url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
http://www.trustport.com/manuals/esignpro/enu/sog_method.htm
code
TrustPort eSign PRO Security Object Generator Page: Generation Method Security Object Generator has three basic methods of the key pair generation. The first one Generate into storage processes in a way that the key pair is generated with help of the basic cryptographic functions supplied with TrustPort eSign PRO program. The key pair is imported into the destination storage after generation. The second method Generate by storage secures that the key pair is generated directly in the destination storage. It means that the user can generate the key pair to a hardware device. The key pair is generated directly inside of this hardware device. If the user selects generation inside of the local storage then the key pair will be generated with the help of cryptographic functions supplied with TrustPort eSign PRO program. The third method Save to file serves for the key pair generation in the computer memory and the following placement to the output file. This file can be any time imported to a storage with help of Security Object Importer module. The user should preset the switches according to what method he wants to use.
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207930143.90/warc/CC-MAIN-20150521113210-00253-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
1,134
4
https://www.ijert.org/ml-algorithms-for-deaf-dumb-and-blind-assistive-device
code
- Open Access - Authors : P Thanush, Nagaraj Bhat - Paper ID : IJERTCONV11IS05095 - Volume & Issue : Volume 11, Issue 05 (ICEI – 2023) - Published (First Online): 07-07-2023 - ISSN (Online) : 2278-0181 - Publisher Name : IJERT - License: This work is licensed under a Creative Commons Attribution 4.0 International License Ml Algorithms For Deaf, Dumb , And Blind Assistive Device ML Algorithms For Deaf, Dumb , and Blind Assistive Device Dept. Electronics and Communication Engineering, R.V. College Of Engineering, Bangalore, India. Dept. Electronics and Communication Engineering, R.V. College Of Engineering, Bangalore, India. AbstractTechnology has become an integral part of our lives. This has a positive impact on society, and people benefit from it. This research is focused on helping people with impairments. Machine Learning and Artificial intelligence can support people with impairments to integrate into society effectively. The World Health Organization (WHO) reports that 5 of the worlds population is deaf, blind and mute. All around the world, about billion people are deaf and mute. In their daily life, they face plenty of problems with their communication. Sign language is a linguistic process that is employed for communication among normal people and handicapped people. Learning sign language is a challenge for those with no impairment. In this article, we have discussed the methods and the aspects of conversion from speech to text, Image to speech, text to speech, and sign language recognition which makes it easy for specially-abled people. The conclusion and future scope of the work are also examined. Keywords Machine Learning(ML), Artificial Intelligence(AI) Convolution neural network(CNN), Long Short-Term Memory (LSTM), Recurrent Neural Networks(RNN), Text-to-Speech Synthesis (TTS), Connectionist Temporal Classification (CTC) and, Hidden Markov Models(HMM). This Papers objective is to create a useful ML system for people who are dumb, deaf, or blind and treat them like normal people. The World Health Organization (WHO) estimates that 1 in 6 individuals globally, or more than 1.3 billion people, would have major disability by 2022. To enable people with physical, sensory, or cognitive disabilities to live and work more successfully and independently in all facets of their lives, a variety of assistive technologies (ATs) have been developed. Smart homes now combine artificial intelligence and machine learning techniques, leading to a plethora of systems, chatbots, augmentative communication devices, smart wheelchairs, and brain-computer interfaces. The most well-known area of artificial intelligence (AI) is likely machine learning (ML), which encompasses a wide range of innovative research projects and commercial developments that offer more effective, automated, and efficient algorithms to handle large amounts of data in a variety of fields (such as computer vision, neuroscience, speech recognition, language processing, human- computer interaction, health informatics, medical image analysis, recommender systems, fraud detection, etc.). The most effective AI for this technology is of the highest caliber. The accuracy of speech recognition and word predictability can be increased with the help of Natural Language Processing (NLP) and machine learning algorithms, which can reduce dictation errors and promote productive collaboration between students and teachers. Our plans for caring for our loved ones in the future may significantly rely on AI and ML due to the increasing aging population, which is predicted to reach 2 billion people over the age of 60 by 2050. Physicians and businesspeople are already blazing a trail; just in the last ten years, investments in medical AI. Machine learning can be highly beneficial for assistive devices in several ways. Machine learning algorithms can analyse and learn from user data to personalize the assistive devices behaviour according to individual needs and preferences. The goal of this research is to aid those who have disabilities. ML/AI can help people with disabilities successfully integrate into society. It's challenging to provide solutions for those with visual, hearing, and vocal impairments with just one assistive technology. Global estimates show that in the last 20 years, there have been fewer persons who are visually impaired due to eye-related disorders. The work is focused on developing a novel method that helps the visually impaired by enabling them to hear what is portrayed as text. This is accomplished using a method that takes an image and converts it into speech signals. Literature reviews are crucial elements of academic research because they set the scene, identify the research need, direct methodological choice, and offer a critical evaluation of the body of knowledge. They advance scholarly discourse in a particular field of study and help produce new research, theoretical frameworks, and scholarly conversations. Comprehensive research and the compiling of pertinent sources are required for literature reviews. One useful tool for additional reading and citation in one's own research is the identification of essential references, seminal works, or influential scholars in the subject. Different sign language recognition systems are presented in the first manuscript .A communication framework for DnM people was presented by the authors in . They collected data using motion sensors attached to a glove while employing an automated sign language interpreter (SLI). Language Interpreter (SLI), where they collected information by attaching motion sensors to a glove. An Arduino board is used to collect the sensor data. A machine-learning technique is then used to process the gathered data. A 93% accuracy rate is achieved by the technology. presents a speech recognition system that can recognize the voice of a registered speaker. The term "AWAAZ" refers to a system that is presented in . This technology allows Deaf and Mute persons to utilize it since it uses image processing to capture their motions. The image acquisition, segmentation, morphological erosion, and feature extraction processes are the major parts of the gesture recognition system. A system that allows two-way communication is described in as Using an artificial voice recognition method and a mobile application based on visualization, Deaf and Mute and Non-Deaf and Mute people are displayed. In , the authors created an Android-based application. The Video Relay Service (VRS) and the Principal Component Analysis (PCA) methodology are used in this. The VRS functions as a manual interpreter, translating hand gestures into voice and vice versa. The PCA algorithm detects the hand gesture. The authors surveyed and published the issues faced by Deaf and Mute children and developed a web cam-based application where the images are first acquired using a webcam, then PCA is applied to extract features, and the characters are recognized using training sets. Some solutions are presented in this paper. In order to analyze sequential time series data obtained by the Leap Motion device for gesture identification, the authors of combined recurrent neural networks with Long Short-Term Memory (LSTM). Both the standard unidirectional LSTM and the bidirectional LSTM were employed by the authors. Based on the model mentioned here, together with other elements, a prediction network architecture known as the Hybrid Bidirectional Unidirectional LSTM is developed. Due to taking into account the spatial and temporal interactions between the network layers and the Leap Motion data, this model dramatically enhanced performance in both forward and reverse directions. After going through all thse papers there are still few things needed to a degree of grace we have the use of Braille system for blind we need to find a solution for it. Build a enhanced better performing tool for image to speech, speech to text and text to speech conversion with appropriate approach. So that it can be easily and duly implemented in everybodys life so that ML can make life easier and better in the future AI & ML. In this section we will have brief on all the topics and contents that we have used in the work so that it would become easier in the methodology and Results part to understand the topic present in it. A. Machine Learning In the realm of artificial intelligence (AI), machine learning (ML) is concerned with the creation of models and algorithms that allow computers to learn from experience and anticipate or decide based on data without being explicitly programmed. Making computer systems capable of autonomously learning from experience and improving their performance is the aim of machine learning. This will enable them to manage challenging jobs and arrive at reliable predictions or choices. Due to its capacity for data analysis and interpretation, pattern recognition, and prediction or decision-making, machine learning (ML) offers enormous potential for use in assistive technology. enabling the network to forecast or categorize the data. Labeled training data are frequently used to train the CNN algorithm. The input data and their related labels are fed into the network during training, and the network's parameters (weights and biases) are optimized such that the CNN algorithm can automatically recognize and extract useful features from the input data. The pooling layers down sample the feature maps, while the convolutional layers learn to recognize significant patterns and spatial hierarchies. Fig 1 : Typical CNN network working The CNN algorithm can be employed after training for a variety of tasks, including picture segmentation, object identification, and classification. Recurrent Neural Networks (RNN) An artificial neural network called a recurrent neural network (RNN) is made to handle sequential data where the sequence of the inputs is important. RNNs feature feedback connections, in contrast to conventional feedforward neural networks, which enable them to preserve an internal state or recollection of prior inputs. RNNs can recognise temporal relationships and generate predictions based on the context of prior inputs thanks to this memory. The capacity of RNNs to accommodate input sequences of different lengths is one of its fundamental characteristics. The prior concealed state serves as context for the present input as they process each input one at a time. RNNs are highly suited for applications like natural language processing, speech recognition, time series analysis, and machine translation due to their ability to model and produce sequences of data. The technique known as text-to-speech (TTS) transforms written text into spoken language. TTS is frequently applied in machine learning through the use of deep learning methods, notably neural networks. The objective is to train a model to produce excellent, natural-sounding speech from input text. The idea behind Text-to-voice (TTS) technologies is to turn written text into synthesized voice by fusing language analysis, acoustic modelling, and signal processing. B. Convolution Neural Networks(CNN) Convolutional Neural Networks (CNNs) are used for a variety of tasks, notably in the field of computer vision, and are sometimes referred to as the "CNN algorithm". It has several layers, including fully linked layers, pooling layers, activation functions, and convolutional layers. Together, these layers extract and discover pertinent elements from the incoming data, Fig 2 : Conversion from text to speech in TTS In terms of quality, naturalness, and language support, TTS systems might differ. Deep learning and neural network approaches have significantly improved TTS systems, resulting in more expressive and human-like synthesised speech. Hidden Markov Models (HMM) In the areas of speech recognition, natural language processing, and bioinformatics, hidden markov models (HMMs) are a popular statistical modelling method for pattern identification and machine learning applications. Given that the underlying system comprises unobserved or hidden states, HMMs are generative probabilistic models that excel at modelling sequential data. The system being modelled in an HMM is thought to be a Markov process, in which a system's future state depends only on its present state and not on its past states. However, it is not possible to directly observe the present status. Instead, based on its hidden state, the system produces visible symbols or observations. Beyond speech recognition and natural language processing, HMMs have a variety of uses. They may be used for anomaly detection, bio sequence analysis, part-of-speech tagging, gesture recognition, and more. They offer an effective framework for modelling and analysing sequential data, particularly when the states of the underlying system are not easily accessible. Connectionist Temporal Classification(CTC) Machine learning applications of Connectionist Temporal Classification (CTC) include sequence modelling and sequence-to-sequence tasks. Automatic voice recognition (ASR), handwriting identification, and other sequence labelling issues are frequent jobs where CTC is used. The basic goal of CTC is to make it possible for models to be trained from beginning to end for tasks involving sequence prediction without the need for explicit input-output alignment. It enables the model to internalise learning the alignment, making it appropriate for jobs where the alignment is not known or clearly specified. In CTC, the input sequence and the output sequence can both have varying lengths. The objective is to learn a mapping between the input and output sequences without explicitly demanding correspondences between the input and output components. METHODOLOGY FOR CONVERSION The Overall ML methodology will be explained with each individual components methodology will be explained in the after subtopics in this section . We will get an all round idea about the flow of work in the session and then we will follow with the results section in the upcoming pages of the article. Machine Learning Methodology In order to train and test the ML model, collect relevant data. This might consist of human input, sensor data, or other pertinent data. Make that the data is accurate, varied, and reflective of the intended user base. To eliminate noise, manage missing values, normalise the data as necessary, and perform any necessary transformations, clean and pre-process the acquired data. Pre-processing procedures might change based on the type of data being utilised and the particular ML algorithms being applied. Determine or produce from the pre- processed data relevant characteristics that will be utilised as inputs to the ML model. Fig 3 : ML Methodology Implement the ML model in the software algorithms of the assistive device. Make sure the item is thoroughly tested to make sure it works as intended and meets the demands of the user. Think about things like accessibility, user interface, and real-time processing. Gather user feedback and make adjustments to the device's functioning and design depending on actual usage. ML model should be updated and improved continuously depending on fresh data or changing user needs. Text to Speech Conversion Methodology A person can use a process for creating a text-to-speech (TTS) conversion system that includes data gathering, model training, assessment, and deployment. Fig 4 : TTS Methodology Assemble a sizable, varied text sample with the related speech recordings. To manage any incnsistencies, unusual characters, or formatting problems, clean up and preprocess the text data. Transform the voice recordings into an appropriate acoustic representation, such as spectrograms or Mel-frequency cepstral coefficients (MFCCs).Pick a TTS model architecture that works. A common option is concatenative synthesis. Utilise the preprocessed text and audio information to train the chosen TTS model. Use a variety of measures to assess the effectiveness of the trained TTS model, including the mean opinion score (MOS), naturalness, intelligibility, and alignment with the input text. Image-to-Speech Conversion Methodology Compile a dataset with pairings of photos and the labels or descriptions that go with them in text. The input photos should be preprocessed to guarantee uniform size, resolution, and colour space. The written descriptions that go with the photographs should be processed beforehand. Tokenization, punctuation removal, text conversion to lowercase, and vocabulary mapping for the terms used in the descriptions would be necessary for this. Identify visual elements in the image, and then provide the relevant speech. Speech-to-Text Conversion Methodology Accumulate a bunch of audio files with the appropriate text labels or transcriptions. To make the system more robust, make sure the dataset includes a variety of speakers, accents, and speech variants. The audio recordings should be preprocessed to guarantee consistency in format, sample rate, and length. Improve the quality by using methods like resampling, noise reduction, and normalization. From the preprocessed audio data, extract acoustic characteristics. Mel-frequency cepstral coefficients (MFCCs), delta MFCCs, and energy-based features are examples of frequently used features. The mapping between audio characteristics and their related textual labels should be taught to the model. A deep neural network is commonly used in the model, and its output layer predicts the probability of certain letters or units. Train the model to make its output even more precise. The model uses language models to increase transcription accuracy after taking the model's predictions as input. To create the final transcription, combine the outputs of the training models. Combining techniques like decoding algorithms, such as the Viterbi algorithm, can be used to identify the most probable grouping of words or units based on the probabilities from both models. Utilise relevant metrics to assess the performance of the trained models, such as the word error rate (WER) or character error rate (CER). To evaluate the precision and standard of the transcriptions produced by the system, use a separate assessment dataset. Gesture-to-Text Conversion Methodology A collection of flicks or photos in sign language and the related text descriptions. Make sure the dataset includes a variety of sign motions and is diverse in terms of backdrop colors, lighting, and hand gestures. The films or photographs of sign language should be preprocessed to guarantee uniformity in terms of size, quality, and colour. Create training, validation, and testing sets from the dataset. The validation set will be utilized for model selection and hyperparameter tweaking, while the training set will be used to train the model. Create a processing architecture that is appropriate for sign language films or pictures. Provide the architecture with the videos or pictures, then use a suitable loss function, such as categorical cross-entropy, to optimize the model's parameters. Measure relevant metrics such as accuracy, precision, recall, or F1 score to assess the models performance in recognizing sign language gestures. and Text-to-voice Synthesis (TTS).The ability of TTS systems based on HMM to produce lifelike and understandable speech has been well-proven. Higher levels of naturalness, expressiveness, and prosodic quality still present obstacles, though. HMM-based TTS systems may be significantly enhanced by further advances in training data quality, voice modelling methods, and the application of deep learning techniques. Fig 5 : Aspects of Text to Speech As you can see that the TTs based HMM model has better performance compared to the individual based models of the algorithms this proves that the TTS based HMM model has better accuracy of prediction by greater percentage than others. The aspects chart plot is shown in figure 5. B. Image to Speech Conversion In order to convert pictures into voice, Long Short-Term Memory (LSTM) and Recurrent Neural Networks (RNN) algorithms have produced promising results. The LSTM and RNN models can detect temporal relationships and provide output that is coherent for speech. The capacity to produce understandable speech that matches the content of the input pictures has been established by the LSTM and RNN models. These algorithms have proven to be capable of producing precise, believable, and understandable voice output. To overcome obstacles to gaining increased naturalness, robustness, and computational efficiency, further study and development are required. In this section we will look in all the conversions and the algorithms used for the conversion with aspects chart plot and compare them so that best results can be seen. A. Text to Speech Conversion A popular method for producing voice from text input is text to speech synthesis utilising Hidden Markov Models (HMM) Fig 6 : Aspects of Image to Speech Speech to Text Conversion It has been extensively investigated to convert speech to text using Connectionist Temporal Classification (CTC) and Hidden Markov Models (HMM), each of which has advantages and disadvantages of its own. Systems for reliably transcribing spoken words and obtaining excellent recognition performance based on CTC and HMM have demonstrated encouraging results. CTC models may accurately capture the temporal relationships and patterns in speech, leading to accurate transcriptions. These models are often based on deep neural networks (DNNs) or recurrent neural networks (RNNs). HMM- based systems may successfully include linguistic context and boost transcription accuracy when used in conjunction with language models. When there are homophones or context- dependent changes, language models can improve recognition, aid with ambiguities, and represent the statistical regularities of language. Fig 7 : Aspects of Speech to Text The conversion of voice to text has showed promise using both CTC and HMM-based methods. While HMM-based systems excel at adding linguistic context through language models, CTC models enable end-to-end training and resilience to temporal misalignments. In order to further improve the accuracy, robustness, and efficiency of voice to text conversion systems, research is now focused on integrating the advantages of both methodologies and investigating cutting-edge deep learning techniques. The CTC based HMM system has validated the conversion in a better way so that the output can be so accurate. Gesture to text Conversion In order to comprehend hand motions, a CNN architecture is highly suited for examining spatial data in a picture or video frames. Multiple convolutional layers may be used in the design, followed by pooling layers to extract useful information. Depending on the project's unique goals, more fully linked layers are used for classification or regression tasks. There are training and validation sets created from the dataset. A method based on CNN that converts gestures or sign language to text shows potential for those who have speech impairments. The dataset's quality, the model's design, and the training procedure all affect the outcomes. The main benefit of utilising ML and CNN-based gesture or sign language detection is to help those who have trouble speaking interact with others. Fig 8 : Gesture to Text Prediction For this conversion, any other algorithm hasnot been considered other than CNN as we had time constraint while building the work the aspects of the CNN alone in shown in Figure 9. Fig 9 : Gesture to Text Aspects The Accuracy and the aspects of the conversion are very good in numbers as you can see in the chart plot. The latency and the Real time performance of the CNN algorithm is good and useful for the prediction. CNN-based ML-based gesture or sign language to text conversion systems have enormous potential to change the lives of people with speech problems by enabling them to communicate effectively, participate actively, and be accepted in different facets of society. For the benefit of those with visual impairments, LSTM and RNN algorithms provide useful capabilities for transforming images into audio descriptions, giving them access to visual information via aural methods. Using TTS synthesis with HMM, it is possible to effectively translate written text into spoken speech. The system offers linguistic adaptability, natural-sounding voices that may be customised, and adaptation to various text inputs. For speech- to-text conversion, the combination of CTC and HMM algorithms offers a number of substantial benefits. Their resistance to temporal fluctuations, capacity to represent languages, flexibility in using them, noise resistance, scalability, and continuing are now useful tools for correctly converting spoken language to printed form thanks to developments. The development of other cutting-edge technologies, such as computer vision, natural language processing, robotics, and wearables, may be taken advantage of by ML-based assistive devices. With the help of this integration, it will be possible for people with disabilities to interact in a variety of contexts in a more smooth and natural way. The future of assistive technology based on ML algorithms looks bright. For people with impairments, ML algorithms offer the potential to create highly personalised, context-aware, and adaptable solutions that improve engagement, communication, and independence. Continued innovation-spurring research, development, and interdisciplinary cooperation will increase the capabilities of assistive technology, enhancing accessibility and fostering inclusion for everyone. REFERENCES Vaidya, O.; Gandhe, S.; Sharma, A.; Bhate, A.; Bhosale, V.; Mahale, R. Design and development of hand gesture based communication device for deaf and mute people. In Proceedings of the IEEE Bombay Section Signature Conference (IBSSC), Mumbai, India, 46 December 2020; pp. 102106. Marin, G.; Dominio, F.; Zanuttigh, P. Hand gesture recognition with Leap Motion and Kinect devices. In Proceedings of the IEEE International Conference on Image Processing (ICIP), Paris, France, 2730 October 2014; pp. 15651569. Saleem, M.I.; Otero, P.; Noor, S.; Aftab, R. Full duplex smart system for Deaf & Dumb and normal people. In Proceedings of the Global Conference on Wireless and Optical Technologies (GCWOT), Mlaga, Spain, 68 October 2020; pp. 17. Deb, S.; Suraksha; Bhattacharya, P. Augmented Sign Language Modeling (ASLM) with interaction design on smartphoneAn assistive learning and communication tool for inclusive classroom. Procedia Comput. Sci. 2018, 125, 492500. Howard, A.G.; Zhu, M.; Chen, B.; Kalenichenko, D.; Wang, W.; Weyand, T.; Andreetto, M.; Adam, H. MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications. arXiv 2017, arXiv:1704.04861. Rishi, K.; Prarthana, A.; Pravena, K.S.; Sasikala, S.; Arunkumar, S. Two-way sign language conversion for assisting deaf-mutes using neural network. In Proceedings of the 8th International Conference on Advanced Computing and Communication Systems, ICACCS 2022, Coimbatore, India, 2526 March 2022; pp. 642646. Anupama, H.S.; Usha, B.A.; Madhushankar, S.; Vivek, V.; Kulkarni, Y. Automated sign language interpreter using data gloves. In Proceedings of the International Conference on Artificial Intelligence and Smart Systems (ICAIS), Coimbatore, India, 2527 March 2021; pp. 472476. Kawai, H.; Tamura, S. Deaf-and-mute sign language generation system. Pattern Recognit. 1985, 18, 199205. Bhadauria, R.S.; Nair, S.; Pal, D.K. A Survey of Deaf Mutes. Med. J. Armed Forces India 2007, 63, 2932. Sood, A.; Mishra, A. AAWAAZ: A communication system for deaf and dumb. In Proceedings of the 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India, 79 September 2016; pp. 620624. Yousaf, K.; Mehmood, Z.; Saba, T.; Rehman, R.; Rashid, M.; Altaf, M.; Shuguang, Z. A Novel Technique for Speech Recognition and Visualization Based Mobile Application to Support Two-Way Communication between Deaf-Mute and Normal Peoples. Wirel. Commun. Mob. Comput. 2018, 2018, 1013234. Raheja, J.L.; Singhal, A.; Chaudhary, A. Android Based Portable Hand Sign Recognition System. arXiv 2015, arXiv:1503.03614. Soni, N.S.; Nagmode, M.S.; Komati, R.D. Online hand gesture recognition & classification for deaf & dumb. In Proceedings of the International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 2627 August 2016; pp. 14. Chakrabarti, S. State of deaf children in West Bengal, India: What can be done to improve outcome. Int. J. Pediatr. Otorhinolaryngol. 2018, 110, 3742. Ameur, S.; Khalifa, A.B.; Bouhlel, M.S. Chronological pattern indexing: An efficient feature extraction method for hand gesture recognition with Leap Motion. J. Vis. Commun. Image Represent. 2020, 70, 102842. Ameur, S.; Khalifa, A.B.; Bouhlel, M.S. A novel hybrid bidirectional unidirectional LSTM network for dynamic hand gesture recognition with Leap Motion. Entertain. Comput. 2020, 35, 100373. Boppana, L.; Ahamed, R.; Rane, H.; Kodali, R.K. Assistive sign language converter for deaf and dumb. In Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Atlanta, GA, USA, 1417 July 2019; pp. 302307. Suharjito; Anderson, R.; Wiryana, F.; Ariesta, M.C.; Kusuma, G.P. Sign Language Recognition Application Systems for Deaf-Mute People: A Review Based on Input-Process-Output. Procedia Comput. Sci. 2017, 116, 441448. Patwary, A.S.; Zaohar, Z.; Sornaly, A.A.; Khan, R. Speaking system for deaf and mute people with flex sensors. In Proceedings of the 2022 6th International Conference on Trends in Electronics and Informatics, ICOEI 2022, Tirunelveli, India, 2830 April 2022; pp.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510501.83/warc/CC-MAIN-20230929090526-20230929120526-00183.warc.gz
CC-MAIN-2023-40
30,055
87
https://vhub.org/answers/question/49
code
Why does the simulation keep saying error it’s divided by zero? Within both the probabilistic modelling software and the normal software - I keep getting the error of dividing by zero, I'm not sure why but none of the inputs have zero in the box. CCR cluster downtime is scheduled for Tuesday 27 July 2021. CCR resources (Globus, UB-HPC, submit) will be unavailable. Details: https://ubccr.freshdesk.com/support/discussions/topics/13000027917 close GHub tool users: please note that these tools are currently being moved to Debian10 containers, and may not run as expected: cmctgm; cmcthistplot; crevasseoib; gisplot2. Thanks for your patience! close No other responses made.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046151563.91/warc/CC-MAIN-20210725014052-20210725044052-00266.warc.gz
CC-MAIN-2021-31
677
5
https://community.dhis2.org/t/gsoc-2016-introduction-to-community/32965
code
I am grateful to the HIS community for selecting me for GSoC 2016 and giving me such an amazing opportunity. I am a third year Electrical & Electronics Engineering student from Delhi Technological University, India. I am passionate about technology in general and spend a lot of time coding, especially Android. I also like to tinker around with hardware and have made some cool IoT projects in the past. My GSoC '16 project is ‘Reimplement Android Data Capture Using Shared DB’. I’ll be making an app which will act like a common (shared) database for all the other DHIS2 android apps. The abstract of the project is available here. I look forward to having an exciting summer ahead under the mentorship of Erling Fjellstad and Araz Abishov. I’d also like to take this opportunity to congratulate the other students selected for HIS for GSoC '16 and wish them all the best for their projects.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662560022.71/warc/CC-MAIN-20220523163515-20220523193515-00178.warc.gz
CC-MAIN-2022-21
901
3
https://www.turbosquid.com/3d-models/3d-pack-cigarettes-slides/760765
code
Pack of brand-less cigarettes complete with 20 uninteresting cylinder like cigarettes. Clever and new age design, the pack slides open to the side as if its trying to tell you something. Great for any scene and people whose favorite color is grey. Model Details _____________ - Polycount: 2816 - Vertcount: 2050 - Scaled appropriately to real world. - All materials and components are named accordingly to avoid confusion and overlaps with any scene. - All components are grouped and named logically for ease of placement. - All pivot points are placed accurately to simulate real world function. - Detailed enough for close up renders. - Basically drag and drop into any scene. - Entirely smoothable.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247504594.59/warc/CC-MAIN-20190221111943-20190221133943-00392.warc.gz
CC-MAIN-2019-09
701
4
https://www.blackhatworld.com/seo/hello-need-an-instagram-and-twitter-bot-with-customization.641754/
code
Hi, I'm new here. Lots of rules on the website, but from reading them I think it's ok to ask for something like this? Anyway I'm a noob to this subject but need two bots, so please let me know if any of these requirements are unreasonable. 1) Instagram. I'm using this thing called instaliker right now but don't like it because it keeps forcing me to recaptcha and occasionally blocks me from liking and forces me to reset password. Can't have that. Must include: - Auto like specific hashtags, unlimited in number. Don't care about auto follow or auto unfollow. - A way to make sure I don't exceed Instagram's liking limit. The liking limit I'm talking about is the point at which Instagram makes you recaptcha. I don't want to ever recaptcha. I even hate the word recaptcha. - Easy to use. - I should be able to leave it on to keep doing this 24 hours a day. - I want to be able to use instagram freely (following, liking, everything) while all this is going on. 2) Twitter Must include: - Auto favorite based on keywords. Unlimited keywords. Don't care about follow/unfollow/add to list. - Once I start it, I want it to run with all the keywords simultaneously, ongoing unless I stop it. - Twitter allows you to favorite 400 tweets per day. I don't want a situation where the first keyword gets favorited 400 times everyday. I want to be able to assign a number of favorites per keyword, OR divide them up equally. - Never exceed the favoriting limit, but always hit the limit within 24 hours. Don't care if this is all at once or throughout the day as long as it doesn't get my account locked or banned or something. - Easy to use. - Want to be able to use Twitter (posting and retweeting) while this is all going on in the background. Can anyone help?
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864546.30/warc/CC-MAIN-20180622143142-20180622163142-00350.warc.gz
CC-MAIN-2018-26
1,757
1
https://www.bedfordrugs.com/privacy
code
Order information, including the credit card numbers, is retrieved through a web interface. This interface challenges the user for a password twice, and then "expires" the session after ten minutes, requiring the user to login again. All communications during these sessions are encrypted again using SSL. No credit card numbers are ever sent via e-mail, due to the fact that most e-mail is not secure. We take all the rug precautions to protect your information. When you submit sensitive information via the website, your information is protected both online and offline. Wherever we collecting sensitive information (such as credit card data), that information is encrypted and transmitted to us in a secure way.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337524.47/warc/CC-MAIN-20221004184523-20221004214523-00624.warc.gz
CC-MAIN-2022-40
715
3
https://discourse.threejs.org/t/an-escape-the-maze-game-with-a-cute-spin-created-with-three-js/55377
code
This is a simple “escape the maze” game but I put a clever spin on it by wrapping the maze to a cylinder. It uses three’s instancedMesh’s to render the kernals and the cob beneath them which are all dynamically generated based on width, height and curvature parameters. I borrowed an existing maze generator originally written by chirpinternet.eu and adapted it to create “tunnels” at the top and bottom so that the user can go all the way around the cylinder. ReactJS manages the app state and I leveraged a lot of R3F to manage the scene graph and Drei for some effects. The movement system was a bit complicated (and could still use some work!) but at this point it should work fairly consistently across devices (pc, mobile, mouse, touch, etc). Thanks for considering this submission to the showcase!
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511023.76/warc/CC-MAIN-20231002232712-20231003022712-00865.warc.gz
CC-MAIN-2023-40
816
2
https://veyon.nodebb.com/topic/745/suggestions-for-the-remote-access-window
code
Suggestions for the remote access window I'd like to open the remote access window of a client with its screen to fit the window regardless of the original resolution of the client screen. In addition I wish to resize the client window and save the last configuration of this window size when I close it, even when it's enlarged. I hope these suggestions are welcomed and (why not?) realized in the next release. Thanks. I forgot: it would be great if I could also block the mouse pointer of a client when I control it.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652116.60/warc/CC-MAIN-20230605121635-20230605151635-00300.warc.gz
CC-MAIN-2023-23
519
3
http://www.dance-tech.net/profiles/blogs/1462368:BlogPost:14295
code
Find more videos like this on dance-tech.net This is video in which I ask for a reflexion on the tone of comments and opinion in each others work. Is related to commens from Matt to Johannes posts: Johannes continued the discussion in the dance-tech email list. Please watch and comment,
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250603761.28/warc/CC-MAIN-20200121103642-20200121132642-00418.warc.gz
CC-MAIN-2020-05
287
4
https://www.stlukesjolon.org/streamlabs-chatbot-with-slobs/
code
Is Outgrow Co the Best Chatbot Software? Outgrow is a powerful chatbot software that lets you interact with customers in many different ways. You can create your own chatbot that provides answers to frequently asked questions, and even create one to search for comprehensive help articles. You can create a chatbot that is GDPR-compliant depending on your needs. Outgrow can be used to make your content GDPR-compliant. As one of the top chatbot software options, Outgrow can help you increase your bounce and conversion rates. Outgrow’s analytics and tools permit you to analyse results and increase your newsletter subscriptions. Outgrow can also be used to create a PDF download of your results. However it has its drawbacks, and some can turn you off. Learn how to make Outgrow work for you. It can also be useful in case you require follow-up messages to existing customers. AlphaChat’s AI for conversation is a powerful tool to assist businesses. Its AI technology allows businesses to automate messages and speech-enabled apps. With AlphaChat’s Natural Language Understanding, businesses can manage support requests and make it easier to communicate between their CS team and customers. Administrators can also track key metrics such as precision, solve rates and average response time. The platform offers comprehensive help and video tutorials making it easy to create chatbots for customer service. It’s more than the ability to build bots. It provides a range of templates that are suitable to various purposes and can be modified to reflect your brand’s voice. Outgrow is fully mobile and is usable on mobile, tablet, and desktop devices. Outgrow is the best choice for large to medium-sized businesses. Salesforce Marketing Cloud Outgrow Co, a cloud-based marketing automation system, combines marketing campaigns with customer behaviour and data. Outgrow clients can make interactive quizzes and recommendations, and more without the need of developers. Outgrow and Salesforce Marketing Cloud are both tools for marketing automation. If you require chatbots for your business, Outgrow is the right choice. Chatbots can be a great way for businesses to increase revenue and reduce costs. Conversations with customers that are outbound have been demonstrated to save 360,000 hrs annually in the financial sector. According to a study 34% of customers are prone to ignore chatbots. However, one in five consumers will purchase expensive products through chatbots, saving the company 360,000 hours of work. The COIN chatbot is an excellent illustration of the many advantages chatbots can offer businesses. This chatbot has saved J.P. Morgan 360,000 human hours of work and increased their revenue. Chatbots are increasing in popularity with businesses. Chatbots are utilized by more than 34 percent of businesses to cut down on customer service time. Chatbots are also being utilized by 39% of companies to enhance their websites’ interaction.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819089.82/warc/CC-MAIN-20240424080812-20240424110812-00013.warc.gz
CC-MAIN-2024-18
2,966
9
https://codecrew.codewithchris.com/t/cant-see-size-classes-tutorial/20986
code
I’m struggling to find the size classes as shown in the tutorial that is supposed to be here: As shown here: Any help is appreciated. Thanks! This changed when Xcode 13 was released. Someone has gone to the trouble of creating a video on how to deal with variations in Xcode 13 (which is the same as Xcode 14 if that is what you are using). OR this stack overflow thread.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446706291.88/warc/CC-MAIN-20221126112341-20221126142341-00667.warc.gz
CC-MAIN-2022-49
373
6
https://paris-swc.github.io/python-testing-debugging-profiling/04-testing-pytest.html
code
Running Tests with pytest - Understand how to run a test suite using the pytest framework - Understand how to read the output of a pytest test suite We created a suite of tests for our rescale function, but it was annoying to run them one at a time. It would be a lot better if there were some way to run them all at once, just reporting which tests fail and which succeed. Thankfully, that exists. Let us test the following function that we will put into a file def whiten(data): """ Return a whitened copy of the data, i.e. data with zero mean and unit variance. Parameters ---------- data : ndarray The data to whiten. Returns ------- whitened : ndarray The whitened data. """ centered = data - data.mean() whitened = centered / data.std() return whitened We will test this function in a file from numpy.testing.utils import assert_allclose, assert_equal import numpy from preprocess import whiten def test_1d(): test_data = numpy.array([1, 3, 5, 7]) whitened = whiten(test_data) assert_allclose(whitened.mean(), 0) assert_allclose(whitened.std(), 1) assert_allclose(whitened*test_data.std() + test_data.mean(), test_data) def test_2d(): test_data = numpy.array([[1, 3, 5, 7], [2, 3, 4, 1]]) whitened = whiten(test_data) assert_allclose(whitened.mean(), 0) assert_allclose(whitened.std(), 1) assert_allclose(whitened*test_data.std() + test_data.mean(), test_data) Now we can run the pytest utility in the directory where we stored the test file: ================================= test session starts ================================== platform linux -- Python 3.5.1, pytest-2.9.1, py-1.4.31, pluggy-0.3.1 rootdir: [...], inifile: collected 2 items test_whiten.py .F ======================================= FAILURES ======================================= _______________________________________ test_2d ________________________________________ def test_2d(): test_data = numpy.array([[1, 3, 15], [12, 3, 4]]) whitened = whiten(test_data) > assert_allclose(whitened.mean(), 0) E AssertionError: E Not equal to tolerance rtol=1e-07, atol=0 E E (mismatch 100.0%) E x: array(6.47630097698008e-17) E y: array(0) test_whiten.py:17: AssertionError ========================== 1 failed, 1 passed in 0.12 seconds ========================== In the above case, the pytest package ‘sniffed-out’ the tests in the directory and ran them together to produce a report of the sum of the files and functions matching having the name The major boon a testing framework provides is exactly that, a utility to find and run the tests automatically. With pytest, this is the command-line tool called py.test is run, it will search all the directories whose names start or end with the word test, find all of the Python modules in these directories whose names start or end with test, import them, and run all of the functions and classes whose names start with test. This automatic registration of test code saves tons of human time and allows us to focus on what is important: writing more tests. When you run py.test, it will print first some general information about the setup and then the name of every test file togehter with a dot ( .) for every test that passes, and an F for every test that fails. After the dots, py.test will print summary information. In the above case, our failing test case is actually a result of a test that is too strict. While we have thought of using assert_allclose instead of a == comparison, it tells us that the result is not equal to tolerance rtol=1e-07, atol=0. Apparently, the default absolute tolerance is 0 and only a relative tolerance is used. Normally, this should be fine, but it is obviously very strict when comparing to zero. Adding atol=1e-15 to our assertion should fix the test: ... assert_allclose(whitened.mean(), 0, atol=1e-15) ... ================================= test session starts ================================== platform linux -- Python 3.5.1, pytest-2.9.1, py-1.4.31, pluggy-0.3.1 rootdir: [...], inifile: collected 2 items test_whiten.py .. =============================== 2 passed in 0.10 seconds =============================== Add more tests Add more tests to test_whiten.py and take care of the edge cases. As we write more code, we would write more tests, and py.test would produce more dots. Each passing test is a small, satisfying reward for having written quality scientific software.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337668.62/warc/CC-MAIN-20221005203530-20221005233530-00079.warc.gz
CC-MAIN-2022-40
4,345
34
https://www.acmicpc.net/problem/13402
code
|시간 제한||메모리 제한||제출||정답||맞힌 사람||정답 비율| |10 초||512 MB||225||86||72||45.570%| An anagram is a word or a phrase that is formed by rearranging the letters of another. For instance, by rearranging the letters of “William Shakespeare,” we can have its anagrams “I am a weakish speller,” “I’ll make a wise phrase,” and so on. Note that when A is an anagram of B, B is an anagram of A. In the above examples, differences in letter cases are ignored, and word spaces and punctuation symbols are freely inserted and/or removed. These rules are common but not applied here; only exact matching of the letters is considered. For two strings s1 and s2 of letters, if a substring s'1 of s1 is an anagram of a substring s'2 of s2, we call s'1 a hidden anagram of the two strings, s1 and s2. Of course, s'2 is also a hidden anagram of them. Your task is to write a program that, for given two strings, computes the length of the longest hidden anagrams of them. Suppose, for instance, that “anagram” and “grandmother” are given. Their substrings “nagr” and “gran” are hidden anagrams since by moving letters you can have one from the other. They are the longest since any substrings of “grandmother” of lengths five or more must contain “d” or “o” that “anagram” does not. In this case, therefore, the length of the longest hidden anagrams is four. Note that a substring must be a sequence of letters occurring consecutively in the original string and so “nagrm” and “granm” are not hidden anagrams. The input consists of a single test case in two lines. s1 and s2 are strings consisting of lowercase letters (a through z) and their lengths are between 1 and 4000, inclusive. Output the length of the longest hidden anagrams of s1 and s2. If there are no hidden anagrams, print a zero.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499911.86/warc/CC-MAIN-20230201045500-20230201075500-00869.warc.gz
CC-MAIN-2023-06
1,866
10
https://www.staking-academy.com/affiliations/cosmos
code
The Cosmos protocol states that validators are subject to punishment in case of malpractice. This is referred to as "slashing" and can occur in the wake of two events: the validator signing two blocks at the same height ("double signing") or the validator being offline for roughly half a day ("uptime"). The penalty for double signing is 5% of the total stake. The penalty for breaching "uptime" is significantly lower at roughly 0.01%. Penalties are imposed on both, validators as well as delegators. Therefore, we advice you to carefully choose your validator. Please note, that the costs for running a secure and professional validator need to be covered by the commission rate. Hence, it is worthwhile to accept a certain amount of commission in order to secure your profits and minimize the risk of punishment.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817463.60/warc/CC-MAIN-20240419234422-20240420024422-00845.warc.gz
CC-MAIN-2024-18
816
2
https://docs.appsignal.com/nodejs/
code
AppSignal now supports Node.js! The new Node.js implementation contains some concepts that vary from the Ruby and Elixir implementations. Be sure to check out the Tracing section to familiarize yourself with any differences. Note: AppSignal for Node.js is currently under active development. Our Node.js suppport tracks the active LTS release and above, which is currently v10 and above.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739177.25/warc/CC-MAIN-20200814040920-20200814070920-00270.warc.gz
CC-MAIN-2020-34
387
4
https://apple.stackexchange.com/questions/444828/how-do-i-get-rid-of-a-spotlight-suggestion
code
You can see in the screenshot below a spotlight suggestion that I don't understand why it shows up, it looks like a Safari icon (as a web search result suggestion), but it actually is a bit different. I don't understand where it came from, what kind of suggestion it is (file, web search, email?) and most importantly how do I get rid of it? It is a Siri Knowledge tidbit, making a search to the web (presumably Wikipedia) about a general artist. Similar to if you typed the name of a sports team, Spotlight would intelligently return current stats and upcoming games. In this example, I searched for another small artist, PTAF, where you can see a thumbnail of the artist is not displayed because there's not one available from their Wikipedia. When you search a more popular artist, a thumbnail is displayed. In your case, Siri seems to have that random tidbit of information about that band without an accompanying Wikipedia page... nice
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476592.66/warc/CC-MAIN-20240304232829-20240305022829-00349.warc.gz
CC-MAIN-2024-10
940
4
https://www.faceclips.net/video/aGTKoFAG35o/top-10-actors.html
code
Top 10 Actors Marvel Will Never Hire - Part 3 - Published on: Wednesday, April 24, 2019 - Top 10 Actors Marvel Will Never Hire - Part 3 Subscribe To Beyond The Screen: https://bit.ly/2txTtSd Welcome back to Top 10 Beyond The Screen. Today’s video is a new experience for me… for the first time in my Beyond The Screen history, I am doing a part 3 to one of my videos. Who knew there was even enough information out there to do such a thing?! It’s been a lot of fun talking about the different actors that Marvel isn’t interested in working with so today I’m doing a part 3 to Top 10 Actors Marvel Will Never Hire. If you missed our part 1, click here 👇 If you missed our part 2, click here 👇 #top10 #marvel #actors #wonthire #beyondthescreen #mcu Welcome to Beyond The Screen! Top 10 Beyond The Screen Instagram: Jocelyn Bedard: https://www.instagram.com/jocebedard/ Dylan Lamovsek: https://twitter.com/uptownduck00 - Source: https://youtu.be/aGTKoFAG35o
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400210996.32/warc/CC-MAIN-20200923113029-20200923143029-00086.warc.gz
CC-MAIN-2020-40
970
13
https://centerforimmunizationresearch.org/publication_items/impact-of-age-and-symptom-development-on-sars-cov-2-transmission-in-households-with-children-maryland-new-york-and-utah-august-2020-october-2021/
code
Impact of Age and Symptom Development on SARS-CoV-2 Transmission in Households With Children-Maryland, New York, and Utah, August 2020-October 2021 Households are common places for spread of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). We investigated factors associated with household transmission and acquisition of SARS-CoV-2. Households with children age <18 years were enrolled into prospective, longitudinal cohorts and followed from August 2020 to August 2021 in Utah, September 2020 to August 2021 in New York City, and November 2020 to October 2021 in Maryland. Participants self-collected nasal swabs weekly and with onset of acute illness. Swabs were tested for SARS-CoV-2 using reverse transcription polymerase chain reaction. We assessed factors associated with SARS-CoV-2 acquisition using a multilevel logistic regression adjusted for household size and clustering and SARS-CoV-2 transmission using a logistic regression adjusted for household size.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949694.55/warc/CC-MAIN-20230401001704-20230401031704-00583.warc.gz
CC-MAIN-2023-14
981
3
https://www.routerforums.com/site-help-suggestions/139047-email-notifications.html
code
I would prefer not getting them at all. I can see all I want when I log into the site. My email box is bursting with junk mail every time that I open it, and I don't read most of it. I systematically go through deleting all but what I consider important before I go to each forum of my choosing to see what I wan to, and respond where appropriate. I can't respond to these, so I just delete them before going to the forums, which I do almost daily. I wish there was a way to check a box in my profile if I wanted to receive them, or not check it if I didn't want to receive them. Mine would go un-checked. Central North Carolina
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655897844.44/warc/CC-MAIN-20200709002952-20200709032952-00179.warc.gz
CC-MAIN-2020-29
628
3
https://cboard.cprogramming.com/cplusplus-programming/73339-visual-cplusplus-filestream-printable-thread.html
code
Visual C++ - FileStream I'm trying to make a text editor with open, save, and font buttons. I copied the code off the board in class and obviously incorrectly. FileStream is an undeclared identifier. Code as follows: private: System::Void SaveBtn_Click(System::Object * sender, System::EventArgs * e) SaveFileDialog * fd = new SaveFileDialog(); if(fd->ShowDialog() == DialogResult::OK) FileStream* fs = new FileStream(fd->FileName, FileMode::OpenOrCreate); StreamWriter * sw = new StreamWriter(fs); Seems there was some code somewhere that described the FileStream object that you forgot to copy off the board. No wait... is this C# code?[/edit]
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188891.62/warc/CC-MAIN-20170322212948-00250-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
645
12
https://comm.support.ca.com/kb/iconsole-cache-timeouts/kb000100354
code
iConsole cache timeouts Document ID : Last Modified Date : Show Technical Document Details CA Data Protection Server:DLPSRV We are getting cache timeout issues on iConsole, how can we resolve them? Commonly restating the IIS service on your iConsole will resolve this issue. if it does not then reboot your iConsole server and RDM (Remote Data Manager) as well. If that does not work you may need to implement the following changes. Reduce number of events per search. From the edit option of a search it can be used to control the number of events being fetched for a search. (What is the max events that need to be searched for) Default is 1000, it is best not go past the default, recommend lowering this value based on individual search use. (Are searches using 1000?) Decreasing this value will help re-claim unused data sooner than later. Since the timer to delete results, resets when the user browses to a different results page or selects an individual event, the results can be retained for the next "SearchResultsCachePeriodMinutes" time duration. This defaults to 40 minutes and can be set to lower to 20 minutes or less (reg value 20). When an Event is viewed, all the details of the event along with its blob are retrieved and stored in cache. This is to enable faster viewing of the same event in future, but ends up using resources. This setting should be adjusted based on the reviewer's behavior. If an already viewed event does not need revisiting, it is recommended to decrease the value. This can be set as low as 1 minute (reg value 1). Note: Reset IIS service, for the changes to apply. Also it is recommended by Microsoft to set the following registry key and monitor the performance, For .NET v2.0 set a DWORD registry value @ HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ASP.NET\2.0.50727.0\MaxConcurrentRequestsPerCPU = 5000. Restart the server machines after making the above changes. Was this information helpful?
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578551739.43/warc/CC-MAIN-20190422095521-20190422121521-00412.warc.gz
CC-MAIN-2019-18
1,935
19
https://www.freelancer.ca/projects/rendering/animation-hash-funciton/
code
I need an animation for educational/marketing purposes that illustrates how an algorithm works. This will require scripting and (preferably) the ability to alter initial inputs. The animation is isomorphic and fairly simple: a 5x5x8 block sliced into cubes. The entire block starts out as a translucent lattice and then populated (however you choose) with black and white cubes. I will need to be able to alter the initial color of these cubes after you are done. The block then goes through five transforms. In each transform, the cubes either move or change color based on other cubes and a formula. Watching this video may help: [url removed, login to view] 0 Absorb: A nearly transparent block of cubes (each representing a 0 or a 1) is instantiated according to a formula (we can pipe the values into it). 1a The block goes nearly transparent leaving a central cube and two columns kitty corner from the central cube. The bottom cubes of each column migrate upwards, changing color based on the color of the cube they replace. When they reach the top, the cubes combine and then dive towards the central cube, altering its color. 1b The block regains its opacity, the changes from 1a are reverted, but the same process is applied (sans going translucent) in high-speed to the entire block. This is because we want to illustrate what's going on in 1a, but follow the correct sequence in 1b. 2 Rho: The block is divided into 5x8 sheets lengthwise. The lanes within each sheet are then shifted by a given offset. For example, the first lane of the first sheet is offset by one, so the very first cube would shift backwards one step. These lanes "wrap" so the very last cube would become the very first cube. I was envisioning highlighting the righthand surface somehow, but it is up to you. 3 Pi: The block is sliced into 5x5 faces and the cubes are moved according to a formula. Highlight the front 5x5 face, but animate all of the faces. See diagram. 4 Chi: I'm not sure how to do this one. Essentially, the cubes in each row change based on other cubes in the row. This could be displayed as a single row with ghost cubes breaking off and combining (and thus altering) the target cube or you could do entire lanes. 5 Iota: I'm also unsure about this one, essentially a semi-random permutation is applied to each cube independently. We could have a magic box that visits each cube ... or something? I don't know. 6 Squeeze: The block is either used as the initial "ghost" state for the next round or broken down into a long 1x1 line of cubes, cut to size, and transformed from binary into digits or hexadecimal. Animation style is up to you, should be suitable for presentation in a classroom or a cyberpunk website. Use of Blender, Godot, or other Open-Source software package is a requirement. This will be used by others, so the source files must be well manicured and released under a Creative-Commons CC-BY-SA or CC-0 license. 26 freelancers are bidding on average $36/hour for this job We are professions artist team, we have more than 8 years experience, are looking for interesting projects. We are looking for long term relations and reliable clients to work with them. [login to view URL]
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583667907.49/warc/CC-MAIN-20190119115530-20190119141530-00086.warc.gz
CC-MAIN-2019-04
3,202
15
https://www.w3resource.com/sql-exercises/employee-database-exercise/sql-employee-database-exercise-92.php
code
SQL exercises on employee Database: Find the total annual salary distributed against each job in the year 1991 SQL employee Database: Exercise-92 with Solution [An editor is available at the bottom of the page to write and execute the scripts.] 92. Write a query in SQL to find the total annual salary distributed against each job in the year 1991. Sample table: employees SELECT job_name, sum(12*salary) FROM employees WHERE to_char(hire_date,'YYYY') = '1991' GROUP BY job_name; job_name | sum -----------+---------- CLERK | 12600.00 PRESIDENT | 72000.00 SALESMAN | 72000.00 ANALYST | 37200.00 MANAGER | 99084.00 (5 rows) Sample Database: employee Have another way to solve this solution? Contribute your code (and comments) through Disqus. Previous: Write a query in SQL to find the average salary and average total remuneration(salary and commission) for each type of job. Next: Write a query in SQL to list the employee id, name, department id, location of all the employees. What is the difficulty level of this exercise? - New Content published on w3resource : - Python Numpy exercises - Python GeoPy Package exercises - Python Pandas exercises - Python nltk exercises - Python BeautifulSoup exercises - Form Template - Composer - PHP Package Manager - PHPUnit - PHP Testing - Laravel - PHP Framework
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251694176.67/warc/CC-MAIN-20200127020458-20200127050458-00160.warc.gz
CC-MAIN-2020-05
1,306
22
https://math.stackexchange.com/questions/3053345/exactly-when-and-why-can-a-turing-machine-not-solve-the-halting-problem/3053397
code
I perfectly understand and accept the proof that a Turing-machine cannot solve the halting problem. Indeed, this is not one of those questions that challenges the proof or result. However, I feel that there is still something left to be explained ... I am still left wondering exactly why the Halting problem is not solvable. Of course, in the sense that there is a proof, there is a why here ... and yet ... I feel that some important other part of the why is missing. Let me explain: First, let's assume we just try to solve the 'empty-tape halting problem' and let's assume that the machines we are interested in only have two symbols: 1 and 0. Now, given some machine, will it halt, when stated on the empty tape (meaning: all 0) or not? Now, we know that this problem is not Turing-solvable. If it were, we get a logical contradiction. OK, I get it. I have no problem with that at all, and like I said, I can follow the proof and I completely agree with it. I perfectly accept that this halting problem is not solvable. But suppose I would actually try and give it a go: suppose I would try and solve this halting problem. We know the set of all turing-machines is enumerable, so let's just go through them one by one. Now, presumably this enumeration is such that it starts with relatively 'simple' machines. Indeed, I could first list all the ones with 1 internal state, then all the ones with 2, etc. since for any $n$, and with only $2$ symbols, there are only finitely many possible machines Now, for all the machines with $1$ state, I can easily predict their behavior. Some halt. Some don't. OK, moving on to the machines with $2$ states. With some effort, I can predict the behavior for all of them as well. Cool. On to $3$ ... ok, now it becomes more difficult .. but even here I can do it. I know, because people working on the Busy Beaver problem have figured this out. And I believe they figured it out for $n=4$ as well ... Interestingly, these researchers are using computers to help them figure out the halting or non-halting behavior for these relatively 'simple' machines. These computer programs are, in a way, trying to solve the halting problem, at least for very small values of $n$. Presumably, these machines 'analyze' and 'break down' the behavior of a machine with $4$ states into something that can be demonstrated to halt or not halt. But of course, we know they can't solve it for all $n$ ... they can't be perfect. And indeed, for $n=5$ the behavior of Turing-machines gets so complicated that human nor machine is able to figure out (yet) whether the machine halts or not. So ... here is my question: what is it that we're running into that prevents us from figuring out the halting behavior? The proof of the Halting problem uses self-reference. That is, if a machine could solve the halting, then we can show that thee must be a machine that halts on its own input (i.e. when given its own program, or its own number in some enumeration, or..) if and only if it does not .. a contradiction. OK, but this is when we have a machine with certain powers ... in a way, a machine that can solve the halting problem is a machine with 'too much' power, which leads to a contradiction. But, the halting-detection machines used by the Busy Beaver researchers don't have too much power. They have too little power. Currently they can't solve $n=5$. OK, so we give them some more power. Maybe at some point they can solve $n=5$ ... but they still can't solve $n=6$. Maybe we can give them enough power to solve $n=6$, or $n=7$ or .... ... so my question is: is there some 'special' value of $n$, say $n=m$ where this has to stop. Where, somehow, the only way to solve $n=m$, is by a machine that has 'too much' power? But why would that be? Is it because of some kind of self-reference? Because the only way to solve $n=m$ is by a machine that, as it tries to analyze and predict the behavior of some machine with $m$ states, cannot break it down to anything 'smaller' than something that requires solving $n=m$ itself? Some kind of 'minimal' value not unlike some set of minimum requirements that formal systems need to have in order to apply the Godel construction to them? One thought I have is that this cannot be: like I said, for any $n$, there are only finitely many machines to consider. As such, it is computable; there is some machine that correctly classifies all machines with $n$ states as empty-tape halters or non-halters: it takes a machine on the input, goes through its finite list with pre-stored answers, and outputs that answer. There is a machine that does this for $n=5$, there is one for $n=6$, etc. And, none of those machines have too much power: no contradictions here. They all have too little. Then again, these machine don't do any explicit analysis of the machines involved ... they just happen to give the right value. So, maybe there is still some value of $n$ where the approach of actually trying to analyze and predict the behavior of machine starts to break down for some fundamental, again possibly self-referential, reason? Or: is it that the analytical approach merely gets harder and harder ... but that there is no 'special' point where it becomes, for some theoretical, fundamental reason, too hard? As such, the contradiction only comes from a machine that can do it for all infinitely many values of $n$? Indeed, maybe the problem is that in order to analyze the behavior of all machines with $n$ states, we need a machine that has to have more than $n$ states ... and so while for every $n$, there is a machine $M$ that can perform the analysis, the complexity of $M$ is greater than any of the machines with $n$ states, and hence you'd need another, even more complicated machine $M'$ in order to analyze machines with the kind of complexity that $M$ has ... thus setting up an infinite regress that you can never complete, i.e. there is no one machine that can 'do it all'? Can someone help me how to think about this?
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100276.12/warc/CC-MAIN-20231201053039-20231201083039-00203.warc.gz
CC-MAIN-2023-50
5,991
18
https://discuss.python.org/t/order-of-node-traversal-for-declarations/26733
code
I want to know when python encounters function or class or variable declaration, in which order it adds the name into the current scope. Does it first adds the name in the scope with some empty value in the scope dictionary and then traverses the body collecting the meta-data and later adding the meta_data corrosponding to the key in the scope dictionary or whether it first traverses the body first and later add the name into the scope with the meta_data collected from body traversal. I tried writing a recursive function and see what it is resolving to so I believe the first process is correct one but still needs to confirm my understanding. Is this the the explanation you are looking for 4. Execution model — Python 3.11.3 documentation ? Not really @barry-scott . Actually I want to know from the AST perspective, when python encounters func_decl or class_decl nodes, does it first add the name with empty meta_data value in the scope or first traverses the body and then adds the name in the scope. You understand, I hope, that the AST is consumed by the compiler, not at run-time? In when python encounters function or class or variable declaration you sound slightly as if you are thinking of Python executing your program, encountering a definition for the first time, and having to compile it. Function (or class) definition is an executable statement, but at run-time Python is executing code produced by the compiler, not examining the AST. The AST is the output of the parser, and is a structure built in memory from reading the module source. The compiler can then pass over this structure as many times and in whatever way it likes, but I believe it makes two passes. In the first pass, the compiler notices what names are used in each scope, and where they are defined. (Is a name defined there, or in an outer or module-level scope? If defined there, it might later discover that it is referenced from a nested scope. Assignment is definition of a name, but so also is a function definition.) This scope information is collected in a symbol table for each scope. In the second pass, the compiler generates a code object from each scope. Python is designed so the code can be translated without a lot of type information, but it does need the symbol table from the first pass for that scope to generate the right kind of get or set operation (local, cell, or global). Now, at run-time, when the interpreter reaches the def, it finds instructions that build a function object and push it to the stack. The code object for the body of that function is just one of the constants embedded in the code object it is currently executing, referenced by instructions. The new function object (a new one every time you execute the def) is pushed onto the stack. Finally, the top of stack is stored in the variable that has the name of the function. Here is an example of the generated code corresponding to the heading def f1(a, b, u=1):: 7 2 LOAD_CONST 8 ((1,)) 4 LOAD_CONST 1 (<code object f1 at 0x000002AE9C8997A0, file "...\function_closure.py", line 7>) 6 MAKE_FUNCTION 1 (defaults) 8 STORE_NAME 0 (f1) dis.dis() is a good tool for exploring the code generated from various source fragments. Thanks @jeff5 for the response. Actually I am talking about the compile time stage only. When AST traversal reaches a function declaration, it needs to add the name and meta_data of the function to the current scope. My question is whether it is done before traversing the body of the function or after that. All of this I am asking for compile time name resolution. Ok, cool. I think the answer may be as simple as observing that function definition is in the end just assignment, so from the perspective of symbol table processing, the name that represents it is handled the same as any other name. The two phases I am thinking of are identifiable here: However, the top of the file only gives me two marks out of five for remembering the phases: This file and the related symtable.c are the ones to look at for detail. There’s a bit of a guide to the action at: With a bit of searching, we can find where a function definition is processed for symbols: You will see that the name is entered into the symbol table for the current scope first. The choice of DEF_LOCAL is provisional, pending discovery of a nested reference. The next bit processes the function declaration. Later, we enter the nested scope, but remember we are only collecting names and their uses in this phase, not generating code. Thanks @jeff5 for such a detailed answer. This is the perfect explanation and answer I was looking for my question. I will look into these links more. Thanks again for helping Hey @jeff5 I really want to understand what the second pass of AST at compile time is doing ? is it just compiling the code or doing anything more which alters the scope table. Is it wrong to say that first pass fills up the scope table and second pass compiles the AST into bytecode ? I think that’s right. It’s a pass over the whole compilation unit (module) so it has processed all the scopes before it begins to generate code from the AST. I reproduced the scopes processing once for a project, so I feel I’m on solid ground there. assemble phase is new to me, but it seems to consist of optimisations carried out as each block is completed, and while the code is still in the compiler object. Only at the end of assemble do we see an actual code object. Thanks @jeff5 for the clarification. Now I think I have a decent mental model for name resolution in python.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645417.33/warc/CC-MAIN-20230530063958-20230530093958-00478.warc.gz
CC-MAIN-2023-23
5,564
32
http://www.linux.com/submit-event/details/475-linuxcon-north-america-2011
code
LinuxCon is the industry's premiere Linux conference. It's North America's annual technical conference that provides an unmatched collaboration and education space for all matters Linux. LinuxCon brings together the best and brightest that the Linux community has to offer, including core developers, administrators, end users, business executives and operations experts - the best technical talent and the decision makers and industry experts who are involved in the Linux community. Registration will be open in January 2011. Why Should You Attend LinuxCon Top Notch Speaking Talent LinuxCon brings you the best and the brightest in speaking talent, such as our speakers Linus Torvalds, Wim Coekaerts, Eben Moglen, Jeffrey S. Hammond and Ravi Simhambhatla. Innovative and Abundant Content In addition to keynotes, roundtable panels and 75 conference sessions, LinuxCon brings you a range of tutorials, lightning talks, BoFs and other programming. Wide Variety of Opportunities to Connect Outside of the classroom, we offer a variety of ways to learn and connect with your peers, including evening events, developer lounges, a technology showcase and much more. Added Value of Co-Located Events Adding benefit to your attendance at LinuxCon, you can also choose to take part in one of the other co-located events, which will be announced shortly. For the Community, by the Community LinuxCon is organized by The Linux Foundation, a non-profit consortium working with the community to protect, promote and standardize Linux. Who Should Attend: Software Developers, Linux IT Professionals, Corporate End Users, Senior Business Executives, IT Operations Experts, System Administrators, Students, Media and anyone else with an interest in the Linux ecosystem. To register to attend or get more information visit http://events.linuxfoundation.org/events/linuxcon
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398461529.84/warc/CC-MAIN-20151124205421-00264-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
1,858
15
https://www.zonealarm.com/forums/showthread.php/79687-Question-about-Incoming-Blocked-Messages!?p=297097&mode=linear
code
I have a question concerning the firewall pop up messages and computers on a shared network. Okay I have been dealing with a problematic issue with someone purposely hacking or eloquently put it "remoting" into my computer or like devices in the past and I am aware of who it was at the time I had a different firewall and it didn't really do as much justice as ZoneAlarm has and is (still using it). Since I have installed Zone Alarm Extreme Security and before I was using the regular free version which worked just as well; now mind you there are 4 computers using the same network in my household the particular person that I am having an issue with (who once before had got on my computer before) IP address keeps popping up as inbound the network ip address that the router assigned to their computer and this has been occurring for about 3 months now everyday whenever this "person" is on their computer connected to the internet and I am online I get this message saying that that 192.168.0.4 (for example) Net-BIOS has been blocked. So I checked my firewall log and of course I see the same IP (Inbound) trying to use the Net-BIOS ports 137,138 etc along with some other higher ports trying to connect to my network assigned IP address. This individual claims they have not been trying to get on my computer or trying to remote in. I had called up the internet provider and spoke with a Technician and they said basically that "someone" has been trying to "ping" your computer but are getting blocked out while your online and according to GRC Shields Up! All my ports are "Stealth" which I am happy about and I am also happy that ZoneAlarm Firewall is legitimately doing what it is suppose to do. My question is to anyone who could answer this for me. That particular person's computer and (only their computer) IP keeps showing up on my computer and mind you (my computer is not the host for the router or modem), is indicating they are trying to get on by remote or hacking of any kind but is being blocked out is what those messages mean or is it just a coincidence and that person's computer somehow just keeps interfering with their WiFi to the same router (if that makes sense) and they are telling the truth and say they have no idea why their IP keeps showing up? Out of 4 computers total!
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118477.15/warc/CC-MAIN-20170423031158-00387-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,307
4
https://www.teentix.org/calendar/event/anonymous-uts
code
Hutchinson Hall at University of Washington 4276 East Stevens Way Northeast, Northeast Seattle, Seattle UTS is beyond excited to invite you to our fall main stage production of Naomi Iizuka's Anon(ymous)! Separated from his mother, a young refugee called Anon journeys through the United States, encountering a wide variety of people -- some kind, some dangerous and cruel -- as he searches for his family. From a sinister one-eyed butcher to beguiling barflies to a sweatshop, Anon must navigate through a chaotic, ever-changing landscape in this entrancing adaptation of Homer's Odyssey.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738944.95/warc/CC-MAIN-20200812200445-20200812230445-00573.warc.gz
CC-MAIN-2020-34
589
4
https://wecool.buzzsprout.com/1681774/11443400-121-i-have-a-gun-and-i-m-schizophrenic?t=0
code
Grant and Tommy are hungover. Ryan carries the episode. Grant demands an apology from long-winded wedding speakers. The podcast apologizes to our listeners. Plus an anonymous listener apologizes for trolling the podcast. Please rate, review and subscribe! Submit your anonymous apology here: www.grantwinkelscomedy.com/wecoolpodcast Subscribe to our Youtube Channel for HD full length episodes and clips: https://youtube.com/channel/UCEFHvn5zEiiXX9bfbYT-RNg?sub_confirmation=1 Follow us on all social media:
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510520.98/warc/CC-MAIN-20230929154432-20230929184432-00258.warc.gz
CC-MAIN-2023-40
507
5
https://oracle-base.com/blog/tag/12c/page/2/
code
Over the holiday period I finally decided to tackle the Adaptive Query Optimization stuff in Oracle 12c, which resulted in these articles. Adaptive Query Optimization is really a collection of different features, hence the links page to bring them all together. Some of the features are just renamed and slightly modified versions of stuff from previous releases. Other bits are totally new. I’ve sat through a number of talks about this stuff over the last few years and the sound-bites make it seem quite obvious and straight forward. That’s because the individual pieces, for the most part, are quite straight forward. The trouble comes when they all start to interact, at which point things can get quite confusing. While I was doing the demos for the features, I had to chop and change quite a bit. Sometimes things didn’t happen when I thought they should. Other times things did happen when I thought they shouldn’t. I think much of it was down to my misunderstanding, but that just goes to show how tricky some of this can be… That’s without adaptive cursor sharing and SQL plan management thrown into the mix… As I keep saying, these articles will probably get revised over time as I get a better understanding of this stuff. I have a feeling I won’t really get to grips with it until we are live on 12c for a number of projects and people start throwing real situations at me to investigate. Fedora 21 has arrived and it’s now delivered in three focussed flavours (Workstation, Server and Cloud). This of course resulted in the usual articles from me. As always, read the warnings before you start down this path. From an Oracle installation perspective, it’s almost identical to Fedora 20. I chose to use the server flavour and install the “MATE Desktop” package group. I suspect others may prefer to start with the workstation release. Either way it should be fine. As I suspected, switching my main desktop from Fedora to the MacBook means I care significantly less about this release than before, but I still have some upgrades I’ll need to plug through. While I was away on the OTN APAC tour, I wasn’t really able to sink my teeth into anything, so inspired by Connor McDonald‘s session in Perth, I decided to write up a few bits and pieces in my free moments in the hotels and planes (when I had enough elbow room to type). Here is what I’ve neatened up so far. I’ve got a couple of other things that are part done, which will no doubt be coming out over this week… I’ve spent the last couple of evenings playing with the new SQL pattern matching feature in Oracle 12c. I’m doing some sessions on analytic functions in some upcoming conferences and I thought I should look at this stuff. I’m not really going to include much, if anything, about it as my sessions are focussed on beginners and I don’t really want to scare people off. The idea is to ease people in gently, then let them scare themselves once they are hooked on analytics. I’m thinking about Hooked on Monkey Fonics now… At first glance the pattern matching seems pretty scary. There are a lot of options and as soon as you throw regular expressions into the mix it does make your head swim a little. After a couple of half-baked attempts, where I found convenient excuses to give in when the going got tough, I finally sat down and plugged through the docs. If you actually RTFM it is a lot easier than hoping to wing it. Who’da thunk it? I’ve tried to keep the article really light. The docs are pretty good for this stuff (if you read them) and they have a lot of examples. I started adding more and more detail to the article, then chopped most of it out. There is no point regurgitating all the options when it is in the docs. Most of the examples I’ve seen before just talk about basic patterns, like V and W shapes, but it’s quite simple to do complicated stuff once you start playing. In fact it takes more time to set up the example data than it does to figure out the queries to bring it back. In the near future I will be copy/pasting examples and adjusting them or just sitting with my article and the docs when trying to use this stuff. I think it’s going to take a long time before I can type this stuff from memory. Partly that’s because I can’t see myself having lots of cause to use it. I can’t think of any scenarios I’ve experienced where this would have been a natural fit. Having said that, I’ve never worked in things like stock markets, betting and stuff like that where I can imagine this sort of pattern matching is needed all the time. I seem to remember one person at a conference, who shall remain nameless, saying this feature was one of their drivers for upgrading to 12c. I wonder if that was for real or an exaggeration? Anyway, if you need this sort of analysis, I think it’s worth checking out, but try to remember it’s not as scary as it first looks. I spent a bit of time at OpenWorld looking at the JSON support in Oracle Database 12c. I started to write some stuff about it on the plane home and I spent the last two mornings finishing it off. You can see the results here. I’ve tried to keep it light, since the documentation does a pretty good job at explaining all the variations of the syntax. I’ve also avoided trying to teach people about JSON itself. There is loads of stuff about that on the net already. For the most part I think the JSON support looks pretty cool. During the process of writing the articles I did notice a few of things that I thought might confuse. - Using dot notation to access JSON in SQL seems like a neat solution, but each reference results in a query transformation that may well leave you with a whole bunch of function calls littered around your SQL. The end result is probably not what you want. I think it is probably better to avoid it and write all the direct function calls yourself, so you know exactly what the optimizer will do. - Typically the query transformations of dot notation result in a JSON_QUERY function call, but the optimizer can substitute a JSON_VALUE call if there is an index that it can take advantage of. That can be a little confusing when you aren’t expecting it. Once again, it might be better to avoid dot notation so as not to confuse. - If you are careful, the indexing of JSON data is pretty straight forward, but if you aren’t aware of how the query transformations work or you forget how very small changes in function parameters affect index usage, you can chase your tail trying to figure out why you aren’t able to use your indexes. Until the REST APIs are released, the only way you can use this stuff is from the server side, so it’s not really something you can hand out to developers who are expecting to use just another document store. I had a play with the REST stuff during a hands-on lab at OpenWorld and it looked kind-of cool. When it’s released I’ll write an article about it and run it by some of the folks at work to see how they think it compares to other document databases… I recently put some more PL/SQL new features articles live. I’ve also posted a top-level new features article. This contains a number smaller features as well as links to other articles on the site that discuss some of the new features in greater depth. I’ve got a couple of PL/SQL books I’ve got to read and review, but I’ve been holding back because I wanted to get my take on this subject written before I was influenced by others. I guess I don’t have that excuse any more. Some more 12c articles have trickled out over the last few days. I kind-of mentioned this next thing in a post a few weeks ago, but didn’t name names. While writing an article about the PDB logging clause in 22.214.171.124 I noticed it didn’t work. I raised an SR with Oracle Support and they confirmed it was a bug. I was not planning to release the article until the bug was patched, but it came up in conversation recently and I decided it was better to release the article with a big fat warning on the top saying it doesn’t work, just so others are not as confused by this as I was. I’m still not sure it is the right thing to do, but what the heck… When the bug is patched, I will revise the article and probably promote it to the front page of the website as a “new article”. For now it is lurking in the depths of my website. The 12c journey continues… A few more 12c articles went live over the last few days… The DMU and In-Database Archiving are from the OCP syllabus. The Invisible Columns stuff seemed like a natural thing to mention, when discussing the In-Database Archiving. The 12c journey continues… After yesterday’s to PDB or not to PDB post, I decided the answer was “to PDB”. Here’s what I did… - Installed the Oracle 12c (126.96.36.199) software. There is an installation article here, but all I had to do was a software-only installation because the OS already met all the prerequisites because of the existing 188.8.131.52 installation. - Upgrade the existing 184.108.40.206 instance. See here. I could have stopped at this point, but as I said I decided “to PDB”. - Created an empty CDB instance on the box using “dbca”. - Created a new PDB as a remote clone of the non-CDB instance, as described here. - Turned off the non-CDB instance. Job done. So far it’s looking good. I’m going to do some messing about tomorrow to make sure it registers with Cloud Control properly and the backup schedule is sorted. Then I’ll give it to the folks to test their apps against. - I flippin’ love the remote cloning of non-CDBs. I’ve played with it while writing the article about it, but seeing it happen on a real database was really exciting. - I think we all realise that this is version 1.1 of the multitenant architecture. The question is, is version 1.1 good enough at this point? The testing will determine that, not my excitement levels. - The testing will be based on our use of the DB. We are a small operation with quite simple needs. If we choose to go this route it will be because it is right for us. Depending on your usage, your experience may be different. - If things don’t work out with this POC, we will try with the non-CDB instance. So it was kind-of exciting, fun and scary all rolled into one… I’m about to start a Proof of Concept (POC) for a 12c upgrade of one of our databases. The production database in question is running on Oracle Linux inside a VMware virtual machine, so the starting point I’ve been given for the POC is a clone of the whole VM… Probably the biggest decision I’ve got to make is “to PDB or not to PDB” *. I mentioned it on Twitter earlier and got some conflicting opinions. I guess the pros and cons of the PDB approach go something like this in my head. - The multitenant architecture is the future of Oracle. Depending on which rumours you believe, it’s possible that 12.2 will no longer allow the pre-12c style instances. Putting it off is delaying the inevitable. - As long as you only use a single PDB, there is no extra cost. - The multitenant architecture has some neat features related to cloning, especially remote clones. That potentially makes provisioning new environments pretty quick. - Even with a single PDB per CDB, there are potential advantages regarding patching and upgrades. Caveats apply as always. - I’m going to upgrade to a pre-12c style instance first anyway, so I will have a natural fallback position ready to go if I need it. - It would be good to invest the time up front to convert stuff now, rather than wait a few years to clean up the mess of CRON jobs and connections using SIDs, rather than services. This choice would force our hand. - If some of the technologies we are using are not going to “play well” with the multitenant architecture, I would rather know now than later. - Using a PDB is definitely going to break a number of things for us, especially CRON jobs that run scripts using OS authentication. See here. - Once the decision has been made to “switch the multitenant architecture on”, it would be really easy for someone to create an extra PDB and incur additional licensing costs. As far as I’m aware, there is nothing to restrict the number of PDBs to 1, to prevent an uninitiated DBA from copying a script from the net and creating more. If someone knows an undocumented parameter for this I would be interested in knowing it. Note, “_max_pdbs” isn’t the answer here! - I’m going to upgrade to a pre-12c style instance first, so why add on the extra effort of cloning that to a PDB? - Why make life hard for yourself? You can use 12.1 as a half-way house and make the final step later. I don’t think there is really a right or wrong answer in this debate. I could probably put forward a convincing argument in favour of either option. I’m leaning on the side of the “to PDB” choice. If this proves to be a no-go, then I’ll start a POC of a pre-12c style instance… Despite my leaning for the PDB choice, I am interested to know what others think, especially those that have done something a bit more extensive than running this stuff on their laptop. * I forgot to mention previously, we will almost definitely be going with a single PDB per CDB (the free option) initially. So this is not a “consolidate using multitenant” issue from the outset.
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736675795.7/warc/CC-MAIN-20151001215755-00246-ip-10-137-6-227.ec2.internal.warc.gz
CC-MAIN-2015-40
13,430
62
https://www.sepcity.com/support/kb/a31/downloads.aspx
code
The “File Libraries” module allows you and your users to upload different file types to your website which are sorted into categories to make it easier to browse for file downloads. Categories are required to use this module. You can upload new files through the administrator interface and through the user side. Once you create a category and click on a category you will have an additional button that will read “Manage Files”. Once you click this button you will be taken to a screen to approve, deny and delete files. When you add a new category to the “File Libraries” you will have one extra option to fill out which asks for “Category Type”. The category type specifies what file extensions a user can upload. If you have the “Software” selected then it will only allow compressed files to upload, if “Audio” is selected then it will allow music extensions to be uploaded to your site. Enable the “File Libraries”? – Select “Yes” to enable the “File Libraries” module, otherwise select “No”. Display the top newest file uploads on your main file library page? – This option allows you to show the 10 newest files that have been uploaded on your main file library page. Display the most poplar file downloads on your main file library page. – This option allows you to display the 10 most popular file downloads on your main file library page. Maximum upload size in the file libraries. (MB) – Enter a numeric value here for the maximum size a want can upload to the file libraries. If you upload a file through the administration you will not have a limit. This value is in megabytes. Force users to download audio/video files – If you select “Yes” for this option then when someone clicks to download an audio of video file, it will save it to their hard drive, otherwise it they will play in media player on your website. Keys to access the “File Libraries”. – Select the keys that will be able to access the “File Libraries” module. Keys to upload files. – Select the default keys a user will need to upload new files to the “File Libraries”. When adding a category the “write” keys for a category will overwrite this option. Keys to manage the “File Libraries”. – Select the keys a user must have to manage the “File Libraries” module. Users in this key will be able to modify, approve and delete files from your database. This screen will allow you to modify the main “File Libraries” page that a user will see when entering the “File Libraries” module. You can also modify individual category pages by selecting the dropdown for “Page to Modify”.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710488.2/warc/CC-MAIN-20221128070816-20221128100816-00331.warc.gz
CC-MAIN-2022-49
2,656
11
http://www.indezine.com/products/powerpoint/learn/templates/applying-slide-layouts-ppt2003.html
code
Applying Slide Layouts in PowerPoint 2003 Learn what Slide Layouts are, and how you can apply another Slide Layout to your existing slide in PowerPoint 2003. Author: Geetesh Bajaj Product/Version: Microsoft PowerPoint 2003 Slide Layouts in PowerPoint 2003 are a collection of various placeholders laid out in a fixed arrangement on the slide. You cannot create your own Slide Layouts in PowerPoint 2003 (you can create Slide Layouts in later versions), but you can certainly choose from the several great Slide Layouts that PowerPoint 2003 provides. Let's first show you what exactly a Slide Layout is, and then explore applying Slide Layouts. As already explained, Slide Layouts contain placeholders -- these placeholders work as containers for your different types of slide objects such as texts, tables, charts, pictures, shapes, clip art, etc. An arrangement of one or more of these placeholders is a Slide Layout -- in fact there's also a Slide Layout called "Blank" that does not include any placeholders! Follow these steps to view the different types of Slide Layouts that PowerPoint 2003 provides, and to apply a new Slide Layout to your existing slide in PowerPoint 2003: - Launch PowerPoint 2003. This opens the with a single slide that contains two text placeholders, one each for the slide title and subtitle, as shown in Figure 1. This arrangement of placeholders is just one of the several Slide Layouts -- this particular one is called Title Slide. Figure 1: PowerPoint 2003 interface - To change the Layout of this slide, or to see all the other Slide Layouts, you need to activate PowerPoint's Slide Layout task pane by choosing the Format | Slide Layout menu option, as shown in Figure 2: Slide Layout option within Format menu Alternatively, you can also right-click on empty area of the slide to bring up the context menu you see in Figure 3, and choose the Slide Layout option. Figure 3: Slide Layout option within context menu - Either of these options brings up the Slide Layout task pane on the right side of the PowerPoint 2003 interface, which you can see in Figure 4 (highlighted in red). Do you see all those small slide representations in the task pane? Yes, these are the various Slide Layouts available in PowerPoint 2003. Figure 4: Slide Layout task pane in PowerPoint 2003 All the layouts within the Slide Layout task pane are categorized -- use the scroll bar to view more categories. All of them are explained below: - Text Layouts: This category provides layouts for text content. - Content Layouts: Here you'll find layouts that contain placeholders for charts, pictures, tables, media, etc. Most of these layouts also include a slide title -- also this is where you will find the Blank Slide Layout (top left thumbnail in Figure 5, below). - Text and Content Layouts: These layouts are a combination of Text and Content placeholders. - Other Layouts: Provides more Slide Layouts. - Explore the Layouts -- you can place your cursor over the layout thumbnail preview to see a tool tip with the name of the layout, as shown in Figure 5. Figure 5: Tool tip displaying the name of the layout - Once you have decided which Layout you want to use, just click on the layout's thumbnail to apply it to your active slide. Figure 6 shows the layout named "Title and Content" is now applied to the slide (this is the same slide that you saw in Figure 1 -- now with a new Slide Layout applied). Figure 6: Title and Content layout applied to the slide - You can even click the button with a down arrow, located next to the layout thumbnail preview to bring up a menu, as shown in Figure 7. Within this menu select the Apply to Selected Slides option. Tip: Do note that you typically can select only one active slide in Normal view, although even within Normal view, you can select more than one slide in the Slides pane -- also you can select many more slides easily in Slide Sorter view. Figure 7: Apply to Selected Slides option - The other two options within the drop-down menu are to reapply a Slide Layout and insert a new slide based on the Slide Layout you have selected. Have your ever used keyboard shortcuts in PowerPoint? Or are you a complete keyboard aficionado? Do you want to learn about some new shortcuts? Or do you want to know if your favorite keyboard shortcuts are documented? Go and get a copy of our PowerPoint Keyboard Shortcuts E-Book.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163054352/warc/CC-MAIN-20131204131734-00075-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
4,385
47
http://www.tryingtechnology.com/annoying-tech/2008/07/
code
Annoying Tech: July 2008 Archives At the end of Jacques Futrelle's classic (and not just because it was written in 1905) mystery story, "The Problem of Cell 13," (read it online!) asked how he would have solved the problem if the plan he executed hadn't worked, Professor Augustus S. F. X. Van Dusen (a.k.a. "The Thinking Machine" *) replied, "There were two other ways." (* Which always makes me think of the line from the a classic parody, which I can't identify offhand although I think it was Robert L. Fish, '"Was it Wednesday?" asked the Thinking Machine, thinking he was a washing machine.') That's often how I feel about tackling computer problems...although, far too often, there turns out to be no (good) way, or, sometimes, the problem resolves itself (mysteriously stops being a problem). Case in point: The "afternoon of network heck" on Wednesday, July 10, when, abruptly, my Internet connection went wonky. Suddenly, the browsers (FireFox, with Opera as backup, MSIE only when absolutely necessary) on my near-new XP Pro desktop weren't accessing the web. I had a Putty SSH session open, and it kept working, so it wasn't the connection proper...but foolishly, I closed Putty, and couldn't regain the connection. And, apparently, it wasn't just me having the problem, as I discovered a little later. I remembered that a little earlier, Zone Alarm had "detected it was on a new network"... given that my desktop has a wired connection to my router, that's a little odd. I tried checking Zone Alarm for odd signs, but didn't see anything amiss. (I may not have looked at the right stuff, however.) Events like this are often, of course, the result of some change, but at the time, I couldn't think of anything that might have been. So I began to try things, starting with the easy and obvious: - A quick check of the TV confirmed that cable service per se was still on. - Ditto blinky-lights on the cablemodem, so I hadn't inadvertantly tapped the STANDBY button (which disconnects things). - Transient glitch? Rebooting the computer, and then the cablemodem and router, didn't help. - Loose network connection somewhere? I removed and re-inserted everything in the path. - Bad router jack? The box has fallen a few times. I tried the other router ports. - Bad Ethernet cable to the computer? I tried another CAT5 Ethernet cable between router and desktop. - Try another computer. The press-loaner Vista notebook could access the Internet, via my 802.11 WiFI. This was partial clue I didn't pay enough attention to. Then it was time for some serious Plan B's. Since at this point there seemed to be WiFI Internet access, I went rooting around for a WiFI adapter for the desktop, but: - And old Travel Access Point's "simple three-step instructions" sheet showed, in Step 3, cranking open a browser window to configure something... but didn't actually give the IP address. (And the manual, which I was able to grab via the notebook, wasn't much more help.) - I found a USB WiFI Adapter -- but not the CD with the driver. And the vendor web site showed drivers for two models -- neither of which was the model I found. By the time I'd reached tech support and got the URL for the driver, I no longer had enough net access to get to it. (And, as it turned out, this wouldn't have helped.) - In case the problem was my desktop's NIC card, I started to try a USB Ethernet adapter -- but although I had the driver CD, I remembered this was pre-XP enough that I was nervous. (I had another USB/Ethernet right in front of me, but didn't see it. Now it was time to call Comcast, my broadband provider, in case they knew something I didn't. However, the wait-time was too long, so I decided to talk Grep (our dog) out for a walk. While out walking, I called one of my colleagues, Ernest Lilley, who said "If you're using Zone Alarm, crank its firewall setting down a notch or two." Since I couldn't do that until I got back, I tried calling Comcast, my broadband provider again, while still out walking. Aha! A few menu choices down, the recording advised me there was a known problem with a new Microsoft update conflicting with Zone Alarm--uninstall the patch and then check the ZoneAlarm site for further advice." (This assumed that the un-install would resolve the immediate problem, of course.) And, in fact, it did. That let me get to the ZoneAlarm web site, where they acknowledge the issue and offered a little more advice. They initially put this on their main page: Sudden loss of internet access - Microsoft Update KB951748 is known to cause loss of internet access for ZoneAlarm users. We recommend that users uninstall KB951748 using "Add or Remove Programs" until the issue is resolved. I conceded to Ernest that he was right enough in his solution -- although Zone Alarm feels that lowering the firewall security levels is somewhere between ungood and plusungood (to cop a phrase from George Orwell's 1984 reduced-vocabulary lexicon). But, as I pointed out, he hadn't actually identified the cause of the problem. A few hours later, there were news stories confirming the problem, workarounds and solutions. By the next day, Thursday, July 10, Zone Alarm made updated versions available "which solve the loss of internet access problem," which should make it safe to allow Windows to (re) apply the patch. (I haven't yet done the Zone Alarm update, but I will.) Let's gloss over the annoying fact that Microsoft's "Add/Remove Software" doesn't have any (obvious) way to sort updates based on when-applied, much less a separate "Update/patch manager" the way some applications seem to. The Add/Remove approach worked, at least for me. Had it not, there were, as Professsor SFXvD noted, at least two other ways I can think of. One, use Microsoft's System Restore facility to revert to the most recent Restore Point. (Memo to self: Create a new Restore Point at least once a week. I try to do one before any software install, but even so.) This might sacrifice an install and/or config -- I _think_ that doing a Windows "Save State" would give me some way to re-recover. But it sure should undo that nasty update. Two, since it was a system problem rather than a network problem: Have a bootable Linux CD, with whatever key utilities I might need. I don't know if this would be able to see my Windows NTFS file system (hard drives), worth finding this out when I'm not in a hurry. Three, crank up my old IBM ThinkPad, which wouldn't have the dread update, since it's normally off, and therefore should work. Four, dial-up. I've got a modem card in my desktop. I think I've got dial-up access through an account -- another Memo To Self, find a zero-maintenance-cost dial-up provider for backup. Or do without connectivity for a while, or trot over to the library where there's Internet computers... if they're not already in use by fellow XP/Zone Alarm sufferers. Or, of course, copy files to a USB stick and go to the library and use one of their computers. (If I had a Blackberry or whatever, I could always use that for checking/sending email.) ("Get a Mac" or "Go Linux" don't count as solutions; for bad or worse, I'm working in Windows. I'm used to it, it ain't bad most of the time, and it's what most of my readers use.) The challenge, of course, is which solutions to invest time making ready, and keeping solutions up to date. Computers. Networks. Pfui.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164584555/warc/CC-MAIN-20131204134304-00075-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
7,377
39
http://www.googleplussuomi.com/photos.php?id=101196203388538107181&sort=comment
code
I am done with Windows 8! Aside from the new start page and desktop changes they've made that I wasn't very fond of, it kept becoming corrupt and in need of repair and it doesn't refresh itself in a way I was lead to believe it would. Since it was installed on my PC, it has suffered from a corrupted boot file twice (originally, I could either choose to boot to Windows 7 or Ubuntu, then either Window 8 or Ubuntu. I have no idea what's to blame for this problem, I just know that prior to installing Win 8, I never had any problems!). First time, I repaired it using it's repair tools to root out and fix the problem it found. While it fixed it, I noticed things on my PC weren't the same. Instead of booting to pick what operating system I would want to run, it would just go straight to Windows 8 and sometimes it would allow me to choose, but the look of the boot screen would go from DOS style to the new Windows 8 style. So long as it worked, I wasn't worried about it. The second time the boot file corrupted, I opted to use their new "refresh" option which should refresh the operating system files while keeping your personal file intact. It took a while, a long while but since it was overwriting system files, I wasn't worried. Finally it finished and I logged in. I went to the desktop and to where all my programs should have been waiting for me, under search. Nothing. Nada. Zilch. All the programs and games were present within search. I used the search bar and I began typing in some program names and they weren't found. I opened "my computer" (there isn't a quick way to do this on the desktop anymore... So I opened the control panel and went to My Computer) and I saw that hundreds and hundreds of gigabytes were were consumed on each of my hard drives... I went to the C: where Windows 8 was installed and I saw "Windows.old" and discovered all my files were there. It renamed the original windows folder and created a new installation around it and that upset me to no end. So, I am moving certain files to my now clean E: drive (R.I.P. Linux partition) so I can wipe Windows 8 out of existence! This summer, I will take the Windows 8 disc I burned to camp where I will burn it in effigy. Whether they fix it or not, I care not. I don't ever want to see that operating system again. It just doesn't behave correctly or in any sort of understandable way. If this is the direction they're moving in for the rest of eternity, I would rather abandon Microsoft altogether. P.S. I am not interested in trying to salvage any sort of experience on Windows 8. I don't want to use it anymore. I refuse to buy it or any device running it. Read post in Google+ Anyone else experiencing this problem with their G+ account? I either click on home, the Google+ graphic, or +Bob and I get this, a more times than I get my feed. Wondering if it's my browser or something I need to report. :-/ Read post in Google+ Slurpee? No. Slurpee? No. Slurpee? No. Slurpee? No. SLURPEE! NO! SLURPEE! SLURPEE! SLURPEE! NOOOO! car starts HTF did I get here? hehehe. Read post in Google+ One of my favorite things to do is play with clay but I haven't been able to do it for YEARS. While I was in college, earning a few degrees (don't get too excited, the first was humanities, the second was radio and television, and the final was information science... there was an attempt at geology but it was a nightmare. I had a decent basis but transferred into a upper-level lab class hell) Anyways, when I went back to college for information science, I took up ceramics again and these were two early pieces I created. The glaze is gunmetal black... That form above this CDs was one I did years prior and is broken. Poor guy's a mess. Read post in Google+
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708144156/warc/CC-MAIN-20130516124224-00016-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
3,741
8
https://forum.xda-developers.com/t/rom-11-0-aosp-20-06-2021-fluid-1-6-for-asus-zenfone-max-pro-m1-unofficial.4276249/
code
/* * Your warranty is now void. * * I am not responsible for bricked devices, dead SD cards, * thermonuclear war, or you getting fired because the alarm app failed. Please * do some research if you have any concerns about features included in this ROM * before flashing it! YOU are choosing to make these modifications, and if * you point the finger at me for messing up your device, I will laugh at you. */ Fluid is an aftermarket Android custom ROM distribution based on AOSP, focused on bringing a better UI/UX to Android with a fluid experience coupled with themes and customisations. Fluid doesn't aim at providing all the customisation available on the planet. We are focused on a cleaner, more Material design approach, with a few twists that assured, we do have a dedicated theme engine with cool stuff getting added every new update. So sit back andenjoy Fluid on your device! - Adaptive Playback - Included GApps - Double tap power button for Camera - Redesigned Themes page - Statusbar/QS/Lockscreen Customisation - Some other goodies Several system themes, icon shapes and fonts to choose from And most importantly: - New NXT UI Download Fluid for your device here! Wanna experience Fluid on your phone? Go ahead fam! - Download the ROM variant of your choice (Gapped , so no need of gapps again) - Make a full wipe (system, vendor , data, cache, dalvik) - Flash the ROM zip - wipe dalivk & cache - And at last Reboot! [First boot will take a few minutes! Have patience] Clean Flash is always recommended! Changelog for Fluid Rich (BB code): All 1.6 source changes: - The new NXT UI - The security patch - Notch city (immersive statusbar space and hiding notch) - Per-app volume control - Hide app in launcher - Fixed folders text in light theme (that still doesnt mean light theme users are respected) - Added new smartspace implementation - New way to calculate watts in lockscreen charging info - Fixed about app in third party launchers All Device side Changelogs: - Upstreemed to kernel version 4.4.273 - Updated ZenParts - More miscellaneous improvements Wanna report bugs and want them begone? Give Logcats, mention your device name, mention if any mods and kernels, if used and please be specific about it. By helping us, you are helping yourself too. -> How to take Logcats? https://goo.gl/UcTM9 and https://goo.gl/J4CSEP Also join our Telegram Community support Chat! Want to contribute to the development of this ROM? Checkout our Github People behind this ROM! Project Fluid, ROM for Asus Zenfone Max Pro M1 @pkm774 & @dhimanparas20 for helping Source Code: https://github.com/project-fluid ROM OS Version: Android 11 ROM Kernel: Linux 4.4.273 ROM SecPatch: JUNE 2021 LAST EDITED : 2021-20-06
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046155268.80/warc/CC-MAIN-20210805000836-20210805030836-00370.warc.gz
CC-MAIN-2021-31
2,716
32
https://pyra-handheld.com/boards/threads/talent-thread-discussion.28299/
code
I'd just like to remind people that even though I'm sure we all appreciate that you may be very talented outside of game development, our main concern in the Talent Thread is what you can do that's RELEVANT to game development. Also, please include SAMPLES when you add yourself, or at least add them relatively soon after. If you are listing yourself as a game designer, do give some notice for people who want to contact you for a sample of your game designs if you haven't finished any projects. Furthermore, finished projects for OTHER systems IS relevant, so do post links to those. Right now, some of the entries are a lot of talk and little action. Blah blah blah, I know this and this and this, yet there's very little to show for it. I'd like to think that if you concider yourself relatively experienced in something, you have SOMETHING to show for it, otherwise you're just full of hot air.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413551.52/warc/CC-MAIN-20200531151414-20200531181414-00202.warc.gz
CC-MAIN-2020-24
901
4
http://www.robertnelms.com/
code
This is my portfolio website for video editing. This is a music video I edited with Send the Sages and Neal Fischer for the film Sushi Girl. 2011 - Gnomon School of Visual Effects Student Compilation Reel from Robert Nelms on Vimeo. 2011 - Gnomon Workshop Testimonial - Rick Baker from Robert Nelms on Vimeo. Pixologc ZBrush 10th Anniversary Video from Robert Nelms on Vimeo.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867374.98/warc/CC-MAIN-20180526073410-20180526093410-00203.warc.gz
CC-MAIN-2018-22
375
5
https://www.my.freelancer.com/projects/blockchain/centralized-crypto-exchange-script-must?w=f&ngsw-bypass=
code
create a binance exchange with these features an improve version of this [login to view URL] Username: zodeakx@ [login to view URL] Front End: [login to view URL] some additional info on the admin panel option to check the total holdings of the user per tokens and will be able to sort from highest to lowest holders option to check all the profit transaction per token in the profit tab Main Pair will be our token bep20 2nd Pair will be BNB-bep20 option to add additional pair on our current pair which is our token and bnb-bep20 pairs for bep20 or erc20 tokens api to fetch the data on our website for the pricing and volumes Get your wallet balance . Fully Automated ( deposit and withdraw ) . Buy / Sell Crypto with Market & Limit / Stop Limit Mode . Depth Graph . Advanced trader chart . Coins history data from 1 minute to 1 year and all time . Live trending on chart live chat . Detailed Market analysis Live market (sell/buy) with market balancing User Dashboards / Admin Panel Available Notifications Center . Running your own wallets ( your own nodes ) Fully responsive (Mobile, Tablet) and optimized look-alike application on mobile Advanced Admin panel Google Analytics easy setup 20 Languages . Google OAuth Login & Signup , Authenticator , sms / e,mail verification Password user reset Welcome & Password changed email notifications Email template easy customization , email verification link User signup form (with Google and facebook) 3 months free support for buyer after ordering the gig . add your ERC 20 and BEP20 tokens . development must be updated in github with proper documentations
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662534773.36/warc/CC-MAIN-20220521014358-20220521044358-00713.warc.gz
CC-MAIN-2022-21
1,608
37
https://blog.dataddo.com/6-tips-to-prevent-data-duplicities-in-google-bigquery
code
If you're working with data in Google BigQuery, you may have encountered duplicated data. This is a problem because it can lead to inaccurate results of analyses. There are several causes of data duplication in BigQuery, and ETL (extract, transform, load) processes are a common one. BigQuery was originally designed as an append-only database on the assumption that all data should be "dumped" in the database, then transformed and processed later (to remove duplicates, among other things). However, BigQuery's very favorable price and easy, serverless setup led users to deploy it in cases more suitable for traditional relational databases. Therefore, many issues previously related to technologies such as MySQL, Postgres, and SQL Server started to occur, including data duplication. Here are 6 tips for preventing data duplicates in your BigQuery tables: 1. Use a unique ID for each row of data. This will ensure that no two rows of data are identical. 2. De-duplicate data before it is loaded into BigQuery. This can be done using a tool like Dataddo, which helps you compose datasets with the granularity you need to prevent duplicities. 3. Use a partitioned table. When you create a partitioned table in BigQuery, each partition is assigned a unique ID. This means that ETL processes can't accidentally load duplicate data into the same partition, which would cause duplicates. 4. Use a clustered table. Clustered tables are similar to partitioned tables, but the data is clustered in a certain column (or columns) instead of being partitioned by a unique ID. This means that ETL processes can't accidentally load duplicate data into the same cluster. 5. Use the "Upsert" mode offered by Dataddo. This mode automatically detects and removes duplicates before they are loaded into BigQuery. In the Dataddo application, you can simply identify which column (or combination of columns) should be unique. 6. Use Dataddo's "Truncate Insert" mode. This mode erases all the data in an existing table prior to an insertion. Use this mode only when you do not need to preserve incremental changes in the data and you are only interested in the current "snapshot."
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104576719.83/warc/CC-MAIN-20220705113756-20220705143756-00643.warc.gz
CC-MAIN-2022-27
2,163
10
https://github.com/oilshell/oil/wiki/Structured-Data-in-Oil
code
Structured Data in Oil Oil will parse text so you don't have to! Links / Use Cases - What is a Data Frame? (In Python, R, and SQL) (blog) - Git Log in HTML (blog) - Oil and the R Language - Other Oil Use Cases: - lobste.rs comment on Oil philosophy for structured data
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313536.31/warc/CC-MAIN-20190818002820-20190818024820-00027.warc.gz
CC-MAIN-2019-35
268
8
https://www.toobler.com/blog/the-sha-1-hash-function
code
In this blog post, we are going to explore a core concept of the “Git” Technology : the SHA-1 Hash function. Briefly, any file in a computer can be thought of as a series of bytes, each of which is 8 bits. If you put these bytes from left to right, all files can be thought of as very large numbers represented in binary (base-2) format. Cryptographers have come up with a very interesting function called SHA-1 which has the following curious property: any binarynumber, up to 264 bits, can be rapidly mapped to a 160 bit (20 byte) number that we can visualize as a 40 character long number in hexadecimal (base-16) format. Here is an example using node’s crypto module: The point is that, even binary numbers which are very close, map to completely different 20 byte SHA-1 values, which means SHA-1(x) is very different from most “normal” functions like cos(x) Because a hash can be assumed to map 1-to-1 to a file, rather than conveying the full file’s contents to distinguish it, you can just use the hash. Indeed, you can just use a hash to uniquely identify any string of bits less than 264 bits in length.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473690.28/warc/CC-MAIN-20240222030017-20240222060017-00805.warc.gz
CC-MAIN-2024-10
1,124
5
https://www.rsmanuals.com/20221/wyse-50/page-24/
code
10. Click Next to begin the installation. The installation progress is displayed on the screen and after installation is complete, you are prompted to restart your system. Restart the system for the system changes to take effect. The current version of WDM supports an upgrade from WDM version 4.9.1 only. You cannot upgrade from any other version. If you are running an older version of WDM, you must first upgrade to version 4.9.1 and then upgrade to the latest version. NOTE: After you upgrade to WDM version 5.0, you must upgrade all devices with the latest HAgent packages available to make sure your devices can be managed using WDM. For more information, see the WDM 5.0 Release Notes. Before you upgrade, make sure you apply the following patches on the WDM 4.9.1 installation: To upgrade to WDM version 5.0: 1. Extract the contents of the WDM installer on the system where you have installed WDM version 2. Navigate to the folder where you have extracted the installer and run Setup.exe. The Welcome screen is displayed. 3. Click Next. The Component Information screen is displayed with the list of components that need to be 4. Click Next. The Security Information screen is displayed. 5. Read the Security Information carefully and click Next. The upgrade process begins. NOTE: The Security Information prompts you to configure the Secure Communications on your system. For more information, see Configuring Secure Communications. 6. After the upgrade process is complete, click Restart Now for the system changes to take effect before you start using WDM. Configuring Secure Communications Configuring Secure Communication using SSL:
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154796.71/warc/CC-MAIN-20210804045226-20210804075226-00477.warc.gz
CC-MAIN-2021-31
1,645
27
http://jqueryvideolightbox.com/jquery-overlay-with-video.html
code
3 EASY STEPS: Jquery Overlay With Video Overview1 HTML5 is the how to embed video from other website fastest growing web development trend and HTML5 video as a part of HTML5 becomes the html5 video safari new natural way to show video online. iPad, iPhone, Android, all new browsers declare the support for HTML5 video. It's great, but what is the usual route to create HTML5 video? First you need to find converters and make three versions of your video - .OGG, MP4, WebM. Then, to provide the jquery plugin thumbnail to video player compatibility with IE and old browsers you add a fallback Flash version of your video with Flash video player. And finally, you extract an image for poster and write batch lines of code to combine all of it... Quite complicated? Forget about it with Html5 Video Creator! All it takes is 3 easy steps to convert any of your video to HTML5: 1. Drag-n-drop video file to Html5 Video Creator; 2. Set poster image, select codecs, tune settings; 3. Press "Start". As a result you'll get an how to embed video to a site html page with all necessary code, images, and Jquery Overlay With Video videos. Html5 Video Creator makes your convert ogg video mpeg life easier with HTML5 video! HOW TO USE Step 1 - Adding video Press "Select new video" button. Browse to the videogalery website location of the play video on your own website folder you'd like to add and select video. This video will be automatically added to converter. You can also drag the free video player to add to website video to the html5 player soundcloud Html5 Video Creator window or select video from recent list. Step 2 - Specify settings In the html5 player video skin next window you can specify settings for the final video: select poster image, change video title, enable/disable 'Auto play' option. You can also set video size and resize method, select support for desired browsers and change the put streaming flash video on website watermark. After you have all the best html5 video player free settings defined, press the 'Start' button. Step 3 - Publishing of Video. Put video on website or local drive Now you are ready to publish your website video online or to a hot to add a video to website local drive for testing. Select the publishing method: publish to folder or publish to FTP server - - publish to folder. To select a html5 video player folder on your jquery popups for videos hard drive, just click the html5 video player on android Browse folders button and choose a location. Then click Ok. You can also set 'Open web page after publishing' option. - - publish to FTP server. The create website flash upload video FTP Location Manager window enables you to define a number of connections for use when uploading your web site gallery to an embed video player in a website FTP. You are able to add a streaming video in website einbinden vimeo yoputube new FTP site by clicking 'Edit' to the jquery video live box right of the video gallery for website to buy 'Publish to FTP server' drop down list. 'FTP Location Manager' window will appear. Now type in a embed video player in html meaningful (this html 5 video tag is not the jquery plugin for inserting videos actual hostname) name for your site and fill in the FTP details in the player video free for website appropriate fields. You will have to type in your hostname, e.g. domain. The free web video gallery flv jquery FTP port is normally located on port 21 thus this adding video s to website easy has been prefilled for you already. If your embedding flash videos on website web site uses another port, you will have to enter it here. Type in your username and password for the jquery drag drop video playlist connection. If you do not fill in this information, Video LightBox is unable to connect to your html code for embedding video site and thus not able to upload your videos to website. If this embed video in website flash website enables anonymous connections, just type in anonymous as the play videos on youe website username and your embeding video in buisiness website easy e-mail address as the put a gp3 video on a website password. You might want to change the how to load videos to my website Directory as well if you need to have your uploaded images placed in e.g. "www/gallery/". You can specify it in the websites templates video support FTP Folder field on the Publish Gallery window. Notice: Write the name of the how to embed video in your website folder where your jquery video upload on server website video gallery will be placed on the server. Notice that you should specify this publish facebook videos on your website field; otherwise your embed video to website code website video gallery will be uploaded into the apple html5 video root folder of your server! Step 4 - Add Video inside your add mp4 video to website html own page. Html5 Video Creator generates a posting mac videos to my website special code. You can paste it in any place on your Jquery Overlay With Video page where you want to add video. * Export your embedding video in html video using Html5 Video Creator app in any test folder on a ie8 html 5 video tag local drive. * Open the integrate video palyer in website generated index.html file in any text editor. * Copy all code for Html5 Video Creator and paste it on your html 5 video seek page in the play video files website the place where you want to have a video (inside the website embedded video BODY tag). <video controls="controls" autoplay="autoplay" poster="index.files/Ford_Mustang.jpg" width="480" height="352" >
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702447607/warc/CC-MAIN-20130516110727-00000-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
5,555
35
http://artofdawn.deviantart.com/art/Mime-Whisperer-363696457
code
So a friend of mine informed us through facebook that she pretty much couldn’t talk for a few days and joked about how she needed a “Mime in training” shirt. I pretty much only focused on “I need a mime in training” and started to think of what it would be like to have a mime in training following you around. I mean, they’re not a good mime and how would you understand what they were trying to tell you? Then my imagination took a firm jump into the weird pool where the water is warm and started to think of communication jobs that would be terrible to employ a mime for. Talking to ghosts would suck if you were a mime! Mix it up with the Ghost Whisperer and you have yourself today’s Bits of Nothing.
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462720.36/warc/CC-MAIN-20150226074102-00273-ip-10-28-5-156.ec2.internal.warc.gz
CC-MAIN-2015-11
720
2
https://www.alachisoft.com/resources/docs/ncache/prog-guide/python-client.html
code
NCache provides a Python Client to take advantage of distributed caching capabilities. This section details how to set up a development environment to employ this client and the prerequisites necessary to create client applications. NCache supports Python 3.7, 3.8, and 3.9 for its Python client. In This Section Python Development Environment Explains how to set up a development environment to employ this client. Client API Prerequisites Explains the prerequisites necessary to create Python client applications.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473360.9/warc/CC-MAIN-20240221002544-20240221032544-00313.warc.gz
CC-MAIN-2024-10
515
7
https://ironreignrobotics.org/2018-03-24-imakeftworth/
code
iMake 2018Tags: outreach, motivate, and connect Task: Present at the Fort Worth Science Museum iMake Festival The iMake Maker Fest is an annual event held by the Forth Worth Museum of Science and History to celebrate innovation and Maker culture. We've presented here before, most recently in the Rescue Recovery season. We really wanted to get in one more outreach event before worlds, and we already had a good connection with the museum from prior events, so we contacted them asking them if they had extra space for a 12x12 robot field. They did, and we came. We came early, around 8, so that we could set up an entire field for practice. Even though we're planning on volunteering, we still can't reasonably give up an entire day of drivers practice. So, we turned our outreach into a combined event - talking to parents and educators about FIRST, as well as more directly demonstrating that by driving our robots around the museum. We talked to about 900 people today from all over Texas, and had an overall very successful day. We had many parents interested in putting their kids in FIRST programs, and had a former FIRST official talk to us! We don't have much time to do any more outreach events before Worlds without sacrificing valuable time, so our next focus is solely on the robot and journal.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499845.10/warc/CC-MAIN-20230131055533-20230131085533-00866.warc.gz
CC-MAIN-2023-06
1,308
6
http://bato.to/forums/topic/23412-why-2-english-scanlations/
code
I wouldn't really fault you for that. A lot of people tend to come to similar conclusions that there are rules to scanlation. Where there are rules, people are then supposed to follow them. The problem lies in the fact that there are no rules (we are knowingly breaking copyright laws), nor is there truly such thing as claiming a series. There only exists silent nods of agreement. Everyone has the same ability to get a raw page and do what they want with it. Hell, pg183 was done by a few people hours before LLS did theirs, they just didn't choose to upload it here. That's not to say I, myself, don't think time is wasted in some regard. Having the benefit of being "first" leads me to wonder why the other continues to trail behind when there doesn't seem to be an increase in drive to do better, do it faster. On the other hand, LLS came out of nowhere and seemingly 'hijacked' it from them, so we don't really have the right to judge. While we work primarily for ourselves, we do still care for the series, its author, and the people that read it. That's why we try to fix errors and recombine pages in groups of ten, or seek out a means to work on volume-exclusive pages. Treat it like you would want to be treated, really. I would love to put and end to duplicate pages, sure, but if it means either party has to willingly give up doing something they enjoy, then I'd rather deal with seeing it multiple times. Better yet, recommend the administration to figure out a way to filter it in their new reader. Edited by Meiru, 22 October 2015 - 08:49 PM.
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806676.57/warc/CC-MAIN-20171122213945-20171122233945-00356.warc.gz
CC-MAIN-2017-47
1,560
4
https://alternativeto.net/software/openboard-keyboard-/about/
code
An open-source keyboard that does not spy on you! - Free • Open Source - Mobile Keyboard - Android Tablet What is OpenBoard? OpenBoard is a 100% foss keyboard based on AOSP, with no dependency on Google binaries, that respects your privacy. - Spell correction This app is opensource, the code is available here: https://github.com/dslul/openboard - 2,018 Stars - 216 Forks - 345 Open Issues Comments and Reviews - Mobile Keyboard I come from Gboard and I wanted to escape from the grasp of Google. However, I wanted to keep the ability to swipe on the space bar to move the cursor, and swipe on the delete key to delete several characters. Well, i tested 2 other FOSS keyboards (Florisboard and AnySoftKeyboard), and neither were satisfactory in this regard. However, everything is not perfect. I miss 2 other features from Gboard: Hopefully these get developped in the future. Kudos to the devs! A great privacy alternative to Gboard! Is it some kind of prerequisite that all privacy keyboards must have UIs made by a blind communist from the 40s? What is wrong with you? ...emoji, many languages, amoled theme, and its foss, magnific :) This is my go-to keyboard. I used to have Simple Keyboard, which lacked some features and isn't as polished (tested it just now again to make sure my assessment is accurate). OpenBoard has nice features like swipe-and-hold character deletion, spacebar swipe cursor, paste button, clipboard history, hold enter for emoticon button (if you don't want a emoticon button to clutter up the UI). Make sure you go through the settings to make the most of it. It's quite customizable and its dark mode is as you'd expect. It has a very nice (and reliable) haptic feedback (other keyboards have been janky in this regard). It's the best keyboard I've tried so far, including those "reinvented ways of typing-keyboards". I've spent more time testing keyboards than I want to admit. xD Bottom line, it's a very solid and functional keyboard helping you be more productive. It feels polished and reliable. As a bonus it's open source and privacy-oriented. It's good keyboard, but it doesn't have glide typing feature It is simple, yet has what I need and it is open source.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943749.68/warc/CC-MAIN-20230322020215-20230322050215-00188.warc.gz
CC-MAIN-2023-14
2,202
27
https://m.cmx.im/@a_coconut
code
我在前司起码面了几十个 new grad,基本都是 berkeley 的本科亚男,题目是万年不变的 word search ii,首先对方不管懂不懂都会直接开始一通说,带着一种迷之自信的气场,作为面试官的我也容易进入和对方一起讨论的环境中,并且更容易引导对方往 trie 的思路上面去想,我在写 feedback 的时候也能写说讨论之后对方自己想出了 trie 解法云云。 说实话一开始做面试官我简直 imposter syndrome 疯了,我算哪根葱面试这些天才儿童。。后来慢慢发现咱基础也没有差太多就是缺这见招拆招的从容自信,慢慢也就没那么妄自菲薄了。 同时也想强调模拟面试的重要性,刷题是有边际效应的,刷到一定程度就应该把重心慢慢挪到准备真正的面试上面,如何简洁准确地传达你的思路,如何边想边说边写,如何在 coderpad 里面用光标高亮选中来给对方像讲幻灯片一样地讲代码实现还有走一遍 test case,这些都和刷题一样重要,都需要加以练习,正式面试的时候就不会那么紧张了。 PS 如果有象友需要 mock 的话欢迎来问我,我愿做小黄鸭 ❝When I hire a junior dev, I'm not looking so much for experience as aptitude. I know you are not going to be a full contributor immediately. I do not expect you to refactor the codebase your first week. I'm looking for someone who thinks the right way; I'm gonna teach you what you need to know. The first few months are literally just training you on how our huge architecture and millions of lines of codebase works. You'll work with a variety of our senior devs and team leads on tasks that introduce to you our workflow. If the timing works out, we send you to a conference or two, usually with some strong suggestions on which panels to attend. The fact that they're giving you training is a positive! Why would I invest time and money in training someone I didn't think had potential? So they obviously see something in you even if you don't entirely see it yourself. The point is, we don't expect our junior devs to be full contributors until about six months in. We don't even count them into our sprint calculations until about month 4. It may be more than a year before they are fully confident in working on their own. The other thing I try to do is give constant feedback to our juniors so they know where they stand. It sounds like this might be where the disconnect is for you. I was having a beer with one of our juniors at a conference a few years back and he opened up about how he thought he was so far behind and was thinking about quitting. I was like, "Dude, you're doing fine, you're right where you're supposed to be." He looked like he was about to cry and the world fell off his shoulders. Since then I try to check on in juniors weekly or so just to reassure them that they're doing okay and/or provide feedback, although I will admit to being lax about this recently because I've been slammed. So maybe ask your peers for honest feedback.❞ ❝Communicate. Ask questions. Restate things to make sure expectations are clear. When you realize something is wrong, give a status update. Your manager/lead/project manager will be much happier to hear, "this looks like it might take twice as much time" with a week to go rather than, "I only got halfway through this effort." Set a time limit for how long you are willing to grind on a given problem before asking for help. This is something our organization just implemented per scrum team because even experienced developers often don't know when to ask for help. These things can help you find a better solution you might be missing, or alert the entire team to a big problem they may be able to avoid. Even if nothing can be done to fix a 2x increase in dev time, at least people know. Be kind. To yourself and others. We all have different experiences and strengths. People have wildly different feelings and reactions to asking for help, to being helped, to learning something, or to being corrected, so don't beat yourself up or berate others for not knowing something. Even things that seem like basics might be foreign to someone who transferred roles or doesn't work in a language as often. Sometimes we just need a fresh perspective to get un-stuck. Sometimes there's some crucial knowledge we had no other way to acquire. Sometimes we make a mistake or an assumption. Nobody is perfect or infallible, so don't expect it from yourself or others.❞ https://404.foundation/ 和https://brutalistwebsites.com/ 还有are.na上的频道也会有很多设计得好看的网站 晚上折腾了半天做了个telegram bot,定时去USCIS网站抓取数据,然后给我和家属发送最新的case status update。从此解放鼠标点击,每天刷刷telegram bot消息就能知道最新进展了
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304810.95/warc/CC-MAIN-20220125100035-20220125130035-00273.warc.gz
CC-MAIN-2022-05
4,891
17
http://myminiaturedonkeys.blogspot.com/2014/02/water-troughs-are-not-supposed-to-be.html
code
A couple of days ago I gave a closer look at the water "trough" (its actually a BIG round rubber bowl) and decided on my next day off it would be time to clean out that baby. Hasn't been scrubbed in months and as I felt along the sides I uttered an involuntary "yuck!". So today was the day. Hauled out more water from the house, shooed the donks from the vicinity and set to the job -- not what I would look forward to in 3 feet of snow. Grabbing the brush devoted to that task, I stuck my gloveless hand down in the yucky water. Scrubbed. Dumped the water (which of course just puddled under the trough), noticed there's still yuck left, so scrubbed a bit more, rinsed and refilled. Oh yes, put the heater back in - after cleaning the yuck off it too. Then on to the regular chores. Since I can only carry two buckets of water out on the sled, I'll need to refill at least once more today. And did I tell you the shed is starting to flood. And did I tell you I'm getting cranky.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592579.77/warc/CC-MAIN-20180721125703-20180721145703-00549.warc.gz
CC-MAIN-2018-30
980
6
https://e4.empatica.com/product-embrace
code
1. Activity Monitoring The Embrace collects your physiological data not only during exercise, but also at work, during your commute, during the night. 2. Data Analysis Your data is analyzed in real-time to give you feedback. 3. Data Clustering The Empatica system analyzes historical data and interactions with your Embrace. In the future this will help you to discover patterns in your daily habits and behavior. 4. Personalized Insight Visualize summarized data with various granularity to better understand your day.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475711.57/warc/CC-MAIN-20240301225031-20240302015031-00304.warc.gz
CC-MAIN-2024-10
519
8
https://library.mentonegirls.vic.edu.au/chinese-revolution
code
When accessing content use the numbers below to guide you: Brief, basic information laid out in an easy-to-read format. May use informal language. (Includes most news articles) Provides additional background information and further reading. Introduces some subject-specific language. Lengthy, detailed information. Frequently uses technical/subject-specific language. (Includes most analytical articles) Overview of Chinese history 1911 - 1949. (Khan Academy, 2013) When using this video don't forget to cite and reference your sources. For more information and help see the Kerferd Library referencing guide and / or CiteMaker. In text reference / citation: Khan (2013) or (Khan, 2013) Bibliography / Reference list: Khan, S., (2013). Overview of Chinese history 1911 - 1949, [eVideo]. Khan Academy. Retrieved from https://youtu.be/a9QtIfPIQl4
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402127075.68/warc/CC-MAIN-20200930141310-20200930171310-00466.warc.gz
CC-MAIN-2020-40
844
8
https://www.slideserve.com/lavi/map-coloring-to-graph-coloring
code
Map Coloring to Graph Coloring Part of a unit on discrete mathematics. Discrete math: What is it? • It is mathematics which studies phenomena which are not continuous, but happens in small, or discrete, chunks. • Some areas include graph theory (networks), counting techniques, coloring theory, game theory, and more. • It is the mathematics of computers. • It is finite, rather than infinite. It handles distinct chunks of information. You might talk about the schedule of flights leaving Chicago, but not the acceleration of one of those planes. A map is a two-dimensional drawing with regions to be colored. A graph is a mathematical object made of dots connected by lines. Maps versus Graphs Graphs in Computer Science • The term graph is used in a different sense in mathematics to mean a chart displaying numerical data, such as a bar graph, but the graphs that computer scientists use are not related to these. • In computer science, graphs are drawn using circles or large dots, technically called "nodes," to denote objects. • Lines between nodes indicate some sort of relationship between the objects. We can represent the map of South America using a graph: • Each circle represents a country. • Countries which share a common border on the map are connected by lines called edges on the graph. We have been studying map coloring in class. Recall the rules of map coloring: • Regions (or countries) which share a border must be colored different colors. • Regions which touch at only one point at a time may be colored the same color. • You must use the least amount of colors possible. We can study graph coloring as well: • Dots (or nodes) represent the regions, and a line between two nodes indicates that those two regions share a border. • On the graph, the coloring rule is that no connected nodes should be colored the same color. • Unlike a map, there is no limit to the number of colors that a general graph may require. • The "graph coloring problem" is to find the minimum number of colors that are needed for a particular graph. • This minimum number of colors needed to color a graph is called the chromatic number of the graph. Try coloring our Lands map using a graph: The graph can be colored with two colors, just like the map! The chromatic number of this graph is 2. Now try coloring the South America map using a graph! Here is another graph: • A line between two subjects indicates that at least one student is taking both subjects, and so they should not be scheduled for the same period. Using this representation, the problem of finding a workable timetable using the minimum number of periods is equivalent to the coloring problem, where the different colors correspond to different periods. What is the chromatic number of this graph? What are some other ways graphs and graph coloring are used to organize information? • Round-Robin Tournaments • Precedence Graphs (graphs which determine the order in which to complete tasks) • Logic Puzzles • Television and Radio Frequencies • See this example on the Web • Fish and Fish Tanks: also on the Web • Many more applications can be found by following this link! Now it’s time for a quiz! • Click below for a fun and invigorating quiz show game! Quiz Show
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301720.45/warc/CC-MAIN-20220120035934-20220120065934-00099.warc.gz
CC-MAIN-2022-05
3,293
11
https://www.computing.net/answers/consolegaming/us-ps3-compatibility-in-europe/56.html
code
you may need a transformer to run on different power supply USA 110v UK 240v. Games are region free. Blu ray as far as i know some have region codes some do not. google for the lists. what im not sure is the PAL (UK) vs NTSC output some one else can answer?? shouldnt worry if you use new HDTV & leads. watch out for import tax.
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285289.45/warc/CC-MAIN-20170116095125-00172-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
328
8
https://www.gamedeveloper.com/design/the-philosophy-of-puzzle-design
code
Daily news, dev blogs, and stories from Game Developer straight to your inbox The Philosophy of Puzzle Design Many people don't think about puzzle games as being difficult or hard to design, but for today's post, we're going to look at why a puzzle could be even more demanding than any soulslike or action game. September 24, 2020 11 Min Read The puzzle genre is one of the most popular among a wide audience of consumers—from the simple act of learning Tetris to the brain-melting of a Zachtronics-designed exercise. While puzzles aren’t known to tax players the same way as fighting a boss in Dark Souls, puzzle design and structure presents a unique consideration when it comes to progression, onboarding, and keeping the player from slamming their head against a metaphorical wall. Growing the Puzzle Genre Depending on who you talk to, a puzzle game could be anything from casual match 3 titles like Candy Crush, all the way to the subtly complicated Baba is You. One of the major aspects that has led to the growth of puzzle games has been doing more in terms of the presentation. Since its inception, many puzzle games are built as just a series of non-connected puzzles. If you were hoping for any kind of meaningful connection or story, your only answer was to play adventure games. The puzzle design of the adventure genre is in of itself its own design topic that we are not going to be looking at today. The puzzle genre started to elevate with games such as Portal, which brought the challenge of real-time physics and velocity to puzzle solving. Braid that invited players into a strange world and told a story through its puzzles and areas. Games like Spacechem not only proved that there were always new ways of designing a puzzle game, but that you could get really complicated with the design. More puzzle games were being released that incorporated elements from other genres. In a previous post, I spoke about elevating games with a greater focus on presentation, and this is something that has come to differentiate the successes of the puzzle genre. In the past 10 years, many indie puzzle games have taken to building a world around their puzzles—either connecting them by location or being used to advance the plot. Some puzzle games—like the award-winning Gris—brought a highly emotional story that captivated players as much as the puzzle solving. When we talk about puzzle design outside of the adventure genre, there are two popular philosophies that designers use. Linear and Nonlinear Puzzle Design While puzzle design is often a complicated task, the foundation that designers use can be broken down easily into two forms. The first is a linear puzzle. The player must solve a task using the tools and mechanics provided to them, and there is only one valid solution. Even games that give the player real-time control, such as puzzle platforming, can restrict the player’s options by limiting their control over the character while jumping. A popular example of this is “Sokoban” puzzles that challenge the player to move boxes to specific positions or create a path through a room. Handmade puzzles are a popular option for developers to flex their creative muscle and come up with ways to create brainteasers. For games built around a very specific or esoteric design, it is easier to onboard the player with guided puzzles (and we’ll talk more about this in a minute.) Nonlinear puzzle design relies on the player’s collection of tools to solve the task at hand The second kind of puzzle is the nonlinear type. In this case, the beginning options and the end goal are fixed, but there are multiple ways of accomplishing the solution. The most famous example of this would be the titles from Zachtronics who specialize in advanced puzzle design. For their games, just getting a solution is only half the battle, then you need to compare yours to your friends and make something better. This kind of puzzle design is more about emergent gameplay than brain teasers. As the developer, you are presenting the player with a variety of tools and asking them to build a solution out of them. Often, the player must manipulate whatever starting options with their tools in order to solve the puzzle. With linear puzzles, the player is not able to alter or change the parts of the puzzles outside of any fixed ways predefined by the developer. Any solution that meets the needs of the puzzle is considered a good one, but there is no such thing as “the correct solution” to a nonlinear puzzle. Zachtronics’ games have histograms that grade a solution on various attributes, but that doesn’t mean that one solution would be considered the best one. With Infinifactory, there are people who go for very minimalist solutions, and some who go for Rube-Goldberg master contraptions. Another way to look at nonlinear puzzles vs. linear puzzles is how the design is presented. Linear puzzle design typically doesn’t give the player any tools, but places what they want the player to use within the puzzle itself. Nonlinear design teaches the player about all their tools which are then carried from one puzzle to the next. As with a lot of our topics that we talk about, there is no superior option to puzzle design, it’s all about the implementation. With that said, regardless of your puzzle design, it’s important to think about onboarding the player to the thought process required. While it may not look it from the outside, good puzzle design is very hard to pull off. One of the hardest areas is onboarding, and where many puzzle games quickly lose new players. With action-based games, it is very easy to set up challenges or tests on the player’s mastery of the mechanics. Organic tutorials that are integrated into the game space have been a mainstay of action-based games going as far back as the original Super Mario Brothers. With puzzle-solving however, it’s not as easy to test the player. Like strategy and 4X design, you can walk the player through the mechanics and rules, but that doesn’t mean they actually understand what’s going on. The goal is to train the player to understand the hidden rules and dynamics of how the puzzles work so that they can figure things out and develop solutions without being directly told what to do. The problem with this goal is that too often the player either doesn’t understand what’s going on, or they’re not making that connection. With the titles from Zachtronics, a major part of the emergent gameplay is figuring out these dynamics between tools that are hinted at, but never outright told to the player. With Infinifactory, it is possible to set up logic gates and infinite loops (for the programmers reading this) using the tools provided, but the game never stops to tell the player that. And that right there is the trouble when it comes to onboarding—if you give the player too much, then you’re solving all the puzzles for them. However, if you give them too little, they’re not going to be able to connect the dots on their own. To put it another way, imagine you are explaining to someone how carpentry tools work. The only guidance you give is just telling them what each individual tool does; after that, you tell them to build a house. In many of my posts about tutorial design, I bring up the three questions you need to answer for the player: What am I doing? How do I do it? Why do I do it? And those questions need to be answered for every rule, object, or tool, that you give the player to solve a puzzle with. The order that you introduce puzzles and their mechanics to the player is crucial in the development process. Some games like to have an open-world structure that lets the player solve the puzzles in any order. The danger of this is having the player run into rules or new concepts before they have been properly onboarded to them. And that takes us to an important topic and something we don’t often talk about—why very few people finish puzzle games. The Thought Wall We always talk about action titles with the concepts of having a skill floor and a skill ceiling—the minimum and maximum level of skill in order to beat the game. And yet, we could say the same thing about puzzle games and the level of mastery required by the player to win. Even though many people will say that puzzle games are “casual” or “simple” games, they can be more brutal to play than any Dark Souls or Doom clone. The reason has to do with “the wall”—that moment when the player fails or gets stuck at a section. In action games, getting stuck at a challenge or hard section becomes a moment of pride when the player beats the boss, reaches the checkpoint, etc. That is the motivation for everyone who plays a soulslike or a Kaizo game. In these games, playing the game becomes an exercise to train the player to overcome the challenge. In soulslikes, the reason why they seem to get easier over the course of playing is that the player has grown in terms of mastery and knowledge of the game. The skill floor and ceiling of a soulslike are relatively close to one another, and someone who figures out the beginning of playing the game will have a good chance at finishing it. Getting stuck at a puzzle game often means that there is no other solution other than to just look it up The same can’t be said of puzzle games. Puzzles by their very design are black and white in terms of solving them—you either have a solution and can move on, or you don’t, and you’re stuck there. In action games, we have seen easy victories to nail biters and everything in between. There is no such thing as “training” or improving when it comes to puzzles. Unlike action games where knowledge and skill translate from one challenge to the next, the same can’t be said of puzzle gameplay, for the most part. The overall rules and structure of the puzzles in a game don’t change that much, but the dynamics and thought process behind them differs depending on the mechanics used. In the puzzle game Filament, the player’s goal in each puzzle does not change—they need to take a coil and wrap it around every tower to power them. What does change are the objects and process to solve each puzzle. In the previous section we talked about emergent gameplay, and how players start to learn how the tools or mechanics interact with each other. Unfortunately, many people are not able to make that connection for one reason or another. For them, this is where they hit the wall of playing a puzzle game, and when that happens, the enjoyment of the game nosedives. When someone gets stuck at a puzzle game, all progress comes to a halt, and there’s nothing the player can do to fix it other than solve the puzzle. Therefore puzzle games are more frustrating than action games in the grand scheme of things. As a developer, you have options when it comes to designing multiple ways of progressing through an action game—you can have the player grind for power, call in help, change their build, or simply lower the difficulty of the game. None of those options can be applied to a puzzle game. At this point, I’m sure someone is getting ready to comment with “why not just let the player skip the puzzle?” This is unfortunately an idea that is often the final nail in the coffin for players. The reason has to do with how puzzles are designed. Every puzzle in a set, or throughout the game, are built on the knowledge attained from earlier puzzles. If the player can’t figure out the solution to puzzle 3, then they’re not going to be able to solve puzzles 4, 5, and 6. Players can sometimes brute force a solution given enough time, but they’re not going to want to do this for every puzzle. Once they skip one puzzle, it is more likely they’re going to continue skipping. And therefore the drop-off rate of people playing a puzzle game often nosedive even sharper than action games. Further still, for puzzle games that don’t have a focus on presentation and are just a series of self-contained rooms, it can become very tiresome to play a game that is just repeating the same elements again and again. For puzzle games that boast 100+ different puzzles, it is very unlikely that people are going to finish all of them without having something else to focus on. A Puzzling Problem Puzzle design is an area that we don’t often talk about in videogames despite so many people who have enjoyed them. Trying to make one that is deep, engaging, and still provide players with help when they need it is tricky. I often think about the Artifex Mundi games and how they have an “instant solve” option that turns on if the player is stuck at a section for too long and if that could be applied to other games. For you reading this: Can you think of engaging puzzle games that kept you invested all the way through, and were there any that you hit the wall and stopped playing? If you enjoyed my post, consider joining the Game-Wisdom discord channel open to everyone. Read more about:Blogs About the Author(s) For more than seven years, I have been researching and contributing to the field of game design. These contributions range from QA for professional game productions to writing articles for sites like Gamasutra and Quarter To Three. With my site Game-Wisdom our goal is to create a centralized source of critical thinking about the game industry for everyone from enthusiasts, game makers and casual fans; to examine the art and science of games. I also do video plays and analysis on my Youtube channel. I have interviewed over 500 members of the game industry around the world, and I'm a two-time author on game design with "20 Essential Games to Study" and "Game Design Deep Dive Platformers." You May Also Like Accessibility and fancy footwork with GLYDR's John Warren - Game Developer Podcast ep. 40Feb 28, 2024 Exploring the 2024 State of the Game Industry report - Game Developer Podcast ep. 39Feb 2, 2024 Phantom inspiration and the ethical auteur with Xalavier Nelson Jr.Dec 8, 2023 Designing Killer Queen: from playground experiment to modern arcade sensationOct 18, 2023 Get daily news, dev blogs, and stories from Game Developer straight to your inbox Subscribe to Game Developer Newsletters to stay caught up with the latest news, design insights, marketing tips, and more
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475806.52/warc/CC-MAIN-20240302084508-20240302114508-00705.warc.gz
CC-MAIN-2024-10
14,369
52
https://entrain-vision.eu/about-us/early-stage-researchers/esr11-david-berling/
code
Throughout my life, I have been fascinated by fundamental questions. Studying particle physics at RWTH Aachen University allowed me to explore to which depth we understand the universe today and further equipped me with the ability to develop mathematical models of processes we observe in nature. Fuelled by my broad interests, I also followed lectures in neuroscience, and increasingly got fascinated in research on the brain. I did my master thesis in computational neuroscience in the group of Sonja Grün at INM-6, FZ Jülich. There, I investigated principles for cortical information propagation based on dynamical and anatomical constraints given in the brain. I joined EnTrain Vision as a PhD in the group of Ján Antolík at Charles University in Prague because this gives me the unique opportunity to take part in the rapidly developing research on visual perception while contributing to fundamental technology for cortical visual prosthetics which potentially brings vision to blind patients in future.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819273.90/warc/CC-MAIN-20240424112049-20240424142049-00403.warc.gz
CC-MAIN-2024-18
1,014
3
https://foorquiz.com/weekly-demand-for-dvd-rs-at-a-retailer-is-normally-distributed-with-a-mean-of-1000-boxes-and-a-standard-deviation-of-150-currently-the-store-places-orders-to-the-supplier-with-a-reorder-point-of-4-3/
code
Weekly demand for DVD-Rs at a retailer is normally distributed with a mean of 1,000 boxes and a standard deviation of 150. Currently, the store places orders to the supplier, with a reorder point of 4,200 boxes. The order quantity to the supplier is fixed at 5,000 boxes. Replenishment lead time is 4 weeks, fixed order cost per order is $100, each box costs the retailer $10, and the inventory holding cost is 25% per year (there are 52 weeks per year). Given the problem parameters, what is the optimal order quantity the retailer should order (whole number with no decimals)?
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510501.83/warc/CC-MAIN-20230929090526-20230929120526-00311.warc.gz
CC-MAIN-2023-40
578
2
http://www.travelpod.com/travel-blog-entries/dane/se_asia/1294679798/tpod.html
code
A Close Distance - Protests in Bangkok Nov 08, 2006 It's easier just to post the link. This is the article I wrote about the protests. Keep in mind that I wrote this in the midst of the worst of it and just after seeing a journalist wheeled into the hospital who had been hit by a grenade. The whole experience was close but distant. It's hard to explain. It was surreal.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123048.37/warc/CC-MAIN-20170423031203-00292-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
371
3
https://www.my-mooc.com/en/mooc/futureeducation/
code
- From www.coursera.org What future for education? - Free Access - Fee-based Certificate - 6 Sequences - Introductive Level Week 1 - How do we learn? This week we explore the learning approach of the course, and start to question what "learning" means. Through exploring different models of learning you will gain an understanding of different approaches to, and perspectives on learning. Week 2 - What is intelligence and does it matter? The focus this week is to challenge popular ideas around intelligence. We will consider what is meant by IQ, fixed intelligence, multiple intelligences and emotional intelligence, and the role that ideas about intelligence can play in encouraging or dissuading learning. Week 3 - What makes a good teacher? This week we challenge images of teachers, and “good” teaching. We will be considering how teachers can support the learning process. Week 4 - Can schools make a difference? The focus this week is to consider what roles schools play. We will explore assumptions that school improvement initiatives, and evidence on what makes a “good” school. Consideration will also be given to informal learning settings and other institutions of learning. Week 5 - Why do governments fund education? This week the emphasis is on the relationship between education and schooling, and we shall explore neo-liberal ideas about education and economic prosperity, social justice and individual development and fulfilment. Week 6 - What future for education? In this last week of the course we will consider the main challenges are for education and schooling into the future. By exploring different utopian visions for education, you will consider you own views on how education should develop into the future. Dr Clare Brooks UCL Institute of Education, University of London Coursera is a digital company offering massive open online course founded by computer teachers Andrew Ng and Daphne Koller Stanford University, located in Mountain View, California. Coursera works with top universities and organizations to make some of their courses available online, and offers courses in many subjects, including: physics, engineering, humanities, medicine, biology, social sciences, mathematics, business, computer science, digital marketing, data science, and other subjects.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816893.19/warc/CC-MAIN-20240414161724-20240414191724-00853.warc.gz
CC-MAIN-2024-18
2,307
16
https://konstantin.blog/2009/javascript-element-suicide/
code
Hey there! I'm currently working on a CLI tool to deploy WordPress apps to DigitalOcean. Check it out! It's free and open source. It doesn’t require an id, name or anything else. Furthermore it doesn’t even require its parent to have and id! This may be dumb, but I love it!
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00570.warc.gz
CC-MAIN-2022-33
278
2
https://mail.python.org/pipermail/python-dev/2005-April/052674.html
code
[Python-Dev] Check out a new way to read threaded conversations. python-dev at zesty.ca Thu Apr 14 13:27:20 CEST 2005 I hope you will not mind too much if I ask a small favor. Sorry for this off-topic post. I am working on a new design for displaying online conversations. (Some of you saw this at PyCon.) I'm conducting a short survey to gather some opinions on the current design. If you have just a few minutes to spare, would you please visit: You'll see a new way of looking at this discussion list that you may find pretty interesting. I look forward to learning what you think of it. I am very grateful for your time and assistance. (If you reply to this message, please reply to me only -- I don't want to clutter up python-dev with lots of off-topic messages.) More information about the Python-Dev
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738905.62/warc/CC-MAIN-20200812141756-20200812171756-00585.warc.gz
CC-MAIN-2020-34
807
16
https://lifehackchallenge.com/haldiram-food/
code
Top 10 Haldiram Food Nowadays, there are so many products of haldiram food in the market and you are wondering to choose a best one.You have searched for haldiram food in many merchants, compared about products prices & reviews before deciding to buy them. You are in RIGHT PLACE. Here are some of best sellings haldiram food which we would like to recommend with high customer review ratings to guide you on quality & popularity of each items. 601 reviews analysed 1. Haldirams Ready Eat Yellow Tadka Value for money is the ultimate aim of every person out there. You want the best you can (Or better) for the bucks you pay. In terms of Haldiram Food, Haldirams Ready Eat Yellow Tadka would be your best bet for getting a value for money. Launched Quite time Ago Haldirams Ready Eat Yellow Tadka was the best-sold product and even today, the sales number speak. Having such amazing features, all this is bundled up at a cost, which may seem high for few, but is actually very good if you compare its features. Our bet is Haldirams Ready Eat Yellow Tadka would be the Best Haldiram Food for Money. 2. Haldirams Minute Khana Dilli Choley Mildly Spicy whole chick peas with green chillies and aromatic spices cooked in a tangy tomato curry. 3. Haldiram Kashmiri Snack Mix Ounce Going ahead with our list, we have something very specific to a specific audience. Yes, Haldiram Kashmiri Snack Mix Ounce has a very selective audience with specific taste. It satisfies customer expectations (Given that your expectations don’t cross a limit) and it adds value for money but more importantly, it adds a style to the user which can be your fashion statement. Haldiram Kashmiri Snack Mix Ounce is definitely the must-buy for those who need a little of both quality and price efficiency and as per our analysis, Haldiram Kashmiri Snack Mix Ounce easily gets the award of Best Haldiram Food Under 100$. 4. Haldiram Haldirams Bhel Puri 400G Haldiram Haldirams Bhel Puri 400G is a veteran in the market and has been here for a long time. It offers something of a unique feature which no other competitor offers. Go for Haldiram Haldirams Bhel Puri 400G if you want to try out something of a fusion of new and classic. Fun & Interesting Fact about Haldiram Food is that even though Haldiram Haldirams Bhel Puri 400G is a veteran, the users are mostly younger generation. You can say fashion makes a turn after a century or so and things repeat. 5. Haldirams Sweet N Spicy Chickpeas Noodles Peanuts Haldiram’s Khatta Meetha (Sweet-n-spicy) Mix of Chickpeas Flour Noodles,Rice flakes, Green Peas & Peanuts – 35.30oz, 1kg 6. Haldiram Samosa Spicy Snack 400G Haldiram Samosa Spicy Snack 400G is a relatively new and late entrant in the market but surprisingly has surpassed beyond Haldiram’s Khatta Meetha (Sweet-N-Spicy) Mix Of Chickpeas Flour Noodles,Rice Flakes, Green Peas & Peanuts – 35.30Oz, 1Kg which have been in market longer than anyone. Haldiram Samosa Spicy Snack 400G brings you the best of the quality in the lowest possible cost. The Best feature of Haldiram Samosa Spicy Snack 400G is what has kept in the market. It certainly makes appearance in Reviews of Haldiram Food in 2020 owing to its price penetration strategy in the market. If you own a Haldiram Food and it could be any of the high value Haldiram Food, chances are that would be much costlier than Haldiram Samosa Spicy Snack 400G. Haldiram Samosa Spicy Snack 400G will have more than 50% of all its features. 7. Haldirams Samosa 200G Haldirams Samosa 200G is another one which falls under Haldiram Food for money. It is most regularly advertised product and we see ads of it almost everywhere. In the past, Haldirams Samosa 200G ’s parent company decided to launch a new line of Haldiram Food and that is what has revived them. Haldirams Samosa 200G has really upgraded itself to the current style and market changes and the best part of Haldirams Samosa 200G is amazing features. 8. Haldirams Khatta Meetha 1 Kg Haldiram’s Khatta Meetha 9. Haldirams Kashmiri Mixture Kg 2Lb Haldirams Kashmiri Mixture Kg 2Lb is again a mid of quality and price. It offers limited features in this pricing. There is another variant of Haldirams Kashmiri Mixture Kg 2Lb which falls into premium category but Haldirams Kashmiri Mixture Kg 2Lbis specifically targeted for mid-segment. Haldirams Kashmiri Mixture Kg 2Lb offers such a amazing features which makes it better than 70% of Haldiram Food available in the market today. Haldirams Kashmiri Mixture Kg 2Lb was our personal favorite and was voted as most admired product in TOP 10 Best Haldiram Food to Buy in 2020 – TOP Picks. We hope it makes to that list again this year. 10. Mopleez Soan Papdi Indian Sweet Last but not the least, if you haven’t liked any of the Haldiram Food yet, then Mopleez Soan Papdi Indian Sweet is your choice. It is another one which is Best Haldiram Food Under 100$ and Haldiram Food comparison have showed it has ranked best in past based solely on its features. Mopleez Soan Papdi Indian Sweet offers best features and although it does not have, Mopleez Soan Papdi Indian Sweet’s feature is unbeatable. We would recommend you to go ahead with this if you want an all rounder Best Haldiram Food Under 100$ By our suggestions above, we hope that you can found Haldiram Food for you.Please don’t forget to share your experience by comment in this post. Thank you!
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038917413.71/warc/CC-MAIN-20210419204416-20210419234416-00112.warc.gz
CC-MAIN-2021-17
5,410
31
http://robotsquare.com/2012/02/28/snatcher/
code
This autonomous robot finds, grabs and lifts objects, and it is featured in Chapter 13 of the Discovery Book. The robot is heavily popular among MINDSTORMS builders. It is especially used frequently in robotics competitions because of its versatile grabber design. Building and Programming this Robot Instructions for building and programming this robot are included in The LEGO MINDSTORMS NXT 2.0 Discovery Book. It can be built with just the pieces in the NXT 2.0 kit.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948619804.88/warc/CC-MAIN-20171218180731-20171218202731-00585.warc.gz
CC-MAIN-2017-51
470
3
http://www.vmwareandme.com/2013/12/how-to-configure-office-web-apps-2013.html
code
Open Windows Power shell & run below commands, WebApps Server URLs, For internal URL I am going to use Internal CA server & for external URL I am going to use GoDaddy wildcard certificate. Next open Windows Management Shell on Web Apps server for Configuration of Office Web Apps Server and create an web apps server farm. Run below command to create Web Apps Server farm, Now open below URL to check the new created Farm. https://webappinternal.vmwareandme.com/hosting/discovery The output will be as shown below, If you received any error such as “500 Web Service Exceptions” or “500.21 – Internal Server Error” when you open https://webapp.vmwareandme.com/hosting/discovery then repair .NET by using below command. For Windows Server 2008 R2Now we have completed WEB Apps server installation & Farm creation. Next step will be configuration of Lync topology, iisreset /restart /noforce For Windows Server 2012 dism /online /enable-feature /featurename:IIS-ASPNET45 Now open Lync server topology->Shared Components->Web Apps Server->New Office Web Apps Server
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121355.9/warc/CC-MAIN-20170423031201-00295-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,071
12
https://www.leaninwesthartford.com/wall-workout
code
Bring your bodyweight workout to a new level and ad a wall. No room for excuses here!! 😊 Working out doesn’t need to be a chore. You can do it anywhere without any equipment. You just got to find out what you like and then continue doing it. That’s th🧩. I love switching up the workouts for my clients and myself. It keeps the body guessing and most importantly: it’s FUN!! How many rounds can YOU do of the wall workout
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572077.62/warc/CC-MAIN-20220814204141-20220814234141-00447.warc.gz
CC-MAIN-2022-33
432
4
https://docs.cycling74.com/max7/refpages/seq
code
seq is a sequencer of raw MIDI bytes. You can control the speed of playback (only at the time you start it), read and write from files, and record from live MIDI input. See also midiparse and midiformat which you may need to get to and from raw MIDI. Specifies the name of a file to be read into seq automatically when the patch is loaded. overridetempo [int] (default: 0) If enabled (default = tempo attribute will override any tempo requested by the sequence. In this case, tempo attribute will not be updated when a new file is read, nor when tempo meta messages appear in the sequence data. The meta messages will continue to be output from the right outlet of the seq object in this case.(disabled)), the value of the The unmodified tempo of the sequence. This is a read-only value for convenience purposes. tempo [float] (default: 120.) If the seq has read a MIDI file with tempo information, the tempo attribute will reflect the current tempo at the current playback time. If the file has no tempo information, the default tempo is 120. (120 BPM). The tempo attribute can be modified to change the playback speed, but will be overwritten by tempo changes present in the MIDI file, and will be overwritten when a new MIDI file is read. Common Box Attributes Sets the text that will be displayed in the Clue window when the user moves the mouse over the object. background [int] (default: 0) Adds or removes the object from the patcher's background layer.adds the object to the background layer, removes it. Objects in the background layer are shown behind all objects in the default foreground layer. color [4 floats] Sets the color for the object box outline. Sets the type style used by the object. The options are: bold italic Possible values: 0 = 'regular' 1 = 'bold' 2 = 'italic' 3 = 'bold italic' Sets the object's font. Sets the object's font size (in points). hidden [int] (default: 0) Toggles whether an object is hidden when the patcher is locked. Sets the text that will be displayed in as a pop-up hint when the user moves the mouse over the object in a locked patcher. ignoreclick [int] (default: 0) Toggles whether an object ignores mouse clicks in a locked patcher. JS Painter File patching_rect [4 floats] (default: 0. 0. 100. 0.) Sets the position and size of the object in the patcher window. position [2 floats] Sets the object's x and y position in both patching and presentation modes (if the object belongs to its patcher's presentation), leaving its size unchanged. presentation [int] (default: 0) Sets whether an object belongs to the patcher's presentation. presentation_rect [4 floats] (default: 0. 0. 0. 0.) Sets the x and y position and width and height of the object in the patcher's presentation, leaving its patching position unchanged. rect [4 floats] Sets the x and y position and width and height of the object in both patching and presentation modes (if the object belongs to its patcher's presentation). size [2 floats] Sets the object's width and height in both patching and presentation modes (if the object belongs to its patcher's presentation), leaving its position unchanged. textcolor [4 floats] Sets the color for the object's text in RGBA format. Sets the justification for the object's text. 0 = 'left' 1 = 'center' 2 = 'right' Note: The seq object reads and writes both single track (format 0) and multi-track (format 1) standard MIDI files. It can also read and write text files in which each line consists of a start time in milliseconds (the time elapsed since the beginning of the sequence) followed by the (space-separated) bytes of a MIDI message recorded at that start time. For example, 0 144 60 112; 1000 144 60 0; 1500 192 31; 1500 144 60 112; 2500 144 60 0; plays the note middle C on channel 1 for one second, then half a second later changes to program number 31 and plays middle C again for one second. Out middle outlet: Indicates that seq has finished playing the current sequence. (The is sent out immediately before the final event of the sequence is played.) Out right outlet: If the current sequence loaded by seq contains MIDI meta messages, these are sent from the right outlet, prepended with the word , followed by the name of the meta metssage and the data. Known meta messages are: , , , , , , , , , , , , , , . Any other messages will be identified as . The text messages ( , , , , , , ) are converted to symbols. The meta message is displayed as a BPM value. |coll||Store and edit a collection of data| |follow||Compare a live performance to a recorded performance| |mtr||Record and sequence messages| |Max MIDI Tutorial 4: MIDI Basic Sequencing||Max MIDI Tutorial 4: MIDI Basic Sequencing|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100724.48/warc/CC-MAIN-20231208045320-20231208075320-00114.warc.gz
CC-MAIN-2023-50
4,671
59
http://furiouspurpose.blogspot.com/2007/02/lightroom-10.html
code
Now that Adobe Lightroom is out of Beta, I wanted to see how the final version has improved over the betas I'd tried. I enjoy Lightroom, but I find it to be a little slow and a lot flaky. Crashes were common, as were freezes and lengthy vacations where it was unresponsive. Having played with the final version for about an hour now, I can say two things: - I like some of the new features. Stacking, flagging, colors: these are useful, and some of these were things that made me want to use Bridge instead of Lightroom. - It doesn't seem to be a lot more stable. In the past half-hour, it's gone down on me three times. While searching for information, I see that Adobe already has a very lengthy page of potential fixes. This is not a good sign when we're talking about a new product.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917127681.84/warc/CC-MAIN-20170423031207-00496-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
786
4
http://stackoverflow.com/questions/11605342/change-default-equals-in-goog-structs-map?answertab=oldest
code
I am using Google Closure Tools. I am trying to store objects in a Map and I need to change the way that they are compared so that the keys will be evaluated as equal or unequal appropriately. Does anybody have clues as to how this can be done? Thanks! It looks like this can't be done at the present. I've rejiggered my code to use ints in the map instead!
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860125857.44/warc/CC-MAIN-20160428161525-00077-ip-10-239-7-51.ec2.internal.warc.gz
CC-MAIN-2016-18
357
2
http://coaches.evolutionarycompanies.com/system-requirements-sp-531
code
Operating Systems Supported: Mac OS X v10.5 or Later Windows XP, VIsta, Windows 7 or later Unix, Linux, Ubuntu, etc. ... uh ... yeah. Sure. Probably. And if you are running a Unix box, you probably don't need this page. The site and the site tutorials are both heavily reliant on HTML5. As a result, the site tutorials are best viewed in Mozilla's FireFox v14.1 or later. Google Chrome v20.0 or later get a higher HTML5 rating, but some users have reported problems with videos loading using Chrome. However, the following browsers and their corresponding versions should work: Firefox v12 and later Safari v4.5 and later Opera v10.1 and later Google Chrome v18.0 or later Other Tech Requirements and Information (video and audio) The Video and Audio Codecs All of the video screencasts are encoded in h.264 using the .mp4 format, and displayed using the HTML5 element for video and audio should play fine in your browser as long as you meet the browser requirements above. It is the only true cross-platform web-enabled format aside from the bug-ridden Flash. Additionally, we have included a download link for each video also in h.264 but using the .mov format. What this means to you is that you will need to download Quicktime 7.0 or later if you do not already have it installed to play the videos once you download them and are not using the browser to view them. All audio is in MP3 and uses the HTML5 audio element to play in your browser. You can email us for support using the contact form. If you do so, please be sure you have read this and are in comliante with the requirements. If you are not, be sure you have updated your browser to the most recent version and you are in compliance with the system requirements first. Then, when emailing, please include your OS and version, your browser and its version, and be as specific as possible when describing the problem. If you are receiving an error, please type the exact text of the error in your message along with the other information already stated. If you are having trouble with a specific page, please provide all of the above plus the URL of the page you are having trouble with. This will help the process of supporting you be much, much more efficient, and you will get a faster response.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247508363.74/warc/CC-MAIN-20190221193026-20190221215026-00455.warc.gz
CC-MAIN-2019-09
2,263
20
https://www.physicsforums.com/threads/no-one-to-talk-to.344562/
code
So I'm spending the weekend catching up on homework and studying before midterms next week. After a few days straight of studying, I need some small distraction to keep my sanity. Chatting with someone usually works, but no one is around. I can't imagine what these people are doing away from the internet on a Saturday night, but I think it was very inconsiderate of them to leave me alone. What can I do now? I don't know if music will be enough. Someone come talk to me! Ahhh! My book is alive! Oh, wait. False alarm. It just seemed to be moving for a second there.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591683.78/warc/CC-MAIN-20180720135213-20180720155213-00272.warc.gz
CC-MAIN-2018-30
568
1
http://diply.net/convert-pdf-to-rtf-online.html
code
Files of this format do not have restrictions on the length, number of types and image options, as they allow you to embed various multimedia tools, scan-line and vector images. The user can print text in Word, saving it with a. What file types are supported? They are supported by Adobe Reader and many browsers, providing the plugin is installed. This ensures that documents will be viewed in exactly the same way the author intended regardless of the device used to open the document. There is also no sign-up process, we wanted to keep the conversion process very simple without any unwanted steps. The format allows you to save the selection settings for text fragments, color solutions for the design of symbols, underlined text and much more. All you need is a browser and an internet connection. From conception to date, Adobe Systems has continued to support the format adding features with every iteration of the standard including hardened algorithms for document encryption and privacy. . The specification is a proprietary filename format first developed by Microsoft in 1987 to be supported in Microsoft word 3. Created in 1982 with the participation of experts from Adobe and Microsoft, so it is supported by most of the software solutions of the latter. It is integrated in Windows with version 2. The format was not released as an open source document format until 2008, though minimal proprietary technologies still controlled by Adobe Systems exist in the format. Through unformatted text, control words, control symbols, and groups, a piece of text can be encoded into an. Today, many freely available readers exist allowing you to open and view. The latest revision, version 1. It sets control words and symbols that act as a command in the formatting process. Microsoft Office Suite is still however the most dominant application associated with this specification. Wait till your file will be converted and click download rtf -file Portable Document Format File extension. Max file size supported is: 200Mb No signup or installation required FreeConvert. It is created by specialists from Adobe Systems using separate PostScript resources. Any file contains a description of a 2D or 3D document with all the necessary components scan-line, vector graphics, text and more. This means your computer will not be cluttered by unwanted software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655897168.4/warc/CC-MAIN-20200714145953-20200714175953-00089.warc.gz
CC-MAIN-2020-29
2,425
9
https://events.ucf.edu/event/1552898/evolving-cooperation-in-the-iterated-prisoners-dilemma-dr-david-mathias/
code
The Prisoner’s Dilemma is a simple two-player game in which two accomplices have been captured by the police and are being interrogated separately. Each has two choices: to cooperate with their accomplice and refuse to confess; or to defect by confessing and implicating their accomplice. The reward (symmetrically, penalty) that each receives depends not only on their own action but also that of the other player. In the Iterated Prisoner’s Dilemma (IPD), the players play multiple rounds of the game allowing them to learn about their opponent’s actions and act accordingly. The Iterated Prisoner's Dilemma has been studied in great detail in fields as diverse as economics, computer science, psychology, politics, and environmental studies. This is due, in part, to the intriguing property that its Nash Equilibrium is not a globally optimal solution. Many researchers have used evolutionary computation to evolve effective strategies for IPD. Typically treated as a single-objective problem, a player's goal is to maximize their total reward. Mittal and Deb created a multi-objective version of the game by including minimization of the opponent's reward as an additional objective. Here, we explore the role of mutual cooperation in IPD player performance. We implement a multi-objective genetic algorithm in which each member of the population belongs to one of four sub-populations: selfish, communal, cooperative, and selfless, the last three of which use mutual cooperation as an optimization objective. Game play occurs among all members, without regard to sub-population, while crossover and selection occur only within a sub-population. Our evolved players are tested against a population of Axelrod's strategies and the Gradual strategy. Testing solely using self score, we find that players evolved with mutual cooperation as an objective perform very well. In some cases, our cooperative players completely dominate the competition. Thus, learning to play nicely with others is a successful strategy for maximizing personal reward. David Mathias is on the faculty of the Department of Computer Science at the University of Wisconsin – La Crosse. He holds a B.S. in Computer Science from the University of Delaware and a D.Sc. in Computer Science from Washington University in St. Louis. After twelve years at the Ohio State University, he took an accidental three-year sabbatical to hike in the Swiss Alps. On returning to the US, he landed in Florida which is both much flatter and much hotter. There, he joined Florida Southern College where he founded the Department of Computer Science. Eventually, the Florida heat drove him to Wisconsin in what his wife considers a classic overreaction. His primary research interest is genetic algorithms though he has begun to dabble in multi-agent systems. Location:Harris Engineering Center: HEC 356
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735860.28/warc/CC-MAIN-20200804043709-20200804073709-00374.warc.gz
CC-MAIN-2020-34
2,867
5
https://virilitygaming.com/epp-code-in-bluehost/
code
The “bluehost is a good host” question has actually been bugging me for rather a long time. It’s a typical concern on online forums and blogging discussions. Exactly how do you decide if Bluehost is a great host? I wish to explain the procedure in more information for those that are wondering about this. The most crucial point to look for when determining whether to host with Bluehost is integrity. Bluehost is by far one of the most trustworthy webhosting company I’ve had the satisfaction of using over the past few years. Bluehost utilizes their own took care of servers. There is no need to fret about downtime. For me, that is among the significant advantages of a host. If you’re the kind of individual that requires your site up and running asap, that may be an issue. Nonetheless, the largest factor I recommend Bluehost is since it is a complete organizing plan. If you need to upgrade your holding account at any kind of point, you can constantly do so at an extremely affordable cost. An additional vital facet is that Bluehost will certainly aid you produce a full-featured web site that’s responsive. As an example, it has the ability to take care of PHP applications, blog sites, social media combination, as well as several other attributes that other webhosting do not have. You’ll have the ability to concentrate on marketing your organization rather than producing the current layout for the website. Speaking of design, the appearances of your web site actually won’t matter with Bluehost. If you’re simply getting going with a blog site, it’s not necessary to go for it. You simply require a wonderful, easy style that has a motif that you can conveniently deal with. Terrific assistance is likewise an additional advantage to using them. The assistance group is typically extremely responsive to your inquiries and also problems. You won’t need to question what’s going on when you can just go to their customer care department and ask what you require to recognize. The assistance department is also always there to answer your emails as promptly as feasible. You won’t need to wait for life for a reaction as they’re there to aid you every action of the way. The client service department additionally supplies complimentary upgrades. That’s right. You can obtain a totally free domain name, endless domains, unrestricted email accounts, unrestricted blog sites, unlimited buying carts, as well as endless data sources and material management systems free of charge. If you have any questions, worries, you can always contact the Bluehost support division. They’ll be greater than pleased to help you out with anything you need. It doesn’t matter if you require much more functions, a quicker server, or more advanced safety. To ensure that you fit using a webhosting, have a look in all of the functions as well as advantages that Bluehost has to use. Then make certain that you can run efficiently while holding your website. When you do this, you’ll have the ability to feel confident that your web site will certainly carry out well and also be easy to operate. In conclusion, the very best way to identify if Bluehost is an excellent host is to utilize their on-line support and also seek client endorsements. If you can’t find a lot of problems from customers regarding the client support, you might intend to look in other places.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487643354.47/warc/CC-MAIN-20210618230338-20210619020338-00556.warc.gz
CC-MAIN-2021-25
3,401
12
https://discussions.apple.com/thread/4766473?tstart=0
code
Tried the hardware check which didn't work, which the instruction page says is because I need the Mac OS X install disc 1... ...Unfortunately I don't have the original installation discs bought it from a classmate at uni and it was her brothers and he lost/threw them away with the box back when he bought it new... blah blah etc Is there any other way I can do this check or find out what is causing the panic? Forgot to add the spec before, so here it is: Macbook 13" Unibody 2.4ghz Intel Core 2 Duo 250gb upgraded to 8gb Thanks for the advance I rang apple and they are sending me replacement disks, if that doesn't work I'll have to go to my nearest apple store which isn't so near... Just one more question! I just read your 'step by step to fix your mac' and came across the section on 'What you will need if on 10.6' I was planning on buying my own copy of OS X Snow Leopard 10.6 as a borrowed one to do the reinstall. Would I still be able to get machine specific 10.6 for my machine or would I have to get the retail version? Cheers for the replies your short to the point answers have been very helpful If you reinstalled any third party applications after doing the erase and install, these might be causing the KPs. A reinstall in that case won't prove it isn't software related. If you don't have the Snow Leopard Install DVD, how did you reinstall? You reinstalled 10.8? Is there more to the panic log than that? If so, can you post the full log. You appear to be running 10.8, why then do you want to install Snow Leopard? What replacement discs is Apple sending? As replacements, they would be sending the grey machine specific discs that originally came with the computer. No I haven't reinstalled anything after doing the erase and reinstall accept the software updates from apple. As I said before I borrowed a OS X Snow Leopard 10.6.3 to erase the hard drive and reinstall the system, I just wanted some advance on purchasing my own because I was just going to purchase the retail version from the online store. The full log is there at the top in my first post there is no more to it. I am running OS X Snow Leopard 10.6.8 which was originally 10.6.3 before updates. And yes, apple is sending me the grey machine specific discs that would have come with the MacBook when it was bought new 4/5 years ago. Ok thanks, will give that a go in the mean time. The discs are being sent free of charge, so they'll just be an added bonus from all this - it's always bothered me that I didn't have them. Also, it might be a stupid question, but what do you mean by 'you can trust a positive but the hardware test isn't reliable... etc'? Just that the Hardware Test isn't really great at finding errors, which is to say it isn't great at diagnosing. So if it comes back empty handed (a negative), that doesn't mean nothing is wrong. But if it reports an error (a positive) it can be trusted. If you can boot the computer and get on the Internet to download memtest, it would run a better check on the RAM than the AHT. But even there, as RAM errors are known to be elusive and random, it might take a fair number of loops to find anything. So, in case you can: To test the memory, get memtest and run it in single user mode, where it will test as much memory as possible, more than with the OS loaded. You can get memtest + directions from the link below. However, ignore running it from Terminal. Instead, boot into SU Mode, CMD-S at the startup chime. (Best to startup from a full shutdown.) At the prompt, simply type /usr/bin/memtest all 3 -L (From this link It will be installed in /usr/bin/) Then hit return. This will run three loops of memtest and create a log in Console in Utilties. The log may also appear in the Hard Drive Folder (Macintosh HD, unless you have renamed it), which is either on your Desktop or in the sidebar of a Finder window. If you want to run memtest longer, which may be advisable, since RAM errors can be very elusive, you can change the number of loops it runs by changing the number. For example, to run 8 loops you would enter /usr/bin/memtest all 8 -L. If you want to quit the test at any time, just hit control-c When finished, you can just type in "reboot" and hit return. Direct link for the download. Here is an Apple article that shows how to get at the RAM on a MacBook Message was edited by: WZZZ I've tried reseating the RAM with no luck I downloaded the memtest and tried to boot in SU mode to run it. It starts up in the mode then a similar kernel panic (there's a few extra lines to it) pops up in the SU mode - black screen white text - without the restart prompt. I'm doing the check now by running it through the terminal, so far it hasn't come up with anything but the requested, avaliable and allocated memory is 2069mb when there is 8gb installed might this mean that the other 6gb is causing the kernel panic? It's not that the other 6GB is responsible for the KPs--and I'm kind of confused about this myself, and will have to do some more research as to how to get memtest to test all the RAM. (I believe memtest was developed before RAM capacities became so large.) On all other systems, memtest executes in 32-bit mode with a maximum testable limit of 2 GB. It might be that it tests incrementally more of the RAM on subsequent passes. But don't really know. I will have to look into this. It does sound like you need to bring the MB in for a proper, professional diagnosis.
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461861735203.5/warc/CC-MAIN-20160428164215-00003-ip-10-239-7-51.ec2.internal.warc.gz
CC-MAIN-2016-18
5,442
41
https://searchsap.techtarget.com/quiz/4-What-is-EDA
code
4. Event-driven architecture (EDA) … a) Is a new approach to integration that makes use of peer-to-peer communications to handle events throughout the extended enterprise. b) Uses a higher-level business process management application that enables applications to be monitored and inter-connected using a mixture of pre-defined Web service endpoints and events. c) Is a relatively new approach to integration that uses a mixture of open standards, loose coupling and dynamic discovery features of Web services to implement complex EAI scenarios. d) Is an enterprise software infrastructure model in which events trigger the real-time exchange of messages between independent software applications. The main difference between EDA and SOA is that in SOA, all intermediate components suspend their operation until the relevant request /response call returns. EDA, on the other hand, does not have to wait for blocked calls to return, and all components continue to operate and flow because EDA's focus is purely on processing incoming messages and publishing outgoing messages. Return to answer page Return to the quiz
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038118762.49/warc/CC-MAIN-20210417071833-20210417101833-00006.warc.gz
CC-MAIN-2021-17
1,118
8
http://booksfuelyourmind.blogspot.com/2009/05/blogs-wikis-and-avatars.html
code
Sorry that I haven't been keeping up my blog. Things have been moving very quickly. I see my avatar (from Yahoo) has disappeared. I guess I need to double check the link again. I have created a wiki within one of my Moodle classes, but it doesn't have the functionality that I would like. I haven't had a chance to play with wikis for a couple of weeks.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583662863.53/warc/CC-MAIN-20190119074836-20190119100836-00283.warc.gz
CC-MAIN-2019-04
353
2
http://video.stackexchange.com/questions/5600/recommandation-for-a-360-degrees-video-camera-for-developers/5608
code
I'm a developer and I'm intending to develop a camera based surveillance software. The simplest way is to try and pick a 360 degrees video camera. I found some models but the problem is that the recorded/real-time flow videos are only readable by the manufacturer's software (example: GoPano). Is there any 360° video camera device that is shipped with tools for developers so that we can build our own softwares ? Are there alternatives ? The idea is to have a real time video flow that could be consumable by any platform (browser, iOS SDK, Android SDK, etc.).
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257831771.10/warc/CC-MAIN-20160723071031-00201-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
563
4
https://sharepoint.meta.stackexchange.com/users/2821/deepu-nair
code
More than 14 years of IT experience that included roles such as Project Manager, Solution Architect, Business Analyst, Team Leader and Application programmer. Top network posts - 23 Using calculated field to retrieve substring of another field - 17 Backup via SharePoint or backup via SQL Server? - 12 How to Handle Unathorized Exception - 10 Retract/Remove Solution - SharePoint 2010 - 10 Backup Office 365 sharepoint site? (company.sharepoint.com) - 10 SP 2010: Is there a log for outbound mail sent? - 9 When will be the next SharePoint version coming? - View more network posts →
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487616657.20/warc/CC-MAIN-20210615022806-20210615052806-00150.warc.gz
CC-MAIN-2021-25
585
10
https://forums.macrumors.com/threads/question-about-sorting-through-trash.281242/
code
Well, about an hour ago i accidently did the infamous cntl + A and delete for my whole iTunes library. Well I noticed what i did right away and quit iTunes, but i think a few files ended up in the trash. I'm just not sure which ones. I had a lot of stuff in the trash that was real trash (folders,files,songs). So I need to figure out a way to sort through these files and find the ones that weren't supposed to be deleted. I think I can handle the rest from there. The problem is that the View options for the trash can are very limited. I'd like to be able to view by the time deleted, but it only lets me view by last modified and so on. So is there anything that could help me sort through my trash a little better?
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039745522.86/warc/CC-MAIN-20181119084944-20181119110944-00357.warc.gz
CC-MAIN-2018-47
719
1
http://samplehotel.xyz/archives/24733
code
Novel–Monster Integration–Monster Integration Chapter 2019 – Body old relieved The thorns suddenly got out of the floor and started to pierce the person Grimm Monsters after another. These thorns tend not to carry significantly electrical power, but are extremely fast and razor-sharp they start to pierce throughout the Grimm Monsters while not providing them with any possibility to protect. In the data Ive go through, the procedure of rehearsing the first is downright torturous, also it uses a humongous level of tools that halted even those pick handful of who could practice it. It is far from the only person that could modify its measurement despite the fact that my changing dimensions are usual gigantification, it truly is some thing I had been working quite hard on due to several strengths it presented and again experienced used the designs of grandmaster. Rumble Rumble Ruble Some more mere seconds pa.s.sed if it finally ceased I had been quite amazed it finding it end at thirty-1 m.. To tell the truth, I had anticipated it to build over fifty m, nonetheless it looked like the human body improving artistry are not the same from the normal steps, plus i should not treat it as gigantified Grimm Monsters I might fork out a massive price tag generally if i do that. It is not only the enormous arcs with the lightning that is definitely merging using it but also the vitality of the stone wide brownish power is on its way down from your floor and streaming into its entire body. I am quite jealous of such with Apex Inheritance they appeared to have limitless arts in them, additionally they just have to look them out. Many people throughout record have dug out human body improving craft, even Huge Artwork from the Inheritance among the most famous was Ramona Hawthorn herself. This Jewel Super Tigerman is incredibly skilled to learn a entire body improving art to this sort of college degree, and i also needed to avoid the process, nevertheless i know I possibly could not you will discover a potent tier of energy appeared around it, it will likely be challenging for me personally to breach it from the typical suggests. The aura is just not intense, but it is powerful enough that it has started to alter the s.p.a.ce across the Grimm Beast. The thorns suddenly originated from the ground and begun to pierce the main one Grimm Monsters after yet another. These thorns will not have considerably electrical power, however are extremely fast and sharpened they start to pierce through the Grimm Monsters without the need of providing them with any chance to defend. 1000s of sleeker curly hair strigs launched from my body system, and they also started to weave around me. When they weave, they have came up with layers, and each level, when added onto my armour, would maximize my measurement. Khutch Khutch Khutch! beggars on horseback Nevertheless, furthermore, it has some deficiencies one of the primary is always that I could truthfully not utilize the new protective strategy I had developed in this particular type, and my mobility also minimized a lot, but despite these weak points, this method is incredibly effective. Body improving arts are wide and varied in the other artistry, which often work towards comprehension as well as. The body improving artistry function solely on the human body they are extremely hard to find, and only some men and women contain the appropriate const.i.tution to practice them, as well as then, people leave it halfway. ‘A physique polishing fine art!’ I claimed suddenly this is a, without any doubt, body system polishing skill. More moments pa.s.sed if this finally stopped I had been quite taken aback it discovering it quit at thirty-1 yards.. To be honest, I needed predicted it to grow over fifty m, but it looked like the human body improving disciplines are very different in the standard movements, and I ought not treat it as gigantified Grimm Monsters I would personally pay off an enormous price tag if I did that. My measurement begun to maximize easily, at a much faster quickness than it it only had taken me three mere seconds to flourish bigger than it, and four seconds after, I ceased developing when I reached twenty-eight meters. The atmosphere is just not explosive, but it is highly effective enough that this has started to affect the s.p.a.ce surrounding the Grimm Beast. I did not assault the main an individual because it was no work with it was extremely effective, and the ones thorns of mine can have only might have been capable of giving it a small injuries when it obtained attack it immediately. I am just quite jealous of those with Apex Inheritance they seemed to have infinite arts within them, additionally they simply have to burrow them out. Many people throughout background have dug out system polishing art, even Lavish Skill from other Inheritance one of the most popular was Ramona Hawthorn herself. It is stated that she had wiped out part of deal with together bare fist that humongously potent Grimm Beast acquired directly increased by her single fist. With my present power, I possibly could build thirty-three levels which helped me reach the twenty-eight yards, which happens to be part of the size I once had as i giagantified inside the Emperor phase. “I have done not count on my proceed to be invincible, the inability to identified by any person, but most folks who could obtain the genuine me acquired taken no less than seven a matter of minutes as you discovered them within just one particular,” Reported Material Lightning Tigerman as its surprise wore out. A large number of finer hair strigs introduced from my body system, and they begun to weave around me. As they weave, they already have come up with layers, and every layer, when put on my armour, would raise my dimensions. Chapter 2019 – Body It is not necessarily the only one which could alter its size however my changing dimension is common gigantification, it really is a thing I needed proved helpful very difficult on due to the several pros it made available and again experienced made use of the types of grandmaster. Even though, I am sure I could get it done with all the rule of thumb-twisting potential, I have done not want to broadcast it world wide when I possessed other selections. I am just not powerless once i searched to generally be there are a few tricks that I’ve not utilized yet. I had launched the eight thorns, which wiped out all the eight Grimm Monsters which had turned into smoking while causing the main just one wide-eyed with shock. “You work great, deserving for coven to spent a lot energy in eradicating you together with superior lord himself willing to deliver benefit should i kill you,” It explained inside a small voice its color produced the security alarm bells around my brain diamond ring loudly, and that i am clever enough to be aware of the reason behind it. A huge number of finer hair strigs published from my physique, additionally they began to weave around me. When they weave, they have came up with the tiers, each covering, when put on my armor, would enhance my dimension. It is not only the massive arcs in the lightning which is merging by it but the electricity of your stone heavy brownish power is coming down in the ground and streaming into its body. “I had used along with you enough already, of course, if I squander a longer period, the supreme lord will punish me instead of rewarding me regardless of whether I remove you most gruesome way so human anticipate to pass on, I am going to use my biggest episode to eliminate you,” It mentioned and atmosphere like never before launched by reviewing the human body. I am just quite jealous of these with Apex Inheritance they did actually have boundless arts inside them, and in addition they only have to drill down them out. Some people throughout track record have dug out human body refining craft, even Fantastic Skill from the Inheritance among the most renowned was Ramona Hawthorn themselves. With my existing strength, I really could create thirty-three layers which helped me to make it to the twenty-eight m, and that is 1 / 2 of the scale I used to have whenever i giagantified inside the Emperor point. Body system improving disciplines are very different coming from the other disciplines, which often work with understanding and energy. The human body polishing artistry do the job solely on your body these are generally extremely unusual, and only a few men and women possess the good const.i.tution to employ them, as well as then, folks let it rest halfway. Novel–Monster Integration–Monster Integration
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711045.18/warc/CC-MAIN-20221205200634-20221205230634-00402.warc.gz
CC-MAIN-2022-49
8,666
39
https://sourceforge.net/directory/language%3Acpp/license%3Aafl/?sort=update&page=7
code
RAD StudioTM: Build cross-platform apps ridiculously FAST! Delivering fast and powerful native applications for Windows, Linux, macOS, iOS, Android, cloud and IoT. Rapidly design, build, and run applications optimized for native performance, from a single code base across all platforms. With RAD Studio 10.2 you can securely connect and embed any data, on any tier, in the Enterprise, or cloud.Advertisement OSI-Approved Open Source (631) - Adaptive Public License (4) - Affero GNU Public License (3) - Apache License V2.0 (11) - Apple Public Source License (1) - Artistic License (3) - BSD License (20) - Common Development and Distribution License (10) - Common Public License 1.0 (7) - Computer Associates Trusted Open Source License 1.1 (4) - Eclipse Public License (2) - Educational Community License, Version 2.0 (5) - Fair License (1) - GNU General Public License version 2.0 (116) - GNU General Public License version 3.0 (8) - GNU Library or Lesser General Public License version 2.0 (38) - Public Domain (31) - Other License (6) - Windows (381) Grouping and Descriptive Categories (298) - 32-bit MS Windows (95/98) (16) - 32-bit MS Windows (NT/2000/XP) (90) - 64-bit MS Windows (13) - All 32-bit MS Windows (120) - All BSD Platforms (16) - All POSIX (88) - OS Independent (19) - OS Portable (41) - Project is OS Distribution-Specific (1) - Project is an Operating System Distribution (7) - Project is an Operating System Kernel (8) - Linux (261) - Modern (229) - Mac (100) - BSD (95) - Other Operating Systems (40) - Emulation and API Compatibility (33) - Audio & Video - Business & Enterprise - Home & Education - Science & Engineering - Security & Utilities - System Administration It is a fine tool to encrypt your data.It uses a dinamic algorithm and a nice interface.It`s easy to use and helpful.1 weekly downloads We will develop a device driver for an accelerometer. And, we are going to create a 3D model of the 2nd floor of our computer department. Finally, we will provide an interaction between user and some of objects where are in the Robotics Lab. Terra Artifex is a demo project presenting a novel approach to interactive terrain rendering for potentially infinite landscapes that can be modified in runtime. Gain visibility into your network behavior through continuos monitoring of network and servers, real-time tracking of configuration changes, analysing bandwidth bottlenecks, inspecting firewall logs, and thereby avert network disasters.Advertisement the bjx is a open source project for conversion of a 3d scene from 3DSMAX 9.0 to osg format. It will compeleted by Qt4 and C++. Lily is an ontology mapping system for (1) generic ontology matching; (2) large scale ontology matching; (3) semantic ontology mapping using search engine; (4) ontology mapping debugging; (5) ontology mapping evolution (under developing). Este es un manual de como funciona el cerebro humano explicado con algoritmos en lenguaje C/C++, y como interactua con las demas parte del cuerpo una opión muy alternativa de la inteligencia artificial común. FCGRAKit is a library for computer graphics programmers (C/C++/Java) Hi all. This our university project in gaming development. We are just learning. Nothing is guaranteed/tested. Ybred team. Some useful free tools to make life easier for NAMD users This a backup utility software that will allow a user to image a drive or partition onto another drive. This project is about diveloping new internet browsers with new features and hopfully to the publics liking. gcsh is a command line shell for Grid Computing (INFN-GRID distribution). Is design to hide the complexity of the below infrastructure to the final user, and simplify the access to non-computing researchers Simple C/C++ library to study and to construct an artifficial neuro networks. Cloudbased voice solutions are common in enterprise networks and frustrating for operations teams to manage. Simplify VoIP monitoring by having a proactive analysis of on-prem, hybrid and UCaaS voice services. Try the ThousandEyes VoIP monitoring solution today, free.Advertisement A novel algorithm to layout the contigs with more than one reference genomes at a time using global searches SYSTEM FOR DESIGNING AND SIMULATE CONCURRENT AND DISTRIBUTED PROGRAMS IN CLUSTER ARCHITECTURE Provides graphical interface for configuring relationships between cooperating, abstract processes and simulate it in real cluster environment, using MPI. Windows secure backup A backup application that creates a backup of a directory tree on a secondary device using strong encryption Hippal is an integrating GUI-framework for a multimodular symbolic A.I.-system IPAL, which combines A.I. Planning, Inductive Program Synthesis, Analogical Reasoning and Learning. Hippal is client-/server-based and uses the Lili Lisp Interpreter as Centr A toolkit with using Suffix Array indexing for empirical natural language processing. Providing functions such as searching the occurrences of n-grams in the corpus and suffix array language model which can use arbitrarily long history. If you are like the rest of our user community, your IT team is busy. With pressure to deliver on-time projects, you don’t have a lot of time to spend making your management tools work. You need network monitoring tools that work for you. You want tools that makes it easy to find performance issues before your users do and resolve them before they impact the business. That’s why tens of thousands of customers around the world love WhatsUp Gold.Advertisement Machine Learning approach to Go BTG Web Search Engine is developed for students or developers who are interested in search engine technology. The engine web will be written in C++, Java, Perl,and Python. At the beginning of the project, a simple search engine design will be used. Próba symulacji handlu za pomocą algorytmu mrówkowego. Used to generate graphs. A code base with several features built on top of Qt, and other OpenSource libraries. 2D-GraLab is a program that is dedicated to automatically generating schematic representation of nonbonding interactions across the protein binding interfaces. Our project targets to build real-time rendering ray tracer with advanced geometry supportting such NURBS or other spline surfaces. This project will be open and last for a long time, for I am not focusing on Graphics now.1 weekly downloads
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948581033.57/warc/CC-MAIN-20171216010725-20171216032725-00651.warc.gz
CC-MAIN-2017-51
6,389
72
http://geowanking.org/pipermail/geowanking_geowanking.org/2003-September/018479.html
code
Nigel.Wetters at lshtm.ac.uk Fri Sep 5 08:27:16 PDT 2003 I've just uploaded a module to CPAN named Geo::Approx. It should hit the mirrors tomorrow morning. Basically, it provides methods for converting between a single integer, representing a positoon, to a longitude and latitude, and it does this at various precisions (the integer can be 0 to 32 bits in length). Here's the POD Geo::Approx - represents an approximate global position by a single my $ga = Geo::Approx($precision); my $pos = $ga->latlon2int($lat,$lon); my ($approx_lat,$approx_lon) = $ga->int2latlon($pos); It is sometimes useful to condense the information present in a latitude and longitude into a single number (for example, when storing the position within a database). This module provides methods for this conversion. By default, the precision of the position is set at 32 bits Assuming the surface area of the earth is 5.1 x 10^8 sq km, the area represented by the single number at each precision is as follows: 0.12 sq km at 32 bits 0.24 sq km at 31 bits 0.47 sq km at 30 bits 0.95 sq km at 29 bits and so on (5.1E8 / 2^precision) These areas are constant across all latitudes and longitudes. Thus, if you want to be fairly precise about positions, you can store fairly large numbers, whereas if you want to be fairly imprecise, you can use small numbers. The constructor takes one optional argument - a number between zero and 32 indicating precision. my $ga = Geo::Aprox->new(24); By default, the precision is 32 bits. =head1 OBJECT METHODS =item $pos = $ga-E<gt>latlon2int($lat,$lon); Converts a latitude and longitude to an integer integer representing position. Latitude must be between -90 and 90. Longitude must be between -180 and 180. =item ($lat,$lon) = $ga-E<gt>int2latlon($pos); Converts a position represented by an integer into a latitude and =head1 SEE ALSO the post that raised my interest. Copyright (C) 2002,2003 Nigel Wetters. All Rights Reserved. NO WARRANTY. This module is free software; you can redistribute it and/or modify it under the same terms as Perl itself. More information about the Geowanking
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704433753/warc/CC-MAIN-20130516114033-00008-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
2,102
45
http://usb-port-monitor.com/help/usb_monior_window.htm
code
The monitor window displays data the filter driver captures for the selected device (fig.1). You can open this window using any of the methods described in the "User interface" section. Fig.1 Monitor window The data window contains the following interface elements: Toolbar - contains buttons for executing commands used to control data in the data window. The functions of these buttons are enumerated below (left to right): Start/Stop monitoring - start/stop capturing data. If this button is not available, the Monitor window is waiting for the device to be connected (you used the Open waiting monitor window command) or you have opened the window for a non-existing device (for example, by opening a workspace). Before the program start capturing data, it checks that the filter driver is correctly installed and displays the corresponding message if necessary. Filter - this submenu allows you to filter out data that you do not need to displayed. The filter parameters are passed to the filter driver and considerably influence the performance of the program. When you open this window, the filter parameters are set to the default values specified in the Program options dialog box. You can change the filter parameters for this window at any moment without modifying the default filter parameters. For your convenience, you can create several sets of filters and apply them when necessary. You can read about filter parameters here. Write data to a binary log file - this option enables/disables writing data automatically to a binary log file. If it turns out that no log file name is specified when you enable writing data to a binary log, you will see the corresponding dialog box where you will have to enter the name of the log file. View type - the way data is displayed in the data window. There are 3 data views predefined in the program. Show details about the URB - if the current data view does not allow you to see the entire information about URB, you can view it by clicking this button. It will open a new Information about URB window where you will see the entire information about the data packet (fig.2). Fig.2 Full information about URB Clear data on the screen - this button allows you to clear the data window. Open a binary log file - this button allows you to open an existing binary log file and, if you want, set it as the current log file that will be used to automatically write captured data. When you execute this command, you will see a dialog box where you are to enter the file name and that checks if the header of the binary file corresponds to the device the Monitor window is open for. In case the headers do not match, you will see a warning message. Save data to a binary log file - this button allows you to specify a new log file to automatically write captured data to or to save all or part of data to a new file and it is similar to the File | Save command. Copy all data to another binary file - this button allows you to save all or part of data to another log file or XML file and is similar to the File | Save as command. To save part of data, you should select two or more data packets in the data window. Delete the current log file - this button allows you to delete the current log file and all data in it. Find - this button is similar to the Edit | Find command. Find next - this button is similar to the Edit | Find next command. Print preview - this button allows you to print information from the data window using the printer. When you use this command, a new information window will be opened. It will display information about all data packets or about only those that are selected. The current data view will be used to display the information. Data window - displays captured data depending on the selected data view. When you move the mouse pointer to key words in the description (function names, text in bold type, pipe handles), you will see a tooltip for this word under the pointer. Status bar - located at the bottom of the Monitor window and shows its status. Ask a question about this topic
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202642.32/warc/CC-MAIN-20190322094932-20190322120932-00093.warc.gz
CC-MAIN-2019-13
4,069
21
http://intouchdynamicsgp.blogspot.com/2009/09/quick-reminder-v8-support-is-about-to.html
code
This is a Quick reminder for those of you still on version 8. Mainstream support for Microsoft Business Solutions – Great Plains 8.0 will end October 13, 2009 per the Microsoft Support Lifecycle Policy. This means that any GP 8.0 issues logged after Oct 13 will not be supported by Microsoft. You can still log these issues with the Touchstone email@example.com as we will support our clients on whatever version of Dynamics (GP) they are on. However you do need to be aware that should we need to escalate an issue to microsoft or the code requires a bug fix for a previously undiscovered bug, then the only option will be to upgrade to a supported version. If you are tinking of upgrading then there is an audit document available on our online knowledge base http://support1.touchstone.co.uk/c360.Portal/index.aspx or you can ask the firstname.lastname@example.org or your Account Manager. The Audit document contains sizing information about database sizes , numbers of modified reports and server specifications, all of which are needed to give an acurate quote on an upgrade. If you would like some help filling it in then the email@example.com will be happy to assist. Once it is completed send it tous and we can provide you with a quote for the upgrade. If you have any questions please feel free to contact firstname.lastname@example.org
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363420.81/warc/CC-MAIN-20211207232140-20211208022140-00023.warc.gz
CC-MAIN-2021-49
1,349
8
https://harleydavidsonbikepics.com/harley-davidson-road-king-test-ride/
code
Test ride and walk around of the Harley Davidson Road King About Craig Ballantyne 16915 Articles I love anything to do with Harley Davidson and have two beautiful children and a beautiful partner. In my spare time i like building websites and love anything to do with the internet. Harley 1949 FL Pan Head Fresh in stock at J&S Oakmere! Here it is: … source Get a step-by-step look at how to replace the clutch on your Harley-Davidson Sportster. Brad used the Barnett Extra Plate Clutch Kit to do the job … source
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505731.37/warc/CC-MAIN-20200401130837-20200401160837-00475.warc.gz
CC-MAIN-2020-16
517
6
http://www.mmo-champion.com/threads/1014386-Desperate-Prayer?p=14141504&viewfull=1
code
This spell is a must have imho. and dont forget this simple nifty macro /cast Desperate Prayer i had it in holy, i keep it in disc. really nice to cover up my fails. only time i die now is if it's on CD and i forget about it. I strongly recommend as survival talent over blessed resilience due to the spell being instant and without mana cost. I have this talent in both my Holy and Disc specs. I think it is extremely valuable. Its a great "oh crap" button, or just a great way to heal yourself up fast and go about your business. I couldn't imagine not taking the point. "It is only the great men who are truly obscene, for if they never dared to be obscene, they never could have dared to be great." Last edited by Sinn; 2011-11-09 at 04:14 PM.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125719.13/warc/CC-MAIN-20170423031205-00535-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
747
7
http://freecode.com/tags/php-5?page=16&sort=name&with=&without=
code
Wired-php is an XML-RPC client for interfacing with WuBook WebServices. Wired-php allows you to export booking online steps for tourism properties and it can act as a proxy gateway to update contingents on IDS (Internet Distributon System) via the Channel Manager WooDoo. The intended audience is tourism sites and property management system developers. It should be used to implement online booking for tourism properties or to manage room contingents on the Internet. XRDL is a language and tools for automatic client generation for XML-RPC services. It provides a way to create simple service definitions for XML-RPC services. It is inspired by WSDL, but aims for ease of use in the spirit of XML-RPC. It supports exporting complex (recursive) types, as well as methods. It includes a number of tools, allowing automatic XRDL generation for servers and clients written in PHP or C++/Qt. Zend Framework is a framework for PHP 5 that is based on simplicity, object-oriented best practices, corporate friendly licensing, and a rigorously tested agile code base. It is focused on building more secure, reliable, and modern Web 2.0 applications and Web services, and consuming widely available APIs from leading vendors like Google, Amazon, Yahoo!, and Flickr, as well as API providers and cataloguers like StrikeIron and ProgrammableWeb. Zend Framework Installer is a PHP class that can be used to setup files for an application based on the Zend framework. It creates a common directory structure as recommended in the Zend Framework's manual. The class can also generate a bootstrap file and the index controller with its view. allowHTML is a PHP class that can be used to filter insecure HTML by following OWASP AntiSamy rules. It can parse HTML documents using DOM document objects and then remove unsafe tags, attributes, and CSS parameters. It uses a configurable whitelist to determine which tags, attributes, and CSS style parameters are allowed. The class may also apply filtering rules defined in a separate AntiSamy XML rules file. c_xml is a class that can convert between XML files and arrays or strings. It can parse an XML file into a DOM document object, so it can be returned as an array or displayed using a XSL stylesheet. The parsed XML document can also be manipulated to add, change, or remove nodes. Nodes may be searched using XPath. The resulting document can be regenerated in XML format.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123491.68/warc/CC-MAIN-20170423031203-00052-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,413
6
https://www.sololearn.com/discuss/296360/whats-difference-between-html-xhtml-and-xml-
code
Whats difference between HTML, XHTML and XML ? still finding this confusing...😞😞😞 HTML is a markup language used for structuring webpages. XML is a standard for data representation. And XHTML is HTML code's representation in XML format :) As he said XML is a data transferer (Think of XML as HTML but the tags are invented by the one who rights). So you created a main program in java to make an app in android. Most of the info that you see in the screen is transfered by XML. XHTML is a "perfect" version of HTML. You can't make shortcuts , all tags must be closed... But runs faster in browsers. I have made a calculator in which my % (Percentage) not work correctly for 100%50 or 100%20. Python palindrome challenge. Number of Ones ( C++ ) question!
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499713.50/warc/CC-MAIN-20230129112153-20230129142153-00053.warc.gz
CC-MAIN-2023-06
762
7
https://webdesignerxx.online/2020/06/27/
code
Are you looking for professional web designer and developer? We will build high converting and professional website for you at affordable price. We are offering awesome web design and development service with unlimited revisions. Are you looking for competitive Web design for your business growth? Perfect, you are at right place as, I am working as web designer & developer since 2016 and I’ll provide you the competitive solutions for your needs to convert your ideas into reality by doing some discussions and research.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400279782.77/warc/CC-MAIN-20200927121105-20200927151105-00055.warc.gz
CC-MAIN-2020-40
525
3
https://quzzister.com/essay/gnu-public-license-essay-18719
code
So what is the GNU public license? According to GNU Operating System (2007), The GNU General Public License is a free, copyleft license for software and other kinds of works. (Preamble). What does this mean? Well, a copyright license for software, or any other type of works, are designed to take away the freedom of developers to share or change the software or work licensed. For example, Microsoft has a license agreement that prevents you from doing any modifications to any of their software, and stipulates any fees or distributions with that software. The exact opposite is true for the GNU General Public License as its intentions is to guarantee your freedom to modify and share any and all versions of a program or software covered by the GNU. This, in turn, ensures the software, or works, will remain free for all of its users. The GNU Public Licenses are designed to enable individuals the right to freely distribute copies of the free software, with provided source code, that you can modify and charge for if you like. If you modify it, add your own source coding to enhance or individualize the program, you have the right to charge for the software. You can also use parts, or all, of the coding from these software applications in new free programs. In order to protect your rights, the GNU prevents others from denying, or forcing you to relinquish any rights you have to the software. Now, with that being said, if you wish to distribute copies of the software, modify it, or sell it, you will need to comply with certain responsibilities to respect the freedom of other potential users of this software. So, if you decide to distribute copies of a program youve been working on under the GNU, free or otherwise, you should pass on the same rights to others that you received yourself. This means you need to make the source code available for those just as it was made available for you. Developers using the GNU general public license protect your rights in two ways. This is done by asserting a copyright on the software, as well as offering you access to this license to legally give you permission to modify, copy or distribute it. On the same note, for the author or developers protection, the GPL states there is no warranty to cover any software obtained under the GNU. For the protection of the developers, or any authors, the GPL requires that any modified versions must be marked as changed, so that any potential problems will not be attributed mistakenly to any previous developers. Finally, software patents constantly threaten all programs. To ensure their protection, the GPL assures that all patents cannot be used to render any program as non-free. The GNU general public license is a remarkable agreement giving many developers the free reign to modify and personalize software that they did not originally develop. This allows businesses the right to customize programs to fit their needs, and not be liable for any wrongdoing by modifying the original software. I am a huge fan of the GNU, and highly recommend you look into the use of GNU software as well. GNU Operating System. (2014). Retrieved from http://www.gnu.org/copyleft/gpl.html Stalling, W. (2012). Operating Systems: Internals and Design Principles (7th ed.). Retrieved from https://newclassroom3.phoenix.edu/Classroom/#/contextid/OSIRIS:44214502/context/co/view/activityDetails/activity/987e268c-c478-4f85-ab08-ea8d45bb90a3/expan
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304859.70/warc/CC-MAIN-20220125160159-20220125190159-00210.warc.gz
CC-MAIN-2022-05
3,434
7
https://bbwp.blackbaud.com/golives/ronald-mcdonald-house-of-st-louis/
code
Ronald McDonald House of St. Louis Ronald McDonald House of St. Louis provides a home-away-from-home for families of seriously ill children in the St. Louis area with 3 Ronald McDonald Houses and 4 Ronald McDonald Family rooms located inside 3 pediatric hospitals. Goals and Challenges: - Simplify the menu and make content easier to find - Better showcase impact and family stories - Create a more engaging homepage - Easier to edit and maintain - Created a simplified menu and reduced the number of overall pages - Designed a homepage that is more focused on what they do, impact, and stories - Turned family stories into posts so they are easier to display and manage - Developed the site in a way that makes it very easy for staff to update "Thank you so much for all your work! The site is looking Amazing! It has been great working with the team."
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100164.15/warc/CC-MAIN-20231130000127-20231130030127-00854.warc.gz
CC-MAIN-2023-50
853
12
https://www.rpgmakercentral.com/profile/79298-nomatika/
code
I am interested in what I can do with scripting. I was wondering how, if I put in the time to learn Ruby, I could add mouse support for my games and have a Quick Save hotkey built into them. Mouse Support: I like the games where all I have to do is press where I want my character to go and they begin moving in that direction. I am often annoyed when I am sprinting and it leads to bumping into walls and obstacles that would have been avoidable if I were walking. And it often happens when I am walking. It is really upsetting when I am trying to move to my destination as fast as I can trying to steer clear of monster encounters. Quick Saving: I think it would be convenient to have a built-in Quick Save hotkey so I, and those who will play them, don't have to go through the multiple menus just to save a game. Like in the example above, when trying to avoid conflict I would like the option to press a key that would automatically save my game to the last save file used and continue on until I need to quickly save again. Load/Load Game: A load option would be very nice. When I am faced with powerful monsters that I am trying to avoid on my way to a boss battle, and I am trying to conserve Mana and HP, it would be nice to have a quicker option of loading the most recent save file instead of quitting the game and have to reload the game through the start menu. I may find other ways to add more to my games that I feel would really improve them, for saving time and the general player experience. If anyone could help me figure out how to accomplish these things or give me advice on where to start and how to go about it, I would be a very happy camper. Any help, however little you feel you could give, is welcome and much needed ^_^
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510941.58/warc/CC-MAIN-20231001205332-20231001235332-00382.warc.gz
CC-MAIN-2023-40
1,748
5
https://docs.akamas.io/quick-guides/
code
Free Trial options There are two options when running an Akamas Free Trial: - 1.Akamas-in-a-sandbox (AIAS) - Akamas-provided sandbox as cloud instance - no setup time - sample applications (e.g. Online Boutique) included in the AIAS environment as optimization targets - predefined optimization study and artifacts available to quickly familiarize with Akamas concepts - access via both UI and CLI (from your own workstation) - 2.Akamas-in-a-box (AIAB) - Akamas server to be installed on your own system (server/laptop) - sample applications (e.g. Online Boutique) included in the AIAB package as optimization targets - ability to connect Akamas to your own environment to be managed. The AIAS option is the standard one that is activated, while the AIAB option is available upon request.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510238.65/warc/CC-MAIN-20230927003313-20230927033313-00614.warc.gz
CC-MAIN-2023-40
788
12
https://discuss.elastic.co/t/winlogbeat-unable-to-connect-to-elasticsearch/253612
code
I downloaded and installed SOF-ELK, imported it into VMware, powered it up then installed the winlogbeat on my Windows 10 laptop. I changed the following in the winlogbeat.yml file: Under the "Kibana" section I edited: host: "192.168.1.231:5601" Under the "Elasticsearch output" I edited: output.elasticsearch: # Array of hosts to connect to. hosts: ["192.168.1.231:9200"] however I am getting this error in winlogbeat: ERROR [publisher_pipeline_output] pipeline/output.go:154 Failed to connect to backoff(elasticsearch(http://192.168.1.231:9200)): Get "http://192.168.1.231:9200": dial tcp 192.168.1.231:9200: connectex: A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond. Is there anything I have to change on the server side to bind ip address?
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662555558.23/warc/CC-MAIN-20220523041156-20220523071156-00520.warc.gz
CC-MAIN-2022-21
879
5
https://forums.steinberg.net/t/ur816c-phantom-power-explanation/156349
code
Recently acquired a UR816C, which is amazing! However, the manual isn’t SUPER clear on how the phantom power works on the inputs 1-4. As an example, lets assume I have two guitars plugged into inputs 1 and 2 via TS cables and two microphones plugged into inputs 3 and 4 with XLR cables. If I enable the phantom power, does that only supply phantom power to the inputs with the XLR cables plugged in (3 and 4 in this example)? Or will it also (potentially with bad consequences) supply phantom power to the guitar cables in 1 and 2 as well?
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100603.33/warc/CC-MAIN-20231206194439-20231206224439-00176.warc.gz
CC-MAIN-2023-50
541
2
https://www.linode.com/docs/guides/open-web-analytics-install-and-launch-on-your-server/
code
Open Web Analytics (OWA): Install & Launch on Your Server This guide assumes that you have your Linode already set up and running, that you have followed: - The Getting Started guide. - The Securing Your Server guides. - That the Linode’s hostname is set and has a FQDN. The steps required in this guide require root privileges. Be sure to run the steps below as root or with the sudoprefix. For more information on privileges see our Users and Groups guide. Your server must be configured with a fully qualified domain name (FQDN) and not just an IP address. If needed, you can use the address provided in the Networking tab next to your public IP address. Make sure your system is up-to-date: Debian & Ubuntu apt-get update && apt-get upgrade Install the supporting software packages: This command is designed to work with CentOS 6, which uses MySQL as the default database and CentOS 7 which uses MariaDB. You will get a notice when installing that the other package is not available. yum install httpd php php-mysql mysql-server mariadb-server Debian & Ubuntu apt-get install apache2 php5 php5-mysql mysql-server CentOS users will need to enable and activate the systemctl enable mariadb systemctl start mariadb systemctl enable httpd systemctl start httpd chkconfig mysqld on service mysqld start chkconfig httpd on service httpd start Debian and Ubuntu users will need to restart the Apache2 daemon: service apache2 restart mysql_secure_installationto secure your database: You should answer yes to most of the prompts. CentOS users, make sure to set a strong password for the root user since it is initially blank. This is the root user for mysqland is not related to the system’s root user. Enter the MySQL CLI: mysql -u root -p You’ll need to enter the password you set in the step above, or when you installed Create a database named CREATE DATABASE owadb; Create a user named owadbuser. Replace the example password, owadbpassword, with a strong password of your choice. This information will be needed later to configure OWA. GRANT ALL PRIVILEGES ON owadb.* TO owadbuser@localhost IDENTIFIED BY 'owadbpassword'; Exit the MySQL CLI: Navigate to your document root folder for your webserver, usually Download the OWA package: wget https://github.com/padams/Open-Web-Analytics/archive/1.5.7.tar.gzVersion 1.5.7 is the current version and may be different by the time you read this. Please check The Open Web Analytics site for the latest information. Unpack the downloaded file: tar xf 1.*.tar.gz Change ownership of the owafolder to the Apache daemon user: chown -R apache:apache Open* Debian & Ubuntu chown -R www-data:www-data Open* Recommended: Rename the OWA folder: mv Open-Web-Analytics-1.5.7 owa Delete the tar file: rm -rf 1.*.tar.gz Navigate to the OWA installation page in your web browser. Replace your.domainwith your Linode’s IP address or FQDN: After clicking on Let’s Get Started, you should see a configuration page for your OWA installation. OWA will automatically fill in the first field with the path to your OWA installation. You will need to fill in the other fields on the page with the information you set in the MySQL CLI: Create a user account and define a domain to track. You will log in to see your OWA statistics through this user account.This process will display your password in plaintext once complete. Be careful if performing these steps in a public location. Log in to your OWA installation. In your browser go to: The first time you login OWA will present you with a tracking tag (a code snippet) for the domain you defined when you created your user account. This code should be added to the html pages of the site you wish to track. Once the tracking tag has been added to your website pages, analysis data can be viewed under the “Reporting” section (click the button at the top of the page) which will take you to the Sites Roster page. To add more sites to track, click “Add New” at the top left of the page. On the resulting page you will see near the top a section named “Add a New Tracked Site Profile”. Enter the domain name of the site you want to track and click Save Profile. The other two fields are for your information only and are, therefore, optional.You must click “Save Profile” before trying to enter any of the settings below this button. Failure to do so will result in a blank white page and your new site not being added. Recovery simply requires a click of the back button in your browser. Click on “Reporting” in the top left corner to return to the Sites Roster page. In the list of tracked sites, find your new site and click “Get Tracking Code”. Click “View Reports” in the Sites Roster page and begin happy analyzing! You may wish to consult the following resources for additional information on this topic. While these are provided in the hope that they will be useful, please note that we cannot vouch for the accuracy or timeliness of externally hosted materials. This page was originally published on
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818312.80/warc/CC-MAIN-20240422144517-20240422174517-00283.warc.gz
CC-MAIN-2024-18
5,019
61
https://bugzilla.redhat.com/show_bug.cgi?id=884650
code
Created attachment 660582 [details] q64 guest xml Created attachment 660583 [details] q64 guest qemu.log Looks like an issue with python bindings or python event-test example. Trivial patch that fixes the python event-test example sent for review: Reproduce this bug : Verify this bug with : 1) start a guest 2) virsh setmeme --live mig 800M 3) kill -STOP guest-pid 4) virsh dumpxml mig it can dumpxml immediately ,so mark it verified I open other console with "ython /usr/share/doc/libvirt-python-0.10.2/events-python/event-test.py" but it can not get event about balloon change , is it the expected result ? Well, that's expected with -2.340 build of qemu-kvm, since it does not support this event. On the other hand, you should be able to reproduce this bug with that package, are you sure no virt-manager, vdsm, or anything else that would be also talking to libvirtd was running when you tried to reproduce this? You need qemu-kvm-0.12.1.2-2.344.el6 to see this bug fixed and events reported. (In reply to comment #11) > Well, that's expected with -2.340 build of qemu-kvm, since it does not > support this event. On the other hand, you should be able to reproduce this > bug with that package, are you sure no virt-manager, vdsm, or anything else > that would be also talking to libvirtd was running when you tried to > reproduce this? You need qemu-kvm-0.12.1.2-2.344.el6 to see this bug fixed > and events reported. I re-verify this bug with : step as comment 10 , I am sure there is not virt-manager or vdsm or anything else event handler about balloon event works well : myDomainEventBalloonChangeCallback: Domain mig(5) 1047552 myDomainEventBalloonChangeCallback: Domain mig(5) 921600 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358233.7/warc/CC-MAIN-20211127193525-20211127223525-00091.warc.gz
CC-MAIN-2021-49
1,986
34
https://www.wired.com/2010/09/play-asteroids-in-html5/
code
A developer named Kevin Roast has created a slick demo of the arcade classic Asteroids using the Canvas element inside HTML5. Use the arrow keys and the space bar to control your ship. Also highly recommended: Press "R" to switch to the retro-styled graphics. The complex polygons of the modern graphics are harder to see (sorry, Kevin). Originally developed by Apple, Canvas is now part of the HTML5 draft specification and is supported by most major browsers. IE8 is lacking native support (it works with this add-on) but IE9 will fix that when it reaches the beta stage later this month. Kevin's demo has been around for a couple of months, but we're revisiting it because the author has taken the original code and created a brand new Canvas benchmark tool to test how quickly and smoothly your browser can render HTML5 animations. Run his new test code and you'll see a game simulation with more asteroids than your browser can handle. Also, when playing the actual game, you can re-create this effect by pressing the "A" key as you fly around. This adds new asteroids to the playing field, so you can test your browser and your skills.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103036176.7/warc/CC-MAIN-20220625220543-20220626010543-00087.warc.gz
CC-MAIN-2022-27
1,141
5
http://www.gamers4life.com/forums/f33/need-exper-141483/
code
Im level 64 priest (buffer\healer w/ malice and judgement). Currently a Tank priest, 7.1k hp, decent gear. I live in GMT-6, I'll be flexible w/ the Exper as you would be doing me a great favor. Msg me for more info. Oh and I'll have gold premmy once I find someone.
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720154.20/warc/CC-MAIN-20161020183840-00195-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
265
4