url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://sourceforge.net/p/dozer/bugs/126/
code
Like stated in my forum post: the parent-child relation still not work properly. That is: suppose I have class child, parent and grandparent. The grandparent contains a field id with accessors. This field id will not be mapped in a child mapping. Even not when it's contained in the xml mapping file However, it will be properly mapped when the id mapping definition is contained in the parent mapping definition. I had the same for other fields. So the problem is that only xml field mapping definitions from the direct parent are inherited and not from the grand parent... (only one level deep). Hope this is enough information. This bug was produced aleardy in 4.1 and not solved in 4.2 Log in to post a comment.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170925.44/warc/CC-MAIN-20170219104610-00032-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
715
11
http://www.raptorsforum.com/f/709736-post103.html
code
Wow, I didn't realize how badly Ilyasova has regressed from last season. The dude was just balling towards the end. He had a monster game against us too if I remember correctly. Sucks to see a guy get a decent contract and then go to the crapper. Amazing Milwaukee has a winning record with Ellis and Jennings being such inefficient scorers. Last edited by FLO; 11-26-2012 at 10:50 AM.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189667.42/warc/CC-MAIN-20170322212949-00185-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
385
3
https://confluence.cornell.edu/display/SIMULATION/ANSYS+Compressible+Flow+over+a+Wing-Body+Junction+-+Mesh
code
Once you have exited the modeling window, initiate the meshing process by clicking on Mesh in the workflow. If desired, In the Choose display mode menu near the top of the model window, select Translucent display to view what is going on inside the enclosed volume. Set Mesh Size & Controls Drag the Mesh resolution slider to the second highest setting. Uncheck the Use predefined settings button and input 10 [degree] for the Curvature normal angle under Global Sizing. AIM will prompt you to fix the boundary layer before generating the mesh. Click on Boundary Layer under Mesh Controls. Select all of the faces of the airplane body. Return to the Mesh panel, then click Generate Mesh under Output or at the top of the screen by the status window for Mesh. AIM will detect that you are ready to generate the mesh and highlight the buttons in blue.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817729.87/warc/CC-MAIN-20240421071342-20240421101342-00306.warc.gz
CC-MAIN-2024-18
849
5
https://diydrones.com/forum/topics/hexacopter-with-apm-based-on-flyduspider-frame
code
I'd like to present my Hexa-project based on the Flyduspider-frame from Flyduino. After playing around with my first quad this summer I decided to add at least a little safety by switching to an hexa. I found the Flyduspider frame which seems like a quite stable and small platform to get started with the first steps in aerial photography. I used 6 motors of the A2208/17 1100 KV class (36g), used turnigy 10 A-escs and used 8x4,5 props. I got a GoPro-mount out of CFK which help me to reduce weight. I removed the battery out of the GoPro and supplied it with power out of my ImmersionRC-5.8-Ghz transmitter. As battery I use a Turnigy 4A 3s which gives me around 10 minutes of flight time with 20% remaining battery power. As my scale is currently defect I would assume that the whole setup without the battery is below 900g, including GoPro, FPV equipment and LED stripes. The motors should produce around 3kg of thrust at max which left enough room for small payload. As you see the setup is still transportable within a case < 50 cm. As the winter in Germany is currently more an autumn with strong winds I am now waiting for flyable weather to get started with the advanced PID-tuning ;)
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499953.47/warc/CC-MAIN-20230201211725-20230202001725-00001.warc.gz
CC-MAIN-2023-06
1,194
6
https://qtiplot.com/doc/manual-en/x9549.html
code
This dialog is activated by selecting the Paired Sample Wilcoxon Signed Rank Test... command from the Statistics -> Nonparametric Tests -> menu. It can be used in order to determine whether two dependent samples were selected from populations having the same distribution. The test procedure is explained in a Wikipedia article. If the reduced sample size, Nr, after excluding the ties, is more than 200, QtiPlot uses the normal distribution approximation in order to calculate a p-value and to take the decision of rejecting or not the null hypothesis. Bellow this threshold QtiPlot also uses an exact method to compute the p-values using the algorithm explained by Stenver Jerkku in his Bachelor's thesis, Parallel Wilcoxon signed-rank tests, 2014, University of Tartu, Institute of Computer Science, chapter 2.7.2, page 18. The null hypothesis is rejected if the probability is lower than the value of the significance level. QtiPlot also computes the test statistic, W, and a Z-score, using the formula: Z = [W-0.5sign(W)]/Var1/2, where 0.5 is a continuity correction factor and the variance is Var = Nr(Nr + 1)(2*Nr + 1)/6. If there are missing values in any of the paired source data columns, the whole pair will be excluded from the analysis.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511053.67/warc/CC-MAIN-20231003024646-20231003054646-00055.warc.gz
CC-MAIN-2023-40
1,249
5
https://forums.hak5.org/tags/dns/
code
Search the Community Showing results for tags 'dns'. I'm trying to test a few things with a self hosted C2 and a Tetra on the same LAN. since it want setup to work both internal and external via a host name, I setup an a record on my internal DNS so that the external DNS name will resolve to the internal IP while on the same LAN. This issue is getting the Tetra to look to my DNS server automatically. I'm currently using eth0 (wired) for my network connection. What I would like is for the Tetra to get its DNS information from the same DHCP server that is handing out it IP address. I have tried removing the "Option DNS 8.8 I'm relatively new to owning a wifi pineapple nano and I need help, I can get people connected to the pineapples fake ap but now I want to rickroll them. I think I need to be using the DNS spoofing module but I'm not sure how. Please help :) Hello everyone, Today I have been playing with the SpoofDNS feature of the Packet Squirrel (payload 2). I noticed the following: > Redirection of spoofed URL works fine > Internet works fine > Internal resources by DNS name are not accessible (but can be pinged) This almost never causes problems on a private PC but might cause problems on a company network. The user is able to access the internet but can no longer access internal websites. For example, we host a ticket system on the network (tickets.company.nl) which, for example, was no longer accessible. All other internet DNS qu
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400222515.48/warc/CC-MAIN-20200925053037-20200925083037-00210.warc.gz
CC-MAIN-2020-40
1,459
5
https://www.mythtv.org/wiki/Dreambox500
code
Channel Changing on a Dreambox/Dream Machine. There are many models and many firmwares, so you may have to adjust accordingly (as you'll see in the channel change script below). This author is using Gemini V470 firmware. I had trouble making the Dreambox work with LIRC, then I read about using the web interface of the dreambox. I had to make a few changes, but has worked well so I wanted to share. Here is what I ended up with for changing channels on my DM500S: # Myth-TV channel changing script for Dreambox 500 (Gemini). # wget fetches a url to simulate a key press. # for some unknown reason, if you want a 1, # the url will need to send a 2, and so on. # That is why the "bc" program is used to # add 1 to the digit (sent from MythTV program). # Set IP, name and password. case $cmd in for digit in $(echo $1 | sed -e 's/./& /g'); do # If we want to send a 0, the "code" is 11, so set it to 10. if [ "$digit" = "0" ]; then digit="10" wget --timeout=3 --tries=1 -q -O /dev/null --user=$USER --password=$PASS http://$DREAMBOX/cgi-bin/rc?$CODE
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107894426.63/warc/CC-MAIN-20201027170516-20201027200516-00286.warc.gz
CC-MAIN-2020-45
1,048
15
https://community.ipfire.org/t/qemu-virt-clone-missed/4701
code
This is quite an interesting issue. If you have confirmed that it works as intended via the web interface then I can only think of these possibilities: - The virt-clone command is stored somewhere that is not indicated on your $PATH variable. - The virt-clone command was saved under a different name. - The VMM uses an entirely different method to clone a VM. Welp, I myself haven’t bothered trying to use ipfire for virtualization so I guess only the veterans/devs can properly answer this question. D: EDIT: I thought of a possible solution. Try this: find / | grep clon This will definitely find that virt-clone hiding somewhere or anything that has “clon” in it. Used “clon” instead of “clone” so that it will also match with “cloning”.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039560245.87/warc/CC-MAIN-20210422013104-20210422043104-00319.warc.gz
CC-MAIN-2021-17
759
8
https://www.gamedev.net/blogs/entry/1968493-decent-progress/
code
Ok, I reimplemented logging and it came out decent (besides the color-scheme; I'll probably change that somewhere along the line), though it's not quite as complex as the one from the article (I don't feel like implementing filters right now.) You can check out the results here. On a side note, it took a little while to get the hang of XSLT, but I have to say, I absolutely love it. It's actually feels quite "natural" in my opinion and is very well designed. The sound system is in as well, but I'm not very happy with it either lol. irrKlang is the oddest sound API I've seen (not saying it's bad or anything, it's just different from everything else I've checked out.) It's more powerful, has better features, and is up to date (audiere hasn't been updated since 2006.) With my lack of audio programming it'll probably need to be tweaked and modified as I go anyway. I have the basic design down though and I really shouldn't have to change it much no matter what underlying API I used. The time system is back in now (not much of an issue seeing as how it doesn't have much power to begin with, so I didn't have to change much.) I'm putting off shader support for now for the simple reason that I don't think it's needed for what I have planned. At least, not with the 2D stuff (so, I can always put it in once I start adding 3D stuff.) Same goes for the particle engine. Both will be easy to implement at a later date and won't be too much of a hassle to integrate with the 2D stuff if I need/want it. Anyway, things are going good. I still can't really make anything (Beelz.Graphics doesn't have any actual drawing capabilities yet; the core does, but I haven't interfaced Beelz.Graphics with them just yet), but I did throw together a little something to make a screenshot and to test out the game system I implemented earlier. You can see the results below (I achieved this by including the core directly into the test bed just for this specific test): MyGame! - Beelz Test Bed Next up is interfacing the graphics system, implementing the scripting system, command console, and then the GUI. Hm...I seem to have forgotten to mention that the animation system is in place as well. I need to upgrade it so that instead of just having a collection of frames, you have a collection of sequences with contain a collection of frames. This way, for an example, you can have a single animation for each character and then have different sequences for walking, attacking, etc. Time for bed. Just wanted to point out that the app in the image is static; I'm just loading textures and drawing them to the screen at the same place every frame.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514879.30/warc/CC-MAIN-20181022071304-20181022092804-00198.warc.gz
CC-MAIN-2018-43
2,641
11
https://ecommons.cornell.edu/handle/1813/5823
code
Reference Linking the Web's Scholarly Papers Bergmark, Donna; Lagoze, Carl Along with the explosive growth of the Web has come a great increase in on-line scholarly literature. Thus the Web is becoming an efficient source of up-to-date information for the scientific researcher, and more and more researchers are turning to their computers to keep current on results in their field. Not only is Web retrieval usually faster than a walk to the library, but the information obtained from the Web is potentially more current than what appears in printed publications. The increasing proportion of on-line scholarly literature makes it possible to implement functionality desirable to all researchers -- the ability to access cited documents immediately from the citing paper. Implementing this direct access is called "`reference linking". While many authors insert explicit links into their papers to support reference linking, it is by no means a universal practice. The approach taken by the Digital Library Research Group at Cornell employs "value-added surrogates" to enhance the reference-linking behavior of Web documents. Given the URL of an on-line paper, a surrogate object is constructed for that paper. The surrogate fetches the content of the document and parsesit to automatically extract reference linking data. Applications can then use the surrogate to access this reference linking data, encoded in XML, via a well-defined Java API. We use this API to reference link the D-Lib magazine, an on-line journal of technical papers relating to digital library research. Currently we are (automatically) extractingreference linking information from the papers in this journal with 80% accuracy. computer science; technical report Previously Published As
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141729522.82/warc/CC-MAIN-20201203155433-20201203185433-00680.warc.gz
CC-MAIN-2020-50
1,761
5
http://design-statement.com/?D=47566&P=1
code
We propose a novel concept of shape changing interface using the form “Line.” This project explores the interaction design space and applications for the actuated curve interfaces through preliminary prototype based on snake robotics technology. Through our design exploration, we envision a future where transforming string being woven into our everyday life. Good design deserves great recognition. Everyday, we are pleased to feature amazing designers who create original and innovative designs, amazing architecture, stylish fashion and creative graphics. Today, we are presenting you one of the World’s greatest designers. Checkout an award-winning design portfolio today and get your daily design inspiration.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334802.16/warc/CC-MAIN-20220926051040-20220926081040-00483.warc.gz
CC-MAIN-2022-40
721
2
https://partner-directory.liveramp.com/partners/microsoft?taxon_id=103
code
Microsoft Advertising connects you with more than a billion people at the right moments across work and life. The Microsoft Search Network is a part of your customers' lives, powering the devices, apps and sites consumers use every day and meeting them in the moments that matter most. Microsoft and LiveRamp have a strong and long-standing partnerships with the following product areas: Audience Activation into Bing Advertising - LiveRamp hosts a platform for Brands to anonymize their offline CRM data for digital activation in a privacy-safe way to hundreds of digital ecosystem partners for digital activation. Bing Advertising is one of those destinations where the hundreds of brands on our platform can distribute their most valuable asset (1p CRM) to inform their targeting strategy on Bing inventory. Measurement with Bing Store Sales - The driving factor behind this program is helping to provide insights to advertisers into how their ad spending on Bing Search is impacting conversion rates in stores. With the ability to tie transaction data to digital campaigns, advertisers can work with Bing directly to close the loop in measuring ROAS. Dynamics 365 & LiveRamp - Activation - Microsoft and LiveRamp’s Dynamics 365 integration enables advertisers to export CRM data from Customer Insights to LiveRamp for targeting to help make unified audiences more actionable by leveraging LiveRamp’s deterministic identity graph to deliver personalized experiences across 500+ platforms, including display, social, and TV. - Drives Azure usage and enhances capabilities for advertisers within Dynamics365 Customer Insights - Dynamics365 has the opportunity to leverage LiveRamp’s data marketplace to layer on 3PD segmentation as part of a lookalike modeling strategy and expand into measurement and analytics, bringing insights back into Customer Insights through LiveRamp. Dynamics 365 Customer Insights - Identity Resolution - AbiliTec, LiveRamp’s best-in-class identity resolution solution, is now available directly in Microsoft Dynamics 365 Customer Insights. Now, Microsoft Dynamics 365 Customer Insights users can build a stronger data foundation with our deterministic, people-based identity graph where their data already lives—and seamlessly integrate within their existing CDP infrastructure. - With LiveRamp AbiliTec accessible through Microsoft Dynamics 365 Customer Insights, mutual customers can streamline the consumer journey and ensure more consistent, personalized experiences across relevant channels with an accurate, unified view of customers—all powered by LiveRamp's privacy-centric resolution technology. - Power 360-degree customer view with LiveRamp's identity resolution. Microsoft and LiveRamp’s ATS - A privacy-first solution embedded across Microsoft’s ecosystem that allows marketers to personalize consumer journeys and measure impact without relying on 3rd party cookies. Through our addressability partnership Microsoft can now provide alternative to cookies and support Microsoft’s ad inventory, integrate seamlessly with our sidecar technology and mutual SSP/DSP partners, measure on that inventory to connect marketing outcomes and demand sources with Microsoft’s inventory.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474595.59/warc/CC-MAIN-20240225103506-20240225133506-00792.warc.gz
CC-MAIN-2024-10
3,236
15
https://m.7bob.net/game/Train-Snake-Taxi
code
Train Snake Taxi Train Snake Taxi is a game on 9bob.net. Collect all the people to complete a level. The more passengers you have, the longer the train gets! Be aware of your tail, avoid the crash! Enjoy With This Game
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00452.warc.gz
CC-MAIN-2023-50
218
3
http://www.slsknet.org/news/node/227
code
You can already order by the uploader's speed using the 'Order by Fastest' button. Might I ask what you would use filename/file size sorting for? Most of the times when I search, I want to sort on size of the file. The size says something about the quality of the file on the specific music scenes I search on. I agree with melem. Generally a developer doesn't know all the specifics that an end user will want out of an application, so adding flexibility adds usability. A customisable column pane system in download / upload / search screens that can be sorted by any column that's selected would be a real bonus and make slskQT more user-friendly. Yeah i always like sorting by DL Speed, then In Que and then Attributes. This gave me the 320kbps files at the top and the fastest users with the least in their que. Then if need be i would search by size (becuase the attributes are often not correct) so if the size was 16mb and it said it was 128kb and went for 13 minutes it was prob 320kb and went for half that time. I think that the most flexibilty is the best and as such i much prefer being able to click on the column headers. I also dont like the grouping by user. Have you looked at search filters yet? They should allow for the kind of elimination you're performing much more easily than through sorting. There are filter attributes for bitrate and file size. And there are options for sorting by download speed and queue length which are grouped by user anyway. Agreed, but the sorting-by-click variant has one clear advantage: NO TYPING involved :) You'd just click once on the heading bar wherever you want and you get the sorting right as you want to. (BTW, I usually need the sorting by file size, because I'm interested in audiobooks _not_ ebooks). See, we users just like it simple :) I love your search filter, but it should be a convenience gimmick instead of an emergency option because you cannot sort like in 100,000 other applications. I agree with this - I just tried clicking on the column header to sort, and my first thought was that sorting wasn't implemented yet - the column headers look like standard listbox headers you click on to sort on/change sort direction. I only noticed the buttons at the top a while later - they're visually nowhere near the main area and separated by a lot of empty space. I'm still not seeing how to sort. I like to have the option to just click on the column headings, so that the biggest files are on top. That makes it very easy to see if there is a video available or a lossless format available for download. Yep, I agree as well I'm afraid. It's so much easier to search for the file/album I am looking for using SoulSeek NS. The abbility to search, then click the 'Attributes' tab to instantly sort by file size, is for me, a 'must have'. I also find that being able to click a header to sort by user, helps when files within an album are of a variable bitrate. Also, not being able to see where you are in the queue, is confusing. Would it be possible to integrate these features from the original SoulSeekNS into Soulseek QT? Have you tried filters yet? They let you easily look for minimum bitrates, bitrate types (CBR or VBR) and minimum file sizes. You can also save your favorite filters to avoid having to type them over and over again. would be nice also having the possibility to choose amongst different types of files. i prefere, when possible, downloading only flac and or wav files. so it would be good being able to filter searches [yes flac, yes wav, no mp3, no mp4 etc etc]... yeah this is a big flaw with qt that was better in ns. hope it gets fixed soon! yeah, i want to see file length for audio files. it may seem trivial but it sometimes matters. The filters are powerful enough, but being able to sort/view the results with a focus on *files* would be nice, because: The current focus on users in the listing wastes a lot of screen space. I can only have actual files on every 3rd row at best, in a hard to read form. If I don't Expand Users, the view becomes even more useless. (I can't think of a scenario where I'd want to see a list of nothing but usernames.) Your basic clickable column sorting would alleviate this greatly. My reasoning is that when you're doing quick searches, you glance over the files, maybe change your mind about something etc. The current system feels like you're working with database queries. Each to their own, but having only a box for filtering the results by typing isn't user friendly :) I suppose it's your classic programmer vs UI designer shenanigans. (And yes, I'm a aware that you can save filters.) If I may explain why custom column sorting is so desperately useful - I will give the example that many users are looking specifically for DJ sets. For example - I want to find all the 2-3 hour DJ sets of Tiesto or Deep Dish. So I will search for "Deep Dish" - and I want to find the rare and hard to find DJ Sets (which will be 1-3 hours, and not 5 minute songs). So I usually sort by size to find the file sizes that are 100-300MB which are almost always DJ Sets (unless it is a track encoded in FLAC). Without the column sort feature - I would be lost looking among all the singular songs. I understand you have already invested time in the Sort by User feature - but in my opinion this is not very useful and going back to the old way of displaying results is best. Old way of displaying results is the most flexible and allows most flexibility to the users for their desired way of finding files. I don't think the wheel should be reinvented here. (P.S. I have tried the filters, and they are hard to use and it is difficult to set a specific filter cut off point for filesize rather than just seeing them from biggest files to smallest files.) Thanks again. Ok, I'll look into adding the option to view search results the old way. It's definitely a lot of work though, basically reconstructing the view from scratch, so I can't say when I'll be able to get it done. You're the best. FYI:http://doc.qt.digia.com/latest/qsortfilterproxymodel.htmlhttp://stackoverflow.com/questions/5731050/sort-qstandarditemmodel-in-c-qthttp://stackoverflow.com/questions/10893843/qsortfilterproxymodel-sort-m...http://stackoverflow.com/questions/6785481/how-to-set-filter-option-in-q...http://www.informit.com/articles/article.aspx?p=1750226&seqNum=3 QUOTE: Thanks to QSortFilterProxyModel, you can add sorting/filtering capability to an existing model with fewer than five lines of code. Figure 13.11 shows how the proxy sits between the view and the model. Thanks, yeah, changing the sorting method isn't hard, but there are a lot of little things under the hood like ties between each UI element and the underlying data system, certain UI functions, that need to be adapted for this alternate way of presenting search results. I actually already have it displaying search results the old way as an option, but still need to adapt some of the remaining UI code. I should have something to show within the next two or three days. Here we go: SoulseekQt-11-6-2012.exe. Once you check 'use old-style search results' under Options->General new searches should display the old way. Column sorting and filters appear to work, but let me know if you run into any problems with either new-style or old-style search results display so I can fix them before making another release.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121865.67/warc/CC-MAIN-20170423031201-00257-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
7,394
29
http://superuser.com/questions/tagged/adobe-creative-suite+adobe-photoshop
code
I've had a look around on the official Adobe Shop website, but I couldn't find a clear answer for this.. I am a freelance developer and I have recently purchased Adobe Photoshop CS6 through the ... Is Photoshop beta cs6 full featured, or is just a preview of SOME of the new functions? I want to make sure before I remove my cs5 version. There are two contradictions that are making me unsure (as ... Does the Adobe CS suite of products come with a version control system that integrates natively with products such as Illustrator / Photoshop allowing action and/or layer level specific version ...
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500836106.97/warc/CC-MAIN-20140820021356-00401-ip-10-180-136-8.ec2.internal.warc.gz
CC-MAIN-2014-35
598
3
https://leechbookiii.github.io/119r.html
code
blede to swiþe æfter þam beorþre: nioþowearde cletan wyl on meolce. Sele etan and supan þæt wos. bleed too much after the birth: boil the lower part of greater burdock in milk. Give [the root] to eat and the juice to sup. xxxviii. Wiþ þon þe wifum sie forstanden hira monaþ gecynd: wyl on ealað hleomoc and twa curmeallan. Sele drincan and beþe wif on hatum baþe and drince þone drenc on þam baþe. Hafa þe ær geworht clam of beor dræstan and of grenre mucgwyrte and merce and of berene melwe. Meng ealle tosomne. Gehrer on pannan. Clæm on þæt gecynde lim and on þone cwið nioþoweardne þonne hio of þam baðe gæþ, and drince scenc fulne þæs ilcan scences wearmes, and bewreoh þæt wif wel, and læt beon swa beclæmed lange tide þæs dæges. Do swa tuwa swa þriwa, swæþer þu scyle. Þu scealt simle þam wife bæþ wyrcean and drenc sellan on þa ilcan tid þe hire sio gecynd æt wære. Ahsa þæs æt þam wife. n case a woman's monthly cycle is hindered:40 and two knapweeds in ale. Give to drink and bathe the woman in a hot bath and let her drink that drink in the bath. Have already prepared a poultice of beer dregs and of green mugwort and wild celery and of barley meal. Mix all together. Stir in a dish. Smear on that "naturely part" and on the lower womb when she goes from the bath, and let her drink a cupful of the same warm draught, and clothe that woman well, and let [her] remain smeared for a good portion of the day. Do either two or three times, whichever you must. You shall always make a bath for that woman and give the drink at the same time that her cycle next comes to her. Ask the woman [about this]. Gif wife to swiþe offlowe sio monað gecynd: genim niwe horses tord. Lege on hate gleda. Læt reocan swiþe betweoh þa þeoh, up under þæt hrægl, þæt se mon swæte swiþe. If the monthly cycle flows too quickly from a woman: take a fresh dung of a horse. Lay [it] on a hot coal. Let [it] smoke a lot between the thighs, up under her clothes, so that the person sweats a lot. xxxviiii. Wið smeawyrme, smiring: nim swines geallan xxxviiii. For a penetrating worm, a spread: take the gall of a swine
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100499.43/warc/CC-MAIN-20231203094028-20231203124028-00731.warc.gz
CC-MAIN-2023-50
2,169
14
http://www.comparex-group.com/web/microsites/microsoft/licensing/licensing_research-education/licensing-options-for-research-and-education.htm
code
25% discount on introductory price - Promotion to be offered in first 9 months’ sales MTA/MCE Certification Site License Promotion Open (Academic), Select (Academic), MPSA, CASA-EES Depth-Academic, CASA-School-Academic 1/1/2017 - 8/31/2017 The Microsoft Technology Associate (MTA) is an introductory Microsoft certification for people considering a career in the technology industry. The Microsoft Certified Educator (MCE) certification validates that educators have the global educator technology literacy competencies needed to provide a rich, custom learning experience for students. Save this offer
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607806.46/warc/CC-MAIN-20170524074252-20170524094252-00310.warc.gz
CC-MAIN-2017-22
604
6
https://horticulargame.com/2022/09/16/we-are-live/
code
I just published the announcement over at the inDirection Games news feed, and I am so excited to finally have announced the project! Now I can move on with more fun things, like developing the game and sharing development updates! The next few things in the pipe for me is to replace the placeholder story, create a thematic introduction, and build a new editor that works on Linux. I don’t have much more to add here right now, but in the coming months you can expect devlogs on what is happening; the plan being to write them at least monthly. But until the first post is out, you can do the following: - Wishlist the game on Steam. - Subscribe to the Newsletter for behind-the-scenes content. - Check out the Twitter account for more frequent posts. - Drop in and say hi to me in Discord. Have a good once, and I see you soon!
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475825.14/warc/CC-MAIN-20240302120344-20240302150344-00785.warc.gz
CC-MAIN-2024-10
832
8
http://www.idiotlaws.com/its-illegal-to-shower-while-you-are-naked/
code
Disclaimer: The laws listed here are for entertainment purposes only. We have tried to cite specific references when available but, we make no guarantees on the validity of these laws and as such: the laws and regulations including the interpretation and commentary we have provided are for entertainment only. It also dates back to when people bathed in a tub, outside. No one wants to hear their neighbor singing in a tub for their yearly bath lol Would you all calm down? The person/people behind this site don’t bother quoting the laws they’re yammering about a good portion of the time. And most of the time when they do, they misinterpret them, anyway. It’s best not to take them seriously most of the time. its for the beach shower
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656833.99/warc/CC-MAIN-20230609201549-20230609231549-00360.warc.gz
CC-MAIN-2023-23
744
4
https://www.argos-sim.info/forum/viewtopic.php?f=3&t=374&sid=08e7e950d7d79d8acbd53b0a0e1dd60a
code
I want to detect blobs which are in front of the robot, i.e., as if from a camera that is installed looking directly ahead. However the sensor [ colored_blob_perspective_camera (default) ] A generic perspective camera sensor to detect colored blobs. Does not seem to function with the e-pucks, only with spiro? [FATAL] Failed to initialize the space. [FATAL] Error while trying to distribute entities [FATAL] Failed to initialize entity "bc0". [FATAL] Failed to initialize controllable entity "controller_0". [FATAL] Can't set controller for controllable entity "controller_0" [FATAL] While getting a component from a composable entity [FATAL] Component "perspective_camera" does not exist in "bc0" Is there a work around this or another clever way to detect blobs located in a cone in front of the robot?
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500664.85/warc/CC-MAIN-20230207233330-20230208023330-00031.warc.gz
CC-MAIN-2023-06
805
13
https://community.brave.com/t/silent-install-for-all-users/283447
code
I want to deploy the brave browser to alot of clients and stumbled over the “BraveBrowserStandaloneSilentSetup.exe”. This works great but it only installs it in the user context. Is it possible to install it systemwide / for all users? I couldnt find an install argument for this case. Thanks in advance,
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104244535.68/warc/CC-MAIN-20220703134535-20220703164535-00031.warc.gz
CC-MAIN-2022-27
308
3
https://lokkij.itch.io/bonsai-tower
code
Made in 72 hours for Ludum Dare. Climb the Bonsai Tower to collect all the bonsai! This is no simple task; you will have to 'shapeshift' the tower to reach all the bonsai. Rotate parts of the tower to reach new areas! It is strongly recommended you do not jump down where there is no ladder to get back up the where you were. We cannot guarantee that you cannot get stuck if you do. If you do it anyway and do get stuck, you can press R to restart.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348502204.93/warc/CC-MAIN-20200605174158-20200605204158-00443.warc.gz
CC-MAIN-2020-24
448
3
https://www.mjt.me.uk/posts/picoscope-csv-size-limits/
code
If you've got here from Google, it's probably because you've exported a CSV or TXT file from picoscope and it's come out with 1048579 lines - maybe 3 of which are headers and 1048576 are data. You can find several posts on their forum about the same thing. Seems like Excel worksheets are limited to 1,048,576 rows by 16,384 columns, and Picoscope silently truncates CSVs to that length. I'm not sure why they decided to truncate silently, rather than giving the user the option to decimate the data or choose a window to export, or putting a note on the last line of the data saying that it had been truncated and why. Picoscope support recommends exporting in Matlab format instead. But what if you really want a big CSV, and you don't have Matlab because it costs £1,600 a seat which is a lot of money for a single CSV? Python to the rescue! Converting picoscope output from .mat to .csv Here's the Python script I used to do the conversion. My install of Ubuntu 16.04 already had Python 2.7.12 installed, but I had to run sudo apt-get install python-scipy Note that you'll have to change the savetxt lines with the filenames you want, and change the concatenate line if you weren't using five channels. Simply change the mat['A'], mat['B']...mat['E'] section to list the channels you want in your CSV.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057496.18/warc/CC-MAIN-20210924020020-20210924050020-00157.warc.gz
CC-MAIN-2021-39
1,306
10
http://www.codeproject.com/script/common/TellFriend.aspx?obtid=2&obid=198213
code
This email was created by [your name] who thought you would be interested in the following Article: "Compare Two XML By Using OPENXML Query in ASP.NET" Compare two XML by using OPENXML Query in Microsoft SQL Server CodeProject also contains hundreds of articles, free source code samples and applications to help in your day to day programming. Why not give it a try!
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982290497.47/warc/CC-MAIN-20160823195810-00178-ip-10-153-172-175.ec2.internal.warc.gz
CC-MAIN-2016-36
367
4
http://www.smashcompany.com/technology/at-a-certain-scale-you-have-to-give-up-on-the-single-normalized-canonical-database
code
March 12th, 2015 (written by lawrence krubner, however indented passages are often quotes). You can contact lawrence at: email@example.com I am surprised this article by Yorick Peterse, attacking MongoDB, got so much attention. The company used to use MySQL and MongoDB, but now they just use PostGres for everything. PostGres is a great technology, and I would always prefer to MySQL. I question the intelligence of a company that uses MySQL, when PostGres is such a good choice. But if a writer tries to compare PostGres and MongoDB, then I have to question their intelligence, since the 2 technologies are so radially different it doesn’t make much sense to compare them. And also, if you conclude that in the future companies can give up on denormalized databases, and just use a normalized database for everything, then one is very much swimming against the tide of history. Apparently Yorick Peterse’s company does not yet face the kind of traffic where they need a dedicated denormalized database. And I would guess that 99% of all companies in the world are small enough that they can get by with a single, normalized, canonical database. But there does come a certain scale where that won’t be possible, and then you need to look for ways of storing denormalized data and serving it fast. Among your choices nowadays: etc, I can not possibly list them all — there has been an explosion in the number of databases. And the reason there has been an explosion in the number of databases is because a lot of companies are reaching “web scale” and can no long get by with a single, normalized, canonical database. And there is a good argument for moving to this architecture before you actually need it. Moving away from it only makes sense if you’ve concluded that you are growing slowly and won’t need such an architecture for some years. Yorick Peterse’s argument: This brings me to the requirements of a good database, more specifically the requirements Olery has. When it comes to a system, especially a database, we value the following: Visibility of data and the behaviour of the system. Correctness and explicitness. I sure hope these are the arguments against MySQL, rather than MongoDB. If any of those concerns were on their mind when they choose MongoDB, then they are completely incompetent. With the above values in mind we set out to find a replacement for MongoDB. The values noted above are often a core set of features of traditional RDBMS’ and so we set our eyes on two candidates: MySQL and PostgreSQL. Wow!!! Really? Seriously? You are giving up on MongoDB because it doesn’t give you Consistency? Did you ever, for one second, think that MongoDB was designed to give you Consistency? Did you randomly pick MongoDB from a list of words, or did you actually read its feature set before you chose it? And then you felt the choice came down to MySQL and PostgreSQL? That’s like having to choose between eating dirt versus eating ice cream. And then there is this: In the end we decided to settle with PostgreSQL for providing a balance between the various subjects we care about. The process of migrating an entire platform from MongoDB to a vastly different database is no easy task. To ease the transition process we broke this process up in roughly 3 steps: Set up a PostgreSQL database and migrate a small subset of the data. Update all applications that rely on MongoDB to use PostgreSQL instead, along with whatever refactoring is required to support this. Migrate production data to the new database and deploy the new platform. Clearly these people stumbled into using MongoDB without knowing how to use it.Source
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512400.59/warc/CC-MAIN-20181019124748-20181019150248-00362.warc.gz
CC-MAIN-2018-43
3,667
19
https://lists.samba.org/archive/samba/2019-July/224263.html
code
[Samba] CTDB Samba 4.10 example? sascha.brutscher at medicomp.de Tue Jul 9 12:35:23 UTC 2019 I use Samba 4.9 since its releaseday and also had some troubles first due to the lack of informations in the wiki. Anyways... after some try & error i got it working and since i run the Cluster (non-production environment) had no errors except CTDBs monitoring of the Samba process did'nt work as i would expect it (RPC-Server was dead but CTDB did'nt complain and "ctdb scriptstatus" shown "50.Samba - OK") so there could be a little misconfiguration in my following advices couse i did'nt look further into it yet. Anyways... heres what i did: ## IN /etc/ctdb/script.options ## (this was the most tricky thing for me since i use the sernet build) | CTDB_SAMBA_SKIP_SHARE_CHECK=yes # For me this is needed couse of the use of the vfs_glusterfs module. You may not need it. ## IN /etc/ctdb/commands.sh | ctdb event script enable legacy 50.samba | ctdb event script enable legacy 49.winbind ## IN /etc/ctdb/ctdb.conf | recovery lock = /pathTo/your/.ctdb/lockfile ## IN /etc/ctdb/nodes you only have to add your heartbeat IPs ## IN /etc/ctdb/public_addresses | 192.168.1.111/30 ens160 | 192.168.1.112/30 ens160 I hope this will help you getting your cluster to work. | from SAMBA 4.9/4.10 there was a big change regarding CTDB. Does anyone | have an example configuration, how to configure a CTDB cluster from | version 4.10? | Is there someone who run CTDB with SAMBA 4.10? | Best regards More information about the samba
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038887646.69/warc/CC-MAIN-20210419142428-20210419172428-00268.warc.gz
CC-MAIN-2021-17
1,513
27
http://www.head-fi.org/t/707136/seattle-spring-meet-bottleheadquarters-april-26-2014/165
code
I don't give rat's a** about Justin Bieber but my wife does. I think I will wait for dbpoweramp mac release If you can use a PC or Windows emulator on a mac I'd recommend Exact Audio Copy: http://www.exactaudiocopy.de/en/index.php/resources/download/ I whole point for me to buy a Mac was to get away from Windows. Wow, the Exact Audio Copy has won so many award, it is not even funny. I wish they make one for Mac too.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189472.3/warc/CC-MAIN-20170322212949-00189-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
419
3
http://www.m3post.com/forums/showpost.php?p=12749600&postcount=32
code
the more fm, the less the plates inside the lsd grip (so less noise)... so less locking of course! it also is aggressive to the oil seal. so i would only use the fm oil if you really need it and dont want to have noises. for bmw it is easier and more profitable to sell the fm booster oil and dont have to argue with "customer noises". if you dont have noise issues or dont mind it, stay with the normal syntrax limited slip for better locking performance and healthy seals! but when talking about locking performance... if you want a proper performance diff, you will need to swap to a clutch-type lsd anyway... vlsd sucks ;-)
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172000.93/warc/CC-MAIN-20170219104612-00570-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
627
6
https://www.mrexcel.com/archive/vba/web-query-refresh/
code
Web Query Refresh Posted by Jason on December 12, 2001 5:57 AM Hi, does anyone know how to make a web query refresh on workbook open, if the workbook is protected?!? Even unprotecting the query range (which I DON'T want to do!) doesn't work...the 'Refresh Data' command is also grayed out. I've even tried having a WorkbookOpen script do a RefreshAll on the sheet...that doesn't work either. There's some reference to a RefreshData method of an RTD object, which may apply, but I don't understand what an RTD object is. Anyway, I'd love to do this without scripting, because (a) it won't work if users disable the macros, and (b) I'd need to embedd the protection password in the script! Any ideas?!?
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746171.27/warc/CC-MAIN-20181119233342-20181120015342-00122.warc.gz
CC-MAIN-2018-47
700
3
https://donorbox.org/wakeupuk
code
Wake Up UK Social Network https://wakeupuk.net is a social network that can be used in a similar way to Facebook. The cost of providing this social network is 100% funded by the community that use it. Please consider an affordable donation to show your support. Many thanks to all, Wake Up UK 😘
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039563095.86/warc/CC-MAIN-20210422221531-20210423011531-00185.warc.gz
CC-MAIN-2021-17
297
5
http://shnerdlys.com/ChangeYourExternalIPAddress.php
code
Change Your External IP Address If you haven't already, I recommend reading the Home Networking Help Page to get a basic understanding of networking before reading this page. There is some duplication but it's worth reading. A Cable ISP assigns the external IP address for a Cable Modem based on the MAC address of the first device connected to the Modem. The Cable Modem passes this external IP address to this same first device. I have never found it to be otherwise with Cable Modems. This is done to prevent people from cloning or spoofing the MAC address of the Modem itself to gain unregistered access to the cable network and also to pass along all of the proper IP's such as DNS addresses. The MAC address of the Modem is used to identify the specific Modem to verify the users subscription which then allows or denys access to the ISP's network but the external IP address is assigned to the MAC address of the first device connected to the Cable Modem. To get a new IP address from your Cable ISP, the MAC address of the first device must change either through cloning some other address to the device or through physically changing the device. For the ISP to discover the new device or MAC address and assign a new IP address, The old MAC address must be cleared from the Cable Modem. To do this, a cold boot of the Cable Modem is required. That means the Modem MUST be powered off. If any of the Modem lights are still on, the Modem is NOT powered off. Some Modems have a battery backup built in. The battery must be removed to do a cold boot. I recommend doing a cold boot of the entire network. To do this, all equipment connected to the network by ethernet must be powered off. This includes the Modem, Router, computers, VoIP boxes, gaming boxes, print servers and any other devices connected to the internal network by ethernet cable. The devices only need to be powered off, not physically disconnected from the network. If you are cloning the MAC address of the Router, do that before powering the device off. Now make all of the physical connection changes while the power is off. To start the network, first start ONLY the Cable Modem and allow it to boot. Usually about one minute. Next start the Router and allow it to boot. Usually about 30 seconds. The rest of the equipment can be started in any order. You should now be connected to the internet with a new external IP address.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100135.11/warc/CC-MAIN-20231129173017-20231129203017-00148.warc.gz
CC-MAIN-2023-50
2,404
8
http://seaintarchive.org/mailarchive/2000b/msg01237.html
code
As long as someone profits from publishing the code every 3 years regardless of errors, and without any liability, the code, will be published. Realistically, is there that much scientific data warranting the publication of a new code on a regular interval? (If the answer is yes than by all means there should be some sort of amendment to the code) Has full scale testing been done to back up the changes to the 97 UBC, or was it a compromise? We all know that the code had to be rushed out by a specific deadline, and now we're paying the penalty for an ambiguously written and untested code. In a message dated 5/16/00 11:17:07 PM Pacific Daylight Time, allen(--nospam--at)xyz.net << My ex-partner always said that there was never enough time to do a project right the first time, but always enough time to do it right when the claims Can't we learn and do it right the first time? James Allen P.E,
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118831.16/warc/CC-MAIN-20170423031158-00201-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
901
13
http://fishesoft.com/connect-to/failed-to-connect-to-lockdownd-service-on-the-device.php
code
Failed To Connect To Lockdownd Service On The Device This is using Linux on Fedora 24 workstation updated with the latest stable packages. Skip to content Ignore Learn more Please note that GitHub no longer supports old versions of Firefox. gnutls: WRITE FLUSH: 67 bytes in buffer. You signed in with another tab or window. this contact form Try again. You may get different errors coming from the strenghtened SSL/TLS requirements in iOS 10, like: $ sudo ifuse /media/iphone GnuTLS error: Error in the pull function. Downgrading iPhone is not possible on Linux. Reply With Quote 02-18-2013,08:45 AM #8 dataworx22 View Profile View Forum Posts Private Message Junior Member Join Date Feb 2013 Posts 28 Hi Klaus, thanks again for taking the time to Ideviceinstaller Could Not Connect To Lockdownd Redskies:~$ idevicepair pair SUCCESS: Paired with device da27a7e9b8150f5822c8d2cbeeb58f73baab1268 Redskies:~$ idevicepair validate ERROR: Device da27a7e9b8150f5822c8d2cbeeb58f73baab1268 returned unhandled error code -2 Redskies:~$ ls -l /lib/udev/rules.d/ total 604 -rwxrwxrwx 1 root Redskies 611 Oct Code: idevice_id -l ideviceinfo Maybe you should update your bug report at http://libiphone.lighthouseapp.com Tell them that you upgraded the libraries and still cannot connect. Next I'll look at permissions of the usbmuxd user. --------------------------------------------------------------------------------Because they will never pay for themselves, the only space settlements will be religious communities.N = R* fp ne fl fi fc Again, no luck.Is there another group permission I need? gnutls: REC[0x19d7300]: Sent Packet Handshake(22) in epoch 0 and length: 67 gnutls: HWRITE: wrote 1 bytes, 0 bytes left. Move directories despite of errors What is the name of these creatures in Harry Potter and the Deathly Hallows? "error: Could Not Connect To Lockdownd, Error Code -5" Knoppix Home Today's Posts FAQ Calendar Community Forum Actions Mark Forums Read Quick Links View Forum Leaders What's New? ifuse ~/media/ipad -u seems wrong to me? Error: Could Not Connect To Lockdownd, Error Code -5 nikias closed this Jun 30, 2016 pmnordkvist commented Sep 5, 2016 Gaah! Is it bad practice to use GET method as login username/password for administrators? gnutls: ASSERT: buffers.c[get_last_packet]:1159 gnutls: READ: -2 returned from 0x20648f0, errno=0 gerrno=0 gnutls: ASSERT: buffers.c[_gnutls_stream_read]:367 gnutls: ASSERT: buffers.c[_gnutls_io_read_buffered]:587 gnutls: ASSERT: record.c[recv_headers]:1055 gnutls: ASSERT: record.c[_gnutls_recv_in_buffers]:1175 gnutls: ASSERT: buffers.c[_gnutls_handshake_io_recv_int]:1414 gnutls: ASSERT: handshake.c[_gnutls_recv_handshake]:1459 gnutls: ASSERT: Then repeat the process. Gnutls Error: Error In The Pull Function. So what is wrong and how to fix it? / Thank you in advance mount iphone share|improve this question edited Sep 29 '16 at 4:54 asked Sep 28 '16 at 16:20 Offline #10 2012-08-01 04:52:00 raymund Member From: Houston Registered: 2012-05-14 Posts: 41 Website Re: iPhone not mounting I tried two things.First, I tried to mount in the following order:usbmuxdplug in iphoneifuse gnutls: WRITE FLUSH: 80 bytes in buffer. Error: Could Not Connect To Lockdownd, Error Code -5 I'm not sure how to check if openssl is using SSLv3 (help?) $ env | grep 99 GNUTLS_DEBUG_LEVEL=99 $ /usr/bin/idevicepair validate gnutls: Enabled GnuTLS 3.4.10 logging... https://bbs.archlinux.org/viewtopic.php?id=212663 Remove libusbx? [y/N] y error: failed to prepare transaction (could not satisfy dependencies) :: libusb-compat: requires libusbx Any workarounds? Ideviceinstaller Could Not Connect To Lockdownd more stack exchange communities company blog Stack Exchange Inbox Reputation and Badges sign up log in tour help Tour Start here for a quick overview of the site Help Center Detailed "error: Could Not Connect To Lockdownd, Error Code -21" What reasons are there to stop the SQL Server? gnutls: REC[0x19d7300]: Preparing Packet Handshake(22) with length: 62 and min pad: 0 gnutls: ENC[0x19d7300]: cipher: NULL, MAC: MAC-NULL, Epoch: 0 gnutls: WRITE: enqueued 67 bytes for 0x19dac30. weblink gnutls: WRITE: wrote 67 bytes, 0 bytes left. Sign in to comment Contact GitHub API Training Shop Blog About © 2017 GitHub, Inc. Dividing rational expression? Ios_webkit_debug_proxy Could Not Connect To Lockdownd. I had the same problem and I tried everything till I came across your post. Or is it really so difficult that nobody can assist me? Already have an account? http://fishesoft.com/connect-to/failed-to-connect-to-windows-service.php How do I force ifuse to use GnuTLS 3.5.5? I assume file '006' corresponds to the bus/device reported by lsusb. Could Not Connect To Lockdownd. Exiting.: Broken Pipe VasilijSviridov commented Sep 19, 2016 this worked for me appium/appium#6597 (comment) =) joecool1029 commented Sep 19, 2016 @VasilijSviridov that is a totally unrelated issue on OSX. Make sure to remove invalid paring records by deleting the appropriate files or call idevicepair unpair for the affected devices. I have no parental restrictions on the device and no screen lock. gitsop01 commented Sep 25, 2016 I can confirm this on IOS 9.3.2 also using the 1.20 standard released libmobiledevice llibrary suite but have not tried with the git master head with I was getting the following error: $ ifuse iphone/ Failed to connect to lockdownd service on the device. Ideviceinfo Could Not Connect To Lockdownd Version info Date retrieved the below dependencies: Tue Nov 1 03:35:16 UTC 2016 OS: Ubuntu 16.04 x64 uname -rms: Linux 4.4.0-45-generic x86_64 Compiled from source: GnuTLS (master branch HEAD) libusbmuxd (master After letting ifuse (built from HEAD) use libimobiledevice (built from HEAD but with OpenSSL instead of GnuTLS), it finally worked! Reply With Quote 02-16-2013,05:51 PM #5 klaus2008 View Profile View Forum Posts Private Message Senior Member registered user Join Date Feb 2010 Posts 496 sudo ifuse /media/iPhone/ -s What is the This is on Ubuntu 16.04 LTS, iOS 9.3.1. February 12th, 2013 @ 02:04 PM State changed from new to open Tag set to ios 5.1.1, iphone 3gs, ifuse, jailbreak, pairing Please report the versions of the following components: ifuse Member nikias commented Jun 30, 2016 Should be fixed with latest code from git master.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863489.85/warc/CC-MAIN-20180620065936-20180620085936-00074.warc.gz
CC-MAIN-2018-26
6,302
16
https://www.itblogs.info/index.php/2008/12/11/
code
Archives for: "December 2008, 11" Dec 11, 2008 Programming I am learning the application programming on Android OS. I found that is easier to catch up because I am a WPF Programmer. Both of them are using xml to draw UI. That is not a strange thing for myself.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335573.50/warc/CC-MAIN-20221001070422-20221001100422-00645.warc.gz
CC-MAIN-2022-40
260
3
http://lipflip.org/blog/lipflip/2008/09/quick-file-sharing
code
I frequently need to send a file here and a file there to other people. I'm using this two services for this. This first is drop.io for quick and hassle-free uploading and sharing of files. Just go over to drop.io, create a so called "Drop", define (optional) passwords for you and your guests, specify what they are allowed to do (just view or allow them to add files), and the lifetime of your drop. Finished. No account sign-ups, no email confirmations. And no need to tidy up afterwards, as the drops are deleted after the lifetime is expired. It's that easy. You can subscribe to RSS, email, or twitter updates of your drop, which can be stuffed via web, email, phone, and fax. Nice. Downside: Your drops are limited to 100MB if you're using the free service. Premium services are available, too. The second service Dropbox has a slightly different approach. It also provides some sharing mechanisms, but it's primarily focused on providing a local folder that is automagically synchronized between multiple computers. Just add a file here, wait a sec, and it is available on your second computer. Synchronization clients are available for Windows, Linux and OS X. The files are regular files on your local computer and can therefore be accessed without using awkward browser upload/download forms, although a web interface is also provided. What's nice is Dropbox's versioning feature: Older revisions of your files are available and can be restored. I wouldn't use it for software development, but this is a nice feature for documents and such. You get 2GB for free. Bigger dropboxes can be rented. The data is SSL-encrypted on the way to the remote servers and stored with AES encryption, What I especially like is dropbox's escheresque 404 message :)
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648431.63/warc/CC-MAIN-20180323180932-20180323200932-00314.warc.gz
CC-MAIN-2018-13
1,759
10
https://daleglass.wordpress.com/2008/01/
code
January 24, 2008 LL released some new development code, and an experimental SLVoice binary with it. This should be usable with the standard viewers from LL, Windlight, as well as ones built from source. Here’s how. First, download the libraries package. This file contains libraries and headers needed for building a viewer, as well the SLVoice binary. Uncompress the file. In linden/indra/newview/vivox-runtime/i686-linux/ you’ll find all the voice files. If you run the standard viewer downloaded from secondlife.com: Copy SLVoice into the installation directory Copy the rest into the lib directory If you build your own viewer and run it from the source tree: Copy SLVoice into indra/newview Copy the rest into libraries/i686-linux/lib_release_client Now if you start the viewer, voice should work. This is of course experimental, and might crash, but it seems to work a lot better than the Wine hack did. January 8, 2008 About an hour ago I noticed the server was off. On looking at it, the power supply was very hot. I thought the problem was that it got clogged with dust and shutdown. So I used some canned air on it, and gave it a good cleaning. Then I plugged it back in. That turned out to have been a bad idea. The PSU made several loud exploding noises, and bright sparks could be seen inside. Pretty scary stuff since this happened the moment I plugged the cable in, so I had my hand right near the thing. Lights went out. I unplugged the cable, and turned things back on. Fortunately, the UPS it was connected to survived fine. Inside the server nothing looks obviously burned up, but since this is an ATX case, the PSU provides power even when the computer is supposed to be off, so something might have got fried. The server will remain down for some hours, as it’s late here and no shops are open. If I’m lucky, and only the PSU died then it’ll go back up as soon as I get a new one, otherwise it could unfortunately take a few days, as I may not be able to get replacement hardware on the same day. TrustNet won’t be working while the server is broken. If you’re constantly getting errors, reset the scanner. It should fail to login and then shut up. The downtime will be credited towards your subscription when it comes back online.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676595531.70/warc/CC-MAIN-20180723071245-20180723091245-00224.warc.gz
CC-MAIN-2018-30
2,266
18
https://blogs.infostrat.com/2019/05/update-policies-for-microsoft-dynamics.html
code
The updates only apply to customers hosted in the Microsoft commercial cloud and not for on premises deployments which are managed by customer organizations. So far, the Microsoft government clouds for the United States and Germany are also operating on their own update schedules in order to maintain compliance with government security and privacy regulations. I will not restate all the details which you can review at FAQ for Dynamics 365 for Customer Engagement apps Update Policies as well as Previewing April 2019 release functionalities and updates for Dynamics 365 for Customer Engagement. Here are some highlights and thoughts on the update policies of cloud services. - Cloud vendors are pushing updates more frequently. They are under competitive pressure to release new features and versions, and this trend is unlikely to end. - Cloud vendors prefer not to allow customers to choose update dates. This is especially true for bug fixes and security patches, which need to be applied as soon as possible. - Customers must test new versions. Innovation will lead to new features, and some will replace features which will be eliminated (deprecated) while others will offer new ways of doing the same thing. The Unified Interface, for instance, provides a new menu system to navigate Dynamics, but for now can live side-by-side with the "classic" menus. Before long, the Unified Interface will become "classic" and be replaced as well. Microsoft is not responsible for testing customer solutions and ensuring that they will function after major updates. All they can do is provide notification and access to the new versions - You need sandboxes more than ever. One of the most important features of a Dynamics sandbox (a non-production instance of Dynamics) is to allow testing before introducing a system to production. You may need more sandbox environments to test your customizations on forthcoming versions of Dynamics. - Customers who deploy on premises will fall further behind. You can avoid the effort of continuous improvement and testing by sticking with on premises deployment, an option that Microsoft provides for now but which is not offered by cloud-only plays like Salesforce. The tradeoff is falling behind on product features and potentially exposure to risks from not applying patches and other fixes.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662517485.8/warc/CC-MAIN-20220517130706-20220517160706-00437.warc.gz
CC-MAIN-2022-21
2,332
8
https://forum.solidproject.org/t/facebook-solid-and-de-centralization/1368/9
code
I just watched a very insightful conversation about Facebook, SocialMedia challenges, and the Solid Project. Key Video Segment: https://youtu.be/WGchhsKhG-A?t=861 . Solid is all about providing a platform that simplifies the development of HTTP-based Read-Write Applications & Services where the Privacy of end-users isn’t compromised, implicitly. How is that achieved? First off, it has nothing to do with compute resources. It has everything to do with structured data representation combined with loosely-coupling of the following: - Identity (via a WebID) - Identification (via a #WebIDProfile doc) - Authentication (various protocols e.g., TLS or OpenID Connect) - Authorization (WebACLs) - Storage (various LDP and WebDAV supporting storage providers or proprietary alternatives from Dropbox, Box, OneDrive, GoogleDrive, Rackspace, AWS S3 etc… ). A third party cannot offer privacy to an individual. That is fundamentally contradictory. A Blockchain doesn’t address the aforementioned issue either. The same ingenuity that underlies the Web is what developers and architects need to pay a little more attention re its magical data interaction capabilities. This issue is about Application Architecture. This is what Solid Addresses and simplifies for Web Developers.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400206329.28/warc/CC-MAIN-20200922161302-20200922191302-00568.warc.gz
CC-MAIN-2020-40
1,278
14
https://scratcharchive.asun.co/forums/viewtopic.php?id=87724&p=1
code
Halo reach: GDR helmet is it real? does anyone have any clues/suggestions of what ways there could be to get it? If you took your time reading this, you have just wasted more than 10 seconds of your life cause your still reading my signature. Congratulations your still reading. That deserves a HUGE nothing. - R Dash (Yes, really)
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334620.49/warc/CC-MAIN-20220925225000-20220926015000-00264.warc.gz
CC-MAIN-2022-40
331
3
https://enerzinx.com/store-2/module-0-fundamentals-of-power-system-modeling/
code
Home / Shop A one-time price of ₹20,000.00 will be added to your order. The fundamental course of power system modeling is designed to expose participants to the development of models of major power system components such as synchronous generators, transformers, transmission lines, excitation systems, and speed governors. In addition to this, modeling of converter-based renewable energy sources, loads, and prime movers shall be introduced. An insight into the mathematical modeling of power system components is necessary to comprehend when goes behind when a power system is modeled in any power system modeling and analysis software.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948708.2/warc/CC-MAIN-20230327220742-20230328010742-00335.warc.gz
CC-MAIN-2023-14
641
3
https://www.cyc.com/cyc-partners-with-deep-learning-company-to-train-their-model/
code
We helped identify what concepts are likely to be found when talking about or looking at a video of common events. We expanded on what Cyc already knows about events such as baby showers, birthday parties, and working around the house. We then leveraged Cyc’s NL understanding capabilities to predict what concepts would be good to search for given a short description. For example, if a user wants to find pictures of a man smiling, then Cyc can put forward pictures with captions such as “Father watches his daughter take first steps” because Cyc knows that this is a momentous, happy event in a child’s life that parents are likely to get enjoyment from. To further improve Cyc’s predictions in this effort, we also experimented with mapping Word2Vec to OpenCyc. By identifying nearby concepts in the Word2Vec graph, we could also identify nearby Cyc constants that are likely to be found in relation to a given event. We generated a corpus of approximately 1.2 million CycL sentences with an average of 11 English paraphrases each for use by Deep Learning approaches such as Distant Supervision. The data set consisted of three types of CycL sentences: 55k already-asserted or forward-derived CycL sentences (eventOccursAt (SummerOlympicsFn (YearFn 2012)) CityOfLondonEngland) “The 2012 Summer Olympics happened in London, England.” 114k questions based on those known sentences (eventOccursAt (SummerOlympicsFn (YearFn 2012)) ?VAR) “Where did the 2012 Summer Olympics take place?” ~1 million backward-inferred sentences that Cyc is able to easily derive via the Cyc inference engine, which is optimized to perform very deep proofs using very powerful and general relationships that were manually asserted earlier: (commonSoundTypeFromActionType (CharacteristicSoundTypeFromActionTypeFn Speaking) (WorkOfFn NewsShowHost)) “Speech is commonly heard during the work of news show host.” All of these sentences were generated by appealing to a small set of CycL templates that specified relationships such as “X directed the movie Y”. With only 100 templates, we quickly generated over one million CycL sentences as well as multiple ways Cyc knows to represent those sentences in English. The resulting corpus provides equivalence classes of different ways to say the same thing in English, which Deep Learning approaches can use to train their models. It also makes explicit what relationship is described in each sentence at a level of detail that is often missing from Distant Supervision experiments. That is, while Distant Supervision may tell us that X and Y are related, Cyc knows exactly what that relationship is. This project proves that Cyc is a great partner for Deep Learning companies and research groups to make use of similar, potentially trillions of sentence-sized, equivalence classes for training their learners.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195527000.10/warc/CC-MAIN-20190721123414-20190721145414-00007.warc.gz
CC-MAIN-2019-30
2,858
13
https://talk.ekodiena.com/d/265-something-to-do-with-old-cotton-clothes
code
I was looking at another site and saw someone asked a question about how long it takes for cotton clothes to decompose in a landfill. The main answers were all saying the same thing, that nothing decomposes fast if at all in a landfill because of the lack of oxygen, so cotton will probably take 20-200 years. Apart from that I loved this answer so much I wanted to share it here: Landfill conditions are notoriously anaerobic, so ANYTHING in a landfill will not decompose barely at all. It may take 20-200 years. Fact is, few things decompose in landfills, organic waste anaerobically decomposes producing some methane and not much else. It's much better to reuse cotton as rags. I use old t-shirts as cleaning rags, then when no longer any good, I wash em one final time then recycle cotton. Better long term strategy is that cotton can be shredded and composted to feed mushrooms. Indoor cultivation of Volvariella volvacea otherwise known as Straw Mushrooms which are edible. There are a lot of things that I might have thought of to do with an old shirt, but I never ever thought about using it to grow mushrooms!
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817184.35/warc/CC-MAIN-20240417235906-20240418025906-00585.warc.gz
CC-MAIN-2024-18
1,118
6
http://images.benstore.com.ph/about.php
code
Warning: [mysql error 1064] You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near 'recursive, create_subcategories, nb_photos, storage FROM piwigo_co' at line 6 SELECT id, type, category_id, user_album, recursive, create_subcategories, nb_photos, storage FROM piwigo_community_permissions WHERE (type = 'any_visitor') ; in /home/benstor1/public_html/images/include/dblayer/functions_mysql.inc.php on line 759 This photo gallery is based on Piwigo. Piwigo is photo gallery software for the web, built by an active community of users and developers. Extensions make Piwigo easily customisable. And, for icing on the cake, Piwigo is free and opensource.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256600.32/warc/CC-MAIN-20190522002845-20190522024845-00416.warc.gz
CC-MAIN-2019-22
732
3
http://itknowledgeexchange.techtarget.com/itanswers/tag/devices/
code
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Cisco, Database, DataCenter, Desktops, Development, Exchange 2003, Exchange 2007, Hardware, iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing Technology, Microsoft Excel, Microsoft Exchange, Microsoft Windows, Mobile, Networking, Oracle, OS, Outlook, Outlook 2003, Outlook 2007, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Tech support, Virtualization, Visual Basic, VoIP, VPN, Windows 7, Windows Server, Windows Server 2003, Windows Server 2008, Windows XP VIEW ALL TAGS Our professor gave us an assignment. "Enumerate different Intellect Devices and Their uses." but i already searched for it over half an hour and didn't got an answer. So I'm just thinking if there's really an Intellect devices or I just copied a wrong assignment. Anw, I'm taking BSIT and I'm First... I am aware of the system value for qlmtsecofr, and need to know how to set the specific workstations/devices? Thanks much. Stephen Lewis
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021342244/warc/CC-MAIN-20140305120902-00012-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
1,056
3
https://community.graphisoft.com:443/t5/Project-data-BIM/A-small-python-script-to-adapt-the-Archicad-library-objects-to/m-p/290987
code
2018-05-14 09:49 PM 2018-05-14 10:33 PM 2018-05-15 09:58 PM 2018-05-16 05:50 AM 2018-05-24 10:31 AM 2018-06-13 06:21 AM Johan wrote:Hi Johan, I already made a few modifications to the script. It is now more stable and more versatile. You can change pen numbers, line types and fill colors. I also added a small explanation on how to use it. /Users/furtonb/Desktop/AC21 xml/Object Library 21/1. BASIC LIBRARY 21/1.1 Furnishing 21/Chairs 21/Lounge Chair 21.xml Traceback (most recent call last): File "/Users/furtonb/Downloads/PenNumbersReplacement.py", line 34, in <module> index = oldValue.index(valeur.text) ValueError: '4' is not in list [Finished in 0.1s with exit code 1] [shell_cmd: python -u "/Users/furtonb/Downloads/PenNumbersReplacement.py"] [dir: /Users/furtonb/Downloads] [path: /Library/Frameworks/Python.framework/Versions/3.6/bin:/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin]The v2 version runs OK (example line): (...) ('File modified :', '/Users/furtonb/Desktop/AC21 xml/Object Library 21/1. BASIC LIBRARY 21/1.1 Furnishing 21/Chairs 21/Bar Stool 21.xml') [Finished in 0.2s] [Process finished with exit code 0]The only thing I did is replacing the xml folder path and removing the linetype and fill colour sections from v2. 2018-06-13 07:00 AM 2018-06-13 07:37 PM 2018-06-21 08:47 AM 2022-02-10 08:38 PM hi! great idea! I‘m also interested in adapting the standard AC library, but simply with a text editor that can search and replace in multiple text files in the HSF format. this works quite well, my only concern is how to migrate a running project that is using a customized library. will it work to customize, for example, the AC22 library, begin a project there, customize the AC24 library and migrate the project from custom library 22 to custom library 24? does anybody have experiences here?
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644574.15/warc/CC-MAIN-20230529010218-20230529040218-00128.warc.gz
CC-MAIN-2023-23
1,818
18
https://devpost.com/software/sight-7b4298
code
Conversations with visually-impaired people who used walking sticks, guide dogs and echolocation to get a feel of the world around them but felt as if they never truly knew what was around them. What it does The user will wear a camera with depth sensor (presently a Kinect). The video feed is processed and analysed in order to detect what obstacles are in the path of the user and the distance of said objects. This information is then fed back to the user via text-to-speech technology. How we built it We used the Kinect api in order to retrieve the video feed and depth information from the Kinect. We used blob detection on the depth information in order to detect where the closest objects were. Then the full colour image at the corresponding location was processed by a cloud service to determine the identity of the object. This information was then spoken back to the user using text-to-speech technology. Challenges we ran into Difficulty in retrieving the required data via the APIs. Accomplishments that we're proud of Getting a working proof-of-concept! What we learned How to process visual data (i.e. blob detection, object recognition).
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514575674.3/warc/CC-MAIN-20190922201055-20190922223055-00057.warc.gz
CC-MAIN-2019-39
1,154
11
http://veritastrophe.com/linux-hole-real/
code
I recently acquired the means to revive the computers I owned and operated during my college heydays of 4 ½ years ago. This just means I now own a desk, live in my own room with space, and got a commission check that afforded me a new monitor and a few needed peripherals. One of these computers is a 2010 Dell Mini Netbook POS (and I do not mean “point-of-sale”). The last time I powered this baby on was over 2 years ago and it was slower than the United States Postal Service (BURN! I hate them). Even before I packed the Mini up and said my temporary good-byes, I had contemplated installing Linux on it to lighten the load. All I really wanted to use it for was surfing the internet and occasionally watching movies in class. Being a 10” laptop, it was pretty much useless beyond this purpose. Note that this was well before mobile computing was ever a thing. We’re talking 2010 here and tablets were out of the budget as well as the realm of anything I’d care about at the time. So last weekend I took the dive. If you are not familiar with Linux, there are currently 169 distros (short for “distribution”) listed on the Linux.com website, many with their own versions and flavors. I did a little (very little) research and downloaded Ubuntu 14 desktop for a 32 bit system. Installing it was really simple, especially since I had no reason to keep Windows XP at all. And you know what? It was even slower than the shoddy XP system that was there before! What the hell?! After spending several hours looking up how and what to remove through the terminal, I gave up on Ubuntu desktop. This is where things got a little crazy. You see, I READ that the best way to handle a light install of Ubuntu was to install the server edition and to build up rather than try to tear down all the packages I wouldn’t ever need. But once I got to the part that needed internet, I was stuck, because I only have WiFi. Frantically, I searched my things to get an ethernet cable that I knew I must have had lying around in order to directly connect to the modem and… … Well, I’d rather not bore you with the details. Needless to say, one does not know frustration who has not tried to connect Linux manually to the internet with command line. This journey started late last week, and as I type this, I have eight different distros sitting on my external hard drive, waiting for their purpose, and a download of Point Linux waiting for me to find out if it is finally the one. For those considering Linux as an alternative, heed my warning and get really familiar with executing command lines.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505826.39/warc/CC-MAIN-20200401161832-20200401191832-00398.warc.gz
CC-MAIN-2020-16
2,602
6
https://github.com/jcf
code
James Conroy-Finn jcfDeveloper Program Member - git-tmbundle 341 The no longer maintained Git TextMate Bundle - vim-latex 75 Mirror of vim-latex as Sourceforge's git support blows chunks! - dotfiles 23 Opinionated configuration files powered by Ansible. - rvm_ruby.vim 7 This plugin has been superseded by Tim Pope's rvm.vim (http://github.com/tpope/vim-rvm). Switch Ruby version at runtime in MacVim - hyde 4 Serve static files using Sinatra on Heroku with some clever URL rewriting Repositories contributed to - listora/constraint-config 2 Verify and transform your application config - listora/ring-cache-buster 1 Ring middleware that tells the world to cache nothing - listora/whitespace-linter 0 Finding invisible errors that the eyes can't see - listora/component-utils 0 Utility functions for Stuart Sierra's Component library - ring-clojure/ring-codec 16 Utility library for encoding and decoding data Contributions in the last year 889 total May 29, 2014 – May 29, 2015 Longest streak 6 days January 2 – January 7 Current streak 0 days Last contributed - Pushed 10 commits to jcf/emacs.d May 27 – May 29
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207930866.66/warc/CC-MAIN-20150521113210-00313-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
1,118
16
https://agacho.blogspot.com/2010/
code
Well, I am not a big fan of Windows and related Windows applications.. As you can guess, sometimes we need to run some OS dependent applications on different systems.. Wine is a quite popular "free" software to run Windows applications on other operating systems.. I can say that it works like a charm on Ubuntu.. Today, I needed to run Internet Explorer on my Ubuntu.. Of course, first thing to do is googling about it.. But as it is a common topic, I found many many entries about that topic.. Installed too many things, then deleted them.. And all this process took me a long time.. At the end, I realized that the solution was really easy.. He he.. And this is why I am writing these lines for you guys.. Here is how to do: $ sudo apt-get install wine And you have to install all the dependencies for that package.. Note that a package called "winetricks" is also installed.. and this is our "key" package! :) After that installation, you are ready to install Internet Explorer 6.. $ winetricks ie6 Then you will be prompted by an installation window.. Just follow the instructions, it takes 10 minutes to have an Internet Explorer running on your linux distribution.. :) Then create an application launcher for your browser. Note that command will look something like: wine "C:\Program Files\Internet Explorer\IEXPLORE.EXE" He he.. Then enjoy with your new browser.. Of course not always.. but when you need it!.. Arghh!..
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816879.25/warc/CC-MAIN-20240414095752-20240414125752-00409.warc.gz
CC-MAIN-2024-18
1,427
12
https://machdyne.com/product/riegel-case/
code
This is an enclosure for Riegel, the computer board is sold separately. We highly recommend purchasing one of these cases along with Riegel in order to protect the board. These cases are 3D printed in-house and may have imperfections. The developer edition cases provide access to the ISP header. Nuts and bolts are included. The 3D design files are available if you would prefer to print your own case. - DEV: Cutout on top for 2×4 ISP connector (pictured) - NORMAL: Solid top - WHITE: PLA - BLACK: MATTE PLA - BLUE: MATTE PLA - 3D design files are available on Github
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100779.51/warc/CC-MAIN-20231208212357-20231209002357-00761.warc.gz
CC-MAIN-2023-50
570
8
https://forums.meteor.com/t/meteortoys-reference-break-things-livedata-connection-bug/58112
code
I was updating an old 1.6 project to 2.x and when merging some changes, Meteor.subscribe started to throw errors (see image) I do not have MeteorToys installed and no references to it in my code. The screenshot shows an error 'at Connection.subscribe (livedata_connection.js:392:7)' but it seems like there is some unfortunate coding in livedata_connection.js, the test for ‘existing’ returns -1 and later if(existing), which is expecting an object or undefined, is satisfied with the -1 and goes ahead trying to read and create properties on ‘existing’, which does not really exist… I’m lost… why does it think the name of the sub is ‘MeteorToys’ and why does not livedata_connection.js test for an object instead of undefined? Update: I did indeed find a reference toMeteorToys in the code, but after removing it I get the same error for each call I make to Meteor.subscribe. Strange.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103036077.8/warc/CC-MAIN-20220625160220-20220625190220-00049.warc.gz
CC-MAIN-2022-27
904
7
https://support.servtraq.com/support/solutions/articles/4000095743-csbg-data-entry
code
If you are a CSBG agency and use ServTraq to collect CSBG data, this update is for you! CSBG data entries are no longer supported via the CSBG Data section located on the Payment Assistance Data Entry Module. The CSBG section is now a Read Only page that summarizes household entries made during Payment Assistance Application Entry. CSBG Data Section All CSBG entries on Payment Assistance Applications must be made using the Household and Income Individual Entry. Payment Assistance Household Demographics-Individual Entry Payment Assistance Household Income-Individual Entry
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100508.53/warc/CC-MAIN-20231203193127-20231203223127-00604.warc.gz
CC-MAIN-2023-50
577
6
https://codeandtalk.com/v/reversim-2016/rise-of-the-content-chat-bots-how-nlp-search-and-recommendations-play-together-shaked-bar
code
Rise of the (content) chat bots - how NLP, search and recommendations play together (Hebrew) Chat bots are the latest AI trend, featuring bots that do anything from ordering flowers to being your lawyer. In this session I will present a content chatbot and how it is built. The synergy between NLP, search and Outbrain's recommendation algorithms enables us to understand the user’s information need from the chat, and respond with relevant and timely content. These play together in building a user friendly bot, where one can get the latest headlines, receive user-specific recommendations, and ask in natural language about specific topics or categories such as “Donald Trump” or “Sports” The talk will describe how within a few weeks we took the idea from inception to being demonstrated by Mark Zuckerberg in his keynote in Facebook’s Developer Conference. We overcame the technological and algorithmic challenges in developing the content bot, yet are still surprised by some of the bizarre inputs users enter in the bot, some of which we will share.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100781.60/warc/CC-MAIN-20231209004202-20231209034202-00277.warc.gz
CC-MAIN-2023-50
1,068
6
https://www.oreilly.com/library/view/the-net-developers/0321228359/ch63.html
code
Chapter 63. What Is Protocol Transition? Protocol transition is a new feature that's been added to Windows Server 2003 domains. Put bluntly, it allows certain designated servers to establish logon sessions with valid Kerberos credentials for an arbitrary domain user without knowing that user's password! As I showed in Item 26, if you're one of these designated servers, you can create a WindowsIdentity for a user, with a real token (Item 16) and logon session (Item 17) behind it. Simply use the WindowsIdentity constructor that takes a single string argument, the user's account name—technically the user principal name (UPN) for the account, which is typically the user's e-mail address. There are a couple of scenarios where this can be helpful. The ...
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506623.27/warc/CC-MAIN-20230924055210-20230924085210-00206.warc.gz
CC-MAIN-2023-40
761
5
https://societysbackend.com/p/algebra-to-ml
code
Bridging the Gap from Simple Algebra to Machine Learning You probably know more about machine learning math than you think The goal of this article is to help you: Understand that machine learning math finds its roots in math you likely already know. Understand how to get conceptually from the math you know to ML math. This is a follow-up to an article I wrote previously that clarifies machine learning at a very high level and explains how it works. If you haven’t read that and don’t know how ML works, I would suggest checking it out first: Taking ML Back to its Roots I see machine learning referred to as “magic” quite a bit. I know people don’t actually believe this, but they feel the math behind ML to be so out of touch that it’s easier to think of it this way—but this really isn’t the case. The magic behind machine learning starts with algebra. Yes, the same algebra you learned in grade school is fundamental for machine learning math. Let’s start with a basic principle you've likely already learned: the equation y=mx+b, known as the slope-intercept form of a line. You can plot this line on a graph by plugging in an x value and computing its corresponding y value. When you do this, the line will intercept the y-axis at point b and the slope of the line will be equal to m. This means that for every single increase in the x direction the line will increase m times in the y direction. Schools focusing on graphing these equations because it helps us visualize them. But graphs aren't what make equations like this important. What makes them important is that you can give the equation an input and it will give you an output. In this case, you can choose an x and the equation will give you a corresponding y. In higher-level math and computer science, we call this equation a function. Functions are the key to understanding relationships between two (or more) variables. Eventually in most algebra curriculums, you'll see the y you’re used to seeing in equations change to an f(x) (e.g. f(x)=mx+b). This is just renaming the output variable of the equation to reflect that it’s a function rather than just the y value on a graph. In plain English, f(x) is spoken as “the function of x”. X is our input and f is our function that acts upon x to give us an output. To put it simply: f(x)=y, but instead of emphasizing a y-coordinate, f(x) puts the focus on the equation being a function. A function can be visualized as shown above. It's important to note that we use functions to define the relationships between multiple entities. In our f(x)=mx+b example, the equation models a relationship between an input (x) and an output (f(x)). This may seem really obvious, but you likely use functions every day without realizing it: Managing money requires understanding how many of each bill you have and how they add to create a total. When you're traveling somewhere, you calculate the time to get there based on the distance to that location and the speed you'll likely travel. When cooking, you use quantities of ingredients to create a certain flavor profile. All of these are relationships between an input and an output that you identify without even realizing you're doing it. This shows us the beauty of functions: they can be used to model relationships we understand in real life. This is exactly what machine learning is doing. Machine learning uses high-level techniques to create functions that model relationships between inputs and outputs. Our slope-intercept form of a function isn't robust enough to represent the complex relationships represented by machine learning. In fact, it isn't even complex enough to model a relationship like the money example above—but it isn't too far. To model the money example, we use a more complex function shown below: By adding more terms, we were able to capture the impact many different bills had on the output. Now let's take a look at how we can make this even more complex and how we get from where we are now to machine learning models. If you’ve enjoyed reading up to this point, join Society’s Backend for more interesting AI breakdowns like this! How do we model more complex relationships? There are a few basic ways we can model more complex relationships, many of which you're probably familiar with: Add more variables. We've already done this in our money example. We now have multiple inputs and one output. It allows us to model relationships between more than one input. Add more complex terms. Think about a quadratic function. Complex terms can model more complex relationships. This one is most easily understood by visualizing it graphically (shown below). We can change the relationship between terms. Up to this point, we've only been adding terms together. We can model more complicated relationships by changing the way the terms interact with one another. Let's take a moment to visualize these changes we can make: All of these changes allow us to create more complex models between inputs and outputs. Generally, as relationships get more complex, we need more complex equations to model those relationships. The magic behind machine learning is using linear algebra to model even more complex relationships. The equations above only have a few terms (in f(x)=2x+5, both 2x and 5 are considered a ‘term’). In machine learning, we can use billions of terms to model a relationship. We call these parameters. When using this much data, the best way to model relationships between them is through linear algebra, which uses matrices to organize and represent data. A matrix is similar to a spreadsheet, in that it’s a two dimensional arrangement of numbers. A matrix allows us to perform large-scale operations (addition, multiplication, etc.) quickly by performing those operations on a matrix instead of between individual terms. We take the data we want an ML model to use when modeling a relationship and the parameters within our model and place them into matrices. This makes it easier to represent the complex relationships we need machine learning models to understand when we use billions of parameters to represent those models. This a very simplistic view of linear algebra, but a good overview for why its crucial for ML. For a full overview of linear algebra, I recommend Khan Academy’s Linear Algebra course. What's the real benefit of ML? In the simpler functions we've explored above, we've manually determined the terms of the function and how they interact to best represent the model we want represented. We determine the function and its terms based on what we think works best to model our data. For example, in our money adding equation, we know there are $10, $5, and $1 bills available to us so we know to include those in the function. This is how we arrive at the function f(x,y,z)=10x+5y+z. Now, can you imagine if there were bills introduced that multiplied with the other bills to determine the total value of the money in your hand? That would be a much tougher function to come up with manually. Luckily, there are mathematical ways to do this. You've probably heard of creating a line of best fit. When given data, you can use determine the line of best fit to fit a function to that data. It often looks like drawing a line through a scatterplot of the data points (see graphic below). That line is a function and that function is what we use to mathematically represent that relationship between that data. While it may not perfectly represent the data, when we plug an input into the function, it gives us a likely output. As you can imagine, determining this line of best fit gets really complex as the data we're trying to model gets more complicated. This is what machine learning does for us. The details of how this works depends on the type of machine learning we're doing, so I'll save those details for another time. But machine learning algorithms use math to look at the data and allow the machine learning model to create its own line of best fit. This is done much more accurately and quickly than if we do it ourselves. When a ML model is given an input, it uses its line of best fit to produce an output. Some real world examples of models doing this include: Choosing the posts to display on a social media feed ChatGPT returning an answer to a question Midjourney returning an image from a user’s prompt Machine learning is built upon algebra you likely already know. It uses linear algebra and complex functions to represent complicated relationships between data. It also uses math to determine a line of best fit for that data similar to lines of best fit we all calculated in grade school. The primary differences between simple functions and machine learning models are: ML models are much better at determining this line of best fit than we are. Machine learning can model relationships requiring billions of parameters. Next week, I plan on getting into further detail about how ML math actually works broken down into different types of ML. If this interests you, join Society’s Backend! We’re a network of individuals uncovering the engineering complexities behind the artificial intelligence you use every day. It’s free to join and you’ll get more articles like this along with other member benefits.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474650.85/warc/CC-MAIN-20240226030734-20240226060734-00126.warc.gz
CC-MAIN-2024-10
9,311
44
http://nedrilad.com/Tutorial/topic-6/Game-Physics-Pearls-58.html
code
Game Development Reference Figure 3.1. Cell/BE architecture. or three-dimentional calculations. However, there is a big difference between an SPU and other general coprocessors. Each SPU has its own memory space and can run a full C/C++ program. And 90% of the computational power of Cell/BE lies in SPUs. So optimizing for Cell/BE is equivalent to optimizing for SPUs. (See Figure 3.1 .) Each SPU has its own local memory called the local storage. Before running a program on an SPU, transferring the program and data into the local storage is crucial. Because SPUs and the PPU don't share memory space, SPUs can't di- rectly access the main memory. Whenever they have to access the main memory, they use the direct memory access unit (DMA) to transfer data to and from the main memory. SPUs can access the local storage faster than they can the main memory, but the size of the local storage is limited to 256 KB in each SPU. More- over, the program, data, and stack also consume local storage. That is, the amount of available memory is very limited. Whenever we write an SPU program, we have to take into account the size of the available memory. To achieve the highest performance from an SPU, we must always use the local storage effectively. For- tunately, SPUs can run DMA transfer and computation simultaneously, so we can hide the latency of DMA transfer by using the method of double buffering. 3.2.1 Basic Approach for Cell/BE Optimization A typical rigid-body simulation pipeline has four stages, and rigid-body data are processed through these stages in order. Because there are dependencies between stages, they can't be processed simultaneously. In order to parallelize the whole pipeline, we take the approach of parallelizing each stage using multiple SPUs Each stage is divided into various tasks. A task is a basic element of the computation processed in parallel on an SPU. If a task becomes too small, the cost of starting tasks or data transferring may exceed calculation cost. In the worst case, the parallelized version becomes slower than the original. It is therefore important to carefully balance the tasks.
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686983.8/warc/CC-MAIN-20170920085844-20170920105844-00719.warc.gz
CC-MAIN-2017-39
2,136
30
https://www.stlouis.jobs/jobs/anderson-frank/netsuite-administrator/1542924757173434206
code
Loading some great jobs for you... NetSuite Administrator -50% remote - Kansas City, MO My client is seeking the assistance of a NetSuite Administrator to provide post go-live / customization support for a 3 month contract project. This is an exciting opportunity to build your resume and NetSuite skill set - while also helping an incredible organization! If you are interested, APPLY NOW by emailing [Click Here to Email Your Resum] or call Jackie @ 212-###-#### for more details! Anderson Frank International is the leading NetSuite recruitment firm in the US advertising more ERP/NetSuite roles than any other agency. We deal with both NetSuite Partners & End Users throughout the United States and we have never had more live requirements for NetSuite professionals. By specializing solely in placing candidates in the NetSuite market I have built relationships with most of the key employers in the US and have an unrivalled understanding of where the best opportunities and NetSuite jobs are. I understand the need for discretion and would welcome the opportunity to speak to any NetSuite candidates that are considering a new career or job either now or in the future. Confidentiality is of course guaranteed. For information on the NetSuite market and some of the opportunities and NetSuite jobs that are available I can be contacted on 1-212-###-####. Please see www.andersonfrank.com/search for more fantastic NetSuite opportunities! Anderson Frank International is acting as an Employment Agency in relation to this vacancy. NetSuite / Net Suite / ERP /
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256494.24/warc/CC-MAIN-20190521162634-20190521184634-00238.warc.gz
CC-MAIN-2019-22
1,565
9
https://helpmanual.io/man3/Error::TypeTiny::WrongNumberOfParameters-pm/
code
Automatically generated by Pod::Man 4.07 (Pod::Simple 3.32) Standard preamble: ======================================================================== NAMEError::TypeTiny::WrongNumberOfParameters - exception for Type::Params STATUSThis module is covered by the Type-Tiny stability policy. DESCRIPTIONThrown when a Type::Params compiled check is called with the wrong number of parameters. This package inherits from Error::TypeTiny; see that for most documentation. Major differences are listed below: - The minimum expected number of parameters. - The maximum expected number of parameters. - The number of parameters actually passed to the compiled check. - has_minimum, has_maximum - Predicate methods. BUGSPlease report any bugs to <rt.cpan.org/Dist/Display.html?Queue=Type-Tiny>. AUTHORToby Inkster <email@example.com>. COPYRIGHT AND LICENCEThis software is copyright (c) 2013-2014, 2017 by Toby Inkster. This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself.
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999141.54/warc/CC-MAIN-20190620044948-20190620070948-00430.warc.gz
CC-MAIN-2019-26
1,045
14
http://neanbean.deviantart.com/art/Custom-Dress-Up-Game-294704322
code
Sorta quick dress up game I made for fun. Everything drawn in Illustrator, I'm proud of my base, which took like 2 hours to make I don't like drawing shoes, so I half-assed those.. I'm hoping to start doing these on commission ^___^ Coding tutorial I used for snap and such came from here: [link]
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461216.38/warc/CC-MAIN-20150226074101-00223-ip-10-28-5-156.ec2.internal.warc.gz
CC-MAIN-2015-11
296
4
https://www.judysbook.com/Movie-Gallery-Entertainment-and-Arts-jackson-oh-r26657220.htm
code
We rent movie from here quite often. They have a great selection of new releases. They have several copies of new releases but they are rented out fast. You can rent it for 5 nights which is good if you have a hard time finding the time to watch it. They have alot of game rentals also which is good. We can rent a gamecube game and a PS2 game with no trouble. You can also get some great snacks to.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267161661.80/warc/CC-MAIN-20180925143000-20180925163400-00442.warc.gz
CC-MAIN-2018-39
399
1
https://amara.org/videos/AqE8JydfKNi4/info/when-performing-gets-in-the-way-of-improving-eduardo-briceno-tedxmanhattanbeach/
code
When performing gets in the way of improving | Eduardo Briceño | TEDxManhattanBeach - When performing gets in the way of improving | Eduardo Briceño | TEDxManhattanBeach more » « less Working hard but not improving? Looking for more innovative solutions and ideas? You are not alone. Eduardo explains how in life we move between the performing zone and the learning zone, and unless we find a way to successfully spend time in both zones, we compromise improvement and innovation. An alumni speaker of TEDxManhattanBeach, Eduardo is the Co-Founder and CEO of Mindset Works. Eduardo has spoken at numerous industry conferences for educators, school leaders, business executives, policy makers, and others. His highly-rated 2012 TEDxManhattanBeach talk on the growth mindset has been viewed by over 1.5 million people. Eduardo grew up in Caracas, Venezuela and received Bachelor degrees in Economics and Engineering from the University of Pennsylvania, as well as an MBA and M.A. in Education from Stanford University. Most importantly, he continues to enjoy lifelong learning every day. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at http://ted.com/tedx - Video Language: - closed TED
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100545.7/warc/CC-MAIN-20231205041842-20231205071842-00798.warc.gz
CC-MAIN-2023-50
1,272
9
https://www.dk.freelancer.com/work/microsoft-excel-training-online/
code
Best Aws Training institutes in Noida,webtrackker is Amazons which have been saved with different amazons have a tendency to be the [log ind for at se URL] within the first container, just type in the call of the internet [log ind for at se URL] of bars relies upon on the scale of the species and care ought to be taken for smaller amazons to ensure that the spacing isn't webtrackker I need someone to illustrate a badge/emblem for me. We need two versions. One similar to the evolve emblem, but as you can see in our drawings we want three people but they are holding up their fist/hands. The other version will be similar to the second one uplift and they will be carrying an empty circle. We will figure out what to put it in later. The colour scheme is attached too. So agai... We are using Microsoft bot framework and its webchat channel to build and serve our chatbot. Presently it it using the default CSS provided by the webchat channel. We would like to customize it and change the look & feel of the chat elements like button, cards etc. I want to design a Microsoft office word template to write any business content. We have the logo we only need: First page design Watermark Footer reference back page cover The persone should understand in content writing Hi, I need to install Odoo 8 for windows and customize it for a supermarket and also train me how to use it .. not only POS but all modules that a supermarket needs like warehouses, employees, payroll, accounting..etc.. PLEASE DO NOT BID UNLESS YOU HAVE A PROFESSIONAL EXPERIENCE WITH ODOO AND SUPERMARKETS!!! if you bid and did not give proof of your experience I'll report you.. please do n... I will use this word document template for any business use IE: business plan, proposal, i will fill later with any desired content, I only need a word template with my own branding. You only have to work on: The cover page Different first page Footer references and page numbering. Urgent need for someone who is a trainer or courseware developer to create Microsoft Office 2016 coursework with student eexercises. The courses include - -- Word Basic&Intermediate (2 days duration) - Word Advance (2 day) - Excel Basic&Intermediate (2 days duration) - Excel Advance ( 2 day) - PowerPoint Basic&Intermediate (2 days duration) - PowerPoint Necesito un programa (o macro) que actue en local, para ir a buscar 6 ficheros de GoogleSheets de un Drive (ubicación fija) y los descargue a excel. En excel se consolidan en una macro que ya está hecha. Después de consolidados y revisados, necesito otro programa que desglose por una variable (nombre del equipo) y copie las lineas de cada equipo de Upgrade Windows Media Center Browser WMC currently uses Inernet Explorer 8 Integrate Internet Explorer 11 or Microsoft Edge Into WMC WMCMediaCenterWebLauncher: Inernet Explorer11Edge Build: [log ind for at se URL] C:Windowsehome[log ind for at se URL] WMC App: YouTube requires IE11 or Edge Desktop > Right Click > New > Shortcut I have a Human Resources data set, acquired from on-line that needs to be analyzed, using descriptive, predictive, and solutions based statistics. So ...comfortable with regression analysis, linear programming..etc.. and be able to understand the data, and create a great presentation You should have experience in: tableau, excel, power point, graphics ...by me and not by a third party so that any client's request or special configuration can be made through the platform's control panel. Additionally, I would need a brief training to be able to carry out the administration of the platform and make changes if necessary. If you need more details for the realization of the budget or proposal let me know ...emails from exchange online across and organisation and put the results into an Azure database. The database will be built separately, I am looking for someone to write the code to add a new row in that table for each email and meeting which comes in. The deployment should be easy to deal with people joining and leaving the Microsoft tenancy. So it should ...build me a microsoft flow workflow "email attachment to onedrive" with a few if->then conditional statements. I have a Microsoft Office 365 Business Premium subscription. I will e-mail the freelancer that will get the job the exact details. In my description I will use @[log ind for at se URL] e-mail adresses in my workflow description. Microsoft Flow Work... Build an iOS and Android App the allows the user to listen to Shoutcast streams. The app needs to check into a Microsoft SQL database to get the list of available streams and authenticate the user on every launch of the App and verify authentication hourly if the app is running. On the first launch, the user will need to enter a 6 digit identifier code Looking for someone to build a mobile application that will read from and write to an excel document that is located on our desktop, or other specified location. I would like for this program to allow me to take pictures with my phone and add several columns to an excel document that will be used for advertising and marketing. Hi, I am looking for people who have done projects in R. the current requirement is onsite training of a group of students in an institute on R. Expected to start by 7 th october for around 5 days. Those interested, pl. connect immediately. The requirement is in North India. people from north India would be preferred. Regards, kapil Jain 9873092371 Looking for an experienced consultant in healthcare to conduct a research on universities/colleges/training centers offering HIMAA certified clinical coding. The researcher will also compare these providers , assess the courses and summarize the findings 2 hours of audio, of a meeting between four people (one female and three males). Each speaker gets a label = F: for female, and M1, M2, and M3 for each male. Completion time for this task = 24 hours. I am a python developer, i need SEO training for 2 hours. I know the basic meta title, desc etc+ [log ind for at se URL] etc, i want to know how to push a website in top google ranking search. Running a 2003 access database in 2013 64bit server, need to migrate without breaking functionality. Also, need a special report query, that will utilize several tables, and a unique Identifier of the Birth month, vs. specific birth date on customer record. We have created a company intranet using Microsoft Sharepoint and would like to create a page/list that displays all the employees in the organization with their contact information and profile picture by pulling this data from Azure Active Directory using Graph API. Need a freelancer part-time basis for a smal...looking to develop algorithm based strategies over this tool called AmyBroker. A wide online community for AmyBroker exists to help the coder, including stack-overflow etc. the coder is only expected to translate the strategies written in plain english to code. All training reqd for this will be provided. Creation of a Microsoft Dynamics Portal. Needs: Secure login Several pages, some with secure content ie: member details, invoices etc Branded Ability to search through pages Happy for you to moc up a basic design with our demo data (vanilla Dynamics install) and if acceptable can work on the live dat Are there any sites you can show me the work
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267165261.94/warc/CC-MAIN-20180926140948-20180926161348-00051.warc.gz
CC-MAIN-2018-39
7,335
23
https://forum.uipath.com/t/how-to-scrape-data-from-a-multiple-page-website-and-if-there-is-no-any-next-page-button/218776
code
I want to scrape data from this page: Fortunately the url parameter ends with the page number. The image above is the first page. I can loop through next pages with pageCounter variable that I created. However write range activity works only in the first page. Here is my workflow screenshot. Well any suggestion what to do? I think I am missing something. Thanks in advance .Cheers…
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141672314.55/warc/CC-MAIN-20201201074047-20201201104047-00317.warc.gz
CC-MAIN-2020-50
385
7
https://www2.slideshare.net/neo4j/investigraph-using-neo4j-for-investigative-journalism
code
The Panama Papers opened our eyes to the idea of using graph data for journalism to find stories within big data. Since then, investigative journalists have found innovative ways to use graph data to map out investigations, and match it with publicly available information to find leads and invisible connections. This session will explore what works, what hasn’t worked and where we hope this technology will take us. The most basic step: clips, clips, clips. Start building a timeline and the first, raw relationship database. Tens of thousands of documents, analyzed via OCR and entity extraction Innovative: Documents as connectors This represents the structure of one, only one of the roughly 400 hundred LLCs and corporations that the original document showed our subject had interests in. INVESTIGRAPH: Using Neo4j for Investigative Journalism INVESTIGRAPH: Using Neo4j for Columbia Journalism School 11 May 2017 The Two Uses of Neo4J in Journalism 1. As a presentation tool. Ideally designed to present findings and to create a curation tool for public use (Panama Papers) 2. Aiding the investigative process internally.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039626288.96/warc/CC-MAIN-20210423011010-20210423041010-00374.warc.gz
CC-MAIN-2021-17
1,130
12
http://www.linuxquestions.org/questions/puppy-71/how-to-complete-puppy-4-0-a-654094/
code
Firstly you can use packages from the 3 series in the 4 series. Open the Puppy package manager and there will be a tab or radio button allowing you to choose to install packages from an earlier series (not sure but I think the 2 series is also an option ). If the application you want is still not available this is how I install Debian packages (there is probably a quicker and easier way but this works for me) open a terminal and enter "undeb" if you receive an error stating that the command is not found then you will need to download and install "undeb-unrpm" first. Once you have "undeb" installed open a terminal and navigate to the directory you downloaded the .deb file to and the steps I use are: 1/ Use "undeb" to extract the files from the .deb package. 2/ Make a new directory with the name of the .deb being converted. eg for yourfile.deb 3/ Move all files and directories extracted from the .deb into the new directory. mv ./* yourfile mv ./*.* yourfile 4/ If the original .deb package was still in the current directory before everything was moved, move it back out of the new directory. mv ./yourfile/yourfile.deb ./ 5/ Create a tarball of the new directory with exactly the same name as the new directory. This is critical, if the names are not identical the pet package will not extract when the package is installed. tar cvfz yourfile.tgz yourfile 6/ Convert the tarball to a pet package. I'm not sure how to set up a menu entry but you can start the application from the command line.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125881.93/warc/CC-MAIN-20170423031205-00211-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,506
14
https://www.dokuwiki.org/devel:ideas:multiuser_edit
code
Table of Contents Currently DokuWiki locks a page once someone starts to edit it. This idea is about adding a feature where two or more people could simultaneously edit the same page similar to the Google Docs or Etherpad. This feature requires some kind of backend server. It could be implemented taking the rather simple mobwrite library which uses a Server written in Python. We could provide a public server backend at DokuWiki.org (or appengine) for people who can't run the server themselves. There is also a fork of mobwrite at GitHub that uses the Tornado Web Server. As the project doesn't seem to be really active anymore we should plan maintaining it ourselves if we decide to use it. - The backend technology should be lightweight and low on dependencies to be installed easily on cheap hosting and/or cloud servers This feature should be implemented as plugin or be optional. The user who starts editing a page should be able to allow or deny the initialization of a multi-user session. - Whoever starts the edit session becomes the “session master” - The session master can allow others to join - When the session master leaves, the page is saved under his name, but the editing session continues - On save, additional users who contributed to the session are mentioned in the edit summary - The next person who joined after the old session master becomes the new session master - Editing ends when all participants left As a simple integration of mobwrite is trivial the main task of this project should be to provide a nice user interface and to really integrate with the editing process in DokuWiki. Some points you should take into consideration: - Generate truly random ids that are still somehow connected to the wiki (e.g. add a unique identifier and use the sha1sum of that) - Hide/extend the lock screen, take care of the save process (i.e. only remove the information about the editing session when the last one has left it) - Handle section edits! When a single section is edited still the whole content is present in the browser (DokuWiki uses hidden inputs for that) so we could still sync the whole page when just a section is edited. - What happens when a client goes offline and comes online again? (Find out if/how mobwrite handles that.) And what happens when all other participants have closed the session in the meantime? Some ideas for the user interface: - Display a list of participants - Display the cursor position of all participants (e.g. with a div in the background) and highlight changes of different users - Provide an optionally visible chat area If you want to implement this as part of the Google Summer of Code please provide more detailed descriptions how the editing process should look like, perhaps some drafts of the user interface and also more detailed ideas how you'll implement the different features. Feel free to suggest different synchronization backends if you don't like MobWrite. - EditArea - the code editor in a textarea - an opensource browser-based code editor that is relatively simple (a textarea is in the foreground and semi-transparent, the actual highlighting is done with a copy of the text in a div behind the textarea - this approach might be another idea how to highlight certain parts of the text. - XHTML and CSS as you need to create new parts of the user interface for the editing process - PHP as there is also some server side part involved (i.e. the session and lock handling) - Some bits of Python in the case of mobwrite as the server backend might need to be fixed/extended. Medium: Synchronizing stuff isn't easy so expect some difficulties like the scenarios that are outlined above. There are just a few parts of DokuWiki (locks, saving, drafts) concerned so understanding DokuWiki isn't the issue. The following people volunteered to “mentor” any new developers taking up this task by answering questions, giving tips and reviewing code: Threads on the mailing list concerning this idea We have been using a combination of DW and Google Docs or Piratepad during live or Skype work-sessions and realtime editing would be a great addition to DW. Would be more than happy to do beta testing. — Thomas Wingate 2011/02/13 18:48 The need for python limits it's use. Is it possible to create a temporary page when a second user request to edit a section? So instead of locking him out he will be notified that another person is working on another section, and let him chose how to merge the two revisions and a link to a diff comparison could be provided. if both were working on different sections, the system should place every change on it's place with no problem. — damascene 2011/02/16 01:16 Python is only needed for the backend, as explained above there could be a public server at dokuwiki.org that can be used by everyone who can't host his own one. Merging sections is subject of the merge idea. I think for this idea we should assume that always the whole page is edited and otherwise either the page is locked like now or the hidden parts are synchronized, too. — Michael Hamann 2011/02/15 23:45
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100534.18/warc/CC-MAIN-20231204182901-20231204212901-00162.warc.gz
CC-MAIN-2023-50
5,106
33
https://www.cnet.com/forums/discussions/netscanner-300658/
code
There are other intrusions that fly right by a firewall and infect the machines. Look up "drive by downloaders" as an example. This is why we install protection on each machine. i'm working on upgrading my network from 10mb half-duplex to 100mb full-duplex. I've got a spare computer and a spare network port. I want to set this computer up as a firewall to protect my network of 6 computers from outside intrusions. I'm thinking about running the internet connection thru the computer and then distribute it to the network. The program i want to use is comodo firewall. Will it do a sufficient job of blocking unwanted crap from entering my network?
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583658928.22/warc/CC-MAIN-20190117102635-20190117124635-00579.warc.gz
CC-MAIN-2019-04
650
5
https://community.bosch-sensortec.com/t5/MEMS-sensors-forum/BME680-IAQ-WITH-ESP32/td-p/14826/page/2?attachment-id=2119
code
I'm working to get the IAQ values from BME680 using ESP32, I've read the (BTS-BME680-Integration-Guide-AN008-47) and I followed the (BSEC Step-by-step Example) page 11 In page 15 it mentioned that the linker should be modified at (hardware\esp8266\2.3.0\tools\sdk\ld\eagle.app.v6.common.ld) I can't find the (eagle.app.v6.common.ld) sense I'm using ESP32 and not ESP8266. Is there a solution to get the IAQ form BM3680 using the ESP32 board? Thanks for your replay Solved! Go to Solution.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816977.38/warc/CC-MAIN-20240415111434-20240415141434-00572.warc.gz
CC-MAIN-2024-18
488
6
http://thehungergames-mockingjay.blogspot.com/2014/03/job-opportunity.html
code
Who wants to work on this blog? (*Background Chimes* I do! I do!) Well, if you do all you have to do is fill out a form. We will hire 2-5 people, depending on the response. To apply, go to the Apply tab found on the right side of the blog. Once you get there you will just have to fill out the form! I tried to make the questions as simple as possible, so please try to fill all of them out!
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676594675.66/warc/CC-MAIN-20180722233159-20180723013159-00423.warc.gz
CC-MAIN-2018-30
391
1
http://history.stackexchange.com/questions/tagged/accuracy?sort=active&pageSize=15
code
Is there any research explicitly contradicting facts in Suvorov's “Icebreaker” book series claiming that Stalin intended to attack Hitler in 1941? Viktor Suvorov is a somewhat famous ex-GRU spy who defected and wrote a series of books. The most (in)famous and sensational were a series of books on World War II, starting with "Icebreaker", which ... I have been looking for a book about Indian history. Recently I came across this answer, which suggested reading India: A History by John Keay. I wanted to know whether it is historical and accurate. ... A History of the Jews, by Paul Johnson, takes an authoritative tone and is dense with citations. But its scope is enormous and it sometimes draws very strong conclusions. Given the state of the art of ... I found a history book (A History of the Christian Church, Revised Edition by Williston Walker) at my local used book store. It was copyrighted in 1959. Have there been any developments in research ... I found similar questions about a game (closed as off topic), a play (7 upvotes) and a movie (9 upvotes) so I am unsure if this is an acceptable question for this SE. In the Mad Men series, which ... In Flavius Josephus's War of the Jews, in Book 6, Chapter 4, he described the day that the Second Temple burned. He then consoles himself by saying that all good things must come to an end, but then ... Probably not the best place to post this question, but after all, I am interested in history and while cleaning up some stuff I came across the Age of Empires III game which I had bought a while ago. ...
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257828010.15/warc/CC-MAIN-20160723071028-00156-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
1,571
8
http://www.google.com/patents/US8054320?ie=ISO-8859-1
code
US 8054320 B1 A system is provided for scaling image data comprising a Direct Memory Access (DMA) engine adapted to read the image data from a horizontal pixel strip in a column-by-column format, a scaling block adapted to scale the image data read by the read DMA engine into scaled column output data, and a buffer memory for storing the scaled column output data for the horizontal pixel strip. A method is also provided for scaling an image comprising reading pixel values from a pixel strip in a column-by-column manner across the pixel strip and scaling the pixel values for each column to produce scaled column output data. The scaled column output data for a plurality of columns is then read and the scaled column output data is scaled from the plurality of columns to produce scaled row output data for a row of pixels. 1. An image forming apparatus comprising: a storage device configured to store image data organized into a first horizontal pixel strip and a second horizontal pixel strip; an access engine configured to read the image data from the first horizontal pixel strip and the second horizontal pixel strip in a column-by-column sequence; and an image processor adapted to scale the first horizontal pixel strip in a horizontal direction and in a vertical direction, wherein the image processor scales the first horizontal pixel strip in the horizontal direction by calculating a fractional pixel value from a first row of the first horizontal pixel strip for use in a second row of the first horizontal pixel strip. 2. The image forming apparatus of a temporary buffer configured to store the fractional pixel value. 3. The image forming apparatus of 4. The image forming apparatus of a scan sensor configured to acquire the image data and send the image data to the storage device, wherein the image forming apparatus is a copier. 5. The image forming apparatus of 6. The image forming apparatus of a memory for storing output data for the first horizontal pixel strip. 7. The image forming apparatus of a write engine adapted to write the output data into the memory. 8. The image forming apparatus of 9. The image forming apparatus of 10. The image forming apparatus of a temporary buffer configured to store the fractional pixel value from the first row of the first horizontal pixel strip, wherein the fractional pixel value is accessed for the second row of the first horizontal pixel strip and the fractional pixel value is cleared before the image processor scales the second horizontal pixel strip. 11. A method of printing an image comprising: receiving image data from a source; storing the image data as a plurality of pixel strips; reading the image data from the plurality of pixel strips in a column-by-column sequence; scaling using an image processor a pixel strip of the plurality of pixel strips in a first direction; and scaling using the image processor the pixel strip in a second direction by adding a fractional pixel value from a first row of the pixel strip to a second row of the pixel strip. 12. The method of 13. The method of 14. The method of 15. The method of storing the fractional pixel value in a temporary buffer; and clearing the temporary buffer after the pixel strip is processed. 16. The method of 17. The method of 18. The method of 19. A method of processing an image comprising: receiving image data from a source; storing the image data as a plurality of pixel strips; reading the image data from the plurality of pixel strips in a column-by-column sequence; scaling using an image processor a column of the plurality of pixel strips in a vertical direction; scaling using the image processor a first row of the column in a horizontal direction; and carrying a partial pixel value from the first row of the column to a second row of the column. 20. The method of sending the scaled column to an output device. This application is a continuation of U.S. application Ser. No. 11/827,931, filed Jul. 13, 2007 which claims priority to U.S. Provisional Patent Application No. 60/830,589, filed on Jul. 13, 2006, the entirety of which is incorporated herein. The present invention relates in particular to digital image processing systems and methods for efficiently scaling digital images. Processing of digital images typically follows a rasterized path. Pixel values are read and processed from left to right within a single line, and lines are processed from top to bottom. Image processing operations such as scaling operate on areas that span multiple lines and columns of a digital image. Typically, to scale a group of image pixels, line buffering is necessary to temporarily store pixel values for multiple lines. Even though an area-based algorithm may only use a small number of pixels within a given line, the entire line must be buffered before scaling operations on the columns may be performed. Storage allocation for the multiple lines of scaled output data may be static or dynamic. The allocation size is dependent on the scale factor, the pixel resolution per area, the image size and the column length. Because memory resources are limited, efficient static memory allocation is preferred. When a scaling operation is implemented in hardware, the resolution and image width will define the amount of memory, typically SRAM, needed for buffering. If the resolution doubles, the amount of memory doubles. Typically the amount of SRAM available for buffering is fixed within an Application Specific Integrated Circuit (ASIC) implementing the desired function. Thus, a decision regarding the size of the buffer must be made early on in a design project in which line buffering will be required. If a later product needs more buffering, or if specifications change, the ASIC must be re-designed. This can add significant cost and delay to the project. The present invention is defined by the claims, and nothing in this section should be taken as a limitation on those claims. By way of introduction, the preferred embodiments described below provide systems and methods for scaling digital image data while conserving memory resources. By reducing the use of memory when processing in this manner, system bus bandwidth is also conserved. Furthermore, the embodiments provide scaling functions that are independent of image size and resolution, and that allow for the efficient implementation of the scaling operation into an image processing pipeline. In one preferred embodiment, a system is provided for scaling image data comprising a Direct Memory Access (DMA) engine adapted to read the image data from a horizontal pixel strip in a column-by-column manner, a scaling block adapted to scale the image data read by the read DMA engine into scaled column output data, and a buffer memory for storing the scaled column output data for the horizontal pixel strip. In another embodiment, a system for scaling image data is provided including memory access means for reading the image data from a horizontal pixel strip in a column-by-column format, a scaling means for scaling the image data read by the memory access means into scaled column output data, and a memory means for storing the scaled column output data for the horizontal pixel strip. In yet another embodiment, a method of scaling an image having a plurality of pixel strips is provided, each strip having a plurality of pixels arranged in rows and columns. The method comprises reading pixel values from a pixel strip in a column-by-column manner, and scaling the pixel values for each column to produce scaled column output data. The scaled column output data is scaled to produce scaled row output data for a row of pixels. Other preferred embodiments are provided, and each of the preferred embodiments described herein can be used alone or in combination with one another. The preferred embodiments will now be described with reference to the attached drawings. It should be noted that the read DMA engine 12 may receive image data from a mass storage device such as an optical and/or magnetic storage device, for example a hard disk drive HDD and/or DVDs, or any other data storage device that stores data in a nonvolatile manner, such as nonvolatile ROM. Image data may also be read from volatile memory such as RAM, DRAM and SRAM. Furthermore, the read DMA engine 12 may receive image data from a scanner sensor or CCD. The read DMA engine 12 functions to re-order image data to traverse a pixel strip or pixel array from the image in a columnar fashion, column-by-column. The image processor 14 manipulates the pixel values of digital images processed by the image processing system 10. The image processor 14 may be any type of logic device capable of performing a desired image processing function on digital image data. For example, the image processor 14 may be a microprocessor programmed to perform a desired function (e.g. color space conversion, scaling or profile conversion), such as a specially designed ASIC, a programmable logic array, or any other suitable processing device. The image processor 14 manipulates the pixel values according to the particular function to be carried out by the image processing system 10. The scaling block 16 may be a multiplier or other processor that may be used to perform scaling functions or apply scaling algorithms on the incoming columnar pixel values in the column (or Y) direction by modifying the pixel values by a scale factor. As with the image processor 14, the scaling block 16 may be a microprocessor, ASIC, multiplier or other suitable process device. The scaling block 16 operates also to scale the scaled output columns in the row (or X) direction. Finally, the write DMA engine 18 outputs the two-dimensional scaled image data to the buffer memory 20. The buffer memory 20 may be a random access memory (RAM), dynamic random access memory (DRAM), static random access memory (SRAM), a low latency nonvolatile memory such as flash memory and/or any other suitable electronic data storage medium. When processing digital images, pixel values are typically read and processed line by line in a rasterized pattern from left to right and from top to bottom. Processing the pixel values in the pixel array 20 in this manner, the pixel values from a first row of pixels 22 is read from left to right starting with the pixel (0, 0) in the first, leftmost column 38, followed by the pixel (0, 1) in the second column 40, and so on until the last pixel in the first row 22, pixel (0, n) in the rightmost column 54, has been read. Thereafter the pixel values from the second row 24 are read from left to right starting with the pixel (1, 0) in the first column 38 and ending with the pixel (1, n) in the last column 54, and so on until the last pixel (r, n) in the last column 54 of the last row 36 has been read. A complicating factor with prior art scaling functions is that, typically, all of the pixel values of the pixels within the array 20 must be read into a buffer memory before the sealing of the image may be performed. Using a traditional raster pattern for reading and processing pixel values therefore requires a substantial buffer memory. The specific size of the buffer memory will be dictated by the color resolution (i.e., the number of bits per pixel), the spatial resolution (i.e., the dpi or the number of pixels per line), and the number of lines of pixel values necessary to perform the scaling operation. Changing any of these parameters may have a significant impact on the size of buffer memory required for the scaling operation. For example, scaling to increase the width of an image may greatly increase the necessary capacity of the buffer memory. An alternative is to read and process image data in a more efficient non-raster pattern. According to an embodiment of the invention, a digital image pixel array is broken down into a plurality of overlapping horizontal pixel strips. Pixel values are read and processed according to a non-raster pattern separately within each horizontal pixel strip. In the preferred embodiment, the pixel values corresponding to the pixels in each horizontal pixel strip are read by the read DMA engine 12 and scaled by the scaling block 16 independently of one another. (Other image processing steps may be performed independently as well by the image processor 14). In other words, the pixel values relating to the pixels in the first horizontal pixel strip 62 are read by the read DMA engine 12 and scaled by the scaling block 16. When processing of the pixels within the first horizontal pixel strip is complete, processing of the pixels in the second horizontal pixel strip begins, and continues until the entire digital image pixel array 60 has been processed. Within each horizontal strip the pixel values are read and scaled according to a non-raster pattern shown in In general, image scaling compresses or expands an image along x-y coordinate directions. The geometric transformation of the image can occur using many known algorithms. Scaling typically relies on the ability to examine multiple pixel values before computing the value of any given scaled output pixel. In other words, pixel values from nearby pixels affect the output values. The complexity of this operation is compounded for two-dimensional scaling, which relies on neighboring pixels in both the row and column directions. Typically, if a horizontal strip area of an image is scaled row-first, the input data arrives row-by-row to the scaling block, and each input row results in a scaled output row that is saved in buffer memory. For scaling in the other (column) direction, one or more output rows that are in memory storage must be read so that a given column of input pixels can be scaled to arrive at an output pixel in the column direction. When the act of scaling produces one output pixel, the value is stored into a new two-dimensionally scaled row. Depending upon memory referencing ability or quantity of local memory, multiple-row scaled input pixels may be available and multiple two-dimensionally scaled output pixel locations may be available, so that scaling may proceed down the column or stop and move on to the next column. When scaling row-first, entire rows of data must either be stored in local memory, or referenced in external or buffer memory. This places limits on the capabilities of the scaling block implemented in the hardware. In contrast, the preferred embodiment herein traverses a horizontal strip column-first. By traversing in this fashion, pixel data arrives column-by-column to the scaling block, and each input column results in a scaled output column (comprising scaled output column pixel values) that is saved in temporary memory. For scaling in the row direction, an output column is read pixel-by-pixel back from the memory so that a given row of input pixels can be scaled to formulate an output pixel in the row or horizontal direction. When scaling produces one output pixel, the value is stored into a new two-dimensionally scaled column. Since the horizontal strip has a finite height, only a limited amount of local storage is required to store the column scaled output pixel values and the finished two-dimensional scaled data is output from a memory buffer column-by-column. Using this approach, only a finite amount of columnar data is stored locally, and no other memory referencing during the scaling operation is required. It should be noted that when scaling in this columnar fashion, the amount of output pixels may not always align with the burst size expected by the write DMA engine 18. The scaling block 16 forces data loss or data generation to create the correct sized scaled output. To assist in the alignment of the pixel data for DMA transfers, the scaling block 16 includes an output pixel counter programmed into a register designated as the output strip column count register 15 as shown in These particular pixel scaling steps are performed on columns of pixels read from an input horizontal strip 200. As shown in Scaling of each column in the column direction is performed on a column-by-column manner as shown in The column 220 includes fractional values at 217, 221, 225 and 229 that are carried forward and put into the accumulator 210 as shown in the drawings below in Next, at 308-314, the pixel values from the pixel strip are traversed in column-by-column fashion, and scaling is performed by the scaling block 16. Specifically, the scaling block 16 takes the columnar pixel values at 308 from a first column and performs the scaling in the Y-direction (column direction) on the column at 310. The scaled output data is then stored at 312 in a temporary register. After scaled output data is accumulated in the memory, the scaling block performs scaling in the X-direction (row direction) progressively on all of the stored Y-scaled columns at 318. Row-scaled pixel data is then output into the buffer memory 20 at 320. If more columns remain in the strip to be processed as determined at 314, successive columns from the pixel strip are read back at 308. The scaling process continues in this fashion until all of the columns in the pixel strip are read. Further horizontal pixel strips may be scanned and scaled as determined at 322 until the entire image is scaled. It is important to note that other scaling operations or processing techniques may be utilized in the scaling block 16 to scale the selected pixel data in addition to basic multiplier operations. For example, bicubic, linear or cubic interpolation techniques may be implemented in the scale block 16. It is intended that the foregoing detailed description be understood as an illustration of selected forms that the invention can take, and not as a definition of the invention. It is only the following claims, including all equivalents that are intended to define the scope of this invention.
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438043060830.93/warc/CC-MAIN-20150728002420-00159-ip-10-236-191-2.ec2.internal.warc.gz
CC-MAIN-2015-32
17,894
72
https://thephuck.com/tag/sddc/
code
VMware has exploded into Software Defined Networking (SDN) with NSX, it’s no secret why it’s their fastest growing product, either. Through the use of all the components within NSX, you can be well on your way to a fully Software Defined Datacenter (SDDC) accomplishing things like automated deployments of networks, edge devices, NAT rules, firewall rules, and the list goes on. Read More → TL-DR: See below for details on these commands Create a local user in the NSX Manager’s CLI, then use the API to grant CLI privileges to that user. Here’s how using a linux machine: user vrops-readonly password plaintext notrealpassword user vrops-readonly privilege web-interface Log out of the NSX Manager (type exit) and stay logged into the linux machine. Create cli-auditor.xml that contains this (replace brackets with greater/less than): [?xml version="1.0" encoding="ISO-8859-1" ?] Add the user as an auditor in the NSX Manager as a CLI user: curl -i -k -u 'admin:password' -H "Content-Type: application/xml" -X POST --data "@cli-auditor.xml" https://nsxmanagerip/api/2.0/services/usermgmt/role/vrops-readonly?isCli=true Add your domain/vCenter user as an auditor in the NSX Manager (NOT as a CLI user): curl -i -k -u 'admin:password' -H "Content-Type: application/xml" -X POST --data "@cli-auditor.xml" https://nsxmanagerip/api/2.0/services/usermgmt/role/[email protected]?isCli=false Details for creating the NSX CLI user for vROps Read More → Here’s the error While building a new environment for my lab, I ran across an interesting thing yesterday. I looked at my cluster’s VSAN health and saw this error: It’s complaining that my hosts don’t have matching Virtual SAN advanced configuration items. If you click on that error, you’ll see at the bottom where it shows comparisons of hosts and the advanced configurations: It shows VSAN.DomMaxLeafAssocsPerHost and VSAN.DomOwnerInflightOps as being different between a few of my hosts. Looking at the image above, you’ll see node 09 has values of 36000 and 1024, respectively, while the other nodes 10-12 show 12000 and 0. I immediately went to the host configuration advanced settings in the web client, searched VSAN and don’t see either of those. I even checked through PowerCLI and can’t see those: Read More →
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655244.74/warc/CC-MAIN-20230609000217-20230609030217-00434.warc.gz
CC-MAIN-2023-23
2,296
24
https://mls.gameday.blog/mls-video/interview-harry-shipp-on-the-agreement-between-mls-and-the-players-association/
code
Seattle Sounders FC midfielder Harry Shipp speaks to SoundersFC.com following training on the agreement between MLS and the players association, returning to small-sided training and the safety precautions in place for Orlando. SUBSCRIBE for more Sounders FC videos: http://sndrs.com/sbsc Visit SoundersFC.com: http://sndrs.com/ssfc Follow us on Twitter: http://sndrs.com/twtr Like us on Facebook: http://sndrs.com/fbook Follow us on Instagram: http://sndrs.com/ingrm
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703565541.79/warc/CC-MAIN-20210125092143-20210125122143-00552.warc.gz
CC-MAIN-2021-04
467
6
http://stackoverflow.com/questions/9863324/command-prompt-doesnt-recognize-equality
code
I guess I don't understand how the Windows Command Prompt evaluates equality. I have a batch that looks like this: @echo off set test=12 if (%test% EQU 12) echo true pause This, strangely, does not print true. Could anybody tell me why this is? Remove parentheses and it will work: IF doesn't use parentheses in conditions, just run
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398453805.6/warc/CC-MAIN-20151124205413-00284-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
332
5
https://docs.vmware.com/en/VMware-Validated-Design/services/vmware-cloud-foundation-391-sddc-site-protection-and-recovery/GUID-2A4ED295-CA95-4826-86A9-45E85FB06B69.html
code
After a disaster recovery or planned migration, the recovery region becomes the protected region, but the VMs are not protected yet. If the original protected region is operational, you can reverse the direction of protection to protect the new primary region. During the reprotect operation, after Site Recovery Manager reverses the direction of protection, it forces a synchronization of the storage from the new protected region to the new recovery region. Forcing data synchronization ensures that the recovery region has a current copy of the protected virtual machines running at the protection region. Recovery is possible immediately after the reprotect operation finishes.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648858.14/warc/CC-MAIN-20230602204755-20230602234755-00044.warc.gz
CC-MAIN-2023-23
681
2
https://www.thetruckersreport.com/truckingindustryforum/threads/best-safest-way-to-strap-down-pipe.1590901/page-3
code
I actually had a couple guys from the shop helping me and guiding me on this one. I'll pass along the suggestions. On you #2, do you mean like a wedge under the belly straps ?? On #3, do you mean double wrap the belly straps ?? Thank you very much for your input. Much appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250607596.34/warc/CC-MAIN-20200122221541-20200123010541-00521.warc.gz
CC-MAIN-2020-05
281
5
https://www.complexityeverywhere.com/a-data-driven-fed-wouldnt-cut-rates/
code
TL;DR on Fed Rate Cuts The Federal Reserve Open Market Committee (FOMC) announces its rate decision on Wednesday. A robust review of economic data does not support a rate cut; I built both a neural network and random forest model trained on 72 economic indicators (monthly data going back to 1992) to predict Fed rate decisions. The models, which find relationships only from the data, suggest the Fed should hold rates. Furthermore, as discussed in my last post, NLP sentiment analysis suggests a mixed view on the part of voting FOMC members. Yet, we know that Fed Funds futures markets are 100 percent certain of at least a 25 basis point cut. Conclusion? A rate cut would call into question the Fed’s data-driven bias. Some have already implied that the Fed is cherry-picking the data. It would also open the Fed up for more critique of its communication strategy and its willingness to succumb to politics and the bond market. Finally, it furthers the concern that low rates drive inequality. You would be correct in feeling like this is a no-win situation. Given the mixed conclusions of both the economic and sentiment model, assuming 100% certainty of a cut feels like a high-risk, crowded trade. Markets have a way of inflicting maximum pain on the greatest number of participants. Consider the possibility that the Fed holds on rates while offering strengthened language about its vigilance in following the data. Let’s dig into the facts. Reviewing Core Economic Data A yield curve inversion has markets concerned and the widely followed NY Fed Recession Probability Indicator is flashing possible recession. A variety of non-US economic data such as Purchasing Managers’ Index (PMI) are softening. However, core US economic data paints a picture of relative strength. Let’s start with GDP: the latest data, as well as 2018 revisions, was released last week. The economy is still growing about as well as it did during the Obama administration. How about Initial Jobless Claims? Nothing too concerning here. What about Industrial Production? Right at highs. And the ISM Manufacturing Index? Down from recent highs, but well within the range of activity post-2008. Is the consumer is struggling? Let’s look at Consumer Confidence and Retail Sales. Turns out, the consumer is fine. Certainly, Inflation must be plummeting? Actually, its right near the Fed’s 2% target and within the last decade’s range. Sidebar: for a discussion on why lower inflation might be ok, read this post. Let’s check out bond markets. The Yield Curve has inverted, and according to the San Francisco Fed, every recession of the past 60 years has been preceded by an inversion. This spread drives the widely followed NY Fed Recession Indicator, which has moved into the historical zone of concern. Finally, international data. The latest PMI readings for G20 countries show only seven countries above 50, and almost every country trending down. I built a fully-connected neural network using base architecture from PyTorch and Fast.ai libraries to predict the Fed’s rate action (Raise, Hold, Lower). Given the small dataset, neural networks felt like a brute force technique so I also built a Random Forest model using the same dataset (excluding the 8 variables with missing data). Results were as follows: Using June data, both models predicted that the Fed would hold rates steady. Full code for the model can be found here. The training set was monthly data on 72 key economic indicators going back to 1992 (8 data sets started later). The dependent variable was the Fed rate decision, Raise, Hold, or Lower. The base fast.ai architecture for tabular neural networks works for many use cases. Given the possibility of overfitting with a small data set, I adjusted the architecture to 400 x 100 layers, from the 200 x 100 default. The model created embedding matrices (initially randomly generated numbers) for the one categorical variable (date) and also for the eight variables where they had missing data. Embedding matrices are a technique that converts nonnumerical data into numbers, suitable for model training. These numbers become the activations that are inputted into your model. It is a powerful concept because previously trained (learned) embeddings can be reused in new models. The model takes these categorical variable embedding matrices and applies the Dropout function to them. The default setting in the model was for no Dropout, which I adjusted to 0.5. Dropout is a form of regularization, a technique to avoid over-fitting. Regularization reduces over-fitting by adding a penalty to the loss function. Explained simply, Dropout ignores a random percentage (that you set) of the activations that you feed the model, and thus their corresponding weights. This works quite well, because, by adding this penalty, the model is trained such that it does not learn interdependent sets of weights. Next, BatchNorm is applied to the 72 continuous variables. This is a form of normalization, a scaling technique that is commonly applied to neural networks to avoid model instability from inputs with a large range. A very large input can cascade through layers, creating gradients (derivative of your loss function with respect to your weights) that are imbalanced, making optimization difficult. “Normalization is a process where, given a set of data, you subtract from each element the mean value for the dataset and divide it by the dataset’s standard deviation. By doing so, we put the input values onto the same “scale”, in that all the values have been normalized into units of “# of standard deviations from the mean. BatchNorm extends this idea with two additions. After normalizing the activation layer, let’s multiply the outputs by an arbitrarily set parameter, and add to that value an additional parameter, therefore setting a new standard deviation and mean. Make all four of these values (the mean and standard deviation for normalization, and the two new parameters to set arbitrary mean and standard deviations after the normalization) trainable.”Source: fast.ai The results at this point are concatenated into one set of inputs, and the core architecture follows. We have blocks of a Linear layer of size 131×400, followed by the application of the most popular non-linear function in deep learning, ReLU, or Rectified Linear Unit (which replaces all values less than zero with zero). BatchNorm is once again applied. Another block follows with a linear layer, this time of size 400×100 (coming out fo the 131×400 input block from the previous layer) followed by ReLU and BatchNorm. This culminates in a final linear layer of 100×3. Three is the logical output, since we asked our model to train on three outcomes, Raise, Hold, or Lower. Alternative Model – Random Forest For comparison, given the small dataset, I built a Random Forest model using the same dataset, excluding the 8 variables with missing data. I used the base RandomForestClassifier module from the Scikit-learn library. The random forest classifier consists of a large number of individual decision trees that operate as an ensemble. Each tree produces a prediction, and the one that receives the most votes becomes the full model’s prediction. The use of multiple, uncorrelated models is usually able to outperform any individual models. This concept is visualized here. Revisiting the Sentiment Model As discussed in my last post, NLP sentiment analysis suggests a mixed view toward rate cuts amongst FOMC voters. In fact, the most recent June statement text suggested no rate cut, although certain subsequent speeches and minutes released in July suggested otherwise. Any opinions or forecasts contained herein reflect the personal and subjective judgments and assumptions of the author only. There can be no assurance that developments will transpire as forecasted and actual results will be different. The accuracy of data is not guaranteed but represents the author’s best judgment and can be derived from a variety of sources. The information is subject to change at any time without notice.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500095.4/warc/CC-MAIN-20230204075436-20230204105436-00398.warc.gz
CC-MAIN-2023-06
8,128
30
https://webmasters.stackexchange.com/questions/34375/when-will-my-old-page-stop-appearing-on-google/34377
code
Old pages still appearing in Google? I recently bought a new address for my Blogger blog, from yannbane.blogspot.com to www.yannbane.com. However, www.yannbane.com addresses do not appear when they are searched for! Is this natural? How much time will it take for Google to update its index? yannbane.blogspot.com 301's to www.yannbane.com. Both are added to my Webmaster Tools account, but it shows no data for www.yannbane.com (strangely). And, finally, is there something I could do to speed up the process?
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816942.33/warc/CC-MAIN-20240415045222-20240415075222-00873.warc.gz
CC-MAIN-2024-18
510
3
https://ethereum.stackexchange.com/questions/34252/why-does-a-function-in-a-contract-that-creates-a-transaction-returns-a-transac
code
This is a "facts of life" thing. return(bool success) and this will be visible to other contracts that call the function, e.g. in a chain of functions calling functions in other contracts. Transactions always start with an externally owned account signing a transaction and submitting it to the network. The returned value is a transaction receipt. The outcome of the transaction is unknown because nothing has happened yet except that a request has been submitted to the network for verification in the future. A typical approach to coping with this fact of life is to wait for the transaction to be mined, then inspect the transaction log for useful output, inspect the success/fail status and draw your own conclusions, or inspect a read-only function to discover the new state after the transaction was mined. The returned values are forever out of reach for a Web3 client. Hope it helps.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816832.57/warc/CC-MAIN-20240413180040-20240413210040-00117.warc.gz
CC-MAIN-2024-18
892
5
https://vgl.csa.iisc.ac.in/thesismtech(research).php?pid=003
code
Similarity between scalar fields.Vidya Narayanan Scientific phenomena are often studied through collections of related scalar fields such as data generated by simulation experiments that are parameter or time dependent . Exploration of such data requires robust measures to compare them in a feature aware and intuitive manner. Topological data analysis is a growing area that has had success in analyzing and visual- izing scalar fields in a feature aware manner based on the topological features. Various data structures such as contour and merge trees, Morse-Smale complexes and extremum graphs have been developed to study scalar fields. The extremum graph is a topological data structure based on either the maxima or the minima of a scalar field. It preserves local geometrical structure by maintaining relative locations of extrema and their neighborhoods. It provides a suitable abstraction to study a collection of datasets where features are expressed by descend- ing or ascending manifolds and their proximity is of importance. In this thesis, we design a measure to understand the similarity between scalar fields based on the extremum graph abstraction. We propose a topological structure called the complete extremum graph and define a distance measure on it that compares scalar fields in a feature- aware manner. We design an algorithm for computing the distance and show its applications in analyzing time varying data such as understanding periodicity, feature correspondence and tracking, and identifying key frames.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649302.35/warc/CC-MAIN-20230603165228-20230603195228-00333.warc.gz
CC-MAIN-2023-23
1,535
4
https://www.cracksage.com/free-microsoft-points-codes-generator-2015-no-survey/
code
Free Microsoft Points Codes Generator 2015: While gaming is getting into some realism, for this you have to pay more for your favorite games. A little giveaway from our side in this regard, which is free Xbox live Microsoft points with our Microsoft points generator tool. We have find Microsoft points tool as a pro tool which can help you obtain free Microsoft points code for free. The users who are looking for Xbox live codes and free Microsoft points code, have come to right place. Free Microsoft points codes generator 2015 tool is free of viruses and Trojans. Enjoy the free MS points generator to generate the real taste of free Microsoft points. We have recently put PSN plus generator and Wii points generator which are most efficient tools of their nature. As with those tools we have become able to develop the free Microsoft points generator no survey tool, which can generate over 4000 real xbox live codes and MS points codes daily. So you don’t have to find out the out dated free Microsoft points codes list. Get more information about this tool by moving up with the story. Somehow we have crossways with some Microsoft points generator online tools which can generate some free Xbox live points codes but in the real time, these tools harm your account. We have managed to get the real free Microsoft points codes generator tool which is jam packed with the antiban and proxy scripts. These pieces of codes will not let your account burn with illegal activites. In short you will not either get tracked or get detected by free Microsoft points generator no survey tool. In this regard, for getting this tool you don’t have to put yourself in to various surveys and link lockers fatigue. Direct hit hard on the download button and get the free Xbox live Microsoft game points card code generator tool. Generate maximum Microsoft free points of great worth with the interval of every 30 mins. How to Use Free Microsoft Points Codes Generator Download 2015? As it is easy to control the game show with this Xbox live codes hack tool, same as getting the tool is easy now. - Get the deal with the button given below - Install the installer integrated with this Free Microsoft points codes generator no survey. - After successful installation, the system will carry you towards tool interface. - Enjoy the tool and hack the PS plus network. Download Free Microsoft Points Online Generator Tool. Now no more wait for the tool for which you are looking for. Get the Free Microsoft points codes generator download no surveys instantly by this download button.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300289.37/warc/CC-MAIN-20220117031001-20220117061001-00556.warc.gz
CC-MAIN-2022-05
2,576
10
http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=9814&copyownerid=11911
code
UbiCoNet 2010 : Workshop on Ubiquitous Computing and Networks Call For Papers TOPICS OF INTEREST The workshop focuses on presenting state of the art and emerging research, as well as experience reports, in the following topics, but are not limited to • Ubiquitous Computing and Communications • Peer-to-Peer Computing • Multimedia networks and services • Human-Computer Interaction • Wireless Communication & Networks • Mobile Ad-Hoc networks (MANETs) • Wireless Sensor Networks • Mobile computing • Agents and Distributed Computing • User Centered Design in Ubiquitous networks • Context-aware computing and service provisioning Electronic submission of workshop papers: July 2, 2010 Notification of paper acceptance: August 13, 2010 Camera-ready and registration: August 31, 2010 Workshop: December 10, 2010 PAPER SUBMISSION GUIDELINES Only original, previously unpublished papers will be accepted. Prospective authors are encouraged to submit an IEEE conference style paper up to 5 pages long (including all text, figures, and referentes), but one additional page will be allowed with additional publication fee. Papers will be submitted through EDAS submission system (http://www.edas.info). An accepted paper must be registered before the registration deadline and must be presented at the UbiCoNet workshop. Failure to register before the deadline will result in automatic withdrawal of the paper from the workshop proceedings and the program. All accepted and presented papers will be included in the IEEE GLOBECOM proceedings and IEEE digital library. GLOBECOM has the right to remove an accepted and registered but not presented paper from the IEEE digital library.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103917192.48/warc/CC-MAIN-20220701004112-20220701034112-00719.warc.gz
CC-MAIN-2022-27
1,696
23
https://www.technize.net/iso-files-command-line-windows-8/
code
An ISO file, also called a disc image file, contains all the files, folders and the structure of a CD or DVD. ISO file is just a container like a ZIP file but it is not compressed. The most common use of an ISO file is to burn CDs and DVDs with all the data included in the ISO file at once. Windows 8 comes with a handy Windows Disc Image Burner. Windows Disc Image Burner is a command line tool which can create ISO files from CDs and DVDs. And it can also convert CD and DVD data into an ISO file. There are two modes of Windows Disc Image Burner, visual mode and command line mode. You can use both at the same time. To use the program visually, you just have to insert the CD/DVD in the CD/DVD drive. Then you can open the drive like the hard disk drives, use copy and paste to add or remove files from the drive. When you are done, you can right click the drive and burn the CD/DVD with the content which you have already added. If you want to create an ISO file from the CD or DVD disc, you will need to use the command line version of the tool. Follow the steps below in order to create an ISO file from the inserted CD/DVD. - Go to Run (WinKey + R) –> isoburn - This will show you a dialog with the correct syntax of the Windows Disc Image Burner. - Now that we know the syntax, let’s start by assuming the following: Our CD/DVD drive letter is H: We want to save the ISO file to D:\ISOFiles - Issuing the following command in the Run dialog will start creating the ISO file from the CD/DVD drive data. ISOBURN /Q D:\ISOFiles\isofile.iso - A new window will open where you can select the Disc burner and click on the Burn button in order to start creating the ISO file. Although I use a third party ISO management tool, Windows Disc Image Burner comes in handy for quickly creating backups of the CDs and DVDs without installing any third party app. Which burning utility do you use in your Windows machine?
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473472.21/warc/CC-MAIN-20240221102433-20240221132433-00425.warc.gz
CC-MAIN-2024-10
1,920
15
https://hermans.chem.wisc.edu/
code
Our research focuses on the sustainable synthesis of chemicals using homogeneous and heterogeneous catalysts. Catalysis is a key-technology, opening energy-efficient and selective pathways to value-added products. This explains why over 90 % of all chemicals have been synthesized by the use of at least one catalyst, be it homogeneous or heterogeneous. In our group, we investigate catalytic systems of (potential) industrial relevance from different angles, combining: - synthesis of heterogeneous catalysts following a variety of approaches and state-of-the-art characterization - (in situ) spectroscopy to learn more about the catalytic transformation (Infrared and Raman) - chemical kinetics and reaction engineering (liquid- and gas-phase ) - description and prediction with theoretical tools
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475422.71/warc/CC-MAIN-20240301161412-20240301191412-00448.warc.gz
CC-MAIN-2024-10
798
7
https://www.ift-poultry.com/optimisation/?lang=ar
code
Ift-poultry will assist you in the process of optimisation step by step and problem by problem will be handled. Optimalisation of cost prices, technical results and financial results. It is, or has not been all that easy to calculate the additional income, in which various technical improvements result. It is nevertheless a question we see ourselves confronted with every single day. In order to estimate this extra income, we have, for some years already, been using our computer programme (SIMUPS), which permits us to simulate financial improvements in a very easy way. Starting with an optimisation program is not an easy task, even when you know the potential financial benefits it is bound to change your live. Big differences are easy but the last parts of percentages are difficult to manage and or to predicts . However seen the financial benefits it make sense to start with improvements and optimisations even when getting only parts of the calculated increase. - SIMUPS are available for : Parent stock – Layers. - We will use Cobra to simulate improvements with broilers can be used for Broilers.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817106.73/warc/CC-MAIN-20240416191221-20240416221221-00652.warc.gz
CC-MAIN-2024-18
1,113
6
http://genius.com/discussions/35758-Tyler-the-creator-with-the-shit-that-make-your-soul-burn-slow
code
Will: You got a C- on your English report?! Jayden: But Dad the teacher is out to get me, and- Will: NO! No more excuses, Jayden! You didn’t study and you got a C-, and if your grades keep slipping like this i’m going to have to take your bentley away. Jayden: Which one? Will: All 3! Jayden: But, Dad that’s so unfair! Will: Life’s unfair, now go upstairs and study! Jayden stomps upstairs, slams his door shut and locks it Will (To Jada): What are we going to do with that kid? (Jayden, if his room listening to “dark” music on his laptop, goes to his twitter page) Jayden (typing): Education is rebellion [Genius](http://genius.com) is my favorite site, [Kanye West's "Power"](http://genius.com/kanye-west-power-lyrics) is my favorite song and [From whippin' the bacon rolls to outside whippin' the bacon Rolls](1256) is my favorite line [[Kanye West]] auto-links his artist page [[Scarface "My Block"]] auto-links to the song In ["Juicy"](/The-notorious-big-juicy-lyrics), Biggie says: > It was all a dream I used to read Word Up magazine Salt'n'Pepa and Heavy D up in the limousine
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645353863.81/warc/CC-MAIN-20150827031553-00066-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
1,098
18
https://openbenchmarking.org/suite/pts/compression
code
This test suite consists of tests that measure various forms of file compression such as gzip, bzip2, and 7zip. This suite is good for testing the system's processor, memory, and overall system performance. Phoronix Test Suite. It's as easy as running the phoronix-test-suite benchmark compression command.. pts/compression-1.1.4 Thu, 14 Jan 2021 14:00:22 GMT Add compress-rar to suite. pts/compression-1.1.3 Mon, 16 Nov 2020 07:44:27 GMT Add compress-lz4 to suite. pts/compression-1.1.2 Fri, 24 Jul 2020 17:47:26 GMT Fix compress-zstd arguments. pts/compression-1.1.1 Sun, 26 Apr 2020 11:46:05 GMT Add blosc to compression suite. pts/compression-1.1.0 Sat, 29 Feb 2020 07:50:54 GMT pts/compression-1.0.2 Sun, 16 Feb 2020 19:01:34 GMT pts/compression-1.0.1 Fri, 10 May 2019 15:06:06 GMT Add new compression tests. pts/compression-1.0.0 Mon, 06 Dec 2010 23:20:07 GMT Initial import into OpenBenchmarking.org
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510238.65/warc/CC-MAIN-20230927003313-20230927033313-00293.warc.gz
CC-MAIN-2023-40
906
16
https://confluence.bankidnorge.no/confluence/pages/diffpagesbyversion.action?pageId=95098420&selectedPageVersions=70&selectedPageVersions=69
code
Authorize is a standard endpoint that triggers authentication of an enduser via one of the IDP options, followed by authorization in terms of consent handling. Authorization information is then returned in the reponse to the requesting OIDC Client. The content of the authorization response is different for each of the supported protocol flows message flows. The Authorize endpoint does in any case trigger a series of re-directs, eventually returning to the requesting OIDC Client at a redirect_uri specified by the client. For security reasons only pre-registered redirect URIs are allowed. |List of scope values specifying what kind of resources (dataset) the OIDC Client requests access to. The value | |Unique ID (arbitrary string) configured at the OIDC Provider for the OIDC Client in question| |Redirect URI to which the Authorize response will be sent. This URI must exactly match one of the Redirect URI values for the OIDC Client pre-registered at the OpenID Provider| |Opaque value used to maintain state between the request and the callback.| The response mode to be used for returning parameters from the Authorization Endpoint. The following values are supported: Note: The .NET/C# example GitHub uses the OWIN framework. OWIN only accepts |String value used to associate a ODIC Client session with an ID Token, and to mitigate replay attacks. The value is passed through unmodified from the Authentication Request to the ID Token| |Specifies whether the Authorization Server prompts the enduser for re-authentication and consent.| |Not supported. The OIDC Provider determines life-time values in the ID Token.| |May be used to set a language preference for GUI handling. The default GUI experience supports nb (Norsk Bokmål) and en (English)| Requests use of any IDP at a given Level of Assurance (Authentication Context Class Reference) or above. A selector dialogue is shown to the enduser if more than one IDP option meet the required minimum level. Note that this parameter has no effect if the This parameter may be used to specify the use of any particularly named IDP (Authentication Method Reference) along with any pre-configuration for the designated IDP. Note that this parameter has no effect f the See further details on login_hint support for each of the supported IDPs. |An ID Token previously issued by the OIDC Provider used as a hint about the enduser's current or past authenticated session with the OIDC Client. Note that this parameter has precedence before both | Responses are different for each of the supported protocol message flows as specified by the response_mode parameters in the Authorize request.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887849.3/warc/CC-MAIN-20180119085553-20180119105553-00517.warc.gz
CC-MAIN-2018-05
2,647
18
http://jtsternberg.com/
code
@Jtsternberg Hello Sir I found your Plugin "Custom-Metaboxes-and-Fields-for-WordPress" on Github, can I use this in my premium project ?? — Muhmmad Ashfaq (@ashffaq) October 12, 2014 about three times a week I need a demon to possess me, do some cardio, and then leave — keply ☁️ (@keplyq) October 28, 2014 There are two kinds of people in the world: those who can extrapolate from incomplete data. — Frankie Jarrett (@fjarrett) October 28, 2014 Everything is better when you work together, big news possibly coming soon, depending on the outcome of a new prototype for Pods.. — Scott Kingsley Clark (@scottkclark) October 27, 2014 Somebody, go wake up Green Day and tell them that September ended. — Professor Snape (@_Snape_) October 1, 2014 Go-Karts – Feel fast, are slow 747s – Feel slow, are fast “Ship it!” – Feels fast, is slow “Test + Document it!” – Feels slow, is fast. — Z (@zspencer) September 23, 2014
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414637898894.2/warc/CC-MAIN-20141030025818-00011-ip-10-16-133-185.ec2.internal.warc.gz
CC-MAIN-2014-42
946
12
https://forums.lutris.net/t/layout-suggestion-for-games-webpages/2258
code
Below you can see a modified screenshot with the described changes and I look forward to see your opinions on this suggestion. I want to apologize for the blurry image, but I made it in a hurry and I definettly need to improve my GIMP skills in the first place. I have decided to open this topic just to have an open discussion about the webpage layout for games. First of all I want to say that this is just my personal opinion and I am not aware about the true reasons why the page looks the way it looks. I made this topic with the sole purpose of contributing if I can at the overall ease of use and functionality of games webpage layout. So the changes are just minor and they are aimed to improve the ease of use for users who for example have installed a game and they then need to find and install an Expansion or an Addon for that game. I was thinking that if there was a possibility in the “Suggest changes” panel for the comunity to link to other Lutris pages that contain those Expansions or Addons the user experience would be improved and navigating to the desired location would be easier. Also there is another use case, for example a player may be aware of and wants to install GTA San Andreas, but he/she has no ideea that there is an Addon wich enables multiplayer, this proposal would mitigate that problem by informing the user there is a possibility if he wants to try it out. In this moment if you search for Grand Theft Auto, you will find all GTA entries, but if you type San Andreas, you would find both GTA San Andreas and San Andreas Multiplayer, but with no mention of Multi Theft Auto, wich is another different Addon for the game. This is just a single use case, but the change would work and benefit all the games that have linked content for them available on the Lutris platform, for example Warcraft III Reign of Chaos and it’s expansion Frozen Throne, in this moment you would install it, then hit the back button, then hit the Frozen Throne entry from the list, and then installing. I believe having a linked entry in Reign of Chaos would be a simpler and straight forward path for the user. Also I believe that by moving the Patreon button closer to the eyesight would improve the possibility for users who want to support the project to do so, but that is just a guess. I tried to make my suggestion as simple as I could imagine both for the ease of use and for an easy implementation. Thank you for reading this and giving your feedback!
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645089.3/warc/CC-MAIN-20230530032334-20230530062334-00718.warc.gz
CC-MAIN-2023-23
2,483
11
https://xepher.net/forum/index.php?action=profile;area=showposts;sa=messages;u=1361
code
See, the kind of site I'd like to start is an oekaki board. But the questions I have: 1) Is it allowed to make a site that's focussed on an oekaki board? It's not just my own art on there (well, I plan to draw, but not EVERYTHING will be mine) and thus I can't control some things that members will draw. Is that okay? 2) As a follow-up on question 1; how should I handle submissions that are focussed on fanservice? (Think pantyshots, cleavage, etc.) I'm not an avid lover of these things myself, but I don't really want to rule these out from being allowed to draw either. 4) How will the activity rule be handled? If the oekaki board is not a success, can I turn it into a different site and get a name change? I ask this because I have a different site I want to host somewhere, but since it's not fleshed out at all and just a plan at the moment. It might be fleshed out by the time the boards die down, though. 5) How is paid URL referring handled? I mean me buying e.g. aerendyll.com (took my username for convenience - this site doesn't really exist) and referring it to this site? Would I need to list my site being hosted by Xepher.net? I'm sorry if some of these are being asked before... I'm just horrible at doing forum searches. ._. Thanks in advance!
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817382.50/warc/CC-MAIN-20240419074959-20240419104959-00832.warc.gz
CC-MAIN-2024-18
1,265
7
https://channel9.msdn.com/Forums/TechOff/246766-Tough-one-Component-Services-and-MSDTC-issue-XP-Pro/f4c19833eb164be88abd9dea014c0361
code
well i am guessing that my computer manufacturer caused this problem but here is how i fixed it. I went to a command prompt. I navigated to c:\windows\system32 I ran msdtc - install that installed Msdtc and the service now appears under the "services" area. Everything appears to work fine now. I have no idea why it was not installed.
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891817437.99/warc/CC-MAIN-20180225205820-20180225225820-00256.warc.gz
CC-MAIN-2018-09
335
6
https://feedback.photoshop.com/photoshop_family/topics/photoshop-cc-is-crashed?topic-reply-list%5Bsettings%5D%5Bfilter_by%5D=all&topic-reply-list%5Bsettings%5D%5Breply_id%5D=19253398
code
When I opening the Ps CC when is loading to "Initializing menus...", then suddenly it come out another windows it say "Crash Report for Adobe Photoshop CC", and it say again "A crash report has been generated.This report can help Adobe find solution to the problem." Hold ALT + SHIFT+ CTRL during Photoshop start and select delete settings in dialog. You settings will be lost and Photoshop will be in default settings. If you need your settings find folder with settings and make backup. If this won't help you can try reinstall, but it takes a bit more time.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143455.25/warc/CC-MAIN-20200217235417-20200218025417-00551.warc.gz
CC-MAIN-2020-10
560
2
https://www.reddit.com/r/wiiu/comments/2gl7x5/super_smash_bros_wii_u_release_date_on_ebgames/
code
Unlikely. That's probably just a placeholder date representing '2014' in general. Nintendo would be stupid to not release the game well before Christmas. You really don't know that usually stores will list a date as December 31st of the year it's known to be coming out during? Reddit's source for news, pictures, reviews, videos, community insight, & anything related to Nintendo's 8th-generation console, the Wii U.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742567.46/warc/CC-MAIN-20181115054518-20181115080518-00500.warc.gz
CC-MAIN-2018-47
417
4
https://www.iod.com/events-community/regions/scotland/nxd-opportunities/scottish-fiscal-commission-chair-commissioner
code
Do you have the skills and experience to lead the Scottish Fiscal Commission with integrity and independence? Or perhaps you’d like to play a role in producing official fiscal and economic forecasts for Scotland? If any of this sounds interesting to you, the Scottish Fiscal Commission are looking for a new Chair and a new Commissioner to join them! If you are interested in the Chair role and you would like more information and would like to apply, please see: https://bit.ly/3iEWKJG. If you are interested in the Commissioner role and would like more information and would like to apply, please see: https://bit.ly/3Bmk3zh. The closing date for applications for both roles is 15th November 2021.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585025.23/warc/CC-MAIN-20211016200444-20211016230444-00134.warc.gz
CC-MAIN-2021-43
701
3
https://novoberezansk.ru/wallets-guide/codecademy-cybersecurity.php
code
The Indianapolis nonprofit code Academy and Coding bootcamp is designing to transform your passion into expertise with a tech bootcamp – a dynamic journey. It's an exciting time to get involved in #cybersecurity, with so many unique roles to explore and so many jobs in demand. Clark - Cybersecurity Curriculum from the CAE Community; Codecademy · CSSIA - Cybersecurity education resources; Cyber FastTrack - Cybersecurity training for. We suggest you complete the following courses before you get started with Cybersecurity Analyst Interview Prep: Fundamentals of Cybersecurity; Fundamentals of. Codecademy: Introduction to Cybersecurity. Overview of cybersecurity history, standards, threats, cryptography, authentication and authorization as well as. Gain cybersecurity skills to detect and contain a Skillsoft Codecademy · E-Learning. Certifications Cybersecurity Training. Build a resilient workforce to. Unlock the power of technology training and enhance your expertise in core coding skills, cloud, cybersecurity, web development, and AI. Learn the Cybersecurity fundamentals that will lay a foundation for securing your technology and personal life from dangerous cyber threats. Hackers and Cyber Attacks: Learn about common malware and threat actors. Lesson: Malware; Lesson: Threat Actors. Securing Your Computer: Learn some tips and. Learn how to best demonstrate your cybersecurity knowledge by practicing these 8 common questions before your next job interview. View Codecademy's cyber security risk rating against other vendors' scores. Explore cyber risks, data breaches, and cybersecurity incidents involving. Codecademy has hundreds of free and easy to use cheatsheets that cover dozens of coding languages and are created by our world-class curriculum developers. Cryptography helps keep information secure and is a critical part of #cybersecurity. Check out these 7 programming languages that will help. certification or sharpening your skills in cybersecurity, PluralSight has great opportunities for you to learn and build your skills. Codecademy. Training and. Tips for developing a cybersecurity growth mindset · Start believing that anyone can learn, including you. In Jack's and Anna's case, Jack did not have the. Codecademy. Review Nudge Security's complete security profile for Codecademy novoberezansk.ru SECURITY PORTAL. BUG. Cheatsheets / Introduction to Cybersecurity. Case Studies & Looking Ahead. Security Culture Poor security culture can lead to poor security. Everyone. It's considered a fundamental necessity, and in this introduction to cybersecurity course, you'll learn how to protect yourself and others from online attacks. Cybersecurity Articles · Authentication and OAuth. Cybersecurity, · Authentication vs Authorization vs Encryption. Cybersecurity, · Binary Application Attacks. Day Python. novoberezansk.ru; Complete Codecademy's Learn Python Track: novoberezansk.ru; novoberezansk.ru Cybersecurity: What Is Malware? Malware is Learn More on Codecademy. Free course. Introduction Learn about the fast-growing field of cybersecurity and how. Codecademy: A Comparison for Students. A detailed Codecademy. Both Springboard and Codecademy are Cybersecurity Bootcamp · Take our quiz · All courses. Cybersecurity is a framework for safeguarding computer systems and networks from a variety of threats, including hackers, malware, and data breaches. Effective. Code academy provides SQL and Python. I am really dedicated to learn this for a website I'm working on. I think having a firm grasp in the. Codecademy, from Skillsoft since the acquisition announced in December ,is a web and mobile-based platform that teaches employable digital skills to. cyber security explain. Web cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. Codecademy made it more. The cybersecurity community is vast and offers abundant resources for professionals and job seekers to connect with one another, learn, take part in events, and. Ready to begin, change, or propel your career? Take our industry-leading courses in cybersecurity, Python, networking, Internet of Things, and data science. Jax Code Academy Tech Bootcamps. Quick entry into Spend a weekend immersing yourself in Web Development, Coding, Cybersecurity, DevOps, AI & Machine Learning. codecademy. Codecademy. Follow. novoberezansk.ru_. Python Programming. Follow | tech | cybersecurity हिंदू. Follow. nokelectronicsgh. CODECADEMY. Build skills that help people and organizations grow together. CYBERSECURITY. Increase awareness and mitigate risk with personalized cybersecurity. Codecademy: novoberezansk.ru; Concordia: novoberezansk.rudia-heu/concordia-service-cybersecurity-skills/; Coursera: novoberezansk.rura.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817670.11/warc/CC-MAIN-20240420153103-20240420183103-00621.warc.gz
CC-MAIN-2024-18
4,772
5
https://downloadbi.com/tag/hacker/
code
Learn Bootstrap in 5 minutes | Responsive Website Tutorial | Code in 5 In this video, we will make our local webpage responsive using the Bootstrap framework. Learn about linking Bootstrap to your index.html, create rows and columns, and make your website responsive easily! Check out my courses on LinkedIn Learning! Need some new tech gadgets or a new charger? Buy from my Amazon Storefront Code from Last Time | Download Sublime | Blog Post | Support me on Patreon! Check out my Python Basics course on Highbrow! Check out behind-the-scenes on my Instagram! Free HACKATHON MODE playlist: MY FAVORITE THINGS: Stitch Fix Invite Code: FabFitFun Invite Code: Uber Invite Code: kathrynh1277ue Postmates Invite Code: 7373F SoulCycle Invite Code: Want more coding help? Sign up for a one-on-one session with me on codementor | #Learn #Bootstrap #minutes #Responsive #Website #Tutorial #Code
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506646.94/warc/CC-MAIN-20230924123403-20230924153403-00875.warc.gz
CC-MAIN-2023-40
886
19
https://www.lullabot.com/engineering-values
code
Our Engineering Values We are a team with a wide variety of backgrounds coming together to build systems to solve complex problems. We combine strategy, user interface design, and code, into cohesive software solutions. Together, this work forms a practice of software engineering. You may not think of yourself as an engineer, but what we do at Lullabot collectively is engineering. When we say engineering, we mean you. These Engineering Values exist to guide our team in the work we produce and the interactions we have with each other. These values overlap and expand on our Core Values - they’re not a hierarchy or a tree. When solutions aren’t obvious, or there’s conflict, we use these values to ground our decisions. People matter more We build systems and processes for people first — and if we forget or ignore those people, our systems become a source of dread, rather than a source of delight. A project that launches on time and on budget, but burns out a team, isn’t successful. Helping others keeps us connected, even when we’re separated by great distances. In our work, we use many tools as a means of communication, such as instant messaging apps, project management apps, version control, and peer review workflows. Sometimes, the tools we use to communicate can be a blunt instrument for human dialog. We strive to be aware of the limitations of the tools we use and keep in mind that they are a means to engage people and not an end in themselves. The work we produce is not separate from the world in which we live. We value human safety and security. While we do not always have direct control over how our work is used, we aim to create products that do not actively harm any one group. We draw on our empathy to build tools and products that equitably empower everyone who uses them, considering the impact of unintended consequences. We value diversity and inclusion. Beyond its intrinsic value, inclusion has an impact on a technical level. Our overarching goal is to identify or to be the experts and advocates for people who are not directly represented by our project teams. For example, we seek out the voice of the end-user, because client perspectives can sometimes miss key factors that only a user would know. We work towards equitable teams so that our work reflects the diverse world we live in. And, we continuously evaluate and respond to feedback, because the voices that are missing are going to be different from project to project. We cultivate inclusivity at a technical level by building accessible products because the software we build should function for everyone. Sometimes that means educating our clients about the importance of accessibility. Further, we aspire to work using tools that are accessible themselves and seek to use accessible language and technologies in our documentation so that differently-abled people can work on both sides of the keyboard. Learn and share We find our work fulfilling because we are always given the opportunity to learn something new. We like to work on new, unsolved problems instead of applying the same solutions to the same problems. Learning and sharing, with ourselves, our clients, and open communities are woven through all the work we do day by day. We believe that the best engineering comes from sharing and building together as a group. We embrace open-source software and processes. The process of open code-review keeps us innovating, and saves us from reinventing the wheel. By integrating collaboration into our daily work, we create the space for our team to ask for help and to be generous with their knowledge. Excellence balances perfect and done We find the balance between getting things done and architectural zen. When we solve tricky software engineering problems, we also consider when we are seeing diminishing returns. Rather than creating in isolation, we iterate using real-world feedback and quantitative results to evaluate our work. Some projects need tactical engineering measures that are not meant to last. Other times, we discover new information, and we need to stop working to discuss the options again. Not all project scenarios are ideal, but we partner with our clients to find out what will work best for them. Code for the future We think about the big picture before making important decisions. Creating a system to solve a complex problem is only the first part of a software project. Good systems last because they are maintainable and also maximize value for the client. Others will inherit our work and need to improve and maintain it. We don’t have perfect memory and know that sometimes the inheritors are just “future us”. We optimize code for future readers, even if that means using more verbose language or limiting the use of uncommon language features. Automating away repetition for ourselves, the community, and our clients is deeply gratifying. Automation promises to reduce technical debt in our code, make our processes more robust, and save time and money. However, automation can also add unnecessary complexity and waste time. Just because we can automate something doesn’t mean we should. Work joy into work As engineers, we have a tendency to look at technical challenges as fun puzzles to be solved. We try things, we break things, and we try again. We come back to work each day because we enjoy tinkering with the systems we build. When planning our work, we strive to leave room for joy, even with tight deadlines and exacting requirements. Making room for joy empowers us to find possibilities instead of problems and to accept criticism with an open mind. Even amid extreme technical challenges, we find something to smile about — whether that’s a new skill learned, a helpful teammate, or wistfully deleting code we loved. Together, we smile in the face of adversity, freeing us to find elegant solutions to the toughest problems. This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License and is also available on GitHub.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817181.55/warc/CC-MAIN-20240417204934-20240417234934-00226.warc.gz
CC-MAIN-2024-18
6,046
22
https://community.asterisk.org/t/how-to-code-app-android/72837
code
hello everyone, please help me. I have a preconfigur asterisk switchboard I want to write a simple application that makes a voip call. But I do not know how. So, How to code the android app to hear calls based on asterisk switchboard. Thanks very much! You have already asked this question. I would suggest that responders only answer the Build a simple android voip calling app android
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400210616.36/warc/CC-MAIN-20200923081833-20200923111833-00189.warc.gz
CC-MAIN-2020-40
386
2
https://www.manageengine.com/za/microsoft-365-management-reporting/help/tenant/modify-restapi-permission.html
code
Steps to modify REST API permissions Though we suggest providing all the recommended permissions, organizational requirements may not allow this. In this section, you will learn how to modify the REST API permissions for an already configured tenant. If you are looking for a way to configure a tenant with only the permissions you require, please configure it manually. Prerequisite: The tenant has been successfully configured in M365 Manager Plus and REST API is enabled for it. - Log in to the Azure AD admin center. - Click Azure Active Directory from the left pane. - Choose App registration under Manage. - Select All applications. - Search for the application name from step 7 of the previous section and click it. - Select API Permissions under Manage. - Choose Microsoft Graph. - Click expand all to view all the permissions already granted to this application. - Add, remove, or modify permissions as per your requirements. - Click Update permissions. - Select the Grant admin consent for domain_name option found at the top of the permissions table. - Choose Yes in the box that appears. - You have now successfully modified the permissions required by the REST API application. Steps to modify a Microsoft 365 tenant - Click the Tenant Settings option found in the top-right corner. - You will see the list of Microsoft 365 tenants configured in M365 Manager Plus. - Under the Actions column, click the corresponding to the tenant you need to modify - Click the icon adjacent to Application Details/Service Account Details to modify the corresponding values. - Click Update once you have made the changes.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100381.14/warc/CC-MAIN-20231202073445-20231202103445-00334.warc.gz
CC-MAIN-2023-50
1,618
22