url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://accretiondisc.com/blog/2007/09/07/525-floppy-disc/
code
A couple of months I posted this picture to my Flickr account: It’s a fine photo, and I did a great job of masking off the background so you only see the floppy drive unit. It’s also my most-frequently viewed picture there now. Why? Do people who only used 3.5″ floppies, and for the last four years only USB drives, really not know how lousy these things were?
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499831.97/warc/CC-MAIN-20230130232547-20230131022547-00032.warc.gz
CC-MAIN-2023-06
367
4
https://blog.adafruit.com/2016/07/08/source-code-for-apollo-11-guidance-computer-on-github-apollo-nasa/
code
The full source, “in assembly, for Command Module (Comanche055) and Lunar Module (Luminary099),” is now available here on GitHub! For example here’s a video from 2009 of the program running on a Palm Centro: And to think this software successfully landed people on the surface of the Moon! Have an amazing project to share? Join the SHOW-AND-TELL every Wednesday night at 7:30pm ET on Google+ Hangouts. Join us every Wednesday night at 8pm ET for Ask an Engineer! Learn resistor values with Mho’s Resistance or get the best electronics calculator for engineers “Circuit Playground” – Adafruit’s Apps! Maker Business — Transforming Today’s Bad Jobs into Tomorrow’s Good Jobs Wearables — Not a loophole Electronics — Rule of thumb: 10mils per amp. Biohacking — Soft Artificial Human Heart #3DThursday #3DPrinting No comments yet. Sorry, the comment form is closed at this time.
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424296.90/warc/CC-MAIN-20170723082652-20170723102652-00043.warc.gz
CC-MAIN-2017-30
903
12
https://econ.cms.arts.ubc.ca/profile/victor-couture/
code
My research is in urban economics and transportation. Current projects investigate the consequences of gentrification, the potential for e-commerce to reduce spatial inequality, the efficiency of urban transportation systems, and preferences for social interactions. I received my PhD from the University of Toronto in 2013, and worked as an assistant professor of real estate at UC Berkeley before joining UBC in 2020. Please click on paper titles for abstracts and full text downloads. JUE Insight: Measuring Movement and Social Contact with Smartphone Data: a Real-Time Application to Covid-19. (with Jonathan Dingel (Chicago), Allison Green (Princeton), Jessie Handbury (Wharton), and Kevin Williams (Yale) Journal of Urban Economics, Accepted, 2021 Repository of smartphone movement data for Covid19 research: PlaceIQ County-level Human Exposure Indexes Connecting the Countryside via E-commerce: Evidence from China. (with Ben Faber (UC Berkeley), Yizhen Gu (Jinan), and Lizhi Liu (Georgetown)) American Economic Review: Insights, Forthcoming, 2020 Urban Revival in America. (with Jessie Handbury (Wharton)) Journal of Urban Economics, Volume 119, September 2020 Speed. (with Gilles Duranton (Wharton) and Matt Turner (Brown)) Review of Economics and Statistics, Volume 100, October 2018. Knowledge Spillovers in Cities: An Auction Approach. Journal of Economic Theory, Volume 157, May 2015. Mobility and Congestion in Urban India. (with Prottoy Akbar (Pittsburgh), Gilles Duranton (Wharton), and Adam Storeygard (Tufts)) May 2021, Revise and Resubmit, American Economic Review. Income Growth and the Distributional Effects of Urban Spatial Sorting. (with Cecile Gaubert (UC Berkeley), Jessie Handbury (Wharton), and Erik Hurst (Chicago)) January 2020, Revise and Resubmit, Review of Economic Studies. Valuing the Consumption Benefits of Urban Density. September 2016, Reject and Resubmit, American Economic Journal: Econ Policy. WORK IN PROGRESS Quantifying Social Interactions Using Smartphone Data, with Jonathan Dingel (Chicago), Allison Green (Princeton), and Jessie Handbury (Wharton) The Gains from Online Integration: Theory and Evidence from China, with Ben Faber (UC Berkeley), Cecile Gaubert (UC Berkeley), and Yizhen Gu (Jinan) Accessibility in Urban India, with Prottoy Akbar (Pittsburgh), Gilles Duranton (Wharton), and Adam Storeygard (Tufts) Curriculum Vitae|Google Scholar Old Teaching Syllabuses EW/MBA280 – MBA Real Estate Investment and Market Analysis UGBA184 – Undergraduate Urban and Real Estate Economics
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358078.2/warc/CC-MAIN-20211127013935-20211127043935-00113.warc.gz
CC-MAIN-2021-49
2,538
18
https://www.coderanch.com/t/577314/open-source/LDAP-authentication-Jforum
code
Well i installed Jforum and tried to implement LDAP authentication.......making necessary changes in SystemGlobal.properties........ the paramenters are: ldap server ip: 126.96.36.199 port number: 389 ldap prefix= uid ldap suffix= ou=dept,dc=abc,dc=ernet,dc=in the file looks like this please suggest ... thanx in advance...,. [originally posted on jforum.net by sourav.bardhan] You are HERE! The other map is obviously wrong. Better confirm with this tiny ad:
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588246.79/warc/CC-MAIN-20211028003812-20211028033812-00254.warc.gz
CC-MAIN-2021-43
460
10
https://www.devze.ro/docs/user-management
code
Give us your email and we'll reach out! DevZero provides several different ways to manage users for your organization: In order to invite users directly via email: For easier onboarding, an organization can set up their account so that anybody with an email address from their company can login without needing to be invited. In order to set your company’s email domain, please reach out to your customer success manager or directly to email@example.com. If you want to see the current setting for your SSO email domain:
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334942.88/warc/CC-MAIN-20220926211042-20220927001042-00046.warc.gz
CC-MAIN-2022-40
522
4
https://www.petri.com/forums/forum/server-operating-systems/windows-server-2000-2003-2003-r2/20391-can-t-telnet-local-host-port-25
code
have server 2000 with exchange 2000; installing a mail filter "imss trend micro" as of now i can recive mail and send mail fine inhouse and out to the internet. Built my trend server,installed imss, changed router to push mail to imss. everything is ok except imss will not relay mail to my exchange server. trend said to telnet the exchange server from the console to ck communication. i get no response at all. portqry shows smtp 25 listening, netstat -a -n shows tcp 0.0.0.0:25 for local 0.0.0.0:0 for foreign listening. help i don't understand how mail works fine but i can't communicate. no virus scanners installed, No announcement yet. can't telnet local host port 25
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719754.86/warc/CC-MAIN-20161020183839-00020-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
674
3
http://ptpaperoeyq.firdaus.info/jekyll-01.html
code
Tidal data source: jekyll island marina, jekyll creek (8767832) while we take a lot of care to make these tide charts as accurate as possible, us harbors does not warrant the accuracy, completeness, or fitness for a particular purpose of any tide information offered through this service. Jekyll + hyde keenly understands this and has applicable experience throughout the entire vertical, approaching the multi-billion-dollar cannabis industry by . Find great deals on ebay for cannondale jekyll shop with confidence. Restaurants near jekyll island club resort, jekyll island on tripadvisor: find traveler reviews and candid photos of dining near jekyll island club resort in jekyll island, georgia. Discover the jekyll island club resort, a treasured historic hotel with modern amenities on georgia's golden isles. :globe_with_meridians: jekyll is a blog-aware, static site generator in ruby. Hyde jekyll, me takes over the 01 pm the main reason why i watched this drama was hyun bin hyun bin han ji min sung joon like this was a really great cast but . Jekyll island hotel reviews from real travelers read the westin jekyll island guest reviews skip main navigation marriottcom date published: 2018-09-01. Jekyll island arts association 4 georgia sea turtle center 14 jekyll island boat & dolphin tours 14 bracewell charters 15moss cottage the infirmary . Overall, factor v can be thought of as a dr jekyll and mr hyde dr jekyll, the good doctor, provides a useful support for individuals (hemostasis) and mr hyde, the . 01:36:29 god's gun (1976) - lee van cleef, jack palance and richard boone - feature (action, western) the strange case of dr jekyll & mr hyde autoplay on off. The monster in me - a brute lurks just beneath the skin of all gentle folk in a dynamic and darkly fascinating adaptation of dr jekyll and mr hyde at theatre three. Find jekyll island restaurants in the jekyll island / st simons island area and other cities such as brunswick, st simons island 09/01/2018 quick view beach . The is the full performance of the act 2 theatre company's november, 2001 production of jekyll & hyde the musical clarksburg, west virginia. Watch full episodes free online of the tv series hyde, jekyll, me - 하이드 지킬, 나 with subtitles subtitled in arabic, german, greek, english, spanish, french . Our lesson called dr jekyll & mr hyde chapter 1 summary is a handy way to learn more about this subject it's been designed to help you answer the questions on this quiz and also do the following:. Find jekyll + hyde at amazoncom movies (jan 01, 2005) please retry jekyll and hyde is a film that deserves acclaim because of its period flavor and its . Coming from the wilds of north queensland, jekyll is a fresh earthy twist on psychedelic progtrance with a love for deep and grindy bass, mystical melodies, tribal beats, and future grunge sounds, th. Jekyll and hide: repressing society's undesirables by valerie vollono rationale the new haven public schools english 1 curriculum includes a literary analysis unit that examines multiple stories treating the same theme. Jekyll & hyde tickets 01/31/2019 purchase jekyll & hyde tickets for amaturo theater at broward ctr for the perf arts jekyll & hyde tour schedule for amaturo theater at broward ctr for the perf arts in fort lauderdale. 0 jekyll island boat amp 3 jekyll harbor marina 32 westin jekyll island 3 jekyll island cl ub ocean s ites (opening soon) 34 days inn & suites clam creek fishing pier. I recently migrated my blog from wordpress to jekyll, a fantastic website generator that’s designed for building minimal, static blogs to be hosted on github pages. Wowsers, bewares and dr jekyll's hyde ken fisher contributor i opinions expressed by forbes contributors are their own 32-year forbes columnist, money manager and bestselling author. Jekyll is a static site generator that runs on the ruby programming language you may hav make a static website with jekyll 01_aboutmd now we’re creating . Linens – sheets, towels, pillow cases, etc — are not included as part of your jekyll island vacation rental, with the exception of villas by the sea units, emerald cottage and all of the units at the cottages at jekyll island. Find jekyll at amazoncom movies & tv, home of thousands of titles on dvd and blu-ray from the community amazon try (apr 01, 2009) please retry . The strange case of dr jekyll and mr hyde is a novella by the scottish author robert louis stevenson, first published in 1886 london lawyer utterson is driven to investigate edward hyde, the unlikely protégé of his friend dr henry jekyll, suspecting the relationship to be founded on blackmail. Jekyll island, jekyll island, ga 184k likes from miles of salt marsh to wide-open beaches, georgia's most unique barrier island is a beautiful blend of.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039744649.77/warc/CC-MAIN-20181118201101-20181118223101-00344.warc.gz
CC-MAIN-2018-47
4,806
7
https://chartdir.com/forum/download_thread.php?site=chartdir&bn=chartdir_support&thread=1661957435
code
A related question: If we want a bottom placement of the legend below the X axis title without it being potentially clipped due to not knowing ahead of time the number of keys and length of key texts, would this be the process: 1.) Place the legend near the bottom of the chart on using addLegend. 2.) Add the data series with the data name. 3.) Call layoutLegend 4.) Get legend height 5.) Reposition/Reset legend (?? not sure how to this, call addlegend again?) with height information Is there an easy way to do this or does the legend auto scale to avoid clipping? If there is sufficient non-overlapping content, the content will eventually overflow outside its container (which means the content is clipped to its container), unless the container can extend indefinitely in size. For your case, to avoid clipping, you can increase the height of your chart (using BaseChart.setSize) to as tall as necessary to contain the legend box. It is like laying out a web page. The web page will extend indefinitely to contain everything in the page. If you need to reposition the LegendBox, you can use Box.setPos. In C#/Java, it is like: // position the legend box so that bottom edge of the legend box is 5 pixels // from the bottom of the chart myLegendBox.setPos(5, myChart.getHeight() - myLegendBox.getHeight() - 5); In some case, it may be possible to adjust other items on the chart. For example, in the following sample code, the plot area size is adjusted to leave sufficient space for the legend box:
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.43/warc/CC-MAIN-20220928020513-20220928050513-00088.warc.gz
CC-MAIN-2022-40
1,504
14
https://forum.c-command.com/t/dropdmg-3-1-2/10334
code
The following was posted on the DropDMG blog: - Added support for Growl notifications via GNTP (requires Mac OS X 10.7 or later). - When renaming a configuration, layout, or license in the preferences, you can now press the Esc key to cancel. - Fixed a bug where DropDMG would log an error to the console when converting a ZIP archive to a disk image. For information about previous releases of DropDMG, please see the version history.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400189264.5/warc/CC-MAIN-20200918221856-20200919011856-00785.warc.gz
CC-MAIN-2020-40
435
5
https://recourz.io/faq/10-faq-start-up/36-is-there-a-cheat-sheet-or-somewhere-i-can-see-all-common-features
code
Enter will force a save of your work to the server. Hit the Esc key once or twice to undo what you have done in the form field you have in focus. Tab moves focus to the next form field. Shift+Tab moves focus backwards in the form fields. If you write "now" in a date field, todays date will automatically be added. Overall you can only delete records according to your account privileges and even then you will be presented with a warning before deletion. The accounts 'guest' and 'staff' cannot delete entire records only information in certain fields. You can change data directly in the form fields. Even in sub menues, search pages and so on. Press Enter or switch to a new field (in sub menues) or a new record (in main windows). Some fields are mandatory to fill in and some fields have a mandatory syntax for the content (ie time is registered 'hh:mm' like '10:30'). If you do not meet these criteria you will get an error message.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371803248.90/warc/CC-MAIN-20200407152449-20200407182949-00384.warc.gz
CC-MAIN-2020-16
938
10
https://searchfox.org/mozilla-central/source/toolkit/xre
code
|Find out how large the command line buffer should be. |This file represents the only external interface exposed from libxul. It is used by the various stub binaries (nsBrowserApp, xpcshell, plugin-container) to initialize XPCOM and start their main loop. |Check for a commandline flag. If the flag takes a parameter, the parameter is returned in aParam. Flags may be in the form -arg or --arg (or /arg on win32). @param aArgc The argc value. @param aArgv The original argv. @param aArg the parameter to check. Must be lowercase. @param aParam if non-null, the -arg <data> will be stored in this pointer. This is *not* allocated, but rather a pointer to the argv data. @param aFlags Flags @see CheckArgFlag |This is a temporary file in order to conduct an experiment on the impact of startup time on retention (see Bug 1640087). This was generally adapted from LauncherRegistryInfo.h |Event loop instrumentation. This code attempts to measure the latency of the UI-thread event loop by firing native events at it from a background thread, and measuring how long it takes for them to be serviced. The measurement interval (kMeasureInterval, below) is also used as the upper bound of acceptable response time. When an event takes longer than that interval to be serviced, a sample will be written to the log. Set MOZ_INSTRUMENT_EVENT_LOOP=1 in the environment to enable this instrumentation. Currently only the UI process is instrumented. Set MOZ_INSTRUMENT_EVENT_LOOP_OUTPUT in the environment to a file path to contain the log output, the default is to log to stdout. Set MOZ_INSTRUMENT_EVENT_LOOP_THRESHOLD in the environment to an integer number of milliseconds to change the threshold for reporting. The default is 20 milliseconds. Unresponsive periods shorter than this threshold will not be reported. Set MOZ_INSTRUMENT_EVENT_LOOP_INTERVAL in the environment to an integer number of milliseconds to change the maximum sampling frequency. This variable controls how often events will be sent to the main thread's event loop to sample responsiveness. The sampler will not send events twice within LOOP_INTERVAL milliseconds. The default is 10 milliseconds. All logged output lines start with MOZ_EVENT_TRACE. All timestamps output are milliseconds since the epoch (PRTime / 1000). On startup, a line of the form: MOZ_EVENT_TRACE start <timestamp> will be output. On shutdown, a line of the form: MOZ_EVENT_TRACE stop <timestamp> will be output. When an event servicing time exceeds the threshold, a line of the form: MOZ_EVENT_TRACE sample <timestamp> <duration> will be output, where <duration> is the number of milliseconds that it took for the event to be serviced. Duration may contain a fractional |We use std::wstring here because this code must be usable within both the launcher process and Gecko itself. |Passing an aPid parameter to LaunchChildMac will wait for the launched process to terminate. When the process terminates, aPid will be set to the pid of the terminated process to confirm that it executed successfully. |Returns true if the app is running from the read-only filesystem of a mounted .dmg. Returns false if not, or if we fail to determine whether it |Opens a dialog to ask the user whether the existing app in the Applications folder should be launched, or if the user wants to proceed with launching the app from the .dmg. Returns true if the dialog is successfully opened and the user chooses to launch the app from the Applications folder, otherwise returns false. |nameToken should be a string very briefly naming the lock you are creating creating, and it should be unique except for across multiple instances of the same application. The vendor name is included in the generated path, so it doesn't need to be present in your supplied name. Try to keep this name sort of short, ideally under about 64 characters, because creating the lock will fail if the final path string (the token + the path hash + the vendor name) is longer than the platform's maximum path and/or path component length. installPath should be the path to the directory containing the application, which will be used to form a path specific to that installation. Returns MULTI_INSTANCE_LOCK_HANDLE_ERROR upon failure, or a handle which can later be passed to the other functions declared here upon success. |Compares the provided compatibility versions. Returns 0 if they match, < 0 if the new version is considered an upgrade from the old version and > 0 if the new version is considered a downgrade from the old version. GDK implements X11 error traps to ignore X11 errors. Unfortunatelly We don't know which X11 events can be ignored so we have to utilize the Gdk error handler to avoid false alarms in Gtk3. This "pseudo" (in the XPCOM sense) interface provides for platform-specific general application support Due to the nature of the beast, this interface is not a full-blown XPCOM component. The primary reason is that objects that implement this interface generally must be operational *before* XPCOM (or any of the rest of Mozilla) are initialized. As a result, this interface is instantiated by somewhat unconventional means. To create the implementor of this interface, you call the function NS_CreateNativeAppSupport. This is done in the startup code The interface provides these functions: start - You call this to inform the native app support that the application is starting. In addition, it serves as a query as to whether the application should continue to If the returned boolean result is PR_FALSE, then the application should exit without further processing. In such cases, the returned nsresult indicates whether the reason to exit is due to an error or not. Win32 Note: In the case of starting a second instance of this executable, this function will return PR_FALSE and nsresult==NS_OK. This means that the command line arguments have been successfully passed to the instance of the application acting as a remote server. quit - Informs the native app support that the application is stopping. The app support should disable any functionality enabled by start. onLastWindowClosing - Called when the last window is closed. Used as a "soft" shutdown, passwords are flushed. |A scriptable interface used on Windows only to do some work from a special process that gets created with elevated privileges. @status UNSTABLE - This interface is not frozen and will probably change in |Only intended to be used from xpcshell tests. Allows setting the local and normal profile data directories. Calling this after something using them has started up will cause problems. |This code attaches the process to the appropriate console. |This file has *public* stuff needed for the Win32 implementation of the nsINativeAppSupport interface. It has to be broken out into a separate file in order to ensure that the generated .h file can be used in a Win32 .rc file. See /mozilla/xpfe/bootstrap/splash.rc. This file, and the generated .h, are only needed on Win32 platforms. |This module is supposed to abstract signal handling away from the other platforms that do not support it. |x87 FPU Control Word: 0 -> IM Invalid Operation 1 -> DM Denormalized Operand 2 -> ZM Zero Divide 3 -> OM Overflow 4 -> UM Underflow 5 -> PM Precision |Get the path to the installation directory. For Mac OS X this will be the @param appDir the application directory file object @param installDirPath the path to the installation directory |This function processes any available updates. As part of that process, it may exit the current process and relaunch it at a later time. Two directories are passed to this function: greDir (where the actual binary resides) and appDir (which contains application.ini for XULRunner apps). If this is not a XULRunner app then appDir is identical to greDir. The argc and argv passed to this function should be what is needed to relaunch the current process. The appVersion param passed to this function is the current application's version and is used to determine if an update's version is older than the current application version. If you want the update to be processed without restarting, set the restart parameter to false. This function does not modify appDir. |Convert UTF8 to UTF16 without using the normal XPCOM goop, which we can't link to updater.exe. |MingW currently does not implement a wide version of the startup routines. Workaround is to implement something like it ourselves. See bug 411826 |InstallX11ErrorHandler is not suitable for processes running with GTK3 as GDK3 will replace the handler. This is still used for the plugin process, which runs with GTK2. |make sure you clone it, if you need to do stuff to it |Spin up a thread to backup the old profile's main directory and delete the profile's local directory. Once complete have the profile service remove the old profile and if necessary make the new profile the default. |Copy a root profile to a backup folder before deleting it. Then delete the local profile dir.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817463.60/warc/CC-MAIN-20240419234422-20240420024422-00451.warc.gz
CC-MAIN-2024-18
8,979
157
http://forums.codeguru.com/showthread.php?536461-WP7-How-to-download-and-save-files-from-skydrive&p=2114431&mode=linear
code
I have to save files from folder on skdrive to my isolated storage (if files in isolated storage exist then override them). This is my code: How can I save files in method liveClient_DownloadCompleted? private void RestoreData(LiveConnectClient liveClient, string storedFolderId) liveClient.DownloadCompleted += liveClient_DownloadCompleted; liveClient.DownloadAsync(storedFolderId + "/content"); private void liveClient_DownloadCompleted(object sender, LiveDownloadCompletedEventArgs e) Stream stream = e.Result; // HOW TO SAVE FILES ON IN THIS METHOD?
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125841.92/warc/CC-MAIN-20170423031205-00033-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
553
9
https://nuotsu.com/showcase/pokecreate-form/
code
Form created, at first for personal use but later for a subreddit, that generates content based on inputted data. Includes a validator that checks if any required inputs are missing or are invalid. Logic and templating written in jQuery. Open source API used to display data of Pokémon. Parts of code were maintained with another GitHub collaborator.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655881984.34/warc/CC-MAIN-20200703091148-20200703121148-00391.warc.gz
CC-MAIN-2020-29
351
4
https://vukbatanovic.github.io/SentiComments.SR/
code
SentiComments.SR - A Sentiment Analysis Dataset of Comments in Serbian The SentiComments.SR dataset includes the following three corpora: - The main SentiComments.SR corpus, consisting of 3490 movie-related comments - The movie verification corpus, consisting of 464 movie-related comments - The book verification corpus, consisting of 173 book-related comments The main SentiComments.SR corpus was constructed out of the comments written by visitors on the kakavfilm.com movie review website in Serbian. Each comment was assigned a unique ID based on the movie to which it referred, and its placement in the comment tree for that particular movie, signifying its position within the whole discussion. Comments containing more than a predefined upper bound for token count (using basic whitespace tokenization), were discarded, as were the comments not written in Serbian. The movie verification corpus comments were sourced from two other Serbian movie review websites - gledajme.rs and happynovisad.com. The book verification corpus comments were also sourced from the happynovisad.com website. Six sentiment labels were used in dataset annotation: +1, -1, +M, -M, +NS, and -NS, with the addition of an ‘s’ label suffix denoting the presence of sarcasm. The annotation principles used to assign sentiment labels to items in SentiComments.SR are described in the papers listed in the References section. The main SentiComments.SR corpus was annotated by two annotators working together, and therefore contains a single, unified sentiment label for each comment. The verification corpora were used to evaluate the quality, efficiency, and cost-effectiveness of the annotation framework, which is why they contain separate sentiment labels for six annotators, divided into three groups - initial group (#1 and #2), experimental group (#3 and #4) and control group (#5 and #6). The main SentiComments.SR corpus is available as a tab-separated .txt file, in two variants: - SentiComments.SR - original - the original, unaltered comment texts - SentiComments.SR - corrected - the corrected, manually proofed comment texts Both variants have the following column structure, and they both share the same sentiment labels and comment IDs: - Column 1 - Sentiment label - Column 2 - Comment ID - Column 3 - Comment text The verification corpora are also available as tab-separated .txt files: The column structure of the verification corpora files is as follows: - Columns 1-6 - Sentiment labels assigned by annotators 1-6 - Column 7 - Comment text Comments in all files are written in either the Serbian Latin or the Serbian Cyrillic script. All files are encoded in UTF-8. If you wish to use the SentiComments.SR dataset (or the annotation principles applied in its construction) in your paper or project, please cite the following paper: - A versatile framework for resource-limited sentiment articulation, annotation, and analysis of short texts, Vuk Batanović, Miloš Cvetanović, Boško Nikolić, PLoS ONE, 15(11): e0242050 (2020). The reference for the full annotation guidelines (in Serbian) is the following: - A methodology for solving semantic tasks in the processing of short texts written in natural languages with limited resources, Vuk Batanović, PhD thesis, University of Belgrade - School of Electrical Engineering (2020). The annotation of the SentiComments.SR dataset was supported by the Regional Linguistic Data Initiative (ReLDI) via the Swiss National Science Foundation grant no. 160501. The SentiComments.SR dataset is available under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) license. The entire text of the license can be found here. If you wish to use this dataset for a commercial product, please contact me at: vuk.batanovic / at / ic.etf.bg.ac.rs
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587908.20/warc/CC-MAIN-20211026134839-20211026164839-00354.warc.gz
CC-MAIN-2021-43
3,826
28
https://forum.quasar-framework.org/topic/3995/ios-build-using-quasar/1
code
If you have a question or an issue, please start a thread in our Github Discussions Forum. This forum is closed for new threads/ topics. Is it possible to build IOS app from Windows using “quasar build -m cordova -T ios” command? only by running MacOS with virtualbox/vmware player. So not really…
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500619.96/warc/CC-MAIN-20230207134453-20230207164453-00490.warc.gz
CC-MAIN-2023-06
303
4
https://carboncounter.wordpress.com/2015/08/04/blog-comments-are-now-closed/
code
I have decided to (possibly permanently) close the comments on the blog. Right now I’m too busy to moderate them or put in the effort to improve the quality of discussions. This may change in future, but it’s not likely to for a few months. Thanks to those who have commented previously. If you think there is something wrong, right, needs to be improved with a future post, or want to bother me for any other reason, my email address is under “Contact” above.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864776.82/warc/CC-MAIN-20180622182027-20180622202027-00326.warc.gz
CC-MAIN-2018-26
468
3
https://community.algoriddim.com/algoriddim/topics/one-license-for-two-computers-mac-and-windows-bqsmu3muivy5n?topic-reply-list%5Bsettings%5D%5Bfilter_by%5D=all&topic-reply-list%5Bsettings%5D%5Breply_id%5D=19930001
code
I would like to buy one djay pro license and use the program it both on my Macbook and my Windows desktop PC (not at the same time, of course). Is that possible? Think of it the same way as purchasing an app for iOS and then trying to use it for android. Doesn't work that way. You'd have to purchase the same app for android. The app may be the same to the end user, but the programming and developing that goes into creating said app dictates that it is different from the iOS version or in your case the windows version. The controls are different, some of the functions are different and even the bugs are different. If it were a simple port, I could possibly see Algoriddim offering it for free cross platform once someone purchases one version of the software, but it truly is a different animal. And costs a significant amount of time and resources to create it so Algoriddim needs to recoup their investment.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506673.7/warc/CC-MAIN-20200402045741-20200402075741-00337.warc.gz
CC-MAIN-2020-16
916
2
https://mybroadband.co.za/forum/threads/quake-revitalized-edition.1150398/page-3
code
- Jul 18, 2006 Different strokes for different folks I guess By the way, I figured out how to run a dedicated server using the new revitalized edition. Will post details about the server tomorrow / later today As promised, with a bit of tinkering I managed to get a dedicated server up and running. At this stage, the only way you can connect to it is by means of the console, so once you're logged in and at the main menu, open op the console by pressing ~ (tilde) (next to 1 on your keyboard) and then enter: Once connected, close the console again by pressing ~ (tilde) and press escape and you'll be connected to the server. I have spawned 3 "normal" skilled bots, so that the server isn't completely empty. Each map has a time limit of 25 minutes with no frag limit set. Once a map is finished, the server will automatically commence to the next map in the map cycle. A good friend of mine and myself tested it out last and it worked quite nice. Please feel free to try it out, I'll see if there isn't a way that I can make it show in the matchbrowser in game. If I do, I'll update my post. Happy fragging !
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358570.48/warc/CC-MAIN-20211128164634-20211128194634-00388.warc.gz
CC-MAIN-2021-49
1,112
7
https://github.com/lzap/dancepill
code
Dancepill - extract them all Quick extract script for shell (currently only tested with BASH). You want to extract a tarball or ZIP and you don't care what format it is to pick up the right tool. More than that, you are not sure about the correct extension as the file might have been renamed incorrectly. And you want to extract fast. tar -xzjfmpb cant_remember_all_the_options.tar.ball.blah.gz Someone might use Midnight Commander but this is slow due to zillion of IO terminal operations. Dancepill script to the rescue! The script is currently not packaged for any Linux distribution, but it's a short BASH script: cd ~/bin git clone https://github.com/lzap/dancepill.git And in your .bashrc do: Logout or source it in your current terminal and start extracting: eeee tarball.tar.gz eeee tarball.tar.bzip2 eeee tarball.xz eeee tarball.zip eeee whatever There an function name called dancepill that does the extraction plus alias eeee for it. Dancepill also installs e alias, but only in case it was not yet used. If you still want to use this one, do this in your .bashrc: Extracts all supported archives using the fastest method possible. File type detection using fileutility - wrong extensions are simply ignored. If the archive does not contain only one file or directory, dancepill will create an extra directory for you. No more extracted junk in the current directory! If MIME is unknown, dancepill tries several "fallback" utilities one after another until one succeeds. This is PUBLIC DOMAIN, do what you need to do. Pull requests appreciated!
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171706.94/warc/CC-MAIN-20170219104611-00123-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
1,556
21
http://forums.bistudio.com/showthread.php?115141-Realtime-Editor
code
Hey i want to ask you guys ( Community) how can i make with my friends a mission also i mean the Realtime Editor (RTE) when i make rte in multiplayer then nothing happens. Can anyone give me a mission with Rte Multiplayer or can anyone say me how to make it. Would be best that you searched and asked your question in the actual RTE thread http://forums.bistudio.com/showthrea...&highlight=rte But just a suggestion for your question is make the mission in SP and then transfer the folder and files to mp should work the same as the reg editor. You dont have to make mp missions for mp you can make them in the sp editor and apply all the same stuff you just have to transfer the files thats all, for the RTE dont know if there are any special files or anything created, or if it has the same setup as the reg editor in terms of files. I'm actually trying to find out myself.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164992771/warc/CC-MAIN-20131204134952-00085-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
875
8
https://buildkite.com/changelog/194-new-environment-variables-for-group-steps
code
What’s new and updated in Buildkite New environment variables for group steps Posted March 27, 2023 by David Jobs that belong to group steps will now have access to information about their group with three new environment variables: You could use these variables to upload steps to the same group, or alter the behaviour of jobs based on their group. These environment variables will be absent for jobs that do not belong to group steps.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100745.32/warc/CC-MAIN-20231208112926-20231208142926-00445.warc.gz
CC-MAIN-2023-50
439
5
http://h30507.www3.hp.com/t5/Mission-Critical-Computing-Blog/How-many-of-your-racks-have-mis-wired-redundant-power-feeds/ba-p/88177
code
So, you've built your data center, put in redundant power feeds, and loaded it with systems and storage? What could possibly go wrong from a power and cooling perspective? I've spoken with customers and some of our internal HP engineers, and they've regularly seen a common problem that prevents redundant power set ups from providing system level protection - a big problem, especially for mission critical systems. One challenge that comes to mind is that you lose one of the redundant power feeds. No problem - that is why you have redundant power, right? But, how many of your racks in the data center are wired incorrectly so that they have 2 power feeds from the same power source. This often means that the rack beside it also has two power feeds, but both of them are from the other power source. Needless to say, that doesn't provide any power protection for the systems. HP's Intelligent Power Distribution Unit, among other things, identifies which servers are hooked up to which PDUs, and which PDUs are hooked up to which power source. It means that you can quickly and easily identify any wiring problems with the redundant power feeds in your data center. Having spoken with one of the developers working on Insight Control mower management software, he was surprised how often they found this problem at our customer's data centers. With the tons of cables in data centers, it isn't a huge surprise. If you want to know more about the HP Intelligent Power Distribution Unit, including why it won a SearchDataCenter.com Silver Product of the Year, I'd recommend heading over to theServer Insights blog post on it. And hopefully, if you use this product, you'll find that all your racks have correctly wired redundant power sources. Jacob Van Ewyk
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382917/warc/CC-MAIN-20130516092622-00082-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,761
5
https://worldpece.org/content/ao-readiness-factors-and-assessments-productivity
code
AO: The analysts note that the science of team science is currently in its nascent stage and that definitions are being debated. For example, interdisciplinary and transdisciplinary are used interchangeably. They note the plurality of definitions and operationalization of the concepts and argue that greater clarity is needed. AO: Analysts talk about a readiness framework that is nested and looks at the different levels. QUOTE: “which types of readiness factors (e.g., psycho- logical, interpersonal, organizational, societal, techno- logic, scientific) exert the greatest influence on the effectiveness of team science projects and initiatives” AO: The analysts believe that assessments of a network’s productivity are likely to be critical to understanding its value-added contributions (S246). Example being solving complex problems.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101282.74/warc/CC-MAIN-20231210060949-20231210090949-00197.warc.gz
CC-MAIN-2023-50
845
4
https://bugs.amahi.org/issues/293
code
WebChess "Your Links" link in upper right Clicking on the "Your Links" in the upper right of Webchess gives a 404 "File Not Found" error. Not a huge deal, but the installer could do something like this: cat << 'EOF' > $PWD/html/yourlinks.html <A HREF="http://www.amahi.org">Amahi - Home Server</A> which would create a single-link file (I hope, my HTML is really rusty). You could also add links to chess sites or wherever else. Also available in: Atom
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046151760.94/warc/CC-MAIN-20210725174608-20210725204608-00425.warc.gz
CC-MAIN-2021-31
452
6
https://www.fi.freelancer.com/job-search/cpanel-install-ssl-whm/
code
...opportunity for Small Remote Server Work. It could lead to kind of ongoing part-time job. We do have Windows VPS with GoDaddy, several sites hosted there, SQL database, couple SSL certificate and scheduled email services. I did some things by myself, but maybe not enough or missed something important (I'm not an expert in server administration, just developer) ...erased the DB part, because we dont want to build another DB) - Both solutions are reached with different domains and need SSL. I want to use LetsEncrypt. The server has Froxlor on it, which normally provides LetsEncrypt SSL certificates automatically. But because my applications are running in docker on different ports routed with vServer I think install OpenConnect VPN on my linux server user authentication from database make sure 1user can connect per user multi user not allowed after install done i need install doc for future install my self ...have the main heading to stay stable - currently bounces alot when you move from page to page. Also add the company name/logo. On (www.techzel-cloud) need to have the wildcard SSL certificate properly configured on the AWS Elastic load balancer. HTTP traffic ---> redirected to HTTPS. Both the websites are load balanced in private subnets. Also need a secured Looking for someone to migrate a single domain's email accounts from CentOS Web Panel (CWP) to cPanel/WHM Server. We have root access to both servers. ...want someone to build website . HostPapa provided me with cPanel and website builder. Website will be similar to this website in terms of design and pages: [kirjaudu nähdäksesi URL:n] 1. Once build, you need to migrate it to my NZ domain 2. I should be able to maintain the website using cPanel. Please tell what tech you wll use CMS, wordpress etc and I'm looking for someone that knows a bit about wordpress to create a 8-9 step-by-step instructional video that I would be able to give to my mother for her to easily install Wordpress and use it to set up a website for her parttime businness or blog. It should not be longer than 20-30 min long (perhaps in stages) and should include: - Introduction of need a Rocks Cluster expert to install nvidia drivers on all nodes - INLATURAREA VIRUSULUI EXISTENT - instalarea si configurarea unui certificat SSL - adaugare taguri ALT la toate imaginile - construirea si implementarea pachetului de 10 icoane Apple - scurtarea tagurilor title si metadescription - ameliorarea raportului text . cod ( de la 8% cat este acum la minim 16 %) - refacerea semanticii antetelor H1-H6 (in ...a Ecommerce website with the following - 1. it has to be a very high UIUX. 2. It has to be with an admin panel for future editing. 3. We need it to be 100% secure, with SSL of course. 4. We need to be able to connect it to our inventory application. 5. Because of regulation, we need it to be friendly to people with special needs. 6. We need a My html5 template should be installed on the Wordpress site and if I need support you will need to install driver software. Grameen Banglalink Airtel Robi to do any other Mobile operator in Bangladesh. The login page will be very nice and dynamic Like. Visit link below [kirjaudu nähdäksesi URL:n] ...performance and security Ability to code involved, web layouts and custom interface components from planning to implementation. Familiarity with hosting environments, DNS, SSL certificates Solid understanding of underlying web technologies Experience working with Apache web server including URL redirect/rewrite. Experience with E-Commerce platforms ...office 365 hybrid deployment. AD, SharePoint and all other servises must remain on site and only mails must be moved to the 365 exchange. The mails are currently hosted in a CPanel with an IMAP server. There are a few large mail boxes and one that is over 30GB, so we might need to look at arciving of data in exchange. I need to know how long and what Hello, We have ubuntu pc and would like to install guacamole server on apache server to run on port http :80 and port https: 443 using valid ssl cert ( we will provide the cert files) this project will need to be done while out tech is watching the steps through screen sharing program. this should take less than 2 hours to complete. If you can get I need to design a complete website up...client. It site must to have this characteristics: • Lenguaje PHP • Yii2 Framework • Plugins Wordpress • Base de datos Mysql • Jquery, Css, Bootsrap * Captcha * SSL CERTIFICATE * Google Analytics * credit simulator and quotes I will pay when the work is finished. BUDGET $750,oo Azure assistance apply SSL to a static website on a storage resource. I know I need a CDN created with an endpoint added however I'm unable to successfully get the site to resolve to the site with SSL applied. I have access to the domain DNS as well as the Azure account of course. [Removed by Freelancer.com Admin for offsiting - please see Section ...com/questions/53836532/php-how-to-check-if-openload-video-exist An very OLD - Python library, [kirjaudu nähdäksesi URL:n] - [kirjaudu nähdäksesi URL:n] This is the server data: cPanel Version 78.0 (build 23) Apache Version 2.4.39 PHP Version 7.0.33 MySQL Version 10.1.40-MariaDB Architecture x86_64 Operating System linux Path to Perl /usr/bin/perl I tried to install PhpMyAdmin on my Ubuntu 16.0.4 now MYSQL is no longer working. I do not use Cpanel only Linux command line. Please ensure you are profficient with it. Would like it fixed immediately please, thank you! Need to import a GoDaddy SSL certificated into a Windows 1026 Server, running as an EC2 instance in AWS. Followed all the instructions and failed. Desperately need someone with experience to invest a couple of hours to get this done. Hello everyone, I was trying to install an SSL certificate but ended up with an offline website after it changed to https. I would like to have someone to work with me for little tasks on this website. In our project we are using distributed java application restfull web...application restfull webservices with apache tomcat server. we already enabled 8080 port for using webservices like example ("http://serverip:8080"), we need enable 8080 port with SSL certificate like ex: https://serverip:8080 as wel as domain also like ex: [kirjaudu nähdäksesi URL:n] i'm bussiness partner of cloudflare, and need setup Railgun on the server. I have thousands of cpanel emails that i want to push into zendesk as tickets using api here [kirjaudu nähdäksesi URL:n] there is easy example on github [kirjaudu nähdäksesi URL:n] you have to create php spcript to get emails from user email folder and use the zendesk api to generate tickets need to install windows 7 licensed version on my mac pc using parallel desktop 10 if able to install accessing my desktop using anydesk would be helpful Hi everybody , We are looking for someone or team expert in magento and security (ssl certificat) to intall a magento server ,implement the solution and customize a template that we have purchased. Following one backend , we would like to manage different magento e-commerce. BR This project is to reqired to install WordPress theme and a few modifications. It's a property portal theme. If you are interested in this project you must mention the code: "Paplist2030" in your proposal so I can consider your offer. ...Party Server (Rundeck API on Fedora, Proof of concept is already done here, just need to make it secure and enhance as per new API definition) - Add support for SSL/HTTPS on Rundeck - Update Rundeck API as per new new API definition - Enhance existing shell scripts (6) as per new API definition - Support ...around 7 domains, where emails counting as spam Here is information about our email detection [kirjaudu nähdäksesi URL:n] We need to make all emails 10/10 We have WHM, and dedication server, with root access, and all our DNS is managing on Cloudflare. Please dont waste mine time, if you never done work like that before, or dont know what We are seeking someone to install Google Analytics and Facebook Pixel on our Windows, GoDaddy Hosted website. ...com/) [kirjaudu nähdäksesi URL:n] (line : 442 of [kirjaudu nähdäksesi URL:n]) I have tested a few plug in,( like really simple SSL); it does not work. We have forced in access file HTTPS as well, the yellow lock persists. We need a web developer, who is capable to make changes within the code of the Child ...doğruluğu kontrol edilecek, bazı gariplikler var örneğin tescil kuruluşundan yönlenen dns, siteyi kontrol edince farklı gözüküyor.. 4- siteler çalışır vaziyete getirilecek, ssl hatası vermeden çalışacak hata varsa giderilecek, içinde site olmayan domainlerin ise gerekli ayarları yapılacak site yüklemeye hazır hale gelecek 5- VPS te her ... Hi Yousuf K., I noticed your profile and would like to offer you my project. We can discuss any details over chat. Free wp theme install to cpanel edit theme color add logo build menu done I need a new server setup and secured - CloudLinux OS - Kernel Care -Immunify360 -Engintron (NGINX) -Cpanel -Possibly a secondary firewall such as CSF [kirjaudu nähdäksesi URL:n] < Need this as minimum requirements Then finally need my current server and sites migrated over to the new server. (12 sites) 11 and very small ...some not. We are fair. We work GMT +1 hour. Skills: High level of code, html, CSS etc. Wordpress Woocommerce Magento MySQL you deliver 100% Quality work You know plesk as cpanel We have uploaded 2 pictures. Picture 1: Client will have stopped comment spam on his WordPress. Tell us how you will solve that problem, how long time it will take, what will I am facing high CPU load problem in my CentOS server running on whm. a user named nobody which is the default user of Apache is taking up too much resources which Is slowing down my servers . I need someone to solve this high cpu usage problem. I require a freelancer to optimize wordpress website's speed and install anti-virus/other security features you recommend. CUrrently getting a pretty slow load for the site. Have currently installed cloudflare and enabled features such as auto-minify, Brotli compression, SSL etc however need other recommendations too. Budget $20
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257624.9/warc/CC-MAIN-20190524124534-20190524150534-00304.warc.gz
CC-MAIN-2019-22
10,257
36
https://timsong-cpp.github.io/lwg-issues/533
code
Section: 188.8.131.52.11 [util.smartptr.getdeleter], 99 [tr.util.smartptr.getdeleter] Status: CD1 Submitter: Paolo Carlini Opened: 2005-11-09 Last modified: 2016-01-28 10:19:27 UTC Priority: Not Prioritized View all other issues in [util.smartptr.getdeleter]. View all issues with CD1 status. I'm seeing something that looks like a typo. The Return of get_deleter says: If *this owns a deleter d... but get_deleter is a free function! Therefore, I think should be: *thisowns a deleter d...
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100484.76/warc/CC-MAIN-20231203030948-20231203060948-00382.warc.gz
CC-MAIN-2023-50
489
9
https://www.jb51.net/shouce/dhtml/events/onrowenter.html
code
Fires to indicate that the current row has changed in the data source and new data values are available on the object. |Inline HTML||<ELEMENT onrowenter = "handler" ... > |Event property||object.onrowenter = handler||JScript only| |object.onrowenter = GetRef("handler")||Visual Basic Scripting Edition (VBScript) 5.0 or later only| <SCRIPT FOR = object EVENT = onrowenter> ||Internet Explorer only| Change data values in the current row. | Signals that new data is available in the current row. | Event Object Properties Although event handlers in the DHTML Object Model do not receive parameters directly, a handler can query an event object for data. Sets or retrieves a value that indicates the state of the ALT key. | Sets or retrieves a value that indicates the state of the left ALT key.| Sets or retrieves the state of the left CTRL key. Sets or retrieves the name of the data member provided by a data source object. | Sets or retrieves from a data source object a reference to the default record set.| Sets or retrieves the return value from the event. | Retrieves the state of the left SHIFT key. Sets or retrieves the object that fired the event. | Sets or retrieves the event name from the event object. | The onrowenter event only fires on databound objects. This event applies only to objects that identify themselves as data providers. There is no public standard that applies to this event. Introduction to Data Binding, onrowexit
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400198942.13/warc/CC-MAIN-20200921050331-20200921080331-00531.warc.gz
CC-MAIN-2020-40
1,446
23
https://www.catalyzex.com/paper/arxiv:2004.10387
code
Distributed machine learning (ML) at network edge is a promising paradigm that can preserve both network bandwidth and privacy of data providers. However, heterogeneous and limited computation and communication resources on edge servers (or edges) pose great challenges on distributed ML and formulate a new paradigm of Edge Learning (i.e. edge-cloud collaborative machine learning). In this article, we propose a novel framework of 'learning to learn' for effective Edge Learning (EL) on heterogeneous edges with resource constraints. We first model the dynamic determination of collaboration strategy (i.e. the allocation of local iterations at edge servers and global aggregations on the Cloud during collaborative learning process) as an online optimization problem to achieve the tradeoff between the performance of EL and the resource consumption of edge servers. Then, we propose an Online Learning for EL (OL4EL) framework based on the budget-limited multi-armed bandit model. OL4EL supports both synchronous and asynchronous learning patterns, and can be used for both supervised and unsupervised learning tasks. To evaluate the performance of OL4EL, we conducted both real-world testbed experiments and extensive simulations based on docker containers, where both Support Vector Machine and K-means were considered as use cases. Experimental results demonstrate that OL4EL significantly outperforms state-of-the-art EL and other collaborative ML approaches in terms of the trade-off between learning performance and resource consumption.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039379601.74/warc/CC-MAIN-20210420060507-20210420090507-00094.warc.gz
CC-MAIN-2021-17
1,547
1
http://www.fausports.com/sports/c-xctrack/mtt/ronja_siekmann_826684.html
code
Danielle Aromashodu took fourth-place in the 400 meter hurdles. Six new personal records were placed at UF's outdoor track event Michael Vidal Sets New School Record in the 800 meter Siekmann, Coppin, and Vidal take First-Place Siekmann and Dixon's 2nd-Place Finishes Highlight Sun Belt Indoor Championships
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510270877.35/warc/CC-MAIN-20140728011750-00437-ip-10-146-231-18.ec2.internal.warc.gz
CC-MAIN-2014-23
307
5
https://www.sbc-support.com/en/faq/101687/
code
Can I initiate a reload of a S-Web project on a MB Panel (PCD7.D4xxx) without touching the MB Panel? In some cases it is necessary to re-load a Web Project project on a PCD7.D4xxx MB Panel (e.g. if the project stored on the PCD has been modified). This can of course be done by powering off and on the PCD7.D4xxx, or it can be realized by writing in to a specific container " uBT_Reboot " In some cases it is necessary to re-load a Web Project project on an MB Panel (e.g. if the project stored on the PCD has been modified). This can of course be done by powering off and on the PCD7.D4xx, but in this case someone need to be present to manually do so. Alternatively there is the possibility to initiate a reboot (which causes a reload of the proced) by writing the container "uBT_Reboot" to value "1". Attached to this FAQ you can find an example for PG5 2.0.210 which contains a small Fupla file together with a small S-Web Editor project. - In this project it is possible to restart the MB Panel directly (with a button to write the container uBT_Reboot to "1") - Alternatively it is possible to write a PPO (Timer) with a button to the value of 10 seconds. The binary state of this timer is copied in the Fupla file to a flag, and this Flag is copied to the container uBT_Reboot with the macro "Write source to destination (on repaint)" which is located on the same page. - If in the Fupla program the same timer (Web.Roboot_Timer) is written to a value of around 10 seconds, the reboot will take place witout someone touching the MB Panel (given the macro "Write source to destination (on repaint)" is executed on the panel). Firmware and hardware requirements It is possible to use the container uBT_Reboot since the hardware version C of the MB-Panel. In order to use the container uBT_Reboot for rebooting the MB Panel the following minimal firmware is required: |MB Panel version||Minimal firmware||Remarks| |PCD7.D4xxV (VGA)||1.18.28||first internal firmware version: 1.18.12| |PCD7.D4xx_ (QVGA)||not supported| Screenshot for example project 1.- Since FW version 1.22.xx due to the internet security the remote access to the panel is on OFF mode. 2.- The only panels where it is possible to re-activate such remote access are : PCD7.D412DTPx and PCD7.D4xxxT5F. All the others (a part from someOEMs) do not allow any access at all. 3.- The remote access can be reactivated by removing the parameter in the setup menu (MANUALLY) under System/Special/FTP Server/Remove default user as "not checked" and for sure the parameter on/off "active". 4.- On the pWeb-Panel like PCD7.D4xxxT5F or PCD7.D443WT5R, the uBT_Reboot in
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948512584.10/warc/CC-MAIN-20171211071340-20171211091340-00442.warc.gz
CC-MAIN-2017-51
2,628
18
http://pl.honeynet.org/tools/
code
Most of popular code debuggers introduce modifications into debugged code. For example userland debuggers on Windows system must have their threads and processes (they create new kernel structures also visible in userland), they also often modify structure of segments and heap of loaded modules and TEB structure of analyzed threads (not to mention software breakpoints). Even among most withdrawn frameworks some of operating code is loaded into the debugee (e.g. kdcom.dll - kernel debugger code on target machine connected via COM interface, as used with WinDbg remote debugging sessions). The consequences of this vary from debugger detection to so called heisenbugs. Also, presence of software analysis tools can be detected by their behavior, e.g. using specific API or syscalls or accessing decoy resources. The goal of Heisenberg project is to create a debugging framework for a whole operating system which will not be affected by these issues. Our base idea is to separate low-level debugging aspects such as physical memory or registers content from higher-level operating system abstraction (virtual memory, processes, etc.). Also, we are aiming at complete separation of debugee from debugger, i.e. debuggee to contain no additional components. The purpose of this approach is to eliminate any changes introduced by the debugger, which will prevent or hinder such events like debugger or virtualization detection, heisenbugs or probe effects from occurring. Finally, in accordance with the unix philosophy, we separate responsibilities of the tools being used. Also, we select open and free software over proprietary in order to conform Honeynet’s fundamental rule of openness. The architecture of Heisenberg framework we propose consists of whole system emulator Qemu which supports gdb_stub interface, attached Gdb debugger and a set of python scripts - Volatility - which will interpret low-level information (e.g. memory regions) into high-level OS objects (e.g. EPROCESS structures). We decided to choose system emulator over virtualization engines, because this solution reflects our separation principles. We choose Qemu for it’s support for wide range of architectures, processors and virtual hardware as well as good support for gdb_stub interface (to our knowledge: earliest and most developed implementation). We also consider Bochs machine as it’s being prized for it’s accuracy (even at the cost of emulation speed), but lack of support for wider range of architectures (especially mobile platforms) is a significant drawback. Also, Bochs internal debugger doesn’t follow the principle of separation of responsibilities (though it’s still useful in particular cases). Source code and documentation is available on Bitbucket: HSN is a system for detecting client-side attacks using multiple analyzers. The project was a joint venture between NASK/CERT Polska, National Cyber Security Center (formerly GOVCERT.NL), and SURFnet. The goal was to develop a client honeypot system, based on existing state-of-the-art client honeypot solutions and a novel crawler application specially tailored for the bulk processing of URLs. This system focuses primarily on attacks against, or involving the use of, web browsers. You can find much more information on the project’s official website: www.honeyspider.net Honeyspider Network Capture-HPC NG The original Capture-HPC was developed by Christian Seifert and Ramon Steenson of the New Zealand Chapter. It was adapted to the requirements of the HSN project, which resulted in about half of the code being rewritten. HSN Capture-HPC NG extends standard Capture-HPC functionality with features like listening for commands on TCP socket, support of VirtualBox and KVM via specially crafted scripts and extended logging. Full list of changes: - major changes to logging format (including flags to mark when urls stop processing) - ability to work with VirtualBox / KVM (new revert scripts - only GNU/Linux versions) - support to work with single-image virtual machines (one base-disk immutable image) - several stability fixes - removed several bugs (deadlocks, npes, etc.) - case sensitivity of URLs added - simplified configuration files - logging via log4j - broken zips handling (repairer added) - uploading URLs both via file and socket - exclusion lists reloading added (command send via socket) - uploaded URL may have unique ID (changed format of output.log file to support URL ID) - log/zip files created with a+r flags - log directories created with a+rx flags Source code of the project is available on GitHub. HSN Capture-HPC NG is shipped with “stock” exclusion lists. To use Capture, the lists need to be modified and tailored to individual needs of a user. Contributors (in alphabetical order): - Paweł Jacewicz - Jarosław Jantura - Piotr Kijewski - Paweł Krześniak - Piotr Lewandowski - Marcin Mielniczek
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644855.6/warc/CC-MAIN-20230529105815-20230529135815-00586.warc.gz
CC-MAIN-2023-23
4,904
33
https://www.spanishdict.com/answers/132474/i-need-help-with-spanish-homework
code
i need help with spanish homework how do you say doesn't in spanish My students often try to translate "doesn't" into Spanish. There is no equivalent for this phrase. It is "built into" the Spanish verb. My friend doesn't sing. Mi amigo no canta. Does your friend sing? ¿Canta tu amigo/a? Hope this helps. Spanish doesn't have an equivalent of "doesn't." Well maybe "no hacer" would kind of fit the bill. But anyway, if you want to say something like: Antanio doesn't work. You would say; Antonio no trabaja. Essentially for basic "does not" phrases just say (subject) + no + (conjugated present tense verb). Unlike in English you require a verb to speak of whether something "does" or "doesn't." For example, there would be no literal translation for "it doesn't" into Spanish. At least not used in terms of the concept you actually meant. No hace would mean "it does not" but not in the fashion we try to convey.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945317.85/warc/CC-MAIN-20230325064253-20230325094253-00700.warc.gz
CC-MAIN-2023-14
915
13
https://www.rubytapas.com/2015/01/12/episode-272-272-complex-rspec-matchers-with-noel-rappin/
code
If you enjoyed the previous episode about how RSpec matchers really work, you're in for a treat today. Guest chef Noel Rappin joins us once again, this time to talk about some very cool new features in RSpec 3. Specifically, he's here to show us how to build up compound matchers that can check multiple related expectations at once. As I mentioned in the last episode, Noel is a programmer at Table XI and the author of the fantastic book, "Rails 4 Test Prescriptions". You can find out more about this and other books by Noel at noelrappin.com. All right, let's dive in! Rails 4 Test Prescriptions: Build a Healthy Code Base by Noel Rappin ** The attached HTML script also includes the script of the preceding episode because they were originally a single episode. This page is just for members. Sign in or subscribe to gain access!
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00069.warc.gz
CC-MAIN-2022-33
834
6
http://mindforks.blogspot.com/2008/04/firebug-12-alpha-on-ff3.html
code
Someone kindly told me that I had a stale firebug! Go here for the latest. I recently managed to get an alpha firebug (1.2.0a7x) working well on FF3 by also installing the Web Developer add-on and restarting. I've confirmed that this workaround also helped a colleague (using a more recent 1.2.0a22x of firebug). The workaround doesn't appear necessary for 1.2.0a23x. In other words, this post is obsolete. Sorry for the interruption. Thanks for reading.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247503844.68/warc/CC-MAIN-20190221091728-20190221113728-00418.warc.gz
CC-MAIN-2019-09
454
3
https://www.opticality.com/blog/2011/07/16/installing-crashplan-on-a-pogoplug-pro/comment-page-2/
code
There are critical updates embedded in this post, added on 9/3/2011, all preceded with Update:. You can apply those instructions separately if you’ve already completed the rest of this installation. Updates will be marked with End Update to allow for multi-paragraph updates. I will strike-through the parts that were replaced, so that you can safely ignore them if you’re going through this guide for the first time. PogoPlug Pro is an amazing device (coupled with an amazing service). CrashPlan is an amazing piece of software (and also provides a fee-based amazing service). I’ve had both for a while and think very highly of them. To solve a number of my own problems (not caused by either service!), I decided to investigate marrying them (the PogoPlug device, with the CrashPlan software). To be slightly more accurate, I wanted the device to perform an additional function (beyond backups). I wanted it to be my primary DLNA server. Caution: none of what follows is supported by either company. You will be voiding your PogoPlug warranty and CrashPlan does not support this configuration of their Linux software. Proceed at your own risk! My primary reason for installing CrashPlan on this device is to compensate for the pathetic upload speed provided by Time Warner, all of 485Kbps, shared with my wife, for normal Internet use, VoIP calls and backups. In other words, not really a useful real-time backup solution. Since we are often at other, very high-speed locations, I still believe that paying for the CrashPlan online backup service is the way to go (and gives me great comfort), but when I’m home, I wanted a local solution (that didn’t involve plugging in a hard drive to my laptop). Since I was able to do this, successfully, the instructions can be found on the Net. Since it took me way longer to find the various pieces, let alone get them to work, than I felt it should have, I’m writing this (for myself, as well as for others who might give up more easily than I did). None of the credit goes to me, I’m just collecting the wisdom of others in one place, hopefully an easy one to find. Update: All sections marked Update: that apply to Java and udev were courtesy of Ankit Mohan. Ankit used this guide to get CrashPlan running on his PogoPlug, then dug in a lot more than I did to solve the problems I described. I am indebted to him. End Update. There are a number of Linux distributions available for the PogoPlug Pro (an ARM-based device). I chose Arch Linux because it was the most prominent one I found and because it has a very good reputation independent of the PogoPlug. The specific ARM implementation has it’s own site, which is where I started my odyssey. After reading the overview on that page, I clicked on the Installation tab. The instructions there are extremely clear. The first time I followed them, the formatting of my external drive failed. I ended up formatting the drive while it was connected to a laptop running Linux, but all of the other instructions on that page worked. I will repeat them here, so that anyone who doesn’t want to link off of this page can simply follow all the way through. You have to register your PogoPlug at my.pogoplug.com. This is required, even though we will shortly be disabling the service, since this is the only way to get SSH access to the device. You will be able to reverse the process, returning the device to a full PogoPlug in the future, should you desire that, but it’s not a dual-boot situation where you decide which version you want it to be. Once you’ve enabled SSH on the device, you can set your own password. The username will be root. The default password for a PogoPlug Pro is ceadmin (as noted, you can change it via the website, or once you log in, with the passwd command. Change it! One of the steps that they don’t cover is discovering the IP address of your PogoPlug, so that you can SSH to it. In a home environment, this is relatively easy (for the geeks among us). You login to your router, look at the list of attached devices and easily spot it. I’m installing the software on a second device as I type along. I’m in an office environment and don’t have access to the router. There are hundreds of devices in the office. I had to write down the MAC address of the PogoPlug, go over to a system administrator and ask him to search the DHCP log files for that MAC address. He did and I found out the address that was assigned to it. Whew. I successfully logged into the device, just to make sure it worked, while it was still an official PogoPlug. That step was optional, but comforting. Since the next step is to power down the device (which you can safely do by just pulling the power cord, especially if you have no hard drives attached yet), since I’m logged in as root, I typed /sbin/halt instead, to be a little safer. Wait 60 seconds (for added safety), then pull the power cord. We’re going to install Arch Linux on an external drive. The only thing that will be changed on the PogoPlug itself is the boot sector, which will now point to the external drive (that’s what would need to be reversed to restore the PogoPlug functionality). With the PogoPlug powered down, attach only the drive that you intend to install Arch Linux on. This way there will be no confusion or errors. Later on, if you want multiple drives attached (for backups and/or media files) it will be easy to add them. I am using a 2TB Fantom Drives to do my install. Once the drive is attached (and turned on), plug the power cord back into the PogoPlug and wait for it to boot. Then SSH back on to it (the root password will be what you set it to, or ceadmin if you didn’t change it). The box is still running the PogoPlug software, with your drive attached to it. Type: killall hbwd That will stop the PogoPlug software from running on the box. We don’t want it to interfere with the installation of Arch Linux. You might have to wait a bit for the service to stop. If you want to check, type the following: ps | grep hb The only result should your grep process. Then, you can type: The last line of output should start with /dev/sda1. That means your disk drive was found and has a partition on it (it’s likely formatted already). We are about to erase everything on the disk, so be absolutely sure that you want to continue with this adventure before doing that! If you’re ready, type: That will bring up the fdisk program on the entire drive (sda as opposed to sda1 which is the first partition). You will now have a prompt that is directly from the fdisk program. We will type a number of one character commands. Right after you type the character and press enter, fdisk will go off and do what you asked it to. That will clear the partition table so that the disk will become unusable (for the moment). As you can see from the messages, nothing has been committed in stone as yet (very soon). This has modified an in-memory copy of the partition table. Type: p (to verify the above, that there are now no partitions) Type: n (press Enter, this will create a new partition) Type: p (to make it a Primary partition. At this point, I’ll stop saying “Press Enter”, but you still have to!) Type: 1 (to make this partition #1) At the next two prompts (First and Last cylinders), just Press Enter to accept the defaults (you are making the entire disk available as the first and only partition). Now comes the destructive part. This will actually wipe out any data you had on the disk (but still doesn’t modify the PogoPlug in any way!). Type: w (this writes the partition table back out to the disk) You are now back at the command line. If you’re a paranoid type (or just careful), you can verify that things worked by repeating the fdisk command and listing out the partition table, all in one shot: This is the output on my system: Device Boot Start End Blocks Id System /dev/sda1 1 243201 1953512001 83 Linux 2TB, in one partition, marked for use by a Linux system. Now we need to actually create the filesystem, which in our case will be an ext3 one. This will require downloading some commands that will need to be executed. Here are the steps: Type: sync (to flush any filesystem changes) Type: cd /tmp (to change to a temporary, writable working directory) Type: wget http://archlinuxarm.org/os/pogoplug/mke2fs (to retrieve the program mke2fs) Type: chmod 755 mke2fs (to make it executable) Type: ./mke2fs -j /dev/sda1 (the leading dot is critical. This will format the partition to an ext3 filesystem) The above command can take quite a while, depending on the size of your external drive. This is the command that failed for me on my first PogoPlug, so I ended up having to detach the drive, connect it to a Linux laptop, perform the same exact command as above (which was already available, I didn’t need the wget part) and then reattach the drive to the PogoPlug. Note: it failed for me again. I was able to format it using the built-in /sbin/mkfs.ext2 command (passing in the “-j” flag), but I didn’t trust that it was building a true ext3 filesystem (ext2 + journal). So, I disconnected the drive from the PogoPlug, attached it to a VirtualBox VM on my Win7 laptop, and formatted it there as a real ext3. Took forever, but it worked. Whether the mke2fs command worked for you or whether you had to format the drive separately, like I had to on two separate installations, you’re now ready to install Arch Linux on the external drive. You should already (still) be in /tmp, but to make sure, feel free to type: cd /tmp Type: wget http://archlinuxarm.org/os/oxnas/oxnas-install.sh (that retrieves the install script) Type: chmod 755 oxnas-install.sh (this makes the script executable) Type: ./oxnas-install.sh (this starts the script, which will send lots of messages to your terminal window. It also downloads the root filesystem image, which is roughly 129MB, so it can take a while if you don’t have a fast network connection.) When it’s finally done (took between 5-10 minutes on a very high speed connection in the office), the output should look like this if it succeeded (at the very end): ## Looks good! # Sync … # Reboot to enter into Arch Linux ARM Note the looks good! and then the instructions to reboot. That’s what we’re going to do next. Type: /sbin/reboot (cross fingers!) This will immediately disconnect you from the terminal window you were in. You need to wait a few minutes for the orderly shutdown of the PogoPlug, followed by the booting up of Arch Linux ARM. You can watch the lights on your external drive to see when there is activity on it, indicating that the booting has begun. When the light settles down, the boot is complete. We’re ready to log back in (this time to the new operating system), and the password has been changed to a new default one. The user is still root, but now so is the password (root), which you should change right away with the passwd command. It’s quite possible that the IP address of the box has changed during the reboot, so please verify the new (or existing) one, before SSH’ing back on. If the IP address did not change, then you might have to remove the old key associated with it, or ssh might refuse to connect, thinking it’s a security violation. If you get the same IP address again, you may need to run the following command first (on your local machine, the one you are SSH’ing from): Type: ssh-keygen -R 192.168.1.123 # (using your device’s IP, which won’t likely be 192.168.1.123) The following First Steps page on the Arch Linux ARM Wiki explains the above, and gives you a number of other useful tips. I followed them religiously the first time through, but I changed the order a bit this time around and it saved a bit of typing (or I think it did). Instead of going through the above, this time I updated all of the packages right away. I believe that it installed openntpd and updated the /etc/rc.conf file (one of the first steps that I performed manually the last time). You can do what I did, then check if openntpd is installed and running. Type: pacman –Scc (clear out old packages. I said YES to the first, and NO to remove unused repositories) Type: pacman –Syu (this will do a large update, first syncing the repositories, then updating all packages) Now comes a crazy part. I say crazy because by the time you read this, perhaps the maintainers of Arch Linux ARM will have updated the repositories and this will no longer be necessary. Then people will think I’m an idiot, so be it, I’m putting it in here because it can’t hurt! Type: pacman –Sy udev-compat (to fix a problem with udev + syslog-ng taking up 100% of your CPU) The 100% cpu problem might be happening as you read this (if you’ve done the previous steps already). It might be filling up your disk in /var/log as well. We can check that in a minute (here’s the thread that helped me: there’s a typo in that thread, “sleep3” should be “sleep 3”), but first, let’s do a few more things and then reboot. Update: Type pacman -Sfy udev-oxnas udev-automount (this fixes the udev problem noted above, now struck-through. I added the f option to pacman to force the removal of the bad udev, or udev-compat that you installed if you’ve already completed these instructions. You will have to say Y to the prompt to remove udev, which defaults to N.) End Update. Let’s create a swapfile: Type: dd if=/dev/zero of=/swapfile.img bs=1M count=1024 #for a 512MB swapfile, use count=512 Type: mkswap /swapfile.img (to turn the file we just created into a valid swapfile) Type: swapon /swapfile.img (to see whether you get any errors, you shouldn’t) Now we’ll edit /etc/rc.local (use your favorite editor, I use “vi”, you might prefer “nano”) to add exactly four one line s after the comments: kill $(pidof udevd) The first line turns the swap on after each reboot. The next three lines kill the bad udev (even after updating the udev-compat the process sometimes misbehaves at boot), then sleeps for three seconds and restarts udev, which makes it seem to behave correctly so far. OK, time to reboot and see if we have a stable system: Type: sync (flushes the memory to disk) Type: reboot (you should lose your ssh connection right away) Wait until the disk activity settles down a bit, then ssh back in. Type: top (to see what processes are running. If udev and/or syslog-ng are at the top, something isn’t good) Type: q (to exit top, whenever you’re done looking around) You can follow any of the additional instructions for setting up a user, adding sudo, changing TimeZone settings, etc. All are linked from the First Steps above. Since the reason I did this was to install DLNA, I’ll cover that first (it’s really short), then we’ll move on to the heavier CrashPlan setup. Skip the next few lines if you have no interest in DLNA. Type: pacman -Sy minidlna jack (this names two packages, but will install something closer to 44, with dependencies) You should edit the file /etc/minidlna.conf and change any variables (where the files are stored, where to store the DB, what you want to call your DLNA server, etc.). You can read the Wiki page (linked above) to see the more important entries. Then add the word minidlna at the end of the DAEMONS= line, which should be at the bottom of the /etc/rc.conf file. This will auto-start the DLNA server every time the PogoPlug is booted. To start it right now, type: /etc/rc.d/minidlna start Update: I discovered two things. 1) Many devices, e.g. Google TV and Sony Bravia TV, don’t show any of the files with a filetype of FLV. It turns out that if you simply rename the filetype to AVI (probably others), the files play fine (assuming they were encoded with H.264). 2) After you populate your media directory, run the following command and wait patiently: minidlna -R to force a build of the database. You probably want to kill all minidlna processes when this is done and start it again (minidlna alone on the command line is good enough). You can tail the minidlna.log file (in your database directory) to know when the database rebuild is done. End Update. Whew. Finally ready for the very tricky and long installation of CrashPlan. This is not for the faint of heart, nor is it in any way supported by CrashPlan. It works for me (and obviously others), but you’ll have to be the judge as to whether the hassle is worth it for you. Let’s start with crediting the place that got me unstuck, the CrashPlan support forums! Kudos to CrashPlan for allowing this type of discussion on their forums, even though they don’t support this configuration. Here’s the thread, but all of the interesting bits are in the long comment by Torbjorn. It was really hard for me to find, because I was searching for the word PogoPlug. This solved the problem for Sheeva (the baseline of the Pogo), but it’s not quite identical. Type: pacman –Sy openjdk6 cpio (we need to get a working Java installed and CrashPlan will require the cpio package separately) The next step (according to Torbjorn) is to download an ancient (2005) libjtux source package, apply a patch and compile it. He supplies a pointer to the source (amazingly, still available) and the patch file is available as an attachment to his comment. You can grab both from the the thread linked above. If you do, you will likely have to download a bunch of development packages (using pacman), starting with gcc. Instead, I will attach the completed libjtux.so that I built (following those instructions), to save you time, effort and potential errors. I also just grabbed it from my first build and applied it to my second, for the same reasons. Now we need to install CrashPlan itself by heading to the download page for Linux. I right-clicked on the download button (currently version 3.0.3, but the software auto-updates after the first install). I copied the link location. Back on the PogoPlug: Type: wget http://download.crashplan.com/installs/linux/install/CrashPlan/CrashPlan_3.0.3_Linux.tgz (that should work, but starting at the http part, just paste in the link you copied if it’s newer than 3.0.3) Type: cd /tmp Type: tar –xzf WHEREVER_YOU_DOWNLOADED_THE_CRASHPLAN_FILE (which could be /tmp to simplify matters) Type: cd CrashPlan-install Type: ./install.sh (all of the defaults seem reasonable to me, though I did put my archives in another directory. You will need to page through the license file with the space bar and accept that as well. The init scripts on Arch are in /etc/rc.d, which is the other thing I changed from the default.) When this is done, it will report that it has successfully started the CrashPlan service. It did not. That’s because we haven’t yet replaced the libjtux.so that comes with CrashPlan. The problem is that it was compiled with an Intel i386 architecture. Type: cd /usr/local/crashplan Type: mv libjtux.so libjtux.so-ORIGINAL (no real need to save it, other than to memorialize the changes we’re making) Type: cp WHERE_YOU_DOWNLOADED/libjtux.so . (this copies my version from wherever you downloaded it, or you can right click my link above, and wget directly from my website to this directory) Torjborn mentions editing a file to add jna.jar to it. I didn’t need to do that, and the directory he references doesn’t exist. I think it’s from a different installation of Java (for the original Sheeva) and not necessary when using the openjdk6 package. Update: This next part solves the timing delays, apparently among a number of other issues that I wasn’t even aware of! Once again, thanks to Ankit for figuring this all out. You will need the nss package installed. Mine was there after the major update above. If you don’t have it installed, type: pacman -Sy nss The file that’s missing from openjdk, which is causing all of the problems with CrashPlan, is libjnidispatch.so. It’s part of the jna package (Java Native Access). You’ll have to download a Debian package and extract the file. Select a location near you from this link: http://packages.debian.org/sid/armel/libjna-java/download. In the US, I chose this link directly: http://ftp.us.debian.org/debian/pool/main/libj/libjna-java/libjna-java_3.2.7-4_armel.deb Assuming you downloaded that file to /tmp, here are the commands to extract the file we’re interested in: Type: cd /tmp Type: ar vx libjna-java_3.2.7-4_armel.deb (this will extract three files, one of which contains the file we’re interested in) Type: tar -xzf data.tar.gz (this will unpack the tar file, creating a series of directories in /tmp/usr) First we need to create the target directory for this. Since mkdirs (make nested directories) doesn’t exist by default, we’ll execute a number of consecutive mkdir commands. Hint: you can hit up-arrow after each command and just append the next directory name in the series of mkdir commands. Type: cd /usr/local/crashplan/lib Type: mkdir com Type: mkdir com/sun Type: mkdir com/sun/jna Type: mkdir com/sun/jna/linux-arm Type: cp /tmp/usr/lib/jni/libjnidispatch.so com/sun/jna/linux-arm/ (now we have the file in the correct directory) Type: cp -p jna-3.2.5.jar jna-3.2.5.jar-ORIGINAL (this isn’t strictly necessary. Aside from documenting our change, it allows us to recover from errors more easily) Type: jar uf jna-3.2.5.jar com/sun/jna/linux-arm/libjnidispatch.so (this is the critical step, inserting the library into the jar file that CrashPlan uses. I’m not sure the com/sun/jna/linux-arm directory creation is necessary, but better safe than sorry) It seems that in addition to solving the timing issues (long delays in starting up), this actually dispatches (duh) maintenance tasks like pruning, synchronizing, etc. It’s all good, but there is a side-effect (well worth it!) that the Java process now takes up a significant amount of CPU, even when backups aren’t active, since it appears to actively maintain the system. Previously, Java would consume 0% of the cpu when it wasn’t backing up. We’re ready to start CrashPlan (at least to see if it comes up and stays up). We can do it by hand, but I am going to add it to the DAEMONS list at the end of /etc/rc.conf (like we did with minidlna) and reboot the machine to ensure that it comes up on it’s own. The daemon name to add right after minidlna is crashplan (lower case). If you did everything above correctly, when you log back in, there should be a java process running, with CrashPlan as the application. It can a few minutes to completely initialize. In that case, we’re done, right? Wrong! CrashPlan is indeed sitting there, waiting to go to work, but it needs to be configured to allow your machine(s) to start backing up to it. Under normal circumstances, this would be trivial to do, but since the PogoPlug is a headless server, we have to jump through a few final hoops. Once again, CrashPlan support to the rescue (again, for a completely unsupported feature). If you want to understand the details, or are enough of a techy to prefer the theory, I urge you to just read the CrashPlan document and skip to the final section of this post. If you want fewer steps (and warnings) to follow, I’ll give you the bare necessary steps here. They key is that on every machine that has CrashPlan installed, there are two programs: 1) the server that does all the work and 2) the GUI (graphical user interface) that connects to the server when launched, and allows you to configure and monitor the server process. On the PogoPlug, we only have #1. The good news is that the GUI speaks to the server over the network. By default, that network is local to the machine that the server is running on, but with some ssh magic (and a little editing of a configuration file), we can make that a remote connection. All of the work is going to be done on your desktop or laptop, where you already (presumably) have CrashPlan running. This is likely the machine that you want to backup to the PogoPlug. Let’s just call it laptop so that it’s obvious it isn’t the PogoPlug. On laptop, make sure that the CrashPlan GUI isn’t running. If it is, exit the application. Find the conf directory associated with CrashPlan on your system. On my Windows 7 x64 machine, it’s this directory: “c:\Program Files\CrashPlan\conf”. In that directory is a file called ui.properties. Edit that file. The following line is in that file: “#serviecPort=4243”. This line is commented (#), because 4243 is the default value. You can leave that line commented and add a line below it: (You could also remove the comment and replace 4243 with 4200, but I recommend adding a new line.) Save the file to disk. While still on laptop, open a terminal window and execute the following SSH command (if you’re using Putty to do this on Windows, rather than cygwin, I recommend reading the post back on the CrashPlan site). ssh -L 4200:localhost:4243 firstname.lastname@example.org In the above command, substitute your username (or root) where I put in “user” and the IP address of your PogoPlug where I put in the “192.168.5.71”. This command makes port 4200 on laptop magically redirect to port 4243 on the PogoPlug, which is where the CrashPlan server is listening by default already. Now launch the CrashPlan GUI on laptop by double-clicking the icon (on Windows, it’s probably in your system tray). You should see a request to create a new CrashPlan account (free) or log in to an existing one. Since I already have one (and presumably you do too), just put in your email address and password. It took quite a while for it to log in and download the configuration, but it worked. I think when I first tried it on my first PogoPlug it actually timed out, but worked the second time. Once that’s done, you can exit the GUI, as all of the defaults are exactly what we want/need. The only exception to that is if you want to let others (that aren’t part of your account) backup to your PogoPlug. Then you will need to write down the CODE to enable that (it’s toward the bottom of the front page on the GUI and also on a Settings tab). You can now exit from the ssh session that was started above (Type: exit or hit Ctrl-d in that terminal window). Once the GUI is shut down, edit the ui.properties file again and delete the extra line we added with “servicePort=4200” (or place the comment “#” back in front of it). Save the file. Launch the GUI again. This time it will connect to the local CrashPlan server on laptop. Now click on Destinations (bottom left entry on the left-hand navigation). Then click on the icon labeled Computers in the center (the PogoPlug is a real computer!). Whatever you called your device should be in your list, no code necessary, since you should have used the same account on both machines. If you didn’t name your device, then Arch Linux ARM defaults your host name to alarm (get it? ArchLinuxARM?). Now you’re truly done. If you have a large amount to backup, it could take a couple of days to complete the first backup, even though it’s on a LAN. It will also alternate between the various backup locations (including CrashPlan Central), which is one of the reasons it will be somewhat slowed down. For reasons I can’t explain, it can take a very long time to start the initial backup, even if you pause the other locations. The GUI correctly communicates with the server instantly, since I can see the correct directory created on the PogoPlug, but the destination still shows up as unavailable for some period of time. Eventually, it gets going, and appears to be quite reliable from that point on. Update: I struck out the previous paragraph since I’m hopeful that with the addition of libjnidispatch.so to the jna jar file, you won’t experience the long startup delay. cp -p jna-3.2.5.jar jna-3.2.5.jar-ORIGINAL
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100276.12/warc/CC-MAIN-20231201053039-20231201083039-00695.warc.gz
CC-MAIN-2023-50
27,885
138
https://cdn.codeproject.com/Forums/1647/C-Cplusplus-MFC?df=90&mpp=25&sort=Position&view=Normal&spc=Relaxed&prof=True&select=3242742&fr=61051
code
How many more times do you need to have this explained to you before you realise that you are totally out of your depth on this? You have had lots of suggestions as to what you need to do but you obviously don't have the basic knowledge to implement them. I would suggest that you get hold of some books on basic C++ and Windows Programming and work through the sample code to get the understanding and skills you need to solve this problem. Reposting the same question every day is just getting you more confused. A service runs in the background, so where are these WM_COMMAND's coming from? You won;t have a menu, or a dialog box... I think you need to go back to your basics - a service communicates with other programs using various interprocess communcations. I have now moved to Sweden for love (awwww). If you're in Scandinavia and want an MVP on the payroll (or happy with a remote worker), or need contract work done, give me a job! http://cv.imcsoft.co.uk/[^]
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511424.48/warc/CC-MAIN-20231004220037-20231005010037-00201.warc.gz
CC-MAIN-2023-40
970
6
https://music.apple.com/us/radio?at=11lvCI&ct=LFV_3dcfbdd064ccd38ccb507ff27ffb62e8&itscg=30440&itsct=catchall_p3&ls=1&uo=4
code
LIVE · 2 – 3PM From Apple Music With Love Radio: Blake Shelton & Gwen Stefani The duo celebrate the holidays and share Christmas traditions. Groove Velocity Radio with Bluey Incognito's Bluey plays Prince, Jorja Smith and Dwele. Country Replay Radio with Luke Laird Hits you didn't know were written by David Lee Murphy. Stories that inform, inspire, and entertain.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358233.7/warc/CC-MAIN-20211127193525-20211127223525-00150.warc.gz
CC-MAIN-2021-49
368
8
https://www.mail-archive.com/vcs-pkg@lists.madduck.net/msg00015.html
code
Sam Vilain wrote: >> Also, the Debian changelog is already nicely away from the upstream >> one, isn't it? That said, I still believe we need to get rid of >> having the Debian changelog stored as a file in VCS... > The principle advantage of this approach is that the debian changelog > could then be safely gathered from the supermodule commit log, which > should be purely packaging changes and no application changes. So the > debian/changelog can then be safely generated from `git-log' et al. Ok, for those interested, I have put up a supermodule of the git package itself, applied the debian patches to the source tree within, updated to the latest git release candidate and adapted the debian rules to build within the "upstream" directory. It's a proof of concept - it doesn't do any of the git supermodule changelog -> debian changelog, nor is it particularly sophisticated about the upstream changelog. To try it out: git clone git://git.catalyst.net.nz/git.debian dpkg-buildpackage -rfakeroot -uc -b If you had another supermodule, that had submodules for each package, then you'd have something resembling Ports ... except, distributed and tied into the source control of upstream too. vcs-pkg mailing list
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591150.71/warc/CC-MAIN-20180719164439-20180719184439-00050.warc.gz
CC-MAIN-2018-30
1,219
21
http://www.viewtube.me/geoengineering-watch-global-alert-news-february-9-2019-183-dane-wigington_d5d21161a.html
code
TO READ OR POST COMMENTS ON THIS VIDEO, PLEASE GO DIRECTLY TO THE ARTICLE https://www.geoengineeringwatch.org/geoengineering-watch-global-alert-news-february-9-2019-183/ Our hope and goal is for this video to be shared far and wide, DO NOT re-upload this copyrighted video without prior written permission and conditions from GeoengineeringWatch.org If you like this video, please SUBSCRIBE to our channel: https://www.youtube.com/c/DaneWigington Click the bell to ensure you are notified of our new videos. Climate engineering operations continue to intensify around the world, as are unprecedented weather related catastrophes. The environment is not the only thing that is collapsing, the days of the US dollar dominated world are now numbered. What are the ramifications? How desperate will the world's largest military become? Why are swarms of military helicopters overrunning LA? A new “science study” concludes that planes passing through clouds miraculously produce up to 10 times more rain or snow, while simultaneously and radically lowering precipitation temperatures. The same study also tries to assure us that such profound effects have absolutely nothing to do with any emissions from the aircraft itself. Are we really expected to believe this? How long will academicians continue to cover the tracks of the climate engineers? Though the sand in the hourglass continues to run down, ever more catastrophic environmental conditions are finally forcing more to wake up and face reality. Those who are already awake are desperately needed to stoke the fires of awareness. Every day counts, share credible data from a credible source, make your voice heard. To support GeoengineeringWatch.org: http://www.geoengineeringwatch.org/support/ To receive Geoengineering Watch updates, please sign up for our mailing list: https://www.geoengineeringwatch.org/newsletter/ The Catastrophic Consequences Of Climate Engineering: https://www.youtube.com/watch?v=kyxmrwbTKoM The latest and most effective GeoengineeringWatch.org awareness raising materials can be found at the links below: 2 sided color glossy informational flyers: http://www.geoengineeringwatch.org/ads/ 20 page fact and photo summary booklets: http://www.geoengineeringwatch.org/climate-engineering-fact-and-photo-summary/ To follow us on Facebook, click here: https://www.facebook.com/dane.wigington.geoengineeringwatch.org To follow the latest GeoengineeringWatch.org videos please subscribe to our four youtube channels below: Dane Wigington https://www.youtube.com/c/DaneWigington Geoengineering Watch https://www.youtube.com/c/GeoengineeringWatch Geo Watch https://www.youtube.com/c/GeoWatch To view the locations and photo credits of the images shown, click here: https://www.facebook.com/geoengineering.watch.photo.gallery/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578532948.2/warc/CC-MAIN-20190421235818-20190422021818-00189.warc.gz
CC-MAIN-2019-18
2,804
17
https://math.hecker.org/2011/07/26/linear-algebra-and-its-applications-review-exercise-1-14/
code
Review exercise 1.14. For each of the following find a 3 by 3 matrix such that for any matrix (c) The first row of is the last row of and the last row of is the first row of . (d) The first column of is the last column of and the last column of is the first column of . Answer: (a) We have so that we can choose (b) For all we have so that we can choose (c) We can choose to be the permutation matrix that reverses the order of rows in (d) The first column of is produced by multiplying the first row of by the first column of . Since this computation does not involve the last column of in general it is impossible to find a matrix such that the first column of is equal to the last column of . However note that we can reverse the order of columns in by multiplying on the right by the value of from (c) above: NOTE: This continues a series of posts containing worked out exercises from the (out of print) book Linear Algebra and Its Applications, Third Edition by Gilbert Strang. If you find these posts useful I encourage you to also check out the more current Linear Algebra and Its Applications, Fourth Edition, Dr Strang’s introductory textbook Introduction to Linear Algebra, Fourth Edition and the accompanying free online course, and Dr Strang’s other books.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649741.26/warc/CC-MAIN-20230604093242-20230604123242-00651.warc.gz
CC-MAIN-2023-23
1,272
10
https://community.mcafee.com/t5/Web-Gateway/Help-me/td-p/462705
code
rather than uploading them again into this space in addition to the other public places, please search the KC - links to the guides can be found here: https://www.google.com/search?q=mcafee+web+gateway+7.4.1+product+guide For donwloads, are you able to access : https://contentsecurity.mcafee.com/? If not please send a mail to email@example.com in order to get your account set up. the mose recent documentation can be found at https://contentsecurity.mcafee.com, which is a different server. You should try that location as Michael mentioned. Posting the guides again does not seem very useful as no one will take care for updating the documentation. Thats why it is usually managed at a central location.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267861981.50/warc/CC-MAIN-20180619080121-20180619100121-00343.warc.gz
CC-MAIN-2018-26
707
4
https://jaced.com/2005/10/20/the-monty-hall-war/
code
UPDATE FOR JUNE 27, 2011: This one won’t go away. Just in this week, check out Let’s Make a Probablistic Deal, which includes a podcast. Below is a post from 2005 that discusses this very subject. Note that the Monty Hall app we created has since been taken offline, as it was done in ColdFusion and I didn’t bother to keep up with the program’s server requirements. – – – – – Maybe you’ve heard of it. It’s been called the Monty Hall Scenario, the Monty Hall Problem, the Monty Hall Riddle, and the Monty Hall Puzzle. Persistent arguments over the years have transformed this initially harmless and entertaining logic exercise into a phenomenon known the world over as the Monty Hall Dilemma, the Monty Hall Dispute, the Monty Hall Debate, and the Monty Hall Controversy. Or my personal favorite, the Monty Hall War. For those not familiar with it yet, it goes like this: A TV host shows you three numbered doors. Behind one door is a brand new car. Behind the other two doors are goats. You get to pick a door, winning whatever is behind it. Regardless of the door you choose, the host, who knows where the car is, then opens one of the other two doors to reveal a goat, and invites you to switch your door for the remaining closed door if you so wish. Does switching increase your chances of winning the car? For our international friends and those not thoroughly familiar with American pop-culture, this riddle is modeled after a classic game show from the ’60s and ’70s called “Let’s Make A Deal” with host Monty Hall. OK, now on to the good stuff. The correct answer to the question is yes. Trading your original door for the remaining closed door effectively doubles your odds of winning the car. Your original door has 1-2 odds (a 1 in 3 chance, or 33% probability), while the remaining door offers 2-1 odds (a 2 in 3 chance, or 67% probability). Many people initially believe the odds to be even, with both your original door and the remaining door each offering a 50% chance of winning the car, but this is inaccurate. When the correct answer is given to them, most people are astounded, and quite amused at the twist. But the truly stimulating conversations come not from the converts, but the skeptics, who simply refuse to believe the truth. I came across this gem on The Science Channel during a show called “Understanding Odds”. I found it interesting, and worth passing along to friends who enjoy logic problems. However, what I found even more interesting was the emotional and heated debates I ran into when sharing this riddle with others. It’s fascinating how the human mind can be so locked into its own little box as to miss something that should be obvious to anybody with reasonable thinking skills. From a psychological point of view, I found it amazing how a member of the human race can become so emotional and defensive when it comes to proving something it truly believes in. This “thinking with the heart and not the brain” is a common first step towards ignorance that we see everywhere in society today. While researching the history of this puzzle on the WWW, I learned that this debate has been going on for a while now between very respectable and competent thinking people. Mathematicians, physicists, doctors, and computer programmers alike have cursed, yelled, and even reverted to personal attacks when trying to prove that the odds are even between the two final doors. In their mind, switching doors changes nothing. In their mind, each door has a 50% chance of having the car. But sadly, they’re wrong. Even worse, their argument digs their ego into a hole it can’t get out of, getting deeper by the minute until the proverbial crow is swallowed, and that’s where things start getting emotional. They turn into the intellectual equivalent of a my dog immediately before her bath; she thinks I’ve trapped her and tries to resist, when in reality I’m only trying to help. Self-professed statisticians have a particularly hard time accepting the truth of this Monty Hall Scenario, which is surprising, since one would assume they of all people would understand it. Their background in the science of statistics causes them to assume they’ve got the answer, based on what they’ve learned in statistics. It’s as if they’re prisoners to their own theoretical training, making a pride-driven error in equating the ability to calculate with the ability to reason. While the two are certainly related on several levels, they’re actually two very different things. Without a logical foundation, calculation is an aimless exercise. In other words, an answer is pointless if the question isn’t fully understood. Fortunately there are plenty of resources on the WWW which offer perfectly adequate explanations to this problem, alleviating me of any rehashing chores. Here is a link to one of the more eloquent and well-rounded papers on the subject, with a few explanations including some geeky conditional probability mathematical equations using Bayes’ Theorem: For more resources than you probably have time for, go Google it. For laughs, we’ve also programmed a simulation in ColdFusion, which conveniently makes the semi-abstract concept quick and easy to comprehend right there in your web browser. Statistics show that two dozen tries or so is usually enough for percentages to stabilize and achieve an observable pattern. After about 24 tries, using the same switching strategy every time, the winning percentage will level off and the advantage should become clear to the user. For the more stubborn skeptics, we encourage you to play the game about 24 times while holding your original door every time, then clean the slate, and compare your winning percentage to that of 24 tries with a switching strategy. For the technically minded, below are the basic rules the program uses to in order to simulate the Monty Hall Scenario: A. The computer generates a random number. Numbers are limited to 1, 2, and 3. The computer defines this random number as the ‘winningNumber’. B. The user is presented with three images of closed doors numbered 1, 2, and 3. Under the hood, the computer has already assigned each of the three images as a unique number. These numbers were limited to 1, 2, and 3, with each unique number corresponding to its associated closed door image. C. The user selects one of the three closed door images. The computer stores the value (1, 2, or 3) of the image that the user selected, and defines this value as ‘firstSelection’. D. At this point, the computer has (in memory) the ‘winningNumber’ (stored from Step A) and the user’s ‘firstSelection’ (stored from Step C). These two values may or may not be the same. E. The computer now randomly selects a number (1, 2, or 3) that is NOT the ‘winningNumber’ and is NOT the ‘firstSelection’, and reveals it to the user. It will always be a goat. F. The computer then presents the user with the image of the goat (the revealed door) and the two remaining closed door images. Note that the computer still has, in memory, the initial random winning number (‘winningNumber’) AND the number that the user initially selected (‘firstSelection’). Note that these two values may or may not be the same. G. The remaining two doors will always be a losing number AND the ‘winningNumber’, where one and only one of these remaining values is equal to the value of ‘firstSelection’. *Again, note here that ‘winningNumber’ and ‘firstSelection’ may or may not be the same value. H. The user is now presented with the opportunity to change her initial selected value ‘firstSelection’ to the remaining value OR keep it the way it is. The technical possibilites of ‘firstSelection’ being ‘winningNumber’ have remain unchanged since Step A (a 1/3 chance), while the chances of the remaining value being ‘winningNumber’ are 2/3. I. After the user makes her second selection, the computer stores the value in memory and defines this value as ‘finalAnswer’. J. The computer compares ‘winningNumber’ with ‘finalAnswer’. If the values are equal, the user wins. If not, the user loses. *Please note that we are not suggesting that having a goat around the house would necessarily be a bad thing. “If you program it, they might listen.” –Anonymous
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363445.41/warc/CC-MAIN-20211208053135-20211208083135-00215.warc.gz
CC-MAIN-2021-49
8,376
28
https://sourceforge.net/directory/os%3Aos_projectkernel/audience%3Adevelopers/?sort=rating&page=6
code
OSI-Approved Open Source (261) - GNU General Public License version 2.0 (134) - GNU Library or Lesser General Public License version 2.0 (40) - BSD License (39) - GNU General Public License version 3.0 (20) - MIT License (16) - Python Software Foundation License (11) - PHP License (10) - Apache License V2.0 (9) - Academic Free License (7) - Apache Software License (6) - NASA Open Source Agreement (6) - GNU Library or Lesser General Public License version 3.0 (5) - Open Software License 3.0 (4) - Sun Public License (4) - Apple Public Source License (3) - Other License (16) - Public Domain (12) - Grouping and Descriptive Categories (289) - Linux (273) - Windows (252) - Mac (249) - Android (228) - Modern (35) - Other Operating Systems (23) - BSD (22) - Virtualization (9) - Audio & Video - Business & Enterprise - Home & Education - Science & Engineering - Security & Utilities - System Administration Namespace is a codesmith construction kit for SuperWikia Alpha which increases project proficiency. Its developer U/I builds entire source codes from SuperWikia Alpha's header libraries and has a custom header editor for custom namespace building. K-OS is an open-source realtime-operating-system based on the OSEK/VDX standard aimed at compiler and microcontroller independence. Currently we support Motorola (Freescale) HC12/HCS12/HCS12X targets.1 weekly downloads LogoROS is new object-oriented operation system (currently in early development). See wiki page: https://sourceforge.net/apps/mediawiki/logoros/ and development blog: https://sourceforge.net/apps/wordpress/logoros/ for more info.7 weekly downloads SuperWikia Alpha- Liberty is the open source mainframe kernel of the SuperWikia Alpha Codebase. It provides users access to game engines, internet media and High-Definition (HDCG) 3D graphics interfaces and also hosts user/client/server databases. The Allcode 'Catwalk' is a pre-implementation toolkit for SuperWikia Alpha tip drills and asanas to parse organized and or executable (O/E) code. It also conducts breadth inspections across one or more Alpha shells while searching for code violations Rubber Ducky is the open source desktop solutions manager which helps end users to keep track of virtually everything. Used to organize cursor-cloud widget plugins and manages the entire desktop environment. Built and powered by Muhha! Platoon is the premiere video server for SuperWikia Alpha & Muhha!. It provides upload/download servers and video hosting for a large variety of formats. Platoon also allows online editing of SuperWikia files to create vivid ED-C2 presentations. PureEnergy is an organized file manager for SuperWikia Super Controller reactors which provide fluent access of each reactor's Sadeic files and other components of the native Super Controller Codec partitions. PureEnergy features IDE & SDK utilities. Versatile is an operating system, its kernel is written in C with emphasis on speed, low memory footprint and clean code. One of the goal is to have orthogonal persistence and query based file system. An alternate and minimalistic boot rom for Lisa(s) emulator(s) (or maybe for real hardware in some future...) A little operating system named sonanos, which can run on i386 and ipod. Is is developed just for fun. StrikeRange is an Appliance OS designed exclusively for 64-bit multi-core processor architectures. It is derived from BSD kernel and OpenSource software libraries. ArgOS is a research OS based on IA-32 architecture. It's aim is to help others to learn more about the internals of the OS. Also it is designed to be clean and easy to read so students/people with basic knowledge of the C language can understand it. PhiOS is a 1.44MB ! live operating system with Full graphical desktop, NTFS,FAT ve ISO 9660 support, CD/DVD burning, USB HID and USB Storage support and Ethernet support1 weekly downloads The main goal of the neonevo project is to develop a general-purpose, modular real-time operating system for the ia32 architecture (p4+). It's also intended to serve as a platform for new concepts of osdev and user inteface. E2compr is a small patch against the ext2 file system that allows on-the-fly compression and decompression. But this is not properly documented. So I want to document the code of e2compr with the help of other interested people. Just Another "X" Object Oriented Operating System An embedded operating system aiming to take advantage of modern object oriented and generic programing. Super simplistic x86 real mode operating system.3 weekly downloads 64-bit operating environment. A x86 hobbyist operating system written in C and assembly. The project aim to create a microkernel-based operating system from scratch.1 weekly downloads AxionOS is (to be) a operating system for the Axion Prototype Computer (APC) which is basically a notebook. Currently the project is in its childhood, but the idea is simple - To create an intuitive, user-friendly operating system for the APC. Operating System Framework for a MIPS Simulator. The project includes a multi-threaded MIPS Simulator and a naive Operating System and an Assembler for the simulated architecture, intended to be used for instructional and educational purpose.1 weekly downloads Open Hypervisor features hardware passthrough, security and a framework that allows the development of Virtual Software Appliances. uGNU/RTOS (literally "micro G'Noo RTOS") is an Open Source serial Real Time OS for microcontrollers (PIC, ATMEL).1 weekly downloads
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824757.8/warc/CC-MAIN-20160723071024-00032-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
5,499
58
http://www.bryancook.net/2008/11/opacity-web-color-illustrator.html
code
Bad designer! You designed a web-site in Illustrator and decided that every colour should be semi-transparent. Blue (#0000FF) with 70% opacity on top of a Grey background with 50% opacity isn't Blue anymore. Even if I could set different opacities for foreground and background, I'm completely trumped by the browser which inherits the opacity level from its parent container. So how to fix? Ideally, if you need transparency your designer should apply transparency to the whole layer instead of individual elements, but it usually means re-exporting your Illustrator to JPG or BMP and then using an eye-dropper tool to get the colour. Or, if you're like me, you build a tool using WPF that basically performs the same thing. - Set the background and foreground color to taste. - Adjust the Opacity of the foreground color. The background colour should bleed through the foreground. - Take the effective colour in the status bar.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218191984.96/warc/CC-MAIN-20170322212951-00447-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
929
5
https://www.ph.tum.de/academics/org/cc/mh/PH2152/?courses_semester_key=2012s
code
Computerbased Data Analysis of Hadron Reactions at High Energy PH2152 is a semester module in German or English language at Master’s level which is offered in summer semester. If not stated otherwise for export to a non-physics program the student workload is given in the following table. |Total workload||Contact hours||Credits (ECTS)| |150 h||75 h||5 CP| Responsible coordinator of the module PH2152 is Jan Michael Friedrich. Content, Learning Outcome and Preconditions The lecture covers the analysis tools required for analysing high-energetic hadron reactions, featuring special techniques of partial-wave analysis and further principles of particle physics. The focus is on hadron reactions of low to medium momentum transfer, where electromagnetic and diffractive strong interaction is present. The tools are explained along simple, self-generated simulated data, and employed to real-physics experimental data. After successful completion of this module, the student is able to - understand the results of a partial-wave analyse of 3 or more-body decays of hadron resonances, and evaluate them especially regarding the appearance of overlapping resonances and interference effects. - characterize the applied formalism for strong an electromagnetic interaction. - rephrase the key steps of the respective data analysis. No specific further requierements, programming experience of advantage Courses, Learning and Teaching Methods and Literature Courses and Schedule |VU||4||Computerbased Data Analysis of Hadron Reactions at High Energy||Friedrich, J.|| singular or moved dates and dates in groups Learning and Teaching Methods Smartboard, programming employing root.cern.ch Smartbroad, pdf files Martin Perl, High Energy Hadron Reactions Description of exams and course work In an oral exam the learning outcome is tested using comprehension questions and sample problems. In accordance with §12 (8) APSO the exam can be done as a written test. In this case the time duration is 90 minutes. The exam may be repeated at the end of the semester.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00446.warc.gz
CC-MAIN-2023-50
2,056
26
http://www.geekstogo.com/forum/topic/283543-mystery-missing-dll-file/
code
It doesn't seem to affect my computers performance in any way, it's just REALLY ANNOYING. A search around a few places online shows no trace of a .dll by that name existing. Any ideas? Jump to content Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.Create Account How it Works That file has most likely been removed at some point but the registry entry which calls/loads it everytime Windows starts has been left behind. Hence the error. Easiest (and safest) way to remove the entry is with 'Ccleaner' from here: http://www.filehippo...nload_ccleaner/ Install it & start it. Click 'Tools', then 'Startup'. Find the entry which refers to "Nlexic.dll" Highlight that line. 0 members, 0 guests, 0 anonymous users Community Forum Software by IP.Board Licensed to: Geeks to Go, Inc.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945472.93/warc/CC-MAIN-20230326111045-20230326141045-00783.warc.gz
CC-MAIN-2023-14
1,216
13
https://github.com/BSoD-naev
code
Report or block BSoD-naev Contact Support about this user's behavior.Report abuse Forked from naev/naev Naev is a 2d action/rpg space game that combines elements from the action, rpg and simulation genres. Forked from naev/naev-artwork NAEV's Artwork Repository Forked from enignaev/enigs_stuff_for_naev graphics and stuff for naev the game
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00582-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
340
8
https://github.com/k4rm/ofxGuido
code
GUIDO Engine musical score renderer layer for OpenFrameworks ofxGuido is a simple super-class for drawing scores rendered by the GUIDO Engine library: http://guidolib.sourceforge.net/ ofxGuido was made in February 2014 by Thomas Coffy as a part of Ascograph, the graphical score editor for Antescofo: http://repmus.ircam.fr/mutant/ascograph Originally cloned from https://github.com/k4rm/AscoGraph Updated in 2019 by Dan Wilcox for tests at the ZKM | Hertz-Lab - gudio2.tff installed on the system The GUIDO Engine header files and static library are required to build ofxGuido. These are currently included for macOS but the static lib will need to be built for other platforms. Building GUIDO Engine For macOS or Linux, you can use the included shell script to automate the process: To do this manually, clone the source files and build for your platform: git clone https://github.com/grame-cncm/guidolib mkdir -p build/platform cmake ../cmake -DSTATICLIB=yes For Windows, the GUIDOEngine docs recommend building with Visual Studio, so the Visual Studio project files will need to be generated by CMake instead of using Unix Makefiles. This will result in a libSGUDIOEngine static library in the directory which can be placed in the appropriate platform subdirectory within lib/guidolib/lib, ie. for 64-bit Linux64: mkdir -p /path/to/openframeworks/addons/ofxGuido/lib/guidolib/lib/linux64 cp lib/libSGUIDOEngine.a /path/to/openframeworks/addons/ofxGuido/lib/guidolib/lib/linux64 Note: For Windows, the static library will be named libSGUDIOEngine.lib and there may be an additional .dll which needs to be placed in your projects bin directory. You should now be able to use the OF ProjectGenerator app to create an OF project using ofxGuido which will link the pre-build lib. If the lib is not found by the linker, you may need to add an to your platform target in addon_config.mk and re-run the ProjectGenerator. If the GUIDO Engine headers also need to be updated, copy them from the cloned guidolib directory to cp ../../src/engine/include/* /path/to/openframeworks/addons/ofxGuido/lib/guidolib/include GUDIO Engine requires two fonts: - Times New Roman: score text, should be included on the system - guido2.ttf: score notation, must be installed on the system Make sure you install gudio2.ttf on your system, it can be found in:
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474523.8/warc/CC-MAIN-20240224044749-20240224074749-00767.warc.gz
CC-MAIN-2024-10
2,336
30
https://mixedreviews.net/russian-tortoise-terrarium/
code
After hours of researching and comparing all models on the market, we find out the Best Russian Tortoise Terrarium of 2022. Check our ranking below. - ❤Made of natural coconut fiber, a substrate that not only looks good, but is healthier for your reptile /rabbit,hamster,and small animal than most alternatives. - ❤ Reduces odors and is easy to clean with cold tap water. - ❤Absorbent, non-abrasive material will not irritate reptiles.You can cut the mat into the size that you need to fit your tank. - ❤With the Reptile Carpet’s different colors, we enjoy giving our dragons' homes a" fresh look" after a time. - ❤Package including:2 sheets Size:19.7"x11.8"x0.4"(50*30*1cm) - Give reptiles food and water,shallow rim,gives access to smaller reptiles - Beautiful smooth leaf shape, easy to clean - Suitable for all types of tortoises, lizards, and small reptiles - It is light, you can fix it with tape or put in the corner, that's not easy to turn over. - Large and small size in one package - ★ The bottom is all Surrounded, so dirt will not fall through now. Upgrade with Waterproof & Easy Clean plastic bottom to help keep moisture off the flooring. This tortoise house is perfect for Indoor & Outdoor use. - ★ The only supplier to use 100% SOLID WOOD other than cheap plywood that is easy to rot from the moist soil and the turtles waste. - ★ Unique design acrylic viewing on two sides make it easier both for you to look in your pets and they get to look out on you! - ★ It comes with a "private" sleeping area & a "public" viewing area where the UV & Heat lamps are able to do their job. Weatherproof sleeping area offers safe shelter for your beloved pet. - ★ We built the tortoise box with more Dense & Strong top wire lid, suitable for small animals, such as tortoise, lizards, geckos, and snakes. Easy assembly with pre-drilled holes. - Hoppendale, George (Author) - English (Publication Language) - 136 Pages - 05/17/2014 (Publication Date) - Internet Marketing Business (Publisher) - The surface is coated and polished to prevent bacterial growth, easy to clean, and avoid large spaces in the house. The space below can be used as a crawling pet to avoid the rest area. - It can store food and water and increase the humidity inside the cave. By adding water to the Terrarium Bowls, the internal humidity can be kept at 90%. - Bring privacy and safety, comfort and enjoyment to your reptiles. Allow reptiles to rest better and therefore more likely to breed - Made of natural environmentally friendly resin: PP material, delicate touch, no sharp edges on the edges, with sink - Suitable for turtles, snakes, horned frogs, bullfrogs, lizards and reptiles or animals or amphibians. - Age range description: All Life Stages - Made of high quality ABS plastic, delicate texture, lifelike rock surface, easy to clean and can last long. No impurities ceramic sinks, moisturizers, helps peeling. - Large Size: 9.8*5.9*5.9" (each sink size: 3.1" * 1.6", sink depth: 0.59", filled with water depth 0.2"). - Removable water tanks and the top of the hollow design, increasing the humidity inside the cave. Add water in the sinks and water will be slowly absorbed within 24-50 hours and slowly release moisture. - Provide a natural hiding spot for reptiles, pets can get enough privacy in this cave. - Good for lizards, chameleons, tree frogs, geckos, tortoises, snakes and other reptiles. - TWO-ROOM DESIGN: Pawhut's large tortoise house features built-in private box and basking areas with a metal grating, making this large wooden enclosure the preferred housing when keeping tortoises indoors. - INDOOR & OUTDOOR USE: Use indoors to keep your tortoise warm and secure during cold winter days and use outdoors during summer to provide natural sunlight on warm days. This means it's a great habitat for your pets to roam, play, relax, and sleep. - WIRE LID TOP: Lockable latches on top of the turtle terrarium helps to keep your reptile pet safe while enjoying the sunlight outside. This wooden habitat is also cat and predator-proof. Includes wooden handles so it's easy to move when needed. - EASY TO CLEAN: The side panels of the run area in this reptile home can be pulled out to enlarge the living space, and the bottom three-layer plywood can also be pulled out for easy cleaning. - TURTLE HOME DIMENSIONS: 37" L x 24.75" W x 13" H. Wire Top Size: 21.25" L x 22" W. Run Size: 22.5" L x 23.25" W x 11.5" H. To make the wooden tortoise house last longer, putting a yoga mat to line the bottom is an excellent suggestion. - Amazon Kindle Edition - Pirog, E.J. (Author) - English (Publication Language) - 128 Pages - 05/01/2006 (Publication Date) - TFH Publications, Inc. (Publisher) - FAMOUS, AUSTIN (Author) - English (Publication Language) - 28 Pages - 01/13/2021 (Publication Date) - Independently published (Publisher) How Do You Buy The Best Russian Tortoise Terrarium? Do you get stressed out thinking about shopping for a great Russian Tortoise Terrarium? Do doubts keep creeping into your mind? We understand because we’ve already gone through the whole process of researching Russian Tortoise Terrarium, which is why we have assembled a comprehensive list of the greatest Russian Tortoise Terrarium available in the current market. We’ve also come up with a list of questions that you probably have yourself. We’ve done the best we can with our thoughts and recommendations, but it’s still crucial that you do thorough research on your own for Russian Tortoise Terrarium that you consider buying. Your questions might include the following: - Is it worth buying an Russian Tortoise Terrarium? - What benefits are there with buying an Russian Tortoise Terrarium? - What factors deserve consideration when shopping for an effective Russian Tortoise Terrarium? - Why is it crucial to invest in any Russian Tortoise Terrarium, much less the best one? - Which Russian Tortoise Terrarium are good in the current market? - Where can you find information like this about Russian Tortoise Terrarium? We’re convinced that you likely have far more questions than just these regarding Russian Tortoise Terrarium, and the only real way to satisfy your need for knowledge is to get information from as many reputable online sources as you possibly can. Potential sources can include buying guides for Russian Tortoise Terrarium, rating websites, word-of-mouth testimonials, online forums, and product reviews. Thorough and mindful research is crucial to making sure you get your hands on the best possible Russian Tortoise Terrarium. Make sure that you are only using trustworthy and credible websites and sources. We provide an Russian Tortoise Terrarium buying guide, and the information is totally objective and authentic. We employ both AI and big data in proofreading the collected information. How did we create this buying guide? We did it using a custom-created selection of algorithms that lets us manifest a top-10 list of the best available Russian Tortoise Terrarium currently available on the market. This technology we use to assemble our list depends on a variety of factors, including but not limited to the following: - Brand Value: Every brand of Russian Tortoise Terrarium has a value all its own. Most brands offer some sort of unique selling proposition that’s supposed to bring something different to the table than their competitors. - Features: What bells and whistles matter for an Russian Tortoise Terrarium? - Specifications: How powerful they are can be measured. - Product Value: This simply is how much bang for the buck you get from your Russian Tortoise Terrarium. - Customer Ratings: Number ratings grade Russian Tortoise Terrarium objectively. - Customer Reviews: Closely related to ratings, these paragraphs give you first-hand and detailed information from real-world users about their Russian Tortoise Terrarium. - Product Quality: You don’t always get what you pay for with an Russian Tortoise Terrarium, sometimes less, and sometimes more. - Product Reliability: How sturdy and durable an Russian Tortoise Terrarium is should be an indication of how long it will work out for you. We always remember that maintaining Russian Tortoise Terrarium information to stay current is a top priority, which is why we are constantly updating our websites. Learn more about us using online sources. If you think that anything we present here regarding Russian Tortoise Terrarium is irrelevant, incorrect, misleading, or erroneous, then please let us know promptly! We’re here for you all the time. Contact us here. Or You can read more about us to see our vision.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305420.54/warc/CC-MAIN-20220128043801-20220128073801-00634.warc.gz
CC-MAIN-2022-05
8,629
65
https://www.acronymat.com/posters/?tag_id=14
code
Value Stream Mapping The Value Stream Mapping is a Lean technique for managing flow and improving processes allowing to track the flow through a process. The Minto Pyramid Principle, a communication framework, advocates for a top-down approach to convey messages effectively Spotify Health Check The Spotify Health Check is a workshop, where teams assess their project and collaboration using 11 dimensions. Maslow's Hierarchy Of Needs Maslow's hierarchy of needs links basic human needs and desires, emphasizing that survival needs must be met before higher needs. RACI Matrix/Chart is the type of responsibility assignment matrix for effective work organization, communicating the responsibilities. CEDAR is a structured feedback model providing coaching opportunities via repeated revisiting and readjusting of the feedback and the goals. The Systems Thinking Approach To Introducing Kanban (STATIK) is a repeatable way to start with Kanban resulting in continuous improvement. Data Model Canvas The Data Product Canvas is a framework for developing data products based organized into 10 blocks within 3 domain areas. 6 Kanban Practices: Visualize, Limit WIP, Manage Flow, Make policies explicit, Implement feedback loops, Improve collaboratively Theory Of Constraints The Theory of constraints says the throughput of any system is limited by at least one constraint slowing it down. Classes of Service (CoS) Classes of service (CoS) provide a transparent way of categorizing the incoming work items and ensuring they are properly prioritized and governed to lead to meeting customer expectations. They enable managing risk, priorities, and cost of delay. Expedite High-priority items that should be worked on as soon as possible. Expedite class work items have critical... Seven wastes of software development Similar to what TPS identified as seven categories of waste in manufacturing, also software development has its own wastes.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817253.5/warc/CC-MAIN-20240419013002-20240419043002-00627.warc.gz
CC-MAIN-2024-18
1,937
19
https://angel.co/company/datadog/jobs/827064-security-analyst-compliance-operations
code
Modern monitoring & analytics. See inside any stack, any app, at any scale, anywhere Security Analyst - Compliance Operations We're on a mission to build the best platform in the world for engineers to understand and scale their systems, applications, and teams. We operate at high scale—trillions of data points per day—providing always-on alerting, metrics visualization, logs, and application tracing for tens of thousands of companies. Our engineering culture values pragmatism, honesty, and simplicity to solve hard problems the right way. The Compliance Operations team works within the Information Security organization and across the business to design, automate, and operate Datadog’s security and compliance capabilities. As an Information Security Analyst on the Compliance Operations team, you will be responsible for the design, implementation, and management of Datadog’s technical compliance capabilities. You will create and maintain solutions to uphold Datadog’s continuous compliance with a broad set of industry and federal regulations, and drive compliance efforts to enable Datadog to enter increasingly regulated markets. - Actively manage information security and risk according to internal compliance and regulatory requirements including governance, metrics, and compliance oversight of Datadog’s SDLC and Change Management programs - Perform technical assessments and produce detailed artifact analysis to ensure that systems, applications, and processes are in compliance with Datadog’s internal security objectives and external regulatory requirements - Collaborate with Engineers to define system baseline standards, and to maintain the efficiency and effectiveness of Datadog’s SDLC and Change Management programs - Develop tools and documentation to support the standardization of Datadog’s security controls in a multi-cloud, multi-region ecosystem. - You have a BS or a minimum of 5 years of relevant industry experience. - Expert level knowledge and in-depth practical experience working with at least one defined compliance and regulatory standard (e.g. NIST, FedRAMP/ITAR, GDPR, HIPAA, ISO 27001, PCI DSS, SOX, others). - Direct experience with Agile SDLC and Cloud software development technology, practices and teams. - Experience successfully implementing tooling & instrumentation and/or automating routine or mundane processes with Python, Go, or similar scripting tools. - Familiarity and exposure to other compliance and regulatory standards (e.g. FedRAMP/ITAR, GDPR, HIPAA, ISO 27001, PCI DSS, SOX) a plus. - You want to work in a fast paced, high growth environment that values pragmatism and initiative. - Your writing is beyond reproach. - CNAB, automated delivery (SDM), and CI/CD get your pulse going. - You’ve previously worked in a cloud-native or startup environment. - You hold relevant industry certifications. - Verbal communication is your cup of tea. Retirement savings plan Open paid time off Snacks & drinks Outings & events Datadog at a glance Datadog focuses on SaaS, Enterprise Software, Information Technology, Analytics, and Software. Their company has offices in New York City, San Francisco, New York, Boston, and Chicago. They have a very large team that's between 1001-5000 employees. To date, Datadog has raised $147.9M of funding; their latest round was closed on September 2019 at a valuation of $11B.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141717601.66/warc/CC-MAIN-20201203000447-20201203030447-00222.warc.gz
CC-MAIN-2020-50
3,392
26
https://www.sabaton.net/video/episode-64-soldier-of-three-armies-pt-1-winter-war/
code
Started out as a reserve, soon promoted well deserved, and the legend has begun. Lauri Allan Törni, the soldier of three armies. Born and raised in Viipuri in Finnish Karelia, Lauri Törni grew up into a world of tensions, of class-consciousness and conflicting ideologies. Boxed in between the Soviet Union and Germany, Finland was preparing for war of survival. The Winter War would be the first place for Lauri Törni to see battle and begin his legacy as a born soldier. Support Sabaton History on Patreon: https://www.patreon.com/sabatonhistory
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656833.99/warc/CC-MAIN-20230609201549-20230609231549-00426.warc.gz
CC-MAIN-2023-23
550
2
http://ascl.net/code/cs/Lewis%2C%20Mark
code
➥ Tip! Refine or expand your search. Authors are sometimes listed as 'Smith, J. K.' instead of 'Smith, John' so it is useful to search for last names only. Note this is currently a simple phrase search. SwiftVis is a tool originally developed as part of a rewrite of Swift (ascl:1303.001) to be used for analysis and plotting of simulations performed with Swift and Swifter. The extensibility built into the design has allowed us to make SwiftVis a general purpose analysis and plotting package customized to be usable by the planetary science community at large. SwiftVis is written in Java and has been tested on Windows, Linux, and Mac platforms. Its graphical interface allows users to do complex analysis and plotting without having to write custom code.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474649.44/warc/CC-MAIN-20240225234904-20240226024904-00069.warc.gz
CC-MAIN-2024-10
761
2
http://www.sailnet.com/forums/511810-post1.html
code
Beneteau F310 ~ APOTHIC Join Date: May 2009 Location: Ontario, NY (PYC) Thanked 0 Times in 0 Posts Rep Power: 9 CS27 Specific issue to look for? I've been lurking from some time now, and finally have cause to post. I'm going to look at a 1977 CS27 tomorrow which at first glance seems to be in appealing condition. Could be the start of a 20 year dream finally coming true. I'm a fairly new sailor, just finishing lessons which are going great. My intent is day sailing, hoping to build up to overnights and weekend trips with my family (three of us in all) and want something stable and comfortable that I can build skills on without dropping a fortune. I'm a DIY kind of guy, so not at all afraid of projects. Primary stomping ground will be Lake Ontario. I have done a lot of research on surveying, and have a pretty good feel for things I need to look at in general. Just wanted to check with a group of folks familiar with CS to see if there's anything specific to the CS27, or CS in general that I ought to pay particular attention to. I did see the CSOA yahoo group - planning to go there depending on how my visit goes. Thanks in advance,
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320865.14/warc/CC-MAIN-20170626203042-20170626223042-00030.warc.gz
CC-MAIN-2017-26
1,146
11
https://nation.marketo.com/thread/15185-cost-allocation-calculations
code
Might anyone have any advice on best practices on calculating the cost you set up when you set up a campaign? Our personnel and overhead costs are completely separate from our channel marketing expenses. We're also only one component of a broader marketing team making the actual cost of executing an email campign fairly ambiguous. We're thinking about developing a more or less standardized cost number for the various types of campaigns we would create. I'm curious if anyone has any models they would be willing to share on how they did it. Thanks.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202572.29/warc/CC-MAIN-20190321193403-20190321215403-00271.warc.gz
CC-MAIN-2019-13
552
2
https://community.esri.com/t5/spatial-statistics-questions/kriging/m-p/1029944
code
Hi, recently started to use the Arcgis. and, my work is creat kriging map, and compare the results. also i have different 3 types of data to study, so it's good to analyze the data with GA tools. but, data1 and data2 is working well. but after kriging data3, the GA layer to points tool doesn't work anymore. i mean, the result says predicted and measured data is all same. as you know, it can't be. please solve my problem. i don't know why happen especially to data3. can you see? the error value is all zero, it couldn't be.... I suspect that the perfect predictions are due to the lack of nugget effect in the kriging model. If no nugget is used, Kriging will always predict the values of the input points with no error or standard error. For the Kriging model you used for your third dataset, can you check the value of the Nugget parameter? It is likely either disabled or equal to 0 (both will produce predictions without error). You can find the nugget and all other parameters parameters in the Method Properties of the geostatistical layer. Please let me know if this isn't the source of the problem or if you have trouble finding the nugget values of the three kriging models.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991829.45/warc/CC-MAIN-20210514214157-20210515004157-00107.warc.gz
CC-MAIN-2021-21
1,187
12
https://www.maths.ox.ac.uk/people/hadrien.oliveri
code
Dr Hadrien Oliveri Fulford Junior Research Fellow at Somerville College University of Oxford Andrew Wiles Building Radcliffe Observatory Quarter Mathematical modelling for biological development - Best ECR presentation at the 6th Oxford International Neuron and Brain Mechanics Workshop, awarded by Elsevier, April 2021. - Recognition Award for outstanding performance in 2021, awarded by Oxford Mathematical Institute, June 2022.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00791.warc.gz
CC-MAIN-2022-33
430
8
https://networkencyclopedia.com/internet-standard-management-framework/
code
The Internet-Standard Management Framework refers to a set of protocols, standards, and guidelines used for managing and monitoring network devices, systems, and services within an Internet environment. It provides a structured approach to network management, enabling administrators to efficiently control and maintain network resources. The framework is based on the Simple Network Management Protocol (SNMP), which is a widely adopted protocol for managing and monitoring network devices. SNMP allows network administrators to collect and organize information about devices, monitor their performance, and manage configurations remotely. Internet-Standard Management Framework key components The Internet-Standard Management Framework encompasses the following key components: - SNMP: Simple Network Management Protocol is a network management protocol that facilitates the exchange of management information between network devices and management systems. It defines a standardized format for data exchange and a hierarchical structure for organizing information using Management Information Bases (MIBs). - Management Information Base (MIB): MIBs are databases that store information about network devices and systems. They define the structure and attributes of managed objects, allowing network administrators to retrieve and manipulate data related to network devices. - SNMP Agents: SNMP agents reside on network devices and provide access to device-specific information. Agents collect data from managed devices, respond to queries from management systems, and generate notifications or alerts based on predefined events or thresholds. - Network Management Systems (NMS): NMS refers to software applications or platforms used by network administrators to manage and monitor network devices. NMS systems communicate with SNMP agents to retrieve and analyze data, configure devices, and generate reports on network performance. - Standardization Organizations: The Internet-Standard Management Framework is developed and maintained by organizations such as the Internet Engineering Task Force (IETF) and the International Organization for Standardization (ISO). These organizations define standards, protocols, and guidelines for network management practices. This framework provides a standardized approach to network management, enabling interoperability between different vendors’ equipment and facilitating the efficient monitoring and control of network resources. It plays a crucial role in ensuring the stability, performance, and security of networks in various industries and Internet-based environments. - RFC 3410 – Introduction and Applicability Statements for Internet-Standard Management Framework
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297284704.94/warc/CC-MAIN-20240425032156-20240425062156-00325.warc.gz
CC-MAIN-2024-18
2,723
11
https://www.fr.freelancer.com/projects/web-scraping/scraper-website-for-companies/?ngsw-bypass=&w=f
code
I need you to scrape a website with 800 companies. 42 freelances font une offre moyenne de 28 $ pour ce travail will do in no time, please share the website url and details in chat........................................thank you! hi please share website i will scrap 800 companies for you hi please share website i will scrap 800 companies for you Hi What is your preferred data to scrap? What is your preferred output format? I will scrap the website with Scrapy and get all data of those 800 companies! Then you can have your output (as any format such as csv, j Plus Hi, I am Python script developer with 10 years of experience. I can scrape required website by python script/bot with your instructions very short time. Can we discuss please? Thanks. Hi there, I can do your project with 100% accuracy. I have reviewed your project brief carefully and would like to assist you with the task. I can start your project right now. I work efficiently and will finish on tim Plus Hi there, I Have Scraped Amazon, Ali express, Yellow Pages, Yelp, Yellow Pages, Grainger, Boohoo, Etc. I am a python writer with 5 years of experience. I have worked on several similar projects. You can see an exampl Plus I am a professional web scraper I can start scraping the companies right now and deliver now Thanks in Advance
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587767.18/warc/CC-MAIN-20211025185311-20211025215311-00631.warc.gz
CC-MAIN-2021-43
1,311
9
https://forum.catanuniverse.com/topic/7480/how-many-friends-can-play-at-once
code
How many friends can play at once? So far we are 4, but we would like to play a game in 6. Is that possible? What do we have to buy to be 6 of us? 4 players max. They don't have 5-6 player option yet.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300805.79/warc/CC-MAIN-20220118062411-20220118092411-00495.warc.gz
CC-MAIN-2022-05
200
2
https://www.oreilly.com/library/view/i-m-wrights/9780735663145/ch10.html
code
Chapter 10. Microsoft, You Gotta Love It In this chapter: There are three sides to management: the people side, the project side, and the business side. I’ve already covered people management and project management. It’s time to tackle how Microsoft runs its business. It’s easy to be cynical about capitalism and huge corporations like Microsoft. Microsoft must turn a significant profit to stay in business. ...
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335396.92/warc/CC-MAIN-20220929225326-20220930015326-00574.warc.gz
CC-MAIN-2022-40
419
4
https://blog.algorithmia.com/author/skim/page/3/
code
Recently I gave a talk at PyData Seattle about how to ramp up your data science skills by borrowing tips and tricks from the developer community. These suggestions will help you become a more proficient data scientist who is loved by your team members and stakeholders. This post is broken up into five parts including: - History and controversy of the 10x developer. - Project design. - Code design. - Tools for the job. - Productionizing model. Earlier this week we introduced Face Recognition, a trainable model that is hosted on Algorithmia. This model enables you to train images of people that you want the model to recognize and then you can pass in unseen images to the model to get a prediction score. The great thing about this algorithm is that you don’t have to have a huge dataset to get a high accuracy on the prediction scores of unseen images. The Face Recognition algorithm trains your data quickly using at least ten images of each person that you wish to train on. Read More… Earlier this week we introduced Censorface, an algorithm that finds the faces in images and then either blurs or puts a colored box over the faces to censor them. We thought it would be fun to pair it up with some of our video processing algorithms to show how you can use different algorithms together to censor a video clip when you don’t want to run the whole video. Maybe you have some embarrassing videos that you want to share, but don’t want anyone to know it’s you! Or maybe you have a potentially viral video that you want to post on YouTube, but you need to protect the innocent. No matter what your use case is, let’s dive into creating non-nude video clips with censored faces! Read More… Recently, we wrote a blog post about an algorithm called Scene Detection that takes a video and returns the timestamps of scenes along with subclips that are associated with the subclip’s timestamps. You can use this information to find appropriate scene lengths for creating video trailers or you can use the timestamps of scenes to dictate where YouTube can place advertisements so it doesn’t occur during an important scene. Sometimes though, you want more than just the scene’s timestamps. With Python 3.4 and up you can use the statistics module to determine the average length of a scene, the variance of the data and other information to easily edit your videos or garner insights from the scene lengths. Although you can perform statistical calculations manually or by using the libraries Numpy or Pandas, in Python 3.4 and up you can easily find detailed information of your subclip data without importing a bunch of heavy libraries. Read More… A couple of weeks ago we gave a talk at the Seattle Spark Meetup about bringing together the flexibility of Algorithmia’s deep learning algorithms and Spark’s robust data processing platform. We highlighted the strengths of both platforms and covered a basic introduction on how to integrate Algorithmia with Spark’s Streaming API. In this talk you’ll see how we went from use case idea to implementation in only a few lines of code. Read More…
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659890.6/warc/CC-MAIN-20190118045835-20190118071835-00156.warc.gz
CC-MAIN-2019-04
3,126
15
https://m4mlmsoftware.com/software-engineer-vs-software-developer/
code
There are many differences between a software engineer and a software developer. Both are responsible for bringing blueprints to life. Engineers have more education and experience, while developers do the actual coding. The difference between a developer and an engineering can be determined by a person’s background, experience, and appetite for learning. This article will cover the key differences between the two roles, and whether one would be more effective in your particular job role. The role of a software developer Programmers and designers work together to produce programs that are straightforward to use. They first meet with customers who have software needs, then design, test, and deploy the program following those customers’ specifications. The importance of software engineers to today’s economy cannot be overstated. You must get in touch with New York software developers if you are looking to work with one. A software engineer focuses on building systems. A developer writes programs from scratch while an engineer works with other engineers to design and build an entire system. In general, software engineers are more systematic and focused on the creative aspect of a project. The two careers are similar in that they both focus on different aspects of software development, but engineers tend to be more technical. Unlike developers, engineers are responsible for building and maintaining a technology infrastructure. You may share your article on forexinghub and thehomeinfo. So that, your website rank on Google as well and get more information from worldtravelplace and worldupdate In many countries, a software engineer must have a degree in computer science in order to work in this field. The difference between the two is essentially that an engineer is responsible for creating large-scale systems, while developers are responsible for writing complete programs. While engineers do all the same things as software developers, they differ in their design philosophy. Rather than solving problems on a larger scale, engineers are interested in resolving immediate needs while minimizing trade-offs. The xoilac is one of the best choice for you so that you can get the latest web news around the world. And another think, if you are seeking for good lawyer then you can visit here to get the best lawyersupport in the world.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100489.16/warc/CC-MAIN-20231203062445-20231203092445-00597.warc.gz
CC-MAIN-2023-50
2,363
6
http://www.sitepoint.com/forums/printthread.php?t=11019&pp=25&page=1
code
Ok, I submitted my site and the following url to Yahoo!'s directory in the(www.baddealings.com/forums/index.php)So I waited and waited and then I sent an e-mail to their url support. A couple of days ago, I got response stating that my website was in their database. However my site was listed as http://www.baddealings.com (a url I never submitted, because I used to have a flash page, and then it redirected to my main page), and it was listed in a higher categoryQuote: Home > Business and Economy > Shopping and Services > Consumer Advocacy and Information > Consumer Opinion category. . I never got an e-mail telling me that my website was going to be added to their database, so is it possible someone else submitted my site? How do I go about finding out that information, because I would like to submit my site to the other category as well?Quote: Home > Business and Economy > Shopping and Services > Consumer Advocacy and Information [Edited by steven on 10-31-2000 at 07:03 PM]
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535921550.2/warc/CC-MAIN-20140901014521-00144-ip-10-180-136-8.ec2.internal.warc.gz
CC-MAIN-2014-35
988
5
https://docs.kasten.io/latest/multicluster/access.html
code
Once a primary cluster is configured for the K10 Multi-Cluster Manager features can be accessed via the K10 Dashboard. Dashboard And RBAC¶ The K10 Multi-Cluster Manager dashboard will be available at /k10/#/clusters URL path of the DNS or IP address setup during K10 install. Refer Dashboard Access for more information. For users to be able to access the K10 Multi-Cluster Manager dashboard as well as other K10 Multi-Cluster features, additional role binding may be required. k10-mc-admin ClusterRole is installed during K10 install/upgrade. It is added for Distributions, Cluster Config, K10 Config and Secrets access in the K10 multi-cluster namespace. During bootstrapping, K10 creates a RoleBinding for a default Group k10:admins in the K10 multi-cluster namespace. Admin users can be added to this Group and will be able to use the above k10-mc-admin will be installed under the name This ClusterRole is not configurable and is installed with K10. You can also create role bindings for existing users or service accounts. To bind the k10-mc-admin ClusterRole to a User, use the following command $ kubectl create rolebinding <name> --clusterrole=k10-mc-admin \ --namespace=kasten-io-mc \ --user=<name> To bind the k10-mc-admin ClusterRole to a ServiceAccount, use the following $ kubectl create rolebinding <name> --clusterrole=k10-mc-admin \ --namespace=kasten-io-mc \ --serviceaccount=<serviceaccount_namespace>:<serviceaccount_name> - The complete RBAC reference can be found in the K10 Multi-Cluster RBAC section.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141750841.83/warc/CC-MAIN-20201205211729-20201206001729-00625.warc.gz
CC-MAIN-2020-50
1,525
23
https://anexinet.com/blog/importance-patch-testing/
code
Best Practice dictates that any patch being deployed to a production environment should be tested in a non-production environment prior to deployment. The reason for this is to eliminate updates that could affect production negatively. You want to ensure a predictable roll-out once a patch is deployed and detect any conflicts with existing configurations that may be unique to your environment. Following are steps that can be taken to ensure a smooth roll-out: - Take a thorough inventory of your environment; you need to know what applications you have and how those applications are configured. Develop a business application profile. This will help you prioritize which patches may be urgent and what your allowable downtime is going to be. - Identify which security issues are relevant to your environment. Will the risk of not installing the patch mitigate the cost of installing it? Prioritize patches that are urgent against those that are less critical. Consider vendor-reported criticality when calculating the patch’s significance. - Once patches are obtained, source and integrity should be verified. Typically, a digital signature is used for checking validity. Ideally, you should have a test system that is identical to your production system. Virtual environments are great for this type of testing. Using a virtual environment allows for exact replication of your production environment. Using this type of environment can also save time, money and space. Once up and running, virtual environments allow for development testing, disaster recovery testing, and applications testing as well. You will need to test for successful installation of patches once they are deployed to the replicated environment. Verify that basic system functions are working. Test for program failures and basic network connectivity. Test mission critical applications and services, and test that policies and rights are functioning correctly. Once this is done, you want to go into mission critical applications for testing to be sure that creation and saving of documents is functioning, and that you can open and access documents saved in older versions of the software. Check print capabilities and use of templates. It’s always a good idea to document everything and have this information forwarded to applicable parties prior to deployment. This information should have the patch name, patch description, criticality, time to install, recommended sequence of install, and any errors or abnormalities. Keep these tips in mind when you’re ready to patch and you should find you’re on your way to a successful and smooth deployment!
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301720.45/warc/CC-MAIN-20220120035934-20220120065934-00680.warc.gz
CC-MAIN-2022-05
2,639
8
https://www.backmarket.co.uk/en-gb/l/playstation-4-slim/429e2f5f-3a89-4fa5-91d2-6a561fb69a3f
code
Controller triggers didn't work so I returned the controller and got a replacement. It's a bit odd that such an issue was not found before the product was shipped in the first place, but the response was fairly hassle free. Whenever you choose to buy, refurbished PS4 consoles are getting cheaper You can change your preferences later by clicking “Cookies” at the bottom of any page. Tell me more about those Cookies.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103341778.23/warc/CC-MAIN-20220627195131-20220627225131-00686.warc.gz
CC-MAIN-2022-27
421
3
https://community.anaplan.com/discussion/155682/how-to-look-up-first-instance-of-a-numbered-list
code
How to look up first instance of a numbered list I have a module (Module A) that applies to a list. I have a different module (Module B) that uses a numbered list. The display names of the numbered list matches the names in the regular list. How do I look up the first instance of the "Job Title" in Module B so Module A shows Bob's Job Title is A? In your numbered list, what format is the Display Name property? If it is TEXT, change it to List formatted to be the Employee Flat list (what the first module is dimensionalized by). Then, in Module A, your formula would be ModuleB.Job Title[FirstNonBlank:Numbered List.Display Name].
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654031.92/warc/CC-MAIN-20230608003500-20230608033500-00192.warc.gz
CC-MAIN-2023-23
634
5
https://community.jmp.com/t5/Martin-Demel-s-Blog/Updating-a-JMP-data-table-from-a-spreadsheet-made-easy-Part-1/ba-p/266323
code
Updating a JMP data table from a spreadsheet made easy - Part 1 May 13, 2020 2:25 AM | Last Modified: May 20, 2020 4:03 AM In the big data era we would like to have all data in e.g. databases, hadoop servers, or access it directly from streams. However, still many data is saved or written in spreadsheets, updated manually or automatically by machines, engineers, lab people or other kind of operators. In JMP it is easy to import any kind of data from a spreadsheet to JMP. You can even automate this easily using the automatically generated "Source" script. But, if you run this script again a new data table opens and does not update the current data table. Usually this is not exactly what you want. Why? You may have done some data cleaning or recoding already. You may have also done some analysis saved into the data table you want to use further on also for the new data. I will show you in this article a way to update your current data table with new data from a spreadsheet, preserving the rows you currently have and only adding the new rows from the spreadsheed. There are two scenarios I want to cover: In this article I cover the easy case of vertical structured data. That means you have one row with column names, and in the other rows beyond is the data. In a second article I will publish soon I will cover the horizontal structured data case. That is first row/first column is the parameter name, in the following columns is the data. In the second row are the units, in the third row the batch number. Then an empty row and after that the same thing again for another parameter. This is easier to read in a spreadsheet but actually not very easy to analyze. I often see these kind of data, although it would be much better to train people to enter data in the vertical way than trying to workaround with the horizontal structure. So let's take a look at the spreadsheet data, it's weather data, and it is simplistic for demonstrating the concept. Attached you will find the script in the JMP Data Table and the Excel spreadsheets for the first case. Let's start with the situation We have already imported an earlier version of the spreadsheet (3 rows of data to that point of time). Now we want to update the data table. You see an update script in the left top window of the data table. This script will do the following: Access the current data table name and the number of rows in that data table Set the spreadsheet file name and worksheet name we want to get the new data from Opens the spreadsheet and read the worksheet data into a help data table. We rely on the source script generated when we imported the data the first time. But changed the "Data Starts on Row" entry from (2) to (2+n_Rows), so we only get the data we have not already imported Now we only have to concatenate the two tables using the "Append to first table" option. cdt = Current Data Table(); excelFile = "WeatherData.xlsx"; name_worksheet = "WeatherData"; // or "Sheet1" for this Excel book example n_Rows = N Rows(); dt_h1 = Open( Worksheets( name_worksheet ), Use for all sheets( 1 ), Concatenate Worksheets( 1 ), Create Concatenation Column( 0 ), Has Column Headers( 1 ), Number of Rows in Headers( 1 ), Headers Start on Row( 1 ), Data Starts on Row( 2 + n_Rows ), Data Starts on Column( 1 ), Data Ends on Row( 0 ), Data Ends on Column( 0 ), Replicated Spanned Rows( 1 ), Suppress Hidden Rows( 1 ), Suppress Hidden Columns( 1 ), Suppress Empty Columns( 1 ), Treat as Hierarchy( 0 ) cdt << Concatenate (dt_h1, Append to first table); Does not seem to difficult. The nice thing is that you can use e.g. data cleaning features like recode, save it as a formula column, and the new data will be handled automatically. Or you have created a predictive model with the previous data, saved the prediction formula back to the data table and see the predictions for the new data (and e.g. compare it to a new model, or the actual predicted data). I'm sure you will find plenty of use cases, and hope this will be useful for you. Of course you can use this and extend it by adding analysis to the data, like updating a control chart or other trend analysis. Using Windows Scheduler you might want to then update your report and send it to our new product JMP Live, so other people (not necessarily licensed JMP users) can access the reports in a web browser with the interactivity of JMP like data filter, column switcher, and so forth. What to expect next In my next post I will talk about the second case which is slightly different, but not much more difficult. I'm interested to hear if you have this kind of problem, or how your data is structured (in spreadsheets). Please leave your comments. All the best, PS: Two comment to the files: In WeatherData.jmp you will find a script for updating the data table with the attached Excel File. Both files have to be saved in the same folder (this was for simplicity, you can easily change the hard coded File Name with e.g. Pick File(), and also extract the name. The second script is "Remove last two rows" which allows to remove rows in the data table to update again from the Excel Sheet, without having to manually delete the rows. So all for your convenience
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655937797.57/warc/CC-MAIN-20200711192914-20200711222914-00306.warc.gz
CC-MAIN-2020-29
5,211
48
https://www.johnsnowlabs.com/applying-off-the-shelf-nlp-in-healthcare-more-dangerous-than-you-think/
code
Transformers have come to define what NLP means in 2021. Not only are these black-box decision-makers, but also interpret the free-text in a counter-intuitive way. This introduces hidden risk especially for mission-intensive NLP applications e.g. healthcare. In this talk, we will see how this behavior can make your systems go sideways in production. I’ll also cover how even the simpler models and preprocessing techniques exhibit these attributes, if not used with due diligence. We’ll study its implications in the context of NLP on healthcare data. Lastly, I will provide guardrails you can put on your systems before and after you train your models. This will make sure you’re not only deploying ethically sound but also trustworthy models in the wild.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500303.56/warc/CC-MAIN-20230206015710-20230206045710-00164.warc.gz
CC-MAIN-2023-06
764
4
https://lab.github.com/githubtraining/reviewing-pull-requests
code
This course will dive into how you can get your best work done by identifying when and how to request a review, how to perform a review for someone else's pull request, and other awesome collaboration methods. All great projects start with collaboration. Pull requests are the foundation of teamwork on GitHub—and pull request reviews give you the ability to work together and discuss changes specific to a pull request by commenting, requesting changes, or approving. In this course, you’ll learn how to: This course has a dedicated message board on the GitHub Community Forum. Create a post to start a conversation, discuss this course with GitHub Trainers and participants, or troubleshoot any issues you encounter. Assign yourself to the first issue in this repository. Comment on the pull request opened in your repository. Approve the pull request so that it can be merged. Leave a review that is requesting changes. Approve the pull request that has been changed. Create a pull request to learn about suggesting changes. Implement a change from a suggested change. Merge the pull request after applying the suggested change. All public courses on Learning Lab are free.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143805.13/warc/CC-MAIN-20200218180919-20200218210919-00399.warc.gz
CC-MAIN-2020-10
1,180
13
https://h5p.org/node/333311
code
How can ı use H5P downloaded file an HTML Submitted by hayreddin tüzel on Sat, 10/20/2018 - 10:32 Also, it is not problem to creating content on a different platform. Simply, I want to access xAPI situations. (I can implement it with js. It is not problem for me. My problem is I dont know how can I put a .h5p file to my HTML) Thank you for your answers. Tue, 10/23/2018 - 02:01 Hi hayreddin,I think this is I think this is possible and these documentations can help you get started. Thu, 09/19/2019 - 10:52 please convert the file to please convert the file to html Sun, 05/24/2020 - 06:24 I would like to embed a word doc/pdf for viewing on our online platform what do I use? Or how do I do that? Mon, 05/25/2020 - 18:37 Hi AkorauTWOA,I'm afraid this I'm afraid this feature is not available in H5P.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649302.35/warc/CC-MAIN-20230603165228-20230603195228-00167.warc.gz
CC-MAIN-2023-23
804
15
http://www.dynamicdrive.com/style/csslibrary/item/pure_css_modal_window/
code
CSS Library: Other: Here Pure CSS Modal Window Author: Dynamic Drive :target pseudo class is one of those underused features of CSS with lots of exciting potential applications. It is triggered when the page's URL fragment ( matches an element's ID; in other words, when the user jumps to a specific element on the page. :target pseudo class, the following shows how to create pure CSS Modal Windows that are triggered when the user clicks on an HTML creating another HTML anchor that points to a non existent or different element on the page. Browser compatibility wise, the :target pseudo class is well supported in modern browsers, including IE9+. In lesser browsers, the modal windows simply won't be shown. Demo:Simple Modal Modal Dialog
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488286726.71/warc/CC-MAIN-20210621151134-20210621181134-00150.warc.gz
CC-MAIN-2021-25
742
16
http://en.unifrance.org/movie/26118/uproar
code
French cinema worldwide A Short film by Arnauld Visinet Produced by Local Films Production year : 2005 Antoine, 25 years old, doesn't want to be alone tonight. He goes out into the night to find a remedy to his solitude. Emmanuelle Le Fur Stéphane Léon, Benjamin Laurent, Sébastien Pierre Lapsus (2008), Uproar (2005)
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948581033.57/warc/CC-MAIN-20171216010725-20171216032725-00101.warc.gz
CC-MAIN-2017-51
320
8
https://blog.oio.de/2013/07/23/apache-cordova-adobe-phonegap-3-0-released/
code
The major new features are: - New plugin architecture – even the base APIs – like accessing the camera or address book – have been extracted to plugins so you can include the neccessary APIs only, which should result in a reduced app size. - New CLI tools with integration of PhoneGap Build, so you don’t have to install the platform SDKs locally. - Support for iOS6, Windows Phone 8, and BlackBerry 10. Support for iOS7, Firefox OS and Ubuntu will follow. - New APIs: InAppBrowser and Globalization. For further details, take a look at the official announcement.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662539101.40/warc/CC-MAIN-20220521112022-20220521142022-00552.warc.gz
CC-MAIN-2022-21
571
6
https://community.khronos.org/t/uniform-buffer-object-sharing/71928
code
I’d like to share a UBO between multiple programs. But, what happens if two programs use the same block name but the contents of the uniform block are slightly different? Is there a way to detect that uniform block are truly the same across multiple programs? Sharing contexts only works in the same process. Quote: “You can only share display lists with rendering contexts within the same process.” If you use shared contexts the object IDs will be unique. For example two threads each with his own GL context (but shared) Will take care for you that myTextureId1 and myTextureId2 will each have a unique ID over the shared contexts. But you must use fances or glFinish after one thread worked with an GL Object before signaling the other thread that he can touch that GL Object! The “shared” and “std140” layout qualifiers should defeat any compiler optimizations that would eliminate unused block members. But you do need to declare the blocks identically in all the programs you intend to share blocks. (You can put the block declaration in its own string, remember that program compilation accepts multiple strings.) After linking, you should introspect the block layouts to convince yourself; see glGetActiveUniformsiv, with UNIFORM_OFFSET, UNIFORM_ARRAY_STRIDE, etc.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337421.33/warc/CC-MAIN-20221003133425-20221003163425-00519.warc.gz
CC-MAIN-2022-40
1,287
8
https://www.chaitanyalella.com/job-knowledge/what-is-the-purpose-of-the-following-files-having-extensions-1-frm-2-myd-3-myi-what-do-these-files-contain
code
What is the purpose of the following files having extensions 1) .frm 2) .myd 3) .myi? What do these files contain? In MySql, the default table type is MyISAM. Each MyISAM table is stored on disk in three files. The files have names that begin with the table name and have an extension to indicate the The ‘.frm’ file stores the table definition. The data file has a ‘.MYD’ (MYData) extension. The index file has a ‘.MYI’ (MYIndex) extension, Leave a Reply.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648465.70/warc/CC-MAIN-20230602072202-20230602102202-00243.warc.gz
CC-MAIN-2023-23
468
8
https://www.npmjs.com/package/react-credit-card
code
React credit card Card by @jessepollakReact port of the display part of - Look like Card. - Provide a react interface for displaying credit card information. How to install npm install react-credit-card - Add the build/card-types.cssfiles to your app's stylesheets (This step may be unnecessary in the future) How to use (Check the test index.cjsx for a better overview) cvc: number(max 4 characters, will cut the rest)(The "/" will be automatically added) name: string (max 2 lines) number: credit card number(max 16 characters, will cut the rest) expiry: number(max 4 characters, will cut the rest) focused: one of the above fields - cvc (Upon focusing cvc, the form will be rotated until this is changed.) namePlaceholder: The text displayed as placeholder of name field (default is: "FULL NAME") expiryAfter: The text displayed on the left of the expiry date expiryBefore: The text displayed above the expiry date shinyAfterBack: The text displayed at the back of the card near the shiny thing type: Available in case you need to explicitly specify the card type. In most cases this will be inferred for you as the user fills the form, so you won't need to use it. One of the following: Missing features towards the intended goals - Images are inlined using base64, Card uses images created with css. - Allow for some way to indicate that a field is invalid, and style appropriately to indicate errors. - Add more credit card variations, to the extent that Payment supports. - Maybe inline styles according to facebook's new guidelines, for now the styles are in a separate stylesheet. - Automated test suite. - There is no intention to port the form or validation part of Card. This is merely for display. - Flat background colors for the various cards. - Placeholder symbols are progressively filled while changing the values. - Clone the repo - Run npm install - Run npm start - Use test/index.html for testing behaviour and display It was developed on a local webserver so it doesn't come with any server tools. If someone wants to add a more fleshed out build/testing process (gulp/grunt/webpack) it's very much welcome. Most of the credit goes to @jessepollak for creating and mantaining Card, I just ported it over.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494976.72/warc/CC-MAIN-20230127101040-20230127131040-00222.warc.gz
CC-MAIN-2023-06
2,226
35
https://thestarman.narod.ru/asm/mbr/MBRWiz.html
code
[Note: TheStarman decided to keep the most recent instructions for Roger Layton's free MBRWizard software on this site. Except for notes, in brackets, all other statements were made by Roger himself before his web site was removed from the Net about the end of November, 2003. (Note: Some time later he did start a new site for selling his [ MD5 Sums: MBRWiz.exe = a6c645ef2f30abf61fcdbe5e76999730 MBRWiz is a command line tool designed to directly modify the MBR, with the capability to set partitions active for booting, delete or hide partitions, back up and restore copies of the MBR, as well as sort the partition entries. Included in the download is a 32 bit version (MBRWiz.exe) for Windows NT/2K/XP/PE/2003, a 16 bit executable (MBRWizD.exe) for DOS and Win9x, as well as a version for Linux. MBRWiz v1.52 has been released as Public Domain software, by me, Roger Layton. I have designed and developed this software to directly modify the MBR which can (and possibly will) destroy partitions and data on the hard disk. I can take no responsibility for any loss of partition information or data loss by using this program. Version 1.52, dated November 13th, 2003 can be downloaded, as freeware, here [Web site no longer exists! As and alternative, use this: Product Site's LEGACY Downloads Page.] Visit the Homepage at http://mbr.bigr.net [ Web site no longer exists, but it will forward you to the same commercial site listed above.] Command Line Options |Display the partitions listed in the MBR, their order in the MBR, partition type, size, and whether active or hidden. The Pos field indicates the order the partitions are laid out on disk, while MBRndx shows them as they're listed in the MBR record. |It isn't uncommon for the partition entries in the MBR to be unsorted, meaning that their order in the MBR doesn't match the order on disk. This normally wasn't a problem until Windows NT/2K/XP came along with its new boot loader, and the requirement for each partition entry in the boot.ini to point to the actual partition number. This option will sort the entries in the MBR to match their order on disk. |Returns an ErrorLevel code based on the status of the partition entries: 0 = Sorted 1 = Not Sorted |Selects the disk to use for all operations. This switch is always processed first, verifying that all operations specified on the command line will use the disk specified here. If not specified, Disk 0 will be used by default. All operations use the physical location of the partition on the disk (the first column in /list), while the MBRndx simply identifies the current position of the partition entry in the MBR. |Sets the partition specified by # active for booting. If the partition is hidden it will unhide it before setting it active. No other partitions will be hidden, or otherwise changed by this command. DOS and Win9x do not properly recognize multiple visible primary partitions, so make certain you also hide remaining primary partitions if necessary. |Sets the partition specified by # in-active, therefore it will no longer be bootable. This option will not automatically set another partition active. An entry of * (asterisk) will cause all partitions to be set as inactive. |Hides the partition number specified by #. An entry of * (asterisk) will cause all partitions to be hidden Un-Hides the partition number specified by #. An entry of * (asterisk) will cause all partitions to be unhidden. |Deletes the partition specified by #. |Selecting an option of 1 will wipe the MBR clean, effectively removing all information from the first sector of the disk. An option of 2 will remove all information from the first (hidden) 63 sectors of the disk. |Saves the current MBR to filename, where filename is a drive:\path combination to store the file. Substituting the word SECTOR for filename will store the MBR in a hidden sector on the disk |Reads an MBR file from filename, where filename is an existing path:\filename containing the backed up contents of the MBR. Substituting the word SECTOR for filename will restore the MBR from the hidden sector on the disk, if it has been previously backed up. |Show the partition structure from a backed up MBR filename or sector. |This option will list the available, bootable partitions, and allow the user to select one of them to set active. |An entry of 1 will force Windows to shutdown. An entry of 2 will force Windows to shutdown and reboot. This option may cause data loss if open programs contain unsaved data. NT/2K/XP/2003 version only. |Displays the return code for visual verification of success/failure. |Hides the display of any errors that may occur. |If no switches are specified on the command line, and a file by the name of mbrwiz.opt exists in the same folder as the executable, then the mbrwiz.opt file will be parsed for possible switches. Switches can be located on the same line, or dispersed across multiple lines. This option can be used when it's not possible to pass switches on the commandline. The following is an example option file to save the disk 1 mbr to hidden sector, then reboot the machine v 1.52 Nov 13, 2003 Minor release to resolve an issue sorting on disks other than disk 0 (zero). Fixed issue where DOS version would not properly read multiple disks Added a feature to Auto-backup the MBR if a command to sort, delete, or restore an MBR is specified. Windows version will write the file to the Temp folder specified by Windows, DOS version will write file to c:\, Linux stores file to /usr/tmp. The filename will be Disk-0.mbr, Disk-1.mbr, etc. for each physical disk in the system. v 1.5 Sep 16, 2003 Added feature to read and display the partition table from a backed up mbr file. Added feature to read command options from a text file. Added ability to deactivate all partitions using *. v 1.4.1 Sep 5, 2003 Minor release to fix display problem in DOS version v 1.4 Sep 2, 2003 Added a version for Linux, including support for IDE, SCSI, and RAID devices. v 1.3 August 12, 2003 Added support for multiple disks. Added Bootmenu option. Added ability to hide/unhide all partitions on a disk. Added functionality to save the MBR to a hidden sector on disk v 1.2 July 7, 2003 Added Wipe functionality. Added Shutdown and Reboot functionality under 32 bit v 1.1 May 25, 2003 Added support for a 32 bit version Windows version. v 1.0 March 2003 Added functionality to activate, hide, delete, and sort partitions. Save and Read the MBR from a file was also included here. Back to: MBR Tools and References Page The Starman's Realm Index Page Only Primary and Extended partitions can be displayed and modified by MBRWiz. There is no logical partition support. Also...please remember that all disk and partition operations are zero based! A return code (errorlevel) will always be returned to verify the success of any operation. A return value of 0 (zero) indicates success, values >0 will indicate failure. Specifying the /result switch will display the return code to the screen for troubleshooting. MBRWiz /active=0 /shutdown=2 Sets the first disk partition active and reboots the machine MBRWiz /disk=1 /hide=1 Hides the second partition on the second disk Sorts the partition entries in the MBR based on physical disk location Deletes the 3rd partition Saves the current MBR to a floppy disk with the filename mymbr.dat MBRWiz /disk=2 /save=SECTOR Saves the MBR for the 3rd disk in the system to a hidden sector on the disk
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816853.44/warc/CC-MAIN-20240413211215-20240414001215-00361.warc.gz
CC-MAIN-2024-18
7,453
86
https://morioh.com/p/72aabaff0e7e
code
In this video going to talk about Python Top GUI Frameworks For 2020, also iam going to talk about Installation of these GUI Frameworks with example for each one. Python Top GUI Frameworks For 2020 | Introduction & Installation PyQt5 is a Graphical User Interface GUI Framework for python. It is one of the best, powerful and popular Python GUI Framework. PyQt is a binding of Qt5 C++ a gui framework for c++ developers. You can create program in pyqt5 using coding or a using qt designer a visual dialog that you can drag and drop UI widgets PyQt5 is a free Python bindings software open-source widget-toolkit Qt, implemented for cross-platform application development framework. In the free version, certain features may not be available but if your application is open source then you can use it under a free license. PyQt is available on Windows, MacOSX, Linux, Android iOS and Raspberry Pi. Tkinter is the most popular programming package for graphical user interface or desktop apps. It is so named because of its simplicity. Tkinter is the combination of Tk and Python’s standard GUI framework. Tkinter It provides diverse widgets, such as labels, buttons, and text boxes used in a graphical user interface application. The Button control also called widgets are used to display buttons in developed application while the Canvas widget is used to draw shapes (lines, ovals, polygon…) in your application. It is a built in library for python. Qt for Python offers the official Python bindings for Qt (PySide2), enabling the use of its APIs in Python applications, and a binding generator tool (Shiboken2) which can be used to expose C++ projects into Python. Qt for Python is available under the LGPLv3/GPLv3 and the Qt commercial license. Kivy is Open source Python library for rapid development of applications that make use of innovative user interfaces, such as multi-touch apps. There are some features for kivy like. Kivy runs on Linux, Windows, OS X, Android, iOS, and Raspberry Pi. You can run the same code on all supported platforms. It can natively use most inputs, protocols and devices including WM_Touch, WM_Pen, Mac OS X Trackpad and Magic Mouse, Mtdev, Linux Kernel HID. Kivy is 100% free to use, under an MIT license, The toolkit is professionally developed, backed and used. You can use it in a commercial product. The framework is stable and has a well documented API, plus a programming guide to help you get started. The graphics engine is built over OpenGL ES 2, using a modern and fast graphics pipeline. The toolkit comes with more than 20 widgets, all highly extensible. Many parts are written in C using Cython, and tested with regression tests. wxPython is a cross-platform GUI toolkit for the Python programming language. It allows Python programmers to create programs with a robust, highly functional graphical user interface, simply and easily. It is implemented as a set of Python extension modules that wrap the GUI components of the popular wxWidgets cross platform library, which is written in C++. Like Python and wxWidgets, wxPython is Open Source, which means that it is free for anyone to use and the source code is available for anyone to look at and modify. And anyone can contribute fixes or enhancements to the project. wxPython is a cross-platform toolkit. This means that the same program will run on multiple platforms without modification. Currently Supported platforms are Microsoft Windows, Mac OS X and macOS, and Linux. Welcome to my Blog , In this article, you are going to learn the top 10 python tips and tricks. #python #python hacks tricks #python learning tips #python programming tricks #python tips #python tips and tricks #python tips and tricks advanced #python tips and tricks for beginners #python tips tricks and techniques #python tutorial #tips and tricks in python #tips to learn python #top 30 python tips and tricks for beginners Python is one of the 10 most popular programming languages of all time, The reason? It offers the flexibility and eases no other programming language offers. Want to develop a GUI for a website, or mobile App? If your answer is yes and I can guarantee in most cases it will then hire dedicated Python developers who have the experience and expertise related to your project requirements from WebClues Infotech. You might be wondering how? WebClues has a large pool of dedicated python developers who are highly skilled in what they do. Also, WebClues offers that developers for hiring at the very reasonable and flexible pricing structure. Hire a Dedicated Python developer based on what you need. Share your requirements here https://www.webcluesinfotech.com/contact-us/ Book Free Interview with Python developer: https://bit.ly/3dDShFg #hire python developers #hire python developers #hire dedicated python developers india #python developers india #hire dedicated python developers programmers #python developers in usa for hire Are you looking for experienced, reliable, and qualified Python developers? If yes, you have reached the right place. At HourlyDeveloper.io, our full-stack Python development services deploy cutting edge technologies and offer outstanding solutions to make most of the major web and mobile technologies. Hire Python developers, who have deep knowledge of utilizing the full potential of this open-source programming language. Scalability is the biggest advantage of Python, which is why it is loved by developers. Consult with experts:- https://bit.ly/2DSb007 #hire python developers #python developers #python development company #python development services #python development #python developer AppClues Infotech is one of the leading Python app development company in USA. We are a one-stop solutions provider for mobile consulting, experience design, app development, IoT development, and cloud solutions for businesses varying in size from start-up to enterprise. Our Python App Development Solutions • Machine Learning Solutions • Custom Python Development • Python Mobile App Development • Python CMS Development • Python Up-gradation & Migration • Django Framework Development For more info: #python app development #top python app development company in usa #hire python app developers in usa #how to develop python mobile app #best python app development services #custom python app development Are you looking for the best Android app development frameworks? Get the best Android app development frameworks that help to build the top-notch Android mobile app. For more info: #best android mobile app development frameworks #top mobile app development frameworks #android app development frameworks #top frameworks for android app development #most popular android app development frameworks #app development frameworks
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653608.76/warc/CC-MAIN-20230607042751-20230607072751-00662.warc.gz
CC-MAIN-2023-23
6,783
46
https://lists.osgeo.org/pipermail/openlayers-dev/2009-July/005078.html
code
[OpenLayers-Dev] plotting location on map by latitude and longitude m.r.deogade at gmail.com Mon Jul 13 10:45:04 EDT 2009 Actuly when i search location by giving latitude and longitude in google map, it plot the marker on the map of that correct perticuler location, but when i plot the marker with the same latitude and longitude using OpenLayes API it plot on different place on the map not on correct place which dose by My question is, how its??? please tell me the solution, because its very mejor issue i found in OpenLayers API. and its very argent Thanx in Advance. Mohanish R. Deogade | Software Developer LocationGuru Solutions Pvt. Ltd. 3rd Floor, Sadoday Arcade, WHC Road, Dharampeth Nagpur 440010 INDIA Ph: +91.712.255.0098 | Fax: +91.712.255.0140 | Mobile: +91.997.028.4885 -------------- next part -------------- An HTML attachment was scrubbed... More information about the Dev
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103556871.29/warc/CC-MAIN-20220628142305-20220628172305-00250.warc.gz
CC-MAIN-2022-27
893
19
https://www.gamedev.net/blogs/entry/742447-whee-a-map-editor/
code
Ok, it sucks. I know. But it works, and that's all that matters at the moment. Not bad for knocked up in half a day, either. The tile sheet I have really sucks, and Paint Shop Pro is playing silly buggers, so I'm going to attempt to edit the tilesheet in paint. Fun fun fun. I was going to be going to Dundee tomorrow, to visit a friend who's just bought a flat, but she has too much stuff to take up in her car, and too much to do when she's there. So I'll be up sometime in mid to late September for her flatwarming. Although, she only just told me that it was cancelled, so I'm not going out to Genetic tonight. Penix. Oh well, probably for the best, I can't really afford it anyway. So, I need something to do tomorrow. Probably trying to make reasonably good looking tiles and make a simple map for TEH MMORPG!!1. Next up on the list is making characters, and doing simple collision detection. Network stuff won't come for a while, since I'm completely confident with what I'll be doing, and I know I don't actually need it connecting to a server just yet. So, my (rough) todo list: I'll leave it at that for now, since that'll be enough to keep be going for a few weeks (I estimate that at 2-3 weeks work). Anyway, that'll do for now...
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823621.10/warc/CC-MAIN-20181211125831-20181211151331-00501.warc.gz
CC-MAIN-2018-51
1,242
7
http://hskhsk.pythonanywhere.com/cidian?expand=yes&q=%E5%B8%B9
code
Character: radical 巾, 11 strokes man's headband (arch.)| kerchief covering head (arch.)| jīn, towel/general purpose cloth/women's headcovering (old)/Kangxi radical 50 gǔn/shù, radical in Chinese characters (Kangxi radical 2), see 豎筆|竖笔[shù bǐ] jiōng, radical in Chinese characters (Kangxi radical 13), occurring in 用, 同, 网 etc/see ... qiè, concubine/I, your servant (deprecatory self-reference for women) nǚ/rǔ, female/woman/daughter, archaic variant of 汝[rǔ] Lì/lì, surname Li, to stand/to set up/to establish/to lay down/to draw up/at once/immed... Look up 帹 in other dictionaries Page generated in 0.001098 seconds If you find this site useful, let me know!
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662521152.22/warc/CC-MAIN-20220518052503-20220518082503-00551.warc.gz
CC-MAIN-2022-21
692
12
https://forum.dynamobim.com/t/solid-thinshell-to-revit-api/64013
code
Hey everyone, i was trying to recreate the solid.thinshell method using revit api and i have had no luck… i know the dynamo geometry is not open source but i was trying using it for a current graph i was working on. Anyone know how to recreate it? As far as I know, there is no method for this in the Revit API. Solid operations, like many of the are rather limited. Can you give some more context of what you are after? One thought would be making walls/roofs/floors by face, generating a room at the centroid of the form, pulling the room’s solid into memory, and reverting the transaction which created the rooms. I want to use it to create beam clearances for fireproofing. I already have a dynamo graph that does it but i was curious if there was a way to do it in API as well. Not that I am aware. A more effective solution in terms of speed and performance would be to generate a new structural framing family which offsets the profile used to generate the main form, and host that. This can be done with a parametric fireproofing depth, and can be used in future projects rather easily (and won’t require a new solid for a 5’ long w10x12, and a second one for a 6’ long w10x12)…
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00670.warc.gz
CC-MAIN-2022-33
1,198
6
https://www.aalisina.com/about
code
My name is Asya and I'm an artist. I live in a Russian village with two dogs, a cat and a goat. I’m inspired by nature, silly jokes and social topics. Also I am a co-founder of a small studio named DeerFoxBureau. Feel free to contact me via email or with any link below: Nice to meet you!
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250624328.55/warc/CC-MAIN-20200124161014-20200124190014-00190.warc.gz
CC-MAIN-2020-05
290
5
https://www.barnesandnoble.com/w/get-that-ghost-to-go-c-macphail/1107895301
code
Duncan's life is turned upside down when a teenage ghost begins to follow him everywhere. Table of Contents Markie and me Spooked Over my dead body Help! I'm stuck with a ghost! Enter Greg From worse to even worse! We've got to get that ghost to go! Going, going, gone Totally cool.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743247.22/warc/CC-MAIN-20181116235534-20181117021534-00224.warc.gz
CC-MAIN-2018-47
282
3
http://fairgood.net/tag-wiki-trading-bot-8895.php
code
Commentcryptohopper bitcoin trading bot review week 648 comments Litecoin mining setup windows server 2012 We choke Equality and International, not special tags wiki trading bot. Bitcoin might be the most secured about growth in the previous, but it means an enigma to many. The abstract reviews acutely online, legit by blockchains, experimentally armed bandits of records that chain a complete history of each Bitcoin. (Swot, for designing, that you could use the only number on a ten-dollar bill to do up every educative time it changed hands)..
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574265.76/warc/CC-MAIN-20190921043014-20190921065014-00036.warc.gz
CC-MAIN-2019-39
548
3
https://support.marketing360.com/hc/en-us/articles/4405185594637-View-Ad-Previews
code
Ad previews are an advanced view of your ads running within ad campaigns. Previews can be produced for supported ad types on active Facebook, Google, and Bing ads. Where to Find Ad Previews You can see the ad previews in Marketing 360® by navigating to the Ads app: - Select the Campaigns tab at the top of the page to navigate to the Campaigns dashboard. - Scroll down to the Campaign List, and select the ad campaign that you would like to preview. - On the campaign page, scroll down below the overview section, and select the Ads tab. You will see previews for all ads in this campaign. You can toggle between a "grid" and "list" view. What's Included in Ad Previews Facebook Ad Previews Facebook Ad Previews are produced using a direct link from the connected Facebook ad account. Previews are based on information and settings applied to the ad via ads managers or business managers. Some facebook ads may require additional permissions for the preview to work. Social Targeting or Retargeting ads require both an ad account and the correlating Facebook Business page to be connected to Marketing 360® (see articles for Connecting Ad Accounts and Connecting Social Accounts). Google Ad Previews Google ad previews must be reconstructed in-platform using relative ad criteria. Each ad type will typically have its own list of ad criteria used to build the ad. Currently Text, Call, and Image ads are supported in the Ad Previews feature. Dynamic ads, responsive search ads or ads using dynamic add-ons are not able to be supported. Bing Ad Previews Much like Google Ads, Bing Ads use sets of ad criteria for the construction of ads. Text, Image, and Call-only ads are supported. Dynamic Ads are not supported for the Ad Previews feature at this time.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100523.4/warc/CC-MAIN-20231204020432-20231204050432-00250.warc.gz
CC-MAIN-2023-50
1,757
14
https://kiwix.ounapuu.ee/content/raspberrypi.stackexchange.com_en_all_2023-11/questions/258/how-to-program-a-usb-device-with-debian-python
code
Pasting this here for anyone else on the bunny trail that I was today (Oct 5, 2014). NOTE: this is from a very inexperienced PoV so, this may be obvious to many of you, but it wasn't for me and took awhile to figure out. I'm trying to interface a simple laser barcode scanner to a RaspberryPi B+ via USB, literally no experience with Linux/RBPi etc. Eventually Google searching brought me to this page. I got to the answer provided by David Sykes on Jun 15, 2012 with the PyUSB reference and from there I found ADAFruit's Installing Python & PyUSB, as part of their hacking of a Microsoft Kinect.. I feel I could have gotten through it pretty quickly if it were just on my PC. But doing this through a RaspberryPi was really throwing me for a loop. If you read through that guide, you'll hit the same roadblock I did where you can't download stuff and you can't simply mash in the things they say without the files. So how do you get the files if you can't download them? [Maybe there is a way to download these files, but on my Pi I kept getting an Error 400 on source forge and Midori wouldn't download the Tar or Zip files.] Referencing Walac's PyUSB, you can enter to first part into the LXTerminal to get libusb but then the next command given assumes you have the files for PyUSB and that you can locate them through the directory. So HERE are my altered steps to get LibUSB and PyUSB installed on a RaspberryPi: Order of commands I entered into the LXTerminal: sudo apt-get install python libusb-1.0 Confirm with Y sudo apt-get install python-pip sudo pip install --upgrade pyusb NOTE: some of this may already be on your RBPi depending on what you've done before this, but doing the commands again won't hurt it, it simply told me that the file was up to date. The last command "--upgrade pyusb" gave me the following: Downloading pyusb-1.0.0b1.tar.gz (44Kb): 44Kb downloaded Running setup.py egg_info for package pyusb Installing collected packages: pyusb Running setup.py install for pyusb Successfully installed pyusb SO, I think it's all good now and I can go back to my tutorials. Again, I'm using a RaspberryPi B+, standard NOOBS install.. I've mostly referenced sources such as ADAFRUIT's LEARN system that was made with mostly the Model B, but everything I've done so far is working on the B+. Hopefully that info will help anyone else who's gotten stuck at that same point.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816904.18/warc/CC-MAIN-20240414223349-20240415013349-00126.warc.gz
CC-MAIN-2024-18
2,390
21
http://stackoverflow.com/questions/13440613/code-navigation-in-vim-and-emacs
code
There are many programs that output ctags-compatible tags files. They are often language-specific because of some low level limitations in ctags but neither they nor ctags help you when you have multiple methods with the same name because these tools only do the indexing part of the job. Searching through the index is actually Vim's job and, because it is a freaking text editor and not an IDE it has zero mean to decide which method declaration is the right one. Fortunately, Vim shows an actionable list when there are multiple hits. But that's how far you can go. Cscope is a little smarter than ctags and, when used from Vim, does the searching as well as the indexing. But, like ctags, cscope is still a code indexer. It's actually possible to use both at the same time with set cscopetags but it won't help with your naming issue. IDEs usually do their magic through language-specific parsers/static analysis tools that run in the background against your code. Vim has at least one limitation and one feature that make it hard to even imagine it ever reaching the level of code awareness that you seem to be looking for: Vim is not multithreaded. So it can't run a static analysis tool in the background. Vim supports hundreds of languages. Providing that kind of feature for that many languages would be impossible for any organization of any size. But none of this is a problem for me, because Vim is not an IDE. And because I don't have multiple methods with the same name in my projects. :tag /foo<Tab> and :cs f c bar are enough for my humble needs.
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115863063.84/warc/CC-MAIN-20150124161103-00210-ip-10-180-212-252.ec2.internal.warc.gz
CC-MAIN-2015-06
1,562
13
https://www.codeproject.com/Questions/196269/Java-Connection-To-MYSQL-Error
code
Hi all , Iam connecting to a database called "a" from a desktop application called "app1" and everything is fine.But when i create another project and try to connect to a database it is not connecting.As if connecting to mysql is only successful from one project only.Knowing that iam writing exactly the same code,so how can i solve this.? Thanks in advance.!
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506423.70/warc/CC-MAIN-20230922202444-20230922232444-00506.warc.gz
CC-MAIN-2023-40
360
3
https://support.quark.com/en/support/solutions/articles/19000072431-how-to-apply-new-theme-on-mac-for-quarkxpress-2017
code
QuarkXPress on Mac introduces new themes called “Light Gray” and “Gray”. These themes give new modern look with flat icons and buttons all over the application. By default, the pre-release build is set to use new Gray theme. Further, you can switch the themes from QuarkXPress Preferences. Go to Preferences, select color design and select a new Theme color for QuarkXpress 2017.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585045.2/warc/CC-MAIN-20211016231019-20211017021019-00693.warc.gz
CC-MAIN-2021-43
387
3
https://community.appsheet.com/t/pull-field-from-most-recent-related-record/39793
code
Hello Appsheet Community, I have table caseload builder which has a one to many relationship with table site notes. I am creating a virtual column in the caseload builder. Site notes has two relevant columns: noteDate and schedStatus. noteDate is a date&time field and schedStatus is just a text. My goal is to haee the virtual column pull the value of schedStatus from the related site notes with the highest (most recent as they can’t put one in the future) noteDate. I’ve tried constructing the below but it doesn’t quite work. If there are multiple site notes it won’t pull the right sched status. ([Related siteNotes][noteDate]=LIST(MAX([Related siteNotes][noteDate]))) Any guidance here would be much appreciated! Thank you!
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178378872.82/warc/CC-MAIN-20210307200746-20210307230746-00227.warc.gz
CC-MAIN-2021-10
738
5
http://ux.stackexchange.com/questions/tagged/consultant+selling-ux
code
User Experience Meta to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site What are the first steps for growing UX operations in an agency? I'm the first UX hire at an aggressively growing digital agency. I've been doing UX for corporations for a few years and before that was mainly doing dev and some minor design work. I'm working on ... Sep 25 '12 at 13:22 newest consultant selling-ux questions feed Putting the Community back in Wiki Hot Network Questions Scrum: What is the role of the lead developer in an agile team? I need sudo without password prompt, for scripts. Where did I go wrong? Realised afterwards that I committed mild plagiarism in a paper I wrote as an undergraduate, what should I do? Should I obscure database primary keys (IDs) in application front end? Where is the best place to show validation/error messages in a form? cd .. on root folder enumitem: renaming the list marker Why are there many guitarists, but only one drummer in a band? Is there any word for a person who gives the contract to murder to someone else? Is having a sibling better for a child? Improve trigger execution with multiple threads of execution - Possible? Alternatives? What are the security measures preventing someone from chartering a 747 and using it to commit a terrorist attack? Beautiful Theorems and what constitutes as beautiful Increment up the build number in AssemblyInfo.cs on every build What time counts when it comes to remote work? Do banks give us interest even for the money that we only had briefly in our account? Is the determinant differentiable? Unable to run python file from terminal Printing 80 (or more) times the same character Reasons for using ILS approach on a clear day Why do I get a compilation error? Why hasn't NASA planted a stationary lab on Mars yet? What are easing functions? Is there a single word that means “hitting the target but missing the point”? more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223203422.8/warc/CC-MAIN-20140423032003-00154-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
2,489
54
http://www.webdeveloper.com/forum/showthread.php?241806-Form-Input-Values-and-Javascript&goto=nextoldest
code
what you are asking is doable, but i have been coding JS for 5 years now and to implement that properly is a few days work. for someone just starting JS that may be a little overwhelming. from the sounds of it, you want an overlay to come up when the user clicks on the video link, in that overlay will be a few links to ads, if one of those is clicked you want the ad to open in a new window and you overlay to load the video awaiting for the user to click play again this may be a little much depending on your skill: 1. jQuery overlay plugin = http://flowplayer.org/tools/scrollable/index.html 2. read up on popup windows (most browsers have popup blockers, so you have to open new windows in a certain way) 3. depending on your ad source you could have problems loading in an overlay, usually ad code is HORRIFIC! so its best to toss it into an iframe, but if you have expendables that causes problems. 4. good luck!
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703830643/warc/CC-MAIN-20130516113030-00008-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
920
8
https://dictionnaire.sensagent.leparisien.fr/Programmer/en-en/
code
1.a person who designs and writes and tests computer programs voir la définition de Wikipedia Adam Kennedy (programmer) • Adam Leventhal (programmer) • American Programmer • Andrew Morton (computer programmer) • Battle Programmer Shirase • Ben Collins (programmer) • Bill Stewart (programmer) • Blaine Cook (programmer) • Bob Shannon (computer programmer) • Bradley T. Hughes (programmer) • Chris Pile (programmer) • Chris Wright (programmer) • Chromatic (programmer) • Database Programmer's Toolkit • Dave Thomas (programmer) • David Abrahams (computer programmer) • David Barnes (programmer) • David Crane (programmer) • David Jones (programmer) • David MacKenzie (programmer) • Decline and Fall of the American Programmer • Donald Brown (programmer) • Flame Programmer • Game programmer • Gary Martin (programmer) • George Reese (computer programmer) • Gervase Markham (programmer) • Hacker (programmer subculture) • Harry Price (games programmer) • Ian Bell (programmer) • Igor Pavlov (programmer) • James Holmes (programmer) • James Strachan (programmer) • Jason Jones (programmer) • Jim Hall (programmer) • Jim McQuillan (computer programmer) • Joe Hewitt (programmer) • Johan Andersson (game programmer) • John Chambers (programmer) • John Walker (programmer) • Jon Hall (programmer) • Jon Woods (programmer) • Jonathan Smith (games programmer) • Julian Field (programmer) • Lars Bak (computer programmer) • Lead programmer • Lee Killough (programmer) • Linear programmer • Macintosh Programmer's Workshop • Magnus Olsson (programmer) • Malcolm Evans (computer programmer) • Mark Harris (programmer) • Martin Bryant (programmer) • Matthew Smith (games programmer) • Mel Phillips (radio programmer) • Memoirs of a Virus Programmer • Michael Sweet (programmer) • Mike Robertson (programmer) • Nicky Robinson (game programmer) • Orlando (computer programmer) • Pat Sullivan (programmer) • Paul Davis (programmer) • Paul Owens (games programmer) • Peter MacDonald (computer programmer) • Programmer (disambiguation) • Programmer (hardware) • Programmer art • Programmer's Broadcasting • Programmer's File Editor • Programmer's Notepad • Programmer's Stone • Programmer's Workbench UNIX • Programmer's key • Programmer/Operator Productivity • Radio programmer • Real Programmer • Richard Brodie (programmer) • Richard Greenblatt (programmer) • Richard Kilmer (programmer) • Rise and Resurrection of the American Programmer • Robert Carr (programmer) • Robert Cook (programmer) • Roger Gregory (programmer) • Ron Newman (computer programmer) • Sam Stephenson (programmer) • Simon Phipps (programmer) • Software Programmer • Software programmer • Stephen Crow (game programmer) • Steve Gibson (computer programmer) • Steve Turner (game programmer) • Synthesizer programmer • The Alternate Source Programmer's Journal • The Language-Free Computer Programmer/Analyst Aptitude Test (LPAT) • The Pragmatic Programmer • Tim Martin (programmer) • Tom Miller (computer programmer) • Travis Watkins (computer programmer) • UNIX Programmer's manual • UNIX programmer's manual • Unix Programmer's manual utilisateur d'ordinateur (fr)[ClasseHyper.] scientific; scholar; man of learning; scientist[ClasseHyper.] mathématiques appliquées (fr)[Classe] high technology; high-tech; hi-tech; high tech[ClasseParExt.] (machinery), (mechanisation; mechanization)[termes liés] (dead; late; disappeared), (die; decease; perish; go; exit; pass away; expire; pass; pass on; depart this life; become extinct; die out; kick the bucket; cash in one's chips; buy the farm; conk; give-up the ghost; drop dead; pop off; choke; croak; snuff it), (be dying; be at death's door; be within an ace of death; be at the point of death; be close to death; be near death; face death; be as good as dead), (soft leather), (death; dying; demise), (life insurance; life assurance), (dying), (last will), (mortal), (deathrate; death rate; mortality; mortality rate; fatality rate; birth rate/death rate)[termes liés] human being, individual, mortal, person, sb, somebody, someone, soul - being, existence, organism, survival - causal agency, causal agent, cause - egghead, intellect, intellectual - alter, change, modify - create by mental act, create mentally - encode[Hyper.] carry on, contrive, devise, direct, engine, engineer, invent, mastermind, orchestrate, organise, organize, plan out, reason out, run, think of, think out, think up - engineer - engineering, technology - applied science, engineering, engineering science, technology - individualise, individualize, personalise, personalize - personate, personify - personhood - science, scientific knowledge - science, scientific discipline - computer programing, computer programming, programing, programming - computer program, computer programme, program, programme, routine - coder, computer programmer, programmer, software engineer - coding, cryptography, secret writing, steganography - encoding, encryption - cipher, cypher - code - cipher, ciphertext, cryptograph, cypher, secret code - code, computer code[Dérivé] A programmer, computer programmer, developer, or coder is a person who writes computer software. The term computer programmer can refer to a specialist in one area of computer programming or to a generalist who writes code for many kinds of software. One who practices or professes a formal approach to programming may also be known as a programmer analyst. A programmer's primary computer language (C, C++, Java, Lisp, Python etc.) is often prefixed to the above titles, and those who work in a web environment often prefix their titles with web. The term programmer can be used to refer to a software developer, Web Developer, Mobile Applications Developer, Embedded Firmware Developer, software engineer, computer scientist, or software analyst. However, members of these professions typically possess other software engineering skills, beyond programming; for this reason, the term programmer is sometimes considered an insulting or derogatory oversimplification of these other professions. This has sparked much debate amongst developers, analysts, computer scientists, programmers, and outsiders who continue to be puzzled at the subtle differences in the definitions of these occupations. British countess and mathematician Ada Lovelace is popularly credited as history's first programmer, as she was the first to express an algorithm intended for implementation on a computer, Charles Babbage's analytical engine, in October 1842, intended for the calculation of Bernoulli numbers. Her work never ran because Babbage's machine was never completed to a functioning standard in her time; the first programmer to successfully run a program on a functioning modern electronically based computer was pioneer computer scientist Konrad Zuse, who achieved this feat in 1941. The ENIAC programming team, consisting of Kay McNulty, Betty Jennings, Betty Snyder, Marlyn Wescoff, Fran Bilas and Ruth Lichterman were the first regularly working programmers. International Programmers' Day is celebrated annually on January 7. In 2009, the government of Russia decreed a professional annual holiday known as Programmers' Day to be celebrated on September 13 (September 12 in leap years). It had also been an unofficial international holiday before that. Computer programmers write, test, debug, and maintain the detailed instructions, called computer programs, that computers must follow to perform their functions. Programmers also conceive, design, and test logical structures for solving problems by computer. Many technical innovations in programming — advanced computing technologies and sophisticated new languages and programming tools — have redefined the role of a programmer and elevated much of the programming work done today. Job titles and descriptions may vary, depending on the organization. Programmers work in many settings, including corporate information technology departments, big software companies, and small service firms. Many professional programmers also work for consulting companies at client' sites as contractors. Licensing is not typically required to work as a programmer, although professional certifications are commonly held by programmers. Programming is widely considered a profession (although some[who?] authorities disagree on the grounds that only careers with legal licensing requirements count as a profession). Programmers' work varies widely depending on the type of business they are writing programs for. For example, the instructions involved in updating financial records are very different from those required to duplicate conditions on an aircraft for pilots training in a flight simulator. Although simple programs can be written in a few hours, programs that use complex mathematical formulas whose solutions can only be approximated or that draw data from many existing systems may require more than a year of work. In most cases, several programmers work together as a team under a senior programmer’s supervision. Programmers write programs according to the specifications determined primarily by more senior programmers and by systems analysts. After the design process is complete, it is the job of the programmer to convert that design into a logical series of instructions that the computer can follow. The programmer codes these instructions in one of many programming languages. Different programming languages are used depending on the purpose of the program. COBOL, for example, is commonly used for business applications which are run on mainframe and midrange computers, whereas Fortran is used in science and engineering. C++ is widely used for both scientific and business applications. Java, C# and PHP are popular programming languages for Web and business applications. Programmers generally know more than one programming language and, because many languages are similar, they often can learn new languages relatively easily. In practice, programmers often are referred to by the language they know, e.g. as Java programmers, or by the type of function they perform or environment in which they work: for example, database programmers, mainframe programmers, or Web developers. When making changes to the source code that programs are made up of, programmers need to make other programmers aware of the task that the routine is to perform. They do this by inserting comments in the source code so that others can understand the program more easily. To save work, programmers often use libraries of basic code that can be modified or customized for a specific application. This approach yields more reliable and consistent programs and increases programmers' productivity by eliminating some routine steps. Programmers test a program by running it and looking for bugs. As they are identified, the programmer usually makes the appropriate corrections, then rechecks the program until an acceptably low level and severity of bugs remain. This process is called testing and debugging. These are important parts of every programmer's job. Programmers may continue to fix these problems throughout the life of a program. Updating, repairing, modifying, and expanding existing programs is sometimes called maintenance programming. Programmers may contribute to user guides and online help, or they may work with technical writers to do such work. Certain scenarios or execution paths may be difficult to test, in which case the programmer may elect to test by inspection which involves a human inspecting the code on the relevant execution path, perhaps hand executing the code. Test by inspection is also sometimes used as a euphemism for inadequate testing. It may be difficult to properly assess whether the term is being used euphemistically. Computer programmers often are grouped into two broad types: application programmers and systems programmers. Application programmers write programs to handle a specific job, such as a program to track inventory within an organization. They also may revise existing packaged software or customize generic applications which are frequently purchased from independent software vendors. Systems programmers, in contrast, write programs to maintain and control computer systems software, such as operating systems and database management systems. These workers make changes in the instructions that determine how the network, workstations, and CPU of the system handle the various jobs they have been given and how they communicate with peripheral equipment such as printers and disk drives. Programmers in software development companies may work directly with experts from various fields to create software — either programs designed for specific clients or packaged software for general use — ranging from computer and video games to educational software to programs for desktop publishing and financial planning. Programming of packaged software constitutes one of the most rapidly growing segments of the computer services industry. In some organizations, particularly small ones, workers commonly known as programmer analysts are responsible for both the systems analysis and the actual programming work. The transition from a mainframe environment to one that is based primarily on personal computers (PCs) has blurred the once rigid distinction between the programmer and the user. Increasingly, adept end users are taking over many of the tasks previously performed by programmers. For example, the growing use of packaged software, such as spreadsheet and database management software packages, allows users to write simple programs to access data and perform calculations. In addition, the rise of the Internet has made Web development a huge part of the programming field. More and more software applications nowadays are Web applications that can be used by anyone with a Web browser. Examples of such applications include the Google search service, the Hotmail e-mail service, and the Flickr photo-sharing service. ||The examples and perspective in this article deal primarily with the United States and do not represent a worldwide view of the subject. Please improve this article and discuss the issue on the talk page. (December 2010)| According to BBC, 17% of computer science students could not find work in their field 6 months after graduation in 2009 which was the highest rate of the university majors surveyed while 0% of medical students were unemployed in the same survey. The UK category system does, however, class such degrees as Information technology and Game design as 'computer science', somewhat inflating the actual figure. Computer programming, offshore outsourcing, and Foreign Worker Visas became a controversial topic after the crash of the dot com bubble left many programmers without work or with lower wages. Programming was even mentioned in the 2004 U.S. Presidential debate on the topic of offshore outsourcing. Large companies claim there is a skills shortage with regard to programming talent. However, U.S. programmers and unions counter that large companies are exaggerating their case in order to obtain cheaper programmers from developing countries and to avoid paying for training in very specific technologies. Enrollment in computer-related degrees in U.S. has dropped recently due to lack of general interests in science and mathematics and also out of an apparent fear that programming will be subject to the same pressures as manufacturing and agriculture careers. This situation has resulted in confusion about whether the U.S. economy is entering a "post-information age" and the nature of U.S. comparative advantages. Technology and software jobs were supposed to be the replacement for factory and agriculture jobs lost to cheaper foreign labor, but if those are subject to free trade losses, then the nature of the next generation of replacement careers is not clear at this point. |Look up programmer or coder in Wiktionary, the free dictionary.| Contenu de sensagent dictionnaire et traducteur pour sites web Une fenêtre (pop-into) d'information (contenu principal de Sensagent) est invoquée un double-clic sur n'importe quel mot de votre page web. LA fenêtre fournit des explications et des traductions contextuelles, c'est-à-dire sans obliger votre visiteur à quitter votre page web ! Solution commerce électronique Augmenter le contenu de votre site Ajouter de nouveaux contenus Add à votre site depuis Sensagent par XML. Parcourir les produits et les annonces Obtenir des informations en XML pour filtrer le meilleur contenu. Indexer des images et définir des méta-données Fixer la signification de chaque méta-donnée (multilingue). Renseignements suite à un email de description de votre projet. Jeux de lettres Lettris est un jeu de lettres gravitationnelles proche de Tetris. Chaque lettre qui apparaît descend ; il faut placer les lettres de telle manière que des mots se forment (gauche, droit, haut et bas) et que de la place soit libérée. Il s'agit en 3 minutes de trouver le plus grand nombre de mots possibles de trois lettres et plus dans une grille de 16 lettres. Il est aussi possible de jouer avec la grille de 25 cases. Les lettres doivent être adjacentes et les mots les plus longs sont les meilleurs. Participer au concours et enregistrer votre nom dans la liste de meilleurs joueurs ! Jouer Dictionnaire de la langue française La plupart des définitions du français sont proposées par SenseGates et comportent un approfondissement avec Littré et plusieurs auteurs techniques spécialisés. Le dictionnaire des synonymes est surtout dérivé du dictionnaire intégral (TID). L'encyclopédie française bénéficie de la licence Wikipedia (GNU). Changer la langue cible pour obtenir des traductions. Astuce: parcourir les champs sémantiques du dictionnaire analogique en plusieurs langues pour mieux apprendre avec sensagent. calculé en 0,078s
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500339.37/warc/CC-MAIN-20230206113934-20230206143934-00303.warc.gz
CC-MAIN-2023-06
18,114
52
https://www.catalyzex.com/author/Lianwu%20Chen
code
In recent years, deep neural networks (DNNs) based approaches have achieved the start-of-the-art performance for music source separation (MSS). Although previous methods have addressed the large receptive field modeling using various methods, the temporal and frequency correlations of the music spectrogram with repeated patterns have not been explicitly explored for the MSS task. In this paper, a temporal-frequency attention module is proposed to model the spectrogram correlations along both temporal and frequency dimensions. Moreover, a multi-scale attention is proposed to effectively capture the correlations for music signal. The experimental results on MUSDB18 dataset show that the proposed method outperforms the existing state-of-the-art systems with 9.51 dB signal-to-distortion ratio (SDR) on separating the vocal stems, which is the primary practical application of MSS. Speech enhancement methods based on deep learning have surpassed traditional methods. While many of these new approaches are operating on the wideband (16kHz) sample rate, a new fullband (48kHz) speech enhancement system is proposed in this paper. Compared to the existing fullband systems that utilizes perceptually motivated features to train the fullband speech enhancement using a single network structure, the proposed system is a two-step system ensuring good fullband speech enhancement quality while backward compatible to the existing wideband systems. In this paper, we exploit the effective way to leverage contextual information to improve the speech dereverberation performance in real-world reverberant environments. We propose a temporal-contextual attention approach on the deep neural network (DNN) for environment-aware speech dereverberation, which can adaptively attend to the contextual information. More specifically, a FullBand based Temporal Attention approach (FTA) is proposed, which models the correlations between the fullband information of the context frames. In addition, considering the difference between the attenuation of high frequency bands and low frequency bands (high frequency bands attenuate faster than low frequency bands) in the room impulse response (RIR), we also propose a SubBand based Temporal Attention approach (STA). In order to guide the network to be more aware of the reverberant environments, we jointly optimize the dereverberation network and the reverberation time (RT60) estimator in a multi-task manner. Our experimental results indicate that the proposed method outperforms our previously proposed reverberation-time-aware DNN and the learned attention weights are fully physical consistent. We also report a preliminary yet promising dereverberation and recognition experiment on real test data. Recently we proposed an all-deep-learning minimum variance distortionless response (ADL-MVDR) method where the unstable matrix inverse and principal component analysis (PCA) operations in the MVDR were replaced by recurrent neural networks (RNNs). However, it is not clear whether the success of the ADL-MVDR is owed to the calculated covariance matrices or following the MVDR formula. In this work, we demonstrate the importance of the calculated covariance matrices and propose three types of generalized RNN beamformers (GRNN-BFs) where the beamforming solution is beyond the MVDR and optimal. The GRNN-BFs could predict the frame-wise beamforming weights by leveraging on the temporal modeling capability of RNNs. The proposed GRNN-BF method obtains better performance than the state-of-the-art ADL-MVDR and the traditional mask-based MVDR methods in terms of speech quality (PESQ), speech-to-noise ratio (SNR), and word error rate (WER). Many purely neural network based speech separation approaches have been proposed that greatly improve objective assessment scores, but they often introduce nonlinear distortions that are harmful to automatic speech recognition (ASR). Minimum variance distortionless response (MVDR) filters strive to remove nonlinear distortions, however, these approaches either are not optimal for removing residual (linear) noise, or they are unstable when used jointly with neural networks. In this study, we propose a multi-channel multi-frame (MCMF) all deep learning (ADL)-MVDR approach for target speech separation, which extends our preliminary multi-channel ADL-MVDR approach. The MCMF ADL-MVDR handles different numbers of microphone channels in one framework, where it addresses linear and nonlinear distortions. Spatio-temporal cross correlations are also fully utilized in the proposed approach. The proposed system is evaluated using a Mandarin audio-visual corpora and is compared with several state-of-the-art approaches. Experimental results demonstrate the superiority of our proposed framework under different scenarios and across several objective evaluation metrics, including ASR performance. We present an efficient and realistic geometric sound simulation approach for generating and augmenting training data in speech-related machine learning tasks. Our physically based acoustic simulation method is capable of modeling occlusion, specular and diffuse reflections of sound in complicated acoustic environments, whereas the classical image method can only model specular reflections in simple room settings. We show that by using our synthetic training data, the same models gain significant performance improvement on real test sets in both speech recognition and keyword spotting tasks, without fine tuning using any real data. The end-to-end approach for single-channel speech separation has been studied recently and shown promising results. This paper extended the previous approach and proposed a new end-to-end model for multi-channel speech separation. The primary contributions of this work include 1) an integrated waveform-in waveform-out separation system in a single neural network architecture. 2) We reformulate the traditional short time Fourier transform (STFT) and inter-channel phase difference (IPD) as a function of time-domain convolution with a special kernel. 3) We further relaxed those fixed kernels to be learnable, so that the entire architecture becomes purely data-driven and can be trained from end-to-end. We demonstrate on the WSJ0 far-field speech separation task that, with the benefit of learnable spatial features, our proposed end-to-end multi-channel model significantly improved the performance of previous end-to-end single-channel method and traditional multi-channel methods.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476432.11/warc/CC-MAIN-20240304065639-20240304095639-00295.warc.gz
CC-MAIN-2024-10
6,518
7
https://www.aldeburghpoetryfestival.org/how-do-i-add-in-system-io/
code
The Ultimate Short Go Highlevel Review 2022- GoHighlevel Review Have you ever before visualize having ClickFunnels as your software program application to develop your firm web site as well as funnels? Exactly how about an all-in-one system that additionally permits you to track customers, take care of jobs, as well as automate your sales process? Well, that’s specifically what GoHighLevel is. GoHighLevel is a total sales and advertising automation platform made especially for companies. It includes every little thing you need to run your company, from a CRM to a project management device, to an email advertising and marketing platform, to an agreement administration system. And also, it comes with an integrated blog writing system and social media sites management tool, so you can easily create and take care of content for your customers. GoHighLevel is a terrific option for firms of all sizes, as it uses a wide range of features and also a budget-friendly rate factor. If you’re searching for an all-in-one remedy for your firm, after that be sure to check out GoHighLevel. Go Highlevel Review: Overview In this write-up, we will cover the following topics: - What is GoHighLevel? - What are the crucial functions of GoHighLevel? - Just how much does GoHighLevel cost? - Who is GoHighLevel for? What is GoHighLevel? GoHighLevel is a complete sales and advertising automation platform created especially for agencies. It consists of everything you need to run your firm, from a CRM to a project management device, to an email advertising and marketing platform, to a contract management system. Plus, it comes with an integrated blog writing system as well as social media sites administration device, so you can easily produce as well as take care of material for your clients. GoHighLevel is a fantastic option for companies of all sizes, as it offers a large range of features and an economical rate point. Be sure to check out GoHighLevel if you’re looking for an all-in-one service for your firm. What are the key attributes of GoHighLevel? GoHighLevel consists of everything you need to run your firm, from a CRM to a project monitoring tool, to an email advertising and marketing platform, to a contract administration system. And also, it features an integrated blog writing platform and also social media monitoring tool, so you can conveniently develop as well as manage web content for your clients. Some of the crucial attributes of GoHighLevel consist of: Agency CRM: Keep track of your clients as well as leads with the built-in CRM. Task monitoring: Stay on top of your projects with the built-in task monitoring device. Email advertising and marketing: Automate your e-mail marketing with the integrated email platform. Agreement monitoring: Manage your agreements with the built-in contract monitoring system. Social media site management: Publish and also schedule web content to social media sites with the built-in social media monitoring tool. How much does GoHighLevel cost? With all the attributes stated what do you think GoHighLevel would cost you? You would be surprise to know that it just set you back $97 per month for the entire collection of products. We really feel that this is a wonderful value for what you obtain, especially when contrasted to various other all-in-one solutions on the marketplace. Do you recognize what’s the most effective part? You can try GoHighLevel for free for 14 days, so you can see if it’s the ideal fit for your agency. And would you like to hear something also crazier? You can branded the software with your company domain and tailor the system for branding objective! How much you think that would cost you? A great deal right? However with GoHighLevel, it only cost you $297 monthly! That’s an unbelievable offer that you do not intend to miss out on. Do not trust me? Go check it out on your own below. That is GoHighLevel for? GoHighLevel is a wonderful choice for agencies of all sizes, as it supplies a vast array of attributes as well as a budget-friendly price point. If you’re trying to find an all-in-one option for your company, after that make sure to check out GoHighLevel. GoHighLevel is for you if you aware of the value of branding. After that GoHighLevel is for you, if you do not mind the knowing curve as well as have everything one roof. If you are an advertising training agency that wishes to supply business in a box after that GoHighLevel is for you because you can export and also import it with a click of switch. Watch this video from 7 Figure Agency Josh Nelson sharing his experience on using Go HighLevel. Who is GoHighLevel Not for? GoHighLevel requires some technical knowledge not as simple as ClickFunnels. It is still much easier then WordPress … Oh another things is GoHighLevel an additional points suitable for eCommerceRather ThenClickFunnels + Shopify would certainly be a far better combination, if you run eCommerce shop. And also lastly, GoHighLevel can not store details on clinical and also law stuff. That you need some individual data source for that. GoHighLevel Pros and Cons - All-in-one remedy - Cost effective cost - 14-day complimentary trial - Needs some technical knowledge - Not quite appropriate for eCommerce To conclude, GoHighLevel is an all-in-one sales and marketing automation platform designed specifically for firms. It consists of every little thing you require to run your company, from a CRM to a project administration tool, to an email marketing platform, to an agreement administration system. Plus, it comes with a built-in blogging platform and also social media administration device, so you can easily take care of and also produce content for your customers. If you’re looking for an all-in-one remedy for your agency, then make sure to look into GoHighLevel.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334987.39/warc/CC-MAIN-20220927033539-20220927063539-00797.warc.gz
CC-MAIN-2022-40
5,834
67
https://archive.sap.com/discussions/thread/3671744
code
What is actual job role of ABAPer in company ? I wanted to know the job role of ABAPer in company. I had switched my company over a months ago, and I am getting work like debug standard transaction(I feels like punishment) and understand the logic and decode this logic into excel and create HANA views. Is that the way to decode standard SAP programs?? @ Moderator : I am confused where to post this question, so I approached here to get advice from experienced ABAPer.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583680452.20/warc/CC-MAIN-20190119180834-20190119202834-00239.warc.gz
CC-MAIN-2019-04
470
5
https://deltinger.com/2019/12/09/add-the-group-calendar-to-teams/
code
When a Team is created an Office 365 group is also created behind the scenes. This also means a number of other workloads is provisioned, including a Outlook group calendar. On many occasions I’ve been asked how to leverage this calendar in Microsoft Teams, since there is no default view of this calendar in Teams. In several cases I’ve configured the solution below and even though it’s not a perfect solution, it mostly fulfills the desired needs my customers asked for. What is the “Solution” ? As mentioned above, several workloads is provisioned in the creation of a team in Microsoft Teams. In this solution we will use the following solutions: - The group calendar belonging to the group inbox also created in Outlook. - The SharePoint Home page (or additional page created) from the auto created SharePoint site created. - The “Group Calendar” Webpart - A SharePoint tab in Microsoft Teams to visualize the webpart on the SharePoint page Using the above we can add a tab in Teams that shows the Group Calendar webpart. This webpart is not a full featured calendar view but it has the capability to show the next 10 future events/meetings as well as past events. There is also an option to add an event to your own personal calendar, as well as click a link to open the calendar in Outlook in a browser to add/change/delete events and meetings. Another great aspect of using this is that guests in Microsoft Teams can view this webpart and sync it to their calendar. Normally a guest in Teams can’t access the group calendar since they have no Exchange license provisioned. How do I do this? I have a team named “Events” in Microsoft Teams. I go in to the channel in which I want to add the tab to view my group calendar events. I add the tab by clicking the + button. (See picture) Next I choose the SharePoint tab. By selecting this I get below prompt. I get two options on the Pages tab: “News” and “Home”. Select “Home” You will now have you SharePoint start page as a tab in your prefered channel in Teams. Rename the tab to something like “Calendar” Next, we want to edit this page to only contain the group calendar webpart! To get to the SharePoint page itself to do this, click the “Go to website” button in the upper right corner in Teams while the tab is selected (See picture) Click “Edit” in the upper right corner of the SharePoint page. (See picture) You will now have the possibility to customize this page. You can remove/add any web parts you want or do as I and remove all web parts. To remove any default web parts on the page, select it and click the trash bin icon to the left (See picture) Do this or customize the page to your liking. I removed all web parts and now clicked the little + icon on the top of the page to add a webpart. Scroll down til you find the “group Calendar” webpart and select it. (See picture) You will now have the webpart on the page visible. To customize the webpart click on the little pen on the left of the webpart. You can here select what calendar you want to show (Default is the corresponding calendar to the Site, which we want here) and the number of events you want to show on the webpart (Maximum of 10) Don’t forget to publish the changes! Now go back to Microsoft Teams and reload the tab. You will now only see the Group calendar webpart. It’s now empty so let’s add an event! Since a while back, both the group inbox and the group calendar are hidden from Outlook when you create a team in Microsoft Teams. This change was made to make users less confused what to use or not to use for collaboration and since the workload provision was initiated from the Microsoft Teams application, Teams was probably the wanted tool for the user. Why is this important?? Before the new Outlook experience rolled out and became the default one, you could still access the group calendar by clicking the calendar link in the group calendar webpart. As for today, you will just end up in your own outlook calendar in the browser. If I click the link to the calendar from the web part a browser will open up and direct me to my own calendar. No sight of the group calendar. (See picture) So, with the new Outlook experience, we need to unhide the group in Outlook. A side note to this is that once it’s visible in Outlook the inbox is also visible to all the members of the group (Includes the Team), so communicating this to everyone to avoid confusion is recommended. To unhide a group from Outlook you need to use Powershell. - Start off with connecting to exchange online: - Run the command: Set-UnifiedGroup “name of group including domain” -hiddenfromexchangeclientsenabled: $false Set-UnifiedGroup email@example.com -hiddenfromexchangeclientsenabled: $false Now when you click the link in the group calendar webpart you will now see the calendar: This calendar can now be viewed both from the Outlook desktop client as well as online by any internal user, and they can start adding events and meetings. Let’ start adding an event: Click the link named the webpart in Teams or go through the Outlook application to reach the group calendar. Click on any timeslot to add an event. A window will open. (See picture below from Outlook on the web) Add any details and click send. Reload the calendar tab back in Microsoft Teams and you will now see the event. I’ve created three of them: By clicking on the title you get more details and see the whole description. You can also add the event to your own calendar. (Great for guests who cant access the calendar in Outlook) This is it! It takes a little extra time to configure the visibility in Outlook with powershell the first time, but once you get the hang of it, 10 minutes is all it takes to set this up! If I’ve missed anything or you have any questions, feel free to reach out to me! 3 thoughts on “Add the group calendar to Teams” Thanks for this. It was very helpful. Thanks!!! Took me 5 hours of searching to get to your simple solution. At my office, the group calendar shows by default, and the sharepoint webview worked like a charm! Thanks very nice blog!
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648635.78/warc/CC-MAIN-20230602104352-20230602134352-00365.warc.gz
CC-MAIN-2023-23
6,148
43