every single file to recognize the very same message. JSP files ought to be put under the WebContent directory. Make sure that you get these files from the primary distribution directory, instead of from a mirror. It's very, very vital that you place this file within your directory. Few words which should be understood regarding the aforementioned configuration file.
The whole collection of all views are available in the toc UI doc. You could also consult the complete collection of mirrors. The Struts 2 user mailing list is an outstanding place to find assist. More information are available on the homepage. You might also specify another message resource working with the attribute.
On the cover of the file you will discover struts tag libraries. Today you can test the library. The library will have to be included in your application too. Not all the above libraries are essential to use the fundamental functionality of Struts. Webix library permits you to reveal your creativity in web development to the entire extent. | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039626288.96/warc/CC-MAIN-20210423011010-20210423041010-00243.warc.gz | CC-MAIN-2021-17 | 4,781 | 13 |
https://huggingface.co/yhavinga/gpt-neo-1.3B-dutch | code | A GPT-Neo model trained from scratch on Dutch, with perplexity 16.0 on cleaned Dutch mC4.
You can use this GPT-Neo model directly with a pipeline for text generation.
MODEL_DIR='yhavinga/gpt-neo-1.3B-dutch' from transformers import pipeline, GPT2Tokenizer, GPTNeoForCausalLM tokenizer = GPT2Tokenizer.from_pretrained(MODEL_DIR) model = GPTNeoForCausalLM.from_pretrained(MODEL_DIR) generator = pipeline('text-generation', model, tokenizer=tokenizer) generated_text = generator('1 - geel. 2 - groen. 3 -', max_length=60, num_beams=4, no_repeat_ngram_size=3, repetition_penalty=2.0)
"1 - geel. 2 - groen. 3 - rood. 4 - blauw. 5 - bruin. 6 - zwart. 7 - oranje. 8 - roze. 9 - paars. 10 - wit. 11 - grijs. 12 - magenta. 13 - lila. 14 - lichtgroen. 15"
- BPE tokenizer trained from scratch for Dutch on mC4 nl cleaned with scripts from the Huggingface Transformers Flax examples.
This model was trained on the
full configuration (33B tokens) of cleaned Dutch mC4,
which is the original mC4, except
- Documents that contained words from a selection of the Dutch and English List of Dirty Naught Obscene and Otherwise Bad Words are removed
- Sentences with less than 3 words are removed
- Sentences with a word of more than 1000 characters are removed
- Documents with less than 5 sentences are removed
TL;DR: yhavinga/gpt2-medium-dutch is the best model.
- The models with
bin the step-column have been trained to step
aof a total of
|model||params||train seq len||ppl||loss||batch size||epochs||steps||optim||lr||duration||config|
|yhavinga/gpt-neo-125M-dutch||gpt neo||125M||512||20.9||3.04||128||1||190000/558608||adam||2.4e-3||1d 12h||full|
|yhavinga/gpt-neo-1.3B-dutch||gpt neo||1.3B||512||16.0||2.77||16||1||960000/3049896||adafactor||5e-4||7d 11h||full|
This project would not have been possible without compute generously provided by Google through the TPU Research Cloud. The HuggingFace 🤗 ecosystem was also instrumental in most, if not all, parts of the training. The following repositories where helpful in setting up the TPU-VM, and training the models:
- Gsarti's Pretrain and Fine-tune a T5 model with Flax on GCP
- HUggingFace Flax MLM examples
Created by Yeb Havinga
- Downloads last month | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662521883.7/warc/CC-MAIN-20220518083841-20220518113841-00691.warc.gz | CC-MAIN-2022-21 | 2,201 | 24 |
http://atariage.com/forums/topic/278748-got-a-game-and-watch-zelda/ | code | That's a really nice selection there.
Before I had to sell off a lot of stuff there were many in my hands. Currently it's down to SMB and the Club Mario Ball reissue along with an old black nelsonic Zelda watch (preferred how this played to the G&W.) I do have a tabletop Popeye strongly considering selling though.
I have had though quite a few of them and all handhelds. Going by order of release from here: https://www.gameandw...l-60-games.html
Oil Panic, DK, DK Jr, DK 2, Mario Bros, Mario Cement Factory, Pinball, Boxing, Donkey Kong 3, Donkey Kong Hockey, Blackjack, Super Mario Bros, Climber, Balloon Fight, Bomb Sweeper, Safe Buster, Gold Cliff, and Zelda. All of them are the usual wide screen, double screen stuff, no panorama, tabletop, crystal style variations. Sometimes I wish I still had them, or at least some of them but I know they'd go into disuse once the batteries died just as my SMB has in the drawer.
I've had some fun ones from off brands like Radio Shack/Tandy like their Highway game which was solid as was Tank & Plane.
If anyone wants to have some web fun simulating a few dozen old LCD games (some russian too) try this out: http://pica-pic.com/
By the way -- ZELDA is on PICA-PIC to play. Try it.
Edited by Tanooki, Mon May 14, 2018 10:19 PM. | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823236.2/warc/CC-MAIN-20181210013115-20181210034615-00506.warc.gz | CC-MAIN-2018-51 | 1,274 | 8 |
https://ipod-classic.helpnox.com/en-us/ipod-classic-user-guide/listening-to-music/playing-music-and-other-audio/browsing-music-using-cover-flow/ | code | Browsing Music Using Cover Flow
You can browse your music collection using Cover Flow, a visual way to flip through
your library. Cover Flow displays your albums alphabetically by artist name. You see the
album artwork, title, and artist name.
Listening to Music
To use Cover Flow:
From the Music menu, choose Cover Flow.
Use the Click Wheel (or press Next/Fast-forward or Previous/Rewind) to move through
your album art.
Select an album and press the Center button.
Use the Click Wheel to select a song, and then press the Center button to play it. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474676.79/warc/CC-MAIN-20240227153053-20240227183053-00296.warc.gz | CC-MAIN-2024-10 | 549 | 11 |
https://forums.tomshardware.com/threads/need-help-recover-deleted-partition-ms-dos-fat.3681566/ | code | So hello guys, I am using a MBP A1502 retina display. So a few weeks ago, I decided to install windows in my mac through bootcamp. I have 3 partitions: Apple,C:Bootcamp and D: drive. Yesterday, I find that the windows partition is not enough for me since I have big files. So I reinstalled windows and deleted and partitioned the D:drive again. Just after installing windows, I realized I have 1 file that is very important in the previous windows version. I really want to recover it, is there any way? | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178381803.98/warc/CC-MAIN-20210308021603-20210308051603-00245.warc.gz | CC-MAIN-2021-10 | 503 | 1 |
https://omeka.org/s/modules/InverseProperties/ | code | An Omeka S module for defining inverse properties between resources.
This module allows administrators to define inverse properties between resources (items, item sets, media) so that property values can be concretely linked in both directions. In effect, it enables a custom implementation of owl:inverseOf integrated with Omeka S resource templates.
Inverse Properties is Copyright © 2021-present Corporation for Digital Scholarship, Vienna, Virginia, USA http://digitalscholar.org
The Corporation for Digital Scholarship distributes the Omeka source code under the GNU General Public License, version 3 (GPLv3). The full text of this license is given in the license file.
The Omeka name is a registered trademark of the Corporation for Digital Scholarship.
Third-party copyright in this distribution is noted where applicable.
All rights not expressly granted are reserved. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948817.15/warc/CC-MAIN-20230328073515-20230328103515-00188.warc.gz | CC-MAIN-2023-14 | 877 | 7 |
https://getfishtank.ca/blog/sitecore-contentsearch-has-no-relevancy-or-scoring | code | In upgrade from Sitecore 6.x to Sitecore 7 we noticed that keyword based queries [e.g. Where(i = i[“_content”] == “keyword”) ] using the ContentSearch API had unpredictable results. Not only was the first result barely relevant but the results would change between searches and environments.
To investigate we used a tool called Luke (or Luke.Net) to examine the state of our Lucene indexes. Here we’re looking at Sitecore’s default master index. Note the score column. It’s all zeros.
The highest score are your first results. Finding a term multiple times within a Lucene document will increase it’s score. Finding the term in a field that’s been given an increased boost value will also increase it’s score. But with scoring values of 0 across the board, chaos ensues.
What’s Going On
In Sitecore 7’s a Lucene boost value can be applied to a field directly on the template. Unfortunately, by default the boost field has no standard values and is interpreted by Lucene as a “0” boost. Using the simplified algorithm of [Relevancy Score * Boost Score = Total Score] you can see that [250 * 0 = 0] and boosting by zero is catastrophic.
As I alluded to it is the lack of standard values being set that causes this issue in the first place. You’ll need to do as follows:
- Load this item in the tree /sitecore/templates/System/Templates/Sections/Indexing
- Create it’s Standard Values
- In the Boost Value field enter: 1
It has recently come to my attention that this is in known issue known issue with Sitecore 7 so I’m sure we’ll see a proper fix shortly. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662543797.61/warc/CC-MAIN-20220522032543-20220522062543-00429.warc.gz | CC-MAIN-2022-21 | 1,591 | 10 |
https://supervisorconnect.it.monash.edu/projects/research/computational-australian-sign-language-generation | code | Computational modelling of sign languages aims to develop technologies that can serve as means for understanding (i.e., recognising) and producing (i.e., generating) a particular sign language. This field of research aims to provide the technological means for two-way mediated communication between hearing and deaf people. However, research on the computational modelling of sign languages is still in its infancy.
This PhD project aims to design, formalise, develop and evaluate technologies for the automatic generation of Australian Sign Language. The invented technologies will be an essential step towards a wide range of applications that will assist in Australian Sign Language communication and education (e.g., applications that support acquisition and training of sign language skills), thus will enhance awareness, facilitate inclusion, participation and equality, and improve access for people who are deaf or hard of hearing.
This PhD project will invent the first Australian Sign Language generator to synthesise 1000+ signs. The project’s goal is three-fold: (1) To increase the amount and variation of signs in the available structured Australian Sign Language data, thus addressing both the problem of bias in data and learning and structured data scarcity, (2) To increase the engagement with the generated sign language content through controllable physical appearance, thus increasing the probability of positive educational outcomes, and (3) To increase the intelligibility of the generated sign language content through controllable signing style, thus decreasing the mental effort for mediated sign language communication.
Please apply before 15 December 2022.
In addition to excellent numerical and programming skills, previous experience in Computer Vision, Machine Learning, Deep Learning, Computer Graphics, and Australian Sign Language would be highly advantageous. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500140.36/warc/CC-MAIN-20230204142302-20230204172302-00828.warc.gz | CC-MAIN-2023-06 | 1,897 | 5 |
http://startupgoa.org/job/teknorix-systems-verna-goa-full-time-team-lead-net/ | code | Looking for a Team Lead, with a focus on “doing it right” rather than “getting it done”
We are seeking candidates that are excited about technology, are continually looking to improve their skills, and stay on top of current industry trends. Our developers, at all skill levels, are given the opportunity to participate in the design of applications and have a voice in our strategic direction. This is not a position for those who like to be handed a thick stack of requirements and be left to heads down coding. It is a position for those looking to be an active participant in the design and development of high quality software..
This role is a 70% development role. The Team Lead is responsible for organizing and chairing all meetings and organizational activities as pertaining to the agile methodology. The Team Lead will help in sprint planning, daily stand-ups, retrospectives, and post-mortem meetings. Additional responsibilities will include architecture design, code reviews and continuous education of the team.
It will be the responsibility of the team lead to understand and inculcate values such as: shared vision, a customer focused mind-set, a product mind-set, a zero-defect mind-set, and a willingness to learn in all members of the team.
The ideal candidate will have a proven track record of leading teams to a final product, possess a passion for Microsoft technologies as well as be courageous in defending quality over quick delivery.
- Create and integrate features for our enterprise SAAS software solution using the latest .NET technologies
- Active participation throughout the development lifecycle
- Evaluate and integrate latest technologies and third party libraries/APIs
- Develop features/applications, including collaboration in requirements definition, prototyping, design, coding, testing and deployment.
- Communicate with team members to clarify requirements and overcome obstacles to meet the team goals.
- Leverage open source and other technologies and languages outside of the .NET framework should the need arise, and autonomously be able to make use of those decisions.
- Ensure that the long-term architectural and performance strategies are considered with designing and coding solutions.
- Develop cutting edge solutions to maximize the performance, scalability, and distributed processing capabilities of the system.
- Provide troubleshooting and root cause analysis for production issues that are escalated to the engineering team.
- Work with development teams in an agile context as it relates to software development.
- Actively participate in daily code reviews.
- Mentor less experienced developers.
- Organize and execute on all meetings pertaining to the agile methodology.
- 5 or more years experience as a key developer on enterprise projects.
- Experience developing applications in C# and .Net technologies as a Senior Software Engineer.
- Software development experience including: OOP, design patterns, WCF/Web API, RESTful service implementation, Service Oriented Architecture, Entity Framework & SQL Server.
- Experience creating cloud solutions.
- Knowledge of design patterns and their implementation.
- Any Agile or Lean Software Development experience such as Kanban, Scrum, Test Driven Development, and/or Extreme Programming methodologies.
- Experience with SaaS (Software as a Service) solutions.
- Experience helping others to design, write, conduct, and direct the development of tests.
- Positive team player attitude with excellent verbal and written communication skills.
- Self-motivated and willing to “do what it takes” to get the job done.
APPLY ON TEKNORIX WEBSITE | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512836.0/warc/CC-MAIN-20181020142647-20181020164147-00546.warc.gz | CC-MAIN-2018-43 | 3,661 | 29 |
https://mono.github.io/mail-archives/mono-list/2007-December/037160.html | code | [Mono-list] First Posting..
Gavin.Landon at ignitetech.com
Thu Dec 6 16:59:20 EST 2007
Hope this is the right list, general right?.. Just though I would say
hey after just signing up.
I work for a company that is starting to redesign our VC6 Windows client
software to run cross platform. We have just recently downloaded and
started playing with Mono so I figured I best get on some list of people
that know what they are doing since I'm a unix/mac nub..
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Mono-list | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.30/warc/CC-MAIN-20230924191454-20230924221454-00672.warc.gz | CC-MAIN-2023-40 | 567 | 12 |
https://blog.softexpert.com/en/new-softexpert-suite-search-features/ | code | Since the launch of SoftExpert Suite 2.0, the search service has been one of the tools that has most evolved. With the arrival of version 2.1.3, the solution provides an even richer experience for people with specific search needs.
What has changed in the general search features in SoftExpert Suite?
With the new version, customers can optimize the suite so that searches provide results more aligned with their needs. With the new menu Configuration > Configuration> General search, or using the shortcut (CM032), administrators now have greater control over how the Suite indexes data and presents search results.
Using the “Status” tab, you can monitor the availability of the search service, as well as the number of indexed files and records. It also allows you to track the history of the last times the indexing service was used. In extreme cases, and with the guidance of SoftExpert, it is possible to employ the indexing process manually.
Using the “Relevance” tab, you can increase or decrease the relevance of each of the search criteria. For example, if users in your company are used to searching for documents using an identification code, the system allows you to set a higher relevance for this criterion. Thus, the search results, ordered by the identification code, will be presented with higher priority. If the most common practice is to search by title, this criterion can be configured as more relevant, and the results ordered by title will be presented with higher priority. These changes should be made with great care, as they will impact the searches of all users.
Filtering results by attribute
Finally, the “Filter attributes” tab allows you to create a list with up to 10 attributes that can be applied to refine search results.
Let’s say one of the prioritized attributes is “Customer.” When performing an incident search, for example, you can filter the results to show only the incidents for a given customer.
These attributes will be shown in the column on the right side of the search panel.
Update your version of the tool and take advantage of the new features. You can also access the Release Notes to learn more about other new SoftExpert Suite features! | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817095.3/warc/CC-MAIN-20240416124708-20240416154708-00016.warc.gz | CC-MAIN-2024-18 | 2,212 | 10 |
http://sepwww.stanford.edu/data/media/public/docs/sep93/matt2/paper_html/node12.html | code | To simplify SEP's computer environment, while preserving its technical capabilities, we suggest restricting the environment to two types of platforms: a base platform (SEPers desktop) and special purpose platforms (a compute server such as the SGI Power Challenge and maybe a Promax, AVS, or Focus server).
The base system should be a capable UNIX platform that offers email, NFS, NIS, printer, and web support, as well as reasonable compilers. The platform should require little maintenance and, ideally, should excite its users. We believe Linux is an excellent candidate for this role.
The special purpose platforms are limited to their specific task. We would restrict the general purpose software on these machines to a bare minimum. We also would limit the number of special purpose platforms to as few as possible. The authors believe, that currently, the SGI supercomputer, and one or two HP graphics workstations, could serve as our sole special purpose machines. | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823462.26/warc/CC-MAIN-20171019194011-20171019214011-00301.warc.gz | CC-MAIN-2017-43 | 972 | 3 |
https://www.mdpi.com/1424-8220/17/7/1688 | code | Double-Layer Compressive Sensing Based Efficient DOA Estimation in WSAN with Block Data Loss
AbstractAccurate information acquisition is of vital importance for wireless sensor array network (WSAN) direction of arrival (DOA) estimation. However, due to the lossy nature of low-power wireless links, data loss, especially block data loss induced by adopting a large packet size, has a catastrophic effect on DOA estimation performance in WSAN. In this paper, we propose a double-layer compressive sensing (CS) framework to eliminate the hazards of block data loss, to achieve high accuracy and efficient DOA estimation. In addition to modeling the random packet loss during transmission as a passive CS process, an active CS procedure is introduced at each array sensor to further enhance the robustness of transmission. Furthermore, to avoid the error propagation from signal recovery to DOA estimation in conventional methods, we propose a direct DOA estimation technique under the double-layer CS framework. Leveraging a joint frequency and spatial domain sparse representation of the sensor array data, the fusion center (FC) can directly obtain the DOA estimation results according to the received data packets, skipping the phase of signal recovery. Extensive simulations demonstrate that the double-layer CS framework can eliminate the adverse effects induced by block data loss and yield a superior DOA estimation performance in WSAN. View Full-Text
Share & Cite This Article
Sun, P.; Wu, L.; Yu, K.; Shao, H.; Wang, Z. Double-Layer Compressive Sensing Based Efficient DOA Estimation in WSAN with Block Data Loss. Sensors 2017, 17, 1688.
Sun P, Wu L, Yu K, Shao H, Wang Z. Double-Layer Compressive Sensing Based Efficient DOA Estimation in WSAN with Block Data Loss. Sensors. 2017; 17(7):1688.Chicago/Turabian Style
Sun, Peng; Wu, Liantao; Yu, Kai; Shao, Huajie; Wang, Zhi. 2017. "Double-Layer Compressive Sensing Based Efficient DOA Estimation in WSAN with Block Data Loss." Sensors 17, no. 7: 1688.
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here. | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039748315.98/warc/CC-MAIN-20181121112832-20181121134832-00306.warc.gz | CC-MAIN-2018-47 | 2,132 | 7 |
https://developer.blender.org/p/lmarecha/ | code | - User Since
- Sat, Jul 15, 2:31 AM (1 w, 3 d)
Tue, Jul 18
On an other system with W7 it works, but not the same soft/hard of course.
If it would have been never working since the beginning under W10, I would have guessed a W10 issue, but here, I had no issues on W10 with same hardware/drivers since more than one years (even after the W10 update). And I cannot reinstall the full machine with W7 just for a test (blender is far to be the only thing installed on the main machine)
Sun, Jul 16
with the dll in the folder, the same result happen. There is also no additional debug info returned except the opengl selection/force.
See attached file with various debug flag added:
Sat, Jul 15
If useful, I ran procmon on it, it seems to break when reaching the GUI/various graphical dll. I tried to uninstall, reinit and reinstall the GPU drivers, but still same result.
Was crash log generated? Please upload if it does. Thanks.
No crash log generated (as mentioned in original post) | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425407.14/warc/CC-MAIN-20170725222357-20170726002357-00264.warc.gz | CC-MAIN-2017-30 | 981 | 12 |
https://stackoverflow.com/questions/24945346/laravel-how-to-use-foreign-primary-key-thats-not-an-integer/33432917 | code | I'm trying to set a string column as a primary key of a table, then reference that from another table as a foreign key. Is this possible? Per the documentation:
Laravel assumes every table has a numeric primary key (usually named “id”) and ensures the value of this column is unique for each new row added to the table. Laravel doesn’t really work well unless each table has a numeric primary key. So, for your average Laravel application, please ensure that you define a primary key using the increments() method.
In my case, I don't want to define an
id column as it would be useless. The string column I want to define will act as a primary key. If this is possible, can I get an example migration snippet? | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100016.39/warc/CC-MAIN-20231128214805-20231129004805-00799.warc.gz | CC-MAIN-2023-50 | 715 | 4 |
https://www.beejmooren.nl/Jul-14-14915.html | code | 2020-12-21 · Our Mission. Our mission is to map Ghana one node at a time leaving no one behind. Making Open Geo Data available and accessible to all using OpenStreetMap. Building community mappers and capacity using Free and Open Source Software. OpenStreetMap is the map that saves lives. . CNBC International. | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337516.13/warc/CC-MAIN-20221004152839-20221004182839-00765.warc.gz | CC-MAIN-2022-40 | 312 | 1 |
https://lists.cairographics.org/archives/cairo/2005-September/005353.html | code | [cairo] pycairo and PIL
stevech1097 at yahoo.com.au
Thu Sep 22 06:01:59 PDT 2005
On Wed, 2005-09-21 at 16:10 -0500, James Evans wrote:
> I've been using pycairo to do some simple graphics for a project that I
> need to access the image in PIL. Rather than using surface.write_to_png()
> and then reading the image file into PIL I added a get_data() method to
> the surface object that returns the data in Image.frombuffer() compatible
> I think this is an important piece of functionality to make cairo useful
> to other python toolkits. I think this could be used as the basis for a
> wxCairoDC to provide the power of cairo to wxPython based apps.
> With this patch you can create a PIL image from a cairo surface with:
> import Image
> newimage = Image.frombuffer("RGBA", (surface.get_width(),
> surface.get_height()), surface.get_data(), "raw", "RGBA", 0,1)
> (I don't know why I need the 1 for the orientation, it's supposed to be
> the default, but the image is upside down without it.)
> This is a quick-and-dirty patch to add the functionality. Suggestions and
> changes are welcome!
> james evans
I've looked through one half of the patch - the
The problem is that we need to make sure the 'data' passed to
cairo_image_surface_create_for_data() is not deallocated before we have
finished using the cairo surface.
I do not think that calling PyBuffer_FromReadWriteMemory() and
referencing 'buffer' ensures the underlying 'data' is not deallocated.
I think the original error was to use
if (!PyArg_ParseTuple(args, "w#iii|i:Surface.create_for_data",
which gives us the internal buffer data, but not the python object.
A better method is to read a Python object, call
PyObject_AsWriteBuffer, and reference the python object so the internal
data is not deallocated.
I've updated cvs use this new method and updated the test script, which
seems to be working OK.
Send instant messages to your online friends http://au.messenger.yahoo.com
More information about the cairo | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704824728.92/warc/CC-MAIN-20210127121330-20210127151330-00427.warc.gz | CC-MAIN-2021-04 | 1,974 | 36 |
https://scandiweb.com/blog/scandipwa-architecture-and-design-insights/ | code | PWA for Magento
Every good application should work, look, and feel good. This means that it should be:
- Reliable — working well on slow connections
- Fast — data exchange happens very quickly
- Engaging — UX is attractive and pleasant to work with
Concurrently, PWA brings improvements to each of these points. What’s more, what if I told you that any Magento 2 store could be converted to a very simple, but still incredible Progressive Web Application with offline availability in 1–2 weeks?
PWA workflow may break the usual Magento development flow. React suggests a steep learning curve for a regular Magento developer, at the same time, it is one of the top options for PWA development. SEO issues with PWA, extension integrations with the frontend on React, and GraphQL coverage are just a few things you need to be aware of. In this webinar, scandiweb’s CEO Antons Sapriko shares knowledge and explains how to tackle the most common tripping points:
Now, let’s continue with the article.
From a technical perspective, there is not much effort needed to simply add client-side caching for entire pages and fetching them in the background. The interface will remain the same: old and boring, so engagement may not be fully reached. In the world of PWA, there are no black and white implementations: PWA / non-PWA is not a binary distinction. Theoretically, only implementing push notifications and offline browsing could make any web page a PWA.
That’s not good enough! We want to create the best PWA we can, stopping only at platform/networking/stack limitations, while striving to realize all 3 requirements as well as possible: loads fast ( <1.5s), data exchange is fast (<1s) and the app looks and feels amazing!
To achieve great UX, we must rework the user interface, and here ReactJS comes in handy, bringing us chunking and further possible enhancements.
It is important to highlight: everything mentioned above is about frontend — UI, UX. That is the reason, why all competitors create backend-agnostic implementations (Schema 2). We want it different.
Note: it is important to understand, that PWA itself is highly dynamic. Therefore, it must be built in some way and delivered as a “package” to the client afterward. So, actually PWA is a part, working client-side, however, deep integration with server-side is necessary to keep it highly dynamic.
ReactJS + MobX
Great libs, that allow us to build applications that feel awesome(engaging) and implement chunking (fast data exchange). This can make the app reliable & working fast. It provides much more, but this is irrelevant to our current topic.
Our goal is to integrate PWA with Magento and make it a Magento theme, not a standalone / 3rd party service.
We must understand, that React will replace such Magento functionalities as:
- Front controller
How it looks now
When you type in the address, it connects to a proper server and gets index.html (app shell) that gives initial content (template: header, footer) and activates ReactJS. All is great, except the way we get index.html. So for now, we are using a custom renderer during deployment to generate an absolutely static html.
While, in fact, there is a customer section (“Hello, username”, minicart and might be some more dynamic fields). But we will load just a “default” view without any options. And it all feels like reinventing the bicycle.
How we would like to build it
We could hit Magento: stripped out layout produces the very same content as index.html, but — we can make it dynamic. So, if there is a valid session, but we are requesting app shell — we can display “Hello, username” right away.
There might be concerns about speed, however — stripped of complex logic and multiple DB request to get records from the database — the app shell will be generated faster, than the usual homepage. Additionally — we forgot about our lovely speed booster: Varnish. Magento will be hit only once after Varnish was purged (ex. deployment).
Dynamic content can be resolved blazingly fast with Varnish ESI blocks. And even the first-run delay can be easily eliminated with a single page request to regenerate Magento and Varnish caches. It is extremely easy — the PWA application has only one entry point that serves as initial “installation” — all other URLs are routed on the client. This way only one resource needs to be cached and warmed.
What is the gain:
- No need for pre-generation using overwhelming custom logic pre-generation
- We avoid forcing static content when we actually need dynamic blocks
- We leave initial page layout control at Magento site (layout.xml it is)
- We trust Magento to serve the React application and keep it as an integrated part of Magento.
As a result, we get a Magento theme on steroids: Magento is serving a client-side app, that moves UX to new heights.
Schema 4 represents the flow of a usual web page, while Schema 5 represents PWA’s flow.
So, at the very beginning, the first (simple) request is needed, which is sort of “installing” our application on the client side. During the “installation”, the service worker is registered, which acts as a data fetch proxy, managing requests, caching rules (offline mode), background fetch (prefetch/background update). It automatically catches all data requests (comparable to Ajax requests) and fulfills them based on rules.
Next to the modern UI, which is great with React, the service worker is the second extremely important part, that actually allows to create the “feeling of a native app”.
Since we are building a Magento theme — we must keep the existing design, however, app shell generation should not involve side node processes, utilizing the Magento engine instead. With Varnish and ESI blocks we can get great speed results with dynamic content of the app shell.
Otherwise, the current implementation is absolutely a stand-alone solution for serving PWA to the client and forces us to introduce multiple custom tools that cannot become a part of Magento because of technical reasons (tech stack mismatch).
In order to build an awesome PWA experience — we must carefully analyze and decide on data set (elements) fetching strategy. I will borrow the naming from the Google offered service worker lib:
- Network first/cache fallback — try network, whether unavailable — serve from cache.
- Cache first/network — server from cache, if unavailable — request over network.
- Cache only
- Network only
- Cache/network race — try both, use the one which is faster
Correct and well-done design will provide us control over any piece of the app and has a direct impact on application speed.
This article was written by Ilja Lapkovskis, Scandiweb’s CTO. If you have any questions, comments, or would like to see what ScandiPWA can do for your store, write us a message at [email protected]! Find all the essential information on PWA: features, explanation of the tech, real-life case studies, and much, much more. Take a look! | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474649.44/warc/CC-MAIN-20240225234904-20240226024904-00125.warc.gz | CC-MAIN-2024-10 | 7,029 | 44 |
https://www.zonealarm.com/forums/showthread.php/77371-ZA-Free-Security-Service-Agent-popup?mode=hybrid | code | I have ZA Extreme Security 9.3.037
Today I Received a popup to download
"zone alarm free security service agent.
Includes new antivirus, enhanced cloud security"
Options were only to Update now, or be reminded.
Is this offer coming as update/part of my current product? There was no option for me to check "Never" in frequency of reminders. I already have anti-virus with my current product.
(( what I'm asking is... is this pop-up legitimate )) | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257823935.18/warc/CC-MAIN-20160723071023-00141-ip-10-185-27-174.ec2.internal.warc.gz | CC-MAIN-2016-30 | 445 | 7 |
https://www.screendragon.com/support/boards/creating-a-new-board/ | code | A board can be created by all users. The creator of a board can decide who to invite as a collaborator for the board they create.
Click on 'Create New Board' to create a board. The following dialog will open:
1. Complete the name of the board.
2. Complete the description.
3. Select the user/group you wish to invite to collaborate on the board
4. Add the user as an attendee or
5. Add the user as a moderator
6. Email notification - select 'Yes' to send an email notification to the selected collaborators
7. Click 'Save' to create your board. | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655890092.28/warc/CC-MAIN-20200706011013-20200706041013-00498.warc.gz | CC-MAIN-2020-29 | 544 | 9 |
https://onet.vn/20-best-ubuntu-applications-for-2018.html | code | 20 Best Ubuntu Applications Recommended for 2018
The popularity and user base of Linux is increasing rapidly hence many popular app developers are extending their support for Linux distributions. One big positive about Linux is it doesn’t have any restrictions like Windows or Mac OS. Users can customize the operating system and make the apps work according to their preferences. Because of this there are many identical apps in similar categories available for Linux systems. So today we are going to share the list of 20 best Ubuntu apps that you should download and use in 2018.
1. Google Chrome
Almost all the Linux distributions come with Mozilla Firefox browser pre-installed on them. Firefox browser works really well on Linux but if you have an Android smartphone and a regular chrome user on Windows then you should use Google Chrome on Linux too. Because you can access all the bookmarks and history of Google Chrome any time on any device. You can also sign in to your Google account and sync all the data from other devices you use.
Google Chrome also supports additional security features and extensions for enhanced browsing experience.
Bitcoin, which is a cryptocurrency, is getting very popular and its value against the US Dollar is increasing rapidly. Copay is a Bitcoin wallet where you can manage, send and receive Bitcoin securely. It is a multiple signature wallet where you can setup a shared wallet account with private key for all account holders.
If you use Bitcoin then this Copay client can be very useful for you. It is also an open source wallet, so if you are a app developer or enterprise user you can take full control of Copay wallet by making tweaks as per your preferences.
Skype is very popular video calling application software on Windows operating system. If you already moved from Windows to Ubuntu or planning to do so you might not want to switch back to Windows just to use applications like Skype whenever in need. Skype can be very useful for you no matter what kind of user you are.
4. VLC Media Player
VLC is the coolest media player available on internet for various platforms including Linux. I am calling it a coolest because it is an open source cross-platform media player as well as it plays all the media files without any issue no matter which media file format you have. It also offers online media streaming which many media players don’t support.
5. Ubuntu Cleaner
Ubuntu cleaner is useful tool to free up space on Ubuntu. You can clean browser caches and remove packages that are not useful to you anymore. This app can be very useful for many Ubuntu users with limited storage.
Corebird is very popular and #1 ranked Linux twitter client. If you are looking for something other than a traditional browser to use twitter on Linux then Corebird twitter client is must have for you. Corebird offers all the features available in Twitter app for Android or iOS phones. It supports multiple accounts, notifications any many other features.
7. Gnome Multi-Writer
Gnome Multi-Writer is a USB tool can be used to write image files. It has a simple user interface which guides you through process of writing image files to external storage devices such as an SD card or USB flash drive.
Evince is a simple document viewer but can be useful for any type of users. If you love reading eBooks then Evince can be a must have app for you on Linux. It supports almost all the document formats used nowadays.
Clementine is a very popular cross-platform music player. This music player comes with a very simple user interface and it is very easy to use. If you are looking for dedicated music player then Clementine could be suitable for you. It supports all the music file formats with support for built in lyrics, artist and music information.
There are many cloud storage apps available on internet but still Dropbox is best in the business. Dropbox keeps on introducing new features that no competitor can match. Many cloud storage apps don’t have a dedicated client for Linux but Dropbox has a very sleek interface which is very easy to use.
Cumulus is a desktop weather client for Linux powered by Yahoo Weather. Cumulus is developed in Python and has a user friendly interface so that you can set it up easily. Some of the features of this desktop client include 5 day weather forecast and real time weather at your preferred location.
12. Gnome Tweak Tool
If you are new to Linux you might find it difficult to configure system initially. Gnome Tweak Tool will ease this process little bit for you. Using this tool you can customize themes, icons and many other system configurations.
Krita is a digital painting and image editing application software which is developed under KDE Project. Krita very similar to Adobe Photoshop on Windows platform because of many features and tools in Krita are identical to those in Adobe Photoshop.
14. Wine HQ
When it comes to running Windows applications on Linux system Wine which is known as Wine Is Not An Emulator is the #1 recommended software. Many games and applications of Windows are still not available for Linux platform hence using Wine you can use them on Linux system without any trouble.
15. Open Shot
Open Shot is the cross-platform video editing software which is available for Windows, Linux and Mac OS. Open Shot is developed in Python and offers many features like drag and drop, video trimming, 3D titles, transition effects. It also supports a majority of audio and video formats.
Linux users always struggled to play games on their system but thanks to Steam for releasing its client for Linux system now users can enjoy almost all the games available for the Windows platform. If you have switched to Linux and miss playing games on Windows don’t resist yourself anymore just download Steam client for your Linux system.
17. Visual Studio Code
Visual Studio Code is an open source code editor where you can develop, debug web cloud applications. It is integrated with Git out of the box. You will find it very similar to Sublime Text and Atom text editor.
Kazam is a very cool screen recording tool available for Linux. If you are beginner then Kazam is must have tool for you. It is a simple tool with user friendly interface so that you can get your task completed easily. Kazam supports multiple video and audio output formats.
19. Nylas Mail
Nylas Mail is an email client for Linux developed using open web technologies. It has very good user interface which you will find very easy to use. It offers various features like unified inbox for all the major email providers, contacts management and calendar integration.
20. GitBook Editor
GitBook Editor is cross-platform editor which is available for Linux, Windows and Mac OS. If you are a GitBook user then there is no other better editor for you than GitBook Editor. It offers various features such as drag and drop, expressive mark-up and version control which uses Git technology.
So these are the 20 best Ubuntu apps you shouls download and use in 2018. | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300849.28/warc/CC-MAIN-20220118122602-20220118152602-00347.warc.gz | CC-MAIN-2022-05 | 7,035 | 35 |
https://community.windows.com/en-us/search?q=find%20my%20device&p=50 | code | Results for: find my device
The Search in taskbar of computer suddenly becomes unusable.
[Emergencies] The Search feature in the taskbar at the bottom of my computer suddenly becomes unusable. Hi, I'm a Microsoft Independent Community Advisor, responsible for technical support for Windows in Microsoft Community in China. Today, we received reports from dozens of users about the "search function in the taskbar is not working properly" issue. Users reported that it would not pop up any search results when they entered anything in the search box. We don't know if this issue only occurs in China, but we have submitted feedback through the FeedBack Hub app. I sincerely wish Microsoft this issue as soon as possible and thank you all the Microsoft engineers for their efforts! Best wishes! Ling Gao - Microsoft Windows Insider, Microsoft Independent Community Advisor.
My "w" key does not work
I have a keyboard problem and am hoping I can get some help. My Pavilion dv7 "w" does not work at all and my "e" key works when it wants to. I am tired of copy and paste a w every morning and tapping like a maniac on the e until it works. PLEASE HELP ME!
Is Feedback Hub really taking my answers?
Most productive features in Windows 10
Hi There, What are the new productive features you enjoy the most in Windows 10, and why? Please share your experience in the comment. Thanks, Bassel
Your favorite Windows feature that not many know about
What feature is not used enough that you think is awesome or can't live without? The on-screen touchpad is one that can be really helpful in a pinch!
How to Remove pup.optional.mindspark virus?
Hi Everyone! Need bit help. Can anyone solve my issue of pup.optional.mindspark virus? I want to remove it completely. There is no option to uninstall in control panel. I am facing this issue in all of my browsers; chrome, internet explorer and mozilla. Need permanent solution to remove it. Thanks in advance.
Feature update to Windows 10, version 2004
I just manually updated to this newest version as an option. No known issues, is anyone else having a smooth experience with their update?
Capture your ideas with Windows Ink on Microsoft Whiteboard
With Microsoft Whiteboard and a pen, you can capture all your ideas and notes!
Why so many updates?
Always updates. Why?
If Windows 10 Home Single Language N were made
I would like them to make Windows 10 Home Single Language N by the update 2105 or 21H1, a missing edition of Windows 10 that should exist, removing the Media Feature Pack.
To find or fix your device: Sign in to account.microsoft.com/devices. Find the device you want to find, then select Show details. Either select Find my device.
Find your Windows device Go to https://account.microsoft.com/devices and sign in. Select the Find My Device tab. Choose the device you want to find, and then select Find to see a map showing your device's location.
Sign in to account.microsoft.com/devices. Find the device you want to find, then select Show details. Select Find my device. To check for any security issues, go to Windows Defender settings, select Show details, and check your security status.
Select Devices, and then select All devices. From the list of devices you manage, choose a Windows or iOS/iPadOS device, and choose.... Then choose the Locate device remote action. After the device is located, its location is shown in Locate device. | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487625967.33/warc/CC-MAIN-20210616155529-20210616185529-00451.warc.gz | CC-MAIN-2021-25 | 3,396 | 24 |
https://www.counselheal.com/articles/40583/20210205/how-to-migrate-to-sharepoint-on-a-development-platform.htm | code | How to Migrate to SharePoint on A Development Platform
There are lots of technical tips available for IT professionals who would like to migrate to SharePoint out of Windows environments. However, not all them will be useful. There are lots of advantages to migrating to SharePoint from a Windows environment, which you ought to consider before beginning. Here is one important SharePoint migration tip that will help you get started.
To migrate to SharePoint from a Windows or Office 2021 environment, there are five key advantages. You've got access to the Microsoft 365 providers, such as Microsoft 365 Groups, Microsoft 365 Subscriptions, and Microsoft 365 Enterprise Manager. One of the primary benefits to migrating to SharePoint from a Windows environment is that you can take advantage of all of the new features available in MS Office 365: Word, Excel, PowerPoint, and Outlook.
Consolidate and streamline your workflow With SharePoint, it's easier to collaborate with others and manage your files and projects. You'll also end up saving far more time. One of the primary benefits to migrate from a Windows environment is that you've got a host of third party applications that are pre-installed on your computer. These third-partyparty application programs consist of such heavy-duty utilities as FrontPage. Many of these programs are no longer supported on the older versions of Windows.
If you use Microsoft SharePoint 2021, there's the possibility to migrate to the new version online. For users who do not yet have an online SharePoint account, the ideal migration solution is to use the Microsoft 365 migration tool that's included with MS Office 365. Using this tool, you can migrate into SharePoint 2021 without installing any additional hardware or software. This feature also makes it easier to schedule the task so that you won't need to worry about missing any important work or emails.
The migration project also includes many different tests that will run before the upgrade to make certain everything is moving smoothly. The tests will run to be certain every scenario looks correct and nothing is missing from the SharePoint 2021 document library. Additionally, it tests for lost items, broken links, missing possessions and other scenarios that could cause a problem during the migration. It's best to have an experienced SharePoint developer perform the entire migration project since it can be quite complex.
Besides performing the test tasks throughout the SharePoint migration project, there are numerous different things you can do before the upgrade to find out if there are things that could break through the migration project. The main thing is to personalize your PC settings so the customizations will match what is already installed on your computer. There are some customizations that are only available from the cloud rather than in the SharePoint, which make upgrading a bit more challenging.
The majority of these customizations will only take a few minutes to perform, but it is worth taking a little time to understand how to carry out the essential tasks for the migration. By opening an administrative form, you can get all of the features that are accessible through the SharePoint application on the server, like the calendar, contact information, project information, web pages, and so much more. You'll then need to go into the clouds and find the section where you can configure the settings for the backend. For the technical person, this might seem like a complicated process, but the more experience you gain, the easier it will become.
With the cloud integration of SharePoint, it is possible to install customizations and business rules which will make life much easier. If you're not knowledgeable about how SharePoint works, it's definitely something that should be taken care of prior to the migration. The aim is to have everything up and running smoothly from the time that you migrate into SharePoint on the development workstation, until you are ready to use it on your principal business server. The technical side of the migration is easy but getting the fine-tuning and fine-grained customization for the backend is where it can get tricky. If you get it right, there should be nothing preventing you from being able to go back and forth between the clouds and the on-premise SharePoint. | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358953.29/warc/CC-MAIN-20211130050047-20211130080047-00533.warc.gz | CC-MAIN-2021-49 | 4,352 | 9 |
https://phabricator.wikimedia.org/T241592 | code | Once a new section has been translated and published with Section Translation (T243495), an invitation is shown to encourage the user to either edit the page further or translate a new section.
View this step in prototype for a general overview.
|Overview||Layout diagram||Layout detail|
Below are described in more detail the different pieces supporting this step.
In the case where there is no other section missing for the article, the call to action will be "Expand another article". Which will lead the user to the Translation Dashboard in the suggestions view. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100309.57/warc/CC-MAIN-20231202010506-20231202040506-00233.warc.gz | CC-MAIN-2023-50 | 566 | 5 |
https://www.appropedia.org/User:Adw259 | code | Name: Alexander Woodard
- I am a junior journalism major from sunny Southern California. I am interested in learning about different parts of the world and their cultures as well as teaching English as a second language. Some of my other interests include hiking, backpacking, photography, writing, listening to music and meeting/interacting with people from other parts of the world. I also try to be actively involved in the Couch Surfing community. After graduating, I hope to end up in Germany either working or for a masters program. Currently, I study at Cal Poly Humboldt.
My favorite page on Appropedia is Lush Cosmetics | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00544.warc.gz | CC-MAIN-2023-40 | 628 | 3 |
https://www.intel.com/content/www/us/en/support/articles/000007361/server-products/server-boards.html | code | When an Intel® Xeon Phi™ Coprocessor or multiple PCI Express* (PCIe*) adapters are installed, the following error can display during POST, and the server halts: 0146 - PCI out of resource
To resolve the issue, follow these steps:
- Temporarily remove the add-on PCI Express adapters.
- Update the BIOS and firmware to the latest revision.
- Disable any unused devices and Option ROMs in the BIOS.
- For onboard SATA/SAS controllers, go to Advanced > Mass Storage Controller Configuration.
- For onboard NICs, go to Advanced > NIC Configuration.
- Go to Advanced > PCI Configuration.
- Set Maximize Memory below 4 GB to Disabled.
- Set Memory Mapped I/O above 4 GB to Enabled.
- Set Memory Mapped I/O Size to 256 G or higher, for an Intel® Xeon Phi™ Coprocessor. For other PCIe Adapters, use an appropriately large value.
- Install the add-on PCI Express adapters one at a time and see if the server boots properly. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500357.3/warc/CC-MAIN-20230206181343-20230206211343-00493.warc.gz | CC-MAIN-2023-06 | 920 | 12 |
https://en.wikipedia.org/wiki/YAK_(cryptography) | code | The YAK is a public-key authenticated key agreement protocol, proposed by Feng Hao in 2010. It is considered the simplest among the related protocols, including MQV, HMQV, Station-to-Station protocol, SSL/TLS etc. The authentication is based on public key pairs. As with other protocols, YAK normally requires a Public Key Infrastructure to distribute authentic public keys to the communicating parties.
Two parties, Alice and Bob, agree on a group with generator of prime order in which the discrete log problem is hard. Typically a Schnorr group is used. In general, YAK can use any prime order group that is suitable for public key cryptography, including elliptic curve cryptography. Let be Alice's long-term public key and be Bob's. The protocol executes in one round:
Alice selects and sends out together with a zero-knowledge proof (using for example Schnorr non-interactive zero-knowledge proof as described in RFC 8235) for the proof of the exponent . Similarly, Bob selects and sends out together with a zero-knowledge proof for the proof of the exponent . Here, the notation denotes an element selected randomly with uniform probability.
The above communication can be completed in one round as neither party depends on the other. When it finishes, Alice and Bob verify the received zero-knowledge proofs. Alice then computes . Similarly, Bob computes . With the same keying material , Alice and Bob can derive a session key using a cryptographic hash function: .
The use of well-established zero-knowledge proof primitives such as Schnorr's scheme greatly simplifies the security proofs. Given that the underlying zero knowledge proof primitive is secure, the YAK protocol is proved to fulfill the following properties.
- Private key security – An attacker cannot learn the user's static private key even if he is able to learn all session-specific secrets in any compromised session.
- Full forward secrecy – Session keys that were securely established in the past uncorrupted sessions will remain incomputable in the future even when both users' static private keys are disclosed.
- Session key security – An attacker cannot compute the session key if he impersonates a user but has no access to the user's private key.
- F. Hao, On Robust Key Agreement Based on Public Key Authentication (short paper). Proceedings of the 14th International Conference on Financial Cryptography and Data Security, Tenerife, Spain, LNCS 6052, pp. 383–390, Jan, 2010. | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742685.33/warc/CC-MAIN-20181115120507-20181115142507-00313.warc.gz | CC-MAIN-2018-47 | 2,471 | 9 |
https://www.dk.freelancer.com/projects/php/magento-add-image-overlay-feature/ | code | We are using the Advanced Product Options plugin for M2 developed by Mageworx: [login to view URL]
Basically, this plugin allows the customer to select configurable options with dependancy, and the M1 version allowed you to overlay a graphic relating to each option selected over the main product image. This feature was left out of the M2 version for some reason.
We need this feature added for M2 version.
You can see an example of the M1 image overlay in this demo:
[login to view URL]
I can supply plugin code for both versions.
37 freelancere byder i gennemsnit £169 på dette job
Hello IT5, I have checked your requirements very carefully and I can complete this project. Please let us know convenient time to connect online, we are very much interested to discuss your requirement in detail
Hi there As a senior magento 2 developer, I have extensive background in extension customization and I feel confident that i can complete your job in time. Regards, James
Hi can I help you ? I am magento developer and designer, I am interested to work with you, I will do this job, can we discuss ? waiting for your reply. bye. | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583826240.93/warc/CC-MAIN-20190122034213-20190122060213-00157.warc.gz | CC-MAIN-2019-04 | 1,126 | 10 |