id
string | probability
float64 | text
string |
---|---|---|
<urn:uuid:528ab539-c6ba-441e-8389-65704e6c3be1>
| 0.046313 |
You must be a registered member to view this page.|
If you are already a member, sign in now.
To register for your own account, sign up now.
Signing up will REMOVE MOST OF THE ANNOYING ADS from your screen.
CLICK HERE TO CREATE YOUR ACCOUNT
- Get advice
- Make friends
- Share your expertise
- Post in our forums
- Send private messages
- Join interest groups
- Be a community leader
- Track your mood
- Upload photos
|
<urn:uuid:095340b9-8a67-45ac-afb3-250bec8e3efd>
| 0.196725 |
I’ve a new release of NYTProf ready to upload but I’m stuck.
The CPAN Testers service is reporting a failure on a number of systems but I can’t reproduce it locally or work out the cause.
Can you reproduce the failure with Devel::NYTProf 2.07_94? If so, could you give me remote access via ssh? (Or spare some time to investigate yourself – I’ll happily clue you in if you can reproduce the problem.)
Update: No one could reproduce it. It seems that the failures was not what it appeared to be. A clue was that only one tester was affected. Devel-NYTProf-2.07_94.tar.gz unpacked itself into a directory called Devel-NYTProf-2.07. It seems that when using CPANPLUS if the user had already got an old Devel-NYTProf-2.07 directory its contents got merged and tests would fail. I’m not convinced that’s the whole story, but Devel-NYTProf-2.07_95.tar.gz unpacked into a Devel-NYTProf-2.07_95 directory and didn’t run into the problem.
Update: More usefully, Andreas made my wish come true by pointing out the –solve parameter to the ctgetreports utility in his CPAN::Testers::ParseReports distribution. It “tries to identify the best contenders for a blame using Statistics::Regression. [...] The function prints the [...] top 3 candidates according to R^2 with their regression analysis.” Cool.
|
<urn:uuid:10662c43-2e23-4013-94f7-8df7fe966cba>
| 0.039937 |
Chat Box Chicks ~ Welcoming the New Year!
View Single Post
02-10-2013, 03:02 PM
Join Date: Sep 2006
Does anyone have the long rectangle nesties? They're on my wish list but I'm wondering if I'd really make use out of them.
View Public Profile
Send a private message to laurlynn
Visit laurlynn's Gallery
Find More Posts by laurlynn
|
<urn:uuid:84cf351a-5534-4b94-ac2d-dcd4b7b58708>
| 0.890076 |
Subject: Binary updates all installed pkgs? To: None <[email protected]> From: Mark Weinem <[email protected]> List: tech-pkg Date: 02/21/2005 22:20:06
How to update all installed pkgs using binary packages? So, if my
installed packages are from ../packages/pkgsrc-2004Q3 how to update all
of them using the packages from .../packages/pkgsrc-2004Q4?
Regards, Mark Weinem
|
<urn:uuid:09fe8327-fcb9-4a20-9d0a-61e0a300b31a>
| 0.058968 |
Need a good browser CSS editor - where I can save the stylesheet.
I just came across Stylebot for Chrome. Its pretty awesome, except I dont think it allows you to save the stylesheet to your local disk after making changes.
Can somebody refer me to a CSS editor that allows you to save stylesheets?
You can use NotePad++ to save files as .css files.
Style sheets should be universal for any browser. I'd stay away from anything slanted toward one browser or another.
good thinking! lol
I used to have a browser css editor that had the feature to save the stylesheets. I didnt even think to simply just open a notepad or blank document and copy+paste to create my own stylesheets.
Users Browsing this Thread
There are currently 1 users browsing this thread.
(0 members and 1 guests)
|
<urn:uuid:d2e82e25-4621-43af-8ec1-94ae43a89bf5>
| 0.100174 |
[amsat-bb] Re: Dish surface 'flatness'
antonio at qualcomm.com
Fri Jul 25 21:35:16 PDT 2008
At 03:00 PM 7/25/2008, Peter Ellis wrote:
>Now, I need to re-mesh the dish, but I need to decide what 'flatness'
>('true-ness') the surface should be. There has to be a formula, that
>encompasses things like: frequency of operation, curvature or focus
Focal length, f/d, etc are irrelevant. The thing that is relevant is
wavelength of your signal. You want the variations in the dish's
surface to be small relative to a wavelength. 1/4 wavelength is
ok. 1/8th wavelength is better. Better than that matters not much.
Its not to hard to get an intuitive feel for what is going
on. Suppose you have a dish that is a perfect paraboloid, except for
one little dent that's a little farther from the focus. Suppose the
dent is 1/2 wavelength farther from the focus than the rest of the
dish. The signal that reflects off of that dent will be 1/2
wavelength late, in other words 180 degrees out of phase with the
rest of the signal, and will therefore SUBTRACT from the rest of the
signal. That isn't good. That's a clue that 1/2 wavelength is too
much variation. You can go thru the same sort of thinking with a 1/4
wavelength dent and see that the effect is much smaller, etc.
More information about the AMSAT-BB
|
<urn:uuid:577602b4-c59a-4bf2-a993-53ecf38aca0e>
| 0.102934 |
- Sunday: 1 Samuel 24:1-25:44, John 10:22-42, Psalm 116:1-19, Proverbs 15:20-21
- Monday: 1 Samuel 26:1-28:25, John 11:1-54, Psalm 117:1-2, Proverbs 15:22-23
- Tuesday: 1 Samuel 29:1-31:13, John 11:55-12:19, Psalm 118:1-18, Proverbs 15:24-26
- Wednesday: 2 Samuel 1:1-2:11, John 12:20-50, Psalm 118:19-29, Proverbs 15:27-28
- Thursday: 2 Samuel 2:12-3:39, John 13:1-30, Psalm 119:1-16, Proverbs 15:29-30
- Friday: 2 Samuel 4:1-6:23, John 13:31-14:14, Psalm 119:17-32, Proverbs 15:31-32
- Saturday: 2 Samuel 7:1-8:18, John 14:15-31, Psalm 119:33-48, Proverbs 15:33
Scripture: 1 Samuel 25:40-41
40 When the messengers arrived at Carmel, they told Abigail, "David has sent us to ask if you will marry him." 41 She bowed low to the ground and responded, "Yes, I am even willing to become a slave to David's servants!"
John 10:26-27 "26 But you don't believe me because you are not part of my flock. 27 My sheep recognize my voice; I know them, and they follow me."Observation:
Nabal was a fool with a beautiful and smart wife (I know what you're thinking here... that could be me at times ;). Even though David has protected him and his servants and flocks, he insults David and his men. David is ready to take vengeance in his own hands, if it wasn't for the sensible Abigail. Today's verse in Proverbs 15:21 says:
"Foolishness brings joy to those who have no sense; a sensible person stays on the right path."This verse very much applied to Nabal and Abigail! What struck me in this passage is the fact that Abigail is ready to leave all her wealth behind and become the wife of a chased-after ragtag band leader. How can that be? Well, Abigail recognizes that David is God's chosen shepherd. She recognizes that he will lead the LORD's people and become the chief-shepherd of His flock. As Jesus says in John 10: "My sheep recognize my voice", so Abigail recognizes God's voice through David and wants to follow him.
I want to become sensible like Abigail, to recognize the voice of the Shepherd in the midst of a dire situation. I want to be forward looking to the time when he will come back to earth a second time, to judge the Nabals of this world, and to gather his flock to take part in the wedding feast.
Dear Heavenly Father, give me 'sense' like Abigail had, and help me to avoid the foolishness and selfishness that Nabal displayed. I want to hear your voice and follow you alone. In Jesus Name, the chief Shepherd. Amen.
Today Pentecost is celebrated across the world, the outpouring of the Holy Spirit. I pray that you may be filled with a holy fire that truly transforms your life. Have a great week.
|
<urn:uuid:2b8b2f66-3027-41e7-ab94-22b8fcd1233c>
| 0.491628 |
Anaconda iSCSI Cleanup
Improve anaconda's iSCSI support.
This is a complete iscsi rewrite that also adds the new libiscsi and associated python bindings.
- Hans DeGoede <[email protected]>
- Targeted release: [Fedora 11]
- Last updated: (02/10/09)
- Percentage of completion: 95%
iSCSI support in anaconda needed extensive cleanup. This feature replaces existing code with new code using libiscsi.
- Report error when we cannot add a disk instead of silently failing (461830)
- Report error when trying to use iscsi from kickstart without having an iscsiname directive first (463156)
- Better feedback while scanning iscsi disks
- Make ibft work with chap and 2-way chap
- Make ibft configured disks available for upgrades and in rescue mode
- Make ibft boot work even when iscsi-initiator-utils is installed after the kernel in the transaction
- For non ibft discovered devices, the sendtargets discovery authentication information (username and secret) must be identical to the authentication information for the portal to the target.
Benefit to Fedora
Fewer anaconda bugs and easier maintenance. Additional support for ibft, CHAP, reverse CHAP.
- Review and fix numerous reported problems
- Include latest ibft, CHAP and reverse CHAP support
- Test install to a regular disk with /home on iscsi using no authentication
- Test install to a regular disk with /home on iscsi using 1-way CHAP
- Test install to a regular disk with /home on iscsi using 2-way CHAP
- Test install with / on iscsi using an iBFT capable system using no authentication
- Test install with / on iscsi using an iBFT capable system using 1-way CHAP
- Test install with / on iscsi using an iBFT capable system using 2-way CHAP
- Test install with / on 1 iscsi target and /home on a different target using an iBFT capable system
- Test install with / on 1 iscsi lun and /home on a different lun of the same target using an iBFT capable system
- When using NetworkManager for network configuration and using an iscsi /, other iscsi based file systems (ie /boot) will not be brought up automatically.
None; this is a necessary revision of existing (broken) support
See http://people.atrpms.net/~hdegoede/html/index.html for details of the libiscsi API
Not user visible so none needed
|
<urn:uuid:10087292-d93b-4a7b-b0e5-e2ce81a98e64>
| 0.060574 |
It’s hard to say how popular Chrome OS, Google’s browser-centric operating system, really is. There can be little doubt, though, that Google is quite serious about this initiative. Today, Google launched the latest developer version of Chrome OS and this update sports the first major redesign of the operation system’s interface since its launch in late 2010.
In this new version, Chrome OS almost looks like a traditional OS, with a full-blown desktop and window manager instead of just a browser and tabs. Aura, as this hardware-accelerated window manager is known, is Chrome’s next generation user interface framework and it is making its public debut in this new developer version of Chrome OS.
This update is quite a departure from Chrome OS’s origins. Until now, Chrome OS basically just gave users access to a single browser window at a time (you could already have multiple browser windows open on separate virtual screens) and launching new apps meant you first had to open a new tab and then look for the app you wanted to start. Now, Chrome OS features a Launchpad-like app launcher, as well as a Windows-like taskbar (Google calls it a “shelf”). Apps, it is worth noting, still start in a browser tab and not as stand-alone windows, though.
In short, Chrome OS now looks and behaves a lot more like the desktop operating systems it set out to challenge.
In a way, this almost feels as if Google is admitting defeat here. When Chrome OS launched, Google’s Sergey Brin argued that traditional PC operating systems were “torturing users.” Chrome OS was supposed to be all about “speed, simplicity and security” and Google wanted to use it to “re-think what operating systems should be.” This new version, however, does away with a bit of this simplicity in favor of greater functionality. That’s not necessarily a bad thing, though, and may just help Chrome OS gain more mainstream acceptance as new users will surely find it to be a more familiar experience.
While Aura is obviously the star of this update, it’s worth noting that the latest version also introduces support for files compressed in the .tar, .gz and .bzip2 formats, as well as better support for multi-monitor setups.
|
<urn:uuid:f93c292f-153c-443d-83ff-927313ddb29a>
| 0.405925 |
Poky is an embedded Linux build system, distribution and developer environment which builds upon OpenEmbedded technologies. Poky's focus is purely on building stable optimised GNOME Embedded type platforms (X11/Matchbox/GTK+) together with a streamlined system layer and cross development environment.
Poky Project Page: http://www.pokylinux.org/
Poky's core consists of a set of metadata describing packages and rules to produce a cross-compiled filesystem for a specified target device. The metadata itself is highly customisable and extensible, and can be tailored to a particular target device's needs.
Through integration with QEMU (both ARM and x86 host virtualisation) or chroot-like tools, Poky provides a unique cross-application development environment.
- Linux 2.6.x kernel support.
- x86 and ARM (both OABI and EABI) architecture support out the box with provision for others too .
- Complete cross-compiling toolchain generation (gcc 3.4 and gcc 4.1 supported).
- System layer with tuned Busybox, tslib, glibc2.x, Kdrive 7.1 XServer (aka TinyX) and more.
- Complete customisable and optimised GNOME Embedded platform support for:
- Gstreamer EDS Embedded
- Optional dpkg (Debian) or Ipkg software packaging support.
- QEMU (x86 and ARM) integration.
- Release, debug, profiling and SDK filesystem image builds supported.
- Easily ported to new boards/platforms to provide an incredably well featured BSP.
- Support for OProfile performance measurements with remote graphical UI.
- Support for Linux Trace Toolkit (LTTng) for further performance debugging.
- Fast multithreaded builds (two hours for full filesystem on commodity dual core hardware)
- 100% Open Source
Poky is freely downloadable, being open source software. The Poky metadata itself is distributed under an MIT licence with tools it uses being under various other open source licenses. It is primarily developed by developers at OpenedHand with suitable improvements being pushed back up stream to OpenEmbedded.
|
<urn:uuid:0a7ef879-0b58-400b-be23-a6b28361ea76>
| 0.059933 |
UEFA Euro 2012
|Mistrzostwa Europy w Piłce Nożnej 2012
Чемпіонат Європи з футболу 2012
UEFA Euro 2012 official logo
|Dates||8 June – 1 July|
|Venue(s)||8 (in 8 host cities)|
|Champions||Spain (3rd title)|
|Goals scored||76 (2.45 per match)|
|Attendance||1,440,896 (46,481 per match)|
|Top scorer(s)|| Mario Mandžukić
(3 goals each)
|Best player||Andrés Iniesta|
The 2012 UEFA European Football Championship, commonly referred to as Euro 2012, was the 14th European Championship for national football teams organised by UEFA. The final tournament was hosted for the first time by Poland and Ukraine, between 8 June and 1 July 2012, after their bid was chosen by UEFA's Executive Committee in 2007. Euro 2012 set the record for both the highest aggregate attendance (1,440,896) and the highest average attendance per game (46,481) under the 16-team format (since 1996).
The final tournament featured 16 nations, the last European Championship to do so; from Euro 2016 onward, there will be 24 finalists. Qualification was contested by 51 nations between August 2010 and November 2011 to determine the remaining 14 finalists. The tournament was played across eight venues, four in each host country, five of which were newly built for the tournament. Aside from venues, the host nations have also invested heavily in improving infrastructure, such as railways and roads, at UEFA's request.
The tournament opened with a 1–1 draw between Poland and Greece at the National Stadium in Warsaw on 8 June 2012. The final match took place 23 days later on 1 July 2012 at the Olympic Stadium in Kiev, where Spain defended their title with a 4–0 win over Italy. Spain became the first team to win two consecutive European Championships, and the first international team to win three straight major tournament titles (Euro 2008, 2010 World Cup and Euro 2012). Since Spain had already gained entry to the 2013 Confederations Cup by winning the 2010 World Cup, the runners-up Italy qualified.
Euro 2012 was the second consecutive European Championship (after Euro 2008 held in Austria and Switzerland) in which neither of the hosts emerged from the group stage,[a] as both Poland and Ukraine were eliminated.
Bid process
The hosting of the event was initially contested by five bids representing seven countries: Croatia–Hungary, Greece, Italy, Poland–Ukraine, and Turkey. After an initial consideration of the bid data in 2005 by UEFA both the Greek and Turkish bids were eliminated from the process to leave three candidates. This was followed by a second round of the selection process which among other included visits by UEFA to all candidates. On 18 April 2007, the Poland–Ukraine bid was chosen by a vote of the UEFA Executive Committee at a meeting in Cardiff.
Poland–Ukraine became the third successful joint bid for the European Championship, after those of Belgium–Netherlands (2000) and Austria–Switzerland (2008). Their bid received an absolute majority of votes, and was therefore announced the winner, without requiring a second round. Italy, which received the remaining votes, had been considered favourites to win the hosting, but incidents of fan violence and a match fixing scandal were widely cited as factors behind their failure.
There were some later alterations from the initial bid plan, regarding the venues, before UEFA confirmed the eight host cities in 2009. During the preparation process in Poland and Ukraine, UEFA repeatedly expressed concern about their preparation to host the event, with different candidates reported as being alternative hosts if they did not improve; however, in the end, UEFA affirmed their selection.
The draw for the UEFA Euro 2012 qualifying competition took place in Warsaw on 7 February 2010. Fifty-one teams entered to compete for the fourteen remaining places in the finals, alongside co-hosts Poland and Ukraine. The teams were divided into nine groups, with the draw using the new UEFA national team coefficient for the first time in order to determine the seedings. As defending champions, Spain was automatically top seeded. The qualifying process began in August 2010 and concluded in November 2011. At the conclusion of the qualifying group stage in October 2011, the nine group winners qualified automatically, along with the highest ranked second placed team. The remaining eight second placed teams contested two-legged play-offs, and the four winners qualified for the finals.
Twelve of the sixteen finalists participated at the previous tournament in 2008. England and Denmark made their return to the Euro, having last participated in 2004, while Republic of Ireland returned after a twenty-four year absence to make their second appearance at a European Championship. One of the co-hosts, Ukraine, made their debut as an independent nation (before 1992 Ukraine participated as part of the Soviet Union). With the exception of Serbia – according to UEFA's ranking at the end of the qualifying stage – Europe's sixteen highest-ranked teams all qualified for the tournament.
Qualified teams
The following sixteen teams qualified for the finals:
|Country||Qualified as||Date qualification was secured||Previous appearances in tournament1|
|Poland||Co-hosts||18 April 2007||1 (2008)|
|Ukraine||Co-hosts||18 April 2007||0 (debut)|
|Germany2||Group A winner||2 September 2011||1972, 1976, 1980, 1984, 1988, 1992, 1996, 2000, 2004, 2008)10 (|
|Russia3||Group B winner||11 October 2011||9 (1960, 1964, 1968, 1972, 1988, 1992, 1996, 2004, 2008)|
|Italy||Group C winner||6 September 2011||7 (1968, 1980, 1988, 1996, 2000, 2004, 2008)|
|France||Group D winner||11 October 2011||71960, 1984, 1992, 1996, 2000, 2004, 2008)(|
|Netherlands||Group E winner||6 September 2011||8 (1976, 1980, 1988, 1992, 1996, 2000, 2004, 2008)|
|Greece||Group F winner||11 October 2011||3 (1980, 2004, 2008)|
|England||Group G winner||7 October 2011||71968, 1980, 1988, 1992, 1996, 2000, 2004)(|
|Denmark||Group H winner||11 October 2011||71964, 1984, 1988, 1992, 1996, 2000, 2004)(|
|Spain||Group I winner||6 September 2011||81964, 1980, 1984, 1988, 1996, 2000, 2004, 2008)(|
|Sweden||Best runner-up||11 October 2011||4 (1992, 2000, 2004, 2008)|
|Croatia||Play-off winner||15 November 2011||31996, 2004, 2008)(|
|Czech Republic4||Play-off winner||15 November 2011||71960, 1976, 1980, 1996, 2000, 2004, 2008)(|
|Portugal||Play-off winner||15 November 2011||51984, 1996, 2000, 2004, 2008)(|
|Republic of Ireland||Play-off winner||15 November 2011||11988)(|
1 Bold indicates champion for that year. Italics indicate (co-)host.
Final draw
The draw for the final tournament took place on 2 December 2011 at the Ukraine Palace of Arts in Kiev, Ukraine. The hour-long ceremony was hosted by Olga Freimut and Piotr Sobczyński, television presenters from the two host countries.
As was the case for the 2004 and 2008 finals, the sixteen finalists were divided into four seeding pots, using the UEFA national team coefficient ranking. The pot allocations were based on the UEFA national team coefficient rankings of the sixteen finalists at the end of the qualifying competition in November 2011. Each nation's coefficient was generated by calculating:
- 40% of the average ranking points per game earned in the UEFA Euro 2012 qualifying stage.
- 40% of the average ranking points per game earned in the 2010 FIFA World Cup qualifying stage and final tournament.
- 20% of the average ranking points per game earned in the UEFA Euro 2008 qualifying stage and final tournament.
Aside from the coefficient, three teams were automatically placed in Pot 1. Ukraine and Poland were both assigned to Pot 1 as the two host nations, despite the fact that their rankings were the two lowest in the tournament; this also occurred in 2008 when the co-hosts Switzerland and Austria were also ranked below all other qualified teams. As defending champions, Spain were also automatically assigned to Pot 1, though their UEFA ranking at the time of the draw was coincidentally also the best.
In the draw procedure, one team from each pot was drawn into each of the four groups. The draw also determined which place in the group teams in pots 2–4 would take (e.g. A2, A3 or A4) to create the match schedule. With Poland were automatically assigned in advance to A1, and Ukraine to D1, Pot 1 only had two teams as Spain and the Netherlands were to be drawn into position one in either group B or C. The balls were drawn by four former players who had each been part of European Championship winning teams: Horst Hrubesch, Marco van Basten, Peter Schmeichel and Zinedine Zidane.
1 Co-hosts Poland (coefficient 23,806, rank 28) and Ukraine (coefficient 28,029, rank 15) were automatically assigned to A1 and D1, and therefore were not in the draw.
2 Defending champions were automatically assigned to Pot 1.
Eight cities were selected by UEFA as host venues. In a return to the format used at Euro 1992, Euro 1996 and Euro 2008, each of the four groups' matches were played in two stadiums. Host cities Warsaw, Gdańsk, Wrocław, Poznań, Kiev, and Lviv are all popular tourist destinations, unlike Donetsk and Kharkiv, the latter of which replaced Dnipropetrovsk as a host city in 2009.
In order to meet UEFA's requirement for football infrastructure improvements, five new stadiums were built and opened in advance of the tournament. The remaining three stadiums (in Kiev, Poznań and Kharkiv) underwent major renovations in order to meet UEFA's infrastructure standards. Three of the stadiums are categorised as UEFA's highest category stadiums. The transport infrastructure in Poland and Ukraine was also extensively modified on the request of UEFA to cope with the large influx of football fans.
UEFA organised fan zones in the eight host cities. They were located in the centre of each city, with all 31 matches shown live on a total of 24 giant screens. The zones enabled supporters to come together in a secure and controlled environment. The Warsaw Fan Zone occupied 120,000 square meters and accommodated 100,000 visitors. In all, the fans zones had a 20% increase in capacity compared to Euro 2008.
A total of 31 matches were played during Euro 2012, with Ukraine hosting 16 of them and Poland 15.
Built for tournament
Built for tournament
Built for tournament
|3 matches in Group A
(incl. opening match),
1 quarter-final and
|3 matches in Group C and
|3 matches in Group A||3 matches in Group C|
Built for tournament
Built for tournament
|3 matches in Group D,
1 quarter-final and
|3 matches in Group D,
1 quarter-final and
|3 matches in Group B||3 matches in Group B|
Tickets for the venues were sold directly by UEFA via its website, or distributed by the football associations of the 16 finalists. Applications had to be made during March 2011 for the 1.4 million tickets available for the 31 tournament matches. Over 20,000 were forecast to cross the Poland–Ukraine border each day during the tournament. Over 12 million applications were received, which represented a 17% increase on the 2008 finals, and an all-time record for the UEFA European Championship. Owing to this over-subscription for the matches, lotteries were carried out to allocate tickets. Prices varied from €30 (£25) (for a seat behind the goals at a group match) to €600 (£513) (for a seat in the main stand at the final). In addition to individual match tickets, fans could buy packages to see either all matches played by one team, or all matches at one specific venue.
According to UEFA requirements, TP ensured approximately 2х70 Gbit/sec data communication speed from Polish stadiums and 2х140 Gbit/sec between Poland and Ukraine. This was required due to the fact that the matches were broadcast in HD quality. The multilateral production utilised 31 cameras to cover the action on and around the pitch at every match, with additional cameras following activities around the game, such as team arrivals at the stadiums, interviews, and media conferences. The official Euro 2012 broadcasting centre was located at the Expo XXI International Centre in Warsaw. The tournament was broadcast live by around 100 TV channels covering the whole world. 150,000,000 people were expected to watch the matches each day.
Match ball
The Adidas Tango 12 was the official match ball of UEFA Euro 2012. The ball is named after the original Adidas Tango family of footballs; however, the Tango 12 and its variations have a completely new design. Variations of the ball have been used in other contemporary competitions including the Africa Cup of Nations and the Summer Olympics. It is designed to be easier to dribble and control than the reportedly unpredictable Adidas Jabulani used at the 2010 FIFA World Cup.
Team base camps
Each team had a "team base camp" for its stay between the matches. From an initial list of thirty-eight potential locations (twenty-one in Poland, seventeen in Ukraine), the national associations chose their locations in 2011. The teams trained and resided in these locations throughout the tournament, travelling to games staged away from their bases. Thirteen teams stayed in Poland and three in Ukraine.
|Team||Arrival||Last Match||Base camp||Group stage venues||QF venues||SF venues||Final venue|
|Croatia||5 June||18 June||Warka
|Gdańsk and Poznań|
|Czech Republic||3 June||21 June||Wrocław||Wrocław||Warsaw|
|Denmark||4 June||17 June||Kołobrzeg||Kharkiv and Lviv|
|England||6 June||24 June||Kraków||Kiev and Donetsk||Kiev|
|France||6 June||23 June||Donetsk||Kiev and Donetsk||Donetsk|
|Germany||3 June||28 June||Gdańsk||Kharkiv and Lviv||Gdańsk||Warsaw|
|Greece||3 June||22 June||Jachranka
|Warsaw and Wrocław||Gdańsk|
|Republic of Ireland||5 June||18 June||Sopot
|Gdańsk and Poznań|
|Italy||5 June||1 July||Kraków||Gdańsk and Poznań||Kiev||Warsaw||Kiev|
|Netherlands||4 June||17 June||Kraków||Kharkiv|
|Poland||28 May||16 June||Warsaw||Warsaw and Wrocław|
|Portugal||4 June||27 June||Opalenica
|Kharkiv and Lviv||Warsaw||Donetsk|
|Russia||3 June||16 June||Warsaw||Warsaw and Wrocław|
|Spain||5 June||1 July||Gniewino
|Sweden||6 June||19 June||Kiev||Kiev|
|Ukraine||6 June||19 June||Kiev||Kiev and Donetsk|
For the list of all squads that played in the tournament, see UEFA Euro 2012 squads.
Match officials
On 20 December 2011, UEFA named twelve referees and four fourth officials for Euro 2012. On 27 March 2012, UEFA issued the full list of 80 referees to be used in Euro 2012, including the assistant referees, the additional assistant referees, and the four reserve assistant referees. Each refereeing team consisted of five match officials from the same country: one main referee, two assistant referees, and two additional assistant referees. All of the main referees, additional assistant referees, and fourth officials were FIFA referees, and the assistant referees (including the four reserve assistant referees) were FIFA assistant referees. For each refereeing team, a third assistant referee from each country was named to remain on standby until the start of the tournament to take the place of a colleague if required. In two cases, for the French and Slovenian refereeing teams, the standby assistant referees took the place of one of the assistant referees before the start of the tournament. Continuing the experiments carried out in the UEFA Champions League and UEFA Europa League, the two additional assistant referees were used on the goal line for the first time in European Championship history with approval from the International Football Association Board.
- Final referee; only referee assigned to four matches.
UEFA announced the schedule for the 31 matches of the final tournament in October 2010, with the final confirmation of kick-offs times being affirmed following the tournament draw in December 2011.
Group stage
The teams finishing in the top two positions in each of the four groups (highlighted in tables) progressed to the quarter-finals, while the bottom two teams were eliminated from the tournament.
- Higher number of points obtained in the matches played between the teams in question;
- Superior goal difference resulting from the matches played between the teams in question;
- Higher number of goals scored in the matches played between the teams in question;[c]
- Superior goal difference in all group matches;
- Higher number of goals scored in all group matches;
- If two teams tie alone (according to 1–5) after having met in the last round of the group stage their ranking is determined by penalty shoot-out.
- Position in the UEFA national team coefficient ranking system;
- Fair play conduct of the teams (final tournament);
- Drawing of lots.
Group A
Greece were placed above Russia based on their head-to-head record (1–0).
The Czech Republic became the first team to win a European Championship group with a negative goal difference
Group B
Group C
Group D
Ukraine were placed above Sweden based on their head-to-head record (2–1).
Knockout stage
The UEFA Technical Team was charged with naming a squad composed of the 23 best players over the course of the tournament. The group of eleven analysts watched every game at the tournament before making their decision after the final. Ten players from the winning Spanish team were selected in the team of the tournament, while Zlatan Ibrahimović was the only player to be included whose team was knocked out in the group stage.
A total of €196 million was given to the 16 teams competing in this tournament, an increase from the €184 million in the previous tournament. Each team received an initial €8 million and then received additional money, based on their performances. Spain, the winners of Euro 2012, were awarded a total prize of €23 million for their performance. The maximum prize achievable (for winning all group matches and winning the final) was €23.5 million. Complete list:
Extra payment based on teams performances:
Besides money, commemorative plaques were given to all participants together with special plaques for semi-final losers and finalists. Gold and silver medals were awarded to the winners and runners-up, respectively, whereas both semi-final losers were awarded bronze medals. The trophy given to the winners remains in the ownership of UEFA; however, the winning nation, Spain, received a full-size replica.
In the final tournament, a player was suspended for the subsequent match in the competition for either getting red card or accumulating two yellow cards in two different matches. UEFA's Control and Disciplinary body has the ability to increase the automatic one match ban for a red card (e.g. for violent conduct). Single yellow card cautions were erased at the conclusion of the quarter-finals, and were not carried over to the semi-finals (so that a player could only be suspended for the final by getting a red card in the semi-final). Single yellow cards and suspensions for yellow card accumulations do not carry over to the 2014 FIFA World Cup qualification tournament matches. The following players were suspended during the final tournament – for one or more games – as a result of red cards or yellow card accumulations:
Apart from discipline measures for yellow and red cards, UEFA fined the football associations of Croatia, England, Germany, Portugal, Russia and Spain a total of €417,000 for spectators incidents.[e] Furthermore, the Portuguese association was fined €5,000 for delaying the start of the second half of the game against Germany. In addition to these, Danish striker Nicklas Bendtner was fined €100,000 and given a one match ban (to be applied in the 2014 FIFA World Cup qualification tournament) for revealing his sponsored underpants, violating UEFA regulations, during the celebration of his second goal in the match against Portugal.[f]
Penalty kicks
Not counting penalty shoot-outs, four penalties were awarded during the tournament. Giorgos Karagounis was the only player who failed to convert his penalty, which occurred in the match against Poland.
Trophy tour
The Henri Delaunay Trophy began a journey through the host cities seven weeks before the start of the tournament. A hundred days before the first match a 35.5-metre-high (116 ft) hot air balloon in the shape of the trophy was flown in Nyon, Switzerland and visited 14 cities throughout the host countries, reminding spectators of the impending tournament. On 20 April 2012, the trophy tour started and visited the Polish cities of Warsaw, Wrocław, Gdańsk, Poznań, Kraków, Katowice and Łódź. After the Polish cities, the trophy visited seven Ukrainian cities: Kiev, Ivano-Frankivsk, Kharkiv, Donetsk, Dnipropetrovsk, Lviv, and Odesa.
Logo, slogan and theme songs
The competition slogan, Creating History Together (Polish: Razem tworzymy przyszłość, literally, "Together we are creating the future", Ukrainian: Творимо історію разом, Tvorymo istoriyu razom), was announced along with the logo. The official logo for the tournament was unveiled at a special event at Mykhailivska Square, Kiev, on 14 December 2009. Designed by Portuguese group Brandia Central. It takes its visual identity from Wycinanki or Vytynanky, traditional form of paper cutting practised in rural areas of Poland and Ukraine. The art form symbolises the nature of the rural areas of both countries. As part of the event, landmark buildings in the eight host cities were illuminated with the tournament logo.
The official Euro 2012 song is "Endless Summer" by the German singer Oceana. In addition, UEFA has retained the melody that was composed by Rollo Armstrong of Faithless on its behalf for the 2008 tournament. The Republic of Ireland has also produced an official song: "The Rocky Road to Poland" recorded by a collaboration of Irish performers has already reached number 1 in Ireland. In Spain, the broadcasting company Mediaset España commissioned the song "No hay 2 sin 3", performed by David Bisbal and Cali & El Dandee and produced by RedOne.
The tournament has also been associated with the song "Heart of Courage" by Two Steps From Hell, which has been played in the stadiums during the entrance of the players (before the national anthems); but also "Seven Nation Army" by The White Stripes, in this case after every goal.
Merchandise and mascots
UEFA signed a worldwide licensing agreement with Warner Brothers Consumer Products to help promote the tournament. The agreement involved licensing to third parties for a variety of other merchandising items.
Also designed by Warner Bros. were the official tournament mascots, "Slavek and Slavko", twins that wore the national colours of the two host nations. The mascots were unveiled in December 2010, and named following an online poll.
UEFA announced ten global sponsors and, for both Poland and Ukraine, three national sponsors as shown below. These sponsorships together with the broadcasting revenues were estimated to earn UEFA at least US$1.6 billion.
Concerns and controversies
After Poland and Ukraine were chosen by a vote of the UEFA Executive Committee as host countries for Euro 2012, several issues arose, which jeopardised the Polish/Ukrainian host status.
In Ukraine there were financial difficulties related to stadium and infrastructure renovation related to the economic crisis. In Poland, issues arose related to corruption within the Polish Football Association. In April 2009 however, the president of UEFA, Michel Platini announced that all was on track and that he saw no major problems. After a UEFA delegation visited Ukraine in September 2011, he stated the country was "virtually ready for Euro 2012".
Especially in the UK, there were allegations of racism in football in both host countries. The main cause of discussion was the BBC current affairs programme Panorama, entitled Euro 2012: Stadiums of Hate, which included recent footage of supporters chanting various antisemitic slogans and displays of white power symbols and banners in Poland, plus Nazi salutes and the beating of South Asians in Ukraine. The documentary was first echoed in much of the British press, but was then attacked for being one-sided and unethical: critics included other British media outlets; anti-racism campaigners, black and Jewish community leaders in Poland; Polish and Ukrainian politicians and journalists; England fans visiting the host nations and Gary Lineker.
In response to Yulia Tymoshenko’s hunger strike and her mistreatment in a Ukrainian prison some European politicians and governments announced that they would boycott the matches in Ukraine.
Ukraine came under criticism from animal welfare organisations for killing stray cats and dogs in order to prepare for Euro 2012. Ukrainian Ministry of Ecology and Natural Resources and Minister Of The Environment promised to take action to prevent killing animals but it still remains unclear how these measures will be enforced. The ministry's comments also suggested this would only be a temporary measure, drawing further criticism.
Other minor important issues were associated with FEMEN’s group protests against prostitution and sex tourism in Ukraine, and enormous increases in hotel prices by many hoteliers in the country.
See also
|
<urn:uuid:4fc44dcd-c3e6-4bb5-af87-3ed253d0ea76>
| 0.152621 |
11-17-2011 01:29 PM
I´m very disappointed at the moment of my new X220.
I´ve got very high dpc latency when I´m using the integrated 82579LM Adapter.
Sound is stuttering while surfing playing music.
With the Wireless 6205 all is fine!
What I have already tried:
-Windows new install (Lenovo clean install tutorial)
-Newest Intel driver for the nic
-Newest Lenovo driver for the nic
-Set powermanager to max performance
All drivers, BIOS, utilities(such as powermanager etc.) and windows are up to date.
Solved! Go to Solution.
11-17-2011 08:05 PM
11-18-2011 03:15 AM - edited 11-18-2011 09:18 AM
Okay, I tried LatencyMon.
Am I right, that the driver ndis.sys and the CPU?! is causing the issue?
How can I solve this?
11-18-2011 08:14 PM
Try using Intel drivers instead to see if the latency issues could be resolved.
I am using Chipset driver from Intel and NIC driver from Lenovo and it's working smoothly. You could try Intel new NIC driver, they may provide some performance improvement, etc. for the newer driver.
Does someone’s post help you? Give them kudos as a reward, as they will do better to improve
Mark it as solved if the solution works for you, so it could be reference for others in the future
Refunded Set: W510, 4876-A11
Current Set: W520, 4284-A99
Dolby Home Theater v4 (ThinkMix V2)!
11-19-2011 03:49 AM
12-01-2011 11:28 PM - edited 12-01-2011 11:31 PM
I have the exact same problem.
It took me several week to realize that it was the ethernet that was causing the audio stuttering and the high DPC latency. All of my drivers are up to date and I'm on AC power. I've removed the wired NIC drivers in device manager. and see if the windows 7 default drivers work. I need this gigabit ethernet as a do a lot of data transfer between other computers on my lan. Wireless simply isn't an option.
As for the jumpy mouse, i believe it's due to poor grounding in your AC adapter (pathetic levovo...) Take a look at this thread
It appears the throttling and mouse jumping problem can be solved with a 3rd party power adapter. I my self just ordered this http://www.amazon.com/Anker-Laptop-Adapter-Supply-
12-01-2011 11:42 PM - edited 12-02-2011 12:08 AM
1. Go to device manager
2. Right click on 82579LM Gigabit ethernet and click uninstall. A popup will appear and check "delete drivers"
3. Let the computer uninstall the drivers.
4. Reboot computer
5. With wifi on, let windows automatically install drivers for the gigabit card.
Edit: Reinstalling the drivers helped however I'm still getting huge dpc latency spikes when downloading files....This is ridiculous.
|
<urn:uuid:c0ecc479-878e-4d78-89a4-130dc3226043>
| 0.051303 |
New patch adds maps and units for endless fun
Slitherine has just release a new patch for it’s recently released hit Battlefield Academy. The patch is available through the in-game auto updater and contains a host of new maps and units, which take the game to the next level. Iain McNeil, development director of Slitherine, said: ‘We are committed to supporting Battlefield Academy over the long term as we definitely feel the game deserves a lot of attention. We are willing to make this game an evolving project, with the contribution of the community. That is why we already started including suggestions from the players in this patch and we will keep doing this in the future”.
+ 4 new multiplayer maps with unique objectives
Road to Caen
Canadians attack a German position. 5 Victory points. Canadians must capture enough to win before 16 turns.
D-Day + 3
British forces attack a German held town. British must capture VP's before the 20 turn time limit expires.
Race for the Town
The Ardennes, US and German forces . The side with the most VP's by the end of the 20 turn time limit wins.
German & Italian forces attack a British position. The Axis must capture VP's before the 20 turn time limit expires.
+ 6 new units
Greyhound (created by Tim Catherall)
+ tweaked the reaction fire scripting to be more proactive.
+ you can now play missions without having to complete all prior missions.
+ fixed bug where you could save and exit MP during the replay, causing all kinds of problems including side swapping and crashes.
+ fixed a bug where you could TAB through enemy forces.
+ added patch notes display to allow us to show what is new.
+ can now only save a game when in battle.
+ fixed bug where you couldn't rename existing saves.
+ new map dialog now sets sizes to the current map size.
+ fixed multiple bugs when trying to load or overload effect animation files.
+ fixed bug with fogging when shadows off
+ fixed a bug where some lists weren't being clipped correctly after the text driver crash fix.
Inspired by an original online game concept devised by the BBC © BBC 2004
|
<urn:uuid:d8c8dbbc-4584-4ed0-ba2e-b7475903cb66>
| 0.146713 |
|Series :||Enterprise||Rating :|
|Disc No :||1.1||Episode :||3|
|First Aired :||3 Oct 2001||Stardate :||6-May-51|
|Director :||Allan Kroeker||Year :||2151|
|Writers :||Brannon Braga, Rick Berman||Season :||1|
|Guest Cast :||
|YATI :||The aliens modus operandi seems a little strange in this episode. If they wanted to collect triglobulin from the bodies, why leave them behind on the ship at all? Surely it would make more sense to take them with you, precisely to avoid having somebody stumble across them and interfere, as Archer does in this episode. Also, when Archer asks Hoshi if she transmitted his message on a rotated frequency, she says she will "try it again". But she only waits a grand total of four seconds before reporting no response. Archer's message was much longer than that, so Hoshi apparently gave up after the first couple of sentances.|
|Great Moment :||Enterprise hitting it's first target.|
|Body Count :||Fifteen on the Axanar ship, plus an unknown number on the "space vampire" ship.|
|Factoid :||The Axanar species seen here have been mentioned before - in TOS, Captain Garth won a great victory at Axanar.|
Reed, meanwhile, is struggling to get the ship's spatial torpedo systems fully functional. Archer agrees to drop out of warp for a little target practice, but it does not go well - the torpedo bounces off the asteroid they are aiming at and careens back towards Enterprise, causing more frustration. Indeed the only person who seems to be having a good time in Phlox, who is fascinated by the behaviour of the crew.
Eventually, they chance upon an alien spacecraft sitting in space. There are biosigns aboard, but attempts to contact the ship fail. T'Pol suggests ignoring it, reasoning that the aliens must not want contact, but Archer insists on stopping to investigate. He leads a boarding party to the ship, including Hoshi even though she complains that the environmental suits make her feel claustrophobic. Once aboard, they make a horrific discovery - the crew are all dead, hung up on hooks and connected to some sort of device that seems to be draining fluid from them. T'Pol suggests abandoning the ship, reasoning that the crew are beyond any help. Archer reluctantly agrees and continues on course.
Hoshi feels guilty about her performance on the ship, pointing out to Phlox that she "screamed like a twelve-year-old" on seeing the alien bodies, something nobody else did. Phlox wonders if perhaps she would be better off going back to Earth, though Hoshi is reluctant to do something so drastic.
Archer is also having second thoughts, wondering if leaving the alien bodies in the ship was the right thing to do. He feels like they turned tail and ran when the right thing to do was stay and get involved. Although T'Pol argues that doing so would be against the code of behaviour the Vulcans have, Archer points out that Humans also have a code of behaviour - one he broke. He orders Enterprise back to the alien ship.
They return tot he alien ship and check it over more carefully. Hoshi is able to work out a way to send a distress call in the alien language whilst Phlox investigates what is being done to the alien bodies. He finds that whoever conducted the massacre was apparently trying to collect a substance called triglobulin from them.
As they investigate, a powerful alien vessel arrives and attacks. It disables the Enterprise's engines, brushing aside their attempts to stop it. T'Pol scans it and finds that the power signature matches the devices draining the bodies on the ship they have been investigating. It seems the perpetrators of the massacre have returned. As the ship approaches, another vessel drops out of warp - this one matching the technology of the first ship they encountered. The newcomer communicates with Enterprise but seems to be angry - Hoshi thinks that the Captain is blaming them for the attack on his comrades, rather than the real culprit. Hoshi tries to talk to him but her translation program won't work, and the attempt only leads to more anger and confusion. Her confidence is shaken but Archer insists that she disregard the computer translations and try to talk directly to the alien Captain. She does, overcoming her doubt and convincing him to scan the alien ship and compare the power signature of the alien equipment to the attacking vessel - proof that it rather than Enterprise is the aggressor.
Both the alien ship and Enterprise attack the "Space Vampire" ship, and their combined attack destroys it. The ship remains in the area for while, making a friendly First Contact with the aliens - a species called the Axanar. Afterwards they continue on course, making a small detour to find a suitable planet to drop Sluggo off in a new home.
These are meant to be the brave and bold pioneer days of Humanity. Surely it would have been better to depict them as being overly brash and confident, as being the kind of people who go out determined to kick over all the anthills and stick their noses in where they shouldn't - only to learn over time that a bit of discretion now and again is the way to go.
The Space Vampires are also kind of silly. Their MO is absurd - they disable a ship and attack it, fair enough. They kill the crew, fair enough. But why leave them aboard their own ship and just go away? The Vampire ship is pretty big, surely it has more than enough space to hang the bodies up somwhere and do your thing to them. Then you can just continue on your way to look for your next victims, no need to tie yourself down to coming back to the scene of the crime, so to speak. It's a stupid way to do things, and it's only like that so that they can spin out the story they want with Enterprise being blamed in a showdown finale.
|Copyright Graham Kennedy||Page views : 6,755||Last updated : 12 Apr 2013|
|
<urn:uuid:4f33a42f-afae-4d57-bce1-5be881fa2838>
| 0.051433 |
I need to sort an arraylist that contains a list of individual object. Each individual object contains an arraylist of addresses. Could someone suggest what design pattern is suitable to perform the sorting?
Kyle, Unfortunately, this is what I am doing. Since I don't know the list size until runtime, I use nested vectors. The outer one contains a list of individual (last name, first name, date of birth,...), and the nested one contains a list of addresses(current address, previous address, ...). You indicated my code is smell. Could you give me some suggestions or point me to the document where I can clean it up.
For the sorting, I had a class that implements comparator and used Collections.sort(List, Comparator) method to perform the sort. My pseudo code for the compare() method 1. Compare last name, first name, date of birth,... for the outer vector. 2. If decision cannot be made (they are all equals) then a. Sort the inner lists (the address vectors) b. Loop through the list and compare street num, street name, city, ...
What I am asking is the design pattern. Do you know any design pattern I can apply? Thanks in advance.
Joined: Aug 10, 2001
Joey, your question isn't quite clear to me. Which are you sorting? The list of individuals, the list of addresses of each individual or both?
Joined: Apr 20, 2001
Kyle, It is both. I have a master list that contains many individuals. Each individual, in turn, can contain zero or more addresses. I would like to sort the master list. Master List 1------>* Individual 1------>* addresses
Individual contains last name, first name, middle name, gender, date of birth and a list of addresses. Address contains street number, street name, apartment, city, state ,zip
At runtime, a user can specify the fields to be sorted and the sort order.
Say a user wants to sort the master list in this order: last name, first name, city, and state.
If last name and first name of two individual objects are different, compareTo() method will return either negative or positive number. If they happen to be the same, then city and state in the address objects are compared.
If I understand correctly, you really only need to sort the outer list of individuals; the fact that each individual may have multiple addresses might not really matter.
In this case, I would have the class used for the individuals implement methods like get_primary_city(), get_primary_state(). Then when you write your comparator, it first compares the names of the individuals, and if those are the same, it compares primary city or state, &c.
Alternatively, your comparator can first compare the names of the individuals, then compare the address arrays of the individuals using whatever method you choose (e.g., whoever has more addresses goes first or whatever, if tied, use information from the first address, then the second, or whatever).
Joined: Apr 20, 2001
The columns to be sorted are known at runtime. They can be just columns in individual object, columns in both individual object and address objects, or just columns in address object. If they are just city and state, the sort will be performed just on the nested object (address object). I am searching for a design pattern to solve the puzzle.
|
<urn:uuid:d5bf27ca-8fa3-409b-b7c5-8ba0ca32f809>
| 0.163665 |
Select tracks on the iPod and then run this script to copy the files of the selected tracks from the iPod to your iTunes Music/Media folder and add to iTunes. Additionally, you can assign the new tracks to their own playlist. Requires the iPod be set to "Manually manage music and videos".
Will not work on Windows-formatted iPods.
Not compatible with iPhone/iPod touch.
Not recommended for large-scale iPod audio recovery operations.
Progress is displayed for each track being imported.
Free to use, but a payment
in appreciation is requested. Thanks!
Perhaps Also of Interest...
downloaded 48s ago
Export album artwork as folder.jpg to Album folder
downloaded 4m 24s ago
Convert selected tracks and export the converted files to a new folder
downloaded 11m 3s ago
Play through each track in a playlist at your set interval
downloaded 11m 36s ago
Displays files in iTunes Media folder not in iTunes track library
downloaded 16m 11s ago
Remove iTunes tracks disassociated from files
downloaded 34m 38s ago
Rename selected tracks' Song Names with their filenames (minus extension)
|
<urn:uuid:8a6594ca-f6d4-4ccf-86a1-d33a8a12069c>
| 0.039608 |
The risk factor: protect and treat. Independent comment.
Goodman, Anthony (2000) The risk factor: protect and treat. Independent comment. Community Care, 21 . pp. 34-35. ISSN 0307-5508
Full text is not in this repository.
This item is available in the Library Catalogue
|Research Areas:||A. > School of Law > Criminology and Sociology|
|Deposited On:||25 May 2010 07:51|
|Last Modified:||13 Mar 2015 15:09|
Repository staff only: item control page
Full text downloads (NB count will be zero if no full text documents are attached to the record)
Downloads per month over the past year
|
<urn:uuid:228008a3-fb3e-4dea-bb9d-f0ddf57adf35>
| 0.042437 |
Welcome to TalkBass, the Premier Bass Player Community and Information Source. Register a 100% Free Account to post and unlock tons of features.
Discussion in 'Basses [BG]' started by Lesfunk, Apr 10, 2014.
Man that's sweet!
They make a real nice feelin neck, hadn't heard this new gen stuff, but it's real purdy
Log in or Sign up to hide this ad and more.
The new gen stuff is very nice. IMO the quality exceeds the price point.
I didn't have GAS for them before but I do now.
It's interesting how many custom basses from $1-5000 ranges come with the same $15 bridge I bought on eBay....
came back today to peek... I still think it's sweet
This particular bass isn't custom at all but the bridge is pretty good. 15 buck on ebay sounds like a good deal. I saw some hipshot A copies for 15 bucks too. I wonder how they perform?
Separate names with a comma.
|
<urn:uuid:60f026bb-6410-4b60-a584-5d6110eaa17e>
| 0.069245 |
In order to increase the flexibility of the APPA, we have altered the way you link to team rosters. Directly linking by the APPA Roster ID number is no longer possible. Please use the navigation links to browse to the event you are playing. To directly link to a roster, use the link provided below the team name on their roster page.
If you encounter any errors relating to viewing rosters, please send an e-mail to [email protected].
|
<urn:uuid:02bd013b-b03f-4cd9-a09a-3e3018d8c893>
| 0.183887 |
A forum for discussing JSR 289, the SipServlet API 1.1
I read somewhere that JSR 289 supports IMS application creation. Is this so? Can someone point me towards more information on this. Thanks.
You could take a look at http://sailfin.dev.java.net
Your use of this web site or any of its content or software indicates your agreement to be bound by these Terms of Participation.
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.
|
<urn:uuid:e4f1ccd7-a5b1-4508-97d3-bc1428439860>
| 0.124203 |
My question is whether I should test code that I know will be changed in a short time. I'm doing TDD in ruby, and I often meet with this question. I'm interested about best practices about this, pro and contra. Thanks.
Clarification: My question is basically how do you compare the 'cost of writing a test' VS 'the fact that the code will change soon' and make decision.
|
<urn:uuid:9d67e340-70f8-49a8-a65c-9ddbf4dd1858>
| 0.04071 |
re: iPhone, Android Get Bing Search First
Couple of points that are WRONG in this. Silverlight is not supported on iOS and Android to deliver apps. Secondly WP7 has a far more powerful version of Bing - which includes scout, voice search, video search, barcode recognition etc etc. Also this is a hybrid app, which means elements have been written in HTML 5, so that will be the presentation layer only, not anything to do with how it works. Remember that the app will be doing all its main work via services running in Windows Azure!
Finally re Silverlight. Silverlight the name maybe dead in the long term, but Silverlight is not dead. It has another version coming and is essentially Metro and guess what, Windows Phone applications are delivered using Silverlight!
Metro is Windows 8 native application language. So PLEASE get your facts right. Silverlight is XAML with c#, vb etc .NET managed code. Metro apps are guess what, XAML with managed code delivered via c# and vb etc .net syntax. Sure some include libraries have changed, but they change between different releases of .NET in any case! Yes I know you can write "apps" using HTML 5, but you are limited in what you can deliver with HTML 5....
Essentialy Silverlight has moved from being a niche web technology for Microsoft to a core technology used to deliver a single type of experience and design framework across all devices....Silverlight the name maybe dead in the long run, but XAML with Managed Code and .NET libraries are becoming the core of microsoft deliverables and technology for developers...The name may change though to WinRT and Metro...But whats in a name!
|
<urn:uuid:b1914fe9-4d9f-41c8-8aab-6eb42dbc8056>
| 0.096749 |
Ozirion is an experimental Web browser allowing people and groups to improve their privacy on the Internet by hiding their IP address through a network of virtual tunnels. The current release of Ozirion relies on the Tor technology. It includes a built-in Tor server and provides the ability to choose or ban countries in order to use an IP address from a specific country. The Privoxy local proxy is used for better privacy. Ozirion is totally independent from the Tor and Privoxy projects.
Liberté Linux is a secure, reliable, lightweight, and easy to use Gentoo-based live USB Linux distribution intended as a communication aid in hostile environments. It installs as a regular directory on a USB/SD key, and after a single-click setup, boots on any desktop computer or laptop. The Internet connection is then used to set up a Tor circuit, which handles all network communication. During first boot, a unique email ID is generated from fingerprints of user's certificate and Tor hidden service key. This persistent ID allows one to stealthily communicate with other Liberté users. The distribution includes image and document processing applications, and can function as a secure Web browsing platform. For developers, Liberté can also serve as a robust framework for mastering Gentoo-based live USBs/CDs. The build process is fully automated with incremental build support, and is more mature and reliable than most of Gentoo's own outdated live CD tools.
Pagekite is software to make servers on "localhost" visible to the wider Internet. It can be used by Web developers to show off their works in progress to clients or colleagues, embedded developers who need direct access to devices in the field, or as an alternative to dynamic DNS for individuals/hobbyists who would rather host their own content than rely on 3rd party hosting. It creates and maintains a tunnel between your server on localhost and a remote "front-end" (a reverse proxy). Only the front-end has to have a visible IP address; the server itself can reside on a heavily firewalled computer, a mobile device, or even an anonymous node on the Tor network.
TorTV is a build of the Tor Project maintained to run on TV devices and set-top boxes so that anyone with such a household appliance can contribute to strengthen the Tor network. TorTV does not reimplement nor modify the Tor source code in any way; it provides binary builds for embedded targets and scripted bundles to facilitate their installation. So far, it targets WDTV devices running WDLXTV, but aims to grow to support more hardware in future.
txtorcon is a Twisted-based asynchronous Tor control protocol implementation. Twisted is an event-driven networking engine written in Python, and Tor is an onion-routing network designed to improve people’s privacy and security on the Internet. It includes unit-tests with 96%+ coverage, multiple examples, and documentation. There are abstractions to track Tor configuration and state (circuits, streams), launch private instances, support Hidden Service, and more.
Dowse eases the configuration of network routing for a local area network, starting from the setup of ARP-level static entries of known peers, IP-level firewall, DHCP configuration, and local DNS cache, up to an application layer transparent proxy and optional gateways to anonymous networks such as Tor and I2P. It consists of a minimalistic script which can run on any GNU/Linux box and which, from a central configuration point, controls Ebtables, Iptables, and all the daemons needed for such operations: DnsMasq, Squid2, and Privoxy. It comes with a module system for contributed add-ons like DNSCrypt-proxy and HTTPS-everywhere.
Chrubix installs the GNU/LInux distro of your choice - ArchLinux, Debian, Fedora, Kali, SuSE, or Ubuntu - onto a removable MultiMediaCard (MMC) on your ARM-based Chromebook. Chrubix supplies Guest Mode, full-disk encryption, Windows XP camouflage mode, MAC address randomizing, a panic button, additional checksums, and a variety of important security-oriented software applications such as Freenet, I2P, Tor, GPG, and LEAP-Bitmask. In addition, Chrubix offers you the option to tweak the software so that it will run on no hardware but yours (MMC and laptop must match). In this way, it transforms your ARM-based Chromebook into a fully functional, more secure laptop.
|
<urn:uuid:14b8dcbf-fa76-4205-963b-986329262f40>
| 0.052295 |
This is your shopping cart. From here you may add new products, continue shopping, or begin checking out.
Cart Contents & Totals
* Shipping will be calculated after choosing your shipping option.
** Sales tax will be added for orders in the following states.
*** State sales tax is subject to change without notice. Actual invoice may differ slightly.
|
<urn:uuid:f0376d9d-9b71-470e-8eda-4a9d86be5e31>
| 0.066157 |
Interactive Whiteboards | News
Splashtop Releases Whiteboard App for Android Tablets
Splashtop, a California-based software company founded in 1996, has released an application that gives functionality similar to that of an interactive whiteboard to Android-based tablet computers.
The application, Splashtop Whiteboard, allows annotations to be made on a tablet computer and displayed through an existing projector or interactive whiteboard when the tablet is connected to a school computer via a wireless network connection.
Based on the company's remote desktop application, Splashtop Remote Desktop, the whiteboard application has remote desktop capabilities that can be used to manipulate school computers and existing whiteboard software through a tablet's touch controls and built in keyboard.
In addition to remote access capabilities, the application has built-in whiteboard functionality that supports annotations over images, flash media, and lessons created in Microsoft PowerPoint or Apple's Keynote software.
- A floating toolbar with annotation and visual controls;
- The ability to save snapshots;
- Multiple annotation colors;
- Adjustable line thickness;
- Templates for circle and square shapes;
- A spotlight feature;
- Support for gestures;
- Text replacement; and
- Highlighting capabilities.
The application supports tablets running Android 3.1 or later and is currently available at Google Play (formerly Android Market) for $9.99 for a limited time, after which the price will be $19.99.
Further information is available at splashtop.com/whiteboard.
Dan Thompson is a freelance writer based in Brea, CA. He can be reached here.
|
<urn:uuid:06827ffa-518b-42c8-ab8d-85453401172b>
| 0.052432 |
This deal only lasts for 24 hours on BitsDuJour.
Wait for this winx's DVD ripper discount for a long time. This is the platinum version winx DVD ripper which enables you to convert protected DVDs to general videos for playback on iPhone, iPad, Android.
For more detail introduction, u can go to: http://www.winxdvd.com/dvd-ripper-platinum/
enjoy it lol
|
<urn:uuid:5fba0efc-5ca9-465c-84c5-9a95a508e719>
| 0.046722 |
This deviant's full pageview
graph is unavailable.
Last Visit: 14 weeks ago
This is the place where you can personalize your profile!
By moving, adding and personalizing widgets.
You can drag and drop to rearrange.
You can edit widgets to customize them.
The bottom has widgets you can add!
Some widgets you can only access when you get a premium membership.
Some widgets have options that are only available when you get a premium membership.
We've split the page into zones!
Certain widgets can only be added to certain zones.
"Why," you ask? Because we want profile pages to have freedom of customization, but also to have some consistency. This way, when anyone visits a deviant, they know they can always find the art in the top left, and personal info in the top right.
Don't forget, restraints can bring out the creativity in you!
Now go forth and astound us all with your devious profiles!
Favorite visual artistCartoonsFavorite moviesThe Simpsons Movie, White Chicks, Bender's Big GameFavorite TV showsCartoons: Simpsons, Futurama, Regular Show, Adventure Time. Series: F.R.I.E.N.D.S. and The Office USAFavorite bands / musical artistsDemi Lovato, One Direction, Beatles, Nirvana, Iron Maiden.Favorite booksNarnia and Harry PotterFavorite writersJ.K. RowlingFavorite gamesPac-Man; Portal; Hey Ice King, Why do you steal our garbage?; Mortal KombatFavorite gaming platformSuper Mario World (Super Nintendo)Tools of the Trade..........Other InterestsRead , Swim and Write
|
<urn:uuid:a1989ddd-0aaf-40ce-8962-2c0c9ad6ebf2>
| 0.838589 |
Nicely application-level wrapper for anti-virus software.
Ruby gem to interact with ClamAV daemon(Clamd)
Fancy messaging library for Ruby
Clamp provides an object-model for command-line utilities. It handles parsing of comman...
Ruby wrapper for ClamAV's clamscan/clamdscan.
Clamshell allows you to setup shell statements which configure you...
Ruby wrapper for generating a single pdf for multiple contexts from an odt template.
Command Line Analytics
A ruby command line tool for storing encrypted passwords on *nix systems
rendezvous hashing implementation based on murmur3 hash
Clap is a small library that can be bundled with your command line application. It cove...
Description of Clarc.
Come on now, man, you're making me nervous. Come on, you can't do this! Don't mess arou...
Hiera backend for decrypting encrypted yaml properties (Fix for Issue #62)
Clarifier is a stopwords library for removing common words from text
Use the Clarify API to make your audio and video files searchable in just a few lines o...
Clarity - a log search tool By John Tajima & Tobi Lütke Clarity is a Splunk like web i...
Clarity tracking number generator
Customized website to avoid start working every new site from scratch
A powerful reporting engine for Rails apps.
A simple hello world gem
Clarus makes a ruby library o create word 2003 compatible documents.
A diff based testing framework for static sites.
Identifier-based locking with deadlock detection
A scraper for classification.gov.au
Allows you to write controller actions as classes, rather than methods.
ClassAd wraps the Hash object with code to create an xml doc representing a Condor ClassAd
Provides attr_accessor style methods for easily creating methods for working with c...
ClassBrowser is an interactive class browser that lets you view the current ObjectSpace...
|
<urn:uuid:732949da-65f5-41c6-8942-19e8963478db>
| 0.386142 |
SOASTA has announced the latest release of CloudTest with a new Java module to enable developers and testers of Java applications to test any Java component as they work to "easily scale" it.
Direct-to-database testing here supports Oracle, Microsoft SQL Server, and PostgreSQL databases — and this is important for end-to-end testing for enterprise developers. Also, additional in-memory processing enhancements make dashboard loading faster for in-test analytics.
"As applications are developed, databases are often tested in isolation while being built. In response to a common enterprise customer request, CloudTest can be directed to execute SQL workloads directly to the database for performance testing and insert data into a database before a test or clean up after a test," said Tom Lounibos, SOASTA CEO.
New CloudTest capabilities include Direct-to-Database testing. CloudTest users can now directly test the scalability of the most popular enterprise and open source SQL databases from Oracle, Microsoft SQL Server, and PostgreSQL.
With the new custom Java module, anything that can be done in Java can be tested at scale with CloudTest, such as testing streaming video as well as popular protocols like WebSocket and UDP.
"Users can now use test creation shortcuts such as recording directly to executable test clips and easily share test assets and components. Leveraging platform enhancements to CloudTest's in-memory analytics engine, users will experience improvements in the seamless visual reporting during tests and how quickly tests load for execution," said the company.
|
<urn:uuid:99ac3258-2fe3-4258-a7ec-082b77ec7ff4>
| 0.039487 |
Comment current news topics here.
Sorry if already posted.
http://www.vanityfair.com/online/oscars ... udd-apatow
To God, every living being is beautiful... Except for you.
Jim was interviewed in an exclusive video in the Vanity Fair website.
Here's the link:
And some more pics all together: http://www.vanityfair.com/online/oscars/2012/12/note-from-judd-apatow-comedy-issue?mbid=social_facebook
I'm a guardian of the spark...
I'm a God damn and proud good fan... and I love it! = )>
Bigger size of Jim Carrey:
When I was a stand-up comedian, in the late 80s, I used to open for Jim Carrey on the road. I would do my lame act, and then he would come on and do the most energetic, inventive, uproarious set I had ever witnessed. I retired from performing as a result. He was and is the funniest man on earth. This is something we can all agree on. We can debate No. 2 forever, but Jim will always be the king.
True, but they have finally posted some of the photos without text on their website. Fantastic photos.
Who is online
Users browsing this forum: MSNbot Media and 2 guests
|
<urn:uuid:17de221b-c435-4bf0-8139-2f85df1d4a5a>
| 0.06547 |
|more useful options|
batkinsby batkins (Chaplain)
|on Jul 25, 2002 at 15:21 UTC||Need Help??|
-----BEGIN PERL GEEK CODE BLOCK-----
That's my Perl Geek Code. Useless? Yep. Accurate? Nah. Obligatory? Unfortunately.
I like Perl.
Download milkbone, an all-perl graphical IM client written completely in Perl.
I'm currently a senior in high school. When not attending school or working, I maintain milkbone and build orphanages for poor children in the South American Andes. In my remaining time, I run a soup kitchen from the backseat of my '93 Ford Taurus station wagon (known to some as the Wonder Wagon, to others as Mitch and to others as the Shaggin' Wagon).
I'm an abbot, which means I'm important here </sarcasm>. Anyway, a note to aspiring monks: You don't get a halo when you become a saint. I know, I know - I was disappointed, too. But it's better that you learn this now than waste your life striving for sainthood. You don't have to thank me, but if you want to, download milkbone.
Did I mention you should download milkbone?
Visit (and edit) my Tk wiki..
Monks I know
|
<urn:uuid:4bd7c69a-d184-4d1b-a5ff-833367819b59>
| 0.059838 |
Paul Donchian, Modeler of higher dimensions
This web presentation contains the
audio and slides
of a lecture given at the Fields Institute on February 15, 2002
as part of the Sculpture Dedication Ceremony.
Listen to audio presentation:
You may browse the slides
in the presentation (a browser capable of displaying PNG graphics
|
<urn:uuid:9950c849-bcf6-4983-a0ae-3c39acd05e1b>
| 0.154169 |
| ||Format||Pages||Price|| |
|8||$43.00|| ADD TO CART|
|Hardcopy (shipping and handling)||8||$43.00|| ADD TO CART|
Significance and Use
5.1 Gamma-ray spectrometry is of use in identifying radionuclides and in making quantitative measurements. Use of a semiconductor detector is necessary for high-resolution measurements.
5.2 Variation of the physical geometry of the sample and its relationship with the detector will produce both qualitative and quantitative variations in the gamma-ray spectrum. To adequately account for these geometry effects, calibrations are designed to duplicate all conditions including source-to-detector distance, sample shape and size, and sample matrix encountered when samples are measured.
5.3 Since some spectrometry systems are calibrated at many discrete distances from the detector, a wide range of activity levels can be measured on the same detector. For high-level samples, extremely low-efficiency geometries may be used. Quantitative measurements can be made accurately and precisely when high activity level samples are placed at distances of 10 cm or more from the detector.
5.4 Electronic problems, such as erroneous deadtime correction, loss of resolution, and random summing, may be avoided by keeping the gross count rate below 2000 counts per second (s–1) and also keeping the deadtime of the analyzer below 5 %. Total counting time is governed by the radioactivity of the sample, the detector to source distance and the acceptable Poisson counting uncertainty.
1.1 This practice covers the measurement of gamma-ray emitting radionuclides in water by means of gamma-ray spectrometry. It is applicable to nuclides emitting gamma-rays with energies greater than 45 keV. For typical counting systems and sample types, activity levels of about 40 Bq are easily measured and sensitivities as low as 0.4 Bq are found for many nuclides. Count rates in excess of 2000 counts per second should be avoided because of electronic limitations. High count rate samples can be accommodated by dilution, by increasing the sample to detector distance, or by using digital signal processors.
1.2 This practice can be used for either quantitative or relative determinations. In relative counting work, the results may be expressed by comparison with an initial concentration of a given nuclide which is taken as 100 %. For quantitative measurements, the results may be expressed in terms of known nuclidic standards for the radionuclides known to be present. This practice can also be used just for the identification of gamma-ray emitting radionuclides in a sample without quantifying them. General information on radioactivity and the measurement of radiation has been published (. , ) Information on specific application of gamma spectrometry is also available in the literature (. See also the referenced ASTM Standards in ) and the related material section at the end of this standard.
1.3 This standard does not purport to address the safety concerns, if any, associated with its use. It is the responsibility of the user of this standard to establish appropriate safety and health practices and determine the applicability of regulatory limitation prior to use.
2. Referenced Documents (purchase separately) The documents listed below are referenced within the subject standard but are not provided as part of the standard.
D1066 Practice for Sampling Steam
D1129 Terminology Relating to Water
D2777 Practice for Determination of Precision and Bias of Applicable Test Methods of Committee D19 on Water
D3370 Practices for Sampling Water from Closed Conduits
D3648 Practices for the Measurement of Radioactivity
D4448 Guide for Sampling Ground-Water Monitoring Wells
E181 Test Methods for Detector Calibration and Analysis of Radionuclides
ICS Number Code 71.040.50 (Physicochemical methods of analysis)
UNSPSC Code 41111929(Radiation detectors)
ASTM D3649-06(2014), Standard Practice for High-Resolution Gamma-Ray Spectrometry of Water, ASTM International, West Conshohocken, PA, 2014, www.astm.orgBack to Top
|
<urn:uuid:330ab318-15eb-4c3d-aa6a-54989668b1f8>
| 0.055735 |
This End User License Agreement (EULA) is a CONTRACT between you (either an individual or a single entity) and Wingware, which covers your use of "Wing IDE Personal" and related software components. All such software is referred to herein as the "Software Product." A software license and a license key or serial number ("Software Product License"), issued to a designated user only by Wingware or its authorized agents, is required for each user of the Software Product. If you do not agree to the terms of this EULA, then do not install or use the Software Product or the Software Product License. By explicitly accepting this EULA you are acknowledging and agreeing to be bound by the following terms:
- EVALUATION LICENSE WARNING
This Software Product can be used in conjunction with a free evaluation Software Product License. If you are using such an evaluation Software Product License, you may use the Software Product only to evaluate its suitability for purchase. Evaluation Software Product Licenses have an expiration date and most of the features of the software will be disabled after that date. WINGWARE BEARS NO LIABILITY FOR ANY DAMAGES RESULTING FROM USE (OR ATTEMPTED USE AFTER THE EXPIRATION DATE) OF THE SOFTWARE PRODUCT, AND HAS NO DUTY TO PROVIDE ANY SUPPORT BEFORE OR AFTER THE EXPIRATION DATE OF AN EVALUATION LICENSE.
- GRANT OF NON-EXCLUSIVE LICENSE
Wingware grants the non-exclusive, non-transferable right for a single user to use this Software Product for each license purchased. Each additional user of the Software Product requires an additional Software Product License. This includes users working on operating systems where the Software Product is compiled from source code by the user or a third party.
You may make copies of the Software Product as reasonably necessary for its use. Each copy must reproduce all copyright and other proprietary rights notices on or in the Software Product.
You may install your Software Product License only on computer systems and user accounts that are used by you, the licensee. You may also make copies of the Software Product License as necessary for backup and/or archival purposes. No other copies or installations may be made.
All rights not expressly granted to you are retained by Wingware.
- INTELLECTUAL PROPERTY RIGHTS RESERVED BY WINGWARE
The Software Product is owned by Wingware and is protected by United States and international copyright laws and treaties, as well as other intellectual property laws and treaties. You must not remove or alter any copyright notices on any copies of the Software Product. This Software Product copy is licensed, not sold. You may not use, copy, or distribute the Software Product, except as granted by this EULA, without written authorization from Wingware or its designated agents. Furthermore, this EULA does not grant you any rights in connection with any trademarks or service marks of Wingware. Wingware reserves all intellectual property rights, including copyrights, and trademark rights.
- NO RIGHT TO TRANSFER
You may not rent, lease, lend, or in any way distribute or transfer any rights in this EULA or the Software Product to third parties.
You hereby agree to indemnify Wingware against and hold harmless Wingware from any claims, lawsuits or other losses that arise out of your breach of any provision of this EULA.
- THIRD PARTY RIGHTS
Any software provided along with the Software Product that is associated with a separate license agreement is licensed to you under the terms of that license agreement. This license does not apply to those portions of the Software Product. Copies of these third party licenses are included in all copies of the Software Product.
- SUPPORT SERVICES
Wingware may provide you with support services related to the Software Product. Use of any such support services is governed by Wingware policies and programs described in online documentation and/or other Wingware-provided materials.
As part of these support services, Wingware may make available bug lists, planned feature lists, and other supplemental informational materials. WINGWARE MAKES NO WARRANTY OF ANY KIND FOR THESE MATERIALS AND ASSUMES NO LIABILITY WHATSOEVER FOR DAMAGES RESULTING FROM ANY USE OF THESE MATERIALS. FURTHERMORE, YOU MAY NOT USE ANY MATERIALS PROVIDED IN THIS WAY TO SUPPORT ANY CLAIM MADE AGAINST WINGWARE.
Any supplemental software code or related materials that Wingware provides to you as part of the support services, in periodic updates to the Software Product or otherwise, is to be considered part of the Software Product and is subject to the terms and conditions of this EULA.
With respect to any technical information you provide to Wingware as part of the support services, Wingware may use such information for its business purposes without restriction, including for product support and development. Wingware will not use such technical information in a form that personally identifies you without first obtaining your permission.
- TERMINATION WITHOUT PREJUDICE TO ANY OTHER RIGHTS
Wingware may terminate this EULA if you fail to comply with any term or condition of this EULA. In such event, you must destroy all copies of the Software Product and Software Product Licenses.
- U.S. GOVERNMENT USE
If the Software Product is licensed under a U.S. Government contract, you acknowledge that the software and related documentation are "commercial items," as defined in 48 C.F.R 2.01, consisting of "commercial computer software" and "commercial computer software documentation," as such terms are used in 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1. You also acknowledge that the software is "commercial computer software" as defined in 48 C.F.R. 252.227-7014(a)(1). U.S. Government agencies and entities and others acquiring under a U.S. Government contract shall have only those rights, and shall be subject to all restrictions, set forth in this EULA. Contractor/manufacturer is Wingware, P.O. Box 400527, Cambridge, MA 02140-0006, USA.
- EXPORT RESTRICTIONS
You will not download, export, or re-export the Software Product, any part thereof, or any software, tool, process, or service that is the direct product of the Software Product, to any country, person, or entity -- even to foreign units of your own company -- if such a transfer is in violation of U.S. export restrictions.
- NO WARRANTIES
YOU ACCEPT THE SOFTWARE PRODUCT AND SOFTWARE PRODUCT LICENSE "AS IS," AND WINGWARE AND ITS THIRD PARTY SUPPLIERS AND LICENSORS MAKE NO WARRANTY AS TO ITS USE, PERFORMANCE, OR OTHERWISE. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, WINGWARE AND ITS THIRD PARTY SUPPLIERS AND LICENSORS DISCLAIM ALL OTHER REPRESENTATIONS, WARRANTIES, AND CONDITIONS,EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OR CONDITIONS OF MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, AND NON-INFRINGEMENT. THE ENTIRE RISK ARISING OUT OF USE OR PERFORMANCE OF THE SOFTWARE PRODUCT REMAINS WITH YOU.
- LIMITATION OF LIABILITY
THIS LIMITATION OF LIABILITY IS TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW. IN NO EVENT SHALL WINGWARE OR ITS THIRD PARTY SUPPLIERS AND LICENSORS BE LIABLE FOR ANY COSTS OF SUBSTITUTE PRODUCTS OR SERVICES, OR FOR ANY SPECIAL, INCIDENTAL, INDIRECT, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, OR LOSS OF BUSINESS INFORMATION) ARISING OUT OF THIS EULA OR THE USE OF OR INABILITY TO USE THE SOFTWARE PRODUCT OR THE FAILURE TO PROVIDE SUPPORT SERVICES, EVEN IF WINGWARE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN ANY CASE, WINGWARE'S, AND ITS THIRD PARTY SUPPLIERS' AND LICENSORS', ENTIRE LIABILITY ARISING OUT OF THIS EULA SHALL BE LIMITED TO THE LESSER OF THE AMOUNT ACTUALLY PAID BY YOU FOR THE SOFTWARE PRODUCT OR THE PRODUCT LIST PRICE; PROVIDED, HOWEVER, THAT IF YOU HAVE ENTERED INTO A WINGWARE SUPPORT SERVICES AGREEMENT, WINGWARE'S ENTIRE LIABILITY REGARDING SUPPORT SERVICES SHALL BE GOVERNED BY THE TERMS OF THAT AGREEMENT.
- HIGH RISK ACTIVITIES
The Software Product is not fault-tolerant and is not designed, manufactured or intended for use or resale as on-line control equipment in hazardous environments requiring fail-safe performance, such as in the operation of nuclear facilities, aircraft navigation or communication systems, air traffic control, direct life support machines, or weapons systems, in which the failure of the Software Product, or any software, tool, process, or service that was developed using the Software Product, could lead directly to death, personal injury, or severe physical or environmental damage ("High Risk Activities"). Accordingly, Wingware and its suppliers and licensors specifically disclaim any express or implied warranty of fitness for High Risk Activities. You agree that Wingware and its suppliers and licensors will not be liable for any claims or damages arising from the use of the Software Product, or any software, tool, process, or service that was developed using the Software Product, in such applications.
- GOVERNING LAW; ENTIRE AGREEMENT ; DISPUTE RESOLUTION
This EULA is governed by the laws of the Commonwealth of Massachusetts, U.S.A., excluding the application of any conflict of law rules. The United Nations Convention on Contracts for the International Sale of Goods shall not apply.
This EULA is the entire agreement between Wingware and you, and supersedes any other communications or advertising with respect to the Software Product; this EULA may be modified only by written agreement signed by authorized representatives of you and Wingware.
Unless otherwise agreed in writing, all disputes relating to this EULA (excepting any dispute relating to intellectual property rights) shall be subject to final and binding arbitration in the State of Massachusetts, in accordance with the Licensing Agreement Arbitration Rules of the American Arbitration Association, with the losing party paying all costs of arbitration. Arbitration must be by a member of the American Arbitration Association. If any dispute arises under this EULA, the prevailing party shall be reimbursed by the other party for any and all legal fees and costs associated therewith.
If any provision of this EULA is held invalid, the remainder of this EULA shall continue in full force and effect.
A waiver by either party of any term or condition of this EULA or any breach thereof, in any one instance, shall not waive such term or condition or any subsequent breach thereof.
- OUTSIDE THE U.S.
If you are located outside the U.S., then the provisions of this Section shall apply. Les parties aux présentes confirment leur volonté que cette convention de même que tous les documents y compris tout avis qui s'y rattache, soient redigés en langue anglaise. (translation: "The parties confirm that this EULA and all related documentation is and will be in the English language.") You are responsible for complying with any local laws in your jurisdiction which might impact your right to import, export or use the Software Product, and you represent that you have complied with any regulations or registration procedures required by applicable law to make this license enforceable.
The following are trademarks or registered trademarks of Wingware: Wingware, the feather logo, Wing IDE, Wing IDE 101, Wing IDE Personal, Wing IDE Professional, Wing IDE Enterprise, Wing Debugger, and "The Intelligent Development Environment for Python Programmers"
- CONTACT INFORMATION
If you have any questions about this EULA, or if you want to contact Wingware for any reason, please direct all correspondence to: Wingware, P.O. Box 400527, Cambridge, MA 02140-0006, United States of America or send email to info at wingware.com.
|
<urn:uuid:01232dff-3bef-4dd7-a549-561245971419>
| 0.060081 |
Well, I doubt it would hurt.
Seriously though, my brother had almost the exact same problem and we assumed it was the hdd also but we tried reseating everything and it fixed the problem. You might wanna give that a try.
I guess that's not much help but it's all I got.
[ July 15, 2001: Message edited by: Boba Rhett ]
|
<urn:uuid:e22fd4f0-a614-4c60-90b7-b7133d0acc82>
| 0.171256 |
FIND OUT MORE ABOUT
Favorite Monitoring Tools
Scrutinizer, MRTG, and FlowPro.
Scrutinizer is a network monitoring tool that allows users to analyze network traffic using NetFlow and sFlow. Scrutinizer diagnoses traffic congestion by displaying which hosts are using the most bandwidth and what applications they are using.
Graph details about your network devices using MRTG and SNMP. Tobi Oetiker's Multi Router Traffic Grapher is written in perl and works on Unix/Linux, as well as Windows and even Netware systems.
Whether you need to monitor traffic in remote offices, in an isolated data closet, or in a data center, FlowPro provides the information you need to perform root-cause analysis of both network performance and security events.
|
<urn:uuid:531dfea1-9250-4047-83ef-bff7d1f9091d>
| 0.147528 |
“I want my iPhone 5!” Is this you?
|I'm one of those 2 million preorders!||20%||35 votes|
|I like my Google Android, and I'm buying a Google tablet with the money I saved.||21%||36 votes|
|Reluctantly. Does this mean my iPhone 4 is obsolete already?||24%||42 votes|
|I like my flip-phone.||33%||58 votes|
|171 total votes|
|
<urn:uuid:f78a502e-02f9-43cb-9e79-16784b696930>
| 0.113208 |
|home - login - register - about - sitemap|
You must be logged in to rate materials, participate in discussions, and use the filing cabinet.
Forgotten your password? Use our password form and we will send it to you within a few minutes.
Not a member? Our one page registration form is fast, easy, and free.
brought to you by the AAPT, and NSF-NSDL
a member of the comPADRE Digital Library
©2003-2016, All Rights Reserved
contact the Astronomy Center
|about AstronomyCenter.org - terms - privacy - faq|
|
<urn:uuid:2363c22f-0893-4ab7-b01e-5d73f0dea5e5>
| 0.549316 |
[obdgpslogger] Not reading OBDLink SX
chunky at icculus.org
Thu Mar 8 23:36:33 EST 2012
On Thu, Mar 08, 2012 at 03:19:20PM -0800, Josh Miller wrote:
> I am running obdgpslogger 0.16 on a GlobalScale D2Plug (armv7) running ubuntu 10.04 using the Scantool.net OBDLink SX USB scanner with BU-353 GPS. Also, using a 2000 Dakota.
> The GPS works great, using gpsd 2.92.
> I'm not able to read OBD data using obdgpslogger, although I am able to read directly attaching to the serial device using screen:
> # obdgpslogger -s /dev/obd -p -b 0
> Opening serial port /dev/obd, this can take a while
> Baudrate guessing: 9600, 38400, 115200, 57600, 2400, 1200, Couldn't guess baudrate
Try specifying baudrate 115200, as it works with screen below?
> If I connect via screen, I can get something like the following:
> screen /dev/obd 115200
> (get a prompt >)
> send >ATZ
> receive >LM327 v1.3a80 00
> And I can submit codes and get responses.
> An strace on the above obdgpslogger command, doesn't appear to reveal anything interesting other than sending of the ATZ, ATE0, ATL0, ATS0 commands.
> When issuing these AT commands from the screen interface, I get:
> ATZ -> >LM327 v1.3a
> ATE0 -> (no return)
> Anybody see anything like this? Have any pointers for continuing to troubleshoot?
There may be some unhappiness associated with the baudrate guesser. Try
specifying 115200 explicitly?
More information about the obdgpslogger
|
<urn:uuid:40e82144-0f97-4ba7-ab7f-33f504b775e9>
| 0.056298 |
Shred Agent Short Description:
Protects privacy by secure wiping of sensitive files in the background mode
Shred Agent Long Description:
With the wider use of encryption systems, an attacker wishing to gain access to sensitive data is forced to look elsewhere for information. One way to attack is the recovery of supposedly erased data from hard disk or random-access memory.
Shred Agent is designed to protect your privacy. When you delete files in Windows it is possible to undelete or recover them using different file recovery utilities. If you want to make sure that the file you delete cannot be restored by any means, Shred Agent is the right tool for you.
To make sure nobody else has access to your private files, you might use some encryption software. But encryption is useless if the original plaintext can be recovered. Wiping is the process of writing some information directly into the space where the old file was located.
Shred Agent works on hardware level, thus wiping the files completely, eliminating the possibility of ever recovering them. What makes it different from most file wiping utilities currently available on the market is the capability to control the wiping of files in the background. For example you can configure the corresponding filters to wipe temporary file created by office programs.
If Shred Agent is installed on a server and a remote user is trying to delete a file from the "Include" list, Shred Agent will wipe the file via network.
Shred Agent can be customized to suit just your needs. Configure filters to wipe only the files with certain extensions or belonging to a specific directory. Make sure Shred Agent is launched every time you switch on your computer. Record all the information about the files being wiped to a log file.
|
<urn:uuid:c26d386e-fdea-4a81-afc1-3598af5f8668>
| 0.057692 |
QR code readers are available for many popular mobile platforms
Russian VXers have begun using obnoxious barcode-on-steroids QR codes as a launchpad for mobile malware. A recently identified malicious Quick Response code on a Russian website links through a series of redirections to a site punting a Trojan version of the Jimm mobile ICQ client. Android users who follow the links and install …
And that is why you should always check whether applications do not request funny permissions.
Also, it's a good idea to install LBE Security Guard. This way, you can still install these applications, but only allow them access to the things you want to get to.
'Help, help, I'm under attag'
That made me larf.
to print with dodgy QR codes and hijack some advertising posters.
While it might not get quite the same uptake as breaking into a mainstream website and inserting malicious code or appropriate protest messages, would it not be somewhat easier simply to stick replacement dodgy codes over the official ones on advertising posters in well attended areas and wait for people to blindly scan them?
(V mask, obviously!)
To print some "goatse" or "bluewaffle" tags?
(warning : don't google those at work. Nor at home. Nor anywhere if you value your sanity.)
An attacker could easily print up a poster for a band, a store or whatever is popular that advertises a free app that will send you special offers and giveaways via SMS and show you the latest deals or news.
Or a cheaper way would be to get some printable sticker sheets and place the phoney QR code over legitimate ones. The shopping mall where I live already has QR tags all over the place and I wouldn't be surprised if some of them where booby-trapped given the large population of security researchers.
SO it's exactly the same risk/reward trade off as typing a random server URL from an advert into your phone.
No. A server URL is human-readable, so if it ends in disney.com, for example, you can decide how much you trust Disney. If a Disney advert has a dodgy-looking URL, you can figure it maybe isn't really Disney. With the barcodes you have no idea where they'll take you so you don't know who you are trusting, and you can't tell if the barcode doesn't match the advert.
with the difference that if I'm looking up info on a product made by Brand X, I can feel fairly safe if the URL starts with X.com
Of course, no guarantees just like everything else, however I would prefer if at least the phone had the option to read the tag and show the URL on the screen WITHOUT connecting to it.
Some apps do indeed have this feature.
I use the Kaywa mobile reader. It's available for several platforms.
I am not affiliated with them in any way.
as a Winpho7 user, I haven't found a QR app that actually works
Or any other non-M$ app for that matter, eh ? ;-)
I guess the reason is M$ are pushing thier own QR equiv which had colors and common shapes like triangles etc. I think the problem was it didn't have good error correction, was costlier to print
(in color) and was harder to spot in colored posted with triangles and squares!
...those stupid link shorteners in their scamtastic properties?
"Ooh, shit.ly sounds so cool! Everything-ly makes me sound so distant and yet cool at the same time! Let's start posting links that stop working and rely on some iffy domain registry everywhere on the interwebs!"
"..apart from the fact users might be more trusting about a non-human-readable QR code than a conventional URL."
Yes. Sad but true. People are often more trusting about something they CAN'T READ to verify for themselves than about something they can.
Some of us are very smart. On average, though, we are really damned stupid.
I saw some of these square things pop up on /b/ pretty much as soon as they became used; never checked where these were leading, but somewhere at least a tiny bit nasty, I'd guess.
Sweet. I'm gonna print up some QR codes that point to lemonparty and stick them on the tube
Found two in the wild already. In Vancouver, one stuck to the wall of the City Centre subway station, "Win a fantastic iPad 2" with a QR code - that points to an unrecognizable URL. Another one under a wiper, "Pizza Hut - Win your Pizza" asking me to download a getmobio app then scan the QR code to order the pizza - but the URL is also unrecognizable. The first one is a scam, the second one may be legitimate, but I don't trust either.
|
<urn:uuid:0572af5f-60cf-468f-93f9-86816fdd7124>
| 0.171984 |
|04-07-2005 01:47 AM|
count me in!
|04-06-2005 06:34 PM|
Gotta Love This Site
not only can i get good info about products i can buy for my computer, but i can win stuff for it too.
|04-04-2005 11:04 PM|
|sp1k3||add me in as well.|
|03-30-2005 09:29 PM|
|dukeman||count me in. awesome prizes|
|03-30-2005 11:29 AM|
Last Obvious, Strained Post (Can I have the speakers please??)
Okay, I promise to stop now. This is my last post bragging about my computer:
I'm also getting these:
UV Blue Ultra X-Connect 500W Modular Power Supply
2 Dual Cold Cathode Light Kits (One Blue, One UV)
Round, UV Blue IDE Cable, Floppy Cable, and SATA Cables
There's an obvious theme here, perhaps I lack creativity....
Oh well, thank you for indulging me.
|03-30-2005 11:26 AM|
But wait, there's stuff:
Sound Blaster Audigy 2 ZS Platinum
A PlusDeck is a 5-1/4" drive bay mount cassette player. You can use it to make MP3's from your tapes, tapes from your MP3, and just to play music while you use your computer (that's probably what I'll do most of...)
Enormously geeky, and undeniably cool. You can purchase one (or more, it that's your preference) from ThinkGeek. Check it out at:
GapDragon (do YOU remember, or am I just old??)
|03-30-2005 11:22 AM|
Now, some bragging about the optional stuff:
Logisys Blue Acrylic Case Feet
Asus Star Ice CPU Cooler
Vantec Blue Spectrum Fan
Enermax Slot Exhaust Fan
Vantec Hard Drive Cooler
Vantec Nexus Fan Controller
ATX Computer Case custom built by Circo Tech
It's kind of a Lian Li knock off, but looks very nifty. You can check them out at:
|03-30-2005 11:20 AM|
2nd of 5
I need to make five posts, so I'll talk about (what else) my computer:
First, the required stuff:
Intel D925XCVLK with 3.4 GHz Pentium 4 & 1 GB Kingston DDR2 RAM
Sapphire ATI Radeon X700 Pro
2x 80 GB Western Digital SATA Hard Drive
Sony 16X DVD+/-RW
Three more posts to go...
|03-30-2005 11:16 AM|
My First Post
Here's my first post.
Hey, I'm building a computer, I could really use the free stuff. The speaker system would fit my computer room's decor perfectly...
|03-29-2005 09:03 PM|
|Muddy||count me in it ends on my bday|
|03-29-2005 07:05 PM|
|reptilezs||enter me plz|
|03-28-2005 09:04 PM|
|Kilamon||Here's my reply. Put my name on the list.|
|03-27-2005 10:44 PM|
I'm glad you have things of this nature open to us members!
Props and goodluck everyone.
|03-26-2005 06:33 PM|
|Clarence||Wahahahahhahahah I am typing letters with my hands.|
|03-26-2005 03:15 AM|
|madstork91||U know i am in...|
|This thread has more than 15 replies. Click here to review the whole thread.|
|
<urn:uuid:362ea3fb-c7be-486f-8a52-54fafdb5ccb3>
| 0.312151 |
|- candidate number||14295|
|- NTR Number||NTR3827|
|- ISRCTN||ISRCTN wordt niet meer aangevraagd.|
|- Date ISRCTN created|
|- date ISRCTN requested|
|- Date Registered NTR||30-jan-2013|
|- Secondary IDs||NL41498.018.12 / 2012_211; CCMO / METC AMC|
|- Public Title||Usability of Subcutaneous Continuous Glucose Monitoring in Critically Ill Patients.|
|- Scientific Title||Usability of Subcutaneous Continuous Glucose Monitoring in Critically Ill Patients.|
|- hypothesis||The aim of this study is to test the accuracy and usability of the Medtronic Continuous Glucose Monitoring System (Sentrino®) in an ICU–environment, and includes testing the usability of all the components.|
|- Healt Condition(s) or Problem(s) studied||Blood glucose, Monitoring, Critically ill patients|
|- Inclusion criteria||1. Patient is at least 18 years old;|
2. Patient is admitted to the ICU of the Academic Medical Center, The Netherlands;
3. Patient has anticipated life expectancy greater than 96 hours;
4. Patient has recent platelet count greater than 30,000 per micro-liter.
|- Exclusion criteria||1. Patient currently has a suspected or diagnosed medical condition that, in the opinion of the Investigator, warrants exclusion from the study or prevents the patient from completing the study;|
2. Patient is currently participating in another investigational drug or device study;
3. Patient is pregnant, as determined by hospital admission.
|- mec approval received||yes|
|- multicenter trial||no|
|- Type||Single arm|
|- planned startdate ||19-okt-2012|
|- planned closingdate||1-sep-2013|
|- Target number of participants||50|
|- Interventions||The intervention exists of use of Sentrino®.|
|- Primary outcome||The primary objective of this study is to determine the accuracy of subcutaneous CGM glucose measurements as compared with current standard of care blood glucose levels measurements.|
|- Secondary outcome||The secondary objective of this study is to train healthcare workers to use of the Medtronic Sentrino® system, and to obtain feedback from the users on the usability of the Medtronic Sentrino® system.|
|- Timepoints||For the purpose of this study, the Sentrino can be used for a maximum of 30 days. A single sensor can be used for a 72–hour period, and replaced with subsequent sensors each used for up to a 72–hour period for the patient’s stay in ICU. The total duration of time that the patient is on the Sentrino system (through multiple sensors each for 72-hours) may not exceed 30 days.|
|- Trial web site||N/A|
|- status||open: patient inclusion|
|- CONTACT FOR PUBLIC QUERIES||Prof. Dr. M.J. Schultz|
|- CONTACT for SCIENTIFIC QUERIES|| R.T.M. Hooijdonk, van|
|- Sponsor/Initiator ||Academic Medical Center (AMC), Amsterdam|
(Source(s) of Monetary or Material Support)
|Academic Medical Center (AMC)|
|- Brief summary||Introduction:|
Hyperglycemia, hypoglycemia, and glycemic variability are all independently associated with morbidity and mortality of critically ill patients. Blood glucose control with insulin prevents hyperglycemia but is associated with an increased incidence of hypoglycemia and may not affect blood glucose variability. Implementation strategies of blood glucose control with insulin in critically ill patients have mainly used manually operated whole blood portable glucose meters. These meters are impracticable, possibly unsafe, and time– and blood–consuming. Utilization of subcutaneous continuous glucose monitoring has the potential to improve the safety (i.e., prevention of hypoglycemia) and effectiveness (i.e., obtain a higher percent of values in the therapeutic range and less blood glucose variability) of insulin titration in critically ill patients. In addition, utilization of subcutaneous continuous glucose monitoring devices is less time– and blood–consuming than the use of manually operated whole blood portable glucose meters. Medtronic has developed a subcutaneous continuous glucose–monitoring system especially for critically ill patients, called the Sentrino®.
1. The primary objective of this study is to determine the accuracy of subcutaneous CGM glucose measurements as compared with current standard of care blood glucose levels measurements;
2. The secondary objective of this study is to train healthcare workers to use of the Medtronic Sentrino® system, and to obtain feedback from the users on the usability of the Medtronic Sentrino® system.
This study concerns an investigator–initiated observational implementation study in critically ill patients subjected to blood glucose control with insulin, aiming at a blood glucose level between 90 and 150 mg/dL.
Critically ill patients admitted to the intensive care units (ICU) of the Academic Medical Center at the University of Amsterdam, Amsterdam, The Netherlands.
The intervention exists of use of Sentrino®.
Main study parameters/endpoints:
The main study parameter is the accuracy of subcutaneous CGM glucose measurements.
Nature and extent of the burden and risks associated with participation, benefit and group relatedness:
The Sentrino® has been tested and validated in a number of pre–clinical and clinical studies in patients outside the intensive care unit (ICU), and has been found to be safe and accurate for trend. Potential benefits include reduced risk of hypoglycemia, and decreased glycemic variability. Burden and risks include local irritations, bleeding and infection at the site of the sensor.
|- Main changes (audit trail)|
|- RECORD||30-jan-2013 - 9-feb-2013|
|
<urn:uuid:ad1060f8-b847-49a9-abd3-a428f9fb9b93>
| 0.813407 |
provide squash option when merging merge requests
Add a checkbox "Squash into one commit" below "Merge" button of a merge request. The default state of that checkbox should be configurable per instance and per project.
The UI would ask for a commit message (defaulting to branch name) and then execute the equivalent of 'git checkout other-branch; git merge --squash this-branch; git commit -m "commit-message", close the merge request and delete the branch (if the other checkbox is ticked).
This is a common workflow in projects and not supporting it causes a lot of confusion and extra work.
Continued here: https://gitlab.com/gitlab-org/gitlab-ce/issues/4106
Santeri Vesalainen commented
Hopefully this gets to Community Edition, at least eventually.
Github has just announced similar feature https://github.com/blog/2141-squash-your-commits .
Interesting comments, had to vote/subscribe.
Bruno Lorenço Lopes commented
It would be very nice to have this feature in the community edition!
Ionut DINU commented
this would be a grate feature
Dan Cech commented
+1 on this, it would be great to avoid having a multitude development commits cluttering history in master while still being able to use the web UI to accept merge requests.
In that instance I think it is sensible to attribute the commit by default to the user who opened the merge request, but allow the person doing the merge to select a different user to attribute it to if desired.
The merge --squash option is used as the workflow in several companies I have worked for. This option would be perfect for an enterprise use of git where committing to the master branch should be a single commit per feature or issue. The developer branch will contain the history and incremental commits but once the code review is completed / merge request is finished all other developers care about is the final changes (not intermediate steps)
Tomáš Procházka commented
I vote for this feature. On open source project is great if is possible to trace source of commits, especially if multiple peoples work on it. But in company is completely different situation. Author of the pull request is always one user, if reviewer want some changes it produce more useless commits in the origin branch. And result should be only one commit with desired feature.
@GitLab: maybe this is not what you meant, but just to clarify: `git merge --squash` does not force push and does not touch the source branch: it only creates a new commit.
AdminGitLab team (Admin, Gitlab) commented
In my opinion squashing also changes history, the sha1's and the ordering are now gone from the repo and put into some text. Anything that involves force pushes involves changing history, although I agree that squashing has less of an impact. ^Sytse
The question in my mind is: who would be the author of the new commit if the merge request has multiple authors. `merge --squash` just creates a new commit under the current author by default. We can of course make Gitlab chose an author smartly, maybe just chose the one who made the most commits, and if draw take the one who made the earliest commit.
@Fabio: I believe they are not the same: rabase changes history, and this does not: it creates a single commit on top of the target that is the squash of all new commits.
Fabio Sobral commented
As noted by Maxime, this is similar to http://feedback.gitlab.com/forums/176466-general/suggestions/4289653-rebase-merge-requests-in-the-web-ui.
Not exactly the same thing, but kind of different ways to implement the same workflow.
Maybe consider merging both suggestions? IDK how this works.
Sam Gleske commented
This would be more useful if GitLab tracked in a single merge-request multiple force push revisions. That is to say if the state of the MR has been changed you should be able to see the old state and the current state as well as N number of changed states. I would submit that as another feedback issue but I'm currently out of votes. Having that capability would compliment another feedback of mine nicely: http://feedback.gitlab.com/forums/176466-general/suggestions/6306111-more-robust-code-diff-ing-in-mr
Andrew Meyer commented
@Gerard "Once the commit has been pushed, the oppoortunity for squashing has been lost" That's actually not true. After the code review is complete, you can squash + force push.
Gerard Stannard commented
Having to squash locally at the command line means we don't push small commits for immediate code review feedback. Once the commit has been pushed, the oppoortunity for squashing has been lost, so developers tend not to commit until they're ready to squash many small commits.
Jody Mulkey commented
Currently, merging using the GitLab UI results in all commits within the source branch being inserted into the history of the target branch. For a large feature or fix with lots of commits, this clutters the target branch with potentially extraneous commits. This clutter can make it difficult to cherry-pick features/bug fixes into and out of other branches (for releases, for example), and build clean release notes.
This can be worked around by doing manual command-line steps to merge the source into the target. It would be extremely convenient, however, to do this from the GitLab UI.
Erik Donohoo commented
I can't stress how important this is. It would be magnificent to have this.
Ryan Shelley commented
This would be extremely useful as part of our GitFlow process to be able to create releases of individual features. More importantly, the ability to extract a problematic feature from a release (feature that wasn't completely tested or is buggy). Otherwise it's difficult to revert the individual commits of a feature to remove it from a release.
|
<urn:uuid:0bb0deca-cc28-4df3-b0ef-a804fe4cea94>
| 0.060175 |
ERROR: Macro postandcourier/header is missing!
Ohio man who confessed in video turns himself in
Back to article
© 2016, The Post and Courier, an Evening Post Industries company. All Rights Reserved.
|
<urn:uuid:66be14b4-8f53-4e23-8979-07fb52f1e51a>
| 0.290419 |
Issue Autologon to Windows will not continue unless you press "Ctrl + Alt + Del" at credential provider level.
Known to apply to the following Sophos product(s) and version(s) SafeGuard Device Encryption
Operating systems Windows Vista, Windows 7
For a working autologon process, the following Microsoft Group Policy has to be set to Enabled:
Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options: Interactive logon: Do not require CTRL+ALT+DEL”
Every comment submitted here is read (by a human) but we do not reply to specific technical questions. If you need technical support please post a question to our community. Alternatively for licensed products open a support ticket.
|
<urn:uuid:3a76fb62-63dd-468c-949f-5d30386725d6>
| 0.68207 |
Subject: Re: Inconsistent dependency handling
To: None <[email protected]>
From: None <[email protected]>
Date: 05/24/2006 21:51:58
On Wed, May 24, 2006 at 03:12:24PM -0400, Chapman Flack wrote:
> The difference also applies between two cases of binary installation:
> 1. via the bin-install target (directly), and 2. by pkg_add as a
> prerequisite of something it is installing.
The major difference in that case is that bin-install does exact
matching and pkg_add looks for the latest version of a package.
> Also still missing is the "slicker way, possible future work" in
> [http://mail-index.netbsd.org/tech-pkg/2005/03/20/0023.html ~halfway]
> --the idea that there shouldn't be two independent
> ways of deciding what binary package to install, one implemented in
> bsd.pkg.mk and one implemented in pkg_add for the automatic installation
> of prerequisite packages, but the makefile should pass some information
> to pkg_add to guide its decisions, and what pkg_add isn't able to figure
> out on its own it should hand back off to the make system again.
This description of the situation is IMO incorrect. pkgsrc normally
requires exact matches for bin-install as dependency and therefore
pkg_add wouldn't pick the best match. The only situation were this makes
a difference is when a newer version is available as binary package than
available in the tree. Often this is a broken dependency though.
> - I want some exceptions to "bin-install where possible", for instance I
> don't want the ftp.n.o binary of kdelibs because I want a kdelibs built
> with option cups. I added code (not committed yet) that sets
> BINPKG_SITES= for any package whose PKG_OPTIONS.foo differs from its
> PKG_SUGGESTED_OPTIONS. (I am typing this from memory so don't shoot me
> if I get some of the variable names wrong.) This should have the effect
> I consider ideal: because the local packages/All directory is
> unconditionally prepended, if I already have a binary package stored
> locally (presumably built with my options), that is installed, but if
> not, no searching of ftp sites is done and that package is built from
> source with my options.
I'd prefer to see options encoded in the binary package name instead,
which would fix this problem as well. It would need some extensions to
Dewey to match options, but that's a separate question.
> But of course it doesn't work because if package bar, with unmodified
> options, is being installed from the ftp site, and depends on kdelibs,
> not yet installed, pkg_add just grabs kdelibs at the same time. Argh.
> So somehow pkg_add needs a way to consult the make infrastructure for
> each prerequisite it is about to automatically install, to decide if
> a binary install for that package is ok. Note that my original proposal
> in the e-mail needs to be extended somehow to cover this case.
pkg_add should *never* consult the make system. The relationship if any
is "source build use pkg_add", but never the other way around. This
might be solvable by requesting pkg_add to be non-recursive, but in
general is a difficult problem. I'm not sure whether this can be solved
elegantly though. A combination of pkg-summary and a "reject" list (aka
don't install binary packages matching this pattern) might do this, but
frankly I'm not sure if it worth the trouble.
> - I set SUSE_PREFER=9.1 because the binary firefox I want to install
> won't run against 10.0. But that doesn't stop pkg_add looking
> for suse_foo>=9.1 and deciding that 10.0 satisfies the Dewey match.
This is similiar to the PHP problem. For that it is solved by the
additional API requirement (php-4.4.*), but this is one of the situation
where we might want to extend the current Dewey patterns. The other
situation is being able to specify alternative matches (e.g. foo|bar as
pattern matches everything foo and bar matches, when in doubt, it
prefers packages matching foo). I think those are the only non-Dewey
pattern which can not be easily converted.
> Since it looks like you /did/ get funded to rewrite pkg_install
> (congrats :) I suppose this is the right time. :)
You are the second person which knows more than I do :-)
|
<urn:uuid:f26a8caf-55d3-435f-99bd-9e71533b3d4b>
| 0.052789 |
Whether a public cloud or private cloud, everyone agrees that cloud computing key benefits include scalability, instant provisioning, virtualized resources and ability to expand the server base quickly.
However, “cloud computing” is still used to mean a lot of things to a lot of people. When it comes to slicing up the cloud taxonomy a little further, there’s still quite a bit of confusion between the public cloud and private cloud computing.
The public cloud is defined as a multi-tenant environment, where you buy a “server slice” in a cloud computing environment that is shared with a number of other clients or tenants.
Public clouds such as Amazon EC2 and Rackspace Cloud have a number of trade-offs:
- Utility Model – Public Clouds typically deliver a pay-as-you-go model, where you pay by the hour for the compute resources you use. This is an economical way to go if you’re spinning up & tearing down development servers on a regular basis.
- No Contracts – Along with the utility model, you’re only paying by the hour – if you want to shut down your server after only 2 hours of use, there is no contract requiring your ongoing use of the server.
- Shared Hardware – Because the public cloud is by definition a multi-tenant environment, your server shares the same hardware, storage and network devices as the other tenants in the cloud. Meeting compliance requirements, such as PCI or SOX, is not possible in the public cloud.
- No Control of Hardware Performance – In the public cloud, you can’t select the hardware, cache or storage performance (SATA or SAS). Your virtual server is placed on whatever hardware and network, the public cloud provider designates for you.
- Self Managed – with the high volume, utility model, self managed systems are required for this business model to make sense. Advantage here for the technical buyers that like to setup and manage the details of their servers. Disadvantage for those that want a fully managed solution.
The majority of public cloud deployments are generally used for web servers or development systems where security and compliance requirements of larger organizations and their customers is not an issue.
Private Cloud Computing, on the other hand, by definition is a single-tenant environment where the hardware, storage and network are dedicated to a single client or company.
Private cloud computing also has a number of trade-offs:
- Security – Because private clouds are dedicated to a single organization, the hardware, data storage and network can be designed to assure high levels of security that cannot be accessed by other clients in the same data center.
- Compliance – Sarbanes Oxley, PCI and HIPAA compliance can not be delivered through a public cloud deployment. Because the hardware, storage and network configuration is dedicated to a single client, compliance is much easier to achieve.
- Customizable – Hardware performance, network performance and storage performance can be specified and customized in the private cloud.
- Hybrid Deployments – If a dedicated server is required to run a high speed database application, that hardware can be integrated into a private cloud, in effect, hybridizing the solution between virtual servers and dedicated servers. This can’t be achieved in a public cloud.
As opposed to public clouds, private clouds are not delivered through a utility model or pay-as-you-go basis because the hardware is dedicated. Private clouds are generally preferred by mid and large size enterprises because they meet the security and compliance requirements of these larger organizations and their customers.
|
<urn:uuid:6d2183ce-ae46-47ff-b145-d9c1f7f5c5ac>
| 0.11448 |
|Typ av kungörelse||Beviljande|
|Publiceringsdatum||10 jun 1941|
|Registreringsdatum||25 jul 1939|
|Prioritetsdatum||25 jul 1939|
|Även publicerat som||US2266169, US2304984, US2341364, US2388893|
|Publikationsnummer||US 2245257 A, US 2245257A, US-A-2245257, US2245257 A, US2245257A|
|Uppfinnare||Chester W Crumrine|
|Ursprunglig innehavare||Eastman Kodak Co|
|Exportera citat||BiBTeX, EndNote, RefMan|
|Hänvisningar finns i följande patent (14), Klassificeringar (7)|
|Externa länkar: USPTO, Överlåtelse av äganderätt till patent som har registrerats av USPTO, Espacenet|
June 1-0, 1941- c. w. CRUMRINE LENS MOUNZ Filed July 25, 1939 CHESTER MCQUMP/NE ATIORNE Y Patented June 10, 1941 LENS MOUNT Chester W. Crumrine, Rochester, N. Y., assignor to Eastman Kodak Company, Rochester, N. Y., a corporation of New Jersey Application July 25, 1939, Serial No. 286,385
This invention relates to optical systems and particularly to lens mounts.
It is an object of the invention to provide a method of mounting lenses and particularly single lenses or elements, alone or as part of a more complex system.
It is a particular object of the invention to provide an extremely inexpensive but highly accurate lens mount which can be safely assembled by simply inserting the mount into a tube provided therefor. The tube may be cylindrical (or conical) with circular, rectangular or any desired cross section.
By way of example, the simple cylindrical case which cylinder has a circular cross section, will be considered in detail. If a lens element such as a meniscus glass element is fitted snugly into a mount there is pressure exerted on the element from all sides toward the optic axis thereof. Such pressure is liable to cause occasional break-,
age of the lenses during manufacture and to introduce strain into the lens which, from an optical viewpoint, is, of course, quite unsatisfactory and which also makes the lenses susceptible to breakage during later use.
According to the present invention, this pressure on the lens is descreased and the troubles caused thereby eliminated by molding a plastic rim onto the periphery of the lens which rim extends axially from both sides of the lens and has an outer surface which is substantially concave toric. In this connection, the word toric is used to include any surface in which the diameter near the center is less than the diameter near the end of the cylinder. of course, in the case of a cone the actual diameter of the rim adjacent to the lens may be slightly greater than the diameter at one end of the rim, but since the chamber into which the lens is to be mounted in a camera would also be conical in this case, the efiective diameter of the rim near the lens is less than the efiective diameter of the rim at either end.
When this arrangement of the rim is used, the rim may be inserted fitting snugly into a cylinder and the pressure of the cylinder on the rim will be exerted mainly on the ends of the rim and not on that portion adjacent to the lens. The lens itself will exert a counterpressure outward on the central part of the rim and the rim will be distorted slightly under these pressures. That is, the rim itself will change in shape so that no excessive pressures will be exerted on the lens element itself.
The present invention-is particularly useful with those described in copending applications, Serial Numbers 286,386 and 286,384 filed concurrently herewith by Donald L. Wood and by myself respectively.
Other objects and advantages of the present invention will be apparent from the following description when read in connection with the accompanying drawing in which- Fig. 1 shows a simple meniscus lens in cross section.
Fig. 2 shows the cross section of the pertinent parts of a molding machine for mounting a lens according to the invention.
Fig. 3 shows one embodiment of the invention.
Fig. 4 shows the embodiment shown in Fig. 3 as mounted in a portion of a camera wall.
In Fig. 1 a meniscus lens element Hl having an optic axis H is shown in cross section. The
surfaces of this lens have radii of curvature RI 20 and R2 respectively and the axial thickness thereof is T. Since the element as shown is in that stage of manufacture in which it has not yet been centered, the diameter thereof taken from the optic axis is different in difierent directions as indicated by HI and H2.
In Fig. 2 the lens element I0 is held by a zonal clamp consisting of members I4 and IS in a molding machine comprising molds l6 and IT. The zonal clamp members l4 and I5 are carried by plungers l2 and I3 respectively, the
plunger 12 being held in place by a spring I9- and a plate 20 and the plunger 13 being held in place by a screw 2| in a plate 22 having an adjusting knob 23 with scale 24 and index 25.
According to the invention a rim is molded onto the element In by injecting a plastic through an injection nozzle 21 into the chamber 26 around the periphery of the lens. The zonal clamp members l4 and I5 prevent any-of the plastic entering chamber 28 adjacent to the central portions of the lens surfaces. According to the invention, the molding machine is so ar ranged that the outer surface of the rim is slightly concave. This is best seen in Fig. 3 wherein the rim of the lens 10 is indicated as 30. The outer surface 29 of this rim is seen to be concave toric. Incidentally, since the lens [0 is held by a zonal clamp in the mold, the outer periphery of this rim 3'0 is optically centered on the axis H as indicated by the arrows H.
Furthermore, I have made the surprising discovery, that a rim molded as shown in the drawing, which rim has an axial length greater than its radial thickness and which rim extends axially from both sides of the lens, will have the required concave surface 29 .if it is made by injecting the molding into a mold whose walls are straight and cylindrical. That is, although the mold itself has straight walls the rim when finished and removed from the mold will assume a shape in which the outer surface is concave toric.
As shown in Fig. 4, this lens ill in its rim 30 may be inserted snugly into a chamber, for example, in the wall of a camera. The rim 3B is pushed into this chamber until the end surface of the rim comes in contact with an abutment 33 in such a camera wall 32, which is also provided with an aperture 35 which acts as the aperture for the lens I 0.
The Fig. 4 illustrates the advantage of this type of rim. As is shown, the rim 30 fits snugly into a cylinder in the housing 32 so that pressure indicated by arrows 36 is exerted on the ends of this rim 30. The fit is snuggest at the ends of the rim. Due to the curvature of the surface 29, there is no direct pressure on the rim 30 adjacent to the lens element I0. On the other hand, the
element Ill exerts a counterpressure 31 outward on the rim 30 and together with the pressure exerted at the point 36, this pressure distorts the rim 3!] bending it to or towards a shape in which the Outer surface 29 thereof is perfectly cylindrical and not concave. Actually of course, the surface 29 remains slightly concave even when inserted in 'thech-am-ber' provided therefor. Although the curvature 29 is very slight and the amount of distortion of the rim 30 which is permissible is also very small, this invention succeeds in reducng the pressure on the lens l suf- I ficiently to eliminate breakage during manufacture and strain in the lens after it is mounted in a camera.
Obviously by having the injection nozzle and the line of separation of the mold shown in Fig. 2 at a point opposite to the lens l0 instead of at one end of the rim chamber 26, the mold could be arranged so that the concavity of the surface 29 could beany desired amount. However, I have found that sufficient concavity and in fact an almost ideal arrangement is produced when the surface of the mold H is perfectly flat, or more correctly is perfectly cylindrical.
If the radial thickness of the rim 30 is too great, compared with its axial thickness, 1. e., its length, the resiliency of the rim is reduced to a point where little advantage is gained by the invention. However, it is difilcult to state exactly when this advantage becomes negligible, but in general the radial thickness of the rim should not be greater than its length. and of course thelength should be sufllcient to extend axially from both sides of the rim of the lens Ill.
Having thus described in detail one embodiment of my invention, 1' wish to point out that it is not limited to the specific structure shown but is of the scope of the appended claims.
What I claim and desire to secure by Letters Patent of the United States is:
1. A camera lens mount comprising a camera wall having a tubular aperture therein, an abutment on the inner wall of the tubular aperture, a, plastic rim holding said lens in axial alignment in the aperture and fitting snugly in the tubular aperture against said abutment, the outer surface of the rim being concave toric whereby the fit is snuggest near the from and rear edges of the rim.
2. An optical system comprising a tubular lens mount, abutment meanson the inner wall of the tubular mount, a lens axially aligned in the mount and a plastic rim for the lens fitting snugly in the mount and against the abutment means, the outer surface of the rim being concave in section and the fit between the rim and the mount being tightest at the front amid ear edges of the rim.
CHESTER W. CRUMRINE.
|US2420279 *||9 jun 1944||6 maj 1947||Polaroid Corp||Laminated polarizer and birefringent layers|
|US2423491 *||14 jul 1943||8 jul 1947||Polaroid Corp||Optical lens mounting|
|US2423492 *||14 okt 1943||8 jul 1947||Polaroid Corp||Lens mounting|
|US2455476 *||20 jul 1945||7 dec 1948||Rca Corp||Mounting system for elements of television projectors|
|US2500405 *||4 feb 1946||14 mar 1950||Polarold Corp||Reticle mount|
|US2807982 *||2 jan 1953||1 okt 1957||Eastman Kodak Co||Lens centering clamp and testing device|
|US2894430 *||31 aug 1956||14 jul 1959||Zeiss Jena Veb Carl||Mounts for a composite optical lens combination|
|US3888568 *||20 jun 1974||10 jun 1975||Polaroid Corp||Multi-element lens assembly|
|US4106745 *||1 apr 1975||15 aug 1978||Phillips Petroleum Company||Apparatus for attaching an insert in a mold|
|US5188092 *||13 dec 1990||23 feb 1993||United States Surgical Corporation||Disposable rigid endoscope|
|US5369525 *||2 dec 1992||29 nov 1994||United States Surgical Corporation||Ring lens assembly for an optical viewing device|
|US5416634 *||11 sep 1992||16 maj 1995||United States Surgical Corporation||Optical viewing device|
|US5666222 *||16 feb 1995||9 sep 1997||United States Surgical Corporation||Optical viewing device|
|US5900971 *||28 jun 1994||4 maj 1999||United States Surgical Corporation||Optical viewing device|
|Kooperativ klassning||Y10S359/90, Y10S425/808, G02B7/02|
|
<urn:uuid:142356fa-b821-401f-970a-3ff4a87d0198>
| 0.11701 |
Obeo Releases Obeo Designer 5.0
Last week, Obeo, released a major update of their Obeo Designer product. One of the key goals of the tool is to give the ability to create domain specific modeling tools, based on Eclipse GMF (Graphical Modeling Framework) without the knowledge of GMF (or EMF, Eclipse Modeling Framework). The tool is based on the concept of "View Points":
The notion of viewpoints is an abstraction that provides a specification of a system, limited to a particular set of problems. It was introduced in the specification IEEE 1471. In our context, we use to provide our users a set of visual representations focused on a particular concern.
For each viewpoint, it is possible to define what to display and their graphic features, tool palettes, and their associated behaviors. The graphical aspects are dissociated of behavioral aspects.Obeo Designers supports the integration between viewpoints, as well as with UML. The UML modeler will be released in the coming months.
InfoQ spoke with Jerome Benois and Freddy Allilaire from Obeo about this new release.
InfoQ: why do you think the enterprise needs to ramp up its modeling capabilities?
Obeo: The big idea of modeling is to abstract from the technologies to reach a “human understandable” level. Tools can focus on business problems and not just on technical constraints. With Obeo Designer, business managers and software architects have the ability to define and share a common language. Modeling formalizes and hence facilitates the consistency of their communication. Each role in the company shows a common model and according to its own vocabulary and concerns.
Obeo’s modeling approach is based on DSLs and Viewpoints to raise this abstraction level. We facilitate the development of models that represent systems based on the analysis of requirements and constraints that the system must fulfill. The first modeling tools where “dogmatic” with standards such as MDA and UML. They were not tailored to help align business needs with information technology. In each case, one had to adapt its own semantics to fit in these tools, inevitably with compromises. Tool providers were faced with the difficulty of defining an ever-comprehensive language.
DSLs offer a dedicated formalism for each domain with as few semantics and concepts as needed. The result is a greater alignment with the business and simplified modeling. But a full DSL approach could be difficult to develop in a large group with several business units that are distinct from each other. It would lead to the emergence of many formalisms for each business units. We believe it is better to define a common language shared by all stakeholders, an ubiquitous language. To be effective and usable by all stakeholders it is necessary to have a projectional approach.The standard IIEEE 1471/D4.1 structures this approach with the concept of viewpoint on a system. Every viewpoint focuses on a given issue. This structure leads to a simplification of the analysis process which is then divided into several concerns clearly defined. Each viewpoint makes it possible to meet a set of questions for a profile given analyst using "views" that will validate the compliance of a given architecture to different rules of perspective. This approach is based on the principles of separation of concerns, refining iterative information but mainly on the exploitation of multiple specialized representations of the same model. The model engineering and MDA approaches are most consistent with this kind of approach because they help define the concepts handled accurately and unambiguously and operate a unified models corresponding to these concepts.
InfoQ: could you share with us some of the problems your customers are tackling with Obeo Designer?
Obeo: Typically, customers use Obeo Designer to collaborate on the design of complex projects subject to many constraints. It allows them to develop a number of tools thanks to a separation with different points of view (logical, physical, safety, etc.) This approach is very generic, recently, we were surprised to see people applying our approach to robotics.
In the Business Modeling context, our product is used to for instance to support the production of Insurance Services and Product Catalog . In Finance, we have customers used by financial analysts to define pricing and business rules in a comprehensive language.
In the context of Enterprise Architecture, Obeo Designer is used to support Enterprise Transformation. It supports TOGAF with key viewpoints : Strategic, Business, Data, Application and Technology viewpoints. This module supports the core diagrams and matrices define by the Open Group specification.
In the System Engineering context, customers use our product to support the system validation and verification based on Hardware / Software Consistency and Functional Analysis.
In Non-Functional Requirement Analysis, Obeo Designer is used to support the production of Timing Constraint Analysis and Risk Analysis.
We will be adding some new case studies to our web site shortly.
InfoQ: When would you recommend users to create a graphical designer vs a textual editor?
Obeo: Some people, usually, more technical, have more affinities with textual notations. Computing languages are more natural and efficient to most of us based on a textual syntax. On the other hand, graphical notations support higher levels of abstraction. The business generally prefers using graphical representations. Some graphical representations are natural to human being like a containment represented as a tree or also a sequence represented as several boxes linked each other by an arrow. Drawing is more natural for representing a workflow or to design a plane. Obeo Designer helps you a lot with graphical representations and it is an important asset of the product. However it provides also other kinds of representations like table and matrix. Also you can mix graphical and textual modeling in a same editor in order to take the best of both approaches. We are fully compatible with Xtext (a tool that provides you a textual syntax for your domain model) and EEF (a tool that provides you a form representation for your domain model).
InfoQ: Code generation has had some difficulties in the past to enter the software construction process, what has changed?
Obeo: The first generations of code generators were mostly based on the black box approach. These solutions were not adaptable to the specific user needs. These kinds of solutions were only practical to generate code skeletons. Of course, the synchronization between your entry point and the corresponding generated code was quickly lost. This yielded little gain from the code generation perspective.
One can note that, code generation has always existed ! what is a code compiler? Fortunately now most of the peoples don’t have to write assembly code and this generation is transparent for us.
Code generation tools (especially those based on modeling) have really progressed and offer a simple syntax, efficient code generation, advanced features on par with modern IDEs like JDT. In Obeo Designer, the solution for code generation is Acceleo. Acceleo is an Open-Source code generation environment based on a pragmatic vision of MDA, hosted by the Eclipse Foundation. It implements the OMG standard: MOF Model to Text Language. It allows the automatic generation of application (or parts thereof) and fit into the agile development movement. A change in the structure of the application can be built much faster than by hand. Acceleo is an adaptive solution with some ready-to-use solutions that fit to specific needs. In addition to Acceleo, Obeo Designer also brings along Obeo Traceability to detect and correct all incoherence and synchronization problems between your application code and your models.
But code generation is not the solution to everything. During the development process, software architects should carefully decide if a technical choice belongs to the framework or to the code generator. There is no global answer and it depends of the use case.
|
<urn:uuid:d6d34711-4e71-4809-8839-d4ffcdf424cf>
| 0.044406 |
I am planning to buy the AM10 BOSE speakers, and the seller was suggesting that Yamaha v3900 will suit my requirements which is
1. Connect to my media Gate 800HD to watch my stored videos, music etc and
2. be able to stream audio-video wirelessly in another room to a Samusing TV....?? am not sure how-perhaps using some sort of LED IR remote??
3. be able to play all fomrats that are playable by MEDIA GATE 800HD
4. Be able to connect to the network to play any internet videos/music-either wirelessly or thro ethernet?? Am not sure if wireless will work well
5. Has a USB connection facility
Does anyone know of any other reciever which has these features and is better in terms of cost -this one is apparently AUD3000
Any guidance by someone who knows the features and has used it -knows if I am on the right path selecting this reciever or should I check out something comparable?
|
<urn:uuid:dcb597a3-308b-4991-92f9-48cc0b7d82cf>
| 0.378497 |
In theory, anyone can download, install, and use WMS client software. Some clients are:
Refractions PHP WMS Client, and
To make a client work, you would install the software on your computer.
Then, you would enter the URL of the WMS service into the client.
For example, in ArcGIS (not yet fully working because it doesn't handle time!), use
"Arc Catalog : Add Service : Arc Catalog Servers Folder : GIS Servers : Add WMS Server".
In ERDDAP, this dataset has its own WMS service, which is located at
(Some WMS client programs don't want the ? at the end of that URL.)
of datasets available via WMS at this ERDDAP installation.
In practice, we haven't found any WMS clients that properly handle dimensions
other than longitude and latitude (e.g., time), a feature which is specified by the WMS
specification and which is utilized by most datasets in ERDDAP's WMS servers.
You may find that using
Make A Graph
and selecting the .kml file type (an OGC standard)
to load images into Google Earth provides
a good (non-WMS) map client.
of datasets with Make A Graph at this ERDDAP installation.
Web page authors can embed a WMS client in a web page. For the map above, ERDDAP is using
OpenLayers, which is a very versatile WMS client.
OpenLayers doesn't automatically deal with dimensions other than longitude and latitude
A person with a browser or a computer program can generate special WMS URLs. For example,
|
<urn:uuid:6369adf5-8a5d-4fdb-8f6d-8fd9030a9caf>
| 0.071727 |
The .NET Developer's Guide to Directory Services User Account Management
In this section, we take many of the abstract concepts we learned in the first part of the book and begin to apply them to real-world problems. One of the most common programming activities that most developers will perform against Active Directory and ADAM is user account management.
Active Directory user management is fairly straightforward once we know all of the basic rules. However, there are many interesting rules and behaviors concerning how attribute values in Active Directory are used to determine how user objects behave in Windows. In order to get the results we want, it is important to learn these rules and behaviors. We try to demonstrate most of them in this chapter.
To a lesser extent, we also investigate user account management in ADAM. ADAM is very similar to Active Directory in most respects, but it has a few significant differences worth pointing out.
When we speak of user objects for the remainder of this chapter, we are really talking about the user class in both Active Directory and ADAM. This is the class that acts as a security principal for Active Directory (and often, for ADAM). It is typically the class that we care the most about. The first thing we are likely to want to do with user accounts in Active Directory is find them. Given all that we know about searching from Chapters 4 and 5, this should be easy. Essentially, we just need to know where we want to search and what filter to use to find users.
Let’s start with the LDAP filter. Our goal is to build an LDAP filter that will find exactly what we want and that will be as efficient as possible. A few attributes in Active Directory distinguish user objects from other object types that we can use to build a filter:
The objectCategory attribute has the advantage of being single-valued and indexed by default on all versions of Active Directory. This attribute is meant to be used to group common types of objects together so that we can search across all of them. Many of the schema classes related to users share the same value of person as their object category. While this is useful for searches in which we want to find information across many different types of user-related objects, it is not as useful for finding the user objects we typically care about (which are usually security principals). For example, in Active Directory, since both user and contact classes share the same objectCategory value of person, it alone will not tell them apart.
The objectClass attribute seems like a no-brainer, as (objectClass=user) will always find user objects exclusively. The problem here is that in many forests, the objectClass attribute is not indexed and it is always multivalued. As we know from the section titled Optimizing Search Performance, in Chapter 5, we generally want to try to avoid searches on nonindexed attributes, so using objectClass alone in a filter might not be the most efficient solution. This is why we see a lot of samples that search for user objects using an indexed filter like this:
This will get the job done, but we can do even better than this.
One key difference between contact objects and user objects in Active Directory is that user objects have a sAMAccountName attribute that is indexed by default. Thus, we could build a filter like this:
This will separate the contacts from the users effectively. However, another approach is available that can find user objects directly, and it may be the most efficient technique for Active Directory:
Using the sAMAccountType attribute with a value of 805306368 accesses a single-valued, indexed attribute that uniquely defines user objects. The only downside here is that this attribute is not well documented, so it may not be recommended by Microsoft. However, in our investigations, it is effective.
One piece of good news is that all of these attributes are included in the global catalog, so we can use all of these filters there as well.
This should provide a foundation to build on for various user object searches. We may also wish to combine these filters with other attributes to find different subsets of user objects matching specific criteria. We will see some examples of that in the rest of this section.
Finding Users in ADAM
Things change a little bit for ADAM, because we don’t have things like sAMAccountName or sAMAccountType on an ADAM user. These attributes are actually from the auxiliary class called securityPrincipal. This class happens to be slightly different depending on whether it comes from Active Directory or ADAM. In this case, the securityPrincipal class does not contain sAMAccountName or related attributes in ADAM.
This means that we need to adjust our filters slightly to find our users in ADAM. It turns out that we can use some other indexed attributes, such as userPrincipalName, to find our users. However, since this attribute is not required, we have to be careful and ensure that all of our user objects have set a value for userPrincipalName.
As mentioned in Chapter 8, ADAM also includes the idea of a userProxy object that we often will want to return as well. To do so, we should look for common attributes found on both classes that would filter them for our needs. In this case, we know that both the user and userProxy classes contain userPrincipalName, so it is a good candidate for this purpose. We could use a simple filter such as (userPrincipalName=*) if we knew that all of our objects would have a value set for this attribute. However, since not all user or userProxy objects might have a value set for userPrincipalName, we would have to use objectCategory to be safe. For example:
The implications here are that if any other class in the directory also shared the same objectCategory of person or userProxy, they would also be returned. In default ADAM instances, this does not occur, but we should always check with our particular ADAM instance. Now, if we want to separate the two classes and treat them differently, we can use objectClass, as the classes are different for each type:
The first filter will return only user objects using objectCategory as an index, and the second will return only userProxy objects in the same manner. It is important to remember that we can customize ADAM heavily with application-specific classes. We should never rely on the fact that any particular class will be there or even be indexed. As such, these are only guidelines, and we really need to check the particular ADAM instance’s schema ourselves to determine what is there.
|
<urn:uuid:f8d91a45-af58-4ed4-a1e5-ac8b8bccf2e3>
| 0.111861 |
Client: Can you help us out with some Laptops please?
Me: Sure... we got this [Specs Here], this [Specs Here] and also this
Client: But these arn't Laptops, these are Notebooks!
Me: er... I'm sorry?
Client: These are Notebooks! I'm not searching for Notebooks. Do you have any Laptops?
Me: Erm.... I'm really sorry sir but we only stock Notebooks
|
<urn:uuid:cd871eff-c0b3-4c0c-91cc-b2e6aacc3d34>
| 0.273008 |
Going down OpenWrap’s rabbit hole, the first thing you do is retrieve a fresh copy of o.exe, the Command shell. At a whopping 32k (for the debug build), you could get the initial file in 234 text messages. Lets open the file straight from the web site, and we’re greeted by installation options.
The OpenWrap shell is not installed on this machine. Do you want to: (i) install the shell and make it available on the path? (c) use the current executable location and make it available on the path? (n) do nothing?
I think the options are quite self-explanatory, but let’s recap:
- (i) will copy o.exe to ~/AppData/Local/OpenWrap/ and add this path to your PATH environment variable for the current user
- (c) will simply add an o.exe.link file in ~/AppData/Local/OpenWrap/ and add this path to your PATH
- (n) will do nothing this time around and run o.exe as normal.
Let’s choose the first option
OpenWrap packages not found. Attempting download. Downloading http://wraps.openwrap.org/bootstrap [....................] Downloading http://wraps.openwrap.org/wraps/openwrap-18.104.22.16879169.wrap [.............] Expanding pacakge... # OpenWrap v22.214.171.124 ['C:\Users\sebastien.lambla\AppData\Local\OpenWrap\wraps\_cache\openwrap-126.96.36.19979169'] Command was not understood. Type 'help' to get a list of supported commands.
I do hope that this is also quite self-explanatory, but just in case… When the shell tries to execute the first time, it will not find the OpenWrap packages anywhere. At that stage, it will go to the openwrap web-site and download the bootstrap packages to the correct location, which is just a list of URIs to download in a text file.
Once all this is done (and notice the wonderful typo in the output, you can check on github that this is all live code), the shell can now delegate to the openwrap code itself to parse the command. And as there was no command (remember, we started the application from a web browser), the system tells us that the command was not understood.
I tried to make it more complicated but I just didn’t have the time.
|
<urn:uuid:3ec2de64-61ae-4c7e-b5a1-5f788a740f8f>
| 0.65738 |
Re: sasl on smtps: allowing plaintext
- On Wed, Jul 17, 2013 at 08:19:56AM +0200, Vincent Pelletier wrote:
> Maybe I'm being paranoid, but because not all my relays support TLS IThe suggestion is I believe to use smtp_tls_policy_maps to ensure
> cannot be stricter than
> smtp_tls_security_level = may
> without also having separate transports (if I understand correctly).
> So if I do not set noplaintext and someday one of the
> usually-TLS-enabled relays doesn't offer TLS (config hickup...),
> postfix will AUTH.
that TLS is used for destinations where you will be using plaintext
# MITM resistant authenticated TLS
[smtp.example.com]:587 secure match=smtp.example.com
# MITM vulnerable unauthenticated TLS
# Some day when provider adopts DNSSEC and publishes a suitable TLSA
# RRset and you've deployed Postfix 2.11
- On Wed, 17 Jul 2013 13:37:53 +0000, Viktor Dukhovni
> The suggestion is I believe to use smtp_tls_policy_maps to ensureThanks, I think I understand now:
> that TLS is used for destinations where you will be using plaintext
main.cf (or a few -o in master.cf's submission service):
smtp_sasl_security_options = noanonymous
smtp_tls_security_level = must
smtp_tls_policy_maps = hash:blah
This is indeed closer to the mental picture I had of the solution
(host-based lookup), but I didn't notice the need for a laxist
I've the idea to someday move my postfix setup to a server also sending
& receiving mails for its own domain. Is it a bad idea (error-prone)
to mix both of those use cases on a single postfix, generally speaking ?
If I understand correctly, a setup with both roles would need your
initial suggestion (which I setup successfully before noticing the
- On Wed, Jul 17, 2013 at 08:10:44PM +0200, Vincent Pelletier wrote:
> On Wed, 17 Jul 2013 13:37:53 +0000, Viktor Dukhovni"must" is not a valid value for "smtp_tls_security_level", see the
> <postfix-users@...> wrote:
> > The suggestion is I believe to use smtp_tls_policy_maps to ensure
> > that TLS is used for destinations where you will be using plaintext
> > authentication.
> Thanks, I think I understand now:
> main.cf (or a few -o in master.cf's submission service):
> smtp_sasl_security_options = noanonymous
> smtp_tls_security_level = must
documentation for details.
> smtp_tls_policy_maps = hash:blahEither a secure default and insecure exceptions, or the converse.
> [127.0.0.1] none
|
<urn:uuid:e2b8e7e0-66b3-4f93-bcfa-bc634b984980>
| 0.056572 |
Go for Samsung Galaxy Star..
1 Ghz processor,
Android OS 4.1.2 Jelly Bean,
3" Capacitive Touch Screen,
4GB Internal Storage + 32GB Micro SD supported.
MRP: 4990/- Only..
Five, 06 Jul 2013Impressive Indeed! i m willing to buy this phn. Does this phn supports minimizing the apps. And return to home screen. While the apps. Is running on other side?
Not Complete My Expectations.
As not fast as we see in videos.
Sound quality in headphone brilliant but loudspeaker not so loud.
Setting option/menu copy of Android 4.0(tipo).
Fastlane is not like multi-tasking.
Switch off phone receive copy from lumia.
At least i can say it is a good but not the best in this budject.
New Ui is Mix Of Android+Windows+S40=Nokia Asha Ui 1.0.
Not Happy with This.
Yash, 05 Jul 2013does whatsaap work on nokia 501??nokia asha 501 is good mobile
First full charge battery update:
After 42 hrs since my first full charge (on 4th July 11 pm) the battery is now 50% using games/calls/wifi and some usual fiddling around the phone.
tripranav, 05 Jul 2013I got the phone on 3rd July at around 3pm and since then (without charging my phone at all) I ... morethis is the reason why I use asha 501 as my main phone and my lumia 820 as a media player a la iPod. instead of finding the charger every time I am back from work, I can simply put the asha on my desk and my lumia on the charging stand. I just need to charge the asha around once in 2 days, very convenient.
sumanta, 06 Jul 2013Guys i m willing to buy this phn. Does this phn supports minimizing the apps. And return to ho... moreMinimizing the apps or returning to the home screen works this way on this phone: So you open an app, you can either -
1) Press the hardware back button to return to the home screen.
2) Swipe left or right from the either edges of the screen to return to the home screen.
So to answer your question, yes we can easily return back to the home screen from an app but I am afraid that closes the app as well.
Although I haven`t tested all the apps to check which ones run in the background but till now only the music/radio app run in the background.
pinki, 06 Jul 2013how is battery after single charge and using internet?
is whatsapp and viber compatible?I am currently testing the battery life. I fully charged my phone on 4th July at 11pm and since then I am still on my first full charge (today is 6th July 4:30 pm) using games/calls/wifi and some usual fiddling around the phone.
About whatsapp and viber it is currently not supported. Although Nokia has said whatsapp will arrive soon on the 501 in couple of months.
shams569, 06 Jul 2013this phone looks awesome and features are also good but i get dissappointed by not having 3G ... moreYes but this phone comes with Nokia Xpress browser which uses proxies to browse, which can improve speeds greatly and reduce data costs. Its very good so dont mind about 3G.
this phone looks awesome and features are also good but i get dissappointed by not having 3G connectivity. now days there is no use of smart phone without 3G feature. Now i am waiting for the updated version with 3g connectivity of this phone.
Dhanjit, 05 Jul 2013Battery is good sound is good overall phone is good in pictre phone looks larger in actual ... morei have heard tht whatsapp is not working on this.. n i want a new handset at 5 to 6k range with dual sim. it has dual sim but no whatsapp.vl it b updated soon? shud i wait to buy it. and wht bout map navigation or has it got ny similar feature?
Hey guys can i get a help about how to download/install chatting apps like whatsapp or wechat?
I think this phone dosent supports these apps and however line messenger says that it will be soon available..
Got nokia 501 y'day.. So far my experience has not been great. This is a "feature phone" n may be i expected little more than that. Phone restarts again n again while playing .avi video file of more than 160mb file size, its frustrating..
N browser is also not able to download file whose size is more than 150 mb - Pops up message "file size too large".
And there are no good chat apps available as of now like whatsapp, ebuddy, line etc...
I sold spice mi 425 to buy this but...i m now regretting on my decision. It is just a feature phone, dont expect smartphone capabilities as i did.
Its good for those requiring only basic features like calling, messaging, playing dumb games etc, others stay away !!
|
<urn:uuid:65493281-4ca8-485e-a1ca-4594c3a05164>
| 0.130841 |
Last updated on OCTOBER 01, 2014
Applies to:Oracle Enterprise Single Sign-On Suite - Version 10.1.4.1 to 10.1.4.1 [Release 10gR3]
Information in this document applies to any platform.
Reviewed for currency on 01-Oct-2014
Resolve HTTP Error 403 "Access Forbidden" When Attempting to Access the Enrollment or Reset Pages in Password Reset
Sign In with your My Oracle Support account
Don't have a My Oracle Support account? Click to get started
Million Knowledge Articles and hundreds of Community platforms
|
<urn:uuid:b6385b36-2303-404a-ae1f-213b3e85e501>
| 0.143528 |
Alert level: Moderate
Windows Defenderdetects and removes this threat.
This tool that uses a vulnerability in Android devices to "root" or hack the device.
It is usually done by someone using the device who wants to get around limitations set by the device's manufacturer or carrier (for example, a phone carrier may limit updates on the device).
We recommend you don't use hacktools as they can be associated with malware or unwanted software.
ID članka: 4026443 - posljednja izmjena: 28. srp 2017. - verzija: 1
|
<urn:uuid:3b50dd9b-cf13-4370-aa23-5fe8ebc75bf0>
| 0.090674 |
Fruit is a simple, lightweight Feedly client application. The application is designed to focus on readability and simplicity in use.
If you are new to Feedly,
1. Create an account on Feedly at https://feedly.com
2. Subscribe news, blogs, anything you want on Feedly
3. Login to Fruit with your Feedly account and enjoy your Fruit!
- Click article to mark as read and open the article on Chrome Custom Tab
- Long-Click article to mark as saved / unsaved
- Long-Click Unread tab to mark all loaded articles to read
4 Tabs on bottom navigation:
1. "Unread": A list of unread articles
2. "Saved": A list of saved articles
3. "Subscriptions": A list of subscriptions
4. "Profile": Your profile info as well as usage guide, feature request, etc.
More features and improvements in the future; if you really want new features, modification, etc please fill out "Request NEW feature" form as I will check every single request and consider what should be implemented in high priority.
Thank you for using Fruit! :)
Links and contact information:
- Fruit App Usage: http://shaunkawano.com/2016/10/13/fruit-app-usage
- Fruit Feature Request: https://goo.gl/forms/Aqhy8PHk5XRbQsGx2
- Email to developer: [email protected]
|
<urn:uuid:9ba4d542-b09f-46d5-bfd9-1f9f294d0264>
| 0.039685 |
Set up timesheets
|Before your team members can start Step 2: Turn in a timesheet, an administrator needs to set up a few things. Some things are required, and other options are there in case you want to go beyond the basics.|
The easiest way to set things up
If you don't want to do a whole lot of work to get timesheets up and running, the only one thing you really need to do is set up how often you want timesheets turned in.
If you go with the default options when you set things up, you'll end up with everything you need to have your team members turn in timesheets once a week for a year. Simple! The only thing you need to define is the start date for the first week, and Project Web App will take care of the rest.
- Go to PWA Settings.
In Project Web App, choose Settings > PWA Settings.
Under Time and Task Management, choose Time Reporting Periods.
Set a start date.
If you want timesheets turned in weekly, the only thing you need to change under Define Bulk Period Parameters is Date the first period starts.
A best practice here is to set your first week to start on the first day of the week containing the first day of your fiscal year. For example, if your organization's fiscal year starts on Tuesday, July 1, it might make sense to have your first batch of timesheets start on the Sunday or Monday before that.
Set the format for period names.
Under Define Batch Naming Convention, you can leave things alone if you want and everything will work just fine. However, a lot of organizations prefer to add some structure to how each time reporting period is named.
Without a Prefix or a Suffix, your time reporting periods will use simple incremental numbers (1, 2, 3, and so on). Team members will be able to turn in timesheets just fine with this basic naming.
Adding some structure to the naming gives each reporting period some context. For example, you can set up reporting periods that are named "Week1_FY15," "Week2_FY15," and so on. This can be helpful if you need to refer to older timesheets.
As you add a prefix and suffix, an example name is shown.
Create periods and save.
Choose Create Bulk.
Need your timesheets to do more?
If you find that the basic timesheets aren't capturing enough information, you can make them a little more substantial.
Here are some ways you can take things a bit further:
Add categories of work to capture different types of time, like research or development, or to capture bigger-picture efforts where your organization may be investing across multiple projects.
Add non-project categories for time spent on other aspects of work, like training or travel.
Set up your fiscal year so that you can map project work against your overall financial plans.
There are also some settings you may want to change that affect how time and task progress is captured and handled in your organization.
|
<urn:uuid:bdd6d301-1322-4818-bf40-0b5929caca85>
| 0.200945 |
I am working my way through Beginning asb,net 4.5 using c# as my preferred language
I am having an issue with the DarkGrey theme when using the above browser.
The home option on the menu does not behave as expected.
The same screen looks ok in internet explorer.
I assume there is a difference between the 2 browsers and would like to know how to correct the problem.
|
<urn:uuid:695439d6-191a-4d2b-b61a-6899ec7e1b8c>
| 0.040416 |
Create a market research plan
Now you’ve learnt about the market research process, you can apply your learning and create your own market research.
Think of some specific information that you want to know about the customer or consumer for your business.
Download the market research plan template and use it to create a plan as to how you might find this information.
© RMIT University 2016
|
<urn:uuid:ad4ccee0-dfb4-4a61-8d9a-ce516dd55c91>
| 0.049901 |
You probably haven’t complained about high-end smartphone performance for a while now, but processors can always be a bit faster and, more importantly, power efficient. To that end, Arm just announced its latest products destined for future smartphone SoCs. These announcements are aimed squarely at the high performance end of the market, ranging from smartphones up to laptop-class capabilities.
The latest additions to Arm’s portfolio are its Cortex-A76 CPU, Mali-G76 GPU, and Mali-V76 video processor for ultra-high resolution displays. As the names suggest, the Cortex-A76 is a replacement for the high-performance Cortex-A75 core unveiled last year, the new Mali-G76 takes over from the G72, and the Mali-V76 is the new high-end option, replacing the V52 and V61. There’s no new LITTLE CPU core announcement this year, so we’ll be sticking with the Cortex-A55 for a while longer.
A ground-up CPU redesign
Despite the seemingly minor change to Arm’s CPU nomenclature, the Cortex-A76 is very different from the A75. It’s a completely new high-performance microarchitecture design made from scratch by Arm to target higher performance points than ever before. Laptop-class was the term used during our briefing with Arm, but the flexible nature of the design means there’s plenty of performance gains up for grabs in a smartphone form factor too.
The headline figure is up to a 200 percent performance gain compared to the current crop of laptop form factor products powered by the Cortex-A73. Compared to the last generation A75 the gains are a little smaller, but still notable. The biggest improvements are for machine learning applications, with up to a 400-percent boost thanks to optimized dot product instructions. A 7nm A76 running at 3GHz improves performance by around 35 percent over a 10nm A75 running at 2.8GHz.
On top of that, Arm is boasting a 40-percent improvement in energy efficiency. Some of that obviously comes from the smaller target process node, but the microarchitecture changes are making a difference too. The Cortex-A76 has also been designed so a single core can run flat out indefinitely, while frequency throttling should only kick in for 3 or 4 core cluster configurations in thermal and power constrained products like smartphones. That means more consistent high-end performance for demanding workloads.
The Cortex-A76 is still based on Arm’s DynamIQ cluster technology, meaning you’ll see it paired up with the smaller power-efficient Cortex-A55 inside heterogeneous CPU clusters. A 4+4 design is still the likely layout for high-performance products, while 2+6 and 1+7 offer the best performance-to-cost benefits for cheaper SoCs.
Next-generation graphics and video
The Arm Mali-G76 has next-gen SoCs covered for improved graphics performance. It’s based on the same Bifrost architecture as the G72 and G52, offering a major 1.5x performance boost with this generation at 7nm.
Arm has achieved much of this performance boost by doubling up the number of execution pipelines within each core’s engine, which offers roughly double the FP32 and FMA throughput with only a 28-percent increase in area. This means each G76 graphics core is now roughly twice as powerful as in the G72, so chip designers won’t need to include so many to achieve the same performance level as before. This is the same optimization the company made inside its Mali-G52 earlier this year, and the same Int8 dot product support for machine learning applications makes its way across to the high-end processor now as well.
Each Mali-G76 core can be up to twice as powerful as in the G72, so a new MP8 configuration will be roughly as powerful as an old MP16.
On top of the performance gains, the G76 boasts a 30 percent improvement to energy and area efficiency when built on the same process node. Moving down to 7nm will see further performance gains. This can be used to extend battery life for the same performance as the last generation or be put towards a higher core count for additional graphics grunt.
The Mali-G76 can be configured for between four and 20 cores, down from the 32 maximum core count with the G72. Arm expects that we’ll see smartphones core counts in the low teens, with higher numbers reserved for products with larger battery capacities and where thermal constraints are less of a factor, such as laptops. The Mali-G52 fills in the gap for lower end products with smaller core counts between one and four.
The last announcement is a new vision processor, the Mali-V76, designed for high-resolution displays. The design caters for up to 8k60 decode and 8k30 encode, as well as multiple 4K and 1080p streams for video walls. It essentially doubles up the performance and capabilities of the Mali-V61. This is certainly overkill for smartphone display resolutions, but will likely find a home in future high-end TVs and higher resolution AR & VR headsets.
Arm latest CPU, GPU, and VPU designs will offer some serious next-generation performance and energy improvements for mobile devices. Don’t forget, it’s got new machine learning hardware heading our way under the Project Trillium banner too.
We’ll have to wait for Arm’s partners to pick up these latest components before they hit consumer products. The Mali-G76 is available for sampling already and could appear in SoCs before the end of the year. We’ll have to wait a little longer for our first Cortex-A76 devices — they’ll probably be announced in chipsets this year but likely won’t ship in products until 2019.
We’ll dive deeper into the CPU and GPU architectural changes heading our way and what they mean for performance gains in more detail this week, so stay tuned.
|
<urn:uuid:2aa0c5be-982b-44ee-ad2f-15c15bfc7f26>
| 0.144391 |
Cheap VPS Linux Server Hosting
Onlive Sever provides the best Server hosting, includes Cheapest Linux VPS hosting based OS at all over the world.
Using the right hosting solution is the right way to improve the performance of your website. Cheap VPS Linux is a highly preferred and flexible solution for increasing both the performance and scalability of your website. Onlive Server provides the finest range of VPS hosting solutions for cheap prices. The affordable price range will surely bring you complete satisfaction. It is vital to know that the VPS hosting company provides this cheap Linux based VPS hosting for France Country.
There are different types of VPS hosting solutions available, so you can pick the best one smartly. If you desire to gather precise information about VPS Linux hosting, you can visit the website of this company. The trusted platform lets you know the top advantages offered by these hosting solutions at France location. The technical support team will explain you the concept of this hosting plan.
The VPS Linux hosting plan is a perfect blend of matchless features that make it an ideal for all types of online businesses. When it comes to unlimited bandwidth, it is a highlighting feature of this France VPS Server hosting plan. When you use this kind of hosting plan, you need not worry about the restrictions of other limited bandwidth. It is because it offers unlimited bandwidth as standard. Flexibility is one of the important aspects to consider while selecting the VPS hosting package.
The Linux based hosting solution will bring you both flexibility and reality similar to your virtual server. In addition, you also have a complete choice for selecting a data center because the company has data centers globally.
Enjoy better affordability
The common features of this hosting plan are high-performance SSD (Solid-State Drives), anti-spam software, completely managed cloud servers, Global data centers, firewall server, instant scaling, manageable plans and much more. The traffic load balancing is another important feature of this windows VPS hosting. The VPS hosting company comes with various solutions of affordable Linux VPS server hosting. It is advised to visit the website where you can choose any one of the best packages for the e-commerce website.
The starting cost of these hosting solutions is very low, but they have high bandwidth, spacious RAM and other useful facilities. The hosting provider is dedicated to offering the best and cheapest VPS server hosting while offering dedicated technical support. You can call the technical support team anytime and get enough guidelines quickly.
|
<urn:uuid:26dfab75-0ea6-4598-bca8-69d07e4b1068>
| 0.06372 |
Computer engineer with a Master in Web technologies. Specialized in mobile application development, with broad experience using Agile methodologies and Certified Scrum Master. Active open source contr
external link icon
All private interactions must abide by the code of conduct
We're a place where coders share, stay up-to-date and grow their careers.
We strive for transparency and don't collect excess data.
|
<urn:uuid:b3c7b9a4-ab90-4a27-824d-65bf878ef5a8>
| 0.085096 |
THE FOLLOWING DESCRIBES THE TERMS ON WHICH NETWAITER, LLC (“NETWAITER, WE, US”) OFFERS YOU ACCESS TO OUR SERVICES.
Welcome to the User Agreement (the “Agreement”) for NetWaiter, LLC. This Agreement describes the terms and conditions applicable to your use of our services available under the domain and sub-domains of www.netwaiter.com (the “Site”), including our services accessible via the websites of companies that license our services and software, and the general principles for the websites of our subsidiaries and affiliates. If you do not agree to be bound by the terms and conditions of this Agreement, do not use or access our services.
We may amend this Agreement at any time by posting the amended terms on the Site. All amended terms, unless otherwise specified, shall immediately become effective when posted on the Site. This Agreement is effective upon acceptance in registration for new registering users.
Our services are available only to, and may only be used by individuals who can form legally binding contracts under applicable law. Without limiting the foregoing, our services are not available to children (persons under the age of 18) or to temporarily or indefinitely suspended NetWaiter members. If you are under the age of 18, you can use this service only in conjunction with, and under the supervision of your parents or guardians. If you do not qualify, please do not use our Site. Further, your NetWaiter account (including feedback) and User ID may not be transferred or sold to another party. If you are registering as a business entity, you represent that you have the authority to bind the entity to this Agreement.
Joining NetWaiter is free. If we decide to change our fees for any of our services, our changes will be reflected on our Site and are effective after we provide you with at least fourteen (14) days notice of the changes by posting them on our Site. However, we may choose to temporarily change our fees for our services for promotional events and such changes are effective when we post the temporary promotional event on the Site. We may in our sole discretion change some or all of our services at any time. In the event we introduce a new service, the fees for that service are effective at the launch of the service. Unless otherwise stated, all fess are quoted in U.S. Dollars. You are responsible for paying all fees associated with using our service and the Site and all applicable taxes. All sales are final when making a purchase from a NetWaiter client. As soon as you place an order, your purchase is charged to the credit card provided. You cannot cancel a purchase or receive a refund for a purchase.
NetWaiter does not sell products to the public. Instead, the Site acts as a venue to allow our clients to conduct business. We develop, maintain, and license proprietary software to facilitate transactions and provide a variety of services to help our clients conduct business. As a result, we have no control over the quality, safety, or legality of the items advertised, the truth or accuracy of the listings, and the ability of the sellers to sell items.
We use many techniques to verify the accuracy of the information users provide us when registering on the Site. However, because user verification on the Internet is difficult, NetWaiter cannot and does not confirm each user's purported identity.
Because we are a venue, in the event that you have a dispute with one or more clients of NetWaiter, you release NetWaiter (and our officers, directors, agents, subsidiaries, joint ventures, and employees) from claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown, suspected and unsuspected, disclosed and undisclosed, arising out of or in any way connected with such disputes. If you are a California resident, you waive California Civil Code §1542, which says: “A general release does not extend to claims which the creditor does not know or suspect to exist in his favor at the time of executing the release, which if known by him must have materially affected his settlement with the debtor.”
We do not control the information provided by our clients that is made available through our system. You may find some information to be offensive, harmful, inaccurate, or deceptive. Please use caution and common sense when using the Site. By using the Site, you agree to accept such risks and NetWaiter is not responsible for the acts or omissions of our clients.
Without limiting any other remedies, NetWaiter may suspend or terminate your account if we suspect that you (by conviction, settlement, or otherwise) have engaged in fraudulent activity in connection with the Site.
“Your Information” is defined as any information you provide to us in registration, feedback, or throughout any Email feature. You are solely responsible for Your Information.
Your Information and your activities on the Site shall not: (a) be false, inaccurate or misleading; (b) be fraudulent; (c) contain any viruses, Trojan horses, worms, time bombs, cancel bots, easter eggs, or other computer programming routines that may damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or personal information; (d) create liability for us or cause us to lose (in whole or in part) the services of our ISPs or other suppliers.
Without limiting other remedies, we may limit your activity, issue a warning, temporarily suspend, indefinitely suspend, or terminate your membership and refuse to provide our services to you if: (a) you breach this Agreement or the documents it incorporates by reference; (b) are unable to verify or authenticate any information you provide to us; or (c) we believe that your actions may cause financial loss or legal liability for you, our clients, or us.
WE, OUR SUBSIDIARIES, OFFICERS, DIRECTORS, EMPLOYEES AND OUR SUPPLIERS PROVIDE OUR WEBSITE AND SERVICES “AS IS” AND WITHOUT ANY WARRANTY OR CONDITION, EXPRESS, IMPLIED OR STATUTORY.
IN NO EVENT SHALL WE, OUR SUBSIDIARIES, OFFICERS, DIRECTORS, AND EMPLOYEES BE LIABLE FOR LOST PROFITS OR ANY SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF OR IN CONNECTION WITH OUR SITE, OUR SERVICES, OR THIS AGREEMENT (HOWEVER ARISING, INCLUDING NEGLIGENCE).
You agree to indemnify and hold us and (as applicable) our parent, subsidiaries, affiliates, officers, directors, agents, and employees, harmless from any claim or demand, including reasonable attorney's fees, made by any third party due to or arising out of your breach of this Agreement or the documents it incorporates by reference, or your violation of any law or the rights of a third party.
You shall comply with all applicable domestic and international laws, statutes, ordinances, and regulations regarding your use of our service.
You and NetWaiter are independent contractors, and no agency, partnership, joint venture, employee-employer, or franchiser-franchisee relationship is intended or created by this Agreement.
In the event a dispute arises between you and NetWaiter, our goal is to provide you with a neutral and cost effective means of resolving the dispute quickly. Accordingly, you and NetWaiter agree that any claim or controversy at law or equity that arises out of this Agreement or our services, (“Claims”) shall be resolved in accordance with one of the subsections below or as otherwise mutually agreed upon in writing by the parties. Before resorting to these alternatives, we strongly encourage you to first contact us directly to seek a resolution and we will consider reasonable requests to resolve the dispute through alternative dispute resolution procedure, such as mediation, as an alternative to litigation.
For any claim (excluding Claims for injunctive or other equitable relief) where the total amount of the award sought is less than $5,000 you or NetWaiter may elect to resolve the dispute through binding arbitration conducted by telephone, online and/or based solely upon written submissions where no in-person appearance is required. In such cases, the American Arbitration Association or JAMS shall administer the arbitration in accordance with their applicable rules, or any other established ADR provider mutually agreed upon by the parties. Any judgment on the award rendered by the arbitrator may be entered in any court having jurisdiction thereof.
Alternatively, any Claim may be adjudicated by a court of competent jurisdiction located in San Bernardino County, California or where the defendant is located. You and NetWaiter agree to submit to the personal jurisdiction of the courts located within the county of San Bernardino, California.
Alternatively, NetWaiter will consider use of other alternative forms of dispute resolution, such as binding arbitration to be held in San Bernardino County, California or another location mutually agreed upon by the parties.
All Claims (excluding requests for injunctive or equitable relief) between the parties must be resolved using a dispute resolution mechanism that is selected in accordance with this Section by the first party to file a Claim. Should either party file an action contrary to Section 13, the other party may recover attorney's fees and costs up to $1,000, provided that the party seeking the award has notified the other party in writing of the improperly filed Claim, and the other party has failed to withdraw the Claim.
This Agreement shall be governed in all respects by the laws of the State of California as such laws are applied to agreements entered into and to be performed entirely within California between California residents. We do not guarantee continuous, uninterrupted, or secure access to our services, and operation of the Site may be interfered with by numerous factors outside of our control. If any provision of this Agreement is held to be invalid or unenforceable, such provision shall be struck and the remaining provisions shall be enforced. Our failure to act with respect to a breach by you or others does not waive our right to act with respect to subsequent or similar breaches. This Agreement sets forth the entire understanding and agreement between you and NetWaiter with respect to the subject matter hereof. Sections 2 (Fees and Services) with respect to fees owed for our services, 3.2 (Release), 9 (Liability Limit), 10 (Indemnity), and 13 (Resolution of Disputes) shall survive any termination or expiration of this Agreement.
|
<urn:uuid:3c1aad46-5614-4a38-9388-2546276f2d24>
| 0.047212 |
Your E-Commerce Partner
You have no items in your shopping cart.
Add some to cart or login
We’re your e-commerce partner — we’re here to help!
Our in-house packaging experts are happy to answer any product-specific questions you have. Do you have questions about orders you’ve placed, non-product topics like our policies, or custom packaging inquiries? Contact us directly at [email protected]. Thanks for loving packaging as much as we do!
|
<urn:uuid:863ae653-c53e-4611-903e-fb8375ae327a>
| 0.067373 |
Try the “super-logoff.”
Performing the trick doesn’t take superhuman powers. Instead of just closing a browser window or clicking the “log off” button at the top right of the Facebook homepage, some young, privacy-concerned users are simply deactivating their Facebook accounts each time they leave the site.
Then they reactivate their accounts to log back on.
Why go to all this trouble?
Well, for one, it’s not hard. Facebook makes it notoriously difficult to fully “delete” an account. But “deactivating” an account is easy — it only takes a single click, and deactivated Facebook users maintain all of their friend connections, wall posts, photos and the like. The upside, for the privacy paranoid, is that when a “deactivated” user isn’t on Facebook, no one else can see their profile, post on their wall or tag them in photos.
For privacy-minded people, it’s a soothing alternative. It gives them ultimate control.
Microsoft researcher and social media expert danah boyd (she doesn’t capitalize her name), who identified the trend this week on her blog, believes young people may have good reasons for deactivating and reactivating their accounts frequently.
“In many ways, deactivation is a way of not letting the digital body stick around when the person is not present,” boyd writes in a November 8 post.
“This is a great risk reduction strategy if you’re worried about people who might look and misinterpret. Or people who might post something that would get you into trouble.”
She credits Michael Ducker, a program manager at Microsoft, with inventing the “super-logoff” term.
As part of her field work, boyd has spoken with kids who use the technique to maintain control of their pages. One person she mentions on her blog, Mikalah, “wants to be a part of Facebook when it makes sense and not risk the possibility that people will be snooping when she’s not around.”
The blog All Facebook adds that this practice is fundamentally different, and in some ways simpler, than changing your privacy settings on the site:
“Notice that, while you or I might think that spending five minutes setting your privacy settings correctly might solve the hassle of having to deactivate your account when you log out, in reality these are two actions that accomplish different things,” Jorge Cino writes on that Facebook-focused blog.
“Mikalah and others like her want their friends to post stuff on their wall or tag them in a photo, but they don’t want them doing it when they’re not there to make sure it’s okay. Most importantly, someone like Mikalah doesn’t want any friends of friends digging up her profile when she’s not ‘around.’ Deactivating her age literally erases her from Facebook. She becomes untraceable.”
Others don’t go quite as far, says boyd. Instead of deactivating her account, Shamika engages in practice known as “whitewalling,” boyd says. She deletes every “like,” comment and photo almost immediately after it’s posted.
“When I asked her why she was deleting this content, she looked at me incredulously and told me ‘too much drama,’ ” boyd writes.
“Pushing further, she talked about how people were nosy and it was too easy to get into trouble for the things you wrote a while back that you couldn’t even remember posting let alone remember what it was all about. It was better to keep everything clean and in the moment. If it’s relevant now, it belongs on Facebook, but the old stuff is no longer relevant so it doesn’t belong on Facebook.
“Her narrative has nothing to do with adults or with Facebook as a data retention agent. She’s concerned about how her postings will get her into unexpected trouble with her peers in an environment where saying the wrong thing always results in a fight.”
These stories add interesting nuance to the debate over young people and privacy on the Internet. The general line of thinking — which is backed up by some surveys — is that young people care less about online privacy than older people.
But there appears to be more going on.
A Pew Internet report, released on May 26, found young people are more likely than their older counterparts to alter their Facebook settings and to actively manage their online identities.
From that report:
“Young adults are the most active online reputation managers in several dimensions. When compared with older users, they more often customize what they share and whom they share it with.”
This suggests younger people do care about their privacy and reputation online and will take steps — sometimes big ones, as boyd’s blog post shows — to manage these increasingly important digital identities.
What do you think of these practices? If you use the “super-logoff,” or plan to try it, let us know in the comments section below…
|
<urn:uuid:42698b2d-21c1-483f-8bd4-ed2ad28a8a8f>
| 0.049688 |
How to Install iOS 11 on iPhone 7, 7 Plus, 6s, 6, SE, iPad and iPod
Apple has finally released the highly-anticipated iOS 11 update for a spate of devices including the iPhone 7/7 Plus, iPhone 6/6s, iPhone SE, iPhone 5s, iPad Mini 2 and above, and iPod Touch sixth-gen. iOS 11 will also be available on the newly launched iPhone 8, iPhone 8 Plus and the flagship iPhone X out-of-the-box.
Here's the complete step-by-step guide to help you download and install iOS 11 on all compatible iPhone, iPad and iPod Touch devices either via OTA or clean installation. Before you proceed please check if your device appears in the compatibility list below.
iOS 11 Device Compatibility List
Here's the full list of iOS 11 compatible devices:
• iPhone X
• iPhone 8
• iPhone 8 Plus
• iPhone 7
• iPhone 7 Plus
• iPhone 6s
• iPhone 6s Plus
• iPhone 6
• iPhone 6 Plus
• iPhone SE
• iPhone 5s
• iPad (9.7-inch)
• iPad Pro (9.7-inch)
• iPad Pro (12.9-inch)
• 2017 iPad Pro (12.9-inch)
• 2017 iPad Pro (10.5-inch)
• iPad mini 4
• iPad mini 3
• iPad mini 2
• iPad Air 2
• iPad Air
• iPod touch 6th generation
Note: It is recommended to perform a full data backup of your device using iTunes or via iCloud, before installing iOS 11 on it in order to prevent unexpected data loss.
How to Install iOS 11 via OTA Method
Over-the-air (OTA) method is the easiest and quickest way of installing iOS 11 on your iPhone, iPad or iPod Touch. However, if you are looking for a seamless performance then you should definitely try the clean installation method.
Step 1: Go to Settings > General > Software Update on your 64-bit iOS device running iOS 10.
Step 2: If your device is supported, an iOS 11 OTA update prompt should appear on the screen.
Step 3: Once the iOS 11 update shows up, just hit the Download and Install button to start the installation process.
iOS 11 Clean Installation Method
Note: Clean installation method is highly recommended to ensure better battery life and performance as an OTA upgrade to iOS 11 will retain older iOS 10.x system files, which may not be optimized to run well on the newly installed OS.
Ensure that your PC or Mac is running the latest version of iTunes. Download iTunes 12.7 with iOS 11 support for Windows and Mac here.
Download the necessary IPSW file for your device, using the direct download links provided below.
Ensure that you have backed up important data and settings on your iOS device, before you proceed.
iOS 11 IPSW Direct Download Links
How to Clean Install iOS 11 on iPhone, iPad and iPod Touch via iTunes
• Once you have downloaded the necessary IPSW file from the links provided, just go to Settings > iCloud > Find My iPhone and ensure that you toggle the switch to OFF position to disable the feature.
• Connect your iOS device to PC or Mac with the Lightning cable that’s shipped with your iPhone or iPad.
• At this moment, iTunes should launch automatically. Otherwise, just launch it manually and wait for iTunes to detect the device in the source list.
• Select your iOS device from the source list in the iTunes window and expand the Settings option to view the new features.
• You are now required to do a manual restore instead of the standard iTunes restore. Press and hold Alt key on Mac or Shift key on Windows computer and then hit the Restore iPhone button.
• Just select the specific IPSW firmware file that you downloaded earlier for your device, when iTunes prompts you to select the installation file. iTunes will now install the clean version of iOS 11 on your device.
• Once the installation completes, you will prompted to run the standard setup process before first use of the device. You will also be presented the option to setup the device as new or restore data from backup.
Ideally, if you are facing performance issues then we recommend the first option, which involves setting up the device as new.
iOS 11 Plagued with Untested Bugs and Early Adoption Pitfalls
Reports of nagging iOS 11 issues have started pouring in just a day after the software was released by Apple on supported devices.
How to Downgrade iOS 11 to iOS 10.3.3 on iPhone or iPad
Here is a simple guide to downgrade iOS 11 to iOS 10.3.3 on iPhone or iPad.
How to Fix iOS 11 OTA Stuck on ‘Preparing Update’ Issue
Here’s a simple guide to fix iOS 11 OTA file stuck on “Preparing Update…” issue.
iOS 11: Over 150 Hidden Features for iPhone and iPad Revealed [Full List]
iOS 11 has a treasure trove of hidden features that could enable you to explore the untapped potential of your iPhone and iPad.
iOS 11 Release Time for Various Time Zones Across the Globe
Check out the complete list of time zones for iOS 11 release time across the globe.
MORE IN ITECHPOST
The Role of Technology in Education in 2019
2019 is proving to be another great year for trends in educational technology. There are many upcoming trends that seem to have a bearing on the future of the sector with respect to technology.
New Retroreflective Material Could be Used in Nighttime Color-Changing Road Signs
BUFFALO, N.Y. -- A thin film that reflects light in intriguing ways could be used to make road signs that shine brightly and change color at night, according to a study that will be published on Aug. 9 in Science Advances.
Top 5 Video Games to Play for a Truly Unique First Date
Video games have a way of taking us outside of ourselves and live in a fantasy world. It's even better when you're playing a game with someone special!
|
<urn:uuid:ddce560b-5e53-4082-81a9-75ece52414b6>
| 0.137588 |
Download Galaxy Privacy Applock 1.9.1x for Android
You are downloading Galaxy Privacy Applock 1.9.1x APK file for Android smartphones/tablets which requires . Galaxy Privacy Applock is one of the best free Tools apps, you should try it.
To start downloading the APK file of Galaxy Privacy Applock 1.9.1x make sure you choose one of the server locations below. After downloading the APK file of Galaxy Privacy Applock move the downloaded file to your SD card or your Android smartphone's internal memory and then use any Android file manager you prefer to browse & install it.
But make sure you have enabled the third-party app installation to run APK files in Android.
Galaxy Privacy Applock is one of the best free Tools apps & you are about to download very latest version of Galaxy Privacy Applock 1.9.1x. So, to start downloading the APK file of Galaxy Privacy Applock on your Android smartphone, we provide direct download link below for Galaxy Privacy Applock 1.9.1x.
Galaxy Privacy Applock Android apps is the property & trademark from Viber Media S.Ã r.l. and all rights reserved by Viber Media S.Ã r.l.. You have provided direct downloadable link below to download the original free apk download package.
Please be aware that softstribe.com only share the original and free apk installer package for Galaxy Privacy Applock 1.9.1x without any modifications or any alterations within the .apk file package for illegal activities.
If you wish to run Galaxy Privacy Applock APK for PC, make sure you read the article.
All the apps & games are for home or personal use only. If any apk files download infringes your copyright, please contact us. Galaxy Privacy Applock is the property and trademark from the developer Viber Media S.Ã r.l.
Galaxy Privacy Applock file information
File name: com-lock-apps-privacy-free-1-9-1x_SOFTSTRIBE.apk
Uploaded: March 08, 2017
File size: 2.9 MB
Minimum Android version:
Galaxy Privacy Applock Versions
Galaxy Privacy Applock APK 1.9.1x:
Download APK from secure server >> File size: 2.9 MB
|
<urn:uuid:0fc3c9f1-6583-41df-9e45-9819d73994ce>
| 0.090193 |
You must be logged in to post a comment.
This site uses Akismet to reduce spam. Learn how your comment data is processed.
Stay up to date with our latest product releases & events. We'll also send you 10% off your first order.
Frequently Asked Questions
Shipping and Returns
|
<urn:uuid:ea6c56a4-650e-465d-89e0-e347eccc0613>
| 0.596436 |
Step 1: Enable Xero
- Log in to your PayFast account and navigate to the settings page.
- Click on ‘Enable’ next to ‘Xero Integration’.
- You will be redirected to Xero
- Click Allow Access.
Step 2: Map your accounts
You need to Map the PayFast account to Xero and your bank account.
- Click the edit button next to Xero integration.
- You can either select existing accounts in Xero or create new accounts in Xero.
Existing account details in Xero:
- If you have already added the accounts in Xero the drop-down options will be populated by Xero, these are the accounts that transactions get mapped to in Xero.
Create new Account details in Xero
- Click "new PayFast Bank account" (This is the account in Xero that all PayFast transactions get mapped to.)
- Enter the name you would like to use for this account and an account code that is not listed already on your Xero Chart of accounts (eg: 609 )
- Click "New Business Bank account"(The bank account that PayFast generates payouts to. The Xero system is updated when a payout is made, automating the bookkeeping process.)
- Enter the name you would like to use for this account, an account code that is not listed already on your Xero Chart of accounts (eg: 611) and the bank account number that you use on PayFast.
- PayFast fees account – PayFast fees charged on each transaction get mapped to this account. (this is default set to Bank fees (404)
- Click Update.
|
<urn:uuid:56113e6e-bceb-48af-818a-5fec5f9cc8c1>
| 0.271169 |
Does P6 EPPM Work With SQL Server Running On Dynamic Port?
(Doc ID 2337193.1)
Last updated on MARCH 21, 2019
Applies to:Primavera P6 Enterprise Project Portfolio Management - Version 220.127.116.11 and later
Information in this document applies to any platform.
For P6 EPPM to connect to an SQL Database running on dynamic port. Currently, database configuration wizard for EPPM will not finish if a database port is not provided.
To view full details, sign in with your My Oracle Support account.
Don't have a My Oracle Support account? Click to get started!
In this Document
|
<urn:uuid:ff6f300d-fb35-48b1-9845-64958e62c707>
| 0.045111 |
Please use this identifier to cite or link to this item:
Aloha as fearlessness : lessons from the mo'olelo of eight native Hawaiian female educational leaders on transforming the University of Hawaiʻi at Mānoa into a Hawaiian place of learning
|Lipe Kaiwipuni r.pdf||Version for non-UH users. Copying/Printing is not permitted||33.12 MB||Adobe PDF||View/Open|
|Lipe Kaiwipuni uh.pdf||Version for UH users||33.27 MB||Adobe PDF||View/Open|
|Title:||Aloha as fearlessness : lessons from the mo'olelo of eight native Hawaiian female educational leaders on transforming the University of Hawaiʻi at Mānoa into a Hawaiian place of learning|
|Authors:||Lipe, Kaiwipuni K. N. P. M. D.|
|Date Issued:||Aug 2014|
|Publisher:||[Honolulu] : [University of Hawaii at Manoa], [August 2014]|
|Abstract:||Part of the strategic goal number one of the University of Hawaiʻi at Mānoa (UHM) is to "promote a Hawaiian place of learning." However, UHM is a predominantly non-Hawaiian university by every definition, thus the culture and environment of the institution make it difficult to implement the strategic goal. Further, current Western frameworks and theories on institutional transformation typically do not acknowledge the existence and experiences of Indigenous Peoples and Native Hawaiians in particular.|
Therefore, the purpose of this study was to explore how Native Hawaiian remembrance, knowledge, experiences, practices, and value systems provide insight into how to transform UHM into a Hawaiian place of learning. I began this dissertation by posing the question: How can the University of Hawaiʻi at Mānoa, a predominantly non-Hawaiian university, transform into a Hawaiian place of learning? Two additional sub-questions included: What are the relationships between Native Hawaiian values and Western higher education values that support and/or inhibit the transformation of UHM into a Hawaiian place of learning? How might UHM utilize these lessons learned to build its capacity to transform into a Hawaiian place of learning?
In order to explore these questions, I learned from the individual and collective mo'olelo--as interconnected stories and life experiences--of eight Native Hawaiian female educators who have been pioneers over the last 30 years in transforming spaces into Hawaiian places of learning. In addition, I learned from artifacts and archival documents related to UHM that helped to tell the institution's story.
My findings are presented in two emerging frameworks, namely the 'A'ali'i Kū Makani and Hō'ālani frameworks. The 'A'ali'i Kū Makani framework directs our attention to the cyclical nature of transformative processes as well as to the varied conditions in which these processes occur within the Indigenous and Native Hawaiian contexts. The Hō'ālani framework provides a holistic model for individuals to become grounded and engaged in core Hawaiian values, concepts, and processes by which they can become empowered and fearless to fulfill their kuleana--as responsibilities and privileges--to Hawaiʻi and her people. The frameworks, then, become guides for institutional practices, leadership, and policy.
|Description:||Ph.D. University of Hawaii at Manoa 2014.|
Includes bibliographical references.
|Rights:||All UHM dissertations and theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission from the copyright owner.|
|Appears in Collections:||
Ph.D. - Education|
Please email [email protected] if you need this content in ADA-compliant format.
Items in ScholarSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
|
<urn:uuid:08f5e0d2-0ecd-46f4-b734-551233a5c436>
| 0.45149 |
About this download
This program will update Touchscreen Firmware to version 0004 and will resolve the following symptoms:
- After selective suspend mode, the Touchscreen response latency is too long.
Touchscreen Firmware Update version 0004
File name: EP0000600674.exe
File size: 2.5 MB (2616328 bytes)
- Touchscreen Firmware Update version 0004
- 2.5 MB
- Windows 8 32bit
- Windows 8 64bit
1. Download the file to a temporary or download directory (Please note this directory for reference later).
2. Go to the directory where the file was downloaded and double-click EP0000600674.exe.
3. Follow the instructions displayed in the installation wizard.
4. After installation is completed, please restart the computer.
|
<urn:uuid:e42a621d-051d-4c14-9254-477b27c39e39>
| 0.115394 |
If your query is in relation to an order, please provide the Order Number and street address for the connection in the subject line.
If your query is in relation to a general enquiry, please provide a brief description of your query in the subject line.
Call 0800 222 260
or email [email protected]
Please wait while we process your request.
|
<urn:uuid:6326ad9c-bd5a-461b-8280-ec9e225a0bdc>
| 0.040507 |
It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
I just wanted to put it out here because we discuss really many fancy ideas around here, without really getting it.
originally posted by: Peeple
I'm binge watching the Tube and found this
It's fun to watch with many smart people giving talks about the fundamental truths of science.
|
<urn:uuid:dfe44f5d-f1b2-4b69-83ad-9ffd9301f841>
| 0.847177 |
YouTube APK Identity: find accounts on the device,add or remove accounts
YouTube APK Contacts: find accounts on the device
YouTube APK Photos/Media/Files: modify or delete the contents of your USB storage,read the contents of your USB storage
YouTube APK Storage: modify or delete the contents of your USB storage,read the contents of your USB storage
YouTube APK Camera: take pictures and videos
YouTube APK Wi-Fi connection information: view Wi-Fi connections
YouTube APK other: control vibration,run at startup,toggle sync on and off,use accounts on the device,read Google service configuration,change network connectivity,prevent device from sleeping,view network connections,control Near Field Communication,read sync settings,full network access,receive data from Internet,YouTube usernames,view configured accounts,YouTube,manage document storage
Add or remove accounts:
Allows the app to perform operations like adding and removing accounts, and deleting their password.
Change network connectivity:
Allows the app to change the state of network connectivity.
Control Near Field Communication:
Allows the app to communicate with Near Field Communication (NFC) tags, cards, and readers.
Allows the app to control the vibrator.
Find accounts on the device:
Allows the app to get the list of accounts known by the device. This may include any accounts created by applications you have installed.
Full network access:
Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.
Manage document storage:
Allows the app to manage document storage.
Modify or delete the contents of your USB storage:
Allows the app to write to the USB storage.
Prevent device from sleeping:
Allows the app to prevent the device from going to sleep.
Read Google service configuration:
Allows this app to read Google service configuration data.
Read sync settings:
Allows the app to read the sync settings for an account. For example, this can determine whether the People app is synced with an account.
Read the contents of your USB storage:
Allows the app to read the contents of your USB storage.
Receive data from Internet:
Allows apps to accept cloud to device messages sent by the app's service. Using this service will incur data usage. Malicious apps could cause excess data usage.
Run at startup:
Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the device and allow the app to slow down the overall device by always running.
Take pictures and videos:
Allows the app to take pictures and videos with the camera. This permission allows the app to use the camera at any time without your confirmation.
Toggle sync on and off:
Allows an app to modify the sync settings for an account. For example, this can be used to enable sync of the People app with an account.
Use accounts on the device:
Allows the app to request authentication tokens.
View configured accounts:
Allows apps to see the usernames (email addresses) of the Google account(s) you have configured.
View network connections:
Allows the app to view information about network connections such as which networks exist and are connected.
View Wi-Fi connections:
Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.
Jul 26, 2017
May 21, 2017
Jul 4, 2017
Dec 20, 2016
|
<urn:uuid:0f257819-06ae-4d53-a838-9e5be73bdf5a>
| 0.11215 |
Winnipeg Live Flight Arrivals
|Thunder Bay (YQT)||Morningstar Air Express||MAL8940||12:18||En-Route|
|Ste Therese Point (YST)||Perimeter Aviation||YP622||12:20||Scheduled|
|Red Sucker Lake (YRS)||Perimeter Aviation||YP219||12:30||Scheduled|
|Little Grand Rapids (ZGR)||Perimeter Aviation||YP112||12:45||Scheduled|
|Red Lake (YRL)||Bearskin Airlines||JV361||12:55||Scheduled|
|Oxford House (YOH)||Perimeter Aviation||YP204||13:10||Scheduled|
|Calgary (YYC)||Air Canada||AC8336||13:22||13:43||Landed Late|
|The Pas (YQD)||Calm Air||MO123||13:30||13:47||Landed Late|
|Richmond (YVR)||Delta Air Lines||DL7423||13:57||Cancelled|
|Toronto (YYZ)||Flair Airlines||F8186||14:10||En-Route|
|Thunder Bay (YQT)||Perimeter Aviation||YP1525||14:21||14:21||Landed|
|Little Grand Rapids (ZGR)||Perimeter Aviation||YP1510||14:39||Scheduled|
|Island Lk Garden Hill (YIV)||Perimeter Aviation||YP108||15:20||Scheduled|
|Sioux Lookout (YXL)||Perimeter Aviation||YP1100||15:25||15:25||Landed|
|Toronto (YYZ)||Air Canada||AC7509||15:35||Scheduled|
|Ste Therese Point (YST)||Perimeter Aviation||YP1020||15:51||Scheduled|
|Shamattawa (ZTM)||Perimeter Aviation||YP216||16:10||Scheduled|
|Ste Therese Point (YST)||Perimeter Aviation||YP610||16:20||Unknown|
|Thompson (YTH)||Perimeter Aviation||YP12||17:12||17:54||Landed Late|
|Norway House (YNE)||Perimeter Aviation||YP116||17:25||Scheduled|
|Ottawa (YOW)||First Air||7F5064||17:32||17:36||Landed|
|Thunder Bay (YQT)||Morningstar Air Express||MAL7060||18:05||17:59||Landed|
|Rankin Inlet (YRT)||First Air||7F157||18:25||18:22||Landed|
|Deer Lake (YVZ)||Perimeter Aviation||YP224||18:25||Unknown|
|Rankin Inlet (YRT)||Canadian North||5T157||18:30||Landed|
|Rankin Inlet (YRT)||Calm Air||MO307||18:30||Landed|
|Island Lk Garden Hill (YIV)||Perimeter Aviation||YP109||18:35||Scheduled|
Winnipeg International is found in the Canadian province of Manitoba, and is recognised by its IATA code of YWG. The airport is also officially known as the Winnipeg James Armstrong Richardson Airport, in honour of an influential businessman and pioneer of Canadian commercial aviation. The airport’s approximate 3.39 million passengers per annum have access to a rang of airline companies, and to a large number of facilities within the airport’s terminal building. Passengers on Winnipeg International Airport arrival flights also have access to a number of options for ground transportation.
The airport of Winnipeg is located just a few kilometres to the west of central Winnipeg, and is very nearby to the St. James Industrial area, Murray Industrial Park and Omand’s Creek Industrial. Areas just north of the airport include Tyndall Park, The Maples and Mandalay West, and areas to the south include King Edward, Tuxedo and South Tuxedo. The city of Winnipeg is surrounded by many smaller towns, such as Oakbank, Beausejour, Stonewall, Steinbach, Morris and Portage la Prairie, and is not far north of the border between Canada and the United States of America. On Winnipeg’s western side is the city of Brandon and Regina, in the province of Saskatchewan, and on the eastern side is the Whiteshell Provincial Park, as well as Kenora, in the province of Ontario.
Winnipeg offers departure flights to many locations, and also receives passengers from destinations in Canada, Mexico and the United States. The airport’s main airline companies are Kivallig Air, Perimeter Aviation, Calm Air, Air Canada Express and WestJet, and their flights arrive from Calgary, Edmonton, Montreal, Ottawa, Regina, Saskatoon, Thompson, Churchill, Baker Lake, Sanikiluag, Gods River, Lynn Lake, Sandy Lake, Thunder Bay, Hamilton and Cancun, just to mention a few. Although the majority of airline companies arrive at the main terminal building of the airport, flights by Perimeter Airlines and Kivallig Air will arrive at one of the other two smaller terminal buildings. These buildings are also located on the airport grounds, and are a kilometre or two from the main building. The main terminal of the airport is not used by these two airline companies because they mostly operate smaller types of aircraft, which do not require the same facilities as the larger airplanes.
The main building of Winnipeg Airport is located in the south-eastern portion of the airport grounds, and is large enough to accommodate the number of passengers that pass through it on a daily basis. It is also a new building, having only opened at the end of October, 2011, and was selected by Travel Channel as one of the most iconic airport buildings in the world. The terminal holds a large number of shops and restaurants, including two duty-free stores, free Wi-Fi connections, currency exchange services, ATMs and information booths. Airport volunteers are also available in their gold or silver vests. Arriving passengers will find all that they require within the building, and can also hire a car from one of the Winnipeg International Airport car rental companies. They include Hertz, Budget, Avis, National, Enterprise, Alamo, Thrifty, Auto Europa, Dollar and Europcar.
Some of the other important airline companies at the airport are Air Canada, with flights from Ottawa, Toronto and Vancouver, Air Transat, with flights from Regina, Saskatoon and Thunder Bay, Bearskin Airlines flying from Dryden, Fort Frances and Kenora and Sunwing Airlines with seasonal flights from Cancun, Holquin, Montego Bay, Puerto Vallarta and Varadero. From the United States, direct flights to Winnipeg Airport are offered from Minneapolis/St. Paul, Chicago, Denver, Orlando, Phoenix, Las Vegas and Palm Springs by the airline companies of WestJet, Express Jet Airlines, SkyWest Airlines and Compass Airlines.
A large percentage of the airport’s arriving passengers are tourists, coming to see the attractions of Winnipeg. The city features some very popular walking tours, as well as river cruises along the Red River and the Assiniboine River. The Assiniboine Park Zoo is a family favourite and the Centennial Concert Hall is a venue where many theatrical performances are held each year. Further attractions include the Royal Canadian Mint and the Winnipeg Convention Centre, and the notable parks of the region with boating and fishing opportunities in the summer and ice skating and cross-country skiing opportunities in the winter include Fort Whyte, Kil-Cona Park, King’s Park, La Barriere Park and St. Vital Park. The city also has a number of popular museums, and visitors can easily travel to the nearby attractions found at Selkirk, Dugald and Grand Beach.
Arriving passengers have a number of options for ground transportation should they not wish to rent a car. There are two public bus routes available (15 and 20), which are very cost effective, and private shuttles for transport to Brandon. A passenger’s hotel could provide complimentary transport as well from the airport to their place of accommodation. Alternatively, a taxi will take passengers to downtown Winnipeg for between $15.00 and $18.00.
Further details regarding Winnipeg arrivals can be viewed on several online websites, or the airport can be contacted at (204) 987-9402.
|
<urn:uuid:4c357654-304c-4589-b12c-105fe22be508>
| 0.052811 |
Control assays and synthetic DNA templates were designed to facilitate the assessment of the key experimental factors impacting your real-time PCR results.
DNA Contamination Control Assay
Use the PrimePCR DNA contamination control assay to determine if genomic DNA (gDNA) is present in a sample at a level that may affect PCR results. This assay may also be used to compare relative levels of gDNA contamination present in different samples to determine if PCR results may be affected.
Positive PCR Control Assay
Use the PrimePCR positive control assay to qualitatively assess the performance of a PCR reaction associated with a single sample. This assay may also be used to compare the relative performance of PCR reactions associated with different samples.
RNA Quality Assay
Use the PrimePCR RNA quality assay to determine if RNA integrity may adversely affect PCR results for a single sample. This assay may also be used to compare relative RNA integrity among different samples to determine how PCR results might be affected.
Reverse Transcription Control Assay
Use the PrimePCR reverse transcription control assay to qualitatively assess the performance of the reverse transcription reaction associated with a single sample. This assay may also be used to compare the relative performance of the reverse transcription reactions associated with different samples.
Reference Gene Assays
Reference genes are used in relative gene expression analysis to normalize for variation in the amount of input messenger RNA (mRNA) among samples. To ensure accurate quantitation, it is important to include one or more reference genes exhibiting constant expression levels under the experimental conditions. To streamline reference gene selection, we offer PCR primers for a set of commonly used reference genes that can be used individually, easily screened using our preplated 96-well and 384-well reference panels or added to custom-designed plates.
Show Reference Gene Assays
View Reference Gene Assay Panels
|
<urn:uuid:e3737f78-2e32-41b4-8e90-5d60127b3860>
| 0.78373 |
Take your Employee Central Payroll system to the next level (Part 2)Take your Employee Central Payroll system to the next level (Part 2) https://spinifexit.com/wp-content/uploads/2020/04/SpinifexIT-April-blog_Take-your-Employee-Central-Payroll-system-to-the-next-level-part-2-featured-image-final-version-1024x576.png 1024 576 SpinifexIT https://spinifexit.com/wp-content/uploads/2020/04/SpinifexIT-April-blog_Take-your-Employee-Central-Payroll-system-to-the-next-level-part-2-featured-image-final-version-1024x576.png
In this blog, we’ll step back to consider some of the challenges during implementation, both for existing on-premise customers deciding to migrate to Employee Central Payroll (ECP) and for new Customers planning to implement ECP.
This blog will focus on the Payroll Migration, but of course, you still need to implement Employee Central.
If you already have Employee Central implemented and connected to your on-premise solution, then the migration process could be much simpler as you may be able to just focus on the ECP side and know that the Employee Central configuration and setup is already there.
This blog comes with a FREE planning checklist.
Download it here and use it as your guide.
Moving from On-Premise? Implement, Reimplement or Migrate your Payroll
Many companies who are looking to move to Employee Central Payroll will be existing SAP On-Premise customers. If you fall into this category, you need to consider how much of your existing Payroll configuration and setup you would want to move to the Employee Central Payroll Solution.
Migrate your System
The intent of the migration is to move your configuration, and historical employee data (including payroll history) to the new Employee Central Payroll solution with the aim that it will run with minimal changes. This means less re-configuration, less testing and that you can continue to use your new system to report historical data.
Reimplement your Payroll
In some cases, customers may have areas that they have felt have always been a challenge.
For example: There may be an old configuration you wish to remove, or you want to reconfigure some payroll rules to operate differently.
This is often a perfect time to do this as you have a project team and can incorporate this work into the existing project. It is also lower risk as you are only changing some areas of the configuration.
Save yourself and your company hundreds of hours and thousands of dollars!
The best course of action is to begin planning now, so you can review all the options available to you. Part of this is learning the prerequisites you’ll need to support your project more efficiently.
Aside from the migration of the payroll configuration, there are many other areas to also consider.
Some of these include:
- Will I migrate my prior history for the employees? For example: Do you move your payroll results, employee history, finance postings, year to date results into the new system?
- How do I best perform Parallel runs?
- Do I migrate my existing ABAP reports and other functionality into the new system?
- For any reports being migrated, how will I modify and maintain these into the future?
- Can all of my reports (Either custom reports or standard SAP reports) be executed from Employee Central, or by the Managers themselves
- How will I cater for my Adhoc Requests that come up. Often we see customers go from 20-30 go live reports to hundreds in a period of 12 months. If you have adhoc requests, you want to know how you will cater for these
- Will all your custom reports and manual reports be able to fit into the Payroll Control Center process
- If I need additional Payroll Control Center checks – How can I add these?
Darren SouterSpinifexIT Founder & Global Architect
Get this FREE ECP Implementation checklist to guide you in your planning and thought process!
Download your checklist here.
If you need help assessing these questions further, feel free to talk to us, or even comment down below. We can schedule a quick discussion or even refer you to some of our customers who have used our solutions for their own implementations.
Ready to move to Employee Central Payroll?
The Easy Migration solution will help you de-risk and accelerate your migration to ECP with an integrated toolset that allows full configuration and data migration copies from On-Premise to ECP, reports to validate full payroll results, runs repeated payroll tests, and identifies data and configuration inconsistencies between source and target systems for corrections.
Our Easy Migration solution helps you complete your ECP migration process 90% faster than traditional implementation times. It can help you:
- dentify and migrate your current payroll configuration to Employee Central Payroll.
- Copy current employee data and results into the new system, and
- Run reconciliation reports fast using built-in reports, powered by our SAP-Certified reporting solution
Our Easy Migration solution is also 100% integrated with other SpinifexIT solutions so it is an easy step to transition to our other products if you have the need.
What if I have already implemented ECP or plan to remain on-premise for the moment?
If you have already moved to Employee Central Payroll, or are happy to just stay with your on-premise solution for the moment, this doesn’t mean that you cannot look to areas to improve.
About 90% or more of the customers who we speak to, already have Employee Central Payroll or SAP Payroll installed and running, and are looking to improve some of their day to day manual processes.
In this case, the SpinifexIT solutions can just be installed into your existing system. The way that most customers then start to use the solutions is as follows:
- Train on how to use the solutions – This is about 3-5 days training upfront
- Identify the time-consuming processes that your team is doing, and then replace these with any of our 120 pre-delivered reports. You can also build custom reports to support your HR and Payroll information requirements. This immediately removes a lot of manual steps and starts to free up your team. Here is the YouTube case study.
- New, ad hoc requests can be delivered through Easy Reporter. Reports can be scheduled and emailed out directly to the required person so it completely removes the need for manual processing.
- If your payroll has Year End processes for Australia, USA or Canada, start to use our predefined Year End solutions.
- From here, you can continue to replace your existing manual processes with the automated Easy Reporter steps.
Over a quick period, you will be able to automate the extraction, generation and sending of your reports. Instead of spending a lot of time and effort manually building the perfect set of reports, your team can then focus on delivering a high quality service to your customers.
Employee Central Payroll is a powerful solution, but like most software solutions, will have areas that can be further streamlined. Whether this is during the implementation, streamlining payroll processes, report building or reconciliation steps, there are always many ways to further take advantage of your ECP solution.
If you decide to walk the SpinifexIT path, you will find that we are not just a software solution that is dropped into your system and rarely used.
Our team of expert consultants will work directly with your team right through the implementation and into go live to ensure you use the best practice methods from the start and build long lasting processes, based on the best practices we have seen at hundreds of other customers.
The reporting and Payroll Control Center solution (discussed in Part 1) is just part of the SpinifexIT solution set, but if you are moving to Employee Central Payroll, this is a key building block for your journey.
Along the way, you may have a need for our other solutions, and the good thing is that most of our solutions leverage off of Easy Reporter, so you are starting with the best of breed solution.
SpinifexIT solutions can be installed in a matter of hours into your system, but if you are using any of our partner’s hosted Employee Central Payroll or SAP Payroll Solutions, then our solutions are already available in their environments. Make sure to ask them about us!
Once again, here’s your simplified implementation checklist, so you can talk about your plans with your implementation partner.
As always, feel free to reach out to us at [email protected] for any questions.
On a side note, we hope you’re doing well, and that you and your loved ones are healthy, safe and well despite what the world is going through. We’re all in this together, and SpinifexIT will always be here to support you if you need help with our solutions.
|
<urn:uuid:92c13bb0-21c1-45ee-9459-7558042081ec>
| 0.059203 |
How Do Virtual Private Servers Work?
If you are managing a heavy resource-demanding web site with an ever-growing number of visitors, page views and file downloads, but cannot afford a dedicated hosting server solution to cope with the increased load, then have a look at our cost-effective virtual private server.
The Virtual Private Servers Hosting Service Described
1 GB RAM
30 GB Storage
2 GB RAM
50 GB Storage
A VPS (Virtual Private Server) ensures an insulated shared hosting environment whereby the entire amount of CPU, RAM memory, hard disk storage space and web traffic resources is allotted to you exclusively – as if you had a dedicated server hosting account.
When you order your virtual private server from Pro Host Z, you are given the option to pick between two state-of-the-art data centers – Steadfast in Chicago, United States, & Pulsant in London, UK, and we recommend you to choose the one nearest to your location, so that you and your web site's guests can be served quicker.
With Pro Host Z's virtual private hosting servers, you can select an Operating System and install your own software configurations (you obtain full root access). What's more, you can reboot your private virtual web server at any particular moment, keep track of the resource usage and check your traffic stats in real time. You can select between KVM & OpenVZ VPS hosting packages, and if you need support managing your Virtual Private Server, you can try the additional administration services offered by us.
Pro Host Z Virtual Private Servers – A Web Hosting Solution Optimized for Your Demands
For the sake of clients owning data-loaded sites, at Pro Host Z we provide the Memcached distributed memory caching system and the Varnish Cache web application accelerator, which will enormously increase the loading speed of your web site and lower the server load. It's good to point out that Pro Host Z's virtual private servers offer PostgreSQL, InnoDB and NodeJS support, so power users can find all the flexibility and high-performance tools they require.
|
<urn:uuid:b6b669f1-9272-402c-b6c0-014a51a1c8f7>
| 0.247322 |
uthash 2.1.0 Hash tables, lists, and other data structures implemented as C macros
uthash implements a hash table and a few other basic data structures as C preprocessor macros. It aims to be minimalistic and efficient: it's around 1,000 lines of code which, being macros, inline automatically.
Unlike function calls with fixed prototypes, macros operate on untyped arguments. Thus, they are able to work with any type of structure and key. Any C structure can be stored in a hash table by adding
UT_hash_handle to the structure and choosing one or more fields to act as the key.
|
<urn:uuid:fc3361f8-b6c9-43b4-bf3b-1824520d95c3>
| 0.08353 |
Layer-one blockchain networks like Bitcoin (BTC) and Ethereum (ETH) form the foundation of the cryptocurrency ecosystem and enable smart contract functionality that has allowed the creation of new industries like decentralized finance (DeFi) and nonfungible tokens (NFT).
Avalanche (AVAX) is a relatively new layer-one solution that has recently seen a significant increase in price and adoption as the dominant smart-contract platform (Ethereum) continues to struggle with high transaction costs and slower processing times than its competitors.
Data from Cointelegraph Markets Pro and TradingView shows that after hitting a low of $12.24 on Aug. 3, the price of AVAX rallied 205% to a multi-week high at $37.42 on Aug. 20 as its 24-hour trading volume surged to more than $1.4 billion.
Three reasons for the significant price growth from AVAX are its rapidly expanding DeFi ecosystem, the release of the Avalanche bridge to Ethereum and the protocol’s unique tokenomic design that offers dynamic fees and a token burn mechanism.
Avalanche Rush expands the DeFi ecosystem
One of the biggest developments to happen for the Avalanche protocol was the announcement of Avalanche Rush on Aug. 18, a $180 million liquidity mining incentive program launched in conjunction with Aave and Curve that is designed to introduce more applications and assets to its growing DeFi ecosystem.
Experience the power of #Avalanche. Welcome to #AvalancheRush, the $180M liquidity mining incentive program in collaboration with leading DeFi dapps–both on and off Avalanche– starting with @aaveaave and @curvefinance. And, this is just Phase 1! https://t.co/YGrrVB7Uqc
— Avalanche (@avalancheavax) August 18, 2021
Phase 1 of the Rush program is set to begin in the near future and will allow AVAX to be used as liquidity mining incentives for Aave and Curve users over a 3 month period.
A total of $27 million worth of AVAX has been set aside by the Avalanche Foundation to fund the incentive program with additional allocations planned for phase 2.
The program was designed to demonstrate the Avalanche Foundation’s commitment to scaling DeFi on the network and helping to “create a more accessible, decentralized, and cost-effective ecosystem.”
Evidence of the growth of DeFi on the Avalance network can be found in the increasing total value locked (TVL) in protocols on the network, such as Pangolin and Benqi Finance which recently surpassed a TVL of $300 million.
Ethereum bridge facilitates asset migration
A second reason for the bullish growth seen in the Avalance ecosystem over the past few weeks is the release of the Avalanche Bridge (AB) on July 29. This “next-generation cross-chain bridging technology” enables the transfer of assets between the Avalanche and Ethereum networks.
The Avalanche Bridge (AB) launched just 3 weeks ago.
Today, AB officially transferred over $100M in tokens to and from Ethereum.
— Avalanche (@avalancheavax) August 19, 2021
As shown in the above tweet, in the three weeks since the AB was launched, it has transferred more than $100 million in token value between the two networks as holders seek lower-fee environments to conduct their transactions.
The AB is estimated to be five times cheaper than the previous Avalanche-Ethereum Bridge (AEB) and it is purported to offer a “better user experience than any cross-blockchain bridges launched to-date.”
If Ethereum is unable to get a handle on high transaction costs in the near future, there is a good chance that assets and liquidity will continue to migrate to chains like Avalanche as their DeFi ecosystems grow in size and value.
Transaction burning improves AVAX tokenomics
A third reason for the increasing interest in the Avalanche network is the protocol’s unique tokenomic structure that includes a transaction fee burning mechanism that helps reduce the circulating supply over time.
#Avalanche burns all transaction fees.
See how much has been burned so far! https://t.co/LpxU9dtyXy
— Avalanche (@avalancheavax) August 20, 2021
As noted in the above tweet, all fees on Avalanche are burned for the benefit of everyone in the community as the hard-capped supply of 720 million AVAX is guaranteed to decrease over time. This could help increase the value of the remaining tokens in circulation.
At the time of writing, more than 163,000 AVAX have been burned, a figure which increases more rapidly as more users transact on the network.
The network’s fee mechanism is also set to undergo an upgrade to Apricot phase three which will introduce C-Chain dynamic fees on Aug. 24.
⭐Apricot Phase Three: C-Chain Dynamic Fees
Apricot Phase Three upgrade will activate on @Avalancheavax Mainnet at 7 a.m EDT (11 a.m UTC) on Tuesday, August 24th
— AVAX Daily (@AVAXDaily) August 16, 2021
The new integration will allow for the addition of a time-based, rolling window fee calculation, a capped fee range of 75–225 nAVAX and a block gas limit of 8 million gas.
The views and opinions expressed here are solely those of the author and do not necessarily reflect the views of Cointelegraph.com. Every investment and trading move involves risk, you should conduct your own research when making a decision.
|
<urn:uuid:0a1f8f58-4326-4cd7-be6d-1b521d2bc527>
| 0.108692 |
I’m having an issue with getting the web viewer to show the website if I use magic text from my list on the previous page. When I put the url in the link directly it works, but I want it to come from a list so that I don’t need 10 screens with web viewers.
Here is what the input looks like with magic text:
This is what should happen (and does when I put the url in directly)
The data has come through to the screen but the website doesn’t display when I use magic text. Any ideas?
Strange. Did you add the Website URL’s to that records in your Database?
Yes I did - anywhere else I’ve used magic text it has worked just not here
You see like this screen?
No, it is a completely blank screen and doesn’t load anything but the app bar at the top.
I test it with magic text and works for me.
Go to the DB and go to that record and see if you have enter a space after o and if it is remove it and try.
Thanks so much - I should have double checked that first!
Yes thanks @dilon_perera - all working now
This topic was automatically closed 10 days after the last reply. New replies are no longer allowed.
|
<urn:uuid:7a43ad11-3b43-4273-bea3-23314773e9c2>
| 0.080599 |
Field Medics Mecha Med Scarf
|Type||Chest - Clothes|
|Collision Type||Full Collision|
|Hardness|| 0 Hits|
Restores after 0s of inactivity.
|Seed Color|| |
|Grow Time||1h 0m 0s|
|Default Gems Drop||N/A|
|No Longer Available|
|This item cannot be obtained anymore via this method.|
|During Grow4Good Week|
The Field Medics Mecha Med Scarf is an unsplicable chest item which was added as part of Grow4Good Week 2021 on April 15, 2021.
|Heres to a speedy recovery!|
|No medical enhancements here!|
When equipped, this item grants the Speedy + Quick Recover: Field Medics Mecha Med Scarf! mod, which allows the player to move faster and heals the player faster than usual after receiving damage from hitting Lava or any other pain blocks.
- This item is part of the Mecha Med set, which consists of Mecha Med Helmet, Field Medics Mecha Med Scarf, Mecha Med Shoes, Ambu-Lance, Mecha Med Pants, and Mecha Med Shirt.
|
<urn:uuid:1df161b6-60a1-4185-86ef-a67d9d376050>
| 0.044055 |
For health as a mechanic, see: Health
The health bar (also known as the HP bar) is a bar which displays a player's remaining health. In all game modes except osu!mania, there is an indicator moving along the health bar that shows a player's current health.
In osu!taiko, it is impossible to fail a beatmap during play, but it is possible to fail after the beatmap has ended if the player has not filled the health bar enough.
In osu!, osu!catch, and osu!taiko, the health bar is displayed in the top-left corner of the screen. Whereas in osu!mania, it is rotated 90 degrees counterclockwise, and is placed to the right of the playfield.
In osu! and osu!catch, the health bar will drain at a constant rate throughout the course of a beatmap, with the exception of breaks. This effect is known as health drain.
|
<urn:uuid:a95548ca-3800-4d78-8c38-b7ffb316fbf0>
| 0.356242 |
What is Kubernetes?
Originally developed by Google, Kubernetes, or k8s as it is known for short, is a container orchestrator used to deploy our production applications in the cloud in an automated way.
This platform allows us to decouple and standardise our applications and services to be agnostic to the infrastructure and above all provides strong isolation and immutability of our artifacts to be able to deploy in any environment in a unified, simplified and unvaried way.
Kubernetes SaaS / Cloud
Its native implementation in the cloud through Kubernetes SAAS managed services such as EKS (Amazon Web Services), AKS (Azure), GKS (Google), etc… provide us with the automation of resource deployment (load balancer, storage management, etc.) in an automated way.
They also provide us with a layer of management over the control plan and its external auto-provisioned resources such as load balancers, storage class, etc. This point will be important to simplify the management and maintenance model, allowing you to focus your efforts on the design, architecture and service deployment layer without inheriting the complexity of cluster management itself.
GitOps vs K8S
The implementation of new development standards using GITOPS methodologies, where GIT is at the center as the single point of truth, has generated a large number of applications and formats that allow us to automate the entire CICD flow based on HELM manifests and charts that provide versioning in their environments and a deployment system following continuous deployment practices, ensuring the operation of their service at all times without outages or interruptions.
Another contribution of Kubernetes is the ease of visibility it provides in terms of monitoring.
Kubernetes with GEKO CLOUD
Our experience in microservices-based system deployments using Kubernetes
It is a cutting-edge technology but has been around long enough to ensure its use in real-world environments and has a large community behind it.
A number of cloud-managed K8s platforms are available to eliminate complexity.
Improve the portability and flexibility of your business by making it cloud agnostic. Reduce the level of friction and deploy as many clients or environments as necessary on different platforms.
Improve the traceability and security of your services by exposing those entities that require them and working internally with APIs and internal services.
Kubernetes Managed Services
Competitive advantages that Kubernetes brings to your business
Unify the GIT OPS deployment model
You can finally implement a single way to deploy your services in your company, which speeds up the onboarding of the technical team, the cooperation and the time to market to deploy new functionalities or new microservices.
High fault tolerance
The orchestrator itself manages deployments to ensure that they pass healthcheck tests before going into production or deploy new pods in case of a one-off incident to maintain the stated consistency in number of resources.
Responsibility / autonomy to the development team (namespaces + Quotas)
This technology supports development teams if good CICD criteria and pipelines are implemented with the philosophy “you build it, you run it!” by having full control and knowledge of the concrete flow and subsequent monitoring visibility to make decisions based on performance and quality criteria.
DRP or business continuity
Recovering to a Kubernetes-based platform has greatly simplified contingency or disaster recovery planning as we completely decouple the infrastructure, we simply need the data, a K8S and deploy our artefacts already stored in a repository.
High-speed growth (scalability) + Vertical node autoscaler + HPA
The proper implementation of a Kubernetes platform will allow us to self-manage the system to grow both in number of PODS and number of nodes in the cluster (vertical and horizontal growth dynamically), which will also provide us with high cost efficiency. Another important additional point is that the dynamic growth of the deployment pods is carried out in just a few seconds VS the traditional auto scaled platforms that took around 240 seconds to start up.
Marketplace application ecosystem
Thanks to the inertia that K8s has acquired within the developer community, there is a large list of applications that through HELM charts or through the Operators themselves, will allow us to deploy components such as databases, queuing systems, cache and long etcetera from a simple marketplace of components that you will have at your disposal.
get the most out of this technology
Considerations to take into account
We are a partner specialising in Kubernetes
Geko Cloud is the 1st company in Europe to partner with Kubesphere, a distributed operating system that manages cloud-native applications, using Kubernetes as kernel.
Our experts will help you face the different challenges in your digital transformation.
|
<urn:uuid:edfab240-1526-44e2-a669-333928bb4b07>
| 0.066541 |
HOW DO I CHANGE OR CANCEL MY ORDER?
Contact our Customer Service Department as quickly as possible at the following address: [email protected] Please indicate the name you used to place the order or the order reference number. We will thus be able to change or cancel your order before shipping.
HOW DO I RETURN A DEFECTIVE OR NON-CONFORMING PRODUCT?
We recommend that you examine the merchandise immediately upon receipt to check that it is correct and free from defects. If this is not the case, please submit a claim to our Customer Service Department within 30 days following the date of your purchase.
HOW CAN I TRACK MY PARCEL?
You will receive a confirmation email with a tracking number once your order has been prepared and handed over to the carrier.
I CHANGED MY MIND AND WISH TO RETURN THE PRODUCT—HOW DO I DO THIS?
You can, of course, return your order to us by exercising your right to cancel within 10 days following the date of your purchase. You will receive a full refund for the order once we receive the product; however, you are responsible for paying the return costs. Please contact the Customer Service Department in this case at the following address : [email protected]
HOW LONG DOES SHIPPING TAKE?
For France, the normal shipping time is 3 to 4 business days when the order is sent by standard shipping. Expect 5 to 7 days for Europe and 8 to 10 days for the rest of the world.
Due to actual sanitary situation the shipping time can take longer.
IS MY WATCH WATER RESISTANT?
All our watches are water resistant up to 5 ATM. The watches can thus resist a pressure of 5 bar, which protects them against any accidental contact with water (splashing, rain, housework). However, it would be best to avoid using them while swimming, diving or in the shower. We recommend that you do not expose your watch to direct contact with water, especially one with a leather strap.
FOR HOW LONG IS MY WATCH COVERED BY THE WARRANTY?
All our watches are guaranteed for 2 years from the date of purchase. This warranty covers all defects in materials and workmanship, i.e. defects in the movement, watch case, glass or watch strap. However, the warranty does not cover any damage linked to poor care or improper use (e.g. scratches or impacts) or any aesthetic changes caused by normal consistent use over time (e.g. changes to the watch strap’s colour, fine scratches on the watch case, stretching or scuffing on the leather).
HOW CAN I REPAIR MY WATCH?
We will repair any material or workmanship defects in your watch free of charge throughout the entire period of the warranty. Please contact our Customer Service Department ([email protected]) to explain the problem and provide your order number. We will analyse your request and contact you as soon as possible with more detailed information.
WHEN DO I HAVE TO REPLACE THE BATTERY IN MY QUARTZ WATCH?
Our batteries last approximately 2 years. You can have it replaced at any jewellery or watch shop. This service is generally free of charge or incurs a small fee.
DID WE NOT ANSWER YOUR QUESTION?
Please feel free to send us a message via our Contact page.
|
<urn:uuid:902736b2-8b34-4680-8de3-42efa1ca23e5>
| 0.209062 |
There are many kinds of SEO packages available in Dubai and the most common are:
- Starter SEO Package: Seo Audit, Keyword Research, Content Analysis, Back Link Report and Google Analytics.
- Standard SEO Package: Seo Audit, Technical Audit, Keyword Research, Content Analysis, Competitor Benchmarking, Backlink Report and Google Analytics.
- Advanced SEO Package: Business Audit, USP, Positioning, SEO audit, Technical Audit, Keyword Research, Content Analysis, Competitor Benchmarking, Backlink Report and Google Analytics.
Most SEO Service Plans Confuse Business Owners
At the same time, all of these SEO service plans may seem confusing to the average small business owner or marketing director, who has not carried out an SEO exercise before.
This is where a lot of SEO companies confuse and convince the unsuspecting client to sign long term agreements that may finally not be in the best interest for the client.
How to Choose a SEO Digital Marketing Company Dubai that Gets You Value for Money?
Google already has a fair idea of what you website is all about, from the Google Analytics installed on your website.
The Analytics is silently collecting all information about visitors on your website. Their age, preferences, their keyword choices, the customer journey, their intention and hidden desires. In fact google has more data than you will ever need to do SEO.
So to do, professional SEO, you need to start with your Google Analytics. When we are approached to take a look at the SEO of a website, the first thing we request is Google Analytics access.
How to Do Professional SEO
When you feel hungry and search for ‘pizza’ on Google, it may look like a simple process to you as a user.
But Google has only 0.60 seconds to decided which 9 websites to show on the front page of Google from among the 1.1 billion pizza websites out there.
If you are a new pizza brand and wish to come up on the front page of google for the keyword ‘pizza’, it might take you years.
The smarter way to SEO your website to the top of Google results, would be to analyze your customer and find out if they are in the discovery phase or purchase stage?
Now, you can start optimizing your website based on customer intent and have a separate set of keywords for the discovery phase and a different set for the purchase stage.
Although SEO drives 51 percent of all visits to B2B and B2C websites online, very few brands have discovered the power of SEO based on customer intent.
By thinking differently, you would separate yourself from 99% of brands out there like the IBM hoarding that is not just a hoarding but a smart rain shelter.
(If you would like to have advanced SEO done for your brand that is based on customer intent, reach out to us. However, please note we don’t work with brands that don’t have analytics data)
Now, I hope you would have discovered why choosing an SEO company based on the best SEO package they offer is not a good idea.
If you would like to have a professional SEO analysis done for your brand, feel free to call us on 050-6986164 or visit our office at Building 2, TwoFour54, Sheikh Zayed Street, Abu Dhabi, UAE.
SEO Packages Sample
If you are an SEO agency looking for a sample SEO package that you can show to a prospective client, you have come to the wrong place.
We don’t have any sample SEO packages. What we have are solid SEO concepts that you can use and profit.
SEO Service Plans
If you are looking for a service plan for your SEO project, you need to know that the first thing your prospective SEO agency needs to have is a good grasp on google analytics.
If the SEO agency has an analytics expert on board (like we do), there is a good chance that they are metrics driven and only a metrics driven agency can win the SEO war.
Local SEO Packages
If you are looking for a Local Seo Package, then most probably, you have a local business and you are planning to promote it to the locality.
Most of Local SEO starts with a having a great Google Business presence and ensuring your business shows up in the Map Pack.
But that is just the beginning. What you need is a complete SEO package that will cover both your local seo package requirement and your website SEO requirement.
SEO in Dubai
Now that you have seen the other side of SEO packages in Dubai, I am sure you have enough information to choose an SEO package. However, if you need more information on SEO packages in Dubai, reach out to us on 050-6986164.
|
<urn:uuid:4be2e864-80b4-42da-a4cb-e479805988dc>
| 0.050716 |
Bearing number : SL11 938
Size (mm) : 190x260x101
Brand : INA
Bore Diameter (mm) : 190
Outer Diameter (mm) : 260
Width (mm) : 101
d - 190 mm
D - 260 mm
B - 101 mm
C - 101 mm
Weight - 16.4 Kg
Basic dynamic load rating (C) - 800 kN
Basic static load rating (C0) - 1900 kN
Limiting speed - 1400 r/min
ATRA ACE QA-5000 (110-120V) ASSEMBLY AND PARTS LIST pdf. Socket Bolt4 X 20 2 131 T001916 Ball Bearing 680122 2 17 T801672 Ball 51'16 Ass'y 1 set 83 T000680 Rod Handle 3 142 T001917 Ball Bearing 680322 1.
Home > Products > Cylindrical roller bearing > SL11938-A Cylindrical Roller Bearing 190x260x101mm SL11938-A Cylindrical Roller Bearing 190x260x101mm Get Latest Price
High quality SL11938-A-XL Cylindrical Roller Bearing 190x260x101mm, Just click the button " Contact Now" to mention your purchase Requirement , Quantity and Contact Method of your requested Bearing Item No. SL11938-A-XL. then click the button " Send " The web site will make your purchasing information sent to the supplier's mailbox, who will ...
More details about INA SL11938 Bearing. Wholesale brand INA SL11938 Bearing Spherical Roller Bearings, cheap INA SL11938 Bearing price agent, sizes, supplier; Supplies INA SL11938 Bearing ball bearings trader; We are the professional exporter and distributor of INA SL11938 Bearing dealer, factory, cost.. Bearing a is a leading online supplier and distributor of over 1,000,000 bearings and ...
SL11934 INA HMZ3048 FAG SL11936 INA HMZ3052 FAG SL11938 INA HMZ3056 FAG SL11940 INA HMZ3060 FAG HMZ3064 FAG ; We cooperate with UPS,TNT,FEDEX,EMS,DHL,etc.They guarantee to meet your needs in terms of time and money,even if you need your SL11938 bearing tomorrow morning (aka overnight or next day air) on your desk, 2, 3 days or more.Note to ...
(주)대양상공 010-2234-9862 [email protected]: 블로그 메뉴; 프롤로그; 블로그; 대양상공02-2679-6408; 지도; 서재
5201-2RS 5201-ZZ Radial Ball Bearing 12X32X15.9 . Find all the bearings, bearing housings, v-belts, oil seals, collars you need and more including the 5201-2RS 5201-ZZ Radial Ball Bearing 12X32X15.9 at
INA SL11938 bearing is strictly screened and of high quality. INA SL11938 bearing is deeply praised by users. I believe this is your best choice. We have the most detailed information about bearing sale, bearing size, bearing price and bearing dimensions. We have full bearing size and the best bearing in the world.
Radial insert ball bearings INA GYE30-KRR-B -- Yakang Bearing . INA Bearings. Radial insert ball bearings INA GYE30-KRR-B. INA GYE30-KRR-B radial insert ball bearings, the inner ring is located on the GYE70-KRR-B. 70.
|
<urn:uuid:d1d3e889-4d40-47c3-bf24-07ddeeaeff68>
| 0.314983 |
Please submit the following java programs in a zipped folder :
- Song Class – Song.java (20 pts)
- Playlist Class – PlayList.java (15 pts)
- Song Driver – SongDriver.java (25pts)
Remember to include the following as a comment in each file:
- A description of the program
Not including the required comments will result in a deduction of 15 points for the assignment (5 points per question).
|
<urn:uuid:14285b23-73c9-48e6-9ddd-1a0974f0c8bc>
| 0.081955 |
深地板的板是最大的养兔场的房间在楼上。细节使用栏杆,栏杆和护墙板是建立持久的和整个内部区域由pre-Renaissance城市混乱的活力。从不同的角度表现主义的屋顶柱身的街道Swanston透露更正式的幻想从飞檐的晶体结构和达斯·维达耗尽头罩的逃生楼梯消防电梯泛滥波纹马特洪峰(Gombrich 2002)。石外墙颜色的石头用一根针在钢管支撑的支持不断堡垒,即使在高架的主题有一个楼梯砖火炮塔制成的彩色和多边形形状承认珀西·埃弗雷特的车间在1930年也提供RMIT为数不多的室外空间的视觉焦点。科里根的目的是取悦和打破城墙的情绪RMIT Swanston的主导性和无缝地描绘了整个街道。大楼的前面,一边和高架屁股从分歧和创建一个完整的结构代表一个拼贴画为基础的设计理念。这也出现在其个人整个城市。这个建筑中得到了极大的升值和受欢迎程度的复杂性结构视为一个基本的复杂艺术给澳大利亚的地区带来了革命。
The plate of deep flooring was maximum resulting in rooms of rabbit warren on the upper floors. Details using balustrades, hand railing and dadoes were built for lasting and the whole inner area consists of pre-Renaissance city chaotic vibrancy. The expressionistic roof scape from various perspectives along with the street of Swanston revealed more formal fantasies from cornice of crystalline structure and Darth Vader for exhausting the hoods on the escape stairs fire to the lift overrun corrugated Matterhorn (Gombrich 2002). The stone façade has colored stones with a knitting needle with steel pipe’s strutting support continuously to the theme of bastion even though on the elevated back there is a brick fire stair turret made from polychrome’s and polygonal shapes acknowledging the workshops of Percy Everett in the year 1930 and also provide RMIT’s few outdoor spaces visual focus clearly. The aim of the Corrigan’s was on delighting and breaking down city wall mood of RMIT dominantly and seamlessly depicted over the street of Swanston. The front of the building, its side and the elevated rear ends created a complete structure from divisions and represents a design ideas based collage. This also presents itself to the entire city over its individual terms. This building gained tremendous appreciation and popularity with the complexity of their structure considered as a basic complicated art that brought revolution to the region of Australia.
|
<urn:uuid:d5a8dcba-0c48-45de-a9bb-81343461e631>
| 0.040172 |
As @10xAI said, a tree-based gradient boosted approach may miss the mark for time series because it cannot forecast a growing trend. However, we can apply gradient boosting methodology to any algorithm. You can mess around with some code I wrote that is based on gradient boosting and decomposition: LazyProphet. The code is badly written and I think the example data pulls break now but the method itself tends to produce some decent results.
Essentially if we do boosting with some piecewise approach we can get new changepoints at each boosting round and update our seasonality + exogenous measures. I use binary segmentation so it ends up being very similar to a wild binary segmentation approach for change points. Round 0 the 'trend' is just the mean/median, then you measure seasonality and set your 'y' to the original time series - (trend + seasonality). Round 1 then finds the optimal point which splits the data into 2 and fits a trend estimator (could be the mean kind of like a tree output) then measures seasonality and adds these measures to what was found in round 0 to find the new residuals to fit for the next round and so on. Hopefully this image makes it clearer:
I do have a much better written and more generalized approach coming soon!
|
<urn:uuid:1ce5bb23-5b7c-4ba4-86f5-9ea918d0671d>
| 0.061116 |
I have a potential client who has sent me the functional spec for their app idea. The spec is a PPT, which does a pretty good job at specifying the features, design and flow of information within the app. Of course, by just reviewing the spec you cannot be sure to be 100% certain you have acknowledged all requirements.
No contract has been signed, but they are very interested in working with me. We've agreed this would be a fixed-rate contract.
I'm considering suggesting to meet with their team and determine all requirements based on the spec. This seems like a lot of work for both teams (plus I wouldn't be paid yet) and something that should only be done after the contract is signed. Plus, it may turn them off from working with me.
Otherwise, does it make sense to send them a proposal with an estimate based on the spec, sign a service agreement based on the estimate, then meet with their team to formally review requirements in detail, then re-evaluate the cost?
My question is when in the process do you determine the "final" requirements for the project, and when do you determine what to charge for the work?
|
<urn:uuid:c4464264-f706-4c59-9c59-7cda82358910>
| 0.057158 |
Using a predictive technology inside something that moves your data around really makes sense sometimes although not a lot of people are taking advantage of it. Let me show you how to use the two together
Come to this session to see how you can create a logging, monitoring and profiling solution for your existing or new SSIS packages overcoming all usual problems that a typical solution brings: increasing package complexity, longer development times and so on. The session will propose a standard, out-of-the-box solution for all of these challenges.
Discover how to build a real world SSIS package. Learn how to set up a package configuration, Manipulate package variables. Process multiple files and capture errors. Learn some workarounds for SSIS limitations (bugs).
Learn secrets you might not have known about SSIS
|
<urn:uuid:4c476687-0745-46c6-b8e4-9f406372edf6>
| 0.055038 |
How to automatically draw Fibonacci Retracement for each new stock?
Updated on 2011-03-01 04:14:01
In order to draw the Fibonacci Retracement automatically when a new stock is selected in a chart, click on the Auto-Draw button and select "Fibonacci Retracement".
You will notice that the item is drawn at the end of the chart. You can specify the number of days/bars to use in the drawing item calculation by updating the "Number of bars" field.
To stop this drawing process, simply select the Auto-Draw button and click on "Nothing".
Note that auto-draw creates locked items. To unlock the Fibonacci Retracement item, right click on it and uncheck "Lock Position".
Besides Fibonacci Retracement drawing tool, you can also auto-draw the following items:
|
<urn:uuid:c2209271-6c67-4a24-84b7-d58a73745f8f>
| 0.130761 |
About 0 Search Result for tags:'tamfollow'
No match found for this condition, please try another.
HINT : We dont support less the 2-letter word, please try long keyword
Search.Stagram is a search engine for Instagram photos.
You can search Instagram photos using multiple words, keywords and tags.
Search.Stagram is a beta project created by Webstagram, the most popular Instagram web viewer.
LogIn to remove your photo or change settings.
|
<urn:uuid:4a05600b-db84-4a92-baf2-1f8ec6ab6d34>
| 0.206875 |
- September 16, 2006. MapBuilder, RealEstate MapBuilder have been up upgraded to v2 Google Map API. If you see any problems related to map building process feel free to send us feedback.
- September 16, 2006. Markers are draggable. Check them out!
Mapping made easy! MapBuilder lets you tag locations on a map and publish it on your own site.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.