url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://gis.stackexchange.com/questions/325752/how-to-update-attribute-of-selected-features-in-arcmap-with-a-shortcut
code
I have to edit/move/create/delete a no of polygons based on their respective comparison with reality. For all the polygons that I've moved, I have to update a field called remark as "U". This is really annoying to switch everytime to the attribute window and update the same. Is there any shortcut/add-in/extension that could enable this step in a single click(shortcut key) or automated if possible? Liscence is Basic for ArcMap 10.3
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476137.72/warc/CC-MAIN-20240302215752-20240303005752-00635.warc.gz
CC-MAIN-2024-10
434
3
http://stackoverflow.com/questions/1198369/iboutlet-like-constructs-in-the-objective-c-runtime
code
Yes, IBOutlet and IBAction are just thrown away by the parser at the precompilation stage, so there's nothing in the compiled output. And as noted above, they're just textually processed by Interface Builder so that it knows what subset of properties/methods to make available to the connections window. However, that doesn't stop you doing the same thing yourself - you could just define some #define that are compiled away by the preprocessor, and using textual processing manipulate them. But none of these are available at runtime, which means that you can't really do what you propose. It's technically possible to write a macro that would do some manipulation of a property/ivar and then add extra information to a different ivar; for example: #define OUTLET(type,name) type name;BOOL property_##name; @interface Foo : NSObject would expand to @interface Foo :NSObject and you could then use the existence of property_foo to do something with your code (which should be detectable at runtime as well as compile time). I wouldn't recommend trying to do this generally though ... for a start, it will make your interface (and therefore memory objects) larger than they'd need to be. You'd be better off creating your own class (or struct typedef) to hold the additional information you want.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345768787/warc/CC-MAIN-20131218054928-00059-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
1,295
9
http://www.tomshardware.com/forum/264982-29-high-multiplier
code
I've been doing some research on overclocking, and have been tweaking my own set up. I noticed that it is commonly accepted that your FSB:DRAM ratio is ideally equal to 1. In order to do this you would need a low CPU multiplier and a high BCLK frequency in order to keep your CPU stable. Currently I'm running: i7 920 @ 3800mhz with 12gb ram at 1600mhz FSB:DRAM ratio is 2:8 (200:800) My main question is whether a high multiplier is better than a low multiplier. Does it matter at all? You should try to run the highest stable BCLK, since that speeds up more than just the processor, and then adjust your multiplier accordingly.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084892802.73/warc/CC-MAIN-20180123231023-20180124011023-00247.warc.gz
CC-MAIN-2018-05
629
6
https://forums.rocket.chat/t/backing-up-and-restoring-rocket-chat-docker/13216
code
Hi. I’m only able to check the logs on the main Rocket.Chat instance, but not on the new one I’m trying to move to. Logging in with my admin account (which should exist on the new instance), logs me in, but I’m asked to create a new admin account. When I do, I’m given a normal user account and can’t access the admin settings. My goal is to be able to back up Rocket.Chat fully, and be able to restore if there is a failure, or move to another Docker host. The thing is I have had this issue for 3 months and if a failure occurs I could lose all the Rocket.Chat data, so I’m trying to get it done ASAP.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662515501.4/warc/CC-MAIN-20220517031843-20220517061843-00278.warc.gz
CC-MAIN-2022-21
615
3
https://skillsmatter.com/skillscasts/4906-pacman-kata-4906
code
SkillsCast coming soon. In this Coding Kata you'll create your own AI for the ghosts inside a fully animated implementation of Pacman. There will be sample implementations for Windows Desktop, Android, iOS and Web with FunScript. YOU MAY ALSO LIKE: Phil is an active member of the software development community, regularly attending and speaking at user groups and conferences, blogging and contributing to open source projects. He is a co-organizer of the London F# User Group and a founding member of the F# Foundation.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578610036.72/warc/CC-MAIN-20190423174820-20190423200820-00428.warc.gz
CC-MAIN-2019-18
521
4
https://www.splunk.com/en_us/blog/tips-and-tricks/the-ssl-performance-odyssey.html
code
When you come to dev.splunk.com, you see pictures of beer pong, full bars, stuffed ponies with fart machines taped to their ass, etc – basically engineers gone wild. Somewhere between all of this insaneness, we actually find the time to write code and solve problems like this one.This post is all about a crazy-weird performance issue that we were experiencing, how it manifested itself and ultimately how it was fixed. I suspect others may be having this problem, as the problem lives in some very popular open source code as far as I can tell. With that, I’ll begin telling you about my journey into hell. Splunk has a home grown embedded HTTP(S) server that serves up all external interfaces to the ‘splunkd’ daemon. We use it as the core engine for our REST and XML/RPC-like API’s. The GUI and the CLI both end up talking to the daemon via this server. When I wrote the core of it a few months ago, I ran some rudimentary performance tests on several platforms and it seemed decent enough for our use, but a week ago, the manager of the Search and Indexing team (Stephen) said that he was seeing abysmal performance using SSL. He said that the GUI performance was being impacted. I didn’t believe him and insisted that it was something else and that he was high. So to prove to him that it wasn’t my server, or my problem like all engineers do, I gave him a small python script that hits the server in a tight loop and we checked the performance. It sucked. Continuing with the theme of “this isn’t my problem” – I told him it was probably the handler of the request that was doing something that made the server seem slow. This is when he laughed at me and said “watch this”: He proceeds to turn off SSL, re-run the same test and the performance of the server goes up by approximately 50X. 50 times faster! I know that SSL is slower than non-encrypted streams, but there was no way this was the problem. Whoa! We can’t ship this way. This needs to be fixed! In fact, a very small HTTP request (approx. 80 byte) with a small reply (approx. 300 bytes) was operating at only 23 requests/sec! When he turned off SSL, he was getting over 1000 req/sec! What??? So, of course I tried the same test on my OSX laptop and I got 130+ req/sec – within the realm of reasonable and certainly better than 24. I then tried running the server on my laptop and the client on my Linux Fedora machine resulting in basically the same performance. Why does this work on my hardware and not his? Finally, I switched the server and client by putting the server on my Linux box and the client on my Mac. I re-ran the test and damned if the performance didn’t completely suck! I was getting 20 or so request-replies per second over SSL. But, why does the OS matter? I didn’t get it. My SSL Performance Bug Diary - Broke out ssldump. Here is a snippet from an OSX client and a Linux server. Note the third C->S line of .0398 seconds. This is the cause of the slowdown, but why? - Spent 2 hours looking over every possible OpenSSL build option and try turning various ones on and off. No difference. (score: Bug 1, Rob 0) - Spend many hours trying different crypto combinations. Little difference beyond the obvious and documented performance differences. (score Bug 2, Rob 0) - Perhaps I need to throw in server-side SSL caching. I throw it in, with the assumption that the python client implements client-side SSL caching. No performance change. (score: Bug 3, Rob 0) - Thinking it might be the Nagle algorithm, I modify my test to send larger requests and guess what? The performance is normal again! I try to find out exactly when it turns from slow to fast (as far as the request size) by trying request sizes of 1, 2, 4, 8, 16, 32……..16K bytes. Wow, just around 1300-1400 bytes is where the performance goes from sucks to fast. Look at the graph below. See the spike? Hmmm….. (score: Bug 3, Rob 1) - I change the MTU on the server from the default of 1500 bytes to 1000 bytes. The performance cliff now is lowered to somewhere in the 800-900 byte range. The MTU is the key! (score: Bug 3, Rob 2) - It’s got to be the Nagle algorithm. I try turning off the Nagle algorithm on the server. No performance change. (score: Bug 5, Rob 2) - I give the problem to our performance engineer. He can reproduce it. I suck. - Decide to try ssldump again and this time try a different test – curl sending the same size request as in the python test. I want to compare timings. BINGO. It’s not the server, it’s a combination of the server running on Linux and Python. (score: Bug 5, Rob 3). Notice in the following curl ssldump image, the single C->S line and the fast .0007 second timing. Contrast this to the previous ssldump image and here enlies the problem : - Now to fix it. It really really seems like Python is the problem. I try it with urllib2. Same thing. - I try it with httplib2. Same thing. - I look at the code for urllib2 and httplib2 and guess what? They both use httplib. The problem must be in httplib. I dig into the code and start commenting shit out and looking at the resulting ssldump output to figure out *exactly* which write is causing the damage. I find the bug. (score: Rob wins) The Problem and the Fix I forgot to tell you that we are using Python 2.5. It turns out that httplib.py sends requests over the wire in 2 chunks. The first chunk is comprised of the HTTP headers. The second chunk is the body. The fix I made appends the body to the headers and sends the request in 1 chunk only. This is what curl does and this fixes the performance problems. Here is the fix for download: Here is my final data: Things I Still don’t Understand Because it seems to work and this took so damn long, I am not going to do any further investigations, but there are still many unsolved mysteries. Perhaps one of you can figure them out. - Why the extreme falloff on linux where both the client and server are on the same machine at 16K request/reply size? - Why is OSX so much slower than linux? - Why does the new code speed up linux only? - Notice that only the OSX box gets the speed up at the MTU, the Linux box continues the slow performance regardless of the MTU Windows to Linux Performance Numbers (added 2/5/08) So I added a Windows to Linux graph based on the first comment I received below. Yes, we do test with Windows, and yes, it is not out yet (but will be soon). The problem manifests itself exactly like it does on other platforms. Notice the difference: Specs on the Test Hardware - Dual Core, very fast, lots of Ram (will provide detailed specs in a bit) - 3.4Ghz P4, Hyperthreaded, 2G Ram - Mac Pro Laptop - 1.8Ghz Pentium Core II duo (2 cores), 3G Ram
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945333.53/warc/CC-MAIN-20230325130029-20230325160029-00735.warc.gz
CC-MAIN-2023-14
6,711
39
http://cloudcomputing.sys-con.com/node/2536946
code
|By Business Wire|| |February 12, 2013 01:16 PM EST|| This is not a news flash: Payments is about the most complex platform industry there is and igniting innovation in payments is anything but a given these days, even if a company is doing it within the construct of a successfully operating platform. The complexity, as we all know, rests with the discipline of having a strategy that can create the delicate balance across all stakeholders, deliver traction in a relevant timeframe and drive profits. But this perhaps is: “An abundance of evidence suggests that greater attention to the ways in which organizations and incentives shape the innovation process can produce significantly better results,” remarks Josh Lerner, Harvard Business School Professor and author of The Architecture of Innovation. This new book sheds new light on how corporations should organize their innovation initiatives in order to produce the best results: getting innovation to market and ignited. The implications to the payments industry are real and they are relevant. This topic, The Architecture of Innovation in Payments, is one of several interactive keynote sessions at The Innovation Project 2013, a two day gathering of senior executives in payments who are driving innovation in the payments and broader commerce ecosystem hosted by PYMNTS.com. Lerner makes the case in the book that Corporate R&D doesn’t necessarily yield the desired outcome. He points out in his book that as recently as the end of the 1990s, for those companies that organized innovation that way, R&D-driven innovation contributed less than 25 percent of the value of what investments in traditional assets would have produced for that company (e.g. supply chain efficiencies, cost reductions, etc.). Venture investing isn’t seen as the panacea either. Investments made by the entire venture capital sector over the course of any given year amount to much less than the R&D budgets of a single giant pharmaceutical firm like Merck or a automotive giant like GM. And, in 2011, venture-backed firms represented less than 10 percent of all publicly traded firms in the U.S. So, what would? Well, surprisingly, what many have already started to do. Simply stated, it involves having corporations invest in promising start ups, usually through a separate entity, and then creating an operating model that is helpful enough to the venture without drowning it in the corporate bureaucracy that would only slow things down – or worse. There are two forces of nature that are moving the industry in this direction. First, the largest players in the space are today funding dozens of “innovation experiments” focused on driving payments into the mobile realm, and more broadly expanding the reach of electronic payments. At the same time, access to new technologies and the availability of IP-enabled devices such as the smart phone and tablet reduced the barriers to entry for many an emerging venture to make a play for something new, innovative and game-changing. Hundreds of millions of dollars of venture money poured (and are pouring) into the sector to foster the “next” new thing in payments. In 2012 alone, more than $1 billion was invested in emerging payments firms by VCs. But as good (and well funded) as their great ideas might be, most of these ventures will need distribution and scale to ignite and access to the “incumbents” to make that happen in any sort of meaningful way. They’ll also need access to the people inside the organization who can “school” them on what it means to be in the payments business. Many of them have no clear idea of its complicated inner-workings. Those two forces, Lerner believes, sets up exactly the right environment for the right model for innovation in large organizations – corporate venturing – something that takes the best of both worlds and devises a structure, a framework and a set of incentives for advancing strategic goals and generating good returns on those investments. The Innovation Project 2013 interactive keynote session on The Architecture of Innovation in Payments will tackle this topic head on. Lerner and Diane Offereins, President of the Discover Network, will engage four C-suite innovators — all pioneers in designing and deploying innovation in payments — on a wide-ranging discussion of incentives, partnership strategy, innovation design, ignition obstacles and more. Offereins is credited with coming up with the idea to license the Discover network to other innovators to propel their innovation agenda four years ago. She will give Innovation Project 2013 delegates a peek inside the strategy that was used to develop and deploy this strategy internally, and use that to engage the panel on the impact of that strategy on innovation inside of the payments sector. Panel participants include: - Chris Gardner, co-Founder and CEO of Paydiant, a cloud-based solution that enables banks and merchants to accept payments via the mobile phone. Gardner will share his thoughts on how he and Paydiant have aligned incentives for innovation with some of the biggest bank and merchant partners in the US. - Mike Kennedy, Chairman of ClearXchange and EVP for innovation at Wells Fargo, will describe ClearXchange’s blueprint for getting the three biggest banks to the table around a new idea, and how that framework may change in order to take ClearXchange to the next level of innovation in mobile payments. - Chitra Narasimhan, Managing Director at CitiVentures, will offer her insights about how to structure and incent innovation inside huge financial institutions and provide support to emerging ventures without overwhelming them in corporate bureaucracy. - Mike Pasilla, CEO of Elavon, will describe how innovation works at Elavon and explain how he attracts and retains key partnerships while balancing the requirements of his bank parent company, and payments regulatory environment. The Innovation Project 2013 is being held on March 20-21 at Harvard University. For information on how to register and for a look at the entire programming line up, please visit theinnovationproject2013.com. About The Innovation Project Over 2 days, more than 100 speakers and 500 senior members of the payments industry will change the way that the payments and its broader commerce ecosystem thinks, talks, delivers and ignites innovation. On March 20th and 21st the greatest minds in commerce and payments will assemble at Harvard University near Boston to kick the conversation about innovation up to an entirely different level at a program called The Innovation Project. Speakers and delegates are among the most senior executives and elite innovators from literally every established payments company worldwide, along with the CEOs/founders of the most innovative start-ups. One of its five modules includes pairing industry CEOs with external thought leaders such as Al Gore (former US VP), Steve Levitt (Freakonomics), Eric Reis (The Lean Start Up), Rosie Rios (US Treasurer), Russell Simmons (Rush Card), Raj Date (CFPB), and Josh Lerner (Architecture of Innovation) to challenge the conventional wisdom around what it will take to get merchants and consumers to adopt new ways to shop and pay. Warren Buffett is the program’s keynote. The Innovation Project also hosts the industry’s 2013 PYMNTS.com Innovator Awards, given to 15 of the industry’s top innovators over dinner, which this year will be emceed by B.J. Novak of The Office and will introduce delegates to 40 of the hottest “next generation” payments innovators. The ThinkAThon will challenge a small group of delegates to frame solutions to tough industry problems and compete in front of delegates and judges for the title of “Master Payments Guru 2013.” PYMNTS.com is reinventing the way in which companies in payments share relevant information about the initiatives that shape the future of commerce and make news. This powerful B2B platform is the #1 site for the payments industry by traffic and the premier source of information about “what’s next” in payments. C-suite and VP level executives read it daily for these insights, making the PYMNTS.com audience the most valuable in the industry. It provides an interactive platform for companies to demonstrate thought It provides an interactive platform for companies to demonstrate thought leadership, popularize products and, most importantly, capture the mindshare of global decision-makers. It’s where the best minds and best content meet on the web. Five years ago development was seen as a dead-end career, now it’s anything but – with an explosion in mobile and IoT initiatives increasing the demand for skilled engineers. But apart from having a ready supply of great coders, what constitutes true ‘DevOps Royalty’? It’ll be the ability to craft resilient architectures, supportability, security everywhere across the software lifecycle. In his keynote at @DevOpsSummit at 20th Cloud Expo, Jeffrey Scheaffer, GM and SVP, Continuous Delivery Busine... Apr. 26, 2017 07:45 AM EDT Reads: 693 NHK, Japan Broadcasting, will feature the upcoming @ThingsExpo Silicon Valley in a special 'Internet of Things' and smart technology documentary that will be filmed on the expo floor between November 3 to 5, 2015, in Santa Clara. NHK is the sole public TV network in Japan equivalent to the BBC in the UK and the largest in Asia with many award-winning science and technology programs. Japanese TV is producing a documentary about IoT and Smart technology and will be covering @ThingsExpo Silicon Val... Apr. 26, 2017 07:30 AM EDT Reads: 8,793 DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm. Apr. 26, 2017 07:00 AM EDT Reads: 734 SYS-CON Events announced today that CollabNet, a global leader in enterprise software development, release automation and DevOps solutions, will be a Bronze Sponsor of SYS-CON's 20th International Cloud Expo®, taking place from June 6-8, 2017, at the Javits Center in New York City, NY. CollabNet offers a broad range of solutions with the mission of helping modern organizations deliver quality software at speed. The company’s latest innovation, the DevOps Lifecycle Manager (DLM), supports Value S... Apr. 26, 2017 06:00 AM EDT Reads: 716 SYS-CON Events announced today that Hitachi, the leading provider the Internet of Things and Digital Transformation, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Hitachi Data Systems, a wholly owned subsidiary of Hitachi, Ltd., offers an integrated portfolio of services and solutions that enable digital transformation through enhanced data management, governance, mobility and analytics. We help globa... Apr. 26, 2017 05:30 AM EDT Reads: 1,050 SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in compute, storage and networking technologies, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology, is a premier provider of advanced server Building Block Solutions® for Data Center, Cloud Computing, Enterprise IT, Hadoop/... Apr. 26, 2017 04:45 AM EDT Reads: 2,148 Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic... Apr. 26, 2017 04:30 AM EDT Reads: 5,292 SYS-CON Events announced today that Juniper Networks (NYSE: JNPR), an industry leader in automated, scalable and secure networks, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. The company co-innovates with customers and partners to deliver automated, scalable and secure network... Apr. 26, 2017 04:15 AM EDT Reads: 1,226 Building a cross-cloud operational model can be a daunting task. Per-cloud silos are not the answer, but neither is a fully generic abstraction plane that strips out capabilities unique to a particular provider. In his session at 20th Cloud Expo, Chris Wolf, VP & Chief Technology Officer, Global Field & Industry at VMware, will discuss how successful organizations approach cloud operations and management, with insights into where operations should be centralized and when it’s best to decentraliz... Apr. 26, 2017 04:15 AM EDT Reads: 523 @GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Analytic. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter. Apr. 26, 2017 04:15 AM EDT Reads: 1,069 Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at Dell EMC, introduced a methodology for capturing, enriching and sharing data (and analytics) across the organization... Apr. 26, 2017 03:15 AM EDT Reads: 6,606 Developers want to create better apps faster. Static clouds are giving way to scalable systems, with dynamic resource allocation and application monitoring. You won't hear that chant from users on any picket line, but helping developers to create better apps faster is the mission of Lee Atchison, principal cloud architect and advocate at New Relic Inc., based in San Francisco. His singular job is to understand and drive the industry in the areas of cloud architecture, microservices, scalability ... Apr. 26, 2017 03:00 AM EDT Reads: 3,477 SYS-CON Events announced today that T-Mobile will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. As America's Un-carrier, T-Mobile US, Inc., is redefining the way consumers and businesses buy wireless services through leading product and service innovation. The Company's advanced nationwide 4G LTE network delivers outstanding wireless experiences to 67.4 million customers who are unwilling to compromise on ... Apr. 26, 2017 02:45 AM EDT Reads: 1,022 The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu... Apr. 26, 2017 02:30 AM EDT Reads: 1,455 Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr... Apr. 26, 2017 01:45 AM EDT Reads: 1,334 New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists will examine how DevOps helps to meet th... Apr. 26, 2017 12:45 AM EDT Reads: 1,343 With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p... Apr. 26, 2017 12:45 AM EDT Reads: 1,052 With billions of sensors deployed worldwide, the amount of machine-generated data will soon exceed what our networks can handle. But consumers and businesses will expect seamless experiences and real-time responsiveness. What does this mean for IoT devices and the infrastructure that supports them? More of the data will need to be handled at - or closer to - the devices themselves. Apr. 26, 2017 12:00 AM EDT Reads: 682 Grape Up is a software company, specialized in cloud native application development and professional services related to Cloud Foundry PaaS. With five expert teams that operate in various sectors of the market across the USA and Europe, we work with a variety of customers from emerging startups to Fortune 1000 companies. Apr. 25, 2017 11:15 PM EDT Reads: 2,324 Financial Technology has become a topic of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 20th Cloud Expo at the Javits Center in New York, June 6-8, 2017, will find fresh new content in a new track called FinTech. Apr. 25, 2017 11:00 PM EDT Reads: 2,350
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121305.61/warc/CC-MAIN-20170423031201-00415-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
18,716
58
http://www.webassist.com/forums/post.php?pid=133424
code
There is one change I can't find how to do. If you click on home, it is going to the original domain name (milemarkersports.com). I've managed to find most of the changes, I think. Where do I find the link setting for the home button? I can't see it anywhere in the database for content, nor in the CMS.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583705737.21/warc/CC-MAIN-20190120102853-20190120124853-00022.warc.gz
CC-MAIN-2019-04
303
3
https://libguides.vu.nl/rdm/data-documentation
code
Data documentation aims to describe the collected data to make it easier to use, retrieve and manage. Data documentation takes various forms and describes the data on multiple levels. The description of the dataset and data object is also referred to as metadata, i.e. data about the data. One way to do add metadata is to attach a readme file to your data. ResearchData NL offers guidance for this. There are more ways to document your data, for example: Add an extra tab with explanation of the columns |Set of interviews|| Add a readme file to explain the coherence between the files |Collection of datasets used for a publication|| add a readme file that lists the period of research, collaborators, etc. In addition to describing their own datasets and objects, researchers can cross-refer to the project proposal where other researchers can find information about the research, e.g. aims and goals, methodology and data collection, the persons responsible for the project etc. The type of research and the nature of the data also influence what kind of documentation is necessary. Different types of data are governed by different standards (see also the image above), and these should be taken into account when documenting data. These requirements include, but are not limited to:
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703499999.6/warc/CC-MAIN-20210116014637-20210116044637-00431.warc.gz
CC-MAIN-2021-04
1,288
9
https://groups.google.com/g/pdx-visualization/c/acmPCt-swDs
code
I'm trying an experiment for a new type of meetup group: "No talks. You may opt to take up to 60 seconds to complain about Big Data. One paper per month, no obligation to read it." Follow @PDXBigData on Twitter to keep up. (Also experimenting with using Twitter to do the planning instead of another Google Group.) Hope to see you there! (apologies to those who also got this from the hadoop mailing list!)
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711394.73/warc/CC-MAIN-20221209080025-20221209110025-00153.warc.gz
CC-MAIN-2022-49
406
4
https://arthur.io/lorraine-kiang
code
Director at Edouard Malingue Gallery Showing emerging and established artists such as Laurent Grasso, Los Carpinteros, Fabien Mérelle, Yuan Yuan, Charwei Tsai, Callum Innes, Lee Kit, João Vasco Paiva, Nuri Kuzucan, Wang Zhibo, Sun Xun, Song Hyun Sook, Cui Xinming, Chi-Tsung Wu. Arthur is a digital museum We haven't opened yet, but somehow you found us. Join the list for early access.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704795033.65/warc/CC-MAIN-20210126011645-20210126041645-00766.warc.gz
CC-MAIN-2021-04
388
4
https://techsupport.sds2.com/main/Topics/p_remove.htm
code
Remove ( Modeling & Drawing Editor ) Tool summary : - Opens a list of members. Select from that list those members whose piecemarks you want to remove. - You can remove user or system piecemarks. - The next time the member(s) undergo Process and Create Solids , they will be assigned system piecemarks , and all like members will receive the same system piecemark. - Removing a piecemark also removes the member detail associated with that piecemark. - See the step-by-step instructions . Also see : - Applications of Remove Piecemarks (topic on SDS2 Piecemarking page) - Combine/Break Apart Piecemarks (lets you rename piecemarks) - Change User Piecemarks to System (system piecemarks are automatically named) - Change from System Piecemarks to User (user piecemarks are user-named piecemarks) - Edit Member (a way to change system piecemarks to user) - Change Marks (change piecemarks without changing to user) - Detail Sheet Autoloading (change piecemarks without changing to user) - Piecemarking in SDS2 Programs (topic) Step-by-step instructions : 1 . To invoke Remove Piecemarks : Method 1 : Click the Remove Piecemarks icon, which is pictured above. The icon can be taken from the group named ' Edit -- Edit Piecemarks ' ( Modeling ) or ' Edit -- Edit Piecemarks ' ( Drawing Editor ) and placed on a toolbar (classic) or the ribbon (lightning). Method 3, 4 or 5 : Remove Piecemarks can also be configured to be invoked using a keyboard shortcut , the context menu , or a mode . For the lightning interface, this configuration is done using Customize Interface . 2 . A selection window opens. On it is a list of all piecemarks (both user and system ) which have been assigned to members in the 3D model. Each member is listed its member number [in brackets] and piecemark . |" Hide ... " and " Show All " can be used to adjust which classes of members are shown on the selection list. By default, members with frozen piecemarks are not shown.| |Tip: The " Print " button outputs the list that is shown on this selection dialog by default. That is, it prints the list of all piecemarks that can be removed. These are all piecemarks except frozen piecemarks .| 3 . Member details associated with the members whose piecemarks you have removed are deleted at the time the piecemarks are removed. Those members will receive system piecemarks during the Assigning Piecemarks phase of Process and Create Solids. This phase can take place, for example, when you press " OK " on the member's edit window. After a member has been assigned a new piecemark, you can auto detail it again.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511364.23/warc/CC-MAIN-20231004084230-20231004114230-00574.warc.gz
CC-MAIN-2023-40
2,581
24
https://www.se7ensins.com/forums/threads/can-i-just-use-the-script_network-for-and-iso.931949/
code
Wait, I am confused. What are you trying to do? Are you asking if you can just use the script_image, versus using the script_image, script, common, etc. I for one ONLY use the script_image. Like the other person said, you will be limited though. It doesn't bother me, because I can use everything I want without going over the maximum size.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703565541.79/warc/CC-MAIN-20210125092143-20210125122143-00331.warc.gz
CC-MAIN-2021-04
340
1
http://stackoverflow.com/questions/6241803/cant-manage-to-put-data-into-my-database
code
I am using Symfony 2.0 beta3 and I am facing a rather strange problem. I have set up the ORM with a sqlite database following the instructions of the website but when I type: php app/console doctrine:database:create php app/console doctrine:schema:create php app/console doctrine:schema:update --force I don't get any error (for example last command outputs "Database schema updated successfully") but nothing is actually inserted into the database. The table aren't even created. The database file is generated after the first command but remains empty. Since I have configured FOS_UserBundle I should have for example a table fos_user… When I type php app/console doctrine:schema:update --dump-sql It shows that three SQL requests are pending… If I execute these three requests using SQLiteManager, it works (so the fos_user table is created) but when I want to create a user using: php app/console fos:user:create I get a "SQLSTATE[HY000]: General error: 1 no such table: fos_user " error. Why am I not given some error message when I run the first three commands? Am I missing something? I face the same behaviour using pdo_pgsql driver, except that the SQL generated by the dump is not ANSI compliant so it can't be executed for postgresql (use of datetime and autoincrement instead of timestamp and serial)…. Any help would be much appreciated
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461861700245.92/warc/CC-MAIN-20160428164140-00167-ip-10-239-7-51.ec2.internal.warc.gz
CC-MAIN-2016-18
1,355
13
https://forum.level1techs.com/t/need-a-new-screen-for-an-acer-aspire-v7-laptop-where-should-i-buy-it/96611
code
I have a friends laptop here and it needs a new screen. I was wondering if anyone could suggest a place for me to get it without costing an arm and a leg (just an arm is fine). I would need to have it shipped to Canada or be bought within Canada. I found one on Amazon from a 3rd party seller but I'm open to other options. You need to disassemble and get the p/n on the back of the screen. When you get that, do a ebay/alibaba/amazon search, or just use google shopping. p/n is you best bet to get a compatible one at a good price- don't just look up 'acer aspire v7 replacement screen' -this will give you varied results. Getting the product number wasn't something I thought of. I'll definitely take it apart and grab that. Finding out where to buy one is my biggest concern. Things like shipping and quality can make a difference. What's the hardware on the laptop and how's it battery life? Is it relatively new? Also if isn't too mobile just turn it into a desktop PC and hook up a monitor to it, or just buy a USB display The laptop is only a couple of years old so definitely worth fixing if it costs less than $100. My friend is in university and uses it in classes. He also doesn't have a computer monitor so the screen needs to be fixed unfortunately. He doesn't have the money for a new laptop. You can get a laptop for under $100, but ya, what they said, tear it apart That is one of the sites I saw, wasn't sure how reputable it was.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662545875.39/warc/CC-MAIN-20220522160113-20220522190113-00213.warc.gz
CC-MAIN-2022-21
1,447
7
https://astrologymemes.com/t/but-how
code
But how could he be so sure? Questions that remain without answer But how will they watch frozen? Black plague [OC] Forgive me father The beginning of the computer takeover A man’s skin Does this count as a programming meme? I love her, every kiss feels like a nap in a cloud it’s like a new room I’m not taking credit for this cause it wasn’t me, but how can someone get it this wrong? My friend asked me for a good opener for this girl with an exotic name that he matched, the rest speaks for itself Python gives you wings But How does it taste? thats how i be pullin up to the art school via /r/memes https://ift.tt/2WjZhMN thats how i be pullin up to the art school thats how i be pullin up to the art school by c0vr1g just boys bein boys When they talk about boys being boys, this is the kind of dumb ass, 4... Her bio read “you probably get this a lot but HoW BiG aRe ThEy” Are you sure? a thoughtful lad I’m in love Instagram post by The Best Of Tumblr • Aug 7, 2019 at 1:20pm UTC Me irl by mau5-head meirl by Bmchris44 There have been many portrayals of everyone's favourite villain, the Joker, but how does Joaquin Phoenix's version compare to others? 🃏📽️ I’m in love The woman in black is Loora Wang, she’s a fash... Date an engineer Big brain time. via /r/memes https://ift.tt/2MBTwrV Big brain time. Big brain by scott_smits
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594209.12/warc/CC-MAIN-20200119035851-20200119063851-00124.warc.gz
CC-MAIN-2020-05
1,364
33
https://www.fr.freelancer.com/projects/javascript-windows/monolith-interface-drive-dropbox-local/
code
Monolith is an interface for Dropbox / Google Drive or local file manager Interactive presentation: [url removed, login to view] Need a JS coder! 2 freelance font une offre moyenne de $700 pour ce travail hey, I can help with the script, i have experience with webdav and sharepoint and i worked with file sharing/management tools best regards
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864740.48/warc/CC-MAIN-20180622162604-20180622182604-00368.warc.gz
CC-MAIN-2018-26
343
5
https://lambdaconcept.com/index.php/shop/
code
LambdaConcept operates a web-shop for low-cost, off the shelf FPGA and IoT related products. Those products are sometimes difficult to obtain in small quantities, and we run the web-shop as a LambdaConcept service. For inquiries related to those products, please contact [email protected] The web shop for the off-the-shelf products/accessories can be reached at https://shop.lambdaconcept.com The LambdaConcept webshop is not our main business. We only maintain and operate this shop as a service to users of the various FPGA / IoT projects and the security research community. We do not operate this web shop with full-time staff, and shop processing is always at a lower priority than our engineering tasks. The webshop order handling is a fairly automatized standard process, and we kindly request you to order web-shop items only via the automatized process. Any manual RFQ/PO process will suffer from delayed processing, add a lot of overhead and we will not be able to offer the same prices as on the web-shop. Thanks for your understanding.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510334.9/warc/CC-MAIN-20230927235044-20230928025044-00343.warc.gz
CC-MAIN-2023-40
1,061
5
http://heysal.net/podcasts/
code
Please choose the podcast you’re interested in: The Hey, Sal Podcast is my first podcast, which I started in 2019. Season 1 featured many different guests from all walks of life (most of them living in Italy now), featuring their stories. It was mostly filmed in a theatre in Rome, Italy and broadcasted live. Season 2 is more topic-centered, with experts telling their transformational stories, which may be inspiring as we enter a post-Covid-19 world, but also hot button topics will be discussed. The Three-Headed Hydra is a new podcast, co-hosted together with James Egerton and Joshua William Dennison from the UK. We discuss several topics in the realm of psycho-/socio-/physiological topics and challenge each other, trying to bring different opinions into the conversation – thus the three heads. Main Gear (Affiliate links*): My Main camera: https://amzn.to/2NUbJj9 My VR camera: https://amzn.to/31Hj4dY Must-have lens: https://amzn.to/2YYzpsY My favorite USB mic: https://amzn.to/3gnffyy My main camera mic: https://amzn.to/31LuUDP My ABSOLUTE FAVORITE live performance mic: https://amzn.to/38vH0Cr My main lights: https://amzn.to/2YYeS7U *Should you purchase any of the products on Amazon, I might get a small percentage. With these I can cover the costs for hosting the website and the contents provided here. The good news is that this will have no effect on the price on your end, so you will always get the best deal.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506623.27/warc/CC-MAIN-20230924055210-20230924085210-00703.warc.gz
CC-MAIN-2023-40
1,436
14
https://leistonevents.com/volunteering/
code
We’re always in need of volunteers for all of our events. And when you’re a volunteer, you get to wear cool t-shirts and you get to meet some amazing people. You could* help out by: - Helping the committee to plan the events - Publicising events in advance - Setting up structures and pulling them back down - Planning sub-events in advance - Getting local groups interested in sub-events in advance - Co-ordinating sub-events on the day - Selling merchandise on the day - Helping on stage with sound and lighting - Taking photos - And lots more — tell us what you can do to help! Extra help on the day is always appreciated with setting up, marshalling or clearing away at the end. Check out our next event and get involved! * Obviously, all events are different and we might already have people booked for certain jobs, but get involved anyway. 🙂
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474690.22/warc/CC-MAIN-20240228012542-20240228042542-00040.warc.gz
CC-MAIN-2024-10
857
15
http://www.instructables.com/id/Remote-Control-Camera-by-Raspberry-Pi/
code
Introduction: Remote Control Camera by Raspberry Pi This instructable will guide how to: 1. Put camera to Local web (for remote vision through Computer or Phone) 2. Control camera vision (using gear motor) Step 1: Put Stream Camera Into Local Web (using "motion") $ sudo apt-get update $ sudo apt-get install motion $ sudo apt-get install libv4l-0 $ sudo apt-get install uvccapture $ gedit /etc/default/motion change "start_motion_daemon yes" (from "no") $ gedit /etc/motion/motion.conf change daemon on (from "off") stream_localhost off (from "on") framerate 100 (from "2") stream_maxrate 10 (from "1") $ service motion start $ motion start In case to stop camera: $ motion stop $ service motion stop Open web browser, input address: 192.168.1.71:8081 -> camera image should be on web browser (note: 192.168.1.71 is Raspberry IP address) Step 2: Make Local Server $ sudo apt-get install apache2 php5 libapache2-mod-php5 If everything is OK, local web will display in Web Browser after input address 192.168.1.71/index.html This "index.html" is saved in /var/www/html/ Step 3: Put "camera" and "IO Control" to Local Server On step 1, camera image is on stream (192.168.1.71:8081) On step 2, a local web server is made. So an php page is made in Local server to load camera stream, meanwhile this php page also have 2 button (turn left/right) to control camera For easy, whole project is save at this link (google share) Take above files, extract it, then save all files and folder into /var/www/html/ Step 4: Install Hardware GPIO of Raspberry (GPIO_0, GPIO_7, GND) is used to control Motor driver (H-Bridge L298N) Make camera base, install them all together as picture. Step 5: Test It! Open web browser, input address 192.168.1.71/camera.php Now we can test it, and see result We have a be nice policy. Please be positive and constructive.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945604.91/warc/CC-MAIN-20180422135010-20180422155010-00477.warc.gz
CC-MAIN-2018-17
1,841
40
http://forum.kink.com/index.php?p=/discussion/541/i-can-not-skip-videos-trailers-anymore
code
This is already present for a few months but I have decided to ask about it now. I was able to skip the videos before. For example I didn't want to watch the first seconds or repeat a scene I could jsut clikc on the bar and move it forward or move it back. But now it doesn't work anymore. When I click on the bar it start to replay from begin. I noticed this only happened to new videos. I can still select part I want to watch and move to this second.
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886103891.56/warc/CC-MAIN-20170817170613-20170817190613-00302.warc.gz
CC-MAIN-2017-34
453
2
https://schallbert.de/usbpd-explained/
code
DIY edge finder Touching off easily USB Power Delivery is a standard within the USB 3.x protocol that specifies power supply and voltage levels within the USB network. With USB-PD it is possible to daisy-chain consumers which then negotiate power demands with the source(s) automatically. The standard has different versions, of which the latest (2021) allows up to 5 Ampères at 3.3…48V and a maximum of 240 Watts of power. In the USB Power Delivery Standard, there are different roles that participants on the ends of an USB cable can play. They can be host or client for data purposes, and at the same time power source, power sink, or both for other participants. USB-C uses the acronym DFP or Down-Facing Port to make clear that the port is the one of a Host. UFP or Up-Facing Port is used for clients that can be connected to hosts. There’a third role, though: DRP or Dual-Role Port. This port can serve either as a host or as a client, depending on who the connecting partner on the other side of the cable is and what the USB network negotiates. In USB-PD context, any of those ports can be configured to be sinking or sourcing current. Example: Although a Laptop’s USB-C port’s role may be configured to DFP, when connected to a power source, it can still be a power sink. Hmm. In this post, I’m only using the UFP role in both USB-C and USB-PD word sense, meaning that I’m trying to configure a power sink for my device so that it will get the input voltage and current it needs. Not all sources (wall plugs, powerbanks etc.) can supply all Voltage levels or currents, or even share the same standard of implementation. But a number of values is pretty common: 5V, 9V, 12V, 15V, 20V. Some of the products I have seen on the market offer up to 4A, but most keep it with up to 3A and voltages up to 15V are most common (in 2021). ASIC stands for application specific integrated circuit, and in this post I’m trying to shed some light on ASICs with Power Delivery sink role that can work stand-alone, that is without an external control device such as a microprocessor. I found three types of these devices: What all ASICs have in common: They require peripheral circuitry to work - at least some resistors, capacitors, and power transistors to switch power supply and negotiate with connected power sources. Both the downwards compatibility and the scaleability of USB-PD take their tribute - the USB-PD specification is a >600 page monster and it’s not always clear which source or sink supports which protocol level. As both the source, sink, and the cable have to negotiate a Power Delivery contract based on the sink’s requirements, the source’s power options, and the cable’s capabilities, you can imagine that this process is very complex. Even more so as all participants may have implemented a different USB-PD standard, revision and version. Fun fact: The USB Power Delivery specification package’s zip folder on the official page has a file size of >42MB. Although I think this topic is very interesting, I don’t have the time to deep-dive into the specifics 😅 So, let’s leave all this stuff behind and try finding an easy-to-implement solution. I have arbitrarily chosen three ICs from the web, supplied by different companies, one each per device type: I’ll select the STUSB4500 first. For integration into my design, I wanted to buy some samples. Unfortunately, Chip shortages hit hard so that neither of the distributors that I normally order electronics parts with, had any in stock for the next year. That’s why I decided to order a development board with the ASIC readily mounted. This is 10x more expensive than the chip itself but I didn’t have a choice here. STUSB4500 is using the USB-PD Standard 2.0 - so not the latest greatest one - but downwards compatibility of later standards make it a quick and easy starting point for a maker. The device comes pre-programmed with three Power Delivery Objects: So for my AnywhereAmps Alpha 1.1 evolution 1.2 I can use this thing right out of the box without re-programming. If I wanted to change the Power Delivery Objects, I’d use an Arduino board with I2C and install STUSB4500 library which is readily available e.g. at Platformio. With this, I could even activate USB-PD 3.0’s Programmable Power Supply if I wanted. Let’s see, when I find the time, I’ll prepare a specific blog entry for programming STUSB4500. OK, so I connected the eval board to a 15V capable 30V USB-C power supply. The purple light indicates 15V available on the output rail. Now I attached my amplifier circuits at its output terminals for an initial test. STUSB evaluation board lights gone, amp off. Meh. At least I have an indicaton for what the cause might be: It’s capacitive inrush currents, again! To be able to properly power devices with large bulk capacitors, either I’ll have to set current in the PDO to abormally high levels or I make up my mind aboud constructing a proper, miniaturized inrush limiter circuit. I have setup a prototype already that I discuss here. The answer is a definete “it depends”. Although the capabilities of USB-PD are great, there are a few drawbacks: On the other hand, using USB-PD makes much sense when you Touching off easily Strategy and how to engrave and cut the struggle to successful builds Faster Engrave Algo for CNC: Decision aid Decision aid, Pros & Cons 3D signs - tutorial Job preparation and quick demo of an audio amplifier From investigation to problem solution From Pixel to Vector graphics Symptoms of insufficient spindle power Beginner CNC issue: Speeds/Feeds Automatic Z-referencing, Tool length, Tool changes EdingCNC Settings & Variables Software/Hardware setup & kinematics Assembling Sorotec’s Basicline 0607 Switch box setup Entry-point and questions Circuit & Application examples USB-PD power supply explained Can I use a Metabo/CAS battery for my system? How to set protective voltage & current limits Current inrush limiters explained Electronics knowledge: TVS diodes Or how to kill your circuits How to properly talk to VideoLan’s VLC player Prototype build, issues, improvement ideas for Revision2 How To: First steps with FreeCAD Professionalizing circuits for AnywhereAmps AnywhereAmp Alpha’s simple single-supply preamp Design, folding, stability, amplifiers Evolving the mobile, foldable instrument combo Fix ‘ERROR: favicon not found’ Export the instructions from Markdown to PDF! but how? Why some images display OK locally but won’t on Github How to make ToC sticky How to solve issues with disappearing posts Configure: landing page’s header image, Navigation
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648465.70/warc/CC-MAIN-20230602072202-20230602102202-00748.warc.gz
CC-MAIN-2023-23
6,656
67
https://github.com/ripple/rippled/releases/tag/0.33.0
code
Be notified of new releases Create your free GitHub account today to subscribe to this repository for new releases and build software alongside 31 million developers.Sign up rippled 0.33.0 release includes an improved version of the payment code, which we expect to be activated via Amendment on Wednesday, 2016-10-20 with the name Flow. We are also introducing XRP Payment Channels, a new structure in the ledger designed to support Interledger Protocol trust lines as balances get substantial, which we expect to be activated via Amendment on a future date (TBA) with the name PayChan. Lastly, we will be introducing changes to the hash tree structure that rippled uses to represent a ledger, which we expect to be available via Amendment on a future date (TBA) with the name SHAMapV2. New and Updated Features A fixed version of the new payment processing engine, which we initially announced on Friday, 2016-07-29, is expected to be available via Amendment on Wednesday, 2016-10-20 with the name Flow. The new payments code adds no new features, but improves efficiency and robustness in payment handling. The Flow code may occasionally produce slightly different results than the old payment processing engine due to the effects of floating point rounding. We will be introducing changes to the hash tree structure that rippled uses to represent a ledger, which we expect to be activated via Amendment on a future date (TBA) with the name SHAMapV2. The new structure is more compact and efficient than the previous version. This affects how ledger hashes are calculated, but has no other user-facing consequences. The activation of the SHAMapV2 amendment will require brief scheduled allowable downtime, while the changes to the hash tree structure are propagated by the network. We will keep the community updated as we progress towards this date (TBA). In an effort to make RCL more scalable and to support Interledger Protocol (ILP) trust lines as balances get more substantial, we’re introducing XRP Payment Channels, a new structure in the ledger, which we expect to be available via Amendment on a future date (TBA) with the name PayChan. XRP Payment Channels permit scalable, intermittent, off-ledger settlement of ILP trust lines for high volume payments flowing in a single direction. For bidirectional channels, an XRP Payment Channel can be used in each direction. The recipient can claim any unpaid balance at any time. The owner can top off the channel as needed. The owner must wait out a delay to close the channel to give the recipient a chance to supply any claims. The total amount paid increases monotonically as newer claims are issued. The initial concept behind payment channels was discussed as early as 2011 and the first implementation was done by Mike Hearn in bitcoinj. Recent work being done by Lightning Network has showcased examples of the many use cases for payment channels. The introduction of XRP Payment Channels allows for a more efficient integration between RCL and ILP to further support enterprise use cases for high volume payments. getInfoRippled.sh support script to gather health check for rippled servers [RIPD-1284] account_info command can now return information about queued transactions - [RIPD-1205] Automatically-provided sequence numbers now consider the transaction queue - [RIPD-1206] server_state commands now include the queue-related escalated fee factor in the load_factor field of the response - [RIPD-1207] A transaction with a high transaction cost can now cause transactions from the same sender queued in front of it to get into the open ledger if the transaction costs are high enough on average across all such transactions. - [RIPD-1246] LoadFeeTrack to app/tx and clean up functions - [RIPD-956] Reorganization: unit test source files - [RIPD-1132] Reorganization: NuDB stand-alone repository - [RIPD-1163] BEAST_EXPECT to Beast - [RIPD-1243] Reorganization: Beast 64-bit CMake/Bjam target on Windows - [RIPD-1262] PaymentSandbox::balanceHook can return the wrong issuer, which could cause the transfer fee to be incorrectly by-passed in rare circumstances. [RIPD-1274, #1827] Prevent concurrent write operations in websockets [#1806] Add HTTP status page for new websocket implementation [#1855]
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202589.68/warc/CC-MAIN-20190322014319-20190322040319-00455.warc.gz
CC-MAIN-2019-13
4,271
23
http://eprints.pascal-network.org/archive/00006763/
code
Non-redundant Subgroup Discovery Using a Closure System Subgroup discovery is a local pattern discovery task, in which descriptions of subpopulations of a database are evaluated against some quality function. As standard quality functions are functions of the described subpopulation, we propose to search for equivalence classes of descriptions with respect to their extension in the database rather than individual descriptions. These equivalence classes have unique maximal representatives forming a closure system. We show that minimum cardinality representatives of each equivalence class can be found during the enumeration process of that closure system without additional cost, while finding a minimum representative of a single equivalence class is NP-hard. With several real-world datasets we demonstrate that search space and output are significantly reduced by considering equivalence classes instead of individual descriptions and that the minimum representatives constitute a family of subgroup descriptions that is of same or better expressive power than those generated by traditional methods.
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131299054.80/warc/CC-MAIN-20150323172139-00100-ip-10-168-14-71.ec2.internal.warc.gz
CC-MAIN-2015-14
1,109
2
http://www.barnetrc.demon.co.uk/siteoffice.htm
code
The site was created in the latter part of the last millennium in order to celebrate the new one. The aims of the site are: The site has fallen back into the clutches of the original webmaster and will be updated regularly. It will become more useful to you if you let us know what you want. There is loads of scope for others to help with the site and we would welcome suggestions and contributions (don't panic - we are after content, not money!). You don't need web skills to contribute. Word documents are fine; or you can discuss your ideas with the webmaster. If you are a web designer of any kind, please spare us a few minutes to advise on our site. The current style sheet settings are demonstrated here.
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822822.66/warc/CC-MAIN-20171018070528-20171018090528-00779.warc.gz
CC-MAIN-2017-43
713
4
https://cboard.cprogramming.com/a-brief-history-of-cprogramming-com/61472-source-repository.html
code
I've added a source code repository to my website of my library of code. It's all reusable, so I figured a lot of people here could get some use out of it. Included in my library is: --Game development code -----Math things (vectors/planes/cameras/frustums) -----Implementations of various win32 controls --An fmod class implementation --A Java implementation in C++ ----Win32 template code for quick-starting win32 projects You can view the repository here: Hopefully someone gets something useful out of it! I'll upload more code as I add more to my library.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123491.68/warc/CC-MAIN-20170423031203-00262-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
560
10
https://yelismar.github.io/videos/watch/what-went-wrong-with-the-supra-you-choose-our-next-project
code
What went wrong with the Supra & YOU choose our next project Share this & earn $10 Published at : 28 Nov 2020 Subscribe to Nugget Garage Buy Merch Here: This week we did nothing...... so we made a video about what we should do... and you can help us choose!!!! Go to the "Community" section on our Channel, then VOTE for the car you want to see next!. comments powered by Disqus. How to pronounce foresightful IELTS Speaking Practice - Live Lessons on the topic of LEADERS Foule, Peuple et Electorat: une distinction politique urgente en Afrique HAUNT - "Mind Freeze" (Official Music Video) Instruct Me How to Douglas The Roles of Stakeholders in Curriculum Implementation, Curriculum Managers and Administrators Trump Supporters Enthusiastic About Presidency Look-Through Company (LTC) Explained Unboxing 10 Limited Edition Silver Sets bacterial toxins: Endotoxin and Exotoxins INFJ / Advocate personality explained in 3 minutes latest news headlines in hindi | Top 10 News | india news, latest news, breaking news, modi #DBLIVE TEKKEN EPIC SLOWMOS PART 7 | OchotoTV What is the treatment for COVID-19? distinguish between corporate issuer credit ratings and issue credit ratings and describe Pablo Chill-E - Facts (Official Video) Making Of Easy Pearl Bracelet//Beaded Bracelet// Useful & Easy Lec 12 Line to Ground Fault | Unsymmetrical Fault it is less difficult to know that it has begun.. How to Produce: Twenty One Pilots - Chlorine Can Liverpool win the title without Virgil Van Dijk? | Souness & Carragher on VVD injury USE OF " A LARGE NUMBER OF "( IN HINDI) || LEARN SPOKEN ENGLISH || Homeowners Outsmart Burglars with App, Hidden Cameras Новая коллекция Max Mara. Зима 20/21 An Unpleasant Premonition - One Piece Pirate Warriors 3 OST Texas Store Clerks Fight Off Robbers After This Video You will Want To Train Putin warns the threat of nuclear war should not be underestimated The Whigs - The Particular [Audio Stream] Dan + Shay, Justin Bieber - 10,000 Hours (LYRICS) Do Jnanis have Thoughts? | Do Jnanis think? | Thoughts's affect on a Jnani | Robert Adams 10 Mistakes Beginners Make When Building a Gaming PC Class 14 - How to attach zipper to a dress without a seam / Easy, neat and professional finish Who Should You Keep Company With? HOBBY LOBBY AT HOME IKEA CHRISTMAS DECORATIONS TREES DECOR SHOP WITH ME SHOPPING STORE WALK THROUGH Funny Stories About Wolfoo Plays Hide and Seek with the Change Color Like Chameleon | Wolfoo Channel Jobs That Allow You To Travel And Get Paid Learn MEDICAL Vocabulary in English 22 Clever IKEA Organization Ideas! 𝐓𝐎𝐏❺➤ Dangerous short circuit and electricity fails.⚡⚡⚡ Supermarket Price Wars NO MATTER HOW HARD IT GETS - Powerful Motivational Speech Dr Myles Munroe Empower Yourself With Wisdom The Nomination is Decided How to Write a Legal Document for Money owed Hillarious Daily Shine Memes V1 8 HOURS Gentle Night Rain for Relaxing, Study, Meditation, insomnia, Sleeping. Rain Sounds ⚡️ $110 Leicozic QS4 Power mixer 250w x2 bluetooth mixing console 4-CH Amplifier Mixer 48V Review WARNING: you may get HEART ATTACK from LAUGHTER - Best FUNNY FAIL & ANIMAL VIDEOS compilation
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988955.89/warc/CC-MAIN-20210509032519-20210509062519-00628.warc.gz
CC-MAIN-2021-21
3,179
59
http://www.developertutorials.com/tutorials/wireless/wireless-elite-mobile-applications-scripting-050413-1285/
code
Mobile Apps Developer Tom Park Imparts His Wisdom Mobile game developer Tom Park believes that scripting for wireless devices is important for proficiency sake. And with the need to scale mobile applications across so many different platforms, proficiency is everything. Read Park’s thoughts on scripting, as well as his ideas on wireless application development’s future. Meet mobile device application developer Tom Park. He designed his first game project 10 years ago, which was a series of 3D games with model-building multimedia tutorials published by Revell-Monogram. After a stint at Turner Interactive, Park moved to California to work on titles from the Star Wars and Sims franchises. Last year, Park left Electronic Arts (EA) to focus on creating mobile applications on his own. Because Park dives deeply into his endeavors, he knows a thing or two about what does and doesn’t work for developing mobile games. His business savvy, for its part, helps him make smart development decisions. Considering all that, we can benefit from Park’s experience. The Mobile Gamer’s Toolkit In his development toolkit, Park uses the IBM WebSphere Studio Device Developer (see Resources), which he finds blazingly fast for Java development. “I also use Sun’s JDK (Java Developer Kit) and WTK (Wireless Took Kit) command line tools, and various OEM SDKs.” While he was working with Sun Microsystems’ JDK, Park realized that JAR files obfuscated with the Retroguard obfuscator didn’t work well on certain phones, so he switched to SourceForge’s Proguard. “As a bonus, [Proguard] seems to compress a little better than Retroguard,” he says. As for Qualcomm’s BREW initiative, the money-making game technology for Verizon phones, Park uses the standard tools: Microsoft Visual C++, ARM RVCT (RealView Compilation Tools), and Qualcomm’s BREW SDK and tools. When Park needs to put on his artist’s hat for mobile development, he mainly uses Adobe Photoshop, but he also brings in Jasc’s Paintshop Pro and Cosmigo Pro Motion. “I think one of [the two] actually uses Deluxe Paint, running in a PC emulator on the Mac because it won’t run on the latest versions of Windows anymore,” he says. Park’s Secret Weapon: Scripting For creating mobile applications, scripting represents Park’s secret weapon. “It sounds like an odd thing to do on small wireless devices, but I actually use a simple scripting engine,” he says. “An app-specific domain language enables quick iterations on design and eases porting across devices. I worked on the scripted AI (artificial intelligence) engine on the Sims franchise at Electronic Arts, and saw how this technology enabled a profitable business model. There’s no way that EA could have cranked out so many expansion packs so quickly and cheaply if it weren’t for the scripting tools.” Park continues, “If I don’t make a title scriptable, then at least I make it extensively data-driven. Once you get used to writing code that way, you can be proficient at that level of abstraction, but it could be a challenge to those who aren’t used to it.” What Every Wireless Developer Should Know Park says that developing smart client software helps avoid many potential headaches. As certification costs and delays increase, deploying a new build becomes very expensive, he says. “It’s best to build smart, scriptable, data- and content-driven client software that can accommodate upgrades via your server,” Park says. “Deliver the client with a complete cache of content so it can operate offline, but allow it to download updates as necessary when it is online.” Park contends that while wireless application development differs little from other application development, the market is changing quickly. “Get your product to market within a couple months, while continuing to use your best development processes. Speed to market is especially important right now because the market is still young. When the market is more mature, you can develop heavier products.” Park contends that the wireless space is already fragmented. “Don’t try to do it all,” he insists. “Concentrate on an area you know and do it extremely well. There has been a lot of sloppy wireless software out there, so we have to overcome the image of unpolished work. It’s a common platitude, but aim to be the best in your category.” As for testing, he says it’s worthwhile to build testing infrastructure, such as automated test harnesses, into applications targeted for widespread deployment. When you consider that failing a test certification can set back your time to market by two to three weeks or more, the opportunity cost of failure could be huge, he says. Park advises that you create a process that makes application testing easy. What Every Wireless Developer Should Avoid Park dons his business hat when he encourages emerging wireless development companies to avoid growing too quickly. While it’s best to finish products sooner rather than later, he advises you to make sure to stay in business. “Wireless developers will burn out quickly if they attempt Amazon.com-type growth,” he says. The Challenges Every Wireless Developer Faces Park believes that testing and building for a plethora of devices represents the main challenge for mobile device developers. “Deploying an app to multiple operators in several countries might mean testing the app in over a hundred configurations,” he says. “This requires disciplined development processes during the whole lifecycle of the app. Again, everyone should be using all the same development processes for wireless that they’d use for other software: source control, automated builds, unit tests, and a simple, well-understood content pipeline.” Time to Market Equals Success When asked about his greatest success, Park replies, “I’m glad to have developed a couple of BREW titles that are leaders in their category. These are simple games and we were afraid we would be beaten to market. Thankfully, we managed to pass certification on the first submission, and were the first with branded word games that are popular with casual gamers.” Brand Games Extended to Mobile Devices Park, considering whether an established game brand can migrate to the mobile space, says, “Why not? I read an article where someone at Sega said they didn’t mind if Monkey Ball wasn’t profitable because it generated awareness of the Monkey Ball franchise to a broader market. The game industry is growing and reaching more people than ever before. Mobile might be a terrific way to reach the new gamers and grab market share. Look around and you might see all sorts of opportunities. Look at Sorrent’s exclusive deal to put Yao Ming Basketball on China Unicom — it’s such a smart move.” When asked about the perks and challenges when working with branded content, Parks replies, “Challenges: restrictions on use, need for approvals on use, lower revenue percentages. Perks: more sales based on brand recognition, more likely for the title to be picked up by a carrier, more buzz in general.” BREW vs. Java Technology Considering BREW versus Java technology in the mobile space, Park wishes people would stop positioning the two against each other. Park contends that BREW serves primarily as a distribution/billing system, so he sees it competing against other distribution platforms. BREW can and will distribute J2ME (Java 2 Platform, Micro Edition) applications. Qualcomm’s next generation chipsets will include the ARM Jazelle Java chip, so J2ME will soon run natively on BREW handsets, he says. “I do believe Java will eventually ‘win out’ because it’s easier to test than a C++ executable. The expense of certification will probably kill off downloadable C++ binaries,” he says. Theory in Practice: Park’s Example Code To avoid computation, Park advises that you preprocess data and use it later. “It’s nice when you can preprocess data at load time or during run time,” he says. He continues, “I wrote an American football game in which the AI could use hundreds of random numbers per second. In this case I could avoid a fair amount of computation by pulling from a pool of random numbers during each football play. Resource pools represent a simple and common concept employable in many other contexts.” Here’s the code: Listing 1. Class RandomPool public final class RandomPool private static final boolean DEBUG = false; private static java.util.Random _randomGenerator = new java.util.Random(); private static final int POOLSIZE = 30; private static int _poolsize = POOLSIZE; private static int _randomInts = new int[POOLSIZE]; private static int _idxCurrent = 0; private static int _wrapCount = 1; //init=1 to generate 1st entire pool public static final boolean resize(int poolsize) int pool = new int[poolsize]; if ((pool != null)) _randomInts = pool; _poolsize = poolsize; “Between plays, the pool refreshes with new numbers by calling RandomPool.generate()”: Listing 2. Method RandomPool.generate() public static final void generate() int count = _idxCurrent + (_wrapCount*_poolsize); System.out.print( "RandomPool: used "+ count +" numbers.\n"); int idx = _idxCurrent; _idxCurrent = 0; //init number ptr // Replace whole pool if all numbers were used if (_wrapCount > 0) _wrapCount = 0; idx = _poolsize-1; // Replace just the used numbers while (idx-- > 0) _randomInts[idx] = Math.abs(_randomGenerator.nextInt()); “During plays, the game grabs numbers from the random number pool,” he says. “Instead of refilling the pool when it runs out, the game reuses the numbers in the pool until the play completes, then refreshes the pool before the next play”: Listing 3. Refreshing the pool public static final int nextInt(int limit) // If we ran out of numbers, start reusing them from the beginning if (_idxCurrent >= _poolsize) _idxCurrent = 0; // Return number from 0 to limit if (limit > 0) return (_randomInts[_idxCurrent++] % (limit+1)); Mobile Gaming: the Future As for mobile gaming’s future, Park believes that in the long run the wide demographic range for mobile device users will prove important. “I’m looking forward to the opportunity to reach people who normally don’t play games,” he says. “However, hardcore gamers are always willing to spend more money on games, so we’ll probably see similar genres as we see in the PC market. But I’m sure there will be some surprises and am hoping for the creation of new genres.” • Find more developers who’ve spoken with John in previous columns. • IBM WebSphere Studio Device Developer provides IDE PDA applications. • Qualcomm offers an interactive demo so you can try a BREW application yourself. • Download the Java 2 Platform, Micro Edition (J2ME) Wireless Toolkit. • SourceForge offers more information about the Proguard obfuscator as well as free downloads.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709224828/warc/CC-MAIN-20130516130024-00031-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
10,960
75
https://www.bemea.com/project-service-operation/
code
Microsoft Dynamics 365 for Project Service Automation How To Improve The Way That You Manage Projects In Your Business? Microsoft Dynamics 365 for Project Service Automation (PSA)is an all-in-one project management tool. The MS dynamics 365 PSA tool covers the overall project management and is designed for organizations that run projects to generate revenue. The Dynamics 365 PSA tool makes it easier for the sales team to analyze the opportunity within their sales pipeline and converts it into the project.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103915196.47/warc/CC-MAIN-20220630213820-20220701003820-00177.warc.gz
CC-MAIN-2022-27
510
5
https://blog.rraghur.in/page/7/
code
So I got my Dad the 8GB Nexus 7. This is an awesome tablet - exactly what a good tablet should be. The UI is buttery smooth and things just fly. The hardware is not a compromise, excellent price point and overall a superb experience. Of course, there are some things to deal with like 8 GB storage,lack of mobile data connectivity, lack of expandable storage and no rear camera. So I just wrote up a Websocket server using CometD/Bayeux. It’s a ridiculously simple app - but went quite a long way in helping to understand the nitty gritties with putting up a Websocket server and CometD/Bayeux. Thought that I’ll put it up for reference - should help in getting a leg up on getting started with CometD. The sample’s up on github at https://github.com/raghur/rest-websocket-sample Here’s how to go about running it: So, yesterday I figured that now I’m an addict.. fully and totally to something called wordhero on my phone… it’s one of those games where you have a 4x4 grid of letters and you need to find as many words as you can within 2 mins. Nothing special… and there are tons of look alikes and also rans on the Google Play store. Even installed some of them and then removed them… Just came across an awesome piece of news - Google Maps now has turn by turn, voice guided directions officially in India!! Uptil now, I used to get the Ownhere mod for Google Maps that enables World navigation - It used to be available on XDA-Forums but got taken down once google frowned on it! No more of that hassle - just go to Play store and install Maps. During my recent outings in heavyweight programming, one of the things we needed to do was converting a large XML structure from the server to JSON object on the browser to facilitate easy manipulation/inspection. Also, the XML from the server was not the nice kind - what I mean is that tag names were consistent - but the content was wildly inconsistent. For ex, all of the following were recd: Microsoft released a cross platform Git TFS integration tool Git TF!! It’s definitely a good step and acknowledgement about the mindshare that Git has. I took it for a spin - the integration is supposed to be cross platform - so that it should work on cygwin also. However, the first time I tried, it did not and had to tweak the script a little. In the script <install folder>/git-tf I finally got my nettop - AMD E-350 based barebones system. Installed 4G of RAM and the plan was to set it up with XBMCBuntu or XBMC-XvBA. Instead of installing the XBMC-XvBA version directly, I figured that I could start with XBMCBuntu, see how it does and then if necessary move to the XvBA enabled builds. I don’t have a hard drive for the nettop - the plan was to have the system run off a 8Gig pen drive. So I use 'free for personal use' Avast Antivirus at home for the past couple of years. It’s been mostly good though I’ve had some reservations about it - namely, nag pop-ups and so on. Some months ago (or maybe was it a year ago?) there was a program update and it wanted me to install 'Avira Internet Security'. Now I had no need for this (I use COMODO firewall which has been quite good) however, there was no way around it. So this is a continuation to my last post on my effort to upgrade the media center at home. While I wait for hardware to come, I’ve been reading up through forums and blogs online and am finding it real hard to get some good advice. So, thought it might help to list down concisely the situation as it stands currently, in the hope that it will server other folks who’re trying to find similar answers.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864968.11/warc/CC-MAIN-20180522205620-20180522225620-00473.warc.gz
CC-MAIN-2018-22
3,601
9
https://generationliberation.com/author/eshapiro/
code
Hi! My name is Esti Shapiro (they/them or she/her) and I am an MA candidate in the Visual and Critical Studies program at SAIC. I grew up in Denver but spent six years studying and practicing architecture in Boston (specifically, the lovely gayborhood of Jamaica Plain) which I also consider home. I love spending time with my friends, and value queer community/chosen family deeply. I also have the best companion I could ever ask for in a 6ish year old rescue mutt named Frankie.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511106.1/warc/CC-MAIN-20231003124522-20231003154522-00011.warc.gz
CC-MAIN-2023-40
481
1
https://www.ics.com/learning/this-week-in-qt?page=8
code
A Weekly Update for Qt Developers Stay current with the latest Qt news with This Week in Qt, a weekly blog published by the ICS Qt Experts. We read all the Qt blogs, mailing lists, forums, social media outlets, etc. and condense the info to quickly highlight the most important Qt happenings for developers short on time. Please sign in or register to see the latest This Week in Qt news. -Qt 5.11.0 RC1 has been released via online downloader. -There will be an RC2 release to address a security issue in chromium. The plan is to do a final release on May 22, 2018. -Qt 5.9.6 is planned for release at the beginning of July. - Qt 5.11 Beta 4 has been released. The current plan is to release a Release Candidate by the end of April. - A proposed release schedule for 5.12 has been submitted. Qt 5.12 soft branching is set to begin 8/13/18. Feature freeze and an alpha release are scheduled for 8/20/18, with a final release on 11/29/18. - Qt 5.9.5 has been released:http://blog.qt.io/blog/2018/04/12/qt-5-9-5-released/ - Qt 5.11 Beta3 has been released. It is available through the Qt Installer. Preparations for a release candidate are underway. - PySide2 (Qt bindings for Python) is being renamed to "Qt for Python" and will appear as a tech preview shortly after… Very quiet on the Qt front this week. - There was hope that a Qt 5.9.5 release would happen this week, but no update on its status has been provided. - A Qt 5.11 Beta3 release is also expected shortly, but no updated status
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251681625.83/warc/CC-MAIN-20200125222506-20200126012506-00207.warc.gz
CC-MAIN-2020-05
1,493
15
http://news.sys-con.com/node/2507732
code
|By PR Newswire|| |January 10, 2013 03:00 AM EST|| LONDON, January 10, 2013 /PRNewswire/ -- 2013 brings new worries for many across the country waking up to their New Year financial hangover. January sales have been a huge success, however, consumer group Which? have reported that over 46% of the population paid for Christmas on credit and things are only set to get worse in 2013 after many embarked on spending sprees in the January sales, resulting in Christmas debts that will not be paid off by next year. The gloomy start to the year was anticipated by emotional support organisation Samaritans who in January receive more calls about financial worries than at any other time of the year. Rachel Kirby-Rider, executive director of fundraising at the charity says; 'Often there are things that people haven't addressed, or didn't want to address, before Christmas. They become very relevant when the credit card bills come in' 'A lot of people feel that things should be better in the New Year - and then when they're not, they start to worry' Not everyone is gloomy however, recent research conducted by IVA.co.uk has found that those in an IVA or other types of debt management plans are more positive about their ability to become debt free than those who are struggling on their own. The survey revealed that participants who are currently on an IVA or have completed one in the past gave very encouraging answers when asked to score their IVA. The survey asked; - How happy are you with your IVA? The average response was 7/10 - Out of 10, how likely are you to complete your IVA? The average score 9/10 - How well does your IVA providers deal with creditors? The average score was 7/10 - How easy was it to set up your IVA? The average score was 8/10 Founder of IVA.co.uk, Andy Davie explains that this is a common feeling amongst those who are in the midst of, or have completed an IVA; 'People struggling with debt are coping with high levels of stress each day. This has an immense impact on day-to-day life so when this is alleviated through an IVA there is a huge change in general enjoyment of life. I am not at all surprised by the results of the survey; I myself completed an IVA some years ago and so can fully understand the reasons behind these very positive scores. This is a great state of mind to be approaching 2013 with and will most definitely help with achieving the goal of becoming debt-free. Joining supportive forums such asIVA.co.uk where you can share your worries with others who have experienced similar circumstances' can further boost this positive outlook'. IVA.co.uk was set up by Andy Davie, Credit Today's 'Debt Councillor of the Year', who after struggling with his own debt problems, has gone onto to become debt free and help others through their own debt problems. Andy decided to set up IVA.co.uk after completing his IVA in 2006 and finding that there was nowhere for people in IVAs to go for help and advice. Since, the site has grown to be the biggest online IVA community with thousands of people visiting each day for invaluable help and guidance from experts as well as other forum members. Everyone on the team at iva.co.uk is extremely passionate about helping those in debt, many of them having personal experience of debt, making the iva.co.uk mission; to deliver the best information, support and advice about IVA's and financial issues, a very personal one. The ethos of the business is to go above and beyond the call of duty for their members to ensure that they are given the highest quality care and advice and this is shown by the fantastic feedback that the site and individual team members have received over the years. To find out more please visit http://www.iva.co.uk. A completely new computing platform is on the horizon. They’re called Microservers by some, ARM Servers by others, and sometimes even ARM-based Servers. No matter what you call them, Microservers will have a huge impact on the data center and on server computing in general. Although few people are familiar with Microservers today, their impact will be felt very soon. This is a new category of computing platform that is available today and is predicted to have triple-digit growth rates for some ... Oct. 21, 2016 10:00 PM EDT Reads: 33,886 You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ... Oct. 21, 2016 10:00 PM EDT Reads: 4,197 Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his general session at @DevOpsSummit at 19th Cloud Expo, Eric Robertson, General Manager at CollabNet, will discuss how customers are able to achieve a level of transparency that e... Oct. 21, 2016 09:30 PM EDT Reads: 614 Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU’s GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes. Oct. 21, 2016 09:30 PM EDT Reads: 1,578 SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ... Oct. 21, 2016 09:15 PM EDT Reads: 1,975 SYS-CON Events announced today that Enzu will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to focus on the core of their online busine... Oct. 21, 2016 09:15 PM EDT Reads: 1,189 SYS-CON Events announced today that SoftNet Solutions will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. SoftNet Solutions specializes in Enterprise Solutions for Hadoop and Big Data. It offers customers the most open, robust, and value-conscious portfolio of solutions, services, and tools for the shortest route to success with Big Data. The unique differentiator is the ability to architect and... Oct. 21, 2016 08:15 PM EDT Reads: 323 Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise. Oct. 21, 2016 07:15 PM EDT Reads: 1,608 In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, will be adding the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining senso... Oct. 21, 2016 07:15 PM EDT Reads: 241 @ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ... Oct. 21, 2016 07:00 PM EDT Reads: 8,103 "Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Oct. 21, 2016 07:00 PM EDT Reads: 8,924 The IoT has the potential to create a renaissance of manufacturing in the US and elsewhere. In his session at 18th Cloud Expo, Florent Solt, CTO and chief architect of Netvibes, discussed how the expected exponential increase in the amount of data that will be processed, transported, stored, and accessed means there will be a huge demand for smart technologies to deliver it. Florent Solt is the CTO and chief architect of Netvibes. Prior to joining Netvibes in 2007, he co-founded Rift Technologi... Oct. 21, 2016 06:45 PM EDT Reads: 2,813 What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure... Oct. 21, 2016 06:45 PM EDT Reads: 1,857 For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording. Oct. 21, 2016 06:15 PM EDT Reads: 3,014 Kubernetes, Docker and containers are changing the world, and how companies are deploying their software and running their infrastructure. With the shift in how applications are built and deployed, new challenges must be solved. In his session at @DevOpsSummit at19th Cloud Expo, Sebastian Scheele, co-founder of Loodse, will discuss the implications of containerized applications/infrastructures and their impact on the enterprise. In a real world example based on Kubernetes, he will show how to ... Oct. 21, 2016 05:15 PM EDT Reads: 2,814
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718423.28/warc/CC-MAIN-20161020183838-00449-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
11,651
44
https://scholar.harvard.edu/dgilchrist/publications
code
Do higher wages elicit reciprocity and lead to increased productivity? In a field experiment with 266 employees, we find that paying above-market wages, per se, does not have an effect on productivity relative to paying market wages (in a context with no future employment opportunities). However, structuring a portion of the wage as a clear and unexpected gift—by offering a raise (with no additional conditions) after the employee has accepted the contract–does lead to higher productivity for the duration of the job. Targeted gifts are more efficient than hiring more workers. However, the mechanism underlying our effect makes this unlikely to explain persistent above-market wages. This paper examines how an incumbent's patent protection acts as an implicit subsidy toward non-infringing substitutes. I analyze whether classes of pharmaceuticals whose first entrant has a longer period of market exclusivity (time between approval and generic entry) see more subsequent entry. Instrumenting for exclusivity using plausibly exogenous delays in the development process, I find that a one-year increase in the first entrant's market exclusivity increases subsequent entry by 0.2 drugs. The effect is stronger for subsequent entrants that are lesser clinical advances, suggesting it is driven primarily by imitation. We exploit the randomness of weather and the relationship between weather and movie-going to quantify social spillovers in movie consumption. Instrumenting for early viewership with plausibly exogenous weather shocks captured in LASSO-chosen instruments, we find that shocks to opening weekend viewership are doubled over the following five weekends. Our estimated momentum arises almost exclusively at the local level, and we find no evidence that it varies with either ex-post movie quality or the precision of ex-ante information about movie quality, suggesting the observed momentum is driven in part by a preference for shared experience, and not only by social learning.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337836.93/warc/CC-MAIN-20221006124156-20221006154156-00234.warc.gz
CC-MAIN-2022-40
2,001
3
http://7th-survivor.com/
code
Media is a leading edge technology provider, supplying both complete and component based solutions to diverse markets. We have spent years building the foundations of our products and extending our expertise in multimedia development. In addition to our constantly expanding product set, we are proud to be able to build our various base technologies into a specific customer need.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662531352.50/warc/CC-MAIN-20220520030533-20220520060533-00147.warc.gz
CC-MAIN-2022-21
381
6
http://liredarecelfai.ml/?binance=13078
code
Es ist ein glasklarer Bitcoin Era Fake, der Promis wie Lena Meyer-Landrut oder Yvonne Catterfeld in einem Atemzug mit Bitcoin Era nennt. Hierbei haben sich vermeintliche Marketing-Genies darum bemüht, den Bitcoin Robot mit berühmten Gesichtern zu versehen. Allerdings gibt es öffentliche Statements der betreffenden Personen. How to Build a Crypto Trading Bot for Binance (Using Python) Binance and trading bots. The world hasn’t seen a more iconic duo since Bert and Ernie. The legendary exchange has been flooded with automated trading bots of all kinds. Institutions and high net worth individuals are executing advanced algorithmic trading strategies while investors are automating their portfolio. It has become an ... ★ Bitcoin Botnet - Steam Bitcoin Pending How Long Diy Bitcoin Mining Hardware Bitcoin Botnet Bitcoin Management @ Bitcoin Botnet - Bitcoin Depletion Diy Bitcoin Mining Hardware Bitcoin Botnet Crypto Currency Guide Steam Bitcoin Pending How Long Bitcoin Challenger Bitcoin Mining Apps That Work Bitcoin Botnet How Can Bitcoin Be Stolen Bitcoin Depletion ... This is an unofficial Python wrapper for the Binance exchange REST API v1/3. I am in no way affiliated with Binance, use at your own risk. If you came here looking for the Binance exchange to purchase cryptocurrencies, then go here. If you want to automate interactions with Binance stick around. Der aktuelle Binance Coin-Kurs (26.90 $) im Live-Chart in EUR, USD & CHF im Überblick Binance Coin-Rechner Verfolge den aktuellen Kursverlauf live! A Binance bot is a tool to trade automatically on the Binance cryptocurrency exchange. Binance is the largest cryptocurrency exchange and provides a solid and secure platform to exchange cryptocurrencies. Binance is especially known for it’s speedy interface and ability to handle hundres of millions of transactions daily. Bitcoin’s price struggle was further exacerbated last week when the coin plunged to $3,700 on BitMEX and caused almost $1.2 billion in long contracts to be liquidated on the platform.Now, the exchange’s CTO has revealed that the liquidations were caused by sophisticated botnet attacks that have been probing the platform for days and were responsible for another attack last month. Bitcoin ransom operations have picked up steam in 2020 already, and a new scheme is already making the rounds across the Internet. The latest in ransom schemes is one that’s been targeting users ... TradeSanta is a cloud software platform that automates crypto trading strategies. Cryptocurrency trading bots are available for Binance, HitBTC, OKEx, Huobi, Upbit. [index] Cryptocurrency can be a high-risk, high-reward game for those willing to deal with the volatility. Can we use AI to help us make predictions about Bitcoin's ... This video is unavailable. Watch Queue Queue. Watch Queue In this video I, step-by-step, install, run and optimize an open-source Python Bitcoin / crypto trading bot which trades on the Binance Exchange. This Video was created as a response to those who ... Binance DEX - Test Net Demo ! - Duration: 10:37. ... Binance - One Bitcoin automatic real bot trading - My journey part 1 🚀🚀🚀 (Profit Trailer) - Duration: 13:37. We Need To Talk 24,456 ... In this video I describe the results of a 14 hour trade bot on binance trading the coin pair ZEN-BNB. We see a profit of 4.4% over 14 hours, beating the 'market' of .7%. Also discussed is the ... This is a net profit or loss, including commission, taking into account its payment to the BNB. The size of each trade is not more than 20-30% of the deposit. The size of each trade is not more ... crypto, bot exmo, trader, exmo-bot, exmo-trade-bot, bot-exmo, binance-bot, binance-trad-ebot, bot-binance, yobit-bot, yobit-trade-bot, bot-yobit, bittrex-bot, bittrex-trade-bot, binance trading ...
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320302723.60/warc/CC-MAIN-20220121040956-20220121070956-00688.warc.gz
CC-MAIN-2022-05
3,839
3
https://community.unbounce.com/t/why-cant-i-edit-traffic-in-my-variant/793
code
Trying to launch a variant test. Variant appears to be published, but I cannot assign traffic to it. I enter the % and when I click away, save, etc it resets to zero. Same with renaming the variant title. What am I missing? thanks Thanks for the response, and hitting “enter” is exactly the issue. I did eventually figure it out, but would add my voice to making a little tweak to that input experience. Since a mouse click is how one opens the fields, an option for a mouse click “input is done” element (along with hitting enter) would make it a bit better in my opinion. j Hi Greg, definitely agree with you there - thanks for the feedback! Glad things are working for you now. I am hitting enter, the thingie “thinks” (a circle rolls) but then jumps back to 0%! Why? What am I doing wrong? (I am using chrome) Hi Greg, are you hitting the “Enter” key after you change the value of the traffic % or the variant name? Clicking away will cancel the change (something we’ve had others express frustration with so we’ll be making that more intuitive in the future).
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247480905.29/warc/CC-MAIN-20190216170210-20190216192210-00418.warc.gz
CC-MAIN-2019-09
1,084
5
https://forums.developer.nvidia.com/t/unified-memory-across-multiple-gpu-question/38567
code
In the CUDA documentation it states. -Managed allocations are automatically visible to all GPUs in a system via the peer-to-peer capabilities of the GPUs. If peer mappings are not available (for example, between GPUs of different architectures), then the system will fall back to using zero-copy memory in order to guarantee data visibility. This fallback happens automatically, regardless of whether both GPUs are actually used by a program. When running the simpleP2P example it states that NVIDIA TCC must be enabled. Then when trying to enable TCC on GTX Titan or GTX Titan X it states that it is not supported on these GPU. So my question if TCC cannot be enabled will managed memory default to zero-copy memory between GPU? Can unified memory be used across multiple GTX Titan X? If not is there a way to use P2P on GTX titan?
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141542358.71/warc/CC-MAIN-20201201013119-20201201043119-00397.warc.gz
CC-MAIN-2020-50
832
6
https://www.cracksoftzone.com/multibootusb-crack/
code
MultiBootUSB 9 Crack Download Full FREE MultiBootUSB Key utility means that you can set up a number of distributions of OS or LiveCD on one USB drive (USB flash drive) with the power to subsequently obtain the chosen working system from it. The utility is appropriate for each professional and novice customers. MultiBootUSB is a software program installer which permits the consumer to put in a number of Stay Linux Distros to a single USB drive/Pendrive/Flash drive and capable of the boot from it. USBs may be examined without reboot utilizing the inbuilt QEMU. MultiBootUSB includes a no drop-down listing, auto detection of iso recordsdata, the distro may be deleted anytime, retain your USB drive clear, can check USBs without rebooting, an easy consumer interface, and the power to cover distro set up. MultiBootUSB Full Version will proceed to collaborate inside the way in which that’s identical. Bootable USB created in home windows ought to cooperate in Linux and vice versa. Additionally decreases the expansion time dramatically because of the truth rule base is equivalent to Home windows and Linux. Multi-Boot-USB ended up being meant to be standalone from the bottom up. Which implies that all recordsdata which might be a needed executable that’s binary contained in the executable? Merely obtain and clicking that’s double the executable ought to launch MultiBootUSB (finest free packages). You can Download LUMION 7 Crack Full FREE - No drop-down listing. - Auto-detection of iso recordsdata. - Put in distro may be deleted each time required. - Retains USB drive clear. - Check USB without reboot (utilizing QEMU) - Easy consumer interface. - Conceal distro installation (solely in home windows). - No set up (Home windows). - Help for 150+ distros and counting. What’s New in MultiBootUSB: With this newest model, you may boot ISOs instantly from ISO. As soon as the dwell USB is made utilizing multiboot USB, merely copy ISOs to /multiboot USB/iso listing. That’s it. Thereafter, boot to GRUB menu and choose Scan and Boot ISO choice. The menu recordsdata are copied from the different mission with identical identify multiboot USB by Agus Lopez. His effort and work on the mission are deeply acknowledged. Different smaller however vital changes consist of: - Included lacking EFI modules - Repair for software crashing on home windows system - Go to the download links and obtain this software program. - Set up in your system. - Run this system. - Take pleasure in.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817036.4/warc/CC-MAIN-20240416000407-20240416030407-00246.warc.gz
CC-MAIN-2024-18
2,500
20
https://topsearchesnews.com/lessons-learned-from-hurricane-maria-as-fiona-hits-puerto-rico/
code
Puerto Rico now enters its recovery period after facing catastrophic flooding and power outages from Hurricane Fiona. NBC News’ Joshua Johnson is joined by retired U.S. Army Lieutenant General Russel Honoré who led the relief effort after Hurricane Katrina to discuss the current emergency response and the previous lessons learned from these past weather events. NBC News Digital is a collection of innovative and powerful news brands that deliver compelling, diverse and engaging news stories. NBC News Digital features NBCNews.com, MSNBC.com, TODAY.com, Nightly News, Meet the Press, Dateline, and the existing apps and digital extensions of these respective properties. We deliver the best in breaking news, live video coverage, original journalism and segments from your favorite NBC News Shows. Connect with NBC News Online! NBC News App: https://smart.link/5d0cd9df61b80 Breaking News Alerts: https://link.nbcnews.com/join/5cj/breaking-news-signup?cid=sm_npd_nn_yt_bn-clip_190621 Visit NBCNews.Com: http://nbcnews.to/ReadNBC Find NBC News on Facebook: http://nbcnews.to/LikeNBC Follow NBC News on Twitter: http://nbcnews.to/FollowNBC #NBCNews #PuertoRico #Hurricane
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499524.28/warc/CC-MAIN-20230128054815-20230128084815-00188.warc.gz
CC-MAIN-2023-06
1,175
9
https://sourceforge.net/directory/environment:web/language:lisp/os:sun/
code
- Linux (7) - Modern (7) - Solaris (7) - BSD (6) - Grouping and Descriptive Categories (6) - Windows (6) - Mac (3) - Other Operating Systems (2) - Embedded Operating Systems (1) - Audio & Video - Business & Enterprise - Home & Education - Science & Engineering - Security & Utilities - System Administration ACDK - Artefaktur Component Development Kit - is a platform independent C++-framework similar to Java or C#/.NET for generating distributed and scriptable components and applications.3 weekly downloads Cleanux holds different scripts and programs for cleaning up messy code, such as XML and HTML. FrAid(FRactal AID) is an interface to Java, allowing it to proc. math. data(functions/equations). A compl. standalone system utilizing the FrAid prog. lang. is available(no need to be Java programmer to use it!). Use instead of Matlab. High res. graphics Hero's Union: Basic Information Library System is a project that is in the early stages of development. This system will implement some of best features available through other ILS software as well as many new features. Team Members Wanted! OS based on Agent based Security with a new type of split kernel and agents platform. Weblink means linking all the www website from a search engine based system. It is Large Scale Search engine, searches all resources on www like pages, images, video, audio, multimedia content, files etc .Weblink designed to be a scalable search engine. Set of tools and libs for managing structured data in a very flexible way: Imp./Exp. ASCII, XML, SQL, PS, Tex/LaTex, RTF GUI: X-Windows, MS-Windows Interface to C++, DBs, Perl, PHP, Java, TCP/IP LISP-like interpreter written in C++ using C-LIB
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934803848.60/warc/CC-MAIN-20171117170336-20171117190336-00350.warc.gz
CC-MAIN-2017-47
1,684
22
https://www.searchanddiscovery.com/documents/2006/06088houston_abs/abstracts/platon.htm
code
Getting More Meaningful Geological Information from the World Wide Web Using Semantic Webs University of Utah, Salt Lake City, UT A tremendous amount of potentially useful geologic information resides on the World Wide Web (WWW). This information, like all WWW content, is designed for humans to read or view, but not for computer programs to manipulate and analyze. The Semantic Web, as an extension of the current WWW, adds context to this information and provides inference rules to enable computer programs (agents) to process this information. There are several basic components that make the Semantic Web possible. One consists of the ontologies that enhance the functioning of the Web through a set of concept domain inference rules. Semantic Web ontologies can help solve simple tasks such as improving the accuracy of Web searches, as well as complex ones by processing Web-based content using a knowledge structure and inference rules. Specific to geological information, ontologies can enable a program to compare or combine information across two or more databases with different structures. Also, complex concept ontologies can be built as knowledge representation systems for various geoscience domains. Both the database and concept ontologies will give the geoscience community greater research and education capabilities. These new technologies will be able to analyze various concept representations and their related data creating a virtual environment where the geoscience community can work and learn together. The work presented is a chronostratigraphic relational database ontology that was built in order to integrate several legacy paleontological databases and share their content with the world via a cyberinfrastructure portal developed by the NSF-sponsored GEON (Gyberinfrastructure for Geosciences) project.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950383.8/warc/CC-MAIN-20230402043600-20230402073600-00727.warc.gz
CC-MAIN-2023-14
1,837
4
https://ajrom.net/secret.html
code
A symbolic game about destroying the ones you love in pursuit of power. This was available on the Xbox Live Independent Games Marketplace which is no longer up. I've learned a lot since making this and I'm visiting an evolution of this idea with my new project, Adenoid. A multiplayer zombie shooter. I wrote this in high school in C#, XNA. This is still available on game jolt Some work on Dead Lab which got played by popular youtubers such as Pewdiepie and Markiplier
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107911229.96/warc/CC-MAIN-20201030182757-20201030212757-00592.warc.gz
CC-MAIN-2020-45
470
3
http://wordpress.stackexchange.com/questions/tagged/header-image+clone-site
code
WordPress Development Meta to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site header_image not working after site copy I did a copy of a production site to a development site, but the header_image doesn't work after the copy. The copy was done by doing a copy&replace of the host in the db dump file. Everything ... Nov 25 '11 at 8:54 newest header-image clone-site questions feed Hot Network Questions Who is the Main Villain in Hearthstone's Curse of Naxxramas? Break the popularity contest crypto Inserting 1 line into my SQL database Creating a new list by dropping sub elements of the original list Is there a difference between 你无意之中流露出来 and 你无意流露出来? What is usually listed as evidence that RPGs are inherently a 2+ person activity? What's the difference between the Model B and B+? Unplugging a router from the wall socket How to write two equations as part of one equation? Excel VBA program only running at 25% speed how to make a color transparent in GIMP How to number the letters of a sentence? Change rowguidcol property to a different column Distributing powers on complex numbers Understanding resistance in open and short circuits Order of execution of trigger and workflow TLS WG Charter and Security Goals Mdadm won't create an array larger than 10TB How can I require an array of resources in puppet? Where did Machiavelli say that "the ends justify the means"? Are homemade batteries economically practical? How was Grievous able to defeat Jedi? Why are there so many CSS properties which are essentially the same? Are weird numbers more rare than prime numbers? more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0 WordPress is a trademark of the WordPress Foundation, registered in the US and other countries. This site is not affiliated with the WordPress Foundation in any way.
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510264270.11/warc/CC-MAIN-20140728011744-00003-ip-10-146-231-18.ec2.internal.warc.gz
CC-MAIN-2014-23
2,367
54
http://portfolios.uwcsea.edu.sg/miyan45757/2017/12/
code
I am actually happy with what I got in Q1 during the exam. I actually got a lot higher than I expected, mainly because I was able to put many points in each paragraph. Since I was a bit behind on the time, I was rushing a lot which made the quality really low. But, I got marks down for the quality of my answer as the paragraph and sentence structure was low. In my second try, I think I improved in the sense of the quality of my answer but I think the content was the same. I was not able to gain more points for the content. I have learnt that we have to explain each point and that we also have to watch our quality of the writing, not only the context.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711111.35/warc/CC-MAIN-20221206161009-20221206191009-00095.warc.gz
CC-MAIN-2022-49
658
1
https://www.softpile.com/noscript-for-songbird/
code
Songbird add-on that helps you secure your web surfing. Operating System: Mac OS X This whitelist based pre-emptive blocking approach prevents exploitation of security vulnerabilities (known and even unknown!) with no loss of functionality... Browsing is much safer with NoScript. Note: The NoScript for Songbird add-on is cross-platform and it works on Mac OS X, Windows and Linux.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703521139.30/warc/CC-MAIN-20210120151257-20210120181257-00213.warc.gz
CC-MAIN-2021-04
382
5
https://docs.tonic.ai/app/setting-up-your-database/spark-livy/spark-livy-tonic-differences
code
Required license: Professional or Enterprise Not available on Tonic Structural Cloud. No data science mode Spark with Livy is only available for data generation workspaces. You cannot use Spark with Livy for data science mode workspaces. No workspace inheritance Spark with Livy workspaces do not support workspace inheritance. Table mode limitations You can only assign the De-Identify or Truncate table modes. For Truncate mode, the table is ignored completely. The table does not exist in the destination database. Spark 2.4.x and higher For Spark 2.4.x and higher, Spark with Livy workspaces cannot use the following generators: Array Character Scramble Array JSON Mask Array Regex Mask The following generators are supported, but with restrictions: Character Scramble is only supported for text columns. Timestamp Shift is only supported on date column types. Spark 2.3.x and Spark 2.4.2 For Spark 2.3.x and 2.4.2, Spark with Livy workspaces only support the following generators: Timestamp Shift Generator No subsetting, but support for table filtering Amazon EMR workspaces do not support subsetting. However, for tables that use the De-Identify table mode, you can provide a WHERE clause to filter the table. For details, go to Using table filtering for data warehouses and Spark-based data connectors. Spark with Livy workspaces do not support upsert. No output to container artifacts For Spark with Livy workspaces, you cannot write the destination data to container artifacts. No output to an Ephemeral snapshot For Spark with Livy workspaces, you cannot write the destination data to an Ephemeral snapshot.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817463.60/warc/CC-MAIN-20240419234422-20240420024422-00414.warc.gz
CC-MAIN-2024-18
1,618
29
http://stackoverflow.com/questions/13855708/entity-framework-best-practice-on-catch-exception/13969917
code
My Entity Framework will always targeting SQL Server. So, in my program. What type of exception shall I catch? and in DAL, is it good to throw the exception again after logging? I would suggest multiple catch and log both. In live environment its not recommended to throw error to client system, however you always need to throw the error. So its your call how to do it. If its live show a beautiful error to client that something went wrong and we are looking.
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929230.43/warc/CC-MAIN-20150521113209-00324-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
461
7
https://aprilhenry.livejournal.com/296910.html
code
Or go to the Social Security database to find names that were popular in a given year. [Full disclosure: April reached its peak in the early 1990s. I seldom meet a woman by age with my name.] For my YAs, I page through my kid's school directories. Do you have any favorite ways for naming your characters?
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704798089.76/warc/CC-MAIN-20210126042704-20210126072704-00627.warc.gz
CC-MAIN-2021-04
305
3
https://mailman.linuxchix.org/pipermail/techtalk/2008-June/022848.html
code
[Techtalk] Swap away conor.daly-linuxchix at cod.homelinux.org Sat Jun 14 22:32:55 UTC 2008 On Sat, Jun 14, 2008 at 12:37:33PM -0500 or so it is rumoured hereabouts, Gayathri Swaminathan thought: > A recent incident motivated me to research a bit on swapping. > The question I was researching on was "How large should my swap be?" > There is no single answer but only different views. > The generalized unanimous answer is: > In old days, 2.4.x kernels when physical memory was small 64-128MB we set > swap to be roughly 1.5xphysical or 2xphysical, but in these days when we are > able to buy 4GB physical RAM, it is really up to **one** to set their swap > Added to this confusion 2.6.x kernels allow you to alter > and tweak swap > How do I know, how much swap I need? I think the current wisdom is have swap if you think you will use it. If you have 4Gb physical, you probably won't need swap at all. OTOH, if you have a laptop and you want to be able to hibernate, you need at least I don't understand swappiness... Conor Daly <conor.daly at cod.homelinux.org> -----BEGIN GEEK CODE BLOCK----- GCS/G/S/O d+(-) s:+ a+ C++(+) UL++++ US++ P>++ L+++>++++ E--- W++ !N PS+ PE Y+ PGP? tv(-) b+++(+) G e+++(*) h-- r+++ z++++ ------END GEEK CODE BLOCK------ More information about the Techtalk
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320302740.94/warc/CC-MAIN-20220121071203-20220121101203-00474.warc.gz
CC-MAIN-2022-05
1,287
25
https://blogs.worldbank.org/endpovertyinsouthasia/comment/reply/589/367
code
Yes, measuring performance is difficult. Impact evaluation conducts counterfactual analysis and it requires the identification of treatment and control groups. Methods for counterfactual analysis can be experimental or non-experimantal. Experimental methods use random assignment as a way to obtain comparable treatment and control groups. The ideal procedure would be prospect impact evaluation which is planned before implementation of the program to be evaluated.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202723.74/warc/CC-MAIN-20190323040640-20190323062640-00371.warc.gz
CC-MAIN-2019-13
466
1
http://webinsightlab.com/development/8-fresh-and-useful-jquery-plugins/
code
8 Fresh and Useful jQuery Plugins jQuery has been much talked about in the recent years. It can basically be defined as a cross browser java script library and the basic reason why it was designed was to simplify basically the client side scripting of HTML. Apart from that Java script is the most popular Java script library. Java script is the most popular because of a lot of reasons. It has a lot of advantages and the biggest one being that it is absolutely free and others being that it is open source and also dual licensed .This software was released in January 2006 and has gained popularity in a very short period of time. It is very efficient in its working.Coming to the uses and advantages jquery can very easily help to navigate any document. Apart from that you can also select DOM elements and also create animations of various types. Not only that various issues can also handle various events very easily and also develop Ajax applications. The developers get an opportunity to create various kinds of plug-ins. some of the best plug-ins are glisse,touch touch, wookmark jQuery Plugins, real shadow and a lot more. Visit this list and select the best jQuery plugin for your next project and make your application more effective and impressive. I hope designers and developers would love to use these plugins with code. Also share their views in our command section below. Glisse.js is a simple, responsive and fully customizable jQuery photo viewer. You’ll like the transitions between two pictures entirely assumed by CSS3. 2) Touch Touch It is a jQuery plugin that turns a collection of photos on a webpage into a touch-friendly mobile gallery. It works on all major browsers (except for IE7 and below) and most importantly is specifically designed with iOS and Android in mind. 4) Real Shadow jQuery Plugin that casts photorealistic shadows. Perfect for eye-catching demos and landing pages. 7) Nail Thumb Create thumbnails easily from high-res images, without any distortion, with one line of code 8) Slab Text 1 Comment + Add Comment Leave a comment - A Look into Firewalls and IDS/IPS - The Top Five 3D Design Tutorial Websites - 5 Best Business Apps for Android Tablets - Top Google Funny Tricks 2013 - Advertisement In India- An Inside Look - Is Internet Getting Too Mobile? - Top Most Internet Based Company - Should Your Business Make the Switch to Satellite TV
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696384213/warc/CC-MAIN-20130516092624-00013-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
2,391
23
http://malvisystems.com/enterprising-application-services.php
code
The long-term capability of IT Architecture is a focus point for enterprises today. They are more focused on applications, technology platforms, data and infrastructure. We collaborate to facilitate complete Enterprise Architecture (EA) such as resource management, applications, business strategy, agility, drive business alignment and provide reduce 'total cost of ownership' (TCO). - Functional Excellence. - Governance. Risk and Compliance. - Government Consulting. - Enterprise Resource Planning (ERP). - Supply Chain Management (SCM). - Application Management Service (AMS).
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578531994.14/warc/CC-MAIN-20190421160020-20190421182020-00290.warc.gz
CC-MAIN-2019-18
580
7
https://www.caringbridge.org/public/jenniferamy
code
Some candidates use un-necessary Exam Preparation Materials that can’t provide useful and related to exams information this is why Many Candidate face problems in Exams. Effective technique goes beyond the exam hall. You’ll never be stress-free from the examination process, but you can limit it greatly by following these tips: Remove the limiting belief that you can’t pass. Be your own examiner Find a suitable place to work Don't panic in the exam Where can applicants get prepare the exam course? Getcertifyhere provides you the helping materials for the 70-346 exam. getcertifyhere Practice materials are prepared under the supervision of the Microsoft Exams Experts Team in real -time exams scenario. Candidate can prepare certification exams quickly and effectively.https://www.getcertifyhere.com/70-346.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711074.68/warc/CC-MAIN-20221206060908-20221206090908-00365.warc.gz
CC-MAIN-2022-49
822
7
https://www.emc.com/emc-plus/rsa-labs/standards-initiatives/important-attacks-on-stream-ciphers.htm
code
2.4.7 What are the most important attacks on stream ciphers? The most typical use of a stream cipher for encryption is to generate a keystream in a way that depends on the secret key and then to combine this (typically using bitwise XOR) with the message being encrypted. It is imperative the keystream "looks" random; that is, after seeing increasing amounts of the keystream, an adversary should have no additional advantage in being able to predict any of the subsequent bits of the sequence. While there are some attempts to guarantee this property in a provable way, most stream ciphers rely on ad hoc analysis. A necessary condition for a secure stream cipher is that it pass a battery of statistical tests which assess (among other things) the frequencies with which individual bits or consecutive patterns of bits of different sizes occur. Such tests might also check for correlation between bits of the sequence occurring at some time instant and those at other points in the sequence. Clearly the amount of statistical testing will depend on the thoroughness of the designer. It is a very rare and very poor stream cipher that does not pass most suites of statistical tests. A keystream might potentially have structural weaknesses that allow an adversary to deduce some of the keystream. Most obviously, if the period of a keystream, that is, the number of bits in the keystream before it begins to repeat again, is too short, the adversary can apply discovered parts of the keystream to help in the decryption of other parts of the ciphertext. A stream cipher design should be accompanied by a guarantee of the minimum period for the keystreams that might be generated or alternatively, good theoretical evidence for the value of the lower bound to such a period. Without this, the user of the cryptosystem cannot be assured that a given keystream will not repeat far sooner than might be required for cryptographic safety. A more involved set of structural weaknesses might offer the opportunity of finding alternative ways to generate part or even the whole of the keystream. Chief among these approaches might be using a linear feedback shift register to replicate part of the sequence. The motivation to use a linear feedback shift register is due to an algorithm of Berlekamp and Massey that takes as input a finite sequence of bits and generates as output the details of a linear feedback shift register that could be used to generate that sequence. This gives rise to the measure of security known as the linear complexity of a sequence; for a given sequence, the linear complexity is the size of the linear feedback shift register that needs to be used to replicate the sequence. Clearly a necessary condition for the security of a stream cipher is that the sequences it produces have a high linear complexity. RSA Laboratories Technical Report TR-801 [Koç95] describes in more detail some of these issues and also some of the other alternative measures of complexity that might be of interest to the cryptographer and cryptanalyst. Other attacks attempt to recover part of the secret key that was used. Apart from the most obvious attack of searching for the key by brute force, a powerful class of attacks can be described by the term divide and conquer. During off-line analysis the cryptanalyst identifies some part of the key that has a direct and immediate effect on some aspect or component of the generated keystream. By performing a brute-force search over this smaller part of the secret key and observing how well the sequences generated match the real keystream, the cryptanalyst can potentially deduce the correct value for this smaller fraction of the secret key [Koç95]. This correlation between the keystream produced after making some guess to part of the key and the intercepted keystream gives rise to what are termed correlation attacks and later the more efficient fast correlation attacks. Finally there are some implementation considerations. A synchronous stream cipher allows an adversary to change bits in the plaintext without any error-propagation to the rest of the message. If authentication of the message being encrypted is required, the use of a cryptographic MAC might be advisable. As a separate implementation issue synchronization between sender and receiver might sometimes be lost with a stream cipher and some method is required is ensure the keystreams can be put back into step. One typical way of doing this is for the sender of the message to intersperse synchronization markers into the transmission so only that part of the transmission which lies between synchronization markers might be lost. This process however does carry some security implications.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122739.53/warc/CC-MAIN-20170423031202-00054-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
4,722
7
https://bugzilla.mozilla.org/show_bug.cgi?id=289126
code
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.6) Gecko/20050325 Firefox/1.0.2 Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.6) Gecko/20050325 Firefox/1.0.2 I did a search on this and saw this seemed to be an old bug. I received an email with two attachments: One a word document, the other a plain/text attachment. Trying to preview this message induces the error above in Thunderbird 1.0.2. The message layout (from Mutt) is: I 1 <no description> [multipa/alternativ, 7bit, 2.8K] I 2 tq><no description> [text/plain, quoted, us-ascii, 0.8K] I 3 mq><no description> [text/html, quoted, us-ascii, 1.7K] A 4 INVITATION - Transfer Pricing 7 April 20 [applica/octet-stre, base64, 384K] A 5 ATT2622908.txt [text/plain, base64, us-ascii, 0.8K] Reproducible: Always Steps to Reproduce: 1. Click on a particular message (this one having a word and text attachment). Expected Results: Display the message and not crash. Your Java plugin is incorrectly installed (symlink broken ?) I thought Thunderbird wasn't supposed to use plugins? That's how I read the previous tickets about this problem. After doing a little Bugzilla mining, I applied the --disable-plugins to the FreeBSD port .mozconfig template and all is well. If this is required to get rid of this problem then why isn't it thrown by default in the Thunderbird build? "INTERNAL ERROR on Browser End: Could not get the JVM manager; System error?:: Unknown error: 0" is directly form a a Java plugin which failed to find the JVM. The plugin calls exit() and that can't thunberird survive. The reason for this must be that you have a broken JRE symlink in the plugin directory or that you copied the JRE plugin. That makes it invalid. disabling the plugins via configure would be also a solution but that's not the problem itself. Throw me a bone here. Which plugin directory? Some system-wide place or in my home directory? In a global Mozilla plugin directory or something specific to Thunderbird? I only install ports via the FreeBSD ports system, so I don't quite know how I could have removed anything. I accept what you say, but unless you are more specific as to which plugin directory you're talking about, it's like you're speaking German :) I checked my .mozilla/plugins directory, I don't have a broken symlink. It points to a valid Java shared library: $ ll .mozilla/plugins total 4 drwxr-xr-x 2 clint users - 512 Jan 28 08:23 ./ drwxr-xr-x 4 clint users - 512 Jan 27 20:02 ../ lrwxr-xr-x 1 clint users - 62 Jan 28 08:23 libjavaplugin_oji.so@ -> /usr/local/jdk1.4.2/jre/plugin/i386/ns610/libjavaplugin_oji.so Is there something wrong with using this plugin? Everything on my system, including the Java plugin, is compiled with gcc 3.4.2. Created attachment 186334 [details] Message which demonstrates the crash Here is a message from the Lout mailing list that throws Thunderbird into a tailspin. same crash and message here with yesterdays thunderbird (linux version 1.0+ (20050720)) on opening any mail on any account or starting to compose a new mail - removing the link to the java plugin from ~/.mozilla/plugins makes the error go away - the plugin works fine in the deer park alpha2 browser peter Same here on Tbird 1.0.2 for sparc solaris with the link to the Sun java plugin in the plugins/directory . I don't see any java in the mail message, however trying to view it causes the Bird to barf. Can't attatch the message as it contains proprietary content. /apps/mozilla/thunderbird/thunderbird INTERNAL ERROR on Browser End: Could not get the JVM manager System error?:: Error 0 ls -l /apps/mozilla/thunderbird/plugins lrwxrwxrwx 1 root other 53 Aug 1 08:22 libjavaplugin_oji.so -> /usr/java/jre/plugin/sparc/ns610/libjavaplugin_oji.so I have also started to recieve crashes when selecting a message. (Linux) MOZ_PLUGIN_PATH="/usr/lib/nsbrowser/plugins/" javaplugin.so -> /opt/sun-jre-bin-1.4.2.08/plugin/i386/ns610-gcc32/libjavaplugin_oji.so Get this with Thunderbird 1.5b1 on Solaris/Sparc (built by me). My Tb 1.0.6 uses the same setup (e.g. MOZ_PLUGIN_PATH) as Tb 1.5b1 without this crash. we worked around this in 1.0.x. Joe won't like it but we may have to work around it again in 1.5. See Bug 289126 for a lot of detail on this issue. Created attachment 197482 [details] [diff] [review] disable plugins again like we did for 1.0 I was hoping more folks would have updated to the newer version of the java plugin (which doesn't tell us to abort), but it looks like there are still a lot of folks out there using this troublesome plugin. This patch makes 1.5 do what 1.0 did, and that's to disable plugins in Thunderbird. I'd rather not check this into the trunk because I'm still hoping that most users will end up with jvm1.5.0 or higher (which kindly doesn't tell our process to abort). (In reply to comment #16) > I was hoping more folks would have updated to the newer version of the java > plugin (which doesn't tell us to abort), but it looks like there are still a > lot of folks out there using this troublesome plugin. I believe a lot of people still use Java 1.4 since it is default in Solaris 8 and 9. Solaris 10 is the first Sun OE to use Java 1.5 as default. > I'd rather not check this into the trunk because I'm still hoping that most > users will end up with jvm1.5.0 or higher (which kindly doesn't tell our > process to abort). Fine by me but then it probably should be noted in the Release Notes somewhere that it needs Java 1.5. And how come Firefox doesn't have this problem? probably because firefox has a jvm manager :) Comment on attachment 197482 [details] [diff] [review] disable plugins again like we did for 1.0 Ick. This error only happens on linux, right? Couldn't we do something less severe like preffing plugins off, or preffing plugins off only on linux? we've worked around this again on the 1.8 branch. (In reply to comment #19) > Ick. This error only happens on linux, right? Couldn't we do something less On Solaris too. thanks for resolving this bug which resolved also my bug https://bugzilla.mozilla.org/show_bug.cgi?id=308647 for some podcast rss feed Regression: reappearing in trunk build version 3 alpha 1 (20061008) on Linux. Moving libjavaplugin_oji.so out of $HOME/.mozilla/plugins fixes it but deprives firefox off Java. I don't have powers to reopen... Michael Had the exact same issue on beta 3.0. INTERNAL ERROR on Browser End: Could not get the plugin manager System error?:: No such file or directory Fixed it by running 3.1 alpha1. Sweet!
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825057.91/warc/CC-MAIN-20171022022540-20171022042540-00547.warc.gz
CC-MAIN-2017-43
6,505
24
https://hasancanakgunduz.medium.com/swiftui-environmentobject-37fccda94111?source=post_internal_links---------0----------------------------
code
In SwiftUI, @EnvironmentObject is a property wrapper that we use to share data between many views. EnvironmentObject vs ObservedObject Let’s say, we have 3 views named View1, View2 and View3. View1 contains View2 and View2 contains View3. Using EnvironmentObject, we can pass data from View1 to View3. But if we use ObservedObject, we have to first pass data to View2 and then pass it to View3. Let’s see with an example. In the example, we have 3 views named BlackView, BlueView and GreenView. BlackView contains BlueView and BlueView contains GreenView. - NumberManager is the class that we will share its instance between views, it conforms to ObservableObject and its number property has @Published property wrapper. - BlackView has NumberManager instance inside and it sends this data with environmentObject() modifier. - BlueView and GreenView expects to get a NumberManager object in the environment. See that BlueView does not send this data, it is already provided by BlackView. When we tap on the button in BlackView, text in all the views updated with same data:
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500294.64/warc/CC-MAIN-20230205224620-20230206014620-00633.warc.gz
CC-MAIN-2023-06
1,077
8
https://itch.io/profile/rdmgames
code
Recent community posts I Have a question about the txt. file. For example, my game is named X and i am the only dev. The archive should be "X.txt", and contains "a game about X, [#] My_Name" , it is correct? Thanks! Oh, sorry about that. It is in Brazilian Portuguese https://en.wikipedia.org/wiki/Brazilian_Portuguese . It was a game made for a Gamejam, so we had only 48 hours to finish it, and we had not enough time to translate it. I Hope you enjoy my future games, where i will be sure to add English.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991537.32/warc/CC-MAIN-20210513045934-20210513075934-00199.warc.gz
CC-MAIN-2021-21
507
3
https://answers.sap.com/questions/4226242/count-the-occurences-into-an-infocube.html
code
I am uploading sales ticket per days, customer, customer type and site into my CRM infocube. I would like to count the number of distincts customer per any combination of characteristics (days, site and customer type) and the number of sales tickets for any combination of caractéristics (customers, customer type, sites,...) I tried to follow the guide "How to ... count the occurence of a charactistic" : I created a key figure "count" with a constant value "1", I used into my query the "average function"... But I didn't get the right result (to be honnest, my query get no result at all !!!!!) Is there some body that could help me? Thanks a lot.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103661137.41/warc/CC-MAIN-20220630031950-20220630061950-00402.warc.gz
CC-MAIN-2022-27
652
5
http://download.cnet.com/Advanced-Album-Editor/3000-2193_4-10105703.html
code
Advanced Album Editor can help you organizing your digital images, generate thumbnails and create a Web site quickly and easily. You can create a Web site to publish your own digital images with thumbnails in seconds. Thumbnails (jpeg format) can be generated automatically, and images that are not gif or jpeg format (such as BMP, DIB, ICO, PCX, PNG, TGA, TIF, TIFF, WMF, etc.) can be convert to JPEG format automatically. You need not to write any HTML codes to create a Web site. Advanced Album Editor can automatically generate all HTML pages for the Web site.
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823282.42/warc/CC-MAIN-20171019103222-20171019123222-00361.warc.gz
CC-MAIN-2017-43
564
1
https://www.itninja.com/question/ultravnc-deployment-silent-install
code
UltraVNC Deployment/Silent Install 09/24/2018 11255 views I have been trying to figure this out for months now to no avail! I am trying to deploy UltraVNC server to all of our workstations and Viewer to our IT computers. I have tried scripting it through the K1000 and always get Failed Execution. I have also tried to do a managed install and that never works. I also tried to do it with the image and get an error as soon as I log into the new computer. I have set my passwords in the .ini file and include that in the deployment. Can anyone please help me get this figured out? We are getting ready to migrated to Windows 10 and I don't want us to have to go around and tough 250+ computers to finish the imaging process.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657131734.89/warc/CC-MAIN-20200712051058-20200712081058-00498.warc.gz
CC-MAIN-2020-29
724
3
http://orderthispiece.com/listing-46-monopoly-the-mega-edition.html
code
Bigger: Game board 50% larger than most boards. New Depots and Skyscrapers. $1,000 bills. Faster: Special Speed Die and Bus Tickets quickly zip you to where the action is. Buildings appear sooner...and so do big rents! Own it All...and more! 7 more "States" join the game!
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593438.33/warc/CC-MAIN-20180722174538-20180722194538-00373.warc.gz
CC-MAIN-2018-30
272
4
https://forums.fogproject.org/topic/2636/fog-0-32-defaultmember-not-contactable-via-proxy
code
FOG 0.32 - DefaultMember not contactable via proxy I am having problems rendering the DefaultMember information within the FOG pages. we have recently moved over to Smoothwall for webfiltering and Firewall, i am passing the fogserver through smoothwall without issue, but it will not allow any internal addresses without either disabeling the proxy or setting them in the web browser as an exemption. is there any way to set a local exemption within fog 0.32 so that it will avoid the proxy for internal addresses or its own internal address? everything to do with fog resides on one server. is there anything that i can change withing ubuntu CLI to make it ignore the proxy for internal addresses? [SIZE=13px][FONT=arial][COLOR=#262626]Other Information->FOG Settings->General Settings->FOG_PROXY_IP and FOG_PROXY_PORT[/COLOR][/FONT][/SIZE]
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337889.44/warc/CC-MAIN-20221006222634-20221007012634-00324.warc.gz
CC-MAIN-2022-40
841
6
https://blog.xendit.co/~xenditco/product/new-user-permissions-in-the-dashboard/
code
When we first had users management in the Dashboard, we only provided four types of permissions: ability to view, can edit, approve, and manage users. Adhering to feedback, request, as well as increasing security, we’ve had a great pleasure releasing this. New user permissions for a more secure Dashboard Now, users have two new options to limit permissions: tech settings and withdrawals. Some important changes to highlight: - API keys, callback URLs, and other tech related settings is now limited to users with Tech settings permission. - Only users with Admin permission can manage bank account for withdrawals. This includes: adding and deleting bank account. However, Admin cannot execute withdrawals, as it is limited only to users with Withdraw permission. - One business account will always have at least one admin to manage users, which includes: add, edit, and delete users. Admin cannot edit or delete themselves, but they can edit or delete other admins. - View permission is no longer a default permission. We learned that some of our clients doesn’t want everyone has permission to view and download report. The reason is because some of the transactions contain confidential informations. What happened to existing users? For all existing users, we will set your permission according to the old settings. We will also enable both tech settings and withdraw permissions by default. You can check out your Dashboard to learn more about the new user permissions. We hope this changes can provide more flexibility for you to tailor permissions for your team. Should you need any assistance, don’t hesitate to chat! Cheers!
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891817908.64/warc/CC-MAIN-20180226005603-20180226025603-00151.warc.gz
CC-MAIN-2018-09
1,642
11
https://docs.lightstep.com/updates/dd-java
code
If you can, use the Java SpecialAgent to auto-instrument your Java application. Only use the following instructions if you must use Datadog. Use Tracers for Instrumentation - Visit the Datadog Instrumentation page and choose a language. - Follow the instructions to integrate the Datadog tracer with your application. You can choose to rely on auto-instrumentation or add custom instrumentation to your services (or both). - Use the OpenTracing API for any additional instrumentation. By enabling the OpenTracing tracer you can use OpenTracing’s API for manual instrumentation and remain vendor-neutral for for the traces your service emits. You do not need to run the Datadog Agent to send traces to Lightstep. Configure Tracers to Send Data to Lightstep To send data from your system to Lightstep, you need to configure the tracer to point to your Satellites and to send certain tags required by Lightstep to ingest and display the data to you. Configuration is different, depending on if you are using your own on-premise Satellites or the Lightstep Public or Developer Mode Satellites with Ruby or Java tracers. If you’re using on-premise Satellites or the Developer Mode Satellite, change the Tracer Hostname to point to the Lightstep Satellites by setting these environment variables. DD_AGENT_HOST=<Satellite host> DD_TRACE_AGENT_PORT=<Satellite port> If you’re using Lightstep’s Public Satellites and your tracers are in Java or Ruby, you need to run a proxy that encrypts the trace payload before it reaches Lightstep. Point your tracer to the Proxy instead of the Satellites. The proxy can be run as a side-car to your application. Lightstep provides a docker image to make this simple. To start the proxy with defaults, run: docker run -p 8126:8126 lightstep/reverse-proxy:latest You can see the complete list of options using the –help flag docker run lightstep/reverse-proxy:latest --help If you are using the Public Satellites and a language other than Java or Ruby, set the hostname and port on your tracers to connect to to the public Satellites. Configure the Tracer to Send Certain Tags You must set these as global tags on all spans from a service. ||The name of the service from which spans originate.</br> Set this as a global tag so all spans emitted from the service have the same name.</br></br> This tag allows Lightstep to accurately report on your services, with features such as the Service diagram and the Service Directory.| ||The access token for the project the tracers report to.</br></br> Set this as a global tag so all spans emitted from the service have the same token.</br></br> Lightstep Satellites need this token to accept and store span data from the tracer. Reports from clients with invalid or deactivated access tokens will be rejected on ingress.|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046152085.13/warc/CC-MAIN-20210805224801-20210806014801-00445.warc.gz
CC-MAIN-2021-31
2,803
21
http://www.talkbass.com/forum/f129/best-service-ship-gig-bag-1021523/
code
The tough part about shipping gig bags isn't the weight, but the volume. It takes a largish box even if you fold up the bag 12 times. I'd say $20 is a reasonable starting point for shipping—if it's less, it won't be much less; if it's more it won't be much more, for a common gig bag. The size of the box is the thing, and some gig bags cannot be folded into a smaller space. Try using the calculators at the UPS and FedEx websites. The USPS has the smallest size restrictions, so, once again, it depends on what you can cram it into without messing it up. Edward G., Baltimore, MD "The first casualty of war is the truth. The second is usually the battle plan." —Maj. Steve Lott Last edited by Edward G. : 10-09-2013 at 06:45 PM.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164695251/warc/CC-MAIN-20131204134455-00090-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
734
4
https://lessonplanet.com/teachers/math-drills
code
Get ready, set, go! This app will have your young mathematicians striving for first place as they work on their basic math skills. Math Drills allows for review, practice, and testing of basic math drills. - Plus (addends: 0 to 9) - Multiplication (product 0 to 12) - Addition & Subtraction - Multiplication & Division This app has an extensive number of options that can be customized for your specific needs. - The range of numbers for each operation - Number of problems in a review, practice, or test session - Types of problems: - Fill in number: 5+ 4 - Fill in operator: 5 __ 4 = 9 - Fill in comparison <.>, = - Appearance of problems (backgrounds, arrangement (horizontal) - Input : Keypad or multiple choice - Assistant: Number line There is also a detailed reporting feature that allows you to print reports. - Graph of accuracy and speed - Test detail: - Total problems - Number of stops - Number of missed problems - High score - Specific problems that were answered incorrectly - Time on each problem - Have each learner chart his/her progress and keep records of personal best in terms of both time and accuracy - This app does allow for multiple student profiles in case multiple learners are sharing a tablet - Print out progress charts of accuracy and speed for students so they can track their own progress - Allows for practicing and testing of basic math skills - Has extensive settings options - Clear, detailed reporting features - Allows multiple student profiles - Addition sum and subtraction subtrahend limited to 18
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.31/warc/CC-MAIN-20231206063543-20231206093543-00131.warc.gz
CC-MAIN-2023-50
1,541
33
https://devhub.checkmarx.com/cve-details/cve-2018-8119/
code
Improper Certificate Validation A spoofing vulnerability exists when the Azure IoT Device Provisioning AMQP Transport library improperly validates certificates over the AMQP protocol, aka "Azure IoT SDK Spoofing Vulnerability." This affects C# SDK, C SDK, Java SDK. CWE-295 - Improper Certificate Validation The authenticity component of a web system stems from the ability to validate “Digital certificates”, which (i) establish trust between two or more entities sharing data over a network; (ii) ensure data at rest and transit is secure from unauthorized access; and (iii) check the identity of the actors that interact with the system. An application with absent or ineffective certificate validation mechanisms allows malicious users, impersonating trusted hosts, to manipulate the communication path between the client and the host, resulting in unauthorized access to data and to the application’s internal environment, and potentially enabling man-in-the-middle attacks.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817081.52/warc/CC-MAIN-20240416093441-20240416123441-00017.warc.gz
CC-MAIN-2024-18
985
4
https://greencircle.vmturbo.com/thread/3075-doescan-vmturbo-rightsizing-respect-application-minimum-resource-requirements
code
Say I have a VM that is rarely used, maybe it's used to run some reports at the end of every month, but those reports are resource intensive and the minimum hardware requirement is 6G of RAM and 6 vCPU. Since 29 days out of the month it receives almost no traffic will I get downsizing recommendations? After several months will VMTurbo recognize the usage pattern and stop recommending I downsize the VM? Can I set a threshold somewhere so that I only get downsizing recommendations if a vm is over provisioned by a %? Is the best, or only, solution for preventing certain VMs from being rightsized creating a group and disabling the rightsize action?
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401601278.97/warc/CC-MAIN-20200928135709-20200928165709-00656.warc.gz
CC-MAIN-2020-40
652
2
https://www2.gemini.edu/observing/phase-ii/ot/ot-description/browser
code
The OT Browser provides a simple way to search for observations in the programs that are accessible with the currently active key. The Browser is accessed by clicking the OT Browser... button on the welcome screen or by selecting OT Browser... from the File menu in the Science Program Editor. The main browser screen provides controls for the main search parameters and options for displaying the results. The query constraints are set in the upper section. Wildcards (*,?) can be used in the text boxes. Pull down menus give lists of other options. Click Reset to clear all constraints and start with default values. If the Include Remote Programs checkbox is checked, then the query will be run on programs in the remote Observing Database (ODB) as well as on local programs. Uncheck this box to just search local programs. Then click Query to start the query. Only regular observations, not those in the special Templates folders, are searched. Also, only the information in the static (top-level) instrument components can be searched, so configuration changes in instrument iterators in sequences will be missed. If any instruments are selected in the Inst menu in the General tab, then the tabs for those instruments are activated. Selecting one then allows additional instrument configuration constraints to be selected (see the example below). You may save the current set of query parameters by selecting Save New Preset... and then providing a short name. This option will then be available in the menu to the right of the gears preferences button. The results are displayed in the lower section of the Browser window. Observations in local programs are shown with a black font, observations in programs in the ODB are shown with a grey font. You can configure the columns that are shown in the results table by clicking the Configure... button at the bottom. The Save As... button allows you to save the query results to a Skycat-format ASCII file. A dialog will appear where you can selected the directory and give the file name. Double-clicking on a row in the table or selecting a row in the table and clicking Show Observation will open the program in a Science Program Editor at the position of the observation. If a program is in the ODB then it will be downloaded and displayed. Highlighting rows in the table and then clicking Elevation Plot will display the elevation vs. time graph for the selected observations.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475825.14/warc/CC-MAIN-20240302120344-20240302150344-00083.warc.gz
CC-MAIN-2024-10
2,434
10
https://www.digitalmarketplace.service.gov.uk/g-cloud/services/630451772648553
code
Qtip.me is a cloud service that enables people to queue for a service remotely using their mobile phone allowing freedom to utilise waiting times thereby improving the customer service experience. For the buyer, it brings down operating costs and makes it easy to manage customer queues and interact with customers. - Remote and mobile queuing via Mobile and Web apps - Identify the customer and their needs in advance - Receive instant customer service feedback - Real time monitoring of customer flow and feedback - Support for scheduling appointments or reserving time - Integrate with web, mobile apps, other services using REST APIs - Real time PUSH, SMS notifications about queue's progress - Track your staff's productivity and development needs - Ticket notes for future reference for returning customers - Reduce customer's waiting time by upto 50% - Zero overhead for queue maintenance and management - One stop solution for Customer queue and feedback management - Predict your customer flow and plan accordingly - Connect every customer interaction with feedback - Improve staff productivity by making information available in advance - Identify and act on service bottlenecks in real time - Happy customers and energetic staff £500 to £1800 per unit per month - Education pricing available - Free trial available Wild Rest Limited |Software add-on or extension||No| |Cloud deployment model||Hybrid cloud| All qtip.me services run in the cloud and are location based. Everyone who uses this for queuing must allow location access in their browser or for the installed application. For the buyer (business), they need access to working internet connection and a browser to manage their Queuing Dashboard. The system is installed in two tier (tier 1 = public; web apps; tier 2 = private; qtpi.me APIs), usually managed by supplier. In case the buyer wants to manage the service on their own (e.g. within their firewall), the appropriate system requirements must be met which are given below. |Email or online ticketing support||Email or online ticketing| |Support response times||Email support is available between 9:00 - 18:00 UTC on all days except bank holidays. All tickets with severity high and above are usually answered within 2 hours. It is also possible to escalate issues that block the product usage.| |User can manage status and priority of support tickets||No| |Web chat support||No| |Onsite support||Yes, at extra cost| * Level 0: FAQ + Help available on website * Level 1: Email support with help related to forgot password, understanding the front-end; documentation related to system features etc. * Level 2: On-site support, which is charged extra; usually includes staff training of the software. It is possible to provide an Account Manager or Cloud Support Engineer however, this must be agreed with the buyer. |Support available to third parties||Yes| Onboarding and offboarding |Getting started||To be able to start using the system, the buyer has to licence the system for multiple account use or create as many number of accounts they want on the managed system. Once the Cloud Queuing Dashboard has been created, the buyer's staff can access the user documentation available on the website. We also provide with a "Getting started document" that explains the basics of the system. It is possible to schedule an onsite or online training; however, they are charged extra.| |End-of-contract data extraction|| No personal user data is stored in our system unless, the buyer wants to do so (e.g. they want to identify their customer). In any case, the buyer and supplier agree when the identification data is wiped out automatically from our system. Typical wipe-out scenarios are: after a ticket has been served; after 6 months; after 12 months; after buyer account deletion. For all the buyer's staff account, no personal data is stored either; other than their username and password. When the contract ends, all this information is wiped out from our database. |End-of-contract process||At the end of contract; the Cloud Queuing Dashboard account is deleted by us and all identifiable data related to this account is wiped out. This means that all user accounts for buyer's staff is removed; It is not possible to recover the data once the accounts have been deleted. The end of contract process is included in the price of contract. Unless the system has been customized, the end of contract process is always included in the price.| Using the service |Web browser interface||Yes| |Application to install||No| |Designed for use on mobile devices||Yes| |Differences between the mobile and desktop service||The mobile interface of our service is available for the end-users of the system who will use their mobile devices to secure their place in the queue. For the buyer, currently, this system can be used only from a browser on their laptop, desktop or tablet computer.| |Accessibility standards||WCAG 2.0 A| |Accessibility testing||Keeping in mind the nature of the product and that it can be accessed by everyone; no specific interface testing has been done with users of assistive technology. However, it is made sure via automated testing that all controls and inputs follow the WCAG 2.0 guideline. The same holds good for the formatting of the webpage as well.| |What users can and can't do using the API|| APIs are available for integration with other services. Businesses must obtain an API key per account and use that for all sorts of integrations. Available APIs for integration to website, mobile apps etc are: |API documentation formats| |API sandbox or test environment||Yes| |Description of customisation||All the customization of the software comes at additional cost and is done by Codemenders Oy. It must be discussed what needs to be customized. Example, "taketicket" behaviour can be customized if there is a specific requirement from the buyer.| |Independence of resources|| For licensed purchases, we recommend the buyer the limitations of the service and suggest them to use load balancing if they plan to use service above the recommended standards. Same concept is applied for managed accounts as well. Apart from this, our system has been thoroughly tested to work for 60 tickets per second which also means that it can handle upto 216000 tickets per hour. |Service usage metrics||Yes| Metrics is provided on per day or date range basis. Example of some of the data provided as a part of the metrics are: * Average service duration * Average wait duration * Average feedback * Per ticket break down of wait duration, service duration, feedback * Time based statistics of "expected wait time" Apart from this, its possible for the account admin to view productivity metrics for a staff; e.g. time spent per ticket, feedback received per ticket, related average values. |Supplier type||Reseller (no extras)| |Organisation whose services are being resold||Codemenders Oy| |Staff security clearance||Other security clearance| |Government security clearance||Up to Security Clearance (SC)| |Knowledge of data storage and processing locations||Yes| |Data storage and processing locations||European Economic Area (EEA)| |User control over data storage and processing locations||Yes| |Datacentre security standards||Managed by a third party| |Penetration testing frequency||At least once a year| |Penetration testing approach||In-house| |Protecting data at rest|| |Data sanitisation process||Yes| |Data sanitisation type|| |Equipment disposal approach||In-house destruction process| Data importing and exporting |Data export approach|| For buyer's staff accounts, it is not possible to export the data at this point of time. Their account contains data like: username, email and phone (for notifications), password. However, if this is a requirement from the buyer, then the supplier and buyer should agree on the customization and implementation details. A valid export situation is to export the customer flow statistics (e.g. per ticket details like waiting time, service time, feedback, customer's name). All of this data can only be exported by account admin and is exported in CSV. |Data export formats||CSV| |Data import formats||CSV| |Data protection between buyer and supplier networks|| |Data protection within supplier network|| Availability and resilience Unless in situation of an unforeseen circumstance (including act of god), our SLA includes: Cloud service uptime of 99.9%. Monitored email support between 9:00 - 18:00 UTC on all days except banking holidays. Refund in case of non-compliance to guaranteed levels must be agreed in the contract and is subject to case-by-case basis. |Approach to resilience|| Backup of real time queuing data happens every 4 hours. Backup of user accounts (buyer, buyer staff) and system configuration happens every 24 hours. Every backup is checked with possibility to setup a new instance with that data. Any information more than this is made available on request and once an NDA has been signed. |Outage reporting||Email alerts, social media accounts (e.g. twitter), public blog.| Identity and authentication |User authentication needed||Yes| |User authentication||Username or password| |Access restrictions in management interfaces and support channels||Different accounts have different level of access to the system. It is just not possible for client level access (e.g. mobile clients) to access any data that is meant for the user (e.g. daily statistics). This is done at various levels based on key based authentication, username-password validation and hence, an access token based authentication etc.| |Access restriction testing frequency||At least every 6 months| |Management access authentication||Username or password| Audit information for users |Access to user activity audit information||You control when users can access audit information| |How long user audit data is stored for||Between 1 month and 6 months| |Access to supplier activity audit information||No audit information available| |How long system logs are stored for||Between 1 month and 6 months| Standards and certifications |ISO/IEC 27001 certification||No| |ISO 28000:2007 certification||No| |CSA STAR certification||No| |Other security accreditations||No| |Named board-level person responsible for service security||Yes| |Security governance accreditation||Yes| |Security governance standards||ISO/IEC 27001| |Information security policies and processes|| All data stored on our server (database) is deemed highly confidential. All data that could identify an individual (e.g. user-accounts, password) are encrypted. All communication with the server (e.g. for maintenance purpose) has to happen through SSH Certificate Login. All the servers must be configured to handle DOS, DDOS attacks, Sql Injections, typically using the mod_security plugin of Apache. All the servers must be secured with industry standard tools like UFW, Fail2Ban, DenyHosts. |Configuration and change management standard||Supplier-defined controls| |Configuration and change management approach||As for the server is concerned, all the unwanted ports are kept closed all the time and no such change is agreed to which causes change in the firewall configuration of the server. All software changes to the cloud service are assessed for severity of impact on security of the system by performing black box and white box testing of Cloud service offering. Typical example would be that when a new API is introduced, it is thoroughly tested for all positives, false positives, negative scenarios to make sure it does not cause any surprises.| |Vulnerability management type||Supplier-defined controls| |Vulnerability management approach||Standard tools like rkhunter are used to identify vulnerability in the cloud software server. General know how of potential threats are obtained from the tech blogs and mailing lists (e.g. heart bleed bug or shell shock). Server is regularly checked for any known vulnerabilities and security patches are applied based on requirement.| |Protective monitoring type||Supplier-defined controls| |Protective monitoring approach||Various system monitors keep running on the server than alert the administrator for any potential compromises. Any unauthorized access to the server is immediately blocked and email triggered to admin for review of the approach. All such incidents are treated with utmost priority and responded to as soon as possible.| |Incident management type||Supplier-defined controls| |Incident management approach||Common approach for incidents related to the cloud server is to launch a new service instance with the latest backup available and a pre-defined and secured image of the operating system. Incident reports are provided using standard tools like LogWatch, Tiger.| |Approach to secure software development best practice||Supplier-defined process| Public sector networks |Connection to public sector networks||No| |Price||£500 to £1800 per unit per month| |Discount for educational organisations||Yes| |Free trial available||Yes| |Description of free trial||FREE trial includes all functionalities of the software that can be tested on a staging server. It is available for a maximum duration 6 weeks.| |Pricing document||View uploaded document| |Terms and conditions document||View uploaded document|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155702.33/warc/CC-MAIN-20180918205149-20180918225149-00361.warc.gz
CC-MAIN-2018-39
13,332
136
https://kukayudar.com/cd/B19306_01/servervxmfq-2982ebfm.102/b14200/functions191
code
To convert a String to Numeric uses sql conversion functions like cast or convert Use try_convert(numeric(38,5), [ColumnName]) This will return NULL when it cannot convert the string. If it can, it will be able to convert it to a numeric numbe . How to use CAST or CONVERT? SELECT CAST(YourVarcharCol AS INT) FROM Tabl SQL Server SQL Server gibt eine Fehlermeldung zurück, wenn die nicht numerischen Daten char, nchar, varchar oder nvarchar in die Typen decimal, float, int oder numeric konvertiert werden. returns an error message when converting nonnumeric char, nchar, nvarchar, or varchar data to decimal, float, int, numeric SQL. Copy Code. CASTE (YourData as NUMERIC ( 18, 2 )) I would suggest you to read Data Type Conversion (Database Engine) [ ^] and CAST and CONVERT (Transact-SQL) [ ^] functions. Hope it helps! --Amit. Permalink. Posted 8-May-13 19:51pm A common misconception is to think that CHAR ( n) and VARCHAR ( n), the n defines the number of characters. Das n in CHAR ( n) und VARCHAR ( n) definiert jedoch die Zeichenfolgenlänge in Byte (0-8.000). But in CHAR ( n) and VARCHAR ( n) the n defines the string length in bytes (0-8,000) SQL Server DataTypes: Varchar, Numeric, Date Time [T-SQL Examples] Details Last Updated: 22 March 2021 . What is Datatype? A datatype is defined as the type of data which any column or variable can store in MS SQL Server. While creating any table or variable, in addition to specifying the name, you also set the Type of Data it will store. How to use MS SQL datatype. You need to define in. U can convert a varchar value to numeric only if varchar column have only numeric digits(0 to 9). if it contains some alphabetic/special-charactor values, u cant convert. for example: declare @value varchar(10 To convert a Varchar to INT uses sql conversion functions like cast or convert. Syntax. CAST ( expression AS datatype [ ( length ) ] ) CONVERT ( datatype [ ( length ) ] , expression [ , style ] ) Examples. The examples below shows the conversion of a string to the int type. A varchar variable and an int variable are declared, then the value of the varchar variable is set. It converts varchar. The datatype to convert expression to. Can be one of the following: bigint, int, smallint, tinyint, bit, decimal, numeric, money, smallmoney, float, real, datetime, smalldatetime, char, varchar, text, nchar, nvarchar, ntext, binary, varbinary, or image. Optional Convert varchar to numeric Forum - Learn more on SQLServerCentral. You can always convert a varchar field to a decimal field.I have tested this by creating a Test Table with a decimal field with. Es gibt keine Garantie, dass der SQL Server nicht versucht, führen Sie die CONVERT zu numeric(20,0) vor es läuft der filter in der WHERE - Klausel.. Und selbst wenn es das täte, ISNUMERIC ist nicht ausreichend, da es erkennt £ und 1d4 als numerische, welche nicht umgewandelt werden können, um numeric(20,0).(*) Aufteilung in zwei separate Abfragen, von denen der erste Filter die Ergebnisse. Example. Let's look at some Oracle TO_NUMBER function examples and explore how to use the TO_NUMBER function in Oracle/PLSQL. For example: TO_NUMBER('1210.73', '9999.99') Result: 1210.73 TO_NUMBER('546', '999') Result: 546 TO_NUMBER('23', '99') Result: 23 Since the format_mask and nls_language parameters are optional, you can simply convert a text string to a numeric value as follows Converti numeric para varchar e consegui executar a query com sucesso. - Alineat 18/05/20 às 18:35 No conteúdo da coluna CPF de Tabela2 existem somente algarismos ou algarismos e I have an SQL table of varchar columns which contain Greek formatted numbers (. as thousand separator and comma as decimal separator) The classic conversion CONVERT(numeric(10,2),REPLACE([value],.. sql-server sql-server-2016 datatypes type-conversion varchar. Share. Improve this question . Follow edited May 1 '19 at 3:12. Solomon Rutzky. 62.5k 6 6 gold badges 127 127 silver badges 254 254 bronze badges. asked Sep 11 '18 at 0:20. equipe9 equipe9. 127 1 1 gold badge 1 1 silver badge 5 5 bronze badges. Add a comment | 4 Answers Active Oldest Votes. 3. This database is only for US use and I. The function will convert the Char_expression to a number. for example: you can have the following: SELECT * FROM customer WHERE TO_NUMBER (SUBSTR (phone, 1, 3)) = 603 ; I hope this helps If Object_ID('test','U') Is Not Null Drop Table test go create table test (A varchar(20)) insert into test values ('234,32'),('-6'),('1,234,213') select case when charindex(',',A)= 0 then A else replace(reverse(stuff(reverse(A),charindex(',',reverse(A)),1,'.')),',','') end as A from test /* A ----- 234.32 -6 1234.213 * It makes no sense to convert to a number only to convert it back to a string as the SqlCommand take strings. What is your exact problem? rajrprk 29-Dec-11 2:21a Habe eine Tabelle in der ich einige Felder in von VARCHAR zu NUMERIC umwandeln will, nur bekomm ich leider eine Fehlermeldung wenn ich dies versuche. Hab daraufhin versucht mittels Query die numerischen und nicht numerischen Werte anzuzeigen: Code: SELECT Utb_S_ FROM TV_Order WHERE isnumeric (Utb_S_) = 0 SQL Server - How to convert varchar to decimal — This SQL reads in a varchar (10) field called work_hours that could have anything in it. It should be numeric represented as decimal. — The CASE statement will produce either 0.00, or (if it is numeric) whatever is in the work_hours field Convert Varchar to Decimal Forum - Learn more on SQLServerCentral. Part of the issue may be using ISNUMERIC. This function is barely passable as a validation or filtering tool Until that is fixed, you can't alter the column datatype, because SQL doesn't know what to do with the row, and it doesn't want to lose you data. So, throw together some quick test code in C# or similar to read every row, and report to you which ones can't be converted to numeric values. Then you can fix the rows manually, and change your DB SELECT A.SETMOD, B.DESCRP FROM PMS.PSBSTTBL A JOIN PMS.PR029TBL B ON A.SETMOD = B.PAYMOD. Paymod is of datatype VARCHAR, SETMOD of datatype decimal. sql. sql-server. tsql. Please log in or register to add a comment If you are planning to convert varchar to float you should know that these two data types are not compatible with each other. In the earlier versions of SQL Server you had to use CASE, ISNUMERIC & CONVERT to convert varchar to float but in SQL Server 2012, you can do it with just one function TRY_CONVERT.Let me create a sample to explain it Any Case using CAST or CONVERT, For Decimal or Int gives me the following error: Error converting data type varchar to numeric. Any knows how to resolve. Or any knows any parameter or similar, to indicate to the Cast or Convert, that the decimal separator is a comma instead a dot. Tuesday, April 29, 2008 8:06 AM Recent Posts. You're a Groff programmer if you can identify these 5 signs; Why has Crate.io reverted to its pure open source roots? Send your scans over your network to a Linux server How to convert Varchar to Double in SQL? MySQL MySQLi Database. You can convert varchar to double using CAST() function. The syntax is as follows: SELECT yourColumnName1,yourColumnName2,.....N, CAST(yourColumnName AS DECIMAL(TotalDigit,DigitAfterDecimalPoint)) anyVariableName FROM yourtableName ORDER BY anyVariableName DESC; To understand the above syntax, let us create a table. The query to. I have an SQL table of varchar columns which contain Greek formatted numbers (. as thousand separator and comma as decimal separator) The classic conversion. CONVERT(numeric(10,2),REPLACE([value],',','.')) does not work because the . (thousand separator) kills the conversion. E.g try. CONVERT(numeric(10,2),REPLACE('7.000,45',',','.') Bom dia. Estou tentando montar um texto com campos SQL. SELECT 'RECEBEMOS DE XXXXXXXXXXXXXXXXXXXX O VALOR DE R$' + TMOV.VALORLIQUIDO, + 'REFERENTE AO PAGAMENTO DE' + TITMMOV.QUANTIDADE, + 'M³ DE CARVÃO VEGETAL CONFORME NOTA FISCAL Nº' + TMOV.NUMEROMOV FROM TMOV, TITMMOV WHERE TMOV · Bom dia, Experimente fazer a conversão das colunas numéricas. Starting from SQL Server 2012, you can format numeric types using the T-SQL FORMAT() function. This function accepts three arguments; the number, the format, and an optional culture argument. The format is supplied as a format string. A format string defines how the output should be formatted. Here's an example: SELECT FORMAT(1, 'N. How to Order Numeric Values in a Varchar Field; Top 3 SQL Errors That Will Leave Your Users Stranded; Post a comment. Comments (RSS) Trackback; Permalink; Click here to cancel reply. Name: Email: Comment: 3 comments . Martin 19 Sep 2018 at 1:09 pm. It seems to me that this article is not finished. It starts out by saying there are two different functions, but then only exemplifies CAST. select * from supplier order by TO_NUMBER (supplier_id); This SQL converts the supplier_id field to a numeric value and then sorts the value in ascending order. This solution returns an error if not all of the values in the supplier_id field are numeric. Solution #2 (more eloquent solution If you read almost any book on the SQL language, you'll see definitions where: varchar(n) means a varying length character data type, and where n is the number of characters it can store. SQL Server 2019 changes things. If that's how you've seen it, SQL Server 2019 is going to change your understanding numeric_expr. A numeric expression. date_or_time_expr. An expression of type DATE, TIME, or TIMESTAMP. binary_expr. An expression of type BINARY or VARBINARY. Optional: format. The format of the output string: For numeric_expr, specifies the SQL format model used to interpret the numeric expression. For more information, see SQL Format Models We are storing the numeric and string value in the varchar. For example, $500. If we use the Isnumeric, it will return true only. In order to avoid this kindly of mirror issue, we can use the try_Cast, It will return false only DECLARE @myVariable AS VARCHAR(40); SET @myVariable = 'This string is longer than thirty characters'; SELECT CAST(@myVariable AS VARCHAR); SELECT DATALENGTH(CAST(@myVariable AS VARCHAR)) AS 'VarcharDefaultLength'; SELECT CONVERT(CHAR, @myVariable); SELECT DATALENGTH(CONVERT(CHAR, @myVariable)) AS 'VarcharDefaultLength' I'm trying to find a way to format a FLOAT variable into a varchar in SQL Server 2000 but using CAST/CONVERT I can only get scientific notation i.e. 1e+006 instead of 1000000 which isn't really what I wanted. Preferably the varchar would display the number to 2 decimal places but I'd settle for integers only as this conversion isn't business critical and is a nice to have for background. How to test numeric in SQL Server. Sometimes you will run into a database table that is storing numeric data inside of a varchar or nvarchar column. This is not recommended, but it does happen. Normally you would store numeric data in a numeric or decimal column and the database will make sure the data has only numbers. If the data is in a nvarchar column, then the database won't care if the. -- sql convert number to text - numeric to text - numeric to varchar . SELECT top (3) PurchaseOrderID, stringSubTotal = CAST (SubTotal AS varchar) INTO NumberValidation. FROM AdventureWorks. Purchasing. PurchaseOrderHeader. ORDER BY NEWID GO. SELECT * FROM NumberValidation /* Results . PurchaseOrderID stringSubTotal. 1027 20397.30. 2815 525.00. 340 7623.00 */-- SQL update with top. UPDATE TOP. SQL Data Types. Each column in a database table is required to have a name and a data type. An SQL developer must decide what type of data that will be stored inside each column when creating a table. The data type is a guideline for SQL to understand what type of data is expected inside of each column, and it also identifies how SQL will interact with the stored data. Note: Data types might. In this article, we will convert text to number in multiple versions of SQL Server and will see the difference. I will use four different Data conversion functions (Convert, Cast, Try_Convert & Try_Cast) to convert Text to Number. Let me explain this with simple examples. In SQL Server 2005/2008 : Example 1 : (Convert Tex TechNet; Produkte; IT-Ressourcen; Downloads; Training; Support. ,b.trans_no as Transaction_Number,c.item from guests a inner join trs_info b on a.guest_no = b.trans_no inner join transact c on b.trans_no = c.item The table trs_info, column trans_no is all numeric, such as 2100200 whereas the table transact, column item is either numbers, such as 15:30 is varchar (mix of numbers or words\letters) Etsi töitä, jotka liittyvät hakusanaan Sql convert varchar to numeric tai palkkaa maailman suurimmalta makkinapaikalta, jossa on yli 19 miljoonaa työtä. Rekisteröityminen ja tarjoaminen on ilmaista Registriere Dich kostenlos und diskutiere über DBs wie Mysql, MariaDB, Oracle, Sql-Server, Postgres, Access uvm Convert NVARCHAR to FLOAT Dieses Thema im Forum Microsoft SQL Server wurde erstellt von MLA_PP , 12 Dezember 2017 Tag: ms sql server Convert VARCHAR to number Convert VARCHAR to INT SQL Server. Posted on April 24, 2012 by deviprasadg. Conversion from varchar to int (integer) can be done using CAST or CONVERT. Below peice of code converts varchar to int using CAST. [sql] DECLARE @intVariable INT DECLARE @VarcharVariable VARCHAR(10) SET @VarcharVariable = '99999' -Converting VARCHAR TO INT Using CAST. Re: convert varchar to number in a proc sql. Posted 10-29-2014 01:06 PM (45233 views) | In reply to sqltrysh. You have to convert the char variable to number. If G.FACT is varchar then use: CASE WHEN A.SOUR in ('BIO') then input(G.FACT,best12.) else F.FACT end as FACT. or If F.FACT is varchar then use I have imported data from excel file. When data came to SQL table, the type of AMOUNT column was varchar. I tried to convert and cast amount type of amount column to number type but it does not allow me to convert. What is the best way of importing data into SQL and type stays the same as it was in excel file varchar_column ----- Ora123 786 database 92db The output should contain the following values: 786 Solution1: Using regexp_like function The following oracle SQL query uses regexp_like function to get only the values that are purely numeric: select varchar_column from table_name where regexp_like(varchar_column,'^[0-9]$') AgencyDefinField is a VarChar SELECT * FROM Accounts WHERE (CONVERT(numeric, AgencyDefinField) = 4765765) Beginning Today I started getting the following message Microsoft ODBC SQL server driver [SQL Server ] Error converting data type varchar to numeric I have two Questions: 1. What could have cause the problem to only now appear 2. How to fix i I was recently offered a position that requires intermediate to advanced SQL skills and it had been a couple years since I worked with SQL. I taught myself a bit at a previous position but have not needed it in my current job. I did take 2 SQL assessments prior to receiving an offer so there has been some level of technical assessment and I was upfront with not having used it in a couple of. TechNet; Products; IT Resources; Downloads; Training; Support. I have a SAS dataset created from an MS SQL Server table which has a field stored in SQL as varchar(500). This field shows as character length 500 in the SAS dataset as expected. Values showing in this field are simply single digits (0,1,2,etc.) and I need to convert these to number. So normally should be case of using an input function with. When comparing a character value with a numeric value, Oracle converts the character data to a numeric value. Conversions between character values or NUMBER values and floating-point number values can be inexact, because the character types and NUMBER use decimal precision to represent the numeric value, and the floating-point numbers use binary precision SQL Server Inserts 0 When Empty String is Inserted to Integer Column Similar to Oracle, SQL Server also allows you to use a string literal to insert a value into an integer column (INT data type i.e.). But if you insert an empty string to a INT column, SQL Server inserts 0, not NULL It happens when adding a string and a numeric value. More likely you have to use: insert into #Tmp SELECT 1, 'TDS @' +CAST(T1. rate AS VARCHAR(30)) + ' %' FROM Test0 T0 INNER JOIN Test1 T1 ON T0. DocEntry = T1. AbsEntry. to convert the rate to a string before adding to another string. Though you have also the FORMAT function depending on your SQL Server it is IMO to avoid doing that on the SQL Server side and rather serve raw data that are formatted on the client side as you wish Cannot convert Varchar to Numeric issue. Microsoft SQL Server Forums on Bytes. 468,126 Members | 1,513 Online. Sign in; Join Now; New Post Home Posts Topics Members FAQ. home > topics > microsoft sql server > questions > cannot convert varchar to numeric issue Post your question to a community of 468,126 developers. It's quick & easy. Cannot convert Varchar to Numeric issue. Michel. Hi again. Because @sql is varchar, @i must also be varchar when constructing your dynamic sql string. The following should resolve your problem . declare @i as numeric(18,0) declare @sql as varchar(8000) set @i =4 set @sql ='select top '+ CAST(@i AS VARCHAR) + ' * from dbo.tbl_ls_feed_data' exec(@sql) Report abuse. Reply; 12 years ago . by yogeshkadvekar. yogesh kadvekar, India. Joined 14 years ago. SQL> select to_number('300.20') from dual; TO_NUMBER('300.20')----- 300.2 Though some NLS (Language) database settings (depends which country you are in etc.) will use a comma as the decimal point seperator instead. What Frank is suggesting is that you have some data in the table that just isn't a valid number i.e. it contains some other character. Bear in mind that oracle does support. yyyymmdd - sql convert varchar to numeric . Convert number to varchar in SQL with formatting (6) Is there a way in T-SQL to convert a TINYINT to VARCHAR with custom number formatting? For instance, my TINYINT has a value of 3 and I want to convert it to a VARCH of 03, so that it always shows a 2 digit number. I don't see this ability in the CONVERT function. Correción: 3-LEN. declare @t. Error converting data type nvarchar to numeric. Select ROW_NUMBER () over (ORDER BY DATENAME (MONTH, convert (datetime,Date,105))+'-'+DATENAME (year, convert (datetime,Date,105)) ASC) as ID, DATENAME (MONTH, convert (datetime,Date,105))+'-'+DATENAME (year, convert (datetime,Date,105)) as Month, sum (cast (Total_Amount as numeric (18,2))) as. If we try to convert VARCHAR to NUMBER using to_number function as follows: INSERT INTO in_list_data (element) VALUES to_number(l_element); Using to_number or CAST in above statement gives us error: ora 03001 unimplemented feature while compiling procedure If we try to use to_number or CAST in our code to convert VARCHAR to NUMBER then we get error I am writing some SQL to form the basis of views to pull data from a Microsoft SQL Server source into Azure SQL Database, and then the data would go to Power BI. The data was all presented in string format initially (not my data, not my monkeys, not my circus), and I wanted to correct the data types before the data got into Power BI Try specifying the desired precision and scale on your decimal/numeric declaration: SELECT CONVERT(varchar(100), CAST(@testFloat AS decimal(38,2)) I have a dynamic SQL query that I'm using for reporting purposes. However when I run the sp I'm getting a message of: | 4 replies | Microsoft SQL Serve SQL varchar usually holds 1 byte per character and 2 more bytes for the length information. It is recommended to use varchar as the data type when columns have variable length and the actual data is way less than the given capacity. Let's switch to SSMS and see how varchar works. The following example creates three variables (name, gender and age) with varchar as the data type and different. In the earlier version of SQL Server, we usually use CONVERT function to convert int into varchar and then concatenate it. Given below is the script. Use AdventureWorks2012 GO SELECT CONVERT(VARCHAR(5),[DepartmentID]) + ' ' + [Name] AS [Department ID & Name] FROM [HumanResources].[Department] --OUTPUT Solution 2 VARCHAR to NUMERIC... / Microsoft SQL Server / Доброе утро, господа.Необходимо написать инсерт запрос, который вставляет данные в поле типа numeric,а берет их из поля типа varcher.Но в поле-источнике, есть значения к-е нельзя преобразовать к числу Learn more about the numeric data type in SQL Server and how to resolve the above conversion issue, by reading the relevant article on SQLNetHub. Watch the Live Demonstration on the VARCHAR to FLOAT Data Type Conversion Erro Anyway, by default SQL Server accepts numeric in en-US format, means with a dot as decimal separator. So you have to replace the comma by a dot: So you have to replace the comma by a dot: DECLARE @num nvarchar(100); SET @num = '10,15'; SELECT CONVERT(float, REPLACE(@num, ',', '.' Microsoft SQL Server Oracle Comment; BIGINT: NUMBER(19) BINARY: RAW-BIT: NUMBER(3)-CHAR: CHAR-DATETIME: DATE: Fractional parts of a second are truncated: DECIMAL: NUMBER(p[,s])-FLOAT: FLOAT(49)-IMAGE: LONG RAW-INTEGER: NUMBER(10) NUMBER range is -2,147,483,647 to 2,147,483,647: MONEY: NUMBER(19,4)-NCHAR: NCHAR-NTEXT: LONG-NVARCHAR: NCHAR-NUMERIC: NUMBER(p[,s])-REAL: FLOAT(23)-SMALL DATETIME: DAT 1 = 1,234.560 2 = 000,001,234.560 3 = -1,234.560 4 = 1,234.560- 5 = + 1,234.560 6 = - 1,234.560 7 = $ 1,234.560 8 = $ -1,234.560. The first thing to notice is that all of the results, except number 2, have leading spaces. I could have changed the length of the formatting string to match the size of the value SET @MyNumber = 12345.48. SELECT STR (@MyNumber,10,4) Result: 12345.4800 ( OK) If you set the number of decimal places to less than the decimal places in the FLOAT, then SQL Server will round your number to that number of decimal places T-SQL Query for SORTing Numbers stored as String (VARCHAR) December 6, 2011 Leave a comment Go to comments Many people come to me as a point of SQL reference and ask, How can we sort the numbers if they are stored in a VARCHAR column in a table?
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305260.61/warc/CC-MAIN-20220127103059-20220127133059-00046.warc.gz
CC-MAIN-2022-05
22,362
20
https://flow-e.com/blog/author/monica/page/2/
code
5 Email Habits That are Way Better Than Inbox... In the email power user circuit, inbox zero is all the rage. The goal? Having … How to Use FLOW-e from Feed to Task Board What is the feed for? The feed represents the entry point of all of your …
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814292.75/warc/CC-MAIN-20180222220118-20180223000118-00742.warc.gz
CC-MAIN-2018-09
249
4
https://www.linkmio.com/sought/fortnite-aimbot
code
Keyword Analysis & Research: fortnite aimbot Keyword Research: People who searched fortnite aimbot also searched Search Results related to fortnite aimbot on Search Engine Fortnite Hacks | Fortnite Cheats: Aimbot, ESP and More! Oct 07, 2021 · Having Fortnite aimbot in operation takes the concern over positioning the crosshair perfectly on the enemy. Plus, if you’d like some fantasy shooting, striking the adversary at the spot that hurts most, you can use the aim bone, another feature of Fortnite aimbot, to pick out parts like the leg, chest, pelvis, arm, torso, neck or head. DA: 49 PA: 57 MOZ Rank: 92 Fortnite Aimbot Download (2021 Updated) - Enjoy Your … Fortnite Aimbot Download Overview. Fortnite Aimbot Download: Created by Epic Games, Fortnite is one of the world’s most cherished fight royale games. The game has 100 gamers and players arriving down on a guide, either with a group or all alone. Dissimilar to other traditional multiplayer games on the web, Fortnite has just an enormous and single guide for all seasons. DA: 46 PA: 12 MOZ Rank: 78 Fortnite Cheats & Fortnite Hacks with ESP, Aimbot & … Aug 10, 2021 · Aimbot Cheats for Fortnite One of the most popular kinds of cheats for shooter games like Fornite is the aimbot, which promises to dramatically improve your performance because it allows you to aim better. DA: 17 PA: 11 MOZ Rank: 95 FORTNITE AIMBOT! (How to install AIMBOT easy!) - … Nov 28, 2017 · Fortnite AIMBOT easy install! All thanks go to my friends Peter and Rick for creating an easy to install hack! Just click and drag! Enjoy!AIMBOT download lin... DA: 55 PA: 7 MOZ Rank: 3 Media download file - fortnite_v11_aimbot_esp_snapline.zip fortnite_v11_aimbot_esp_snapline.zip . Compressed Archive (.ZIP) Uploaded: 2021-11-23; About Compressed Archive Formats. Compressed archives combine multiple files into a single file to make them easier to transport or save on diskspace. Archiving software may also provide options for encryption, file spanning, checksums, self-extraction, and ... DA: 2 PA: 51 MOZ Rank: 99 How to get aimbot in Fortnite(Pc) - YouTube Jan 12, 2020 · This is the easiest aimbot to install#Fortnite#Bestplayer#Tfueaim DA: 32 PA: 86 MOZ Rank: 82
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358705.61/warc/CC-MAIN-20211129104236-20211129134236-00621.warc.gz
CC-MAIN-2021-49
2,216
21
https://bmcbioinformatics.biomedcentral.com/articles/10.1186/1471-2105-9-530/figures/4
code
An Exemplary Analysis Performed with ReplicationDomain. Visual inspection with the aid of ReplicationDomain identifies a region where replication timing has changed during differentiation of ESCs to NPCs. Users can download the data shown on the screen by selecting the "Save Data" option of each data set (A). Downloaded data for each data set will be in a tab-delimited text file with a description at the top (B). Data from multiple differentiation states can be assembled and their differentials calculated in Microsoft Excel (C) and visualized graphically (D). The graph (D) shows a comparison of D3ESC (dark blue) and D3NPC/EBM9 (green) replication timing profiles and their differentials (NPC-ESC; magenta) on chr8:44,000,000–46,000,000.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107905777.48/warc/CC-MAIN-20201029184716-20201029214716-00226.warc.gz
CC-MAIN-2020-45
746
1
http://marcobaumgartl.info/forensic-psychology/software-engineering-best-majors-to-get-into
code
Aspiring software engineers usually major in computer science, computer Some students take programming and software engineering classes to Named one of the 50 Best Careers by US News and World Report, software engineering is a January 12, Easy Colleges to Get Into: Your GPA Doesn't Have to Hold. If you have given serious thought to becoming a software engineer, you are probably please see “Top 10 Best Online Computer Science Degree Programs “. I am a math major, what would be the best field of computer science/computer engineering for me to go into, where I could apply my skills that I. How to get a Software Engineering Summer Internship! Software engineers, developers, devs, programming architects — whatever you wish to call them — are not geniuses. The first step is to learn the special languages that only the computer understands. Random Signals and Systems. Were there any degree requirements that you had to meet besides the standard coursework? Learning to code is not as hard as most people think.
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806338.36/warc/CC-MAIN-20171121094039-20171121114039-00262.warc.gz
CC-MAIN-2017-47
1,024
3
http://www.codingforums.com/javascript-programming/317476-need-help-simple-code.html
code
I have a copy of this somewhere and it's programming 101, but can't find it and could use some help. Suppose I have a domain, as an example: www.mydomain.com/members. I want my members to go to my home page and type in their username in a field and click enter. At this point, they would be taken to www.mydomain.com/members/username. Could someone who is not laughing at the simplicity give me a clue. I must be getting old.
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257828322.57/warc/CC-MAIN-20160723071028-00229-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
425
4
https://www.sourcecodester.com/aspnet/4244/expense-tracking-aspnet-mvc3-c.html
code
The purpose of the project is to develop an easy to use expense tracking system. Users should be able to register in the system, put down their expenses categorized by tags, and get some statistics about their Software should implement the following use cases: • Register and login • Edit tags • Record amount spent and mark it with a tag • View, edit and delete expense records • Display statistics for the given period of time. Statistics should display total amount spent and amount spent by each tag, including its percentage in overall expense amount. •.NET Framework 4.0, C# Language • Asp.Net MVC 3 • Complete source code (Visual Studio 2010 Project) • Database File (Foo.bak) SQL Server 2008 R2 • Libraries Included Note: After the database file is mounted on the server (Sql server 2008) please modify web.config and change the Note: Due to the size or complexity of this submission, the author has submitted it as a .zip file to shorten your download time. After downloading it, you will need a program like Winzip to decompress it. Virus note: All files are scanned once-a-day by SourceCodester.com for viruses, but new viruses come out every day, so no prevention program can catch 100% of them. FOR YOUR OWN SAFETY, PLEASE: 1. Re-scan downloaded files using your personal virus checker before using it. 2. NEVER, EVER run compiled files (.exe's, .ocx's, .dll's etc.)--only run source code.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401641638.83/warc/CC-MAIN-20200929091913-20200929121913-00765.warc.gz
CC-MAIN-2020-40
1,422
20
https://play.google.com/store/apps/details?id=com.cigital.safetynetplayground
code
Crashes So what does it mean when the app crashes upon setting it in action. 4.3, rooted, xposed, xprivacy. Note 3 Great! when oturning off SU, other app detect my app is clean but this app detecting it, great!! Good and accurate Work as expected. Help me to see if my phone can use android pay. Thanks for the write up and samples folks - interesting stuff! Works Tells you whether or not your phone can run Android pay Detailed error messages
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887077.23/warc/CC-MAIN-20180118071706-20180118091706-00083.warc.gz
CC-MAIN-2018-05
444
7
http://www.webdeveloper.com/forum/showthread.php?280315-strange-problem&goto=nextoldest
code
Multiple databases and complex queries The program I am looking to create will use a PHP front end to create, read, update, and delete from multiple databases. The context is a medical practice management program that is web based. Not only is the ability to create these databases important (e.g. a client information DB including info like name, address, phone number, etc) but also I would like to retain the ability to search using any and all parameters when trying to look up a client. It's also worth mentioning that there will be multiple user created databases such as a client database, a patient database, inventory and charge code database, among others. My questions to you all are: Is SQL the right choice for this application? If so, what would be the most efficient and best performing way to structure such a database? Any other thoughts? SQL is just a (fairly) standardized language of querying databases that support it. The choice is which DBMS to use: MySQL, PostgreSQL, MS SQL, etc., and there is no single correct answer. There is normally no real need to create multiple databases, though sometimes you may need to integrate with existing systems that have their own databases. But if you are building this more or less from the ground up, then stick with one database, and use a combination of separate table of different types of things to track, along with columns within those tables that let you differentiate which data belongs to which user/client/customer/whatever. Last edited by NogDog; 06-25-2013 at 09:34 PM. So to summarize, create one database but multiple tables within for different types of data, e.g. one table for client info and another for inventory line items. The one basic form I created allows a user to enter a client's first and last name, address, city, state, zip code, and I believe phone number. This is my code (the pertinent part): This writes successfully to the SQL table, but I wonder if A) this is the proper way to set it up and B) how one would go about searching the database and displaying that output to the user? // Get values from form $lastname = $_POST['lastname']; $firstname = $_POST['firstname']; $address1 = $_POST['address1']; $address2 = $_POST['address2']; $city = $_POST['city']; $state = $_POST['state']; $zipcode = $_POST['zipcode']; // Insert data into mysql $sql="INSERT INTO $tbl_name(lastname, firstname, address1, address2, city, state, zipcode)VALUES('$lastname', '$firstname', '$address1', '$address2', '$city', '$state', '$zipcode')"; Thanks much, new to SQL and PHP so bear with me. Users Browsing this Thread There are currently 1 users browsing this thread. (0 members and 1 guests)
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123046.75/warc/CC-MAIN-20170423031203-00094-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,673
26
https://duitwithsbs.wordpress.com/2007/11/07/webs-windows-essential-business-server-centro/
code
OK – ever since WUS – pronounce woooss (Windows Update Services now renamed WSUS), I learned that either someone in the server naming department in Microsoft has a sense of humor or is really dull. Today Eric Ligman blogs about the formal announcement of naming rights for – formerly known as Centro – WEBS, Windows Essential Business Server. Now maybe you like Spiderman or you had a good take at Halloween but this is no basis to go naming servers especially ones that don’t include X-Box (no that isn’t a feature request BTW). Does anyone else see the possible correlation between the metaphor of cobwebs being used at some future blog or news article by the ever present critics. Still this server is pretty cool when looking under the theoretical “still in beta” hood. Take a look at what they are cramming into this solution for midsize business: Windows Server 2008, Exchange Server 2007, Forefront Security for Exchange, System Center Essentials, the next version of ISA Server and SQL Server 2008 Standard Edition (exclusive to the Premium branded WEBS) For further information look here: http://blogs.msdn.com/mssmallbiz/archive/2007/11/07/5955270.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867644.88/warc/CC-MAIN-20180625092128-20180625112128-00506.warc.gz
CC-MAIN-2018-26
1,178
4
http://www.reddit.com/r/jquery/comments/1c0sfr/help_making_an_interactive_map_with_jquery/?sort=top
code
Hi. Im a newbie web designer. I'm doing this website: http://www.tallerdeingenio.com/kob/contacto.html but i need that each state of the map displays the contact info. But i just don't have any idea of how to make it works. I have been looking for plugins and found some from codecanyon but i dont know how to configure them or if i can get one for free. Could someone please guide me? I will aprecciate a lot the help. Please excuse my english.
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207927245.60/warc/CC-MAIN-20150521113207-00110-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
445
3
https://wftesting2.ideas.aha.io/ideas/TEST-I-1286
code
The transition to high-density pixel displays that began with smartphones and tablets has spread to the computer monitors. 4K PC screens appeared in 2014, and understanding pixel density has become important when choosing a product, along with screen size and resolution. There are two standards for 4K resolution, “DCI 4K” and “UHD 4K”. Question of what is my screen resolution can be answered as: the display resolution of a digital television, computer monitor, tablet, smartphone or display device is the number of distinct pixels in each dimension that can be displayed. The "native resolution" is written in a monitor's specifications, but what exactly does it mean? What happens if images are displayed at a resolution other than the "native resolution"? In particular, you can't help wondering what happens when an image is displayed in a resolution with a different aspect ratio. The "number of pixels", or put another way "the number of points that light up", in an LCD screen is decided, and this "number of pixels" is the "native resolution." For example, this means that a monitor with a native resolution of "1920 × 1200" lights up, or turns off, 1920 horizontal rows (dots) and 1200 vertical rows (dots) of pixels to display images. Then what happens if an image is displayed in a different resolution from the "native resolution," and in particular what happens if that resolution has a different aspect ratio to the "native resolution"? Let's consider a case where a "1280 × 1024" (horizontal : vertical = 5:4) image is displayed on an LCD monitor with a native resolution of "1920 × 1200" (horizontal : vertical = 16:10).
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662552994.41/warc/CC-MAIN-20220523011006-20220523041006-00277.warc.gz
CC-MAIN-2022-21
1,650
4
https://bridges.monash.edu/articles/DAG_a_general_model_for_privacy-preserving_data_mining/4711957/1
code
DAG: a general model for privacy-preserving data mining 2017-03-02T01:46:30Z (GMT) by Rapid advances in automated data collection tools and data storage technology has led to the wide availability of huge amount of distributed data owned by different parties. Data mining can use the distributed data to discover rules, patterns or knowledge that are normally not discovered data owned by a single party. Thus, data mining on the distributed data can lead to new insights and economic advantages. However, in recent years, privacy laws have been enacted to protect any individual sensitive information from privacy violation and misuse. To address the issue, many have proposed privacy-preserving data mining (PPDM) based on secure multi-party computation (SMC) that can mine the distributed data with privacy preservation (i.e., privacy protection). However, most SMC-based solutions are ad-hoc. They are proposed for specific applications, and thus cannot be applied to other applications directly. Another limitation of current PPDM is with only a limited set of operators such as +,−,× and log (logarithm). In data mining primitives, some functions can involve operators such as / and √ . The above issues have motivated us to investigate a general SMC-based solution to solve the current limitations of PPDM. In this thesis, we propose a general model for privacy-preserving data mining, namely as DAG. We apply a hybrid model that combines the homomorphic encryption protocol and the circuit approach in DAG model. The hybrid model has been proven efficient in computation and effective in protecting data privacy via the theoretical and experimental proofs. Specifically, our proposed research objectives are as follows: (i) We want to propose a general model of privacy-preserving data mining (i.e., DAG) that consists of a set of secure operators. The secure operators can support many mining primitives. The two-party model which is the efficient and effective model is applied to develop secure protocols in DAG. Our secure operators can provide a complete privacy under the semi-honest model. Moreover, the secure operators are efficient in computation. (ii) We will integrate DAG model into various classification problems by proposing new privacy-preserving classification algorithms. (iii) To make our DAG model that can support wider applications, we will integrate DAG into other application domains. We will integrate DAG into ant colony optimization (ACO) to solve the traveling salesman problem (TSP) by proposing a new privacypreserving traveling salesman problem (PPTSP). In this report, we present most results of the objectives mentioned above. The DAG model is general – its operators, if pipelined together, can implement various functions. It is also extendable – new secure operators can be defined to expand the functions the model supports. All secure operators of DAG are strictly proven secure via simulation paradigm (Goldreich, 2004). In addition, the error bounds and the complexities of the secure operators are derived so as to investigate accuracy and computation performance of our DAG model. We apply our DAG model into various application domains. We first apply DAG into data mining classification algorithms such as support vector machine, kernel regression, and Na¨ıve Bayes. Experiment results show that DAG generates outputs that are almost the same as those by non-private setting, where multiple parties simply disclose their data. DAG is also efficient in computation of data mining tasks. For example, in kernel regression, when training data size is 683,093, one prediction in non-private setting takes 5.93 sec, and that by our DAG model takes 12.38 sec. In the experiment of PPTSP, a salesman can find the approximate optimal traveled distance without disclosing any city locations in TSP. Various domain applications studies show that our DAG is the general model yet efficient for secure multi-party computation.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655897707.23/warc/CC-MAIN-20200708211828-20200709001828-00278.warc.gz
CC-MAIN-2020-29
3,978
3
https://community.nxp.com/thread/538747
code
Are there any sample code/example for usage of classic CAN in LPC54628? Hello Hemanth S, There is CAN demo under MCUXpresso SDK for lpc54628, it support MCUXpresso IDE, keil and IAR, you can download from: The both example in SDK are mostly CAN FD based. Are any sample code for Classc CAN and not CAN FD? Just change the definition to 0: #define USE_CANFD (0U) Hope it helps, Thanks for your inputs. I had more queries regarding the CAN usage: 1. Which is the recommended work flow for Receiving the CAN messages?CAN Bus-> RX FIFO -> Application BufferCAN Bus-> RX Buffer -> Application Buffer 2. I am able to receive messages based on CAN filter configuration.But when I tried to read the received message ID from the structure "mcan_rx_buffer_frame_t", it show some value which is not the same which I configured to receive.The CAN RAM location also seem to contain this value. e.g. for msg ID 0x11 (STD ID) -> 0x00464022 (R0 bits figure 133 in manual) for msg ID 0x21 (STD ID) -> 0x00864042 (R0 bits figure 133 in manual) So even tough the message are correctly received in FIFO/Buffer, I am unable to read-back the message ID from the structure. Why do you think "it show some value which is not the same which I configured to receive.", what value do you read ? There is no problem about the ID in below: Thanks for you inputs, I was looking in wrong bits (11:0) any inputs for other question? Retrieving data ...
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738855.80/warc/CC-MAIN-20200811205740-20200811235740-00562.warc.gz
CC-MAIN-2020-34
1,419
23
http://fans.marvel.com/go/thread/view/108230/29308195/?pg=last
code
i was just wondering about the movie if its good or not . i dont even know what spambot is i never spam. Oh, no, that spambot comment wasn't directed at you so don't worry about it. The Amazing Spider-Man was pretty good in my opinion. I think the best thing about it was the acting.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706121989/warc/CC-MAIN-20130516120841-00098-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
283
3
http://www.clark.edu/Library/iris/general/about.shtml
code
IRIS is an Information Literacy project originally developed way back in 2007 with a grant from the Distance Learning Council of Washington, 2007-2008. A lot has changed, and IRIS fell behind the times. During a Fall 2014 joint sabbatical, librarians Roxanne Dimyan and Kitty Mackey worked on updating the tutorials. They chose to use Adobe Captivate as the platform because of the potential for creating more interactive, accessible content. During spring quarter 2015, the initial tutorials were beta tested by students and instructors in both face-to-face and online classes. By the end of spring quarter 2015 five tutorials are ready to take their place alongside the original tutorials. The revised "Avoid Plagiarism" tutorial will be loaded by Fall 2015. We chose to keep the current container until we reach the point where all the old tutorials have been replaced (or deleted), when we'll move everything to a new platform. We hope to complete the remaining tutorials during the 2015-2016 academic year. Because the original 2007-2008 files are completely outdated (along with the html and CSS use to create them) we are no longer making the original IRIS files available for download. However, the new tutorials have minimal branding and were kept, for the most part, generic, so they are still valuable open education resources. Re-use of IRIS IRIS is available on the web for anyone to use and link to. The text in the IRIS tutorials may be copied and reused. Where indicated, images in the IRIS tutorials are legally-obtained licensed images and may not be further reproduced or reused in any way.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123318.85/warc/CC-MAIN-20170423031203-00148-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,609
11
https://www.testingcatalog.com/project/amp/729
code
From Google Play - Added information about upcoming forks - Improved synchronization with the website - Separated sections for clarity - Several security fixes Are you looking for deeper insights? Check our daily 📲 Test Reports QoinPro is a platform that distributes fractions of coins to you for free every day, provides the latest news in the cryptocurrency, blockchain and ICO space as well as exchange rates of major exchanges. We show trading opportunities and broadcast new coin and new ICO alerts. The app also provides a read-only browser of your wallets at QoinPro. Tester's FAQ: Login with your Google Account (Optional) to the TestingCatalog Service to earn extra points and boost your Beta Tester profile to top. Download the app from Google Play via the OPT-IN link and start testing! ❤️ Like Beta Page on TestingCatalog to follow latest Updates and Changelogs. 👻 Report, if you find any bugs and give use your feedback by sharing your findings with the Community of beta testers.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221218357.92/warc/CC-MAIN-20180821151743-20180821171743-00417.warc.gz
CC-MAIN-2018-34
1,003
12
https://community.firecore.com/t/itunes-play-lists/9095
code
I’d really really really really really really really (getting the picture!), like to be able to dump all my music on my media server and play my music through the media player. I cant do that at the moment as I have invested heavily (both time and cost) in iTunes and have a number of playlists. Massive bonus for me to be able to play my music through the media player as opposed to having to have my PC on and play it through iTunes. Whilst I know media player will play the music, I dont have the time to invest in setting up (replicating) my itunes playlist. Please please please can you guys create a way of being able to import/play my itunes playlists so as I can turn my PC off once and for all!
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662573053.67/warc/CC-MAIN-20220524142617-20220524172617-00216.warc.gz
CC-MAIN-2022-21
705
5
https://www.goodgraeff.com/what-is-a-database-entity-attribute/
code
What is a database entity attribute? An entity type typically corresponds to one or several related tables in database. Attribute. A characteristic or trait of an entity type that describes the entity, for example, the Person entity type has the Date of Birth attribute. Record. What is an entity type in database? The entity type is the fundamental building block for describing the structure of data with the Entity Data Model (EDM). In a conceptual model, an entity type represents the structure of top-level concepts, such as customers or orders. An entity type is a template for entity type instances. What are the attributes of each entity? Attributes. Each entity is described by a set of attributes (e.g., Employee = (Name, Address, Birthdate (Age), Salary). Each attribute has a name, and is associated with an entity and a domain of legal values. However, the information about attribute domain is not presented on the ERD. What is entity and entity type? An entity can be of two types: Tangible Entity: Tangible Entities are those entities which exist in the real world physically. Example: Person, car, etc. Intangible Entity: Intangible Entities are those entities which exist only logically and have no physical existence. Example: Bank Account, etc. What are types of attributes? Types of attributes - Single valued Attribute. Attributes having a single value for a particular item is called a single valued attribute. - Multi-valued Attribute. Attribute having a set of values for a single entity is called a multi-valued attribute. - Derived Attributes or stored Attributes. - Complex Attribute. What is entity and attribute in DBMS with example? An entity in a database table is defined with the ‘fixed’ set of attributes. For example, if we have to define a student entity then we can define it with the set of attributes like roll number, name, course. The attribute values, of each student entity, will define its characteristics in the table. What is entity and entity set in DBMS? In DBMS, an entity set is a set of entities of same type. An entity set may be of two types- Strong Entity Set and Weak Entity Set. An entity refers to any object having either a physical existence or a conceptual existence. What is entity entity type and entity set? Entity type is the category of a particular entity in the table of an RDBMS; in contrast, entity set refers to the collection of all entities of the same entity type in RDBMS. What is an attribute in SQL? Attributes are objects that are contained in Master Data Services entities. Attribute values describe the members of the entity. An attribute can be used to describe a leaf member, a consolidated member, or a collection. What’s the difference between entity and attributes? Entity and Attributes are two essential terms of a database management system (DBMS). The main difference between the Entity and attribute is that an entity is a real-world object, and attributes describe the properties of an Entity. The Entity may be tangible or intangible. What is the difference between entity and attribute? The main difference between Entity and Attribute is that an entity is a real-world object that represents data in RDBMS while an attribute is a property that describes an entity. Relational Database Management System (RDBMS) is a type of database management system based on the relational model. What is entity attribute and relationship in database? An entity set is a group of similar entities and these entities can have attributes. In terms of DBMS, an entity is a table or attribute of a table in database, so by showing relationship among tables and their attributes, ER diagram shows the complete logical structure of a database. What are different types of attributes in SQL? There are five such types of attributes: Simple, Composite, Single-valued, Multi-valued, and Derived attribute. One more attribute is their, i.e. Complex Attribute, this is the rarely used attribute. What are called attributes? In general, an attribute is a property or characteristic. Color, for example, is an attribute of your hair. In using or programming computers, an attribute is a changeable property or characteristic of some component of a program that can be set to different values. What is the difference between attribute and entity? What is Entity – Definition,Functionality What are core data entities and attributes? Integration scenarios. Data entities enable public application programming interfaces (APIs) on entities to be exposed,which enables synchronous services. What is the meaning of attribute in a database? In relational databases, attributes are the describing characteristics or properties that define all items pertaining to a certain category applied to all cells of a column. The rows, instead, are called tuples, and represent data sets applied to a single entity to uniquely identify each item. What is an attribute database? – The attribute must be present in more than one row or column (aggregate), unless it’s a one-off in its field. – The attribute value must be self-explanatory or have metadata descriptions. – The attribute must not be normalized to a unique ID if it is to be used as a descriptor for another unique ID.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945144.17/warc/CC-MAIN-20230323100829-20230323130829-00538.warc.gz
CC-MAIN-2023-14
5,245
40
https://bitbucket.org/openid/connect/issues/1228/discovery-3-new-metadata-item-for-claims
code
In Section 5.5 of OpenId Connect Core it is not clear whether all implementations should support both “openid” and “userinfo” as ways for specific claims to be returned. There are cases where support for one or other only may be desirable. Assuming that is agreed then an additional metadata entry is needed to communicate what the top level claims in the claims request parameter are supported. Initial draft … Add definition: "A JSON array indicating the top-level members of the Claims request JSON object that are supported. Only valid when the “claims_parameter_supported” is present and true.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301263.50/warc/CC-MAIN-20220119033421-20220119063421-00379.warc.gz
CC-MAIN-2022-05
612
3
https://www.cnet.com/forums/discussions/tracking-cookie-atdmt-unethical-microsoft-348991/
code
34 total posts (Page 1 of 2) Why do you think it's Microsoft? http://answers.yahoo.com/question/index?qid=20081214080238AAEj8to says ADTMT is an advertising company. I see no link with Microsoft. The above article suggest deleting cookies automatically. Then your browsing behavior can't be tracked. Hardly an annoyance, if it's done automatically. I think ccleaner will work also. ATDMT tracking cookie The idea of a link with MS appeared in the Microsoft Discussion Groups on Internet Explorer General. CCleaner is not effective, this cookie comes back. Have tried many other suggestions from the hundreds available on the Web about atdmt, to no avail, cookie re-installs itself. Your Yahoo suggestion does not help either. Thanks Kees for replying. Additionally, Using A Browser Like Firefox with it's cookie Manager can block this. You can give each site permission to install ONLY "session" (temporary, removed by CCleaner)cookies or NO cookies or as set by standard cookie rules you set within the program of the browser. Sea Monkey also offers this. Basically, you may need to "tighten-up" you cookie permissions to avoid 3rd party cookies. This particular cookie can be had from almost any site IF your cookie permissions are wide open. Setting Permissions For Cookies In Internet Explorer go to tools drop down to Internet options go to privacy click advanced tic the box in first party cookies that says prompt third party cookies click block >.click O.k. = Done. Now atdmt needs your permission to climb aboard... Now if I could only remember where this tip came from. ADTMT is linked to Outlook Connector and Hotmail Thanks for this tip, but ADTMT does not behave as an 'ordinary' cookie. It appears 'embedded' within Outlook Connector and Hotmail and reinstalls itself everytime Outlook or Hotmail are switched on. Deleting ADTMT from the registry has no effect, nor has any other known tip or trick, such as for instance installing MVPS Hosts file. Outlook And Hotmail You have something here this thing reproduces itself after every deletion. So when will the secret be revealed, maybe Microsoft will send a special patch and be done with it. re:ADTMT is linked to Outlook Connector and Hotmail yes, actually, msn is installed, like adware/malware in your winsows operating system, there is a small light peice of software from some woman who used to work for msn/windows, who dosnt like them anymore and she has a link to a peice of software that totally rids your pc of the embedded msn software. it certainly seems to apear each time msn is opened.when i can remeber the link to her page will post it here and see what happens. Does not work Blocking this in the privacy tab does not work - there is no way to block it - it is put on your system with Windows Live Client. If you go to your Temporary Internet Files under - C:\Users\your id\AppData\Local\Microsoft\Windows\Temporary Internet Files\ and watch this when you have IE opened and then open Windows Live - the cookies will appear - it is not just one but all of the listed ones [email protected] - [email protected] - [email protected] - [email protected] - [email protected] - [email protected] - [email protected] - [email protected] - listed below is what was in atdmt.com cookie - Microsoft refuses to break this down for me. ATDMT - Microsoft connection Why do people think Microsoft is involved? Because it is true! Don't take my word for it; see for yourself. 1) Visit the link below to the microsoft site for the IE9 beta. 2) Hover your mouse cursor over the download button. 3) View the target URL in the status bar at the bottom of your browser. 4) Note that it is a redirect to ATDMT.com where the malware is installed. 5) If you have included ATDMT.com in your restricted sites list in IE, you will not be redirected there and the malware will not install. Since the behavior of this unsolicited and unapproved add-on includes tracking behavior, it is classified as malware. I don't know about you, but most people find that sort of behavior intolerably unethical. It's not malware. It's a tracking cookie. If you want to re-define what things are, go right ahead but for now why not start a new discusion about ATDMT? tried clicking the link you suggested, and hovered cursor on download link, it didnt seem to show any redirect/connection to atdmt. though that may be my location? i must say, ANY time i log into MSN i get avg giving atdmt warnng message. so there IS a link to MS. atdmt - block the damn thing Yes, you're absolutely right. I too use AVG and constantly get the warning about atdmt everytime I open Windows Live Messenger, my IM program. I've tried for months to block that cookie to no avail. Even Adblock in Firefox doesn't do it regardless of how many times I specifically put the block on it. What to do? Damned if I know anymore. It's not good enough to have to run Adaware all the time to find and kill it. That's only temporary for the moment. It just keeps coming back anyway. Probably like most of you on this forum, I don't like being tracked and have stopped most of the attempts to do that but this bloody atdmt will NOT go away. Does anyone have any ideas about how we can stop this crap? Is that even possible? No one can say that M$ is not wrapped up in this. Windows Live is a Micromoney program and everytime I open it back comes the Adaware notice: tracking cookie detected! Any good answers, folks? cCleaner doesn't work! I use Advanced System Care Pro. It finds the MALWARE and will delete it. So will SpyBot. I've used Malwarebytes Pro to no avail. I've used BitDefender Total Security and now have ESET Smart Security 5. I've ran these in safe mode but it's useless. I've used Hijack This with no success. This is Microsoft trying to force people to use Internet Explorer, IMO. The cookies only show up in Chrome and Firefox but not IE. Hmmm? And if you block third party cookies, you can't get to your Live/Hotmail inbox. This IS making my new computer act buggy and is a huge nuisance. Thank you Microsoft for making my decision easier. The next computer I buy will be a Mac. I will never by a PC again due to their forced, unethical intrusion into MY computer. It should be illegal! Re: blocking Atdmt Thank you Donna. Being unfamilar (read total dummy) with "host" files, mvps and hphosts appear daunting exercises - which one do you recommend for a novice (who wants to avoid ending up with a pc in a miserable state)? Should I both download Spybot and SpywareBlaster? Erik, You can use... any of the said hosts file. MVPS hosts file is not updated frequently but it does block atdmt (see the list http://www.mvps.org/winhelp2002/hosts.txt and you'll find many atdmt entries to be blocked by MVPS hosts) and many others. hpHOSTS is updated daily (via partial update) but it has more blocked bad/unwanted domains or tracking cookies/ads. I suggest that you try using first the MVPS Hosts file. It is not a task to use a HOSTS file if you are going to use a hosts file manager. Example: Hostsman or hostsxpert - both have a function to update your preferred hosts file. As a start, just download MVPS Hosts http://www.mvps.org/winhelp2002/hosts.zip (direct download). Unzip it in a temporary location then copy and paste the hosts file (it does not have file extension, just Hosts only) in C:\WINDOWS\SYSTEM32\DRIVERS\ETC folder. Overwrite/Replace the existing (default) hosts file in Windows. You're done. If you want to update it, visit MVPS hosts file page again and see if there's update. You will only replace the old hosts file again. No, you don't need to use both Spybot -S&D and SpywareBlaster. Get the latter first. Use only Spybot if you want its scanner+prevention but for prevention only, use the hosts file and SpywareBlaster for now. I Discovered Today, Via SAS, That these cookies under discussion will also misrepresent themselves as Session Only cookies to Mozilla's Cookie Mgr. They're Not! I had them marked as accepted ONLY as Session Cookies because you cannot enter Hotmail with them fully blocked. After leaving Hotmail yesterday & running CCleaner as usual. Shut down over night. After boot-up today, todays scan w/ SAS found 7 of them still on the machine and quarantined them. This without going to Hotmail yet today! Noted: MBAM scan immediately before SAS scan, did NOT find these 7 items. Sandy. atdmt tracking cookie I do use CCleaner regularly, a very good tool. But, as I said in my last post, finding and deleting the cookie is only temporary - it still comes back. How can it be blocked permanently? It's not good enough to have to run CCleaner everytime. That won't do. Frankly, this atdmt thing is a pain in the butt! I don't like anyone, including the sneaky M$, keeping tabs on my use of the 'Net. That has to stop. Yeah, dream on... I don't think, at this point, that it can be stopped. I haven't been able to do it after all the research and things I've tried. Any new ideas, please? Oh Really? I use the blaster and the only thing it does is update new definitions. Because it blocks it without user-interaction You can open SpywareBlaster and you should see some tracking cookies that it can block in IE and Firefox browsers. how can u add cookie to list on SpywareBlaster please I have same prob with this cookie and if SpywareBlaster can stop it, how does one add to the list on Spywareblaster? From what I see the list provided can either have cookies blocked or not, cannot see how additions can be made Any help much appreciated because it blocks.... "Because it blocks it without user-interactionby Donna Buenaventura - 9/2/09 10:08 AMIn Reply to: Spyware Blaster? by hogndogYou can open SpywareBlaster and you should see some tracking cookies that it can block in IE and Firefox browsers." um, i opened the spywareblaster to the window for block.unblock cookies but there was NO refeence to atdmt in the blocked list at all. and, if i am not mistaken, no way to add it to the list. yeh, i am trying out spywareblaster right now, and am trying to find a way to ad atdmt into it as it asnt on the list onboard it. however i cant find the way to add it to block list (tho if it is being internally generated nothing will b able to "block" it, will it/there?). the only thing i have found on spywareblaster for asdding things to lsit is a thing u have to ad the CLSID to. but thats not something i would know about, in fact i dont think cookies would have a CLSID. would they? This cookie is created when IE is running and Windows Live Mail Client is opened. This is the answer I got from Microsoft - I don't believe them and think this cookie is capturing marketing information that they feel is very important and don't want it blocked. I have reported it to the FTC. If more people would do the same, something will be done - they require massive complaints. I can assure you that the cookies are cosmetic. The function that the Windows Live allocations use for cookie placement is ?InternetSetCookie?. If you look up this public function on MSDN you can see how works. I also want to point out the caution statement on the page.: Caution InternetSetCookie will unconditionally create a cookie even if ?Block all cookies? is set in Internet Explorer. This behavior can be viewed as a breach of privacy even though such cookies are not subsequently sent back to servers while the ?Block all cookies? setting is active. Applications should use InternetSetCookieEx to correctly honor the user's privacy settings. With that said the change will be to use the InternetSetCookieEx function, and as you see it will honor the users privacy settings. A fix is scheduled to be released in the next update cycle for the Windows Live applications. By the way - this was over a month ago and I have seen nothing released from Microsoft - again proof they are hiding something and want these cookies out there at any risk - please - everyone report this to the FTC, your senators and congressianal representatives - Microsoft must me reined in. This cookie displays ads on youtubes ad square of items you were just looking at and then compares prices of similar items on that website in a video playing display. If you go atdmt.com it does say it is part microsoft for advertisers. yes, i have found that each time i am dumb enough to use MSN messenger, i get my AVG issuing a tracking cookie warning for atdmt. however when i clikc "heal selected threats", it does NOTHING. will enjoy watching this thread to see what is to be learned about this. though it does seem that when i open cookie folders and atdmt is there it does delete. hope some one with much know how tells us more about this cookie and the whys and whats. Its hardly unethical and not malware ATDMT is an advertising cookie, belonging to microsofts adserver atlas, so its a tracking cookie, what it does is help control the frequency of the ads shown and give the advertisers info on unique users impacted, conversions on clients site etc, it does not track your surfing behaviour nor has any PII personal identifiable information. (like google) Advertising is what substains most of the sites, blogs and "free tools" (nothing that comes with advertising is really free,) that we use daily on internet. ATDMT will never download adwares, viruses or any unsolicited programs on your computer, its just part of the ads that you see like the swf or gif..an ad without a cookie is worth nothing since the cookie is what lets inventory providers like msn justify results to the brands that advertise. Unethical?...well CNET has right below this thread 3 Google links from adsense, with their doubleclick cookies, and that doesnt make CNET unethical. Fortunately big companies like Microsoft-atlas/Google-Doubleclick are transparent with their cookies policies and you can optout. I personally use to surf with a 400's list of adservers on my blacklist to block everysingle cookie, but then I added adsense to my blog, and used SEM (google paid serach) for my company, so I felt like a hypocrit, from one side I was surfing with no ads, but from the other I was expecting everyone to
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542412.97/warc/CC-MAIN-20161202170902-00352-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
14,165
95
https://communities.bentley.com/products/programming/microstation_programming/f/bdn-mdl-c-c/128369/sdk-installation/391603
code
I'm not sure if this is correct location to raise this question or not. I have spent a few hours searching toward an answer but I couldn't find it. I'm a developer and I recently became interested in MDL programming with C++. I don't own a Microstation license and I'm only interested in SDK piece of it. I have registered in Bentley and downloaded a free trial Microstation, hoping it comes with SDK but it doesn't have it. I attempted to get SDK from http://select.bentley.com/FulfillmentCenter/en/Search/Product/LTEyMzE5NjgyOTdfNC4wLjIuMA/?namedfilter=showpartial&SubProductLineID=326&GenerationID=119&ReleaseTypeId=168&PackageTypeId=156 I really need help with this. How can I download the SDK? I have license for almost all Microsoft Visual Studio Enterprise versions. Is there a way that I can develop and compile MDL with Visual Studio and completely ignore SDK? Any comment or feedback will be hugely appreciated. Mo Ar said:I'm not sure if this is correct location to raise this question or not. Yes, MicroStation Programming community and forum is the place where all aspects of MicroStation application development can be discussed. Mo Ar said: I'm only interested in SDK piece of it. In my opinion it makes no sense, because no application can be run without MicroStation itself. SDK license is also tightly linked with MicroStation in terms of license, because SDK has no own license, but you have to have a proper Bentley product (MicroStation in this case) license. Mo Ar said:hoping it comes with SDK but it doesn't have it. MicroStation SDK is delivered separately from MicroStation itself by default. Mo Ar said:I attempted to get SDK from... And what happened? Mo Ar said:I really need help with this. How can I download the SDK? I am not expert on this issue, but I guess (any) SDK is accessible thorugh BDN program (Bentley Developer Network). Mo Ar said:Is there a way that I can develop and compile MDL with Visual Studio and completely ignore SDK? No, it's not possible. SDK contains header files, lib files and other necessary tools (bmake, developer shell) and of course documentation. Mo Ar said:Any comment or feedback will be hugely appreciated. I guess the right approach is to become BDN member and you will obtain access both to MicroStation (developer license) and also MicroStation SDK. An advantage is the access is not limited to a specific MicroStation version, so depending on customers' request you can develop e.g. both for MicroStation V8i and MicroStation CONNECT Edition. You should also be aware there is "SELECT BDN" program for users with SELECT maintenance that allows in-house development. Bentley Accredited Developer: iTwin Platform - AssociateLabyrinth Technology | dev.notes() | cad.point Mohammad Aryafar said:Following to the link I sent in my post The problem is that using you link I will get my page with my access rights, not your. Screen capture would be better, but it's clear now where is the problem. Mohammad Aryafar said:What I understand from your reply is that I can possibly get a developer sort of license for Microstation and its SDK Yes, the developer license is the part of BDN program. Mohammad Aryafar said:If so, would you be able to give me a few hint on how can I get started? There is "Contact us" button on Bentley Developer Network page I linked in my answer. I guess it's the most simple way how to start. Mohammad Aryafar said:Considering this, is there anyway that I can put my hand on some coding without having access to SDK (not requiring to be recompiled again) such as VBA or MVBA or JMDL?
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103324665.17/warc/CC-MAIN-20220627012807-20220627042807-00344.warc.gz
CC-MAIN-2022-27
3,576
27
https://www.elgaronline.com/search?f_0=author&q_0=John+Mendeloff
code
This teaching note focuses on two common difficulties for students. The first is the failure to think in terms of marginal effects. Deciding whether something is worthwhile depends upon what other options are available. When confronted with a program that costs more than another but also has greater effects, students often don’t realize that they need to examine the marginal cost per marginal effect of the more expensive program relative to the other program. The second, related, difficulty is not realizing that, unless you have a value to place on the effects, you generally can’t say whether a project is worthwhile. Instead, students see that buying only one unit may provide a lower cost per unit than buying more units (assuming declining marginal effectiveness). Then they label that the most “cost-effective” option, and proceed to recommend that it be adopted. Several variations related to cost-effectiveness are discussed.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738855.80/warc/CC-MAIN-20200811205740-20200811235740-00226.warc.gz
CC-MAIN-2020-34
946
1
https://community.cisco.com/t5/ip-telephony-and-phones/cisco-unity-connection-8-greeting-error/m-p/2044591
code
This is a new site in the existing Cisco Unity connection 8 server, hence i had to create a new user templae, in which i did not select "Set for self-enrolment at next login". and gave a default user password as 123456. Now the problem is for all ip phones, when the user doesn't answer, the call is forwarded to unity, but instead of the unity default greeting, the caller hears which I think is the standard greeting: ""Hello: Cisco Unity Connection Messaging System. From a touchtone phone you may dial an extension at any time. For a directory of extensions, press 4. Otherwise, please hold for an operator." I checked the schedule is all active(no time restriction). How to get rid of this error, it comes for all the users? I want unity to prompt the user for the default password(which i set as 123456 in the user template), and allow them to check their voicemailboxes for any pending message. This greeting has nothign to do with them being enrolled or not, it simply means the extension presented to UCON does not match the extension assigned to the mailbox and default opening greeting is matched. Make sure the VM profile on the DN in CUCM is proper, make sure the UCON extension is in proper partition, and make sure your forward routing rules are not messed up. Use port monitor tool to observe what digits are presented when the call arrives.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987835748.66/warc/CC-MAIN-20191023173708-20191023201208-00462.warc.gz
CC-MAIN-2019-43
1,357
10
https://freelanceflux.com/project/i-need-my-website-logo/
code
I need my website logo. The website address is mynftland.io. The main keywords of the website are world map, my land, nft, advertisement. The background is white. I prefer a simple design with not many pictures. Please do not use a logo generator or bitmap style images. I would like an original design. Please provide png and psd files.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100489.16/warc/CC-MAIN-20231203062445-20231203092445-00438.warc.gz
CC-MAIN-2023-50
337
8
https://encyclopedia2.thefreedictionary.com/quasi-equilibrium
code
This corresponds to a "quasi-equilibrium " occupation of Floquet bands at t = [t.sub.0] = 0: this is physically motivated by the fact that when the Floquet quasi-steady states are formed, their occupation is stationary in time, which does not mean that the time-dependent energies are statically occupied as in equilibrium, due to the intrinsic time-periodic dependence. Within the time of transfer through the membrane the gas is in the thermodynamical quasi-equilibrium , wherefore we use the formula N = pV/(kT). First, some basic properties of states of equilibrium or quasi-equilibrium in the private ownership economy will be presented. We associate with a closed convex valued set-valued mapping C and a convex bifunction F the following well known quasi-equilibrium The next two sections will introduce the experimentally observed sorption phases and then the quasi-equilibrium values of PD obtained after the end of particular sorption phases. In light of the low-order HSD model, this vortex initialization produces an initial inconsistency among [V.sub.m], [W.sub.m], and [B.sub.m], and the vortex intensity thus varies strongly before approaching the quasi-equilibrium This signal is connected to the phase detector, which detects the quasi-equilibrium The first volume, Theoretical Background and Formulation, addresses scale separation, quasi-equilibrium , closure, and mass-flux convection parameterization, as well as atmospheric convection and tropical dynamics, while the second, Current Issues and New Theories, covers the actual behavior of convection parameterizations in the context of weather prediction and climate models, including operational implementations and model performance, scale separation, tailored verification approaches, the role and representation of cloud microphysics, alternative parameterization approaches like similarity theory and the subgrid-scale distribution density function, stochasticity, criticality, and symmetry constraints. In this section, the main idea of constructing one dimension quasi-equilibrium grid algorithm is presented. A three stage quasi-equilibrium model (considering pyrolysis, chargas reactions and gas phase reactions in each stage) for steam gasification of biomass was developed by Nguyen et al. The disproportionation reactions are generally much faster than the other reactions, leading rapidly to a state of quasi-equilibrium with respect to the concentration of linear dextrins that will be cyclized by the enzyme.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585696.21/warc/CC-MAIN-20211023130922-20211023160922-00581.warc.gz
CC-MAIN-2021-43
2,495
19
https://hellobuild.co/blog/beyond-the-cryptocurrency-hype/
code
Beyond the Cryptocurrency HypeJonatan Alava Here at HelloBuild we have been lucky to work together with the Hyperledger project hosting our local meetup. This has exposed us to the large collection of projects under the Hyperledger umbrella. Now with two of those projects reaching 1.0, it's much easier to clearly see real world applicability of DLT based solutions. Smart Contracts vs Tokens Many adopters of blockchain technology have married the intrinsic value of this technology with the existence of digital tokens. These tokens, sometimes simply acting as cryptocurrency, are nothing but a feature sitting on top of most distributed ledgers/blockchains. With projects such as Fabric and Sawtooth, we can clearly see the value of DLT (independent of tokens) from implementations of smart contract based solutions. The value produced for users, does not come from an artificially created economy based on digital tokens, but on the actual benefits a decentralized solution brings. Smart contracts allow us to enforce business rules while at the same time leverage the unique qualities of a distributed ledger, like immutability and a shared and unique state of transactions. Hyperledger real world examples The Linux Foundation has done a great job creating documentation, tutorials and examples that can walk users through what an implementation of a decentralized solution would look like, as well as modeled specific, real world, scenarios to make it easier to understand and contextualize. Sawtooth has also made source code available for more up to date versions of their examples. You can find different implementations ranging from Tic-Tac-Toe (here) to Supply Chain (here)and Marketplace (here) examples. Implementing Real World Solutions Our team at HelloBuild is ready to work together with customers interested in leveraging blockchain solutions for their business, drop us a line at [email protected] if you are interested.Back
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540523790.58/warc/CC-MAIN-20191209201914-20191209225914-00028.warc.gz
CC-MAIN-2019-51
1,958
10
https://www.mail-archive.com/[email protected]/msg06104.html
code
Author: Julien D. I'm trying to retrieve the content of a <div> element in a Section, but can't What I want to get : <div id="myid">(the stuff i want)</div> The problem is, the stuff i want may contain nearly anything (but especially html tags, like links). I tried this : Section text 1 2048 '<div id="myid">(.*)</div>' "$1" But it doesn't work as it doesn't stop on the first </div> element. Any idea of a workaround to get it working ? General mailing list
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818693940.84/warc/CC-MAIN-20170926013935-20170926033935-00303.warc.gz
CC-MAIN-2017-39
459
10