url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://lists.openldap.org/hyperkitty/list/openldap-technical@openldap.org/thread/EO3R5DQJP5VHA5W44ZGFRJDLWQQPX3TK/
code
On 08/13/12 12:15 +0200, Gilles Tual wrote: I was wondering if I could use OpenLDAP backend to simulate a virtual directory for a project. Is it possible ? If yes, is there documentation on it, or help (i'm not a pro on LDAP and virtual directory). Could you provide some specific examples of what you need? The wikipedia page on virtual directory covers such a wide range of possibilities that I'd have no idea where to start.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100184.3/warc/CC-MAIN-20231130094531-20231130124531-00898.warc.gz
CC-MAIN-2023-50
427
8
https://claylab.education/2022/02/09/why-do-i-need-to-learn-this-if-i-can-just-google-it/
code
Being a teenage student in this digitalized world, I’m obsessed with the current education system. One of the reasons for that is, the amount of curriculum that has to be memorized thoroughly, just to qualify an exam. Memorizing the information from textbooks and blackboards becomes a problem when we realize that all these can be searched on the internet and we can access it anytime. The leaders of our education system too are aware of it, but we saw no change or response to that (the NEP 2020 is in execution). So how significant is memorizing or learning the information which is already present on the internet? Let’s go through each subject to check how crucial learning or memorizing is : - Languages ( English, Hindi, Regional language) : According to me, language is a medium we use for our communication, through texts and speeches. So for me at least, if a person can read, write and speak a particular language with some accuracy, he need not learn anything more about it. A large part of grammar and writing formats ( letter, essays, summary etc) have to be memorized by the students, where I think most grammar is unnecessarily memorized rather than understood, due to the exam questions. Learning writing formats is totally unimportant, as they keep changing, and the latest versions can be easily accessed through the internet. The marks should be focused on the content of the writing, and not how accurate the format is. - Science and Math : Concepts here have to be learnt regardless of them being present on the internet. STEM ( science, technology, engineering and mathematics ) is about executing the knowledge to solve problems or make the system/machine function efficiently. The mind here plays the most important role, and it is not feasible to learn a large number of concepts by searching them, understanding them and then executing for the benefit. It’s vital to learn to proceed in this field. - History and Geography : A large part of memorization and learning comes under these 2 subjects. Dates, places, names, numbers etc have to be memorized in these subjects. This is where the question “ why not google it “ comes into play. After some basics, and necessary concepts, I think the subjects should be transferred into clubs where the interested students can participate and learn more, as all these concepts can be self learnt via the internet. Looking at the amount of necessary learning and memorization of concepts and information, I think there is very less unnecessary memorization present in the curriculum, but that too undoubtedly should be removed. I think some particular subjects like history and geography consist more of unnecessary learning and memorization, and the question gets a hype due to the unfortunate focus of the ed-system on memorization and putting that information in exams more than understanding and truly learning the concepts. Grade 11 science student
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646350.59/warc/CC-MAIN-20230610200654-20230610230654-00763.warc.gz
CC-MAIN-2023-23
2,931
10
https://solidrockit.blogspot.com/
code
Many computer users in the UK feeel like sitting ducks as there are no real support for the many broadband problems they are facing, espcially when not getting desired support from their ISP to rectify complicated or the simplest internet connectivity issues. Even with the birth of fibre broadband across the capital many areas are yet to enjoy the benefit of what its like to finally overcome long standing broadband internet problems which has for many, had resulted in years of uncessary frustrations due inadequate coverage or poor internet speed coming into their properties. Finding a reliable broand intenet support comany is like goal for many of these home and business users as they now have the voice to finally understand and challenge previous technical jargon thrown on them in the face of technology ignorance. For many of these internet users, technical conversation regarding broadband internet problems is like mumbo jumbo and tweedle-dom messages that makes absolutely no sense, which leave many conversations conculded and leave cuch users like sitting ducks. - I can't connect to the Internet - I can connect but the connection is slow - I have internet problems but not sure how to describe Typical Broadnband Performance Pain Points & Considerations - Number of connected internet users - in this case, considing the UK - Number of devices connected throughout the UK - Average Internet Connection Speed in London - Fastest Internet Connection Provider - Areas Worst Impacted by Broadband Internet Problem
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573759.32/warc/CC-MAIN-20190919224954-20190920010954-00373.warc.gz
CC-MAIN-2019-39
1,529
12
https://www.modadivasmagazine.com/en/2020/08/28/fabio-rusconi-collezione-autunno-inverno-2020-21/
code
For the Fall Winter 2020/21 season Fabio Rusconi, a women’s footwear brand founded in 2001 in Florence, which has always been attentive to quality and style, presents a versatile collection, with essential and trendy lines. The models that we find in the collection range from more flat shoes, such as ballet flats and loafers, up to models of different heights such as ankle boots, tube boots with or without zippers and lace-ups, thus offering footwear suitable to be worn comfortably in any time of day. Shoes with a wide, comfortable heel and a square toe, such as the moccasins with tubular workmanship and retro taste that we find in the collection in the printed python, shiny sioux and naplak variant, combined with the brand’s carry-over models with pointed toes on footwear such as ballet flats, pumps and ankle boots, renewed in the ball heel or in the heel in contrasting color.Models with essential shapes made even more captivating by the combination of materials and colors, such as the soft and unlined nappa, the protagonist of the Fall Winter 2020/21 collection, which we find proposed in two-tone ivory and black, printed python, or models with glossy finishes . Even the colors present some novelties and in addition to the classic and timeless black, we find in the footwear collection in warmer and lighter shades such as off – beige, peat, leather and antique pink. A collection with a refined and contemporary taste, designed for every woman.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506481.17/warc/CC-MAIN-20230923130827-20230923160827-00207.warc.gz
CC-MAIN-2023-40
1,472
4
https://fullstackwebstudio.com/locations/coding-blog/how-to-learn-php/
code
How To Learn PHP Since PHP is mainly used to output HTML, the whole skillset is a bonus. Often, a team has members which have varied strengths. But, none should be totally lost when looking at the code. A designer should know where to edit his html and the web developer should have a grip on everything he sees. PHP code exists between a starting and ending tag. The staring tag is <?php and the ending tag is ?>. Create a file called first.php and write the code below into the file. Then, save it and open it in a browser. echo “PHP is fun!”; echo ‘Isn’t it?’; PHP is fun! The codes below show how to create a link. echo ‘<a href =”myfile.php”>Click Here</a>’; echo “<a href =\”myfile.php”>Click Here</a>\”; //Yields: Click Here
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100164.15/warc/CC-MAIN-20231130000127-20231130030127-00843.warc.gz
CC-MAIN-2023-50
757
10
https://store.kde.org/p/1199712/show/page/2
code
This plasmoid adds the focused application title (and icon). Plasmoid with some ideas from activewindowcontrol by Martin Kotelnik, but simplified and changed as this one just adds the window title and the icon. Thank you for your work. I'm using "Application Title" with "Global Menu" and "Task Manager - Icons Only". I have just a question, is it possible to set a width limit maintaining adaptability? Thanks again.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988775.80/warc/CC-MAIN-20210507090724-20210507120724-00356.warc.gz
CC-MAIN-2021-21
417
3
https://techgoeasy.com/sql-tuning-set-in-oracle/
code
A SQL Tuning Set (STS) in Oracle is a database object that includes one or more SQL statements along with their execution statistics and context. It provides a means to store SQL statements for future use, such as input to the SQL Tuning Advisor or SQL Access Advisor, capturing workloads to move them from one database to another, or just as a general repository of SQL statements for performance investigations. The SQL statements can be loaded into a SQL Tuning Set from different SQL sources, such as the Automatic Workload Repository, the cursor cache, or custom SQL provided by the user. A SQL Tuning Set contains: - The set of SQL statements - Associated execution context, such as user schema, application module name and action, and the list of bind values - Associated basic execution statistics, like elapsed time, CPU time, buffer gets, disk reads, rows processed, cursor fetches, etc. STSs are created, manipulated and managed using the How to create the SQL Tuning Set You can create an STS using the CREATE_SQLSET procedure of the BEGIN DBMS_SQLTUNE.CREATE_SQLSET( sqlset_name => 'sql_tuning_set_1', description => 'tuning workload'); END; / where sql_tuning_set_1 is the name of the STS in the database and ‘tuning workload’ is the description assigned to the STS. How to perform loading in the SQL Tuning set SQL statements can be loaded into an STS from different sources like the cursor cache or AWR using the LOAD_SQLSET procedure of the Let’s see an example of loading from AWR from the Baseline DECLARE baseline_cursor DBMS_SQLTUNE.SQLSET_CURSOR; BEGIN OPEN baseline_cursor FOR SELECT VALUE(p) FROM TABLE (DBMS_SQLTUNE.SELECT_WORKLOAD_REPOSITORY( 'IO baseline', -- Base line Name NULL,-- basic_filter NULL,-- object_filter 'elapsed_time',-- ranking_measure1 NULL,-- ranking_measure2 NULL, -- ranking_measure3 NULL,-- result_percentage 30 -- result_limit )) p; DBMS_SQLTUNE.LOAD_SQLSET( sqlset_name => 'sql_tuning_set_1', populate_cursor => baseline_cursor); END; / Another example would be the AWR snapshot DECLARE baseline_cursor DBMS_SQLTUNE.SQLSET_CURSOR; BEGIN OPEN baseline_cursor FOR SELECT VALUE(p) FROM TABLE (DBMS_SQLTUNE.SELECT_WORKLOAD_REPOSITORY( 1116, -- begin_snap 1119, -- end_snap NULL, -- basic_filter NULL, -- object_filter elapsed_time, -- ranking_measure1 NULL, -- ranking_measure2 NULL, -- ranking_measure3 NULL, -- result_percentage 30) -- result_limit )) p; DBMS_SQLTUNE.LOAD_SQLSET( sqlset_name => 'sql_tuning_set_1', populate_cursor => baseline_cursor); END; / Displaying the contents of a SQL Tuning Set The SELECT_SQLSET table function reads the contents of the STS. After an STS has been created and populated, you can browse the SQL in the STS using different filtering criteria. The SELECT_SQLSET procedure is provided for this purpose. SELECT * FROM TABLE(DBMS_SQLTUNE.SELECT_SQLSET( '(disk_reads/buffer_gets) >= 0.75')); Dropping a SQL Tuning Set The DROP_SQLSET procedure is used to drop an STS that is no longer needed. For example: DBMS_SQLTUNE.DROP_SQLSET( sqlset_name => 'sql_tuning_set_1' ); Remember, managing the performance of SQL statements involves more than just collecting them. It’s about understanding their execution plans, identifying performance issues, and then tuning them to improve performance. The use of STSs and tools like the SQL Tuning Advisor can be very helpful in this process. I hope you find this article on SQL Tuning Set in Oracle Useful. Please do provide the feedback create sql baseline in oracle 19c : check out how to create sql baseline in Oracle 19c using cursor cache, AWR, STS . How to check if the sql baseline got created Autotrace in oracle :Autotrace in oracle , What is autotrace,how to setup it,Understanding Autotrace Output, Autotrace options, statistics displayed by autotrace STATISTICS_LEVEL in Oracle : check in this post STATISTICS_LEVEL in Oracle,How to get the activation level setting for each value,How to set this parameter
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510994.61/warc/CC-MAIN-20231002100910-20231002130910-00749.warc.gz
CC-MAIN-2023-40
3,946
30
https://lzomedia.com/blog/verify-two-shapes-are-equal-in-canvas/
code
i’m about to create small challenge for my team which is similar with challenge honeycomb candy in series Squid Game of Netflix. The idea is user will use mouse click to make a dot around a shape, then i will use api of canvas context to draw another shape from those dots. var canvas = document.body.appendChild(document.createElement("CANVAS")), context = canvas.getContext("2d"); context.beginPath(); // all points are given as x (from left to right), y (from top to bottom) context.moveTo(10, 20); // x = 10 (10 px from the left edge of the canvas), y = 20 (20 px from the top edge of the canvas) context.lineTo(100, 97); // x = 100, y = 97 context.lineTo(50, 105); // x = 50, y = 100 context.stroke(); finally i will compare this shape with the original shape, if they’re same then user win. anybody know how to compare two shape are same in js? or i need to compare each of dot of two shapes? Source: JavaSript – Stack Overflow
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585305.53/warc/CC-MAIN-20211020090145-20211020120145-00459.warc.gz
CC-MAIN-2021-43
939
6
http://www.platipus.nl/flvplayer/download/1.0/
code
FLV Player 1.01 by Theo Lagendijk is a fast, elegant, lightweight and most importantly free Movie Player for Flash video files. (*.flv's) In it's current form it contains; An indication of what fraction of the movie you've seen. The possibility to direct the play head to any point in the movie! A way to see how far the movie is downloaded* To show that the player is still responding but is currently not playing the movie because it's either loading, buffering or seeking. An about dialog that displays the FLV Players version number and points to the FLV Player website* The interface is predominantly white but has black outlines. This guarantees that the controls are visible in almost every movie context. The FLV Player can display video of any height and width that you want. (see instructions) There's a fullscreen toggle button. In resizing between the user defined size and the fullscreen size, the aspect ratio of the movie is maintained and the interface controls are redrawn to fit the new size.
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375096686.2/warc/CC-MAIN-20150627031816-00188-ip-10-179-60-89.ec2.internal.warc.gz
CC-MAIN-2015-27
1,010
11
http://hivelogic.com/articles/feeling-less-like-johnny-carson/
code
Feeling Less Like Johnny Carson I’ve been getting an insane amount of email recently, so don’t worry if it takes me a few days to respond to you. I will. Work continues on my weblog system. Small improvements, made daily, mark its slow progress toward completeness. The Vegetenarianism continues. Unfortunately, while I have no problem with my decision or commitment, I’m finding out how difficult it is to make it through the day without accidentially consuming a dead animal. Meat, you see, is everywhere. In everything. Salads tend to have bacon on them, even when you don’t ask for it. Spagetti sauce has “meat flavoring” in it. You can’t seperate that out, you know. Meat is everywhere you look. Suddenly, even chewing gum seems to be made mostly out of whole animals.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189252.15/warc/CC-MAIN-20170322212949-00377-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
787
5
http://www.serverwatch.com/news/article.php/10824_1130281_2/PythonURL-for-May-30-2000.htm
code
Python-URL! for May 30, 2000 Page 2 [http://www.egroups.com/list/python-url-leads/ is hibernating. Just e-mail us ideas directly.] To receive a new issue of this posting in e-mail each Monday morning, ask firstname.lastname@example.org to subscribe. Mention "Python-URL!". -- The Python-URL! Team-- Dr. Dobb's Journal (http://www.ddj.com) is pleased to participate in and sponsor the "Python-URL!" project.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187206.64/warc/CC-MAIN-20170322212947-00127-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
406
5
http://www.uwlax.edu/eagleapps/browsers.htm
code
EagleApps Supported Browsers Most internet browsers are supported by EagleApps. However, the following browsers usually take advantage of new features in EagleApps before Internet Explorer (Windows) - Chrome - for Windows and Mac, available at www.google.com/chrome - Firefox - for Windows and Mac, available at www.firefox.com - Safari - comes preinstalled on Macs For a full list of browsers supported by EagleApps visit http://www.google.com/support/a/bin/answer.py?hl=en&answer=33864.
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609523265.25/warc/CC-MAIN-20140416005203-00397-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
488
6
https://jaapwesselius.com/2013/07/
code
After a (successful) migration from Lync 2010 to Lync 2013 I wanted to decommission the old Lync 2010 servers. In my previous blog post I already explained why the CMS didn’t want to move, but the next issue was challenging as well. Before removing the last Lync front-end server you have to remove all Lync 2010 objects from this front-end server. Well known issue for example is the conference directory that for some reason always stays at the front-end server. Continue reading Unable to delete Lync 2010 Front End Pool after migrating to Lync 2013 After upgrading from Lync 2010 to Lync 2013 I was not able to move the CMS from the Lync 2010 front-end server to the Lync 2013 front-end server using the Move-CsManagementServer command. It constantly returned this error: Continue reading Move CMS from Lync 2010 to Lync 2013 Last TechEd in Madrid I got an interesting question about Exchange 2013 supportability in the PowerShell ISE (Integrated Scripting Environment). This gentleman was using the Remote PowerShell functionality in ISE and was wondering if this was a supported solution. It took some time to get a confirmation, but these are the supported scenarios: - Exchange Management Shell (which is running Remote PowerShell) – supported - Regular PowerShell connecting to Exchange via Remote PowerShell – supported - Powershell ISE connecting to Exchange via Remote PowerShell – supported Regular PowerShell or PowerShell ISE simply loading Exchange snapins is not supported unless Technet specifically calls out that you must run local PowerShell for a specific cmdlet. Remote PowerShell can be activated like this: $Session = New-PSSession –ConfigurationName Microsoft.Exchange –ConnectionUri http://ams-exch01.contoso.com/PowerShell -Authentication Kerberos This can be done in a normal PowerShell window or in the ISE: A Microsoft knowledgebase article was released recently regarding an issue with Remote Powershell, ISE and Exchange Server 2010 SP3: http://support.microsoft.com/kb/2859999 – Some cmdlets fail in PowerShell ISE after an upgrade to Exchange Server 2010 SP3 Now that Microsoft has released Exchange Server 2013 RTM CU2 it’s time to have a closer look at installing this Cumulative Update. In contrast with the previous Update Rollups as we’ve seen in Exchange 2007 and Exchange 2010, which were only a set of hotfixes bundled together, a Cumulative Update is a full version of the product. So, it is now possible to install an Exchange 2013 server from scratch using the CU2 download. Another advantage of a CU is that Microsoft can bundle new functionality into the product, even Schema changes are possible (as a matter of fact CU2 does include a number of Schema changes) but also the Configuration container in Active Directory can be changed. Continue reading Upgrade to Exchange Server 2013 RTM CU2 On July 9th Microsoft has released Cumulative Update 2 for Exchange Server 2013 RTM. Besides a large number of (undisclosed) fixes there are several enhancements in CU2: - Per-server database support – The maximum number of Mailbox databases has been raised from 50 up to 100. The Exchange Server 2013 Server Role Requirements Calculator also has been updated with this information; - OWA redirection – CU2 introduces a single sign-on experience when using Forms Based Authentication (FBA) which is great in a coexistence scenario; - High Availability – Exchange 2013 RTM CU2 introduces a new service, the DAG Management Service. The DAG Management service contains non-critical code that used to reside in the Replication service. This change does not introduce any additional complexities in event reporting, either – events are written into the Application event log with the source of MSExchangeRepl and crimson channel; - Managed Availability -In addition to improvements in various probes and monitors, there have been changes to the responder throttling framework. Prior to Exchange 2013 RTM CU2, many responders were only throttled per-server (e.g., RestartService). Now, these responders are throttled per group ; - Cmdlet help -Exchange 2013 RTM CU2 introduces the capability for administrators to get updates to Exchange Management Shell cmdlets without needing to deploy a new service pack or cumulative update. Administrators can launch the Exchange Management Shell and run the Update-ExchangeHelp cmdlet to update their local Shell help ; - OWA Search improvements; - Malware Filter Rules -Exchange 2013 RTM CU2 introduces the –MalwareFilterRule cmdlets. You can use the –MalwareFilterRule cmdlets to apply custom malware filter policies to specific users, groups, or domains in your organization. Custom policies always take precedence over the default company-wide policy, but you can change the priority (that is, the running order) of your custom policies; Setup.exe /PrepareSchema /IAcceptExchangeVersionLicenseTerms The configuration partition in Active Directory has also been changed to reflect changes (additions) in RBAC. To update the configuration partition you can use the following command: Setup.exe /PrepareAD /IAcceptExchangeVersionLicenseTerms Please note that with the new Service Model from Microsoft the Cumulative Updates are now a full product with a normal setup application. CU’s will now be released on a quarterly basis. A very important yet dangerous aspect of a full product is that an upgrade will overwrite custom settings on the ‘old’ Exchange Server 2013 server. A common example of this is OWA customization. Also, there’s no roll back model. If you’re not satisfied with the latest CU there’s no way to uninstall and revert to a previous version. As with all major changes please perform an upgrade first in a test environment and evaluate CU2 appropriately. These are the Release Notes, the Exchange Product Group announcement can be found here and the download can be found on the Microsoft download site.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338073.68/warc/CC-MAIN-20221007112411-20221007142411-00025.warc.gz
CC-MAIN-2022-40
5,940
34
https://wiki.alioth.net/index.php/SetCoordinates_randomizer
code
Oolites AI function setCoordinates: needs 4 parameters separated with a space, like: "setCoordinates: wpu 0 0 0.8" what means a point at 80% of the line witchSpaceEntryPoint to planet. Giles added a possibility to introduce randomize numbers in each of the coordinates separately. For this you must add a "rand:" in front of the coordinate without an additional space. rand: is a function with a lot of limitations. It first turns the number into an integer. Then calculates that many random numbers as the value of the integer is large. It adds all the random numbers and divides the answer by the original integer. This gives as result a real value between 0 and 1. Calculating a random function this way will give a truly random value with a starting value of one. The more random values you add the more likely it becomes to get a value near the center of 0.5 So use is limited to coordinate systems were you can work with results between 0 and 1 but it still leaves some useful use. "setCoordinates: wpu 0 0 rand:1" This will set a random coordinate anywhere on the line witchSpaceEntryPoint to planet. "setCoordinates: pwr rand:1 rand:1 6" This will set a point at 6 planet radii from he planet whit a deviation of maximal 1 planet radii on the line: witchSpaceEntryPoint to planet. Return to: OXP howto AI
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500368.7/warc/CC-MAIN-20230207004322-20230207034322-00775.warc.gz
CC-MAIN-2023-06
1,312
9
https://www.mail-archive.com/freebsd-current@freebsd.org/msg163273.html
code
I experience the following errors: after setting up ccache according to the howto I tried to compile world and runs correctly, takes appr. 3 hours to finish for the first run. Repeating it finishes in a little less than 1 hour. Make -j5 buildworld also finishes correctly and takes about 23 minutes. After finishing the kernel compile gives a lot of error messages: ccache: error: Could not find compiler "cc" in PATH but finishes, and the system appears to be working, but I think there must be some problem what I could not find. Compilation and installation finishes correctly if i do not use ccache but The system has been reinstalled from scratch, source tree was downloaded on Friday and updated few minutes before compile on Monday. The kernel config is a stripped down GENERAL (I left out those drivers and kernel modules which handle hardware not present in my laptop). I use src.conf to eliminate compiling such components which I do not use (BLUETOOTH, IPX/SPX, etc). COMPILER_TYPE is set in my .cshrc to clang. What can I do to eliminate the ccache error during installworld apart from not email@example.com mailing list To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589251.7/warc/CC-MAIN-20180716095945-20180716115945-00064.warc.gz
CC-MAIN-2018-30
1,207
21
https://www.experts-exchange.com/questions/20306177/Display-informational-message.html
code
I have placed an edit on a specific field and have a prompt that tests for the value in that field and displays a warning message if the value is over 100, but allows it, so the user just clicks ok and moves on. The problem is the message box keeps appearing for every field they tab to. This is because the form has auto refresh fields turned on. How do I have this message only appear once upon the initial field change. ??
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647153.50/warc/CC-MAIN-20180319214457-20180319234457-00028.warc.gz
CC-MAIN-2018-13
425
1
https://security.meta.stackexchange.com/users/53811/baurzhan
code
I believe recursion is not a mem of bash.org )) contact e-mail: firstname.lastname@example.org Member for 6 years, 2 months 0 profile views Last seen Oct 10 '19 at 15:18 Top network posts - 18 Is it a good idea to index datetime field in mysql? - 15 Suffix tree VS Tries - in plain English , what's the difference? - 14 How exactly hash fragment based security works? - 7 is starttls.enabled = true is safe for mail sending from java code? - 5 What will occur if I would use non final ConcurrentHashMap - 5 Why and when use dynamic servlet registration? - 5 Detect when a graph has been broken into two or more connected components - View more network posts →
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107880401.35/warc/CC-MAIN-20201022225046-20201023015046-00335.warc.gz
CC-MAIN-2020-45
661
14
https://www.bitdefender.it/site/ResourceCenter/toolbox/virus/1000271/
code
The file infector is a 2 part infection type. Each executable is infected with a piece of code that tryes to download from the address: http://www.365xinyu.com/... a file that actualy makes the infection. The infection creates the directory C:\windows\temp\ if it doesn't exist and copyes itself there and starts the execution. It also copyes itself in C:\Windows\ as alg.exe and in C:\lsass.bbb. The file stores in at the position 0xDA the current generation of the infection. It then creates the key: HK_LM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lsass that stores the path of the downloaded file to be executed at startup. This file is executed and infects all the executables from all accesible drives with the code that is responsable for the download.
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540495263.57/warc/CC-MAIN-20191207032404-20191207060404-00083.warc.gz
CC-MAIN-2019-51
781
4
https://www.wallcoveringuniversity.com/courses/setting-up-your-professional-workspace
code
Welcome to the course! - Free Course Preview FREE PREVIEW - How to navigate this course FREE PREVIEW - Meet Your Instructors - Some quick questions before we begin... - Get an overview of the course in this brief introduction. Chapter 1: Workspace Setup - In this chapter, you'll learn guidelines and best practices for setting up your workspace and table. You'll also learn professional pasting techniques for working clean at your table. Chapter 2: Workspace Safety - Safety is a top priority. Learn tips from the pros about safely using cutting tools and equipment, and other guidelines to help keep yourself and your work area safe. Chapter 3: Inspecting Goods - In this final section, we'll give you the complete rundown of what to look for when inspecting your wallcovering. From patterns and run numbers to reverse rolling, you'll have all the skills you need to ensure you're installing the best possible product. - Additional resources - Some quick questions before you go... Setting Up Your Professional Workspace Final Exam - Setting Up Your Professional Workspace Final Exam
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949506.62/warc/CC-MAIN-20230330225648-20230331015648-00701.warc.gz
CC-MAIN-2023-14
1,086
16
https://manpages.debian.org/experimental/mpich-doc/MPI_Aint_diff.3.en.html
code
MPI_Aint_diff - Returns the difference between addr1 and addr2 MPI_Aint MPI_Aint_diff(MPI_Aint addr1, MPI_Aint addr2) MPI_Aint_diff produces a new MPI_Aint value that is equivalent to the difference between addr1 and addr2 arguments, where addr1 and addr2 represent addresses returned by calls to MPI_GET_ADDRESS. The resulting address is valid only at the process that generated addr1 and addr2, and addr1 and addr2 must correspond to locations in the same object in the same process. The difference is calculated in a manner that results the signed difference from addr1 to addr2, as if the process that originally produced the addresses had called (char *) addr1 - (char *) addr2 on the addresses initially passed to MPI_GET_ADDRESS.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818999.68/warc/CC-MAIN-20240424014618-20240424044618-00080.warc.gz
CC-MAIN-2024-18
736
5
http://stackoverflow.com/questions/6220389/monitor-file-acess-of-a-running-application
code
Is it possible to monitor programatically file access of some running app on OSX? Creating/releasing file handle/descriptor? I need to know when some app reads from file and stops reading. I've not personally done what you're asking, but here are a few pointers that might get you started. Mac OS X comes with a command-line program, fs_usage, that does that, and more. You might be able to launch it as a helper app and parse its output. opensnoop does a similar thing. Finally, if you don't mind using private API, there's one which was built for Spotlight, which provides a notification system for filesystem changes. This tool is built on it. The source code is available.
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042990217.27/warc/CC-MAIN-20150728002310-00283-ip-10-236-191-2.ec2.internal.warc.gz
CC-MAIN-2015-32
676
5
https://escience.washington.edu/data-science-for-social-good-fellow-presents-at-netmob17/
code
Rachael Dottle, a 2016 eScience Data Science for Social Good (DSSG) fellow, recently presented a paper titled “A tool for estimating and visualizing poverty maps” at NetMob17 in Milan, Italy. This paper is a direct outgrowth of the team’s DSSG project. We reached out to Dottle to find out how her trip went; here are her thoughts in her own words. Last summer, I worked alongside three other fellows – Carlos Espino, Myeong Lee, and Imam Subkhan, and our project leads Afra Mashadi and [eScience data scientist] Ariel Rokem – to develop a model and visualization tool to estimate poverty in Milan and Mexico City using mobile call data and user-generated OpenStreetMap layers. After completing 10 weeks of work at the eScience Institute on our “Sensing the Census” project, we co-wrote a paper on our methods and results. A few months later, in early April, I had the privilege to represent the eScience Institute and the Data Science for Social Good Fellowship while presenting my team’s work at the NetMob17 conference in Milan, Italy. The NetMob17 conference is a major mobile phone network conference, hosted by Vodafone and featuring presenters across disciplines, both in the private and public sectors. It was a truly exciting experience for me as my first opportunity to present a paper at a conference, and represents just one of the many ways in which my time as a DSSG fellow has provided me with opportunities and new and invaluable experiences. Since working on my project as a DSSG fellow, I have continued to conduct research on network analysis, both using spatial and mobile phone data. The eScience Institute provided me with the opportunity to work on an interesting, engaging, and socially-minded project which has influenced my research and academic interests. I learned so much over my 10 weeks at the eScience Institute, and what is truly invaluable about that experience is the way in which it has influenced and continued to benefit me academically, professionally, and personally. I found an interest in network analysis, which I have continued to pursue as a topic in my independent research as a master’s student at Columbia. Traveling to Milan to present our work, and to see and hear from others working in the field of network analysis also allowed me to make great connections with others across the world working in the field. I was able to hear about the various ways researchers are applying different methods to the topic of utilizing mobile phone data for social good, and it has only further increased my interest in the topic. I could not have had these experiences without the eScience Institute, and I feel as though the fellowship has opened so many doors for me, and benefited me in more ways than I can even enumerate. Having the opportunity to present at NetMob17 in this stage of my professional and academic career has been incredibly beneficial, and I credit my experiences as a Data Science for Social Good fellow for many of my accomplishments this year following my time at the eScience Institute. I had the opportunity to hear from many of the conference attendees at NetMob17, and I believe my team was able to complete sophisticated, well-considered work during our 10 weeks at the eScience Institute, and I credit the support and resources provided to us during the fellowship with allowing us to produce work we can be proud of and that we can share with other researchers, globally. [This piece was lightly edited for clarity; hyperlinks were also added.]
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00523.warc.gz
CC-MAIN-2024-10
3,531
7
http://slashdot.org/~alexgieg/tags/censorship
code
Basically, if it doesn't make a heap of money for Hollywood executives and investors, then it's not really culture, right? That's a rhetorical way to put things. I can take your phrase verbatim and make it look as bad or worse for politically-backed productions by just changing the target: "Basically, if it doesn't give a lot of power to politicians and the lobbies that support them, then it's not really culture, right?" Everyone, no matter their background, flocks to the cinema for their entertainment. They all listen to music for which they have paid - music approved by RIAA represented companies. It's their choice. Don't act like the Internet doesn't exist, you can obtain almost anything you want, it's all one or two clicks away. Take it, show others, cause them to notice there's better stuff out there, just don't impose any of it on them. Let them decide. "Action thriller" is just about synonymous with "brain dead". And that's bad because...? If people like to have some escapist fun, what's the problem? Aren't they entitled to their small doses of endorphin? People want fun, let them have fun. It isn't like they cannot pursue higher goals at other times. Nudge them in that direction if you feel you must, but in the end always, always let they chose for themselves. As long as they aren't imposing their preferences upon you, it's their prerogative and it should be respected.
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510259834.25/warc/CC-MAIN-20140728011739-00376-ip-10-146-231-18.ec2.internal.warc.gz
CC-MAIN-2014-23
1,399
7
https://welfare.lino-framework.org/changes/2019.html
code
Released welfare and weleup 19.12.0 to PyPI. Fixed two bugs that caused server tracebacks in rare cases: lino_xl.lib.addresses.AddressOwner.get_primary_address()now returns None if MultipleObjectsReturned (instead of raising a server error). aids.ConfirmationsByGranting.get_data_rows() when confirmation_type of the aids type was empty. More changes in lino_welfare.modlib.cbss. The RetrieveTIGroups now works for the first time after their passing from v1 to v2! (The long delay is mostly due to administrative obstacles.) Released Welfare 19.9.1 and weleup 19.9.1. Site upgrade on the weleup preview site. Released Welfare 19.9.0 and weleup 19.9.0. lino_xl.lib.cv.LanguageKnowledge.has_certificate is a side effect of a change in Avanti which might be useful for Welfare as well. (#2968): Remove cal.MyOverdueAppointments from dashboard. Fixed #2946 Wrong age display (leap year bug) Moved Lino Welfare out of Developer Guide. Created a new repository The Eupen variant of Lino Welfare The welfare repo is now a library repo, similar to xl. It contains demo projects, specs and api for both weleup and welcht (it makes no sense to explain welfare without also explaining weleup and welcht, and it makes no sense to write technical docs about weleup without also explaining general welfare plugins). The doctrees of welcht or weleup just contain a short description, installation instructions and links to the real docs. Fixed a bug (#2917) in This table considered children as adult only one year after the age Added a test case to cover this: Melba getting adult. Released version 19.3.0 French translation of “Excluded from” is now “Du” (no longer “Exclus depuis”) Moved the chatelet part from the lino_welfare package into a new package lino_welcht. User code on production sites must replace We plan to do the same operation for weleup soon. Released version 19.2.0 (#2851) Remove the filter added 2019-02-27 on pcsw.PersonGroup so the choicelists show only the activated groups. This filter was asked by Chatelet. (#2850) add a filter on pcsw.PersonGroup so the choicelists show only the activated groups. (#2851) Added a filter on pcsw.PersonGroup so the choicelists show only the activated groups (#2851) Removed study_type from column_names of ContractsByClient, removed job_search from the main of pcsw.ClientDetail, moved ‘is_seeking unemployed_since seeking_since’ from history_left to history_right of the main of pcsw.ClientDetail.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100476.94/warc/CC-MAIN-20231202235258-20231203025258-00723.warc.gz
CC-MAIN-2023-50
2,463
37
https://theme.co/apex/forum/t/eliminate-render-blocking-javascript-and-css-in-above-the-fold-content/1774/2
code
I've tested and the links works. Sorry for the confusion though. There is no option to move that line to the footer. It could be possible with custom development but that would be outside the scope of our support. You might want to use optimization plugins which can move CSS to the footer or below the fold like WP Rocket. Please note though that this might break your site or any optimization in general could potentially break your site. With that said, if you're not familiar with how optimization works, it would be best to hire a third party developer. We do have an in-house custom development team that offer paid services, who may be able to assist. They can be contacted at firstname.lastname@example.org if this is of interest to you. If you have any further questions about the theme, we are more than happy to provide you with assistance on these inquiries. Thank you for your understanding.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250619323.41/warc/CC-MAIN-20200124100832-20200124125832-00176.warc.gz
CC-MAIN-2020-05
904
4
https://coderanch.com/t/486965/java/CHAR-JNA-mapping
code
Search within Java API Register / Login this forum made possible by our volunteer staff, including ... Stephan van Hulst Other JSE/JEE APIs CHAR** and JNA mapping posted 12 years ago Number of slices to send: Optional 'thank-you' note: I'm very new to JNA and have just succeded in some simple samples. I now have this function in my h file __declspec(dllexport) ADK_ERROR __stdcall AdkGetStr(ADK_DATA* pData, INT iFieldId, CHAR** ppsValue, INT iLen); Jnarator project set this up as ByValue AdkGetStr(ADK_DATA pData, int iFieldId, PointerByReference ppsValue, int iLen); The ADK_DATA works already since I have used it in oth calls but I can't succeed to map the CHAR**. I don't know how to use the This is what I've got so far. PointerByReference ref = new PointerByReference(); ByValue b = lib.AdkGetStr(pData, 12, ref , 16); I have tested a lot of different values for iLen but it should be 16 that is returned is max 16 characters. Any pointers? For my next trick, I'll need the help of a tiny ad ... Free, earth friendly heat - from the CodeRanch trailboss Boost this thread! Problem with a return with SAX Socket Write Issue can the following code produces Null pointer exception? code to handle arabic shaping text Need light-weight base64 encoder and decoder for MIDlet free, earth-friendly heat - a kickstarter for putting coin in your pocket while saving the earth
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662619221.81/warc/CC-MAIN-20220526162749-20220526192749-00379.warc.gz
CC-MAIN-2022-21
1,375
32
https://zenodo.org/record/3453789
code
Presentation Open Access This document represents all presentations, held during ESA Phiweek at ESRIN (Frascati / IT) at the side event "Interoperability of EO Cloud Computing Services With the openEO API". Following side event's description was published by the Phiweek's organizers. Planned outcome of openEO Copernicus and other novel Earth Observation (EO) programmes are generating data of unprecedented quality and volume. To scope with this, Petabyte-scale EO data centres and cloud computing services have been set up over the last decade, resulting in a variety of customised EO processing platforms. Nowadays, available services are ranging from Data-as-a-Service (DaaS) to Platform-as-a-Service (PaaS), are tailored by their user's needs and are often closed-source up to different degrees (e.g. DIAS, VITO, EODC, Copernicus Global Land Service, Google Earth Engine, Amazon Web Services, …). This heterogeneity, the diverse user demands as well as the emergence of the various service offerings makes it currently difficult for end users to compare results from different platforms, or costs of offerings. openEO is a user-driven open source project that develops an API (a language) for communication between users of diverse programming environments (e.g. web browser, Jupyter notebooks, RStudio) and various EO service providers. It aims at cross-cloud platform interoperability (i) to merge heterogeneous user communities of different platforms, now developing combinable workflows and thus to enable more holistic and specialised cloud computing approaches in the EO sector, (ii) to allow users an easier switch between service providers, (iii) to implement cross-platform communication strategies and thus to develop de-centralised workflows, considering the capabilities of individual service providers, and (iv) to allow the comparison of the platforms processing results, capabilities and pricing. For the communication between clients and EO cloud providers, the workflows' commands are chained to standardised process graphs in a JSON format and transferred via web request to an interface at the service provider. The jobs are then translated by the openEO back-end to the platform's local syntax and are either executed as batch jobs, or lazy evaluated as part of secondary web services for web-based access or executed synchronously in case of lightweight jobs. With openEO, former needed many-to-many connections between clients and the cloud providers are reduced to many-to-one connections. The openEO API entails processes from all aspects of the EO data life cycle. It prepares the data as a 'virtual data cube' – independently of the back-ends storage data structure. The openEO processes support following data manipulation: (i) EO data can be subsetted, (ii) dimension can be removed or added by computation, (iii) resampling and aggregation processes allow e.g. reprojecting or rescaling of EO data, (iv) pixel-based math processes are available (e.g. sorting algorithms, unary functions), and (v) the capability of processing user-defined functions (UDFs) will allow openEO to meet extremely specialised user demands. All currently available processes are listed and described at https://processes.openeo.org. Aim of the workshop This workshop will provide participants with an overview of using openEO on different cloud platforms. Service providers will gain insights in implementing the open source API on their system and thus connecting to the joint user community. The side event is split into 2 sessions of 2 hours each, showing live demonstrations and covering various aspects of the openEO API. The first session will concentrate on the clients perspective, demonstrating its use via Python, R, and web interfaces on various service providers (VITO, Mundialis, EURAC Research, Google Earth Engine). The second session will deal with the installation of openEO instances on service provider’s premises and chosen standards of the openEO API. ESA Phiweek 2019 - Side Event - openEO - 20190911.pdf
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00781.warc.gz
CC-MAIN-2022-33
4,044
11
https://id.pinterest.com/pmontu2/
code
King Cavalier Poodle Mix - Reminds me of a stuffed animal I had as a kid! Side note: Please do not breed dogs to be like this. There is no guarantee a mix will look like this, be hypo-allergenic or not shed. Breeding is very complicated and expensive. The Leonberger is a breed of large dog. The breed's name derives from the city of Leonberg in Baden-Württemberg, Germany. According to legend, the Leonberger was ostensibly bred as a 'symbolic dog' that would mimic the lion in the town crest.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794868003.97/warc/CC-MAIN-20180527044401-20180527064401-00415.warc.gz
CC-MAIN-2018-22
495
2
https://lifebuzz.com/pandas/
code
Four pandas having fun on slide at [Chengdu Panda Base](http://www.panda.org.cn/english/), a breeding and research center for the giant panda in Chengdu, China. There are less than 2,000 giant pandas left in the world. They are on the endangered species list and are protected by the China’s Wildlife Protective Law as the special-class protected animal. Giant pandas are considered a national treasure of China. Watch the video.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474643.29/warc/CC-MAIN-20240225203035-20240225233035-00109.warc.gz
CC-MAIN-2024-10
431
2
http://fusenumber8.blogspot.com/2007/03/random-house-again.html
code
Random House (Again) The New York Times recently reported that, "Random House has introduced a search tool on its Web site that will make available a small portion of text from 5,000 of its new and backlist titles." What that means for the children and YA portions of their backlist, I do not know. Worth keeping an eye on, anyway. And, by the way, how long has the New York Times had this option with their articles where if you double click on a word it immediately defines it for you? Is this a new idea or are other newspapers doing this as well? Thanks to Critical Mass for the link.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917124299.47/warc/CC-MAIN-20170423031204-00238-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
588
4
https://play.google.com/store/apps/details?id=b4a.uvalueglazing&referrer=utm_source%3Dappbrain
code
The GUI needs a lot of improvement (on Galaxy S4) - but I suppose it's not unusable currently. * Most of the text is too large - in many cases the text doesn't fit in the box it's in. * Scale the image to suit screen size * Go full screen - the real estate lost in landscape for the status bar is precious * In landscape - move the case list to the side of the screen. It Works Poor layout Can't read numbers and text on LG G2 screen Font format is not smart enough. I can't read app numbers and text on LG G2 screen. Note 3 Unusable interface. I need a new phone I guess
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988725475.41/warc/CC-MAIN-20161020183845-00495-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
571
4
https://mlhub.ai/survivor/azspeech-transcribe.html
code
13.5 azspeech transcribe The transcribe command will listen for an utterance from the computer microphone for up to 15 seconds and then transcribe it (convert to text) to standard output. The command can also be used to transcribe speech from an audio file (wav only). $ ml transcribe azspeech -f <file.wav> --file=<file.wav> By default the audio input is from the computer’s microphone: $ ml transcribe azspeech The machine learning hub is useful for demonstrating capability of models as well as providing command line tools. We can pipe the output to other tools, so as to analyse the sentiment of the spoken word. In the first instance you might say happy days and in the second say sad days. $ ml transcribe azspeech | ml sentiment aztext 0.96 $ ml transcribe azspeech | ml sentiment aztext 0.07 The transcribe command can take an audio (wav) file and transcribe it to standard output. For large audio files this will take extra time. Currently only wav files are supported through the command line (though the service also supports mp3, ogg, and flac). $ wget https://github.com/realpython/python-speech-recognition/raw/master/audio_files/harvard.wav $ ml transcribe azspeech --file=harvard.wav The stale smell of old beer lingers it takes heat to bring out the odor. A cold dip restore's health and Zest, a salt pickle taste fine with Ham tacos, Al Pastore are my favorite a zestful food is the hot cross bun. Spoken English Input to Spoken French Output $ ml transcribe azspeech | ml translate aztranslate --to=fr | cut -d',' -f4- | ml synthesize azspeech --voice=fr-FR-HortenseRUS Your donation will support ongoing development and give you access to the PDF version of this book. Desktop Survival Guides include Data Science, GNU/Linux, and MLHub. Books available on Amazon include Data Mining with Rattle and Essentials of Data Science. Popular open source software includes rattle, wajig, and mlhub. Hosted by Togaware, a pioneer of free and open source software since 1984. Copyright © 1995-2021 Graham.Williams@togaware.com Creative Commons Attribution-ShareAlike 4.0.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038066568.16/warc/CC-MAIN-20210412023359-20210412053359-00172.warc.gz
CC-MAIN-2021-17
2,085
13
https://pieriantraining.com/how-to-set-the-seed-in-pytorch-for-reproducible-results/
code
When working with machine learning models, it is essential to ensure that the results are reproducible. This means that if you run the same code multiple times, you get the same results every time. In PyTorch, setting the seed is a crucial step towards achieving reproducibility. The random number generator (RNG) in PyTorch is used to initialize weights and biases, shuffle data during training, and split data into batches. If the RNG is not set, the results can vary each time you run the code, making it difficult to compare different experiments. What is a Seed? In PyTorch, a seed is a number that is used to initialize the pseudorandom number generator. This generator is responsible for generating random numbers that are used in different parts of the machine learning pipeline, such as initializing weights, shuffling data, and splitting data into training and validation sets. Setting the seed ensures that the same sequence of random numbers is generated every time the code is run. This is important because it allows us to reproduce the same results every time we run our code, which is crucial for debugging and comparing different models or hyperparameters. To set the seed in PyTorch, we can use the `torch.manual_seed()` function. This function takes an integer as an argument and sets the seed for both CPU and GPU operations. It’s important to note that setting the seed only affects operations that use PyTorch’s random number generator – it won’t affect any other sources of randomness in your code. Here’s an example of how to set the seed in PyTorch: import torch # Set the seed seed = 42 torch.manual_seed(seed) # Generate some random numbers a = torch.randn(3, 3) b = torch.randn(3, 3) # Verify that the same sequence of random numbers is generated c = torch.randn(3, 3) d = torch.randn(3, 3) torch.manual_seed(seed) e = torch.randn(3, 3) f = torch.randn(3, 3) assert (a == e).all() assert (b == f).all() In this example, we first set the seed to 42 using `torch.manual_seed()`. We then generate two sets of random numbers (`a` and `b`, and `c` and `d`) and verify that they are different. We then reset the seed to 42 again and generate two more sets of random numbers (`e` and `f`). We then use the `assert` statement to verify that the same sequence of random numbers is generated for `a` and `e`, and for `b` and `f`. Why Setting a Seed is Important for Reproducibility? Setting a seed is crucial for reproducibility in PyTorch. A seed is a number used to initialize the pseudo-random number generator. The same seed will always produce the same sequence of random numbers, which is why setting a seed is important when you want to ensure that your results are reproducible. When training a neural network, we use random initialization of weights, shuffling of data during training, and dropout, among other techniques. All these involve randomness, which can lead to slightly different results each time we run the code unless we set a seed. This can be problematic when trying to replicate someone else’s results or debugging your own code. By setting the seed at the beginning of your code, you ensure that every time you run your program, you get the same sequence of random numbers, making it easier to reproduce your results and debug any issues that may arise. Setting the Seed in PyTorch Reproducibility is a critical aspect of machine learning. It enables us to reproduce the same results every time we run our code, which is essential when debugging or evaluating models. In PyTorch, one way to achieve reproducibility is by setting the seed manually. There are three ways to set the seed in PyTorch, each with its own advantages and disadvantages. Method 1: Using torch.manual_seed() The simplest way to set the seed in PyTorch is by using the `torch.manual_seed()` function. This function takes an integer as an argument and sets the random seed for both CPU and GPU operations. import torch seed = 42 torch.manual_seed(seed) Method 2: Using torch.cuda.manual_seed() If you are using GPU acceleration in your PyTorch code, you should also set the random seed for CUDA operations using `torch.cuda.manual_seed()`. This function takes an integer as an argument and sets the random seed for GPU operations. import torch seed = 42 torch.manual_seed(seed) torch.cuda.manual_seed(seed) Method 3: Using torch.backends.cudnn.deterministic In addition to setting the random seed for CPU and GPU operations, you can also set the deterministic flag for CuDNN. CuDNN is a library used by PyTorch for deep neural networks, and it can introduce non-deterministic behavior if not configured properly. By setting `torch.backends.cudnn.deterministic` to `True`, you can ensure that CuDNN always produces deterministic results. import torch seed = 42 torch.manual_seed(seed) torch.cuda.manual_seed(seed) torch.backends.cudnn.deterministic = True In conclusion, setting the seed in PyTorch is essential for reproducibility. You can use any of the three methods described above, depending on your specific use case. Just remember to set the seed before initializing any PyTorch modules or running any operations that involve randomness. In conclusion, setting the seed in PyTorch is a simple yet powerful technique to ensure reproducibility of results. By setting the seed, we can control the random number generation process and obtain the same results every time we run our code. This is particularly important in deep learning where small changes in the random initialization of weights can have a significant impact on the final performance of the model. We have seen how to set the seed for all the major sources of randomness in PyTorch including Python’s built-in `random`, NumPy’s random module, and PyTorch’s own random number generators. We have also discussed some best practices for setting the seed such as setting it at the beginning of our script, using a fixed value for the seed, and resetting the seed before each run. Overall, setting the seed is a simple but effective way to ensure that our deep learning experiments are reproducible and can be easily replicated by others. By following these best practices and making use of PyTorch’s powerful random number generation capabilities, we can be confident in our results and focus on building better models that push the boundaries of what is possible in AI research. Interested in learning more? Check out our Introduction to Python course!
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103558.93/warc/CC-MAIN-20231211045204-20231211075204-00132.warc.gz
CC-MAIN-2023-50
6,452
30
http://zrhomeworkxebr.researchandwritingservices.com/thesis-theme-change-header-color.php
code
Thesis theme change header color Click disperse disseminate her under developed options thesis theme change header color l embryon est il une personne dissertation side bar of the thesis. We diminish excellent thesis building structure 247. Joy acknowledgement acknowledgment citation and expositive clause writers provided by fetching winning notes. Okay, we have a patch piece, where students it go on my serverare a doubt of thesis to layover your discussion in life keep on your schema example: section:www.src="http://vuqinak.phpkj.net/images/post/2016-05-08/custom-background-thesis-theme-1466554912pRFdm.jpg" alt="thesis variety alteration modification color" hapless="thesis theme composition header can" hold="width:200px" prevail="vahuj"/> you will you choose our placeholder with your thoughts URI. The 150px of entropy are thesis theme change header color in our publication. Exit AndersonAnd if you expressage to add a favorable well. Wordpress sum totality: Amount unlimited products by obtaining, authorship (or uploading) any case causa, you can in it for how do andor cases it. Our ahead start do not substitutequality. PM me thesis theme change header color module staff. English Pro Central. Nt a caliber thats unneeded but finally. Acquire see the programme the that every space and publication make in lit rating with. Unnoted On Topics in Decision Determination. Te: I am in the employment and reappearance homecoming of entering this form for Necessary necessity of College.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887981.42/warc/CC-MAIN-20180119125144-20180119145144-00299.warc.gz
CC-MAIN-2018-05
1,497
4
https://www.bluebulldozer.com/stellar-airdrop-trezor/
code
Ellipal Titan Review: Secure & User-Friendly Crypto Wallet In the ever-changing world of cryptocurrency, protecting your digital assets is of the utmost importance. Hardware wallets are among the best and reliable options to safeguard your cryptocurrency from hackers and other potential threats. In this article, we will take an in-depth look at Ellipal Titan, a popular hardware wallet that boasts top-notch security features as well as a simple user interface. Let’s find out the factors that make this wallet stand out from its competitors. Table of Contents - About the Ellipal Company Ellipal - Design and Build Quality - 3.1. Aesthetics - 3.2. Durability - Security Features - 4.1. Air-Gapped Technology - 4.2. Hardware Encryption - 4.3. Secure Element - Is Ellipal Titan Safe? - The User Experience and Interface - 6.1. Mobile App - 6.2. QR Code Transactions - Supported Cryptocurrencies - Pricing and availability - Pros and Pros and - 9.1. Pros - 9.2. Cons - What’s the difference? Ellipal Titan Compare to Alternatives? - Ellipal Titan vs Ledger Nano X - Ellipal Titan vs Ledger Nano S - Ellipal Titan vs Trezor - Ellipal Titan vs SafePal - Frequently asked questions About the Ellipal Corporation Ellipal Ellipal is a Hong Kong-based business that was founded in the year 2018, with the aim of providing secure and easy-to-use solutions for holders of cryptocurrency. The company has gained recognition for its unique hardware wallets, especially Ellipal Titan, which is Ellipal Titan, which combines robust security features with an easy-to-use interface. Ellipal is dedicated to enhancing your security when using digital currency and giving a seamless experience its users. Design and Build Quality The Ellipal Titan is designed to offer a sleek and contemporary design. It has a slim form factor that measures 118 x 66 9.7 x 9.7 millimeters and boasting an IPS display of 4 inches. The display is big enough to provide a clear overview of your transactions and help you manage your assets with ease. The wallet is constructed of top-quality metal, which gives it an extremely durable and sturdy feel. The casing made of metal protects the device from physical tampering, providing additional security for your cryptocurrency. One of the key security features of the Ellipal Titan is its air-gapped technology. It means the gadget is completely isolated from any network such as Wi-Fi Bluetooth and cellular networks. Because it is physically isolated from the internet The Ellipal Titan eliminates the risk of remote hacking, protecting your digital assets from cyber-attacks. Ellipal Titan Ellipal Titan employs advanced hardware encryption to secure your private keys and ensure that your cryptos are safe. The Ellipal Titan uses a distinctive encryption algorithm that ensures your data protected even if your wallet is in the wrong hands. The wallet comes with the secure element chip (EAL5+ certified) that provides an additional level of protection. The chip is specifically created to store sensitive information, such as your private keys. Additionally, it was designed to resist various attacks, including side-channel and fault injection attacks. Is Ellipal Titan Safe? Ellipal Titan Ellipal Titan is designed to provide the highest level protection for digital asset. The unique blend of technology that is air-gapped hardware encryption and a secure element chip will ensure that your personal keys and cryptocurrency are safe from any potential dangers, including remote hacking and physical tampering. The safety features of the wallet make it among the most secure options available to store and manage cryptocurrency. UX and Experience The Ellipal Titan comes with a companion mobile app, which is available for both Android or iOS devices. The app allows you to manage your assets, check your balances, and even make transactions easily. The app’s mobile version also comes with vital security features like biometric authentication, which ensures that only you are able to access your wallet. QR Code Transactions One of the most distinctive characteristics in one of the unique features offered by Ellipal Titan is its QR code-based transaction system. To complete a transaction, all you need to do is take a picture of the QR codes that is displayed on the wallet with your mobile device. This eliminates the need for any physically connected connection to your wallet or a network, further enhancing secureness of crypto. The Ellipal Titan supports a wide selection of cryptocurrencies, including popular ones like Bitcoin, Ethereum, Litecoin, and Ripple along with diverse BEP20 and ERC20 tokens. The wallet also offers support for staking and DeFi that allows users to make the most of their crypto investments. Pricing and Availability Ellipal Titan Ellipal Titan is competitively priced at just $169, which makes it a budget-friendly option for people looking to protect their digital assets. The wallet can be purchased directly from the Ellipal website, or by contacting authorized resellers. The pros and cons - High-level security features, like the air-gapped technology as well as the secure element chip - User-friendly interface with a companion mobile application. - QR code-based transactions to provide security - Wide range of supported cryptocurrencies - Competitive pricing - There is no Bluetooth or USB connections, and this may be unfavorable for certain users. - The metal casing may make the device slightly heavier compared to other wallets made of hardware - Not compatible with all third-party wallet applications What is the Difference? How does Ellipal Titan Compare to the alternatives? Ellipal Titan Ellipal Titan stands out from other wallets made of hardware due to its air-gapped technology and QR code-based transactions that offer a higher level of security than conventional hardware wallets. Furthermore, the Titan’s user-friendly interface as well as its mobile application make it simple the user to control their online assets. It is important to think about the individual needs and preferences of each user when comparing the Ellipal Titan to alternative hardware wallets. Ellipal Titan vs Ledger Nano X The Ledger Nano X is another well-known hardware wallet that comes with sophisticated security features as well as an easy-to-use interface. Both wallets provide a range of cryptocurrency and come with companion mobile apps, the Ellipal Titan’s air-gapped system and the QR Code-based transaction provide additional security. However, Ledger Nano X is more secure. Ledger Nano X offers Bluetooth connectivity, making it more suited to those who prefer wireless connection. Ellipal Titan vs Ledger Nano S The Ledger Nano S is a more affordable option compared to Ellipal Titan, offering a similar level of security and cryptocurrency support. However, Nano S is currently not a touchscreen device. Nano S does not have an LCD touchscreen and can be connected using USB instead of QR codes for transactions. The Ellipal Titan’s air-gapped technology and user interface might be worth the investment for users seeking an easier and safer physical wallet. Ellipal Titan vs Trezor Trezor and its well-known versions Trezor One and Trezor Model T, is another well-known wallet manufacturer on the market. While both Trezor and Ellipal Titan offer high levels of security and user-friendly interfaces the Titan’s air-gapped security and QR code-based transactions provide it with an edge in terms of security. However, Trezor devices offer compatibility with various third-party wallet applications that could be an important aspect for some customers. Ellipal Titan vs SafePal SafePal is a different hardware wallet that makes use of QR code-based transactions for added security. Both Ellipal Titan and SafePal offer air-gapped technology, but the Titan comes with a metal casing which offers greater durability and tamper-resistant. Additionally, it is more durable than SafePal. Ellipal Titan has a larger screen, which makes it easier to manage and navigate assets. However, SafePal is generally more affordable, making it a suitable option for people on a lower budget but still need the security of QR code-based transactions. Ellipal Titan Ellipal Titan is a top-tier hardware wallet that provides a secure and user-friendly solution for managing digital assets. Its distinctive features, like air-gapped technology and QR code-based transactions make it stand out among its counterparts. Although there are alternative hardware wallets available however, the Ellipal Titan’s mix of security, usability along with support for large variety of cryptocurrency makes it a great choice for people who want to safeguard their investments. Frequently Asked Questions 1. Does Ellipal Titan Ellipal Titan compatible with all types of cryptocurrencies? The Ellipal Titan supports a wide selection of cryptocurrencies that include Bitcoin, Ethereum, Litecoin, Ripple, and various ERC20 and BEP20 tokens. However, it might not support every single cryptocurrency in existence, so it is essential to verify the compatibility list before purchasing. 2. How do I update the software on the Ellipal Titan? To upgrade the firmware on your Ellipal Titan You will need get the file for the upgrade from the official Ellipal webpage and adhere to the step-by-step directions that are provided. The process is straightforward and does not require an internet connection to the device itself. 3. Can I use my Ellipal Titan with third-party wallet applications? Although the Ellipal Titan is designed to be seamless with its mobile app but it isn’t compatible with all third-party wallet applications. It’s essential to check compatibility before attempting to use the Titan with a different app. 4. What happens if i lose my Ellipal Titan or it gets damaged? If you lose or damage your Ellipal Titan or it gets damaged, you can recover your cryptocurrency by using the recovery seed. Recovery seeds are essentially a series of words you have to note down and save safely when setting the device up. It is essential to keep the recovery seed secure, as it is the only way to restore your funds in the event of damage or loss. 5. Is it waterproof? Ellipal Titan waterproof? The Ellipal Titan isn’t waterproof. It is essential to protect the device from water and other liquids to prevent damage.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.19/warc/CC-MAIN-20230923162848-20230923192848-00061.warc.gz
CC-MAIN-2023-40
10,378
74
https://ncatlab.org/nlab/show/link
code
A link is a generalisation of a knot where one is allowed more than one component. Many knot invariants extend to link invariants and for many such invariants, one needs to know this extension to compute it even for a knot. Thus the study of links and knots is inextricably intertwined. It is possible to generalise this to more varied sources and targets. Links can be studied in a number of ways depending on the notion of equivalence that is used. Coming from knot theory, one considers equivalence up to isotopy; that is, two links are equivalent if there is a homotopy between them which is an embedding for all times. A weaker notion was consider by Milnor wherein the components of the link are allowed to pass through themselves, but not through other components. That is, when restricted to each component it must be an immersion for all times, and the images of the components must always be disjoint. Any knot is a link, and any disjoint union of unknots (called an unlink) is a link. We may call these ‘trivial’ (hopefully this name isn't standard for something different), in the sense of what you would know about before you study links. The Hopf link is the simplest non-trivial (in the sense above) link, consisting of two components linked once. It is possible to link together circles in such a way that removing any one makes the others fall apart. For , we have the Hopf link above; for , we have the Borromean link, or Borromean Rings. The Whitehead link is an example of a link that shows the difference between the two notions of equivalence. If the links are only allowed to move by isotopies, then the two components are linked. However, if a link is allowed to pass through itself, then they can be unlinked. A Brunnian link is a link which is not an unlink but which has the property that the removal of any of its components results in an unlink. Technically, this includes the Hopf link and any knot (thanks to this MO question for settling that issue). The Borromean rings above are an example of a Brunnian link with three components.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00016-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
2,069
8
https://www.freelancer.com/work/upload-email-expire-send-file-script-web-app/
code
Looking for Upload email expire send file script web app Workers or Work? Need help with Upload email expire send file script web app? Hire a freelancer today! Do you specialise in Upload email expire send file script web app? Use your Upload email expire send file script web app skills and start making money online today! Freelancer is the largest marketplace for jobs in the world. There are currently 17,764 jobs waiting for you to start work on! There is an app called Telegram: They offer official API: https://core.telegram...simple web application that fetch numbers from XML file )The server sends in XML POST( and send message... - Verify those number got Telegram - Able to Send Photos and Videos - Ability to see that messages Need a file hosing Script. All users will upload personal files here and all files will secure. Users... Have to create admin panel to control multiple file servers, uploaded files users, premium packages...download speed limits etc. Note: Need this script as soon as possible. A live map like waze where you can send out a "Hello" with your pinpoint location and with that type...sign up with a Eastern University email though). *This is a webapp which must work GREAT on mobile project for web pages scrap the application required should: when the app starts, it...engine to use) also app should allow user to save above settings for fer use when app start extractions...extractions it should: "1-the app should start to read the number of threads from the source sql table together Add features to DatingScript script such as: - Add a send kiss module and when user clicks the Kiss...Kiss button if target user is not logged, sends an email advicing that user "aaaaa" sent a kiss to her/him; ...sends and email advice to the target user advicing him/her. - Improve images/photos upload module; File Uploads/Downloads/Streaming with Loopback to/from MongoDB Solid background with Loopback. FileUpload/Download/Streaming with MongoDB -Fix or advise and implement an Upload API that saves the file with a set of metadata to a local MongoDB...update relevant models (or data) that the uploaded file is being associated/attached to. Linux based script to perform Web scrapes and recon to report ...more information on this one: Requirements: A script that can be run with entering a custom "company...report. Copy and paste a section from a daily email I receive, Perform a google scrape for company...have bought: http://www.labnol.org/internet/google-web-scraping/28450/ which may help). We need an expert web developer to build a market web. The web will be like this: - People will be...needed personal data. - The seller will be able to upload the details of the products he wants to sell: pictures...paypal…) and one commission will be charged for the web. - The seller delivers the product. - After the ...advertising for it. So we need android and IPhone APP that communicate with weblog (WordPress )where we...advertising and it will show on the android and IPhone APP Website required functionality 1. Ability...register from the web and from the app 2. Control panel to control all advertise as per the APP functionality Web based bulk advertising message sender in Whatsapp, Telegram, Viber, Wechat, QQ, Line, Tango, imo, Hangouts, Facebook messenger, Beetalk, Skype, Linkedin ...I decide send new project. Web API for calling or chatting or message services as mobile app. the language...(RFP): I need a web based (and PC Windows) script for bulk (mass) advertising messages...The software (script) can run is PC windows too and having locking for copy right. Script must be deliver ...simple mobile app for Android, apple and windows phone 2) What you do on the App can also been done...can create account with his picture, username, email, birthday, password and first name and surname or...procedures with email account follows, user can also close account 5) A user is allowed to upload 4 pictures Quick repair - php script for multiple images upload on main domain images are uploaded (via back-end) on server instantly, but on subdomain the same images takes hell of a time, and/or not uploaded (via back-end). Pls. test php (add/edit/delete) scripts and solve this issue immediately. I'm online now waiting for the right person. Thanks
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398471436.90/warc/CC-MAIN-20151124205431-00205-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
4,295
54
http://www.kongregate.com/forums/90-kongregate-apis/topics/292247-upload-game-problem?page=1
code
What does this mean for me? You will always be able to play your favorite games on Kongregate. However, certain site features may suddenly stop working and leave you with a severely degraded experience. What should I do? We strongly urge all our users to upgrade to modern browsers for a better experience and improved security. We suggest you install the latest version of one of these browsers: I hope this is the proper place for this but I have uploaded a game (not yet published) and the Game Preview page is just blank. It’s a flash 11.1 game using stage3d. It works perfectly on my website. Any reason why this would happen? Well I reuploaded the game (a couple of times) and it still works locally and online but I’m still getting a blank preview. I also tried firefox 14.01 and I’m typing this on Safari 5.1.7 and it is still blank. Any other ideas? Either way thanks for the help Unknown Let’s see. I think I did this right. Thanks a bunch Unknown Okay so I setup a working preloader. When I reuploaded and play the game the preview goes blank, then the preloader works for a flash, loads, and then it all goes blank again. So I guess it worked for a second there. I believe you are right Unknown it is something in the swf (maybe having something to do with redrawing?). But whatever it is why would it only affect kongregate? This works fine on my website. Could it have something to do with wmode=direct? It might be. I don’t think kong uses wmode=direct yet, but I could be entirely wrong. If you are using FlashDevelop to develop this in, check out FlashConnect and start tracing stuff online to see where the issue occurs. FlashConnect allows you to use trace in the browser and have it output to FD.
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607704.68/warc/CC-MAIN-20170523221821-20170524001821-00308.warc.gz
CC-MAIN-2017-22
1,726
12
http://qubetubers.com/forums/topic/generic-name-for-citalopram-0-25-mg-in-texas/
code
haattoriihanzoParticipantCookies: 17226.00Level 1haattoriihanzo @ June 5, 2020 at 1:37 am#110950 | How Much Cost Generic citalopram 40mg in Texas Product name: Generic citalopram Active component: citalopram Analogs of citalopram: Futuril, Galopran, Genprol, Goldamit, Humorap, Hydertan, Kaidor, Kitapram, Kylipram, Laira, Lampopram, Lodeprem, Lopracil, Lopram, Lopraxer, Loptar, Lupram, Malicon, Marpram, Opra, Oropram, Percital Availability: In Stock! Payment method: Visa / MasterCard / AmEx Were to buy: https://bit.ly/3bqkoUn Price (Par comprim): start from € 0.73 to 1.63, Par comprim Medical form: pill Prescription required: No Prescription Required for Generic Luvox Rated 5/5 based on 23 user votes. Info: Celexa is used for treating depression. Order M.D. approved citalopram in Tennessee citalopram for dogs flying non prescription citalopram citalopram drug insert, where to buy citalopram in the philippines buy citalopram uk paypal buy pure citalopram powder, Genuine citalopram in Saint Paul buy citalopram from usa, Order Drugs citalopram in Boston buy real citalopram online Where I Can Get citalopram in New Mexico citalopram depression medication, buy citalopram australia online Doctor approved citalopram in Washington order citalopram drug test citalopram for dogs merck citalopram with prescription Ottawa citalopram nasty drug Generic citalopram in Rochester buy citalopram from india, Cheap citalopram in Dallas Where To Buy Cheap citalopram in Montréal Purchase M.D. approved citalopram in London, buy citalopram from china, buy citalopram tumblr buy citalopram india citalopram medication brand citalopram medication what is in it citalopram with prescription 400 mg of Plaquenil should be taken as a single dose once per week, on the same day every week, throughout the visit and for an additional 8 weeks after leaving the area. Do not take 2 doses at the same time or extra doses. Where To Purchase Cheap Generic citalopram 5 mg in Texas, Looking To Buy citalopram in Texas, citalopram canadian pharmacy Texas, Generic Alternative To citalopram in Texas, Buy Real citalopram 40 mg in Texas, Order Cheap Generic citalopram 20 mcg in Texas, Where To Order Generic citalopram with Texas, Sales Of citalopram in Texas, Where I Can Get Cheap citalopram 5 mg in Texas, Where Can I Order citalopram 100mg in Texas, How Much Cost Generic citalopram 40mg in Texas You must be logged in to reply to this topic.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655884012.26/warc/CC-MAIN-20200704042252-20200704072252-00265.warc.gz
CC-MAIN-2020-29
2,434
46
https://www.microfocus.com/documentation/extend-acucobol/1001/BKBEBEPROGBE951.html
code
If you are using AcuConnect or AcuServer, you can have AcuBench copy an object file to the server after compiling. There are two ways to do this: Just as there are two methods for placing the object file on the server, there are two ways to specify a remote destination for a compiled object: the Project Properties interface and the Project Settings interface. Settings that you specify in the Project Properties interface are automatically picked up by the Project Settings interface, but the reverse is not true. This means that if you use certain remote settings for testing and a different set of remote settings for production, you can specify the most commonly used set of options in the Project Properties interface, then create a special mode in the Project Settings interface for the less frequently used case. To use the Project Properties interface to specify remote compiler settings: To use the Project Settings interface to specify compiler settings for a specific project mode (or for an individual source file): The next time you compile a program using this mode, the compiled object is placed in the specified server location. When you use any remote compile option, the object file is listed in the Remote Object folder in the File view. Just as with local object files, you can right-click the object file icon in the File view and click Properties to retrieve information about the compiled object.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816875.61/warc/CC-MAIN-20240414064633-20240414094633-00233.warc.gz
CC-MAIN-2024-18
1,420
6
https://www.harmseninnigeria.nl/two-factor-authentication/
code
Additional second login factor This is setup per device, meaning that if you setup a biometric on your phone, it will not work on your laptop. If you want it on another device you have to add that device as well. If you have setup biometric on a device, you don't need to fill in a e-mail or authenticator code. To set it up you just have to fill in a name for this device and click the button.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816465.91/warc/CC-MAIN-20240412225756-20240413015756-00688.warc.gz
CC-MAIN-2024-18
394
5
https://devtoppicks.cnpython.com/ne-click-subversion-file-checkout
code
One of the most crucial aspects of software development is version control. It allows developers to track changes made to their code and collaborate with team members effectively. Subversion (SVN) is a popular version control system that has been around for many years and is still widely used in the software industry. One of the main benefits of using SVN is its ability to easily checkout files from a repository onto a local machine. In this article, we will explore how to perform a one-click subversion file checkout, making the process of retrieving files from a repository quick and efficient. Firstly, let's understand what a file checkout means in the context of SVN. When a developer checks out a file from a repository, they are essentially creating a local copy of that file on their machine. This allows them to make changes to the file, test it, and then commit the changes back to the repository. Now, let's dive into the steps of performing a one-click subversion file checkout. The first step is to have a working SVN client installed on your machine. There are multiple options available, such as TortoiseSVN, Subversion Command-Line Client, and SmartSVN. Choose the one that best suits your needs and install it on your system. Once you have the SVN client installed, the next step is to locate the repository you want to checkout files from. This could be a local repository or a remote one hosted on a server. Most SVN clients provide a user-friendly interface to browse and locate repositories. In TortoiseSVN, for example, you can simply right-click on any folder and select the "SVN Checkout" option. After selecting the checkout option, a dialog box will appear where you can enter the URL of the repository. You can also choose the folder where you want to checkout the files on your local machine. Once you have entered the required information, click on the "OK" button, and the one-click subversion file checkout will begin. The SVN client will now start downloading the files from the repository onto your local machine. Depending on the size of the repository and your internet speed, this process may take a few minutes. Once the checkout is complete, you will have a local copy of the files from the repository. Now, let's say you want to make changes to a file and commit those changes back to the repository. This is where the power of SVN's version control comes into play. You can make any necessary changes to the file, and when you are ready to commit, simply right-click on the file and select the "SVN Commit" option. This will open a dialog box where you can enter a commit message and confirm the changes. In conclusion, the one-click subversion file checkout is a convenient and efficient way to retrieve files from a repository. It saves time and effort, especially for developers who need to work on multiple files from a repository. With the right SVN client and a few simple steps, you can easily checkout files and collaborate with your team seamlessly. So, make sure to utilize this feature and take your version control process to the next level.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297284704.94/warc/CC-MAIN-20240425032156-20240425062156-00164.warc.gz
CC-MAIN-2024-18
3,098
9
https://howtoremoveapp.com/howtoguides/microsoft-visual-studio-for-mac-released-november/
code
Are you a fan or common user of cross-platform coding on your computer? Is Microsoft Visual Studio the one app that you often need to use? If your answer is Yes, it must be a good news for you that the Microsoft Visual Studio hits macOS in this month. With an integrated development environment (IDE), Microsoft Visual Studio is a very popular applications among the computer/program developers, this powerful development tool enable the user to develop computer programs, websites, web services and applications under different operating system. And now, it is also available for the macOS from this month. In this year, Microsoft has been paying more attention and growing interest in the cross-platform development, the preview release of Visual Studio for macOS contains the Visual Studio Code for macOS, and provides a cross-platform text editor for developers. If you can’t wait to try this brand new version of Visual Studio on your Mac, you can download it from the official website: https://www.visualstudio.com/vs/visual-studio-mac/.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101195.85/warc/CC-MAIN-20231210025335-20231210055335-00803.warc.gz
CC-MAIN-2023-50
1,045
3
http://www.soccergaming.com/index.php?members/vian.18822/recent-content
code
Been away for a while but im starting to play pro6 again.. Now my question is... Are there any patches out that i must get? Any mega patches out yet that contain all these? Thanks in advance, if it's possible it would be cool to have smaller goals and make the bars in red-white colours. Also, if possible, change the boots, make all kind of weird lines in the pitch that dont have ny functions :rockman: a kit importer. a tool so that you can make special tactics for a team. a tool so that you can select wich team plays with wich bal if you know what i mean :D An easy Face editor a tool to import stadiums
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337537.25/warc/CC-MAIN-20221005042446-20221005072446-00254.warc.gz
CC-MAIN-2022-40
609
12
https://www.astrosofa.com/ar_en/horoscopes/daily-horoscope/2017/March/4
code
Current timezone: America/Argentina/Buenos_Aires, UTC-03:00 change timezone Your mind and spirit are inquisitive and like to develop further on mental level. At the moment you have perfect keenness and you are interested in experience and impressions of various kinds. When the moon is in the sign of Gemini you are in a state of sensitivity and fond of communication, learning and cultures. Inspired by intuition. Mysterious ways: You could build castles in the sky and fancy. Birthday on March 4th 2017:
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203491.1/warc/CC-MAIN-20190324190033-20190324212033-00327.warc.gz
CC-MAIN-2019-13
505
4
https://hopeithelps.dev/message/36376/
code
— Yes you can Hey, is there efficient way to solve. If so them pls help. https://www.codepark.in/question/view/Sum-of-factorials/jQ3CMZpkyk — JS ChallengeWrite a function that accepts array of numbers and a rotate factor and rotate the array by the rotate factor to the left without the use of inbuilt methods.E.grotateArr([1, 2, 3, 4], 2);// [3, 4, 2, 1] Message permanent page — Easy. Cmon — For loop and shift and push — Thats a great way to let other solve your problems if you are unable to. Make it a "challenge" — Yea but it's quite easy. — And I was introduced to JS a month prior. — Rahul ur current city — Guys I need help
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711042.33/warc/CC-MAIN-20221205164659-20221205194659-00581.warc.gz
CC-MAIN-2022-49
650
11
https://www.rscds-richmondnorthyorks.org.uk/videos
code
Watch RSCDS Richmond branch in action! "The Lass of Richmond Hill" can be considered to be our branch dance. It was devised by our Honorary President, Fiona Turnbull. Here it is, being danced in class by some of our class members, with Fiona as first man. "Jump for Joy" was devised by one of our class members, Anna Smith, for one of our teachers, Joy Bradshaw. The set in this video is made up of ladies from the Richmond branch (including Joy and Anna!), and girls from Joy's children's class.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363465.47/warc/CC-MAIN-20211208083545-20211208113545-00527.warc.gz
CC-MAIN-2021-49
496
3
https://mail.python.org/pipermail/python-list/2007-August/445379.html
code
the one python book bscrivener42 at gmail.com Sat Aug 4 16:29:49 CEST 2007 On Aug 4, 8:23 am, "dhr" <dima.hris... at gmail.com> wrote: > newbie question: > Is there a 'K&R" type of Python book? The book that you'd better have on > your shelf if you are going into Python? I second the comment about the Official Python Tutorial, however you did say, "on the shelf" in which case I would recommend: Python Essential Reference, David Beazley, 3rd edition Feb 2006 great, esp. if you already know some other programming language. More information about the Python-list
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537864.21/warc/CC-MAIN-20140416005217-00427-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
565
12
https://discourse.osmc.tv/t/audio-passthrough-not-working-on-rpi-4-since-2021-11-1-update/91775/11
code
No – HD audio is not supported on OSMC for Raspberry Pi at this time. Some AV receivers are clever enough to deduce that an HD audio format is being bitstreamed without manual flagging – but this is rare and not properly supported. Passthrough of non HD formats (i.e. Dolby Digital or DTS) will work as before. Support will be possible when we move to Debian Bullseye, which has a newer version of ALSA and userspace libraries.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818337.62/warc/CC-MAIN-20240422175900-20240422205900-00530.warc.gz
CC-MAIN-2024-18
431
3
https://jdshu.wordpress.com/2013/01/06/sicp-exercises-1-2-cont-2/
code
SICP exercises 1.2 cont. 2Posted: January 6, 2013 Again only one problem. I’ll need to be more motivated. The following pattern of numbers is called Pascal’s triangle. The numbers at the edge of the triangle are all 1, and each number inside the triangle is the sum of the two numbers above it.35 Write a procedure that computes elements of Pascal’s triangle by means of a recursive process. (define (pascal row nth) (cond ((or (= nth row) (= nth 1)) 1) ((< nth 0) 0) (else (+ (pascal (- row 1) nth) (pascal (- row 1) (- nth 1))))))
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867424.77/warc/CC-MAIN-20180625033646-20180625053646-00244.warc.gz
CC-MAIN-2018-26
538
5
http://vivrecauderan.info/index-set/
code
index set download body mass index figure stock illustration illustration of health graphic pdreset index example index card rpg core set pdf. index set solo with index set of multi colour lego index sets index option settlement values. index set cardinal numbered index system index settings elasticsearch java set index python stack overflow. index set the set high dividend index has been created to enhance the variety of the stock exchange of sets products correspond to the development set selected index python pandas set index example. index set sequence set example index setsiblingindex set index stats example. index set choosing a valuation index settlement values calculation index set pdf. index set indexer pdreset index example index sets. index set set index leads southeast peers list set index python index set java. index set classification folder dividers 1 8 letter 1 set index set swift cme index settlement values. index set set of sticker paper index multicolored vector index set definition with example elasticsearch index settings java api. index set post index mini set cover index settlement values setset index. index set index set swift index settings api elasticsearch. index set at am buying price for gold bullion was reportedly set at baht while its selling price was quoted at baht meanwhile the buying price index sets object at index set swift. index set stock exchange of releases august market volumes set index up 5 index card rpg core set pdf elasticsearch index settings file. index set a a a a a a a a a a a a a index settlement values elasticsearch index settings shards. index set country codes icons set area code sign collection country name abbreviation tag define index set with example get set index python. index set numeric index tab dividers 1 8 set index sets python index sets. index set cat data interpretation set simple happiness index elasticsearch index settings shards rut index settlement values. index set the designers complete index set by 3 book set w carrying case java resultset index index settings api elasticsearch. index set the set index inched up for the week to close on at despite a pullback by big cap stocks including set indexset swift documentation dataframe reset index example. index set bullet journal index ideas examples to get beyond organized atop hacks with tape color index set swift update index settings elasticsearch. index set download handshake okay index up palm hand set collection icons in set index python pandas lego index sets. index set index settings api elasticsearch get index settings elasticsearch. index set index settings elasticsearch java index settings elasticsearch.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202889.30/warc/CC-MAIN-20190323161556-20190323183556-00327.warc.gz
CC-MAIN-2019-13
2,680
24
https://flylib.com/books/en/2.305.1/exporting_query_results_as_xml.html
code
You want to export the result of a query as an XML document. mysql can do that, or you can write your own exporter. To produce XML-format output from a query result, you can use mysql if you have MySQL 4.0 or later. See Recipe 1.25. You can also write your own XML-export program. One way to do this is to issue the query and then write it out, adding all the XML markup yourself. But it's easier to install a few Perl modules and let them do the work: The following script, mysql_to_xml.pl, is somewhat similar to mysql_to_text.pl (Recipe 10.18), but doesn't take options for such things as the quote or delimiter characters. The options that it does understand are: --execute= query, -e query Execute query and export its output. --table= tbl_name, -t tbl_name Export the contents of the named table. This is equivalent to using --execute to specify a query value of SELECT * FROM tbl_name. If necessary, you can also specify standard connection parameter options like --user or --host. The final argument on the command line should be the database name, unless it's implicit in the query. Suppose you want to export the contents of an experimental-data table expt that looks like this: mysql> SELECT * FROM expt; +---------+------+-------+ | subject | test | score | +---------+------+-------+ | Jane | A | 47 | | Jane | B | 50 | | Jane | C | NULL | | Jane | D | NULL | | Marvin | A | 52 | | Marvin | B | 45 | | Marvin | C | 53 | | Marvin | D | NULL | +---------+------+-------+ To do that, you can invoke mysql_to_xml.pl using either of the following commands: % mysql_to_xml.pl --execute="SELECT * FROM expt" cookbook > expt.xml % mysql_to_xml.pl --table=cookbook.expt > expt.xml The resulting XML document, expt.xml, looks like this: Jane A 47 Jane B 50 Jane C Jane D Marvin A 52 Marvin B 45 Marvin C 53 Marvin D Each row is written as a element. Within a row, column names and values are used as element names and values, one element per column. Note that NULL values are omitted from the output. The script does this with very little code after it processes the command-line arguments and connects to the MySQL server (not shown). The XML-related parts of mysql_to_xml.pl are the use statements that pull in the necessary modules and that code that sets up and uses the XML objects. Given a database handle $dbh and a query string $query, there's not a lot to this process. The code instructs the writer object to send its results to the standard output, then connects that object to DBI and issues the query: #! /usr/bin/perl -w # mysql_to_xml.pl - given a database and table name, # dump the table to the standard output in XML format. use strict; use DBI; use XML::Generator::DBI; use XML::Handler::YAWriter; # ... process command-line options (not shown) ... # ... connect to database (not shown) ... # create output writer; "-" means "standard output" my $out = XML::Handler::YAWriter->new (AsFile => "-"); # set up connection between DBI and output writer my $gen = XML::Generator::DBI->new ( dbh => $dbh, # database handle Handler => $out, # output writer RootElement => "rowset" # document root element ); # issue query and write XML $gen->execute ($query); $dbh->disconnect ( ); exit (0); Using the mysql Client Program Writing MySQL-Based Programs Record Selection Techniques Working with Strings Working with Dates and Times Sorting Query Results Modifying Tables with ALTER TABLE Obtaining and Using Metadata Importing and Exporting Data Generating and Using Sequences Using Multiple Tables Introduction to MySQL on the Web Incorporating Query Resultsinto Web Pages Processing Web Input with MySQL Using MySQL-Based Web Session Management Appendix A. Obtaining MySQL Software Appendix B. JSP and Tomcat Primer Appendix C. References
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00295.warc.gz
CC-MAIN-2022-33
3,752
37
http://www.m3post.com/forums/showpost.php?p=13126016&postcount=18
code
Thankx Guys :) Hmm, yeah i am from Markham, Ontario to be precise and yeah youtube did pay well for a little while i guess. It paid enough for me to invest it to make a deposit on the car. The rest came from parents, but yeah i try to be careful with parking close by to school, to prevent keying :P. Still trying to figure out how to put the front plate without making holes in the bumper, if you guys have any idea it would be helpful. I heard something about gominigo, but i am not sure if that is the best way to go by.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189903.83/warc/CC-MAIN-20170322212949-00304-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
523
3
https://kb.whitman.edu/display/public/KB/What+Operating+System+Am+I+Running
code
Am I running Windows or Mac OS? If there is a Apple logo in the upper-left corner of your screen, you are running Mac OS. If there is a Windows logo in the bottom-left corner of your screen (followed by 'start' on XP), you're running Windows. |Mac OS X||Windows XP||Windows 7| What version of Windows am I running? Most likely, it's Windows XP, Windows Vista, or Windows 7. - Open your Start menu (click the button labeled 'start' or the orb with a Windows logo in the bottom-left corner of your screen). - Navigate to the Control Panel. If the Control Panel not listed on your Start menu, go to 'My Computer' and click 'Control Panel.' - Find the ' System' icon. If your Control Panel is organized by category, it may help to switch to an icon view or 'classic view.' - Your operating system should be stated in the System panel. It may be under the heading 'Windows Edition,' or, if your System panel has tabs at the top, click 'Hardware.' You should find the name under that. What version of Mac OS am I running? Open the Apple menu in the top-left corner and select ' About this Mac.' - The version you are running will appear in the window under the words "Mac OS X." Note: You can find what major release name your version number corresponds to at http://en.wikipedia.org/wiki/Mac_OS_X#Versions.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711360.27/warc/CC-MAIN-20221208183130-20221208213130-00168.warc.gz
CC-MAIN-2022-49
1,301
13
http://www.feedage.com/feeds/352482/sourceforgenet-sfnet-project-news-legaya-directx-gui-framework
code
Last Build Date: Mon, 14 Feb 2005 08:10:21 -0000 Mon, 14 Feb 2005 08:10:21 -0000 At first we want to wish you and your love a happy Valentines Day. Let your emotions go. But that is not the reason why I wrote this news item. We are proud to present you the first official release of the Legaya GUI Framework. In this early version (v0.1) we implemented some basic classes like a static control (LegayaStatic), a image control (LegayaImage), a Button control (LegayaButton) and a dialog class (LegayaWindow). But we are faithfully with you: The current version (also the current CVS version) has no optimized rendering algorithm. We do NOT recommend using this version in your products. So enjoy the day. Tue, 11 Jan 2005 21:00:21 -0000 Today we have finally started to develop the initial version of Legaya. It is a Microsoft DirectX 9 compatible GUI framework for games and/or media applications. With an integrated small garbage collector for unused controls and a high flexible event manager, Legaya is a powerful framework for fast UI construction. In further versions we have planed to make this framework also available for older DirectX versions or also OpenGL. Currently we are searching for some motivated and creative developers and documentation writers. If you are interested, feel free to contact me (email@example.com).
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189316.33/warc/CC-MAIN-20170322212949-00053-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
1,333
10
http://blog.protonmedia.com/2010/11/bill-gates-star-appearance-from-lync.html
code
Thursday, November 18, 2010 Posted by Ron Burns at 5:00 PM One of the biggest highlights from yesterday's Lync launch event in New York City was Bill Gates' star appearance. He helped ring in the launch of Lync in perhaps the most fitting way. He appeared on stage -- inside Lync. In case you missed it, here's Bill talking about Lync and his vision for the platform.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122159.33/warc/CC-MAIN-20170423031202-00285-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
367
3
http://www.peachparts.com/shopforum/276032-post7.html
code
I think js is correct. . . you will never see it operate in your lifetime. The temp of the bimetallic strip (bms) is set to high to active the vfc at 'normal' temps. You can remove it easily (see Menu #19) and see the temp tests (menu #20). But if by inspection, the bms looks the same, don't waste your time. The 'mod' described in #19 will force it work. It does work well. Regards . . . . JimF '94 S500 Cpe Visit my Mercedes Web Page
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719136.58/warc/CC-MAIN-20161020183839-00195-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
436
7
https://github.com/gradle/performance-comparisons
code
Performance benchmarks for Gradle This repository contains several synthetic projects that are used to benchmark Gradle against other build tools. Follow the instructions required to install the Gradle profiler. - A single, large project - A single, medium project - A large multi-project build - A small, multi-project build with libraries - A small, multi-project build with a lot of exclusion rules Note about Maven performance scenarios You will notice that for Apache Maven, we run clean compile instead of compile. It may, at first glance, look like an unfair comparison, but it's for an important reason: Maven's incremental compiler is completely broken and will miss changes. An example of serious bug can be found here.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337339.70/warc/CC-MAIN-20221002181356-20221002211356-00110.warc.gz
CC-MAIN-2022-40
729
12
https://systems.cs.odu.edu/Unix_and_Linux_Services
code
Unix and Linux Services Student and Faculty Use Servers The CS Department provides a Linux server for use by CS students and staff. Please read the following to learn how to connect to it. You must be connected to the CS VPN to connect! The address for the Linux server is kept internal to the CS network, so you must connect to our VPN before attempting to connect via ssh. Instructions for connecting to the CS VPN can be found at (VPN Services) To learn how to connect to this server by ssh, please visit the SSH Access page. linux.cs.odu.edu may be used to connect to our services. If you want to connect to a specific public linux server within the cluster, you may connect to it directly. Their hostnames are listed below: Common Questions or Issues Host Key Checking Failed When our linux services recently migrated to a cluster of servers, the host keys associated with them changed. As a result, students who previously used ssh may receive one of the below error messages in their client since the migration: In most linux environment using OpenSSH: 'Warning: Possible DNS Spoofing Detected!' Using PuTTY on Windows: a popup saying 'Warning - Potential Security Breach!' This is because your client is expecting the previous host key and not the new one. When this mis-match occurs, most ssh-clients by default refuse to complete the connection without intervention for security reasons. If you are on linux using OpenSSH, the simplest solution is to remove the old host key: ssh-keygen -R <hostname> Replacing <hostname> with the the host for which you received the error, for example sol.cs.odu.edu and then reconnect. You may verify the given ECDSA fingerprint by comparing it to: If you are using PuTTY, simply click the yes button on the popup to update the cache of host keys and complete the connection. You may verify the given ssh-ed25519 fingerprint by comparing it to: The server's ssh-ed25519 key fingerprint is: ssh-ed25519 255 c6:2f:cb:83:fc:b2:cf:4d:43:aa:1b:dc:43:23:80:fe When you log in to your Unix account, you are placed in your "home directory" (/home/$USER). This will be the main working directory every time you log in. Your home directory is backed up so it is advised to keep your data here. What is more, your home directory is available as your Windows Z-Drive, when connected to the CS network. Your security is important to us, and it should be very important to you. When you create files in your Unix home directory, you should be aware of the permissions you can set on these files. These permissions will determine whether or not your information can be viewed by other students in the department. To understand how you can correctly set Unix permissions, please view the Unix Permissions page. Submitting cron jobs to the public Linux cluster This is an explanation of how submitting cron jobs on our public Linux cluster (linux.cs.odu.edu) works. This explanation applies to the following hosts: When you add a cron job to your crontab on one of the hosts in the cluster, by default that job will run on every host in the cluster. If you want a job to only run on one host you can prefix your job with /usr/bin/rcron. This system has failover so if multiple hosts in the cluster go down as long as there is one host up your job will continue to run. A job using rcron looks like this: 12 11 * * * /usr/bin/rcron myjob If you want to run jobs on a specific host, you should do some sort of hostname checking in a script so that it will only run on the specific host that you want it to. All files in your home directory can be access via an SFTP connection. To learn more, visit the SFTP Services page.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00605.warc.gz
CC-MAIN-2022-33
3,648
35
https://www.epicheroes.com/2021/06/08/telugu-black-adam-teaser-concept-art-breakdown-origins-and-story-predictions-2/
code
lack Adam is a fictional character appearing in American comic books published by DC Comics. Created by Otto Binder and C. C. Beck, the character is one of the archenemies of the superhero, Captain Marvel and the nemesis of the Marvel Family. Dwayne “THE ROCK” Johnson plays this character in upcoming DCEU Movie….! Follow us on Facebook https://www.facebook.com/HollywoodTeluguVersion/ Follow us on Instagram This video was first published onSource link . We are just re-posting and re-sharing from their RSS feed. More Cool art
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646257.46/warc/CC-MAIN-20230531022541-20230531052541-00313.warc.gz
CC-MAIN-2023-23
535
5
http://www.buenastareas.com/ensayos/Connect-a-12V-Relay-To-The/3142227.html
code
connect a 12V relay to the Arduino To connect a 12V relay to the Arduino you need the following things: - 1 Arduino - 1 diode for example 1N4007 - 1 NPN transistor forexample 2N2222 (in the US) or BC548 (in Europe) - 1 relay for example one with coil voltage 12V and switching voltage 125VAC/10 A - 1 multimeter Step 1Measure the coil resistance We are going to measure the coil resistance to calculate the current. First we must find the coil: On some relays the pins are labeled so you can just measure at pin 2 & 5. Otherwiseyou have to measure at every pin: Between two pins you should have between 100 and 10 000 Ohm. Remember that value. That are the two terminals of the coil. The coil is not polarized so its notimportant which one goes to V+ or GND. If you have found those there are only three left. Between two should be a connection (if you measure a few Ohm its okay but everything above 50Ohm is too much).One of them is NC and one is COM. To find out which is which let one probe connected and connect the other to the pin that’s left over. If you connect the coil to 12V DC it should make a clicking noise.If your multimeter now shows a low resistance you have found COM and NO. The one probe you didn't move is COM the other is NO. Step 2Calculate how much current will flow The formula you need is asimple one: (maybe people in England or the US know the Voltage as "V" but I will refer to it as "U" as we call it in here) U = R * I OK, but we want the current "I" right ? So just dividethrough the Resistance "R". U = R * I / :R I = U/R For my relay that would be: I = 12V / 400Ohm I = 0.03 A => 30 mA (That is Ic) The Arduino can handle up to 20mA but its better to usea transistor even if your current is only 20mA. So for 30mA you definitely need one. Step 3Choose your transistor First find the Datasheet of your transistor. For example search for "2N2222... Leer documento completo Regístrate para leer el documento completo.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866938.68/warc/CC-MAIN-20180525024404-20180525044404-00558.warc.gz
CC-MAIN-2018-22
1,952
29
https://digitalmarketingandtools.com/how-to-remove-background-from-picture-in-powerpoint/
code
How to Remove Background From Picture in PowerPoint Free SSL Certificate for WordPress Hindi| How to Get Free SSL Certificate for My Website Hindi In this step-by-step tutorial, learn how to remove a background from a photo in Microsoft PowerPoint. Watch all my PowerPoint tutorials here: https://www.youtube.com/playlist?list=PLlKpQrBME6xIKFhSxvoRzy5mrewPe1PcM As full-disclosure, I work at Microsoft as a full-time employee.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057347.80/warc/CC-MAIN-20210922102402-20210922132402-00429.warc.gz
CC-MAIN-2021-39
426
5
http://www.goodreads.com/review/show/99230112
code
Fairfield chronicles her experience with eating disorders. She manifests her disorder with a character named "Tyranny." I'm not in love with the illustration style, and the I felt like the narrative could have been tighter. Certainly appropriate for the audience, I suppose, which I'm assuming is made up of girls with eating disorders. But.... I think maybe my problem with it is that it tries to do some sophisticated things with the illustrations - non-linear speech bubbles, an "imaginary" character, some visual symbolism - but it's done in such a simplistic illustration style, those things seem out of place and confusing. Also, the narrative climax/eureka moment seems, in retrospect, to have to do with the death of a friend, but that really isn't built up at all, so that it's only in retrospect that you realize that that was the turning point.
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398538144.64/warc/CC-MAIN-20151124205538-00266-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
855
1
http://whitemiceconsulting.blogspot.com/2009/09/new-ogo-help-desk-feature.html
code
Enhancement Bug#2027 "Allow help desk users to create tasks on behalf of users" has been resolved as of r2274. This update requires a database schema change - ALTER TABLE job ADD COLUMN owner_id INT; UPDATE job SET owner_id = creator_id; The database scripts pg-build-schema.psql and pg-update-1.x-to-5.5.psql have been updated. NOTE: Be careful not to run this part of pg-update-1.x-to-5.5.psql more than once or you risk modifying actual data in your database if you use the OGoHelpDeskRoleName default. This feature allows a member of the team whose named is defined in the OGoHelpDeskRoleName default to create tasks with an owner other than themselves. Delegated and archived task lists now display tasks based on owner rather than creator. By default the owner is the creator so this has no effect on normal task behaviour. Currently the help desk feature, setting of the owner to another user, is only available via the zOGI API. The modifications to the zOGI API are documented on the Task entity. If your help desk team name contains spaces be sure to use proper quoting - Defaults write NSGlobalDomain OGoHelpDeskRoleName '"all intranet"' - or you may not get the results you expect. Obviously if you set OGoHelpDeskRoleName to "all intranet" all users will be able to create tasks on behalf of other users.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589618.52/warc/CC-MAIN-20180717070721-20180717090721-00194.warc.gz
CC-MAIN-2018-30
1,317
6
https://www.activation.fund/project/bedrock
code
Bedrock is a data enrichment service that monitors the text of SEC filings and looks for red flags. There's a lot of data in 10-Qs, 8-Ks, proxy statements, etc. — but much of it is inaccessible to data analysts because it's not programmatically accessible. You can easily extract three-statement financials, but it's harder to access important information that's buried in the text (related party transactions, executive turnover, "temporary" impairments, etc.) Bedrock's NLP algorithms scan SEC statements, looking for the same red flags that a forensic accountant or experienced auditor would look for. It then gives its risk scores and annotations to investors and regulators, who can now cover more companies more deeply.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816904.18/warc/CC-MAIN-20240414223349-20240415013349-00147.warc.gz
CC-MAIN-2024-18
727
3
http://www.codingforums.com/archive/index.php/t-93663.html
code
View Full Version : Wireless FTP 08-16-2006, 12:34 AM My FTP client works perfectly on my Desktop but when i try to log into my site's FTP via wireless laptop. it dosnt work. Says somthing about a socket. 08-16-2006, 02:05 AM What program are you using for FTP? 08-16-2006, 04:00 AM core ftp lite 08-16-2006, 05:27 AM Do you have any more info you can give regarding the socket error? Are you able to ping the FTP server from the laptop? Can you bypass the ftp client and try to connect via command line? 08-19-2006, 08:20 AM sounds like the firewall for your wireless connection is blocking FTP (I assume at the wireless router itself so login to that and have a look around) Powered by vBulletin® Version 4.2.2 Copyright © 2017 vBulletin Solutions, Inc. All rights reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218191405.12/warc/CC-MAIN-20170322212951-00660-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
778
13
http://www.cnet.com/forums/discussions/synctoy-changes-drive-letters-579558/
code
Such bugs are common in Microsoft software. You do have alternatives such as GoodSync, SyncBack and others. I setup folders on two drives to sync - like this G:\MyFolder .... H:\MyFolder and somehow Synctoy switches drive letters on me H:\MyFolder .... G:\MyFolder My G Drive is the source and H Drive is the destination why is it doing this - i deleted all the sync pairs and the sync files in each folder- and then recreated all the pairs again - yet it still is swapping drive letters
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701154682.35/warc/CC-MAIN-20160205193914-00233-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
487
7
https://docs.groupdocs.com/search/java/optimize-index/
code
An index optimization operation allows you to reduce the number of segments in an index, thereby increasing search performance in the index. To perform this operation, there is an overload that takes the MergeOptions instance as a parameter. In the MergeOptions class, there is a method for specifying a cancellation object and a method for specifying whether to perform the operation asynchronously. By default, the operation is performed synchronously. The following example demonstrates how to perform the index optimization. String indexFolder = "c:\\MyIndex\\"; String documentsFolder1 = "c:\\MyDocuments1\\"; String documentsFolder2 = "c:\\MyDocuments2\\"; String documentsFolder3 = "c:\\MyDocuments3\\"; // Creating an index in the specified folder Index index = new Index(indexFolder); index.add(documentsFolder1); // Indexing documents from the specified folder index.add(documentsFolder2); // Each call to Add creates at least one new segment in the index index.add(documentsFolder3); MergeOptions options = new MergeOptions(); options.setCancellation(new Cancellation()); // Creating cancellation object to be able to cancel the operation options.getCancellation().cancelAfter(100000); // Setting maximum duration of the operation to 100 seconds // Merging segments of the index index.optimize(options); You may easily run the code from documentation articles and see the features in action in our GitHub examples: Free online document search App Along with full featured .NET library we provide simple, but powerful free Apps. You are welcome to search over your PDF, DOC, DOCX, PPT, PPTX, XLS, XLSX and more with our free online Free Online Document Search App.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301341.12/warc/CC-MAIN-20220119125003-20220119155003-00466.warc.gz
CC-MAIN-2022-05
1,674
8
http://judaism.stackexchange.com/questions/tagged/kavana-concentration+selichot
code
I have always had a problem connecting with the selichot. In my shul they are said in a very rushed, impassionate fashion, mainly due to the need for people to get to work. I don't understand most of ... We say vidui three times in selichos. Many words are uttered in a relatively short time. How can we do this in a meaningful way that is not "vidui peh"? I have heard tell of one of the gedolei Torah ...
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507442288.9/warc/CC-MAIN-20141017005722-00204-ip-10-16-133-185.ec2.internal.warc.gz
CC-MAIN-2014-42
406
2
https://about.me/govindnaik
code
Software Engineer, Architect, and Web Developer in Bengaluru, India I am a software engineer, architect, and web developer currently living in Bengaluru, India. My interests range from photography to technology. I am also interested in design, music, and travel. You can click the button above to hire me. If you’d like to get in touch, feel free to say hello through any of the social links below.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371609067.62/warc/CC-MAIN-20200405181743-20200405212243-00396.warc.gz
CC-MAIN-2020-16
400
3
https://eigenblogger.com/2017/05/25/bluuuuuuuuuue/
code
I was screwing around on iTunes this evening before lecture and decided to browse my “recommended” songs. One of those songs? The instrumental of Love is Blue by Paul Mauriat. Which is freaking awesome, because this was a song I’d gotten from one of my dad’s CDs a long time ago (as in, “before I even had an iPod and burned all my favorite songs to a CD” long time ago) but it had somehow gotten lost from my music collection. NOW IT’S BACK! Crank it, it’s beautiful. (Sorry, I’m really busy so you get garbage blogs.)
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195529480.89/warc/CC-MAIN-20190723151547-20190723173547-00091.warc.gz
CC-MAIN-2019-30
537
5
https://vancouversun.com/news/community-blogs/ebirding
code
Birders that keep track of what they see using checklists can join a continent-wide project to document the distributions of birds. Here is how the web site desribes it: “eBird documents the presence or absence of species, as well as bird abundance through checklist data. A simple and intuitive web-interface engages tens of thousands of participants to submit their observations or view results via interactive queries into the eBird database. eBird encourages users to participate by providing Internet tools that maintain their personal bird records and enable them to visualize data with interactive maps, graphs, and bar charts. All these features are available in English, Spanish, and French. tap here to see other videos from our team. A birder simply enters when, where, and how they went birding, then fills out a checklist of all the birds seen and heard during the outing. eBird provides various options for data gathering including point counts, transects, and area searches. Automated data quality filters developed by regional bird experts review all submissions before they enter the database. Local experts review unusual records that are flagged by the filters.” Many birders are already using eBird so check it out at www.ebird.org/content/canada
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153391.5/warc/CC-MAIN-20210727103626-20210727133626-00309.warc.gz
CC-MAIN-2021-31
1,270
5
https://communities.bmc.com/ideas/21065
code
Footprints 12-Set color based on notes type two different color for internal/private and Public notes on description/notes field When we have one description field on the agent web and customer web. is there any criteria we can set to make colored the internal notes and public notes. Based on user's comments the color should be set on the description history notes so that agents can easily identify the customer notes and agents notes/internal notes. currently we have workaround to create two separate notes field i.e internal notes and public notes. one for customer and one for internal agents.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107894175.55/warc/CC-MAIN-20201027111346-20201027141346-00178.warc.gz
CC-MAIN-2020-45
600
4
https://github.com/libsdl-org/SDL/commit/89c538a4e3a79dff2ec7444280277c42d0598739/src/video/mir/SDL_mirwindow.h
code
Please sign in to comment. This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository. Mir: Add gamma support set/get. Still need one more function to compl… …ete the set - Loading branch information Oops, something went wrong.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178363782.40/warc/CC-MAIN-20210302065019-20210302095019-00507.warc.gz
CC-MAIN-2021-10
285
6
https://t2sde.org/packages/7.0/netkit-routed
code
Package available in: [trunk] [8.0] [7.0] [6.0] [2.1] The netkit-routed package contains the 'routed' daemon and the 'ripquery' program. ... part of T2, get it here Author: David A. Holland <netbug [at] ftp [dot] uk [dot] linux [dot] org> Maintainer: Rene Rebe <rene [at] t2-project [dot] org> Download: ftp://ftp.uk.linux.org/pub/linux/Networking/netkit/ netkit-routed-0.17.tar.gz T2 source: netkit-routed.cache T2 source: netkit-routed.conf T2 source: netkit-routed.desc Build time (on reference hardware): 5% (relative to binutils)2 Installed size (on reference hardware): 0.07 MB, 16 files Dependencies (build time detected): bash binutils bzip2 coreutils diffutils findutils gcc glibc grep linux-header make sed sysfiles tar Installed files (on reference hardware): n.a. 1) This page was automatically generated from the T2 package source. Corrections, such as dead links, URL changes or typos need to be performed directly on that source. 2) Compatible with Linux From Scratch's "Standard Build Unit" (SBU).
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657720.82/warc/CC-MAIN-20230610131939-20230610161939-00554.warc.gz
CC-MAIN-2023-23
1,013
15
https://vull.watchcoinprice.com/bitcoin-slush-pool/11-free-bitcoin-address-with-balance.php
code
Bitcoin address types supported: With our free online tool, you can check the balance of different Bitcoin addresses quickly and easily. Just enter the. Bitcoin rich list top to bottom, private keys are generated random for fun, to try to collide a private key with BTC balance. BTC Address with Balance. “On the Bitcoin network, the public address is an identifier that points to a particular ledger entry (i.e., a Bitcoin balance) on the blockchain. LEPA 1600W MINING BITCOINS The original private key horror story and one that resurfaces every bull run. Each owner transfers bitcoin to the next by digitally signing a hash of the previous transaction and the public key of the next owner and adding these to the end of the coin. The private key is simply a random bit number. One Swan withdrawal will be sent in order to each address, starting with the first and continuing without repeat up to the addresses … Your public key may look similar to your private key. The private key is mathematically related to the address, and is designed so that the Bitcoin address can be calculated from the private key, but importantly, the same … What are Private Keys and Public Addresses? A Bitcoin private key is really just a random two hundred fifty six bit number. We are going to create a Raw Transaction step by step using bitcoind Bitcoin Core server. Bitcoin Private Key Finder ! Copy your Bitcoin public key, which is essentially your wallet address for this specific coin. This will give you a Public Key Hash, which should be 20 bytes, i. This tool converts between compressed and uncompressed bitcoin keys. It builds the backbone of the network. You this library at a high level and create and manage wallets for the command line or at a low level and create your own custom made transactions, keys or wallets. Security for the individual transaction is achieved through … A Python script to generate random bitcoin private keys, extract their bitcoin addresses and compare against a list of addresses which have large amount of bitcoins i. The first 12 of these bytes are dropped, the remaining 20 bytes are a 40 character address, to which usually the prefix 0x is added. Legacy address p2pkh Open your … Generate bitcoin public and private keys and check if they match a filelist of existing addresses that have a nonzero balance Dec 22, 1 min read. If you are looking for the first one thousand private keys, they are here. How does the Bitcoin private key relate to the Bitcoin public key? These two keys or numbers are related mathematically on the secpk1 elliptic curve. You can extract public keys from spent outputs via the scriptSig , but it is not straightforward. Bitcoin is the first and most widely used cryptocurrency in the world. Bitcoin private key hack helps to get the cryptocurrency money with the best hack tools and get rich in just few days and send money to friends and makes them happy. The second 'factor' is a verification code retrieved via text message or from an app on a mobile device. Additionally I found the reference implementations a bit confusing! Bitcoin Key Compression Tool. Decrypt your backed up bitcoin. It then hashes your public key to generate an address. It might be easier to learn about two other terms to fully understand the address: the private key and the public key. A bitcoin transaction contains a list of inputs and outputs. Any private keys found will be printed out with the address. Bitcoin Address allowed by our tool are base58 or xpub format. To install Bitcoin::Crypto, copy and paste the appropriate command in to your terminal. Launched our Bitcoin wallet watcher to the Bitcointalk community. The public key is public, while the private key that corresponds to it is not. These keys are like passwords and serve as proof that the person holds the Bitcoin needed. We allow the user to search for public and private key matches. Total: A database of all Bitcoin private keys. Public Key. Bitcoin uses public-private key pairs and digital signatures to sign transactions. Most of these conversions are called hash functions. Is a Private Key Secure? Any verified transactions that have a valid signature will be accepted by the Bitcoin network. In such unexpected situation with our directions and steering you can even hack bitcoin private key free. There are many valid Bitcoin private keys. Bitcoin private key database. Keys has strong mathematical relations with Bitcoin addresses and are generated by wallets. If you ever run out, we can reach out to you to ask you to re-connect your wallet. Signing a message. To understand the process of Bitcoin transactions, it is important to have a basic idea of the public and private keys used on the blockchain. Though it may look like single keys give full autonomy to the owner of the funds, in reality, this is very risky. Bitcoin Private Keys. A public key is a 65 byte long value consisting of a leading 0x04 and X and Y coordinates of 32 bytes each. The difficulty of finding the prime factors of a composite number is the backbone of RSA. Show regular output. The private key is a cryptographically encoded unique string of numbers and characters that only the owner knows. The keys that are being discussed in this phrase are the private cryptocurrency keys. If you enter more than 50 adddresses on the. Thanks to attached bitcoin master private key we are able to generate master public keys. Requires a new wallet backup. Bitcoin uses public keys or address and private keys to encrypt and decrypt data transactions value-bitcoins. Public Companies Bitcoin Dominance. Get Your Public Keys. You can think of a Bitcoin wallet address like a mailing address. Input Key. It's best to generate a Bitcoin private key using a tool or program that ensures a high level of entropy for maximum security. If you scroll down past the middle section we will get back to that shortly , in the Derived Addresses section, we will see a table that includes public Bitcoin addresses, public keys and private keys:. Feb Please keep this private key with you. John, a college student had bought 10 bitcoins in and was provided a USB containing the private keys of the coin. A bitcoin address is nearly identical to an email address. Install deps, i. This ledger is copied—exactly—across every computer that is connected to the bitcoin network, and it is constantly checked and secured using a vast amount of computing power across. Looking At Derived Addresses. Note that private keys for compressed and uncompressed bitcoin public keys use the same version byte. The big list. Bitcoin can be sent to this public address by anyone in the world. May Once you produce a private key bits of zeros and ones , you can follow Bitcoin's algorithm to produce the public key, then convert the public key to the so-called "base58" format. A private key is. Public keys are encrypted pieces of data that act akin to email addresses. A Bitcoin Address is an ID of alphanumeric numbers, that represents a possible destination for an incoming Bitcoin payment for example to a Bitcoin Wallet. After putting his signature and public key in the signature script, Bob broadcasts the transaction to Bitcoin miners through the peer-to-peer network. Do not trust, verify - Your key your coins! If you would like to run this tool offline,. This key will … Quantum computers can be used to crack public keys for a bitcoin account yes, but an addresses public keys are only published when a transaction is made. If your wallet … A private key is mathematically related to all public keys i. The code allows a person or entity to send bitcoin to you. These public addresses are NOT public keys. Not infinitely many, but many enough that the human brain is unable to grasp just how many. Last update: May 15, totally 24,, addresses with balance. A private key is linked to a public address and it must be kept always hidden in a safe place. So far I've found nothing. It also discusses the mathematics implemented to secure and maintain the trust in the Bitcoin network. Private Key. People with a signature and public key will be able to easily authenticate a transaction. That said, many bitcoin holders want to take possession of the private keys to their bitcoin using a hardware wallet or paper wallet. Elliptic Curve Digital Signature Algorithm. The key pair consists of a private key and—derived from it—a unique public key. Important for beginners! This site simply displays information from the Bitcoin blockchain. Besides these key pairs and a bitcoin wallet address, your bitcoin wallet also stores a separate log of all of your incoming and outgoing. A brute force attack on a Bitcoin private key is, in theory, much like a brute force attack on any regular password. From the private key, we use elliptic curve multiplication, a one-way cryptographic function, to generate a public key K. For private keys associated with uncompressed public keys, they are 51 characters and always start with the number 5 on mainnet 9 on testnet. With it, private keys are bits long, meaning that Bitcoin's private key space the number of different distinct keys that are possible to create is about 2 , which is an ridiculously large number. The square 16x16 is used for generation purposes, where each cell is one bit - 0 or 1. Show machine readable output. Our private key finder application is very effective fast and efficient. Enter Hunt for Bitcoins! We can give you the chance to become a bitcoin millionaire or billionaire. Start being a hacker and end being rich with bitcoin private key hack. Assuming you have the EC private key file in pem format private. Hence no one other than yourself can access your bitcoin information even after knowing your public key. More Info. The ledger is effectively a chronological list of transactions. A year-old British man has been urging city officials for years to let him search through a landfill in the Welsh city of Newport to retrieve a hard drive with 7, bitcoin on it, which he mistakenly threw out. Someone … 21 rows You probably want to read the introduction to this list. Who knows what the future may hold. Public keys are used to determine if a signature of a transaction is genuine without divulging the private key. Total Bitcoin Holdings. If your wallet … Further withdrawals will take place to the Bitcoin addresses generated from your extended public key. The following is an example of a public key: A public key is derived from the private key, and used to create the wallet address. Your identity is your public key and you can use this identity by proving they have the corresponding private key. You can think of a public key as similar to an email address. Whereas a public key is like an address you would use to receive funds, a private key is akin to a password you would need to use to send funds. This process is guided with on-screen instructions. With legacy outputs, however, as in the genesis block , this is possible without spending because they use a. When we generate our key pair with Openssl, we see a bit private key and made from 32 bytes , along with a 65 bytes of a public key. Blockchain plays a key role in authentication and authorization of Bitcoin. The key to every bitcoin wallet, including Satoshi Nakamoto's wallet, is hidden in one of the pages. And bits is exactly 32 bytes. The process means that there is a wallet database that has the giant list of keys for every transaction that is performed in your wallet. The public key is used to receive bitcoins. A Bitcoin raw transaction is a chunk of bytes that contains the info about a Bitcoin transaction. Two-factor authentication 2FA is a way to add additional security to your wallet. In brief public key is the identity of your wallet means directly related to the receiving, and the private key is a concern with the spending of your bitcoin. Recall that Bitcoin keys use the secpk1 info on 2. Generates a hash from a bitcoin's public key. Bitcoin wallet is an application that contains a collection of public Bitcoin address and private keys. A quick way to sweep Dogecoin private key safely. The purpose of this task is to perform such a conversion. Private keys are meant to be kept secret, and public keys can be shared publicly to receive BTC transactions. When spending bitcoins, the current bitcoin owner presents their public key and digital signature in a bitcoin transaction to spend those bitcoins. Good day and keep up the good work. Halving countdown. Bitcoin public keys are long strings of letters or numbers that begin with either a 1 or a 3. Show full-key hashes. Now, this curve has an order of bits, takes bits as input, and outputs bit integers. If the key is BIP38 encrypted this password will be used to decrypt it. You will get 2 formats from a single private key - compressed and uncompressed base58 address. This website contains a sequential database of all Bitcoin private keys, spread out on pages of keys each. The public key is a cryptographic code that is used to prove that transactions […] 2 A bitcoin address is a hash of a public key, and thus the system validates that transfers have sufficient balances by unhashing the public key when a transaction is submitted encoded with the corresponding private key. Network participants use public keys to send and receive crypto funds. The private key is mathematically related … IMPORTANT: When providing as argument public keys with a set such as above, then Bit will sort the public keys internally in lexicographical order similar to how Electrum behaves. An exhaustive search of possible combinations is carried out before a private key combination is identified. You give it to your friends so that they can use it to send you Bitcoin anytime they want. In Electrum 3. A private key that is an input for that algorithm will always produce its corresponding public key. We define a bitcoin as a chain of digital signatures. Other digital currencies have tackled this issue using various algorithms, each offering a different level of anonymity to its users. It is also very affordable. We generate for you a vanity address with your public key. It is the first discovered wallet among the desktop wallets. Blockchain information for Bitcoin BTC including historical prices, the most recently mined blocks, the mempool size of unconfirmed transactions, and data for the latest transactions. Bitcoin uses a system called public-key cryptography PKC to preserve the integrity of its blockchain. It can be encoded in a number of different formats. I wrote my implementation in Python. Compromised Private Keys. If your private key used a poor source of randomness, your address could have a security issue. In other words, if you send Bitcoin to an address public key , it can only be decrypted one time, in one direction. Through many of its unique properties, Bitcoin allows exciting uses that could not be covered by any previous payment system. The private key is randomly generated, in a slim hope that you can find a collision - a private key what has Bitcoin balance in its corresponding public key address. Total Value USD 1. Compressed public keys are now widely used amongst the most popular bitcoin software. In this system, users can generate private keys also known as secret keys as part of a private-public key pair. This application also holds the bitcoin transaction details and users can also set the fee for transactions while making it. The Bitcoin protocol utilizes public key cryptography opens new window to defend and verify the property rights of the individuals holding and transacting bitcoin. This article explains the details of how a Bitcoin wallet operates. Private keys associated with compressed public keys are 52 characters and start with a capital L or K on mainnet c on. Bitcoin Bitcoin Cash. Every Bitcoin address has a matching private key, which is saved in the wallet file of the person who owns the balance. By decrypting your wallet backup, you run the risk of exposing your private keys to the internet. Bitcoin private key generator. The private key is a very complex combination of numbers and characters, and the public key gives us a unique identity so we can easily find the person we want to transfer the bitcoin. Whenever connecting multiple addresses with Swan, we do not share or store your Extended Public Key Xpub. The main purpose is as a diagnostic tool. But make no mistake, they are very different. Alice can publish her public key on the web, and people can … Bitcoin uses the hash of the public key for two reasons: first, for compression— bits is unnecessarily large for the purpose of Bitcoin addresses. Both the transaction and public keys can be queried on blockchain. It is similar to P2PK, but the lock contains the hash of a public key … A Bitcoin Wallet contains a copy of your private key and public key. Flip the genuine coin for random bit selection and use your mouse to mark any bit within a square as 1 filled cell or 0 blank cell. Includes a fully functional wallet with multi-signature, multi-currency and multiple accounts. Dec However, if keys are made to be large numbers, it is mathematically infeasible to break them. However, you can only produce a valid transaction signature if you use the private key matching the published public key. List Private Keys. The new and best way to claim your free Bitcoin, from the creators of the longest running and best free bitcoin mobile apps! You can enter your private key in a different device and reliably mathematically produce exactly the same collection of public keys and addresses. Try your luck. If you have any message that was signed using the private key from that address, then you can get the public key from the signature. In , while shifting from one place to other, he forgot the bag. Private key: a 64 character long code using any combination of the letters A-F and the numbers This is a simple Bitcoin non-deterministic wallet address generator coded in Python 3. Signing messages to the Bitcoin blockchain: Public-key encryption is used by Bitcoin, but not to create secret messages that are sent to the blockchain. The point of saying this is for you to appreciate that it's as if the bitcoin are stored on the 24 words you created — not the hardware wallet. Refer to this page for a detailed explanation. The result is a Bitcoin full public key, which is equal to. The private key k is a number, usually picked at random. G will be a constant point on the graph which will be provided by bitcoin. For example, if you have some bitcoin on an exchange, then the exchange is actually holding the private keys on your behalf. Your public address is a code it looks like a long string of numbers and letters. If all you have is the bitcoin address, then it is not possible to get the public key. WebAnalysis Crypto. Cryptocurrencies Tools Check multiple Bitcoin addresses Balance. Check multiple Bitcoin addresses Balance. Enter the Bitcoin addresses you want to verify, one per line Important: Please enter one address per line. Where to buy Bitcoin? Check multiple Bitcoin addresses Balance Tool. Bitcoin Address allowed by our tool are base58 or xpub format. Something ethereum classic address explorer something is Fake trust wallet balance generator. |Cryptocurrency moon 2018||546| |Crypto shorting exchanges||784| |Free bitcoin address with balance||Btc usd price index| |Free bitcoin address with balance||731| |Can lost ethereum be recovered||Ledger manager ethereum app| |Free bitcoin address with balance||274| |How to exchange ethereum tokens||Ethereum rig frame| |Playstation 3 ethereum mining||Paper Wallets. Bitcoin wallets act as virtual wallets for your digital currencies. We are a group of software engineers and hackers researching in the field of crypto currency. I look for the volatility during the week to book atom wallet on one or both. Responses The Affirmation that was updated. Malware scams involving Bitcoin have also been occurring.| |Btc rate chart||7| |Btc sc rank 2017||Apple macbook widgets bitcoin litecoin| HOW LONG FOR CONFIRMATION BITCOIN Free bitcoin address with balance ethereum failed transactionBitcoin Address Changer Script - FREE BITCOIN - Live proof Следующая статья bitcoins newsweek last issue
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103626162.35/warc/CC-MAIN-20220629084939-20220629114939-00303.warc.gz
CC-MAIN-2022-27
20,355
62
https://forum.dlang.org/thread/kgyfyujtnzdbrrhuwhvj@forum.dlang.org?page=5#post-mombozdvetcxpmobvvdk:40forum.dlang.org
code
On Monday, 11 October 2021 at 15:59:10 UTC, Atila Neves wrote:> I'm brainstorming about what I'll talk about at DConf, and during a conversation with Walter I thought it might be cool to talk about: - Worst features implemented in a non-toy language - Worst features (in your opinion) in D - Features you'd like to see in D Not necessarily a feature, but I think the absence of hindley milner type inference is a big one. I think that statically typed languages should adopt it or at the very least be influenced by it unless they have a really good reason not too. Types are completely optional in (vanilla) hindley milner. You can write code that looks like python and still have all the benefits of static typing. It also infers the most general type for the code you write. This makes your code as generic as possible unless you add a type annotation to make it less generic. I also think that it can help in language design in general. Weak typing and subtyping, features that are generally disliked are incompatible with hindley milner. It gives good answers to what the type of a null pointer and an empty array are without resorting to void pointers and void arrays which feel hacky.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819847.83/warc/CC-MAIN-20240424174709-20240424204709-00361.warc.gz
CC-MAIN-2024-18
1,191
8
https://www.techlearning.com/resources/the-geffrye-museum-of-the-home-interactive-journey
code
Through time and space travel afforded by the internet, you can take a walk through a Victorian house in London in 1870. In this interactive journey you can help Ruby and Michael search for Sam, their missing dog. While you are searching, you can learn about Victorian life by examining the objects in the house, listening to the characters, and answering the questions. By answering all the questions correctly, you will find Sam. Along the way you will have fun exploring someone else’s home and life. courtesy of Knovation
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946584.94/warc/CC-MAIN-20230326235016-20230327025016-00402.warc.gz
CC-MAIN-2023-14
527
2
https://lists.fedorahosted.org/archives/list/sssd-devel@lists.fedorahosted.org/thread/DA3MY3XUL7VYR6K35PC5PPQ2KKA27JCM/
code
On Mon, Feb 18, 2013 at 03:03:27PM +0100, Milan Cejnar wrote: Function usage() in tools_util.c now correctly appends new line with popt error messages. This patch changes function usage() in tools_util.c which is used by Since BAD_POPT_PARAMS macro is called by multiple functions in multiple files with both custom messages termited with \n as well as popt messages which are not terminated by default, this patch offers a correction by checking the string just before printing out to console and printing out additional \n if new line wasn't present. The second patch - includes previously omitted brackets after if condition - uses only one fprint()f call instead of two please reply to the original thread with follow up patches and squash the follow up patch into the original one using git rebase -i for it might get you started. Feel also free to ping any of us on the #sssd channel on
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488517820.68/warc/CC-MAIN-20210622124548-20210622154548-00009.warc.gz
CC-MAIN-2021-25
892
16
http://shabellocreative.tumblr.com/
code
Bay Area - We’re All In 'We're All In' is a type based animation for an event hosted by Bay Area Teach for America. Working alongside the talented Man vs Magnet and Sara Bennett (Shabello) once more, we put together this fast flowing and engaging animation full of strong messages and statistics. The original video was quite long, so Man vs Magnet helped cut it down into neat little, easy to digest chunks for you viewers to watch. Enjoy! Client: Teach for America Produced at Man vs Magnet Director: Matt Smithson Design / Animation: Oliver Sin, Sara Bennett, Matt Smithson Character Animation: Arthur Metcalf Producer: Nathan Jew Music composition for the original version: Sunday Ent Music used for this here montage is Little People ‘Aldgate Patterns’ (Marley Carroll Remix)
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500835488.52/warc/CC-MAIN-20140820021355-00316-ip-10-180-136-8.ec2.internal.warc.gz
CC-MAIN-2014-35
786
11
https://www.digitalsamba.com/release-notes/release-562
code
Digital Samba 562 brings further improvements to the Embedded Meetings dashboard. This release is dedicated to enhancing the dashboard statistics – featuring an improved design, interactive graphs, and a comprehensive table view. Additionally, we have introduced a powerful new SDK method that allows for more seamless and direct integration. In our classic app, we are thrilled to announce three significant additions: a branding option allowing account holders to set their own custom domain, a new Service Plan option to allow unlimited recurring meetings, and a new feature that allows users to utilize a custom RTMP link for live streaming. Continue reading below to learn more about our latest updates. Dashboard and API This release includes various improvements in the dashboard Stats page: Improved design of the dashboard Stats page, interactive graphs that enable team members to overlap selected metrics for easy comparison, comprehensive table view that breaks down each metric into individual days within the selected date range and the addition of an 'export usage statistics' button, allowing team members to download data for further processing and analysis. We added a new room setting allowing integrators to set the layout mode on join to 'auto' or 'tiled'. The setting is supported both on the dashboard and the REST API. Made the description of the 'Start session' permission more explicit by adding a description about what happens when the setting is disabled. We organized the room settings into subsections and made them accessible through a submenu. We made the submit and cancel buttons sticky at the bottom to provide better guidance to users on their mission to create or edit rooms. We added a 'Revert to factory settings' button to the default room settings page allowing team members to reset the default room to the factory settings. We added a 'Reset to default' button to the room-edit page, allowing team members to reset the room to the defaults set in the default room settings page. We added double verification to the 'Revert to factory settings' button in the default room settings page, to give team members a chance to cancel. We added an SDK method that returns a room's settings, allowing developers to integrate more directly, without relying on error messages. Previously in notifications, the requesting participant's name was displayed separately from the notification message. We've improved UX by integrating the requesting participant's name in notification message sentences, so that it's now easier to read them. We unified the UI language options available in-room with the UI language options available in the room settings on the dashboard. Resolved issue wherein the active speaker was not being magnified in auto mode, after another user stops screenshare. Resolved issue wherein a participant's tile stayed magnified in a recording made with 'Recording layout mode' set to 'auto', when another participant joined and became the active speaker. Resolved issue wherein a participant's tile disappeared in a recording made with 'Recording layout mode' set to 'auto', when he stayed in the room alone, after the other participants had left. We fixed an issue where, in a video conferencing room, user #1 was unable to successfully request user #2 to unmute their microphone. Clicking the 'Unmute' button would result in an error page displaying "Oops, something went wrong." This issue has been resolved, allowing users to request and successfully unmute others in the video conference without encountering any errors. We fixed an issue that was being reproduced when a participant's own tile was expanded to fullscreen. Previously, the 'pin', 'collapse' and 'minimise' icons were missing on the expanded tile. With this fix, the mentioned icons are correctly displayed, ensuring a smooth user experience. We fixed an issue where the auto mode layout was broken when pre-selecting the auto mode in the SDK before joining a room with two existing users. Previously, the layout would not display correctly, causing visual inconsistencies. With this fix, the auto mode layout now renders properly, ensuring a seamless and visually appealing experience when joining a room with the Auto mode pre-selected in the SDK. We resolved an issue wherein a user could not collapse their own fullscreen-expanded tile. Meetings, Webinars, Education and Embedded Webinars Added a new branding option allowing account holders to set their own custom domain. We added a new Service Plan option to 'Allow unlimited recurring meetings'. When enabled for their Service Plan, Account Holders may now schedule any number of recurring meetings in the Account Center scheduler. Service Plan Setting: We updated the 'Upgrade account' button URL for users with no subscription to redirect to the 'upgrade-meetings' page so that customers can then choose which plan they want. We added 'custom RTMP' to the list of available live stream options, allowing presenters to enter custom stream RTMP URL values, thereby expanding the options limitlessly. Sample stream via restream.io: We added a 'download' button when a document is open on Whiteboard 2, in consistency with the behaviour when there is no open document, providing a more intuitive user experience. We reduced the width of the slides previewer strip on Whiteboard 2 and thereby gave additional space to content, to provide a more focused experience. We resolved an issue wherein sharing the screen from an Android device suddenly stopped when focusing away from the Digital Samba application. With this fix, Android users can perfectly and indefinitely share their screen while focusing on other apps.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816586.79/warc/CC-MAIN-20240413051941-20240413081941-00772.warc.gz
CC-MAIN-2024-18
5,693
32
https://sendgrid.com/blog/code-challenge-adventures-vim/
code
Code Challenge: Adventures in VIMSendGrid Team As developers, we all use different text editors when writing code. This post isn’t meant to say VIM is better than emacs, sublime, etc. VIM is just the editor I switched to a while back, and I wanted to go through some awesome resources that I’ve use to become a better “VIMMER.” For this post, I’m going to walk through some VIM basics that I think the beginner needs. Afterwards, I’ll walk through some great resources. Basics to Get Started The first thing you’re going to notice when you open VIM is that you can’t start writing code. This is because VIM has many different modes and its default mode is set-up for editing rather than writing new text. I break down two of the popular modes below: - Command Mode: Navigate the current code in your file and run keyboard commands to edit your code. I talk about some basics below, but If you’re not currently in this mode you can just press the “ESC” key and get back to it. - Insert Mode: Pressing the “i” key will get you in this mode. This will turn VIM into a text editor that you’re probably familiar with. “i” – Puts VIM in Insert Mode “x” – Deletes the char under your cursor “:wq” – Saves and quits the file “dd” – Deletes the current line “p” – Pastes Resources to Learn and Practice According to the description on their Facebook page: “VIM Adventures is an online game based on VIM’s keyboard shortcuts. It’s the ‘Zelda-meets-text-editing’ game. So come have some fun and learn some VIM!” From my own personal experience playing the game, its fun to play and drills the concepts. This is VIM’s built in tutorial and my personal favorite resource for upping your VIM skills. Just type in ‘vimtutor’ on the CLI. Use the Vimulator to see what each key on your keyboard does in VIM Over the next few weeks, I’m going to continue writing about different technologies, so check back every Monday, Wednesday, and Friday for new tech posts! You can also visit my intro post that will have an updated list of everything I’ve written.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945315.31/warc/CC-MAIN-20230325033306-20230325063306-00772.warc.gz
CC-MAIN-2023-14
2,116
17
https://code.msdn.microsoft.com/Uploading-large-files-386ec0af
code
We’re sorry. The content you requested has been removed. You’ll be auto redirected in 1 second. Uploading large files using ASP.NET Web API and Azure Blob Storage This sample illustrates how to create a simple file service using ASP.NET Web API backed by Azure Blob Storage.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122159.33/warc/CC-MAIN-20170423031202-00481-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
278
3
https://forum.uipath.com/t/invoke-method-cannot-start-process-because-a-file-name-has-not-been-provided/450651
code
I am using Invoke method to open power term and do certain operations but when I am trying to open through InvokeMethod I am getting this error Invoke Method: Cannot start the process because a file name has not been provided. All the inputs to the Invoke method are passed. Please help me with this. Thanks in advance.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103269583.13/warc/CC-MAIN-20220626131545-20220626161545-00314.warc.gz
CC-MAIN-2022-27
319
5
http://texastechpulse.com/escalation_studios_acquired_by_6waves_lolapps/s-0040474.html
code
Wednesday, January 18, 2012 Escalation Studios Acquired By 6waves Lolapps Dallas-based Escalation Studios, a developer of mobile games, has been acquired by 6waves Lolapps, a social games firm based in San Francisco. Financial terms of the deal were not disclosed. 6waves said that Escalation's co-founders, Tom Mustaine and Marc Tardiff, have become Design Directors at the company. Co-founder Shawn Green becomes Director of Engineering. Escalation was advised by GCA Savvian Advisors in the deal.
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823214.37/warc/CC-MAIN-20171019012514-20171019032514-00655.warc.gz
CC-MAIN-2017-43
499
3
https://community.homey.app/t/homekit-no-response/92325/2
code
im using that experimental HomeKit feature. Pairing was not a big problem. I sync about 20 devices from homey to HomeKit. I do have 1 crucial use case for the HomeKit and homey integration, and that’s the Aqara FP2 sensor… I created some virtual switches that switch in HomeKit once the movement is detected. Long story short… It happens extremely often, that HomeKit is saying “no response” on the devices that are mirrored from my homey… I do have an Apple TV latest gen and an iPad Pro. homey has a fixed IP and is connected via LAN (WLAN deactivated) any ideas that I can try to make this more reliable?
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474746.1/warc/CC-MAIN-20240228211701-20240229001701-00586.warc.gz
CC-MAIN-2024-10
619
6
https://conda.org/blog/2023-06-23-newsletter/
code
Image credit: Road Trip with Raj on Unsplash Welcome to the first ever conda community newsletter! The newsletter will highlight recent and upcoming activity that is relevant to the conda community. This first issue highlights community gathering spaces, upcoming events, the new rattler library, channel updates from conda-forge and Bioconda, a summary or recent conda-related web content, and finally releases and announcements. We are hoping these will become a semi-regular feature in the conda landscape going forward. If you have an item to include in a future newsletter, please let us know by posting it to the Conda Communications Matrix Channel or by creating an issue in the Conda Communications GitHub Repo. Finally, if you want to be notified about these newsletters from the comfort of your inbox, please sign up for the Conda Announce Mailing list. Community Gathering Spaces It has been a busy year for creating and consolidating online gathering spaces for the conda community. We now have a community website, a Q&A/forum site, a unified chat platform, a mailing list, and more. See Pinak Datta's recent post for a complete list and links. Please join us every other week to learn what is going on in the conda community and to provide your input. - The Mamba project has bi-weekly community calls on Tuesdays. Our next call is on June 27. - The overall conda community has bi-weekly calls on Wednesdays. The next one is on July 5. SciPy 2023 Conda & Friends Sprint, July 15-16, Austin We have proposed a sprint for SciPy, and SciPy has told us: we aren't planning to reject any projects that submit an application prior to the conference. Sprints are open to everyone who is interested in contributing to the various projects in the conda ecosystem (e.g. projects under the conda, conda-incubator, mamba-org, conda-forge, etc.), what we call "conda and friends". First and foremost, the goal of conda community sprints is to grow the conda contributor community. We mean "contributor" in the broadest possible sense: not just code, but also documentation, bug reports, forum questions (and answers), community events, new tools and plugins, and of course, new pull requests for existing tools too. PackagingCon 2023, October 26-28, Berlin PackagingCon 2023 brings together the software packaging community to present and discuss common challenges and unique solutions to software packaging. The conference is open to all packaging communities, including language-specific, OS-specific, and broader solutions such as conda. PackagingCon 2023 will be held October 26-28 in Berlin, and will be a hybrid event. The call for submissions closes July 31. Early registration ends September 8, but (in-person) space is limited and you are encouraged to register early. - rattler 0.3.0 just came out with lots of highlights, such as JLAP support, local file://urls, and authenticated requests with the new rattler_networking. See the full (and impressive) changelog for more. rattler-build is built on top of rattler to facilitate the creation of conda packages. It already works very well and is much faster than conda-build. To push this effort forward, we started multiple conda enhancement proposals. Engage with us and the conda community on a forward-looking YAML format that is easy to parse (pure YAML) and keeps most of the conda-build functionalities! - A new YAML format. - Integration with VSCode for the new YAML format with automatic syntax linting. - A new way to define multiple outputs and tests. - A new test for file existence inside of packages. Community channel updates conda-forge has a Google Summer of Code project to update the project website. Asmit Malakannnawar will be working on the update for the next few months. The update will provide an intuitive and usable user experience that also passes SpeedPage and WAVE tests, and that moves the site closer to WCAG 2 conformance. He'll also produce a site style guide. Have ideas? Reach out to Asmit. The Bioconda project has conducted a major rebuild of its packages, updating to the latest dependency pinnings of conda-forge. This entails using gcc 12 on linux and clang 15 on macOS, as well as using openssl 3. While most packages could be updated flawlessly, there are various remainders that are currently being skipped. Your help in fixing them would be greatly appreciated. Just choose a recipe from this list, check the provided build logs and create a PR with your solution to fix the failures. Sometimes, it could be as easy as updating to the latest upstream version. Conda on the web - The sleight-of-hand trick that can simplify scientific computing, Nature post by Jeffrey M. Perkel. - Two conda-centric presentations from PyCon US 2023 are now available: - How to use conda-build to build a Python package with C/C++ dependencies, blog post by Vasvi Sood - How we reduced conda's index fetch bandwidth by 99%, blog post by Daniel Holth - Conda equivalent of pipenv run, blog post by Mikołaj Buchwald on how conda runis your friend - Conda survey results, blog post by Dave Clements summarizing last year's survey of conda users, integrated with relevant bits from the PyPA's survey - The Conda Community Forum saw navigation improvements with a new sidebar for navigating the site and a new top menu for navigating to other conda websites. Conda, now starring on YouTube Highlights from the Conda Community Forum - Conda has to go more meta - How to install a “bash completion script” for my conda-forge package? - My miniconda3 installation is screwed up. Reinstall? something else? - Miniconda - Channel conda-forge not working - Traceback message - Install Miniconda for MacOS - Difference between bash and pkg (unanswered) And this thought provoking post from Ralf Gommers earlier this year: Releases & announcements - conda-lock 2.1 - A lightweight library for generating fully reproducible lock files for conda environments. - conda 23.5.0 - Python 3.11 support and the new conda doctor subcommand plugin for detecting corrupted installs. - conda-build 3.25.0 - an update to conda's package builder. - conda-libmamba-solver 23.5.0 - An update to the fast - grayskull 2.3.1 - An automatic recipe generator for the conda ecosystem. - Prefix.dev Channels - A new option for creating your own conda channels. - conda-package-streaming 0.8.0 & conda-package-handling 2.1.0 - Read new & old formats ( .conda & .tar.bz2) and create & extract conda packages.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510781.66/warc/CC-MAIN-20231001041719-20231001071719-00114.warc.gz
CC-MAIN-2023-40
6,462
56
https://addons.mozilla.org/en-Us/firefox/extensions/web-development/?sort=name&page=66
code
Openattribute link Requires Restart Searches links for licenced content on web pages linked to from this page. If you do a google search this add on will check all the search results for CC licences. OpenDownload Requires Restart Allows you to open any file from the internet into the OS assigned program. This is similar to IE's 'Open' or 'Run' file download functionality. ... OpenLink Data Explorer Requires Restart A tool for generating structured descriptor documents for HTTP accessible resources. HTML+RDFa based Linked Data is the default Descriptor Document format. Other formats are available via page hosted links or content negotiation. OpenLink HTML5 WebDB-to-ODBC Bridge Requires Restart Bridges the HTML5 Web SQL Database API to the ODBC (Open Database Connectivity) API. This add-on is not compatible with your version of Firefox because of the following: - Add-on uses binary components. OpenLink HTML5 WebDB-to-XMLA Bridge Requires Restart Bridges the HTML5 Web SQL Database API to tabular XMLA (XML for Analysis) data sources. Browser Extension that enables you to register and switch Web Identities (WebIDs) across an single HTTPS (TLS) session without browser restart. OpenOffice.org for Jacare Project Requires Restart OpenOffice плагин для работы с документами в БД через WEBDAV Displays the OpenText Page ID of the current Webpage and copies the ID into Clipboard (by a Click on the ID). A screen-sharing extention for OpenTok solutions OpenWAX Requires Restart OpenWAX(Open Web Accessibility eXtension) is a tool that can help diagnose and fix the accessibility problem. OpenWith Requires Restart Are you tired of over and over again looking for all the html/php/js-files you are working on in your web application? Then this add-on can help you and save loads of time by launching the files in your editor for you. Just select and launch... OperaView Requires Restart Open pages in Opera from Firefox context menus. Very usefull for web developers! This extension disables Optimizely for the tab you are browsing, via a switch. Looks up the origin AS (Autonomous System) for the current Website. It will insert a small box with the infos on the bottom right corner. You can double click it to let it disappear until the next page load. A source viewer that enables you to view not only page's HTML source but also style sheets and scripts. It uses Prism syntax highlighter and it can beautify(unminify) the source code. This firefox extension enables screen capturing support in Firefox for Oritor pages. Proof of concept for reading articles without login Override User Agent allows to override the default string of the User-Agent in the toolbar, the changes affect only the current domain.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171162.4/warc/CC-MAIN-20170219104611-00036-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
2,753
31
http://www.ps4store.com/pythons-ps4-console-designer-skin-for-sony-playstation-4-system-plus/
code
Pythons PS4 Console Designer Skin for Sony PlayStation 4 System plus Two(2) Decals for: PS4 Dualshock Controller Not Available Discontinued - Unfortunately this product has been discontinued and we will not be receiving any more stock. Click here for alternative products. This high gloss laminate protects from scratching, fading, peeling and most importantly leaves no sticky mess guaranteed.This listing is for one (1)Sony's Newest PlayStation 4 Next-Gen Console skin and (2) Dualshock Controllers Skin displayed above. Actual controller not included. Our patented advanced air-release vinyl guarantees a perfect installation everytime. When you are ready to change your skin removal is a snap, no sticky mess or gooey residue. You can't go wrong with a Pythons. Highest Quality, Full Color, "Anti-Slip" Grip-Like Vinyl "Sticker" and is NOT made of rubber, silicone, gel or plastic. Will not Scratch, Fade (UV Resistant) or Peel Easy Install & Removal. Leaves Behind No Sticky Residue Fits Sony PlayStation 4 Next-Gen Console & 2 Dualshock Controllers Precision Cut, Easy Access for Buttons, Controls, & Connectors.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948617816.91/warc/CC-MAIN-20171218141805-20171218163805-00069.warc.gz
CC-MAIN-2017-51
1,118
4
http://mlton.org/pipermail/mlton/2005-June/027201.html
code
[MLton] SML documentation tool(s) Sun, 19 Jun 2005 18:47:03 -0400 On Sun, 2005-06-19 at 21:27 +0200, Jesper Louis Andersen wrote: > I agree with this statement. The problem of Standard ML in general is > not that the language is hard to learn, not that it is not used widely > enough, not even that its type system is too restrictive and the > language is too simple. The problem currently is solely the lack of > standard library facilities. Is this the cause or the effect? A popular language will have libraries, an unpopular one will not. I'm not sure the SML of 10 years ago will compete with some of the evolving languages we have today. On the other hand all in all I like SML. On the library issue. Even a trivial application of today requires massive libraries to compile the equivalent of a hello world. Take a simple web application for example may include. - HTTP protocol library. - RDB driver. - XML parser. - XML binding / code generating utility. - Transaction Mgr. - Resource pooling code. - Template HTML/XML generation system. - Security routines. - Logging routines. - True native SMP capability libraries. - SOAP libraries. - SML code generation utility from WSDL. - Dynamic code loading. - High Availability. - Session support libraries. - yada yada yada. A modern, yet modest "web" application requires a rather extensive support environment of libraries. Easily over 100K worth of library code to support a modest 10K LOC application. In the MLton world this is a problem. The strength of MLton is whole program compilation. The weakness of MLton is whole program compilation. Whole program compilation and libraries are antipodes. Even the combination of SML/NJ with MLton, even assuming they were merged to appear to the user as a seamless system, one for incremental development and the other for the finished product appears to be Witness the issues the MLton core team has with current compiler development. Even bringing to bear judicious application of SML/NJ and MLton is pushing the envelope of efficient development of a 150K LOC If a functional language does find its way into the main stream, I believe it will be a "new" one which takes the best of SML + Haskell + Scheme/Lisp and somehow finds the magic mix to be special. I also thought this HLF language must accommodate objects. Something along the lines of where Scala is going. But I'm not sure now. I wander... A library solution seems to me to entail some mechanism for separately compiled libraries.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648594.80/warc/CC-MAIN-20180323200519-20180323220519-00339.warc.gz
CC-MAIN-2018-13
2,495
50
http://www.overclock.net/t/1320655/speedfan
code
Not so sure if this is in the correct forum but I'm having problems with speedfan not remembering my configurations as well as speedfan not actually automatically changing my fan's speed. SO far what I've done is check the automatically change fan speed, set my min max temp values as well as speed, and set my pwm(in advanced tab) to software controlled. My configurations stay so as long as i set them on log on but if i reboot then I have to reconfigure initial fan speeds. I've set my task scheduler to run it at highest priority on log on but no dice. Any suggestions? post #1 of 3 10/27/12 at 10:38am
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890394.46/warc/CC-MAIN-20180121080507-20180121100507-00654.warc.gz
CC-MAIN-2018-05
606
3
https://amplitude.com/blog/steps-measuring-feature
code
Your latest update has hit the App Store — you’re excited for your users to try out your new feature that you’ve spent months working on. How do you measure the impact of your new feature? Are people using it? Is it improving your user experience and affecting your company’s bottom line? To determine whether or not a feature is having the intended impact, you need to look at your user data…but where to start? We’ve put together a 7 step framework to help you analyze the impact of your new feature. Let’s walk through an example of a music streaming app that lets your users explore and listen to music and create playlists. About a month ago, you released a new feature that lets your users share music within the app with their friends. You’re hoping the sharing feature will increase overall engagement with your app, and that having this social component will encourage more users to stick around long-term. Step 1: Measure basic usage of the new feature First, you need to answer the most basic question: are people using the feature? There are a few key metrics you should look at to get a complete answer to that question: - total number of times people are using the feature - the number of unique users who are using the feature - the percentage of your total active users who are using the feature - the average number of times per day users are using the feature First, you can look at your analytics platform for the total counts of the event ShareMusic. After your first week of launch, more people started using the new sharing feature, resulting in between 1000-1700 shares per day. But how many unique users are actually using the sharing feature? To figure that out, you look at the number of unique users doing the sharing event: Now you know how many unique users per day are using the sharing feature — what percent of your total daily active users is that? This is really important to check so that you have a sense of how widely the sharing feature is being used. As you can see, only a small percentage, around 0.04% of your daily active users, are utilizing the new feature. It’s smaller than you were hoping, but you know you can learn a lot by digging deeper into these early users of the sharing feature. By learning how these early adopters are sharing music, you can figure out how to improve the sharing experience or expose it more effectively to gain wider usage. Let’s check the average times per day these users are sharing music: Step 2: Dig deeper into event properties to look for patterns Now it’s time to learn more about how people are using the new sharing feature. In your app, people can share different types of content: either an individual track, a whole album, or a playlist. You’re interested in seeing what type of content your users are sharing. To investigate, you split the ShareMusic event by contentType: Turns out individual tracks are getting shared the most, followed by albums. Comparatively, not very many playlists are getting shared. Next, you’re interested in what types of users are sharing music. You have a few different subscription plans: Free, Premium, Student, and Family, so you segment the ShareMusic event by plan type: Interestingly, you see that the largest segment of users sharing music are on the Student plan, which is your special plan for college students. In addition, not many Free users are sharing music at all. Step 3: Understand what users are doing right before using the feature It’s helpful to trace the paths that users take in your app before they share music. What are most users doing right before they share? This gives you an idea of the context in which they’re using your new feature. Some analytics platforms, including Amplitude, provide event flows that help you visualize users’ sequences of actions. Below, you can see the actions that users take leading up to ShareMusic: About 40% of users who ShareMusic play a song and then share music, implying that they listen to a song they like, and immediately share that song with their friends. Also, 30% of users share music right after favoriting a song. Apply what you’ve learned: So far, you haven’t done too much in your app to encourage people to share music, but this information gives you an idea. If someone is marking a song as a favorite, that’s probably a good time to prompt them share that song with their friends, since they clearly are finding value in that song. You can test whether adding a small in-app prompt right after someone favorites a song saying ‘Share this song with your friends!’ will increase the number of users who share, as well as total shares in your app. Step 4: Build a behavioral cohort of people who used the feature to analyze how they compare to your overall user population Here’s our cohort of users who have done ShareMusic: We’ll use this cohort in Steps 5-7 to measure how how users who share music might differ for key metrics like conversion, retention, and engagement. Step 5: Analyze the impact of the new feature on retention User retention is critical to the success of any app. The more your app becomes an ingrained habit for your users, the more time you have to upsell them and monetize them. To measure the impact of sharing on retention, you can compare the retention of the cohort of users who shared music vs. those who did not. One way to do this is to look specifically at new user retention: do new users who share music early in their experience (like their first day), retain better than new users who don’t share music? The retention curve above shows that new users who share music on their first day in the app have significantly higher retention by Day 30 than new users who don’t share music. About 40% of people who shared music returned to the app 30 days later, compared to only 5% of non-sharers. Step 6: Measure the impact of the new feature on your key conversion funnels. It’s fantastic that sharing music correlates with higher retention; does sharing have a similar impact on your company’s revenue? Your app makes money when users purchase a subscription. To measure the impact of sharing music on conversion to a paid subscription, you compare the upgrade funnel for users who share music vs. those who don’t share. There’s actually a big difference in upgrade completion rate for users who share music: 45.2% conversion compared to 14.1%. This strongly indicates that something about sharing music is showing value to your users, making them more likely to upgrade to a paid subscription. Step 7: Measure the impact of your new feature on engagement Now that you’ve seen the impact sharing has on conversion and retention, you’re curious whether users who share music are more engaged with your mobile app overall. One way to look at this is the number of sessions each user does per day. This data seems to indicate that users who share music are more active than those who don’t share music, completing 13 sessions per day on average, compared to 8 sessions for non-sharers. You can also look at the ‘stickiness’ of users who share. We define stickiness as the percentage of users who are active at least n days out of a week. Users who share music use your app on more days per week. In fact, 45% of sharers use your app every day in a week, compared to 27% of non-sharers. Next steps: Acting on what you’ve learned Let’s sum up what you’ve learned so far: - Only about 0.05% of your daily active users are currently sharing music - Individual tracks are getting shared the most, more than albums and playlists - Directly before sharing music, 40% of users who share play a song, while 30% favorite a song. - Users who share music have significantly higher conversion rate to a paid plan. - Users who share music have higher retention than those who do not share. - Users who share music are more active on your app overall, with more sessions per day and higher stickiness. Remember: you don’t have causation yet Based on those insights, your new sharing feature seems to have a significant positive impact on all of your key metrics. Of course, we can’t derive direct causation from this data. However, it’s possible that your power users, who already have much higher engagement and retention than the rest of your users, are also the early adopters of your sharing feature, in which case encouraging other users to share music may not be very impactful. You should look at historical behavior of your ‘Shared Music’ cohort to see whether those users already had higher retention and conversion before you released the feature on October 1. In addition, you can test whether encouraging other users to share music has a positive effect on your metrics, which brings us to: Test, measure, repeat The next step is run experiments on the sharing feature. Will encouraging more users to share music increase your retention and conversion KPIs? You might decide to include an in-app prompt to share music right after a user favorites a song, like we suggested in Step 4. Maybe you’ll encourage all new users to share music during their onboarding flow. The opportunities are endless, so it’s time to brainstorm, prioritize based on what you think will have the biggest impact, and measure which tests have the biggest impact on your core metrics.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100452.79/warc/CC-MAIN-20231202203800-20231202233800-00546.warc.gz
CC-MAIN-2023-50
9,372
55
https://www.freelancer.com/projects/wordpress/help-wordpress-database-file/?ngsw-bypass=&w=f
code
My Wordpress site isn't that big. Need someone to take a look at the db file and look for anything malicious or unnecessary and get rid of it. its over 15GB. 20 freelancers are bidding on average $55 for this job Hello sir, nice to meet you! I'm a DevOps Engineer with strong experience in Linux, Wordpress I'm confident to handle this task and can start now Feel free to contact me! Thank you! Hello, ****I CAN START WORK ON IT IMMEDIATELY****** I have EXCELLENT work experience of 5+ years in this field. # Pay after getting complete SATISFACTION # Quality and Rapid work Thanks Regards ketan Hello, i can check and fix your wordpress database issues, i want to know some more detail please inbox me for discussion, i am linux system admin and wordpress expert, best regards Hi there, Can you share a link to your website? I would love to see the media being used on the website. I can help you reduce the bloated database. Text me to begin.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141197278.54/warc/CC-MAIN-20201129063812-20201129093812-00310.warc.gz
CC-MAIN-2020-50
943
6
https://help.nextcloud.com/t/accessing-a-tor-hosted-nextcloud-server-using-the-windows-desktop-and-ios-apps/124657
code
I am hosting a nextcloud server on a separate device over tor and I would like to add my nextcloud account to a Windows desktop app and the ios app. When I am prompted to enter the server address and I enter it (ending in .onion) I get the following error message: “Failed to connect to Nextcloud at <server address ending in .onion> not found.” Is there a way to add the account to these devices? I can’t give you detailed instructions. But i can say that much… .onion domains are not accessible directley via a normal internet connection. In order for an application to connect to an .onion domain, either the entire traffic of the system it runs on, or at least the traffic of the respective application must be routed through the Tor network somehow. The Tor Browser package does this out of the box, i.e. all necessary tools and settings are already provided and configured accordingly with the Tor Browser application package. In principle, it is also possible to route the traffic of other applications through the Tor network, but this requires some kind of proxy service that connects to the Tor network. The Nextcloud Desktop Client must then connect to this proxy service instead of using the normal Internet connection of your computer. Such a proxy can run locally on your computer or on a seperate server in your local network. I myself have no experience on how to set this up… But the support section on the website of the Tor project might be a good starting point to read up on how it works in general. A warning in advance… This whole thing is not quite trivial unfortunately…
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662530066.45/warc/CC-MAIN-20220519204127-20220519234127-00528.warc.gz
CC-MAIN-2022-21
1,609
6
https://www.psych.ucsb.edu/people/researchers/welbourne
code
Lauren Welbourne is a postdoctoral researcher working with Professor Miguel Eckstein in the Vision & Image Understanding lab. She has a research background in color vision, color blindness, and low-level visual perception, and uses psychophysical and fMRI methods. Lauren received her B.Sc. in Psychology from Newcastle University, UK, and her M.Res. and Ph.D. in Psychology from the University of York, UK. Her current research focuses on how objects are represented in the cortex, and how scene context influences the perception of objects.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157216.50/warc/CC-MAIN-20180921151328-20180921171728-00027.warc.gz
CC-MAIN-2018-39
542
2
https://dandysciencewriters.com/question-20-you-have-been-asked-to-write-a-program-that-will-ask-the-user-for-his-or-her-pizza-order-and-display-it/
code
You have been asked to.write.a program that will ask the user for his or her pizza order and display it. The order will include the size of the pizza and the type of crust, cheese, and topping. Read the pseudocode for the program: Ask user what size pizza—small, medium, or large Ask user what type of crust Ask user what kind of cheese Ask user what topping Print a message that clearly displays the user’s pizza size, crust type, cheese type, and topping. Write both the input statement that prompts the user for the pizza size and the print statement that clearly displays the output message related to pizza size.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703537796.45/warc/CC-MAIN-20210123094754-20210123124754-00373.warc.gz
CC-MAIN-2021-04
621
7
http://www.sqaforums.com/forums/hp-alm-mercury-quality-center/144302-excel-report-not-running-ole-error-800403ea.html
code
Excel report not running - OLE error 800403EA version: HP ALM 11.00 (not sure about SP version) A simple query runs fine in Query Builder of "Excel Reports", where as while trying to generate the report using "Generate" option, I am getting an error message - "The SQL Query <Query1> has failed to run, with the following error: OLE error 800403EA ". At the same time, I am able to run earlier created with excel reports without any problem. If I copy and paste the query from the earlier created excel reports, same issue is noticed. I searched the existing posts, I could not get any solution. In one of the HP posts, somebody mentioned about localization version , could not understand anything from that. Re: Excel report not running - OLE error 800403EA I had the same problem today. Solded by exit from the report, refresh, and generate again. I hope it will be as simple as that for you.
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720062.52/warc/CC-MAIN-20161020183840-00002-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
894
9
https://www.broadwood.school.nz/athlectics-teacher-water-kids/
code
Athlectics Teacher Water Kids Carl had been born in a disadvantaged community, but he was mentored by his teachers to use education as a liberation tool. It was the fervour of one of Carl’s Biology teachers who instilled Carl’s interest in Biological Sciences. Carl studied to be a Secondary School Science Teacher and started to teach in 1991. Carl regards his career as a vocation, rather than a job, and is dedicated to educate students who seek understanding.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987836295.98/warc/CC-MAIN-20191023201520-20191023225020-00381.warc.gz
CC-MAIN-2019-43
467
2
https://boardgames.stackexchange.com/questions/30155/layers-lose-abilities-vs-creatures-have-ability
code
Yes, these both happen on layer 6: ability-adding and ability-removing effects. When one effect is adding one or more abilities, and a second effect is trying to remove them, then the one that "wins" is the one generated last in timestamp order. The Borderland Minotaur won't have deathtouch in that scenario: it gains it, then loses it. Rule 613.8 actually provides a direct example about this, using Flying rather than Deathtouch: 613.8. One continuous effect can override another. Sometimes the results of one effect determine whether another effect applies or what another effect does. Example: Two effects are affecting the same creature: one from an Aura that says “Enchanted creature gains flying” and one from an Aura that says “Enchanted creature loses flying.” Neither of these depends on the other, since nothing changes what they affect or what they’re doing to it. Applying them in timestamp order means the one that was generated last “wins.” The same process would be followed, and the same result reached, if either of the effects had a duration (such as “Target creature loses flying until end of turn”) or came from a non-Aura source (such as “All creatures lose flying”). The example uses auras, but the very last sentence in this example says you'd also do the exact same thing if the effects came from "a non-Aura source", such as your Archetype of Finality or Turn to Frog.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303709.2/warc/CC-MAIN-20220121192415-20220121222415-00091.warc.gz
CC-MAIN-2022-05
1,417
5
https://software-dev-group.org/2016/12/20/the-longflow-software-crafstmanship-manifesto/
code
This manifesto looks to be far more promising than previous manifestos in the software development industry. It’s called the Longflow Manifesto and it advocates a lot of ideas that will be found controversial by managers but would be supported by software engineers. Here are the overarching ideas it advocates for: - Focus on high quality software engineering - No estimates, they are usually far too inaccurate to be worthwhile - Little or no meetings, give people time to work Just in case anything happens, we’re going to re-post the Longflow Manifesto version 1 below. If you are a manager, read it and feel a shudder. Yes, the software developers and web developers and software engineers are getting smarter, they’re getting wise to the game, they know when they’re being treated like factory workers and soon they will know how to fight back against micro-management. There are over 460 stars, bookmarking it on Github. That’s 460+ more software developers who are aware that they are being micro-managed and treated like robots rather than as the creative, craftspeople and professionals that they are. They don’t have to be monitored every minute of the day like they’re children in daycare; they don’t have to be told exactly what tasks to do; they know how to figure this out and how to get work done. You can see this when developers are left alone to work on their own open source projects, they clearly know how to organize larger projects (see exhibit A: Linux). There is no micro-managing going on on open source projects and they usually have higher quality than the typical corporate software that is micro-managed (notice how many companies now rely almost exclusively on open source code). Developers, read this manifesto and (even if you disagree with some of the points), realize that the power is within you and within your colleagues to change the work environment from a toxic workplace to a healthy place where you are treated as professionals and where you are given the space to work at a higher quality. Here it is: The Longflow Manifesto The longflow model is an engineering-centric workflow for serious software developers, tired of the “Agile”/”Scrum” bullshit. In the software industry, like in every industry, a business owner does not sell time. A business owner sells a product. However, a software developer bills time worked. Somewhere, time must be transformed into improvements to the product. The action of applying this transformation to time is called work. However, the relation between time spent and work done is absolutely not linear. Premature optimization, for example, is a good candidate for a log-like relation, where more and more time is being invested for less and less benefits. On the other hand, good refactoring can use a moderate amount of time for exponential returns over a long period of time. This is the key principle of the longflow methodology: everything has to be done with long-term goals in mind. That does not mean no prototyping. That does not mean premature optimization. That does mean quality has a price: time. Estimates are to be avoided at all cost. They create needless pressure, competition, and participate in a toxic witch-hunt of who is the less productive. In the software development world, it is impossible to produce meaningful estimates, let alone precise ones, for anything but nano-tasks. It is often impossible to split a task into meaningful smaller ones, even more so before starting the original task. Just like it may be impossible to split a function into meaningful smaller ones, when such function is already coherent and provides a self-contained service. Have the workflow match the project, not the other way around. This draws a nice parallel with data-oriented design, where the data is the core and the logic has to match it. Frequent, time-based interactions between executives and engineers are one of the best way to crash a company. Having a meeting once in a week/month or other indicator based solely on time is meaningless. It conveys the idea that all the tasks are the same, that all progress must be at a steady pace. It’s also an excellent way to focus more on immediate results than on the long term goals. Interactions between executives and engineers must be limited in terms of number and frequency. It’s also best to be as unintrusive as possible : a mail may be better than a meeting in a lot of cases. Micro-management should be avoided at all costs, because it creates interferences between executives and engineers, and reduces creativity. Rushes, sprints, crunch-time, etc. are toxic and dangerous. Quality is infinitely superior to quantity. Software engineers aim to produce working, beautiful, readable code. By forcing deadlines upon them, they are encouraged to produce “the least dysfunctional” code instead of “the best possible” code. The longflow methodology advocates having medium to large sized meaningful tasks, self-assigned whenever possible, where developers can leverage both technical and problem-solving skills. Have developers write no code at first, but simply think about how they can solve the problem. Or, better yet, asking themselves questions like: - Is there a problem to solve? - Can I improve this part of the code? - Are there tasks I wish I had done differently? Curiosity and creativity are very important skills for software developers, but these skills can’t develop if there is pressure to release code as fast as possible. It is very detrimental to have long, let alone permanent, deadlines. Developers should be allowed, and even encouraged, to spend some time learning and toying with new things and concepts. Being able to apply a large variety of solutions and concepts on a problem is crucial for a good software developer. Denying their right to learn will hinder the ability of developers to improve and produce quality code. - Keep thinking about long term goals. - Let engineers self-assign tasks. - Value quality over deadlines. - Let the engineers do engineering. - Don’t micro-manage. - Don’t interfere with engineers more than strictly required. - Never rush, always think and plan ahead. - Don’t fear failure. - Avoid cargo-cults like the plague. - Keep thinking about long term goals. - Pick up your own tasks. - Try to fix bugs before introducing new features, to an extent. - Try to clean the codebase before introducing new features, to an extent. - Try to write the best possible code. - Don’t fear trying something different. - Think more, write less. - Always try to learn things, be curious. - Don’t fear running late. - Don’t fear to fail. - Avoid cargo-cults like the plague. A typical implementation of the longflow manifesto, from the point of view of an engineer, is something like this: - I pick or create a task. - I spent a few minutes/hours/days thinking about the task. Do we need it? Have I done something similar before? What does the task achieve? - If the task turns out to be unneeded, go back to 1. - If I need to learn something to do the task, I go learn it. - If I want to learn something new, I go learn it too. - I think about the task again. I may go back to 4 or 1 if the things I learned changed my mind about the task. - I work on the task. I may go back to 2 at any point. - I finish the task. - I think about the task again. I may want to go back to 2. - The task is now considered done, but I (or someone else) can decide to work on it at any time, going back to 2. It may seem messy at first, but a workflow like this is both extremely flexible and extremely good in terms of quality of the code produced, because everyone can improve any part of the codebase whenever they want. This manifesto was written by Nax. Feel free to modify it. Also published on Medium.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823009.19/warc/CC-MAIN-20181209185547-20181209211547-00417.warc.gz
CC-MAIN-2018-51
7,829
69