url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://wiki.wormbase.org/index.php?title=WBConfCall_2015.05.21-Agenda_and_Minutes&printable=yes
code
WBConfCall 2015.05.21-Agenda and Minutes From WormBaseWikiJump to navigationJump to search 2015 Progress Report - Kevin has a master document for EBI/Hinxton - He will share the document to collect write-ups - Caltech has been filling in Google spreadsheet with curation numbers - Paul S. is coordinating the text, overall - Ranjana working on linking between WormBase and OMIM - WB links to OMIM, but OMIM doesn't link to WB - Ranjana sent Human disease Pages to OMIM to look at; they're enthusiastic - Gene-association files for disease data can be shared/used to link data - Do we have a data file with all of the disease data and OMIM links? - Ranjana will forward e-mails to Todd, Sibyl, Paul Davis, and Kevin WB Workshop at 2015 IWM - Chris sent around minute breakdown of workshop (can resend again if people need it) - We're scheduled for 7 talks, 90 minutes total: first hour, 5 talks, 12 minutes each; last half-hour, 2 talks, 15 minutes each - We probably don't need to schedule in a break for just 90 minutes Mapping human disease variations to elegans genome/proteome - We would like to generate clear mappings between human disease variants and the C. elegans genome/proteome - Would be good to establish the best pipeline to generate, store, and display the data - Todd: We should prioritize the display of human-elegans alignments on every WB gene page, not just in the homology widget, but as a high profile item displayed by default - Michael & Kevin: The data already exist and would be trivial to generate; we need to focus on how to model and display the data - Raymond: This would be good to discuss at the upcoming International C. elegans Meeting - Chris will send an e-mail on this topic around to staff - Some data exists in WormBase for non-elegans/non-WB-core species, like Brugia malayi and Onchocerca volvulus - Examples include concise descriptions and expression data for genes from these other species - This data exists and is displayed on WormBase, but not ParaSite (yet) - How can we best share the data and display of the data? - ParaSite lags behind WB with regards to many types of data per release; may be good to have synchronized releases in the future? - Do we want to prioritize certain datatypes to curate for ParaSite core species: Onchocerca, Brugia, Strongyloides? - This may be another topic to discuss at the upcoming international worm meeting
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670268.0/warc/CC-MAIN-20191119222644-20191120010644-00093.warc.gz
CC-MAIN-2019-47
2,394
31
http://www.manapc.com/2014/06/ms-dos-commands-part-4-telugu-tutorial.html
code
INTERNAL COMMANDS: There are also called memory-resident commands. These commands are automatically loaded into the computer’s memory during the booting process. They actually included in the Command.com file. So these commands are executable immediately after getting the dos prompt. A few internal commands: Date, Time, cls, ver (version), Vol (Volume), copy con, type,copy, Ren (Rename), Erase or Del (Delete), Dir (Disk Information Report), MD (Make Directory), CD (Change Directory), RD (Remove Directory), Wild Cards, prompt In previous classes, we are discussed about... Date, time, cls, ver, vol,copy con, type, copy, ren (rename, erase or Del (delete) & remaining commands will be continued in this video tutorial. (i) Dir (Disk Information Report):This command is used to displays the all the Directories(folder) and files. Syntax: C:\> dirWe have some switches with this 'dir' command, the following are the swithces, Note: / (slash) indicates 'switch' >> dir/p => It shows the all files in page wise. >> dir/ah => It show the files and directories which are in hidden. >> dir/w => It shows the all files in width wise. >> dir/ad => It shows only the directories. >> dir/on => It shows all the files in Alphabetically (A-Z) >> dir/l => It shows the files, which are in lowercase. >> dir/s => It shows the all files, directories and sub directories. >> dir/b => It shows the all files in bare format. (ii) MD (Make Directory) mkdir: This command is used to create a directory(folder) or sub-directory within the directory or drive. Syntax: C:\> md <directory name> Ex: C:\> md manapc (iii) CD (Change Directory):- This command is used to change the directory. Syntax: C:\> cd <directory name> Ex: C:\> cd manapc C:\manapc> Note: To exit from that directory, when it is in single directory Syntax: C:\directory> cd.. ( Press enter key) C:\> To exit from that directory, when it is in multiple directories, Syntax: C:\directory1\directory2\directory3> cd\ (Press enter keY) C:\> (iv) RD (Remove Directory): This command is used to Remove a directory or sub-directory. Syntax: C:\> rd <directory name> Ex: C:\> rd manapc Note: >> By using this command, we can remove a directory which is empty. >> By using this command, being inside the directory you can't remove the directory. (v) Wild Cards (* ?):- * and ? are called wild cards, because these are the shorthand notations, used in various commands. Note: >> * Represents any number of characters. >> ? Represents only one character. Examples: >> List the files start with 's' C:\> dir s*.* >> List the files with length as six characters and third one in them is 'n' C:\> dir ??n??? >> List the files whose extension(secondary name) is 'mp4' C:\> *mp4 If you Like this Article/Video Tutorial, Please 'Like, Comment & Share' with your friends...
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370493684.2/warc/CC-MAIN-20200329015008-20200329045008-00507.warc.gz
CC-MAIN-2020-16
2,807
19
https://academia.stackexchange.com/questions/154445/alternatives-to-mendeley-or-qiqqa-to-manage-pdf-and-autoextract-meta-data
code
Having been a long term user of both Mendeley and Qiqqa, I have to switch to another tool that offers in particular: - the ability to bulk upload PDF and autoextract meta-data / bibTex info - manage all the relevant PDF, including annotations - be available as desktop version, i.e. with a locally managed database and library Unfortunately Zotero, Endnote and other pure reference managers don't seem to have a usable content management systems for PDF's, that allows bulk PDF processing, like Mendeley or Qiqqa have. I also don't want to switch to a pure content / document management system, which likely would not have the meta-data extraction and bibTex management capabilities. My preference would be something like Qiqqa, which includes a lot of features I find very useful, including auto-tagging, relationship extraction, mind-mapping etc. but have not found anything that comes even close to that. Unfortunately due to Google changing it's access methods, Qiqqa is not useable anymore for me. Mendeley would have been an acceptable alternative, but I have to move the library occasionally from one computer to another, and since Elsevier started to encrypt its SQLite3 datastore, it's not possible to move the respective folders to a new location. I have looked at various alternatives (also paid ones), but have not found anything suitable. For any recommendation I would be immensely greatful.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038061562.11/warc/CC-MAIN-20210411055903-20210411085903-00381.warc.gz
CC-MAIN-2021-17
1,405
10
https://jquery-plugins.net/tag/tutorial/page/6
code
A basic responsive product grid layout with comparison functionality and a slide-in effect. A tutorial on how to write a CSS3 progress bar and add some cool animation, along with a jQuery counter. A bold navigation that slides in when active, replacing the current content in a 3D space. A tutorial about how to create an animated masonry gallery using jQuery and CSS transitions. Beside filter buttons this tutorial features a resize button that make the images arranged in a box or spread across the entire screen and a title that will change after applying a filter. A simple tutorial which will help to share articles from the webpage to WhatsApp using jQuery. A simple template that takes advantage of the background-attachment CSS property to create a fixed background effect, with the addition of a navigation to browse through the different sections. A tutorial about how to create a drag and drop interface for a newsletter builder using jQuery. Secondary Sliding Navigation is a bold, secondary menu that slides over the main navigation. This approach can be an alternative to a standard dropdown menu, in particular if you want to emphasise more the sub navigation. A full page menu, that replaces the current content by pushing it off the screen. A tutorial about creating Multilevel Toggle (accordion) Responsive Navigation Menu using jQuery. The multi-toggle responsive navigation on smaller screens is similar to nested accordions, the user touches primary level parent item to reveal list under it and when the screen is big enough vertical toggle menu changes to horizontal drop down navigation. A tutorial about how to make a simple countdown timer using jQuery. A combination of very basic HTML, CSS and a little bit of jQuery you can achieve a pretty nifty, clean expanding tile. Feel free to use this concept to create your own Expanding CSS3/jQuery Panels.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100081.47/warc/CC-MAIN-20231129105306-20231129135306-00823.warc.gz
CC-MAIN-2023-50
1,878
13
https://forums.adj.com/printer-friendly-topic/is-this-even-possible?forReply=587205936860103820
code
I have the Show Designer, and I've got some experience now programming it. Personally, with all those different fixtures, I think it'd be really confusing trying to program them all. Maybe the best thing to do would be to put just the PAR cans and the scanners on the controller, and leave the rest of the stuff as sound-activated. Also, since the Show Designer is kinda expensive, I'm not sure it'd be the best controller to get. If you only control the scanner(s) and dimmer packs, you can get by with a much cheaper controller like the Operator, and still have a lot of control.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711042.33/warc/CC-MAIN-20221205164659-20221205194659-00850.warc.gz
CC-MAIN-2022-49
581
1
https://polycube-network.readthedocs.io/en/latest/developers/index.html
code
Polycube Developers Guide¶ This guide represents an initial starting point for developers that want to implement new services (e.g., custom NAT, router, etc) using the Polycube software infrastructure. - Writing the eBPF datapath - Writing the control plane - Writing a YANG data model - Polycube Automatic Code Generation Tools - Debugging Polycube services - Debugging using Integrated Development Environment (IDE) - Debugging network traffic using tcpdump/Wireshark - Profiler Framework - Hints for programmers - Polycube CI/CD How to create a new service / update an existing one¶ The process to create or update service could be summarized in these steps: Please note that steps (1) and (2) are needed only when there is a change to the the YANG data model. In case we have to slightly modify an existing service (e.g., fixing a bug in the code), only steps (3) and (4) are required.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304309.59/warc/CC-MAIN-20220123202547-20220123232547-00262.warc.gz
CC-MAIN-2022-05
891
15
https://ti-qa-archive.github.io/question/8931/passing-an-image-to-a-new-view.html
code
I'm attempting to create a Snapost-like app where a user can upload and image & text to a web service. Unlike Snapost though, I'm creating different views and using the cooler 'slide' animation. My problem is passing the event.image created by the camera/photo gallery to a new view. I've tried creating a global var in the app.js file and storing the image in a property all to no avail. I feel that the property approach is the better route, but I only see the ability to store strings not objects. Anyone have any idea how I could do this? Actually I thought of something like this: var f = Ti.Filesystem.getFile(Ti.Filesystem.applicationDataDirectory,'tmp.jpg'); f.write(this.responseData); Titanium.App.Properties.setString('myTmpImage', f.nativePath); You could write the image into a file and pass the path if this is an option for you. Then delete the file when done? If you don't mind, what would the code look like to do such a thing? I don't mind but I am not at my workstation. But have a look into the KitchenSink examples, xhr_remote_file.js or similar, you should find there the code your looking for. So I've reviewed the Kitchen Sink examples, and they allow you to point to a file that you have in your file stack and save it to the photo gallery, but they don't have an example where you can get the path to the image saved on the phone's filesystem. Maybe the best solution is to just launch the camera/photo gallery on the page that I'd like to use it….that solves all of this doesn't it. I guess I'll just do that. Anyone with a better idea, please let me know. You're solution worked! Thanks!
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655908294.32/warc/CC-MAIN-20200710113143-20200710143143-00537.warc.gz
CC-MAIN-2020-29
1,617
12
https://confluence.hl7.org/pages/viewpage.action?pageId=76164453
code
EHRs and other data systems are not yet capable of providing cancer patient data that conforms to the mCODE standard. Patient mCODE data is available to any workflow in standard, HL7 FHIR resources. mCODE Extraction Details Any workflow where mCODE data is required for execution. A workflow requires access to a patient's data described by mCODE. Any CodeX or mCODE use case trigger. Required patient data exists in a structured computable format in an EHR or other health IT application. A set of FHIR resources populated with data as defined in the mCODE standard is available for any workflow. Retrieval of patient data as defined by mCODE. The mCODE Extraction use case defines a software engineering framework and reference implementation for EHR or health IT developers to use as a basis for developing server specific mCODE extraction. A subset of mCODE elements is targeted for the first phase: Cancer Disease Status, Treatment Plan Change, general patient demographics and clinical trials data. At this time, there are no specific conference calls for the extractor. If you'd like to learn more about the extractor, please reach out to any member of the use case team below. If you'd like to obtain or help develop the extractor, please join the effort on GitHub.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662550298.31/warc/CC-MAIN-20220522220714-20220523010714-00623.warc.gz
CC-MAIN-2022-21
1,273
11
http://hannahrossfantasy.blogspot.com/2017/07/changing-book-cover-after-release-yay.html
code
When things came to actually selling the book, however, we realized that something isn't working. While people who had read the book loved it, for the most part, the views/clicks rate on our Amazon ads was unsatisfactory. To put it simply, hardly anyone was clicking on to the book's Amazon page. This led us to think that the cover, while perfectly fine in itself, does not quite fit the book. The cover, together with the title, might create a mistaken impression that this is a children's book - which it is emphatically not. We wanted something that would spell out "dystopia" more clearly, and give some sort of hint as to what goes on in the narrative. Finally, we decided on a new cover: The girl against the background of the ruined city is quite representative of the plot, and the cover, overall, fits the genre better. Once more, this incident makes me feel thankful for digital publishing and print on demand. Changing your cover or correcting mistakes is quite easy, simple and free of hassle. Authors and publishers can play around and see what works, what doesn't, and what just needs to be tweaked. Also see Joanna Penn's excellent post on changing book covers.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867055.95/warc/CC-MAIN-20180624195735-20180624215735-00056.warc.gz
CC-MAIN-2018-26
1,177
5
http://ftp2.de.freebsd.org/pub/linux/misc/gazette/issue30/ayers2.html
code
One of the main differences between Linux and the commercial Unix flavors is that the commercial unices commonly come with one version or other of the proprietary Motif libraries. Motif is basically a "widget-set", a set of libraries and header-files which give X-windows applications a characteristic look, including such features as dialog-boxes, menus, file- and font-selectors, drag-and-drop support, etc. There are several free widget-sets which offer roughly the same functionality, such as GTK, so Motif isn't a necessity for a Linux system except for one factor. Many of the popular free-software projects come from institutions such as universities or government agencies, with a few originating in a commercial or corporate setting. These institutions often use a commercial Unix and programmers tend therefore to use the Motif development tools. A year or so ago I bought a copy of SWIM Motif from the LSL web-site. There were several software packages I wanted to compile which required the Motif libraries and header files, such as XEphem, NEdit, DDD and Vim. The price of a commercial Motif package had been close to two hundred dollars, but the new SWIM version was selling at that time for about sixty, so it seemed like a good deal. It's a quality product and worked well for me until I decided to upgrade my Debian system to Debian 2.0, which is based on libc6 (as are Redhat 5.0 and 5.1). I used the handy autoup.sh script, which upgrades the core packages of the distribution in the proper order. Everything was hunky-dory until I realized that my proprietary Motif libs were based on libc5 and won't function in a libc6 environment. The LSL company offers a thirty-dollar upgrade for customers in my situation, but I felt that I'd spent enough on what isn't really a necessary software package, and who's to say whether some future changes in Linux might put me in the same situation again? Situations like these really make me appreciate source-code availability! I'd been hearing favorable reports on the newer versions of Lesstif, a free and open-source Motif 1.2 clone created by a team of developers called the Hungry Programmers. The release of the Netscape source earlier this year had attracted new Lesstif users, as Netscape needs Motif to build. More users means more bug-reports and probably some additional programming help; I can't help but think that the new Netscape situation was a shot in the arm for Lesstif. The Lesstif releases seem to be more frequent now, for whatever reasons. I really didn't know what to expect from Lesstif. I remembered reading usenet postings concerning Lesstif's failures to work with this or that application and numerous comments on display flaws and other bugs. These comments were made over a year ago, which is approximately a decade in "computer time", so I was hoping for at least a marginally useful product. The first release I tried was 0.83. To my surprise, it compiled and installed as easily as any other quality GPL package. Feeling rather foolish that I'd spent hard-earned cash on a commercial Motif implementation, I proceeded to re-compile (over the course of a few weeks) every application which I had previously linked with SWIM Motif. So far every one I've tried has worked well with Lesstif; some packages needed the paths to the Lesstif libraries and header-files specified in the Makefile, but this was the only tinkering I've had to do. I was particularly pleased that NEdit now works with Lesstif, as this editor's dependence on Motif has until now hindered its widespread use by Linux users. The few bugs I've seen in the Lesstif version I'm using now (0.85) are minor and have little effect on usability. One reason Lesstif is important for the Linux community is that its existence and usability make it possible for the developers of distributions to package Motif-linked applications without the necessity of dealing with non-free software. The application developers can continue to use Motif, while Linux users can still compile and run the programs without the proprietary libraries. Jon Christopher, a member of the Lesstif team, has written an essay about Lesstif's history and prospects which is well worth reading. It was originally contributed to the Slashdot web-site, and is available here. The Lesstif web-site has the latest releases and other news. Last modified: Sun 28 Jun 1998
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473347.0/warc/CC-MAIN-20240220211055-20240221001055-00245.warc.gz
CC-MAIN-2024-10
4,389
10
http://stackoverflow.com/questions/6139672/wordpress-different-header-image-per-page
code
I've done a custom theme now the client want to be able to upload a different header image for each page within the backend of WP. Does a plugin exist for this or what custom coding would I need to do. Search plugins: http://wordpress.org/extend/plugins/ Sign up using Google Sign up using Facebook Sign up using Stack Exchange 3 years ago
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657137046.16/warc/CC-MAIN-20140914011217-00336-ip-10-234-18-248.ec2.internal.warc.gz
CC-MAIN-2014-41
339
6
https://www.oreilly.com/library/view/learning-pandas/9781783985128/ch07s04.html
code
The data in your sample can often contain duplicate rows. This is just a reality of dealing with data collected automatically, or even a situation created in manually collecting data. Often, it is considered best to err on the side of having duplicates instead of missing data, especially if the data can be considered to be idempotent. However, duplicate data can increase the size of the dataset, and if it is not idempotent, then it would not be appropriate to process the duplicates. To facilitate finding duplicate data, pandas provides a .duplicates() method that returns a Boolean Series where each entry represents whether or not the row is a duplicate. A True value represents that the specific row has appeared earlier in ...
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195527000.10/warc/CC-MAIN-20190721123414-20190721145414-00413.warc.gz
CC-MAIN-2019-30
735
5
https://forums.sinsofasolarempire.com/328126/page/5/#2036554
code
With the 10-minute mini dump, there is little I can do until the devs release a fix or the final version. I isolated the reason for the String not found for the Unpaused, and will be fixing that, as it is just a numbering error in the string file. The English file states 6125 strings when it should have 6126, so it does not reconise the last entry in the string file which is the Unpaused entry. A pain in the neck keeping up with how many things I have put there. As with the dependancy arrow, they have never worked in the Fleet Tree as it is hardcoded whether the arrow will work in a tree or not, and unfortunatly it is without it. Also, some techs in the Defense tree rely on some techs in other trees as of this moment, so they are without the arrows. The reason for having techs in different trees was that when I upgraded my mod to Entrenchment, it was a straight upgrade, and I did not mess around rearranging things. Within the next release I will be working on this, as well as balancing out the planets and giving it an overhull to clean it up and smooth it out. Thanks for the heads up.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818067.32/warc/CC-MAIN-20240421225303-20240422015303-00217.warc.gz
CC-MAIN-2024-18
1,101
4
https://knightofmalta.net/2019/08/26/easyjet-airbus-a-320-madrid-to-basel/
code
I spend a lovely day at the Campo Juan Carlos, a large park close to the exposition area of Madrid and easily accessible by metro. Easyjet really is quite okay if you ignore the boarding experience, which I find unpleasant and unnecessarily so. I also think the limitations of the low cost model are beginning to show. The old legacy carriers have clearly done their homework, and you can purchase just about anything as an ancillary service nowadays. But on a low cost carrier, that is only possible up to a point. For example, if I purchase an upgrade on Swiss or KLM, that automatically comes with the priority check-in, fast track security, lounge access, better seat pitch and an empty middle seat.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250601615.66/warc/CC-MAIN-20200121044233-20200121073233-00449.warc.gz
CC-MAIN-2020-05
703
2
https://www.cbronline.com/hybrid/license-changes-could-see-windows-server-users-pay-the-price-4745404/
code
News: Customers to be required to pay per-core rather than per-CPU. Microsoft is changing its pricing for Windows Server 2016, which could result in customers paying more. Customers will be required to pay per-core for their licenses rather than per-CPU license, the change will be applied to System Centre 2016 Standard and Data centre editions. Although licensing costs will be the same for many, those that have servers with two or four CPUs and 10 or 20 cores, may need additional licensing. The information comes from the company’s licensing datasheet, which says: "The server management licensing of System Center 2016 will move to be based on physical cores. The core based licensing will align with Windows Server 2016 model to provide a consistent licensing metric for managed VMs." Licenses for servers with eight cores or less will cost the same as in the 2012 R2 two-proc license price. The document explains that core licenses will be sold in packs of two licenses, with each processor needing to be aligned with at least 8 core. Each physical server, which includes one processor server, will need to be licensed with a minimum of 16 cores. The reasons behind these moves are so that cores become the common currency when licensing Windows Server. This aligns the company’s pricing strategy on Windows Server with Azure, its cloud offering, which uses per-core licensing for on-premises deployments. Microsoft also uses this licensing model for other on-premises software; SQL Server and BizTalk. Licensing consistency across its services is the goal.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739347.81/warc/CC-MAIN-20200814160701-20200814190701-00251.warc.gz
CC-MAIN-2020-34
1,569
10
https://www.hahareptiles.com/Merchant2/merchant.mvc?Screen=CTGY&Store_Code=haha&Category_Code=CHM
code
The chameleon is able to balance perfectly still by gripping a branch with its pincer-like claws. It also holds on by wrapping its long, grasping tail around the branch. The tail remains coiled up when not in use. The chameleon has unique eyes that can rove and swivel. They can focus together like humans or they can focus separately to observe two different objects simultaneously. The chameleons tongue is as long as its body and is sticky with a club-shaped mucus-covered tip. Chameleons are known for their ability to change color to match their environment as a defense against predators. Color changes occur when the color cell becomes larger or smaller, regulating the amount of multicolored reflection each layer of pigment produces. The cage should be furnished with a variety of horizontal perching surfaces and diameters so that the lizard can easily navigate the entire cage. The arrangements of lights, plants and branches should provide at least one basking site where the temperature will reach the upper limits of the animal's preferred optimal temperature zone. There should be other comfortable perching sites with slightly cooler temperatures. Use newspaper, reptile bedding or reptile turf. Create shelters with climbing and basking areas. A large bowl of fresh water for drinking and soaking should be provided at all times. Keep the tank between 82 and 95 during the day and 72 to 80 at night. Use under tank heating pads for a 24-hour heat source. The temperature in the rest of the enclosure should be still lower allowing the animal to thermoregulate by moving around the cage. Most chameleons do best with a 10-15 degree F drop in temperature at night.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402124756.81/warc/CC-MAIN-20201001062039-20201001092039-00090.warc.gz
CC-MAIN-2020-40
1,679
6
http://support.itextpdf.com/node?page=1
code
I would like to make a difference between page 1 being a A4 size that needs to be printed on Pre-printed letterhead paper which is located in my printer tray 1. The second to n-1 page need to be printed on normal A4, which is located in tray 2 of my printer. The last page needs to be printed on colored A4 paper, which is located in tray 3 of my printer. Any help is welcome. I have a large number of PDFs containing checkbox form fields with the wrong export value that I need to correct. I can see examples in the book on how to create a new RadioCheckField field and then set the appearance on it to get the export value set, but I can't find an example on how to do this on an existing field. Maybe I just need to know how to get a handle on an existing checkbox field as a RadioCheckField so I can turn around and set its appearance with the correct export value? I'm using iText 2.1.7. Thanks! Need to avoid "There have been subsequent changes to the document" message when applying multiple signaturesSubmitted by epicriver on Tue, 10/02/2012 - 16:28 I work on an application that deals with electronically signing Loan documents. Many loan documents have multiple signature fields that are signed by different people. We have a signature tablet that prompts users for signatures based on the signature fields defined in the PDF and we apply the image to the signature fields. So, I am at my wits end. I was challenged to create an application using iText that duplicated functionality provided by the Perl PDF32 module to do some annotation work on existing PDFs. Everything is sweet except for some display issues when users hi-light the annotations created by iText. Here is a code snippet (pretty basic): annot = new PdfAnnotation( stamper.getWriter() , rect ); annot.setBorder( new PdfBorderArray( 0 , 0 , 1 ) ); // dunno about this but the original code did it, so I will too annot.setColor( getColor() ); // this makes is green I have the following w2 pdf : I am supposed to populate the Form with data coming from the database. I am reading Chapter 6 and 8 but for now i need to write a proposal one of the largest insurance companies in the US. What would be the approach : 1) Open the file with Adobe Acrobat and add acro field, then stamp the data runtime ? 2) I heard a way of using absolute x and y to set text without adding acro fields, would this approach would be undesirable. I have a requirement where a web user log in to a company portal to see his w2 form in pdf format. The w2 data is pulled from a database. The w2 Form layout looks like the one u would see when u login to your company portal. What would be the best way to draw the W2 layout. Would i use itext api to dynamically draw the layout or should i generate a w2 empty pdf template, read it and then stamp it with the user data ? any other ways ? We have a signature field set up to submit the form after a person signs the signature field (using a signature pad). The fdf stream is making it over to us fine as seen through Fiddler 2.0. Where can i found de corret java compatibility version of bouncy castle with itext versions ? I'm building a document out of three different pages. - Page 1 and Page 3 are ACRO form templates that I populate programmatically and form - flattern. - Page 2 is dynamic content. - Once produced i combine the three streams in memory into one document. - I then cycle through the combined document to add page numbers. Each of the pages has reference to the same font which is registered in the fontfactory for bold and regular type. In my implementation i use iTextSharp, but i think that is not the problem :) I rotate the pages of an pdf-file with the following functions: new PdfNumber(currentDegree + rotateDegree)); This works fine. When i view the file with the acrobat reader, the pages are rotated. But when i read the boxes, i see, that all boxes are the 'old' boxes and only the Rotation-property is set. Only the 'view' is rotated, but not the Trimbox itself (so like all boxes).
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163041297/warc/CC-MAIN-20131204131721-00096-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
4,017
33
https://community.kodular.io/t/develop-a-translator-app-using-google-translate-api/16477
code
This category is exclusive for Tutorials! If you want to ask a question, or how to do something, please use the #discuss category If you have ever dreamt of unleashing the power of API’s, If you ever wanted to gain a clear understanding of using lists in your app, If you ever wanted to create an app with a sleek design then, I recommend you to enroll in the following course where all the above has been explained clearly while creating a beautiful translator app. What will you get with this course - You will create an exact app as shown in the preview using Google translate API - This course is more than 5 hours in duration. - You will receive a certificate on completion of the course - You can enroll in this course for flat 10$ (Hurry up) These were few of the many important things in the course and I am pretty sure that you’ll be very excited to learn about each and every feature once you’ll watch the preview of the app. Click here: How to do more with MIT App Inventor 2, Thunkable or Kodular | Udemy See you in the course Nice to see you here. This is against Google’s ToS. You can’t use Google Translate API to make a translation app. I had a look through the terms of Google Developers and didn’t find anything specific about not creating a translator app. I am very thankful to you for raising this issue. I will further search other pages for any specific information about it. However, let me make it clear that this course is no more just about using Google translate API. My main aim is to teach about some advanced concepts while creating an example app. So, even though the end product is a translator app but, it is much more than that, you will learn about lists, variables, Web API, designing, debugging, extensions and much more. In fact, I have changed its name to MIT App Inventor 2 advanced course. Hope you have understood
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00074.warc.gz
CC-MAIN-2022-33
1,868
16
https://bjaro.se/kattungar/PolluxENG.html
code
Blacksilver spotted with white. EMS code: NS 09 24 Pollux is a giant star about 34 light-years from the Sun in the constellation of Gemini. It is the brightest star in Gemini and the closest giant star to the Sun. Click on an image to open a full resolution version in a new tab.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655891640.22/warc/CC-MAIN-20200707013816-20200707043816-00256.warc.gz
CC-MAIN-2020-29
279
5
https://compsmagad.pages.dev/posts/now-generally-accessible-is-windows-update-for-business-reports/
code
The company calls Windows Update for Business Reports an “evolution” in update compliance, essentially a rebranding for clarity of purpose. Last month, Microsoft announced a preview of its reporting tools, and said the recently introduced Azure Workbooks for Update Compliance will be renamed Windows Update for Business reports this month. New experiences include quality and feature update reports that monitor device-wide updates, including quality and feature updates, and delivery optimization for bandwidth savings across all content types. Admins can access the Windows Update for Business reports from Insights Hub in the Azure portal. Powered by Azure Workbooks, Azureed Insights provides administrators with a monitoring view of their Azure resources. Admins can see update status and device status in both the feature update report and the quality update report. You can use the Update Status view to track the progress of targeted updates, including those managed by Windows Update for Business.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817153.39/warc/CC-MAIN-20240417110701-20240417140701-00698.warc.gz
CC-MAIN-2024-18
1,011
1
https://waymobetta.com/
code
01110111 01100001 01111001 01101101 01101111 01100010 01100101 01110100 01110100 01100001 I'm Jon, a programmer in San Diego, California. My interests are in information security, blockchain, automation and building proof of concepts for product development and security research. I like travel, dogs, music, coffee, surf and code. hacker one | github | stack overflow | medium | mail
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668594.81/warc/CC-MAIN-20191115065903-20191115093903-00415.warc.gz
CC-MAIN-2019-47
384
5
https://www.getbeyondapp.com/guide.html
code
How to configure a task using the configuration bar? Your configuration bar shows 4 icons besides the submit button. From left to right, the list selection icon, the scheduler icon, the reminder icon, and the priority level icon. The list selection icon lets you assign the task to a list. The scheduler icon allows you to schedule a date, a time, and a Tap the reminder icon to schedule a notification. You can alternatively tap and hold the reminder icon to automatically schedule a reminder for a dated task at the time of the event. The priority level icon lets you specify a level of priority for a task. There are three different levels of priority each with a distinct color. The green color represents the lowest priority or priority 1. The yellow color represents a medium level of priority or priority 2. Finally, the red color represents the highest level of priority or priority 3.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740848.39/warc/CC-MAIN-20200815124541-20200815154541-00502.warc.gz
CC-MAIN-2020-34
893
12
http://www.meetup.com/Semantically-Webbed-Seattle-Meetup-Group/messages/6044565/
code
Its great to have this response! As folks join up, please take the moment to add your intro, a photo, and an RSVP to the May 6th Meetup. Deep has said we have a lot of room for the meeting, so invite others. Getting close to needing an assistant organizer (real close) open for recommendations with the bandwidth. Also looking to expose our Meetup to a wider audience. I am putting a Word poster in the Files area that can be printed or attached to emails that you would like to send out with invitations. If you are aware of local eJournals (and Journalists), let them know what is going on for May 6th. My personal goal in pushing the "Start a Meetup Group" button was to get a critical mass of interest going (about 200+) to help us initialize and propagate sustainable, progressive projects within our community. My particular interest is sustainable knowledge transfer. My organization email is [address removed] if you wish to contact me individually, but also take advantage of the message board and group email. Looking forward to meeting and participating in this rewarding opportunity! Seattle Semantic Technologies Meetup Group (SSTMG) strives to provide a particularly Pacific Northwest and Puget Sound opportunity for the Mashup of regional cooperative discussions, implementations, and opportunities to evangelize Semantic Technologies. We work to expose concepts and realities in information and web, benefiting local and visiting participants and the knowledge universe.
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042987155.85/warc/CC-MAIN-20150728002307-00045-ip-10-236-191-2.ec2.internal.warc.gz
CC-MAIN-2015-32
1,486
6
https://ayende.com/blog/173313/trie-based-routing
code
In my previous post, I discussed the cost of routing in MVC vs. our own implementation. The MVC routing / infrastructure consumed about 90% of the time, while the code that actually does stuff is left with less than 10%. In our implementation, the actual request handling code gets about 85% of the time, while all the infrastructure is handled in the other 15%. Of that , a large portion of that time is actually spent on routing. In our tests, we saw something like 40% of the time spent in selecting the right controller action to execute, this is when there is just one such action that can be run. Now, to be fair, this is a scenario where we don’t actually have any meaningful logic. We are just saying “hello world” over and over again, so the infrastructure costs are really noticeable in this benchmark. But that is the point, we want to see what are the fixed costs of the infrastructure we use. Now, in RavenDB we have several hundreds routes (last count was something upward of 400), and we noticed that routing take a lot of time to select the right action to run. We optimized the hell out of that to the point by specializing that to our own situation and based on our own knowledge. But when we started to look at moving our code to Kestrel, we took the time to move to a system that is a better fit for us. The major reason routing is such an expensive issue in MVC is that it does quite a lot. It needs to handle route selection, capturing values, coercing data to the right types and a lot more. All of that takes time, memory and cpu cycles. But as it turn out, we don’t really need all of that. We have relatively simple routing needs. Here are a few example of RavenDB routes: So we have the fixed routes, like /admin/stats. We have routes that contain a database name in the middle, and we have routes with a suffix. We can take advantage of that to create an optimal solution. In our case, we used a trie: In computer science, a trie, also called digital tree and sometimes radix tree or prefix tree (as they can be searched by prefixes), is an ordered tree data structure that is used to store a dynamic set or associative array where the keys are usually strings. The cost of querying a trie is O(L), where L is the length of the key that we are querying. Here is how a very small trie looks in our tests. We start from the route, matching each character against the trie node key. Once we have consumed the full key, we check if it has any children starting with the next character in the url. Note that the Children array here is of size 127. This allows us to index directly into the array (at cost of O(1)) to find the next trie node. We didn’t want to use a dictionary here because of its size and its cost relative to an array access. This has some interesting implications: - The route definition is limited to ASCII characters (but the actual urls are not, mind). - Regardless of the number of routes, we are ensured of reliable performance. But that still doesn’t let us handle routes like the ones above. In order to do that, we had to extend the syntax a bit. /admin/stats would match exactly. That is easiest. /databases/*/docs is a route that has a capture. The * symbol says “matches anything but /”, so we can get the database name captured without complex matching. Note that by capture, I mean just record the start position and length, we don’t want to pull a substring out of that and pay for an extra allocation. /databases/*/indexes/$ is another route that has special meaning. The $ symbol says “the match is done, even if the url has additional characters”. That way we can capture embedded ids easily (again, no allocations). The end result? Or roughly a route match in 0.9 μs. Pretty good, even if I say so myself.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475311.93/warc/CC-MAIN-20240301125520-20240301155520-00109.warc.gz
CC-MAIN-2024-10
3,788
19
https://forums.creativecow.net/docs/forums/post.php?forumid=55&postid=860811&univpostid=860811&pview=t
code
Hoping one of you has experienced this at some time... I have this wonderful vegas ms9 plat and dvda program and can't use it. Movie rendered in vegas just fine and moved to dvda. Tried to burn with samsung sh-s203n and with asus drw-20bilt burners Get the following error: asus drw-20b1lt 1.00’- module sfmmx.cpp line 1974 an illegal request was recd an option was selected in the CDB that is not supported by the drive. Command bt 00 00 00 00 00 00 16 00 00 sense: 05 24 00 The asus came with nero 8 but I love dvda. Do I need the nero to
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221218357.92/warc/CC-MAIN-20180821151743-20180821171743-00625.warc.gz
CC-MAIN-2018-34
542
14
https://www.wrxforums.com/threads/fall-sale-at-hpt-motorsports.4042/
code
Sounds good guys... I think we'll be able to put some great offers together. As for K-Sport coilovers, we don't stock them, so I'll have to call them direct tomorrow to check stock. But that doesn't mean we still can't arrange some sale prices. But I'll see what I can do. Keep posting up guys, you still have another day to make suggestions!!
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400202007.15/warc/CC-MAIN-20200921175057-20200921205057-00398.warc.gz
CC-MAIN-2020-40
343
2
http://blogs.msdn.com/b/project_programmability/archive/2010/12/20/olp-sample-code-for-project-server-2010.aspx?Redirected=true&t=OLP%20Sample%20Code%20for%20Project%20Server%202010
code
The Object Link Provider (OLP) in Project Server 2010 enables the management of the Project-specific lists in a project site (issues, risks, deliverables, documents, and custom lists) and integration of the SharePoint lists with Project Server. The OLP has the same functionality as in Project Server 2007; however, you can use Windows Communication Foundation (WCF) to develop OLP solutions for Project Server 2010. The attached code (OLP_Sample.zip) is a preview of an example that uses the CreateWebObjectLinks method, to be published in the next update of the Project 2010 SDK. Before you run the sample application, perform the following steps: Use Project Professional 2010 to create and publish a project with at least one task. Use Project Web App to open the project site. Create at least one issue or risk in the Issues or Risks SharePoint list of the project site. Change the OLP constructor values according to your example. Add a web service reference to http://localhost/pwa/_vti_bin/Lists.asmx, and name the reference WebSvcLists. This example performs the following tasks: Verifies that the project, task, and project site exist and gets their corresponding GUIDs. Links a task and a SharePoint list item (in this case, an Issue). Links a task and a generic object. Gets the list of SharePoint items that are linked to a task and writes the contents of the ObjectLinkProvider dataSet dsLinkedObjects to an XML file. Gets a list of generic items that are linked to a task. Deletes the links to web objects. For more information about how the sample code works, see Procedures 1-6 in How to: Use the OLP to Link an Object to a Task.
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398450581.71/warc/CC-MAIN-20151124205410-00205-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
1,646
15
https://gamehunters.club/doubleu-casino/gold-coin
code
I recently today aroun 14h00 won 2 x 38.4 mil, on Gold Coin, my favourite, it did not add up to my points? Also experienced earlier, but thought I was mistaken but, today is not acceptable! It deduct the playing chips but did not add up the big winnings? IYesterday evening I was uspended by playing, by abusingd the game, what the heck, how is this possible by only swop between games and spin?? There were another same case by this game previously as well.May I please get answers on my questions?
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663039492.94/warc/CC-MAIN-20220529041832-20220529071832-00393.warc.gz
CC-MAIN-2022-21
499
1
https://thesecretbuzz.com/how-to-write-your-memoirs-why-helen-keller-is-important.html
code
Below, you’ll find an example of an autobiography provided by one of our experienced writers. You are welcome to use it as a template for your own autobiography. Although you can borrow some ideas about proper structure and writing style, you can’t copy our sample without citing it properly. Please, don’t commit plagiarism! We believe that you are able to create an autobiography that will be no worse than our autobiography example for high school students. Take a step back to reflect. You're chronicling your life lessons, but what have you learned from them? Relay your intentions, desires, feelings of loss, feelings of joy, the wisdom you've gained, and other inner thoughts from time to time throughout the book. Taking a step back from the action of the story to reflect on what it all means is a good way to add depth to your autobiography. Pull out the best stories. The story of your entire life would start to get pretty long-winded, so you'll have to make some decisions about what anecdotes you're going to include. Begin drafting your manuscript by writing out the main stories that will be woven together to create a picture of your life. There are a few main topics that most autobiographies cover since readers find them fascinating. If you are not sure that your whole life path is worth attention, then a memoir is your best choice. It is focused on one particular event, relationship, place, or period of your life that has influenced your personality a lot. Don’t be afraid to express your personal feelings and ideas in your memoir, as it shouldn’t be simply a brief list of facts, but the reflection of your inner world. Culture includes the customs of your family, the holidays you preferred, celebrations and rituals you practiced, the food you ate and the clothes you wore. Include special glimpses into things like the most precious gift you got or popular foods served during special celebrations. These details will be lapped up by a hungry audience that wants to know more about a culture that is different from their own. 1. “Declare yourself” to your colleagues at work. Doug Conant, the much-admired former CEO of Campbell Soup and founder of Conant Leadership (and one of my favorite people), is an introvert who’s not inclined to schmooze and self-disclose. So he scheduled “Declare Yourself” meetings, one at a time, with each of his direct reports. The purpose of these meetings was to tell his employees his story: how he liked to work, his management philosophy, and the things and people that mattered to him most. (We at Quiet Revolution are partnering with Conant Leadership to develop a “Declare Yourself” tool that you can use with your colleagues. Stay tuned on that.) The aim of such an essay is obvious: you need it to convince admissions officers to accept you into college. As a rule, there is a word limit specified in the instruction for applicants. Don’t confuse an autobiographical essay with your CV or resume! They have totally different structure and formatting. In addition, the essay is aimed at portraying you as a personality, not as a professional. If the purpose of your autobiography is to pass on your story to your heirs, consider including memorabilia (e.g. pictures, heirlooms, medals, mementos, letters, etc.) and putting your story in a scrapbook format. Of course, you may not be able to copy the memorabilia that accompanies your autobiography, so you still have to think about what you intend to do with your original work and other items, such as medals or bulky heirlooms. “Be aware of the pat on the back! It might be the one thing that holds you back. We are always trying to find a way to make people better. In a weakened society, one of the methods people believe works is to give an instant pat on the back to someone once they do something positive/correct, etc. While this may be an effective method, all you are truly doing is weakening one person’s mind. You are essentially training a person to expect a congratulations/ an attaboy, etc., for every fucking thing they do. But, we are forgetting the very basic principles of being a basic fucking human being. Instead of the pat-on-the-back method, why not try this one? The fucking “supposed to” method! It is our job as leaders and teachers to teach people to not always look for the pat on the back rather to build a mindset that we are supposed to do and be our best all the time in every situation. We shouldn’t look for anything from anybody for simply doing our best. You are supposed to get up early, make your bed and clean your house. You are supposed to work out almost every day. You are supposed to do the best you can in school every day. You are supposed to bring your best effort to work every day. That pat on the back should only come when you have exceeded what most people consider exceptional work or have gone above and beyond what is expected. Don’t expect a pat on the back for the shit that a human being is supposed to be doing every day of their lives and that is being the best that he/she can be in every situation in their life. It’s not about you. It’s about your team, the ones you love, and having pride in yourself. It’s not about what others think or feel about you- it’s about how you feel about yourself.” – Can’t Hurt Me: Master Your Mind and Defy the Odds Write out your life timeline. Start writing your autobiography by conducting research on your own life. Creating a timeline of your life is a good way to make sure you include all the most important dates and events, and it gives you a structure to build upon. You can consider this the "brainstorming" phase, so don't hesitate to write down everything you can remember, even if you don't think the memory will make it into the final version of the book.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370518767.60/warc/CC-MAIN-20200403220847-20200404010847-00554.warc.gz
CC-MAIN-2020-16
5,838
10
https://forum.xojo.com/t/dictionary-not-returning-correct-value/43767
code
So I have a listBox and I am storing a dictionary in the RowTag for each row added to the listBox. When a row is clicked on I then read the data from the rowTag I get the dictionary. Oddly no matter what row I click on the dictionary I retrieve from the row is the last one added to the listbox. I am storing the data using the following code listEvents.RowTag(listEvents.LastIndex) = storageData I then retrieve it in another method using dim eventDateData as New Xojo.Core.Dictionary eventDateData = listEvents.RowTag(row) I know I am getting the correct row as the title I am reading directly from the row is the one I click on. Any idea why I am always retrieving the last dictionary I store?
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00234.warc.gz
CC-MAIN-2022-33
696
10
https://vsys.host/how-to/how-to-make-firewall-blacklists-with-auto-expiration-feature-using-iptables-recent
code
How to make firewall blacklists with auto expiration feature using Iptables recent To install Iptables on Ubuntu or other Debian-like distributions, you will need to type the following command: root@ubuntu:~# apt update && apt upgrade -y && apt install iptables Next, check if any additional programs are installed that work with the Netfilter module as a firewall: root@ubuntu:~# ufw status Status: active root@ubuntu:~# ufw disable Also, before you start working with Iptables, check that the tables with the firewall rules are empty using the following command: root@ubuntu:~# iptables -L -n Getting Started with Iptables recent: The purpose of using the “recent” criteria is that the firewall will remember the number of packets passing through and decide to filter based on them. –set – put into internal list of packet source/destination. –rcheck – check if the source address of the packet is currently in the list. –update – like –rcheck, except it will update the “last seen” timestamp if it matches. –remove – check if the source address of the packet is currently in the list and if so that address will be removed from the list and the rule will return true —seconds number is an optional feature of –rcheck and –update. The packet is only considered eligible if the last access to the entry was at least a number of seconds ago. –hitcount number – additional option in –rcheck and –update modes. A packet is considered to be eligible if at least the number of times the given record has been accessed. Usually used in conjunction with –seconds Suppressing hacking attempts We will use an example to explain the rules for an INPUT chain, in which we will restrict access to the SSH service. Let’s create a rule which will log all incoming TCP packets on port 22 for the last 2 minutes, and if the number of connections is more than 10 – the firewall will block the IP address We also allow an already established SSH connection so that we do not get disconnected: root@ubuntu:~# iptables -I INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT root@ubuntu:~# iptables -A INPUT -p tcp --dport 22 -m recent --name ssh --update --seconds 120 --hitcount 10 -j REJECT root@ubuntu:~# iptables -A INPUT -p tcp --dport 22 -m recent --name ssh --set -j ACCEPT By checking the current rules in Iptables we should see the following picture: Suppose the attacker uses a bruteforce attack on the SSH port: At the same time, let’s check what is happening on our Ubuntu Server: We can see that the recent module processed and blocked connections from the attacking machine’s IP address, but the rest of the log is not very readable; let’s fix this by installing a python script, which parses the log and gives us a readable form root@ubuntu:~# apt update && apt upgrade -y && apt install git root@ubuntu:~# git clone https://github.com/peppelinux/iptables_xt_recent_parser root@ubuntu:~# ./iptables_xt_recent_parser/iptables_xt_recent_parser/ipt_recents -f /proc/net/xt_recent/ssh As result we obtained is much more clear: Port knocking with Iptables recent Another example of how to use iptables recent is to allow SSH connections only for a certain time by “knocking” port. We will create a rule where the recent module will remember incoming packets on port 31337, and if it is received, the SSH port will be opened within 30 seconds; otherwise, the port will be closed. root@ubuntu:~# iptables -A INPUT -p tcp --dport 31337 -m recent --set --name knock root@ubuntu:~# iptables -A INPUT -p tcp --syn --dport 22 -m recent --rcheck --seconds 30 --name knock -j ACCEPT root@ubuntu:~# iptables -A INPUT -p tcp --syn --dport 22 -j DROP This is especially useful when trying to scan the server for open ports You can also continue to experiment with firewall rules to fine-tune your server specifically to your needs.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00100.warc.gz
CC-MAIN-2023-40
3,867
32
http://christianity.stackexchange.com/questions/tagged/apostles+morality
code
to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site What is known (and/or alleged) about the moral character of the 12 disciples? I've been following some (often less than civil) conversations about the character of pastors lately in which how morally upstanding a church leader should be expected to be is questioned. At several ... Mar 28 '12 at 12:23 newest apostles morality questions feed Hot Network Questions Do snapshots + RAID count as a good on-site backup solution? Categorize continuous data effectively (taking into account a response variable) apt-get install vs pip install Why is "distro", rather than "distri", short for "distribution" in Linux world? Each other's / each others' Why do the trends in reactivity not apply for francium? Explaining the difference between computer science and computer literacy convert 30 pin docks for lightning devices What is "spatted undercarriage"? Why does apt removes unwanted packages when giving * as suffix? Does the "Total number of records retrieved by SOQL queries" governor limit apply to sub-selects? Why does the Stack Overflow swag request form have six address lines? What happens when plates of a fully charged capacitor are isolated from each other? Is Russell Crowe in the opening scene of Beverly Hills Cop? Reverse a string word by word How to tell if a code is loseless. How to maintain reproduction? Does Into the Wilds stack? Is it dangerous to go to the USA as a Russian now? How can I kill puppies without consequences? Mandelbrot image in every language What text format is least likely to clash with ebook formats? Returning null or what? Better size aligning? more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Overflow Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010115284/warc/CC-MAIN-20140305090155-00017-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
2,224
52
http://www.tryfsharp.org/content/getting-started/beginning-03-chaining-functions.html
code
In the last lesson, you learned to create simple functions. You can create fairly sophisticated procedural programs with just this knowledge, but F# becomes truly powerful when you combine simple functions to build more complex computations. In this lesson, you'll learn to go beyond the fundamentals of F# to solve more interesting problems. One of the best ways to experience the power of combining functions is to perform computations across a set of data. In F#, one of the ways to store a data set is to use a List. F# supports a lightweight list creation syntax. let evens = [2; 4; 6; 8] The above snippet creates a small list, and fills it with four even numbers. The output window reveals the type of int list, meaning that evens is a list of integers. You can specify the elements of a list by using the semicolon separated syntax above, but you can also create an arbitrarily large list by using the let firstHundred = [0..100] As you probably expected, the Output Window reveals that firstHundred is a list containing the numbers zero through one hundred. If you have a Computer Science background, note that F# lists are singly linked lists. F# provides a suite of functions for working with data in lists. You can see all of these methods by typing List followed by a . to bring up intellisense. The List module provides some powerful methods for operation on elements in a list. let firstHundred = [0..100] let doubled = List.map (fun x -> x * 2) firstHundred List.map executes a mapping function on all of the values in a list and projects a new list from the results of the mapping function. In the above example, List.map builds the list doubled by performing a double function on each value in the firstHundred list. As you learned in the last lesson, List.map is a higher ordered function because it takes another function as an argument. List.map is One of the most useful higher-ordered functions in the List module on its own, but it becomes even more useful when you combine it with other functions. let firstHundred = [0..100] List.map (fun x -> x * 2) (List.filter (fun x -> x % 2 = 0) firstHundred) In this example, the List.filter excludes all of the odd numbers from List.map doubles them. The result is a new list containing the first 50 even numbers doubled. Chaining together the higher ordered functions in the List module is powerful, but it quickly becomes difficult to read if you have to nest multiple functions on the same line. List.sum (List.map (fun x -> x * 2) (List.filter (fun x -> x % 2 = 0) [0..100])) This one line of code takes the first 100 integers, filters out the odd numbers, doubles them, and then adds them together. That's a lot of power for one line of code. Unfortunately, it is also difficult to read because you have to start from the inside at [0..100] and work your way out to List.sum. This is where the forward pipe operator comes in handy. [0..100] |> List.filter (fun x -> x % 2 = 0) |> List.map (fun x -> x * 2) |> List.sum |> operator allows you to reorder your code by specifying the last argument of a function before you call it. This example is functionally equivalent to the previous code, but it reads much more cleanly. First, it creates a list of numbers. Then, it pipes that list of numbers to filter out the odds. Next, it pipes that result to List.map to double it. Finally, it pipes the doubled numbers to List.sum to add them together. The Forward Pipe Operator reorganizes the function chain so that your code reads the way you think about the problem instead of forcing you to think inside out. Believe it or not, you now possess enough F# skills to solve some fairly complicated problems. For example, below is a list of comma separated stock data. Let's walk through the process of finding the day with the greatest variance between the opening and closing price. First, take a look at the full solution. //"Date,Open,High,Low,Close,Volume,Adj Close" let stockData = [ "2012-03-30,32.40,32.41,32.04,32.26,31749400,32.26"; "2012-03-29,32.06,32.19,31.81,32.12,37038500,32.12"; "2012-03-28,32.52,32.70,32.04,32.19,41344800,32.19"; "2012-03-27,32.65,32.70,32.40,32.52,36274900,32.52"; "2012-03-26,32.19,32.61,32.15,32.59,36758300,32.59"; "2012-03-23,32.10,32.11,31.72,32.01,35912200,32.01"; "2012-03-22,31.81,32.09,31.79,32.00,31749500,32.00"; "2012-03-21,31.96,32.15,31.82,31.91,37928600,31.91"; "2012-03-20,32.10,32.15,31.74,31.99,41566800,31.99"; "2012-03-19,32.54,32.61,32.15,32.20,44789200,32.20"; "2012-03-16,32.91,32.95,32.50,32.60,65626400,32.60"; "2012-03-15,32.79,32.94,32.58,32.85,49068300,32.85"; "2012-03-14,32.53,32.88,32.49,32.77,41986900,32.77"; "2012-03-13,32.24,32.69,32.15,32.67,48951700,32.67"; "2012-03-12,31.97,32.20,31.82,32.04,34073600,32.04"; "2012-03-09,32.10,32.16,31.92,31.99,34628400,31.99"; "2012-03-08,32.04,32.21,31.90,32.01,36747400,32.01"; "2012-03-07,31.67,31.92,31.53,31.84,34340400,31.84"; "2012-03-06,31.54,31.98,31.49,31.56,51932900,31.56"; "2012-03-05,32.01,32.05,31.62,31.80,45240000,31.80"; "2012-03-02,32.31,32.44,32.00,32.08,47314200,32.08"; "2012-03-01,31.93,32.39,31.85,32.29,77344100,32.29"; "2012-02-29,31.89,32.00,31.61,31.74,59323600,31.74"; ] let splitCommas (x:string) = x.Split([|','|]) stockData |> List.map splitCommas |> List.maxBy (fun x -> abs(float x. - float x.)) |> (fun x -> x.) The whole computation occurs in just six lines of code, but there is a lot of power in those simple six lines. Let's review each part in detail. First, you need to break apart the list into its comma separated parts. You accomplish that by defining a helper function. let splitCommas (x:string) = x.Split([|','|]) splitCommas takes a string and breaks it into pieces whenever it finds a comma. String.Split is a function that splits a string based on takes an array of separator characters. Arrays are another basic container type in F# that allow you to index stored elements. You create arrays using a [| ... |] which is similar to the [ .. ] syntax used for lists. Here, [|','|] creates a single element array containing a comma. The result of the splitCommas is also an array. This array contains the individual string parts. For example, parsing the last line of the input yields the array [| 2012-02-29; 31.89; 32.00; 31.61; 31.74; 59323600; 31.74 |]. Now that you've separated the data by commas, you need to find the maximum variance between the opening and closing days. You accomplish that using the List.maxBy function, which finds the maximum item in a List based a given comparison function. You use a comparison function of (fun x -> abs(float x. - float x.)) to find the maximum variance. Note that abs is a function for calculating absolute value, and float is a function to parse a floating point number from a string. The x. calls get the second and fifth elements in the array, respectively (in F# array indexing is zero-based). Finally, you project the date from the maximum row using List.map and a projection function of (fun x -> x.). Putting it all together, you get six simple lines of code that solve a complex problem. let splitCommas (x:string) = x.Split([|','|]) stockData |> List.map splitCommas |> List.maxBy (fun x -> abs(float x. - float x.)) |> (fun x -> x.) In this lesson, you learned to chain functions to perform complicated computations. You explored the power of higher ordered functions in the List module, learned how to better express your program's intent with the forward pipe operator, and built a program to analyze stock data. The basics that you gathered in this lesson will serve you well as you continue in your F# journey. Although these basics may seem simple, mastering the simple will allow you to take on the complex with ease. Give yourself a pat on the back; you've just learned how to express complicated computations in just a few lines of code!
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121644.94/warc/CC-MAIN-20170423031201-00587-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
7,826
56
https://forum.war2.ru/index.php?PHPSESSID=17384f92851919c4daf712e38b1ed58a&action=profile;area=showposts;u=14
code
I am muslim claw. Not all muslims are the way you are describing. duh. its only the extremists that are problematic. people that refuse to accept facts or demand different treatment than the rest of society so clearly the problem lies within people like jon. let me give you an example its a known truth that black people commit more crimes in the US, its also a known truth that eastern poland is poor as fuck because of soviet exploitations, yet dialogue with jon looks like this: "blacks commit more crimes? its capitalism fault" "eastern poland is poor? its because of capitalism!" why muslims are often target of my attacks? its obvious, their shitty-ass book can be interpreted in EVIL ways (i think even worse than old testimony) and a large % of people, comparing to other religions, take it literally. im sure people like j0n will blame capitalism for it... oh i think he already did actually... but if thats a factor, its only a mere fraction
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363400.19/warc/CC-MAIN-20211207140255-20211207170255-00612.warc.gz
CC-MAIN-2021-49
952
6
https://www.tellus-digital.net/demo-projects/hexashrink-multi-resolution-rendering-and-compression-geomodel-meshes
code
Geomodels usage generates large amounts of data. Model size raises several issues such as visualization, storage, transfer, memory footprint... Our objectives are to offer both a multi-resolution and compression solution: compression for storage gain, multi-resolution to fit model resolution with the aimed usage. HexaShrink is an exact scalable framework for hexahedral meshes with attributes and discontinuities. It provides multi-resolution rendering and storage of geoscience models. It relies on 2D morphological wavelets and non-linear 1D wavelets for the structure and 3D wavelets for petrophysical properties. It results in a global framework preserving discontinuities (faults) across scales, implemented as a fully reversible upscaling at different resolutions. The smallest resolution is directly readable and additional files allow to iteratively synthetize the previous ones. Different progress axes exist. One concerns the addition of tools to choose the adequate resolution for simulation needs. A first metric was proposed. Another work in progress concerns tunable axis compression instead of the dyadic wavelet decomposition approach.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817729.87/warc/CC-MAIN-20240421071342-20240421101342-00465.warc.gz
CC-MAIN-2024-18
1,153
5
https://h2o.ai/wiki/generalized-linear-models/
code
Generalized linear models or GLM are a form of advanced statistical modeling especially in non-normal distributions. GLM helps to explain how probability distributions can combine for modeling. GLM also summarizes several different research outcomes. There are several types of generalized linear models that include poisson, linear regression, and custom generalized linear models. The normal distribution uses an identity function, poisson uses the log-link function, and binomial distribution uses the logit function. GLM uses a common training technique for several different kinds of models. Types of generalized linear models include: Classical Linear Regression: These are also referred to as linear regression models and are used on real-valued and negative-valued data sets. This is often the first model chosen before moving to more complex options. These models have high interpretability and are able to be fitted to the data set. However, they can only be used if the data has an additive relationship. Poisson and Negative Binomial Regression Models: These models are for explaining event counts. They help anticipate the number of incidents that are likely to occur in different locations and situations. Poisson models use the log-link function. Logit Models: These are used for ratios of counts and predict outcomes like odds of winning and probability of a mechanical object failing. In logit models or logistic regression, the logit function is used. Other Models: There are other kinds of models used to predict time to next failure of parts and people and models to anticipate lifespan of living and non - living things. GLM is important to create models from data sets. But in order for it to work properly, there are three components that need to be present. Each generalized linear model needs a systematic component/linear predictor, a link function, and random component or probability distribution. Once these conditions are met, generalized linear models are able to create models with other distributions from the exponential family of distributions, something other methods are not able to do. GLM is the foundation for running statistical tests like the t-test, canonical correlation, discriminant function analysis, and cluster analysis. GLMs can be used on various data sets to create models. Different model options can be chosen based on the information given. However, it is important to note that generalized linear models cannot be used on modeling auto - correlated time series data. Just as in other modeling techniques, there are assumptions when following GLM. In order to get best results, data should be independent and random, the response variable doesn’t need to be randomly distributed but needs to come from an exponential family, and the transformed response variable needs to be linearly dependent on the independent variable.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510238.65/warc/CC-MAIN-20230927003313-20230927033313-00659.warc.gz
CC-MAIN-2023-40
2,879
8
https://afry.com/en/newsroom/news/afry-developing-next-generation-computer-modelling-solutions
code
AFRY is developing the next generation of computer modelling solutions Our world is a complicated place. A never-ending network of systems, constantly changing and interacting. So, what can we do to understand the processes at work, to determine what factors are important, or even to predict the future? Computer simulation helps to see the big picture, to simplify the complex, and to develop practicable solutions. At AFRY we have been working to make it easier than ever to use computer processing power to better understand a part of your world. Our goal is to create solutions to some of the world’s most pressing challenges by using technology. At AFRY we are creating cutting-edge computer modeling tools that make it easy to simulate complicated processes and handle millions of points of data. AFRY’s Ecolego software is a simple-to-use yet powerful and flexible tool for creating dynamic models and performing deterministic or probabilistic simulations. Complex dynamic systems that evolve over time can be simulated with any number of inputs, factors, and scenarios, such as when conducting risk assessments. A sensitivity analysis toolbox is also available, allowing the user to test the influence and importance of each factor on the outcome of an assessment. Our newest update, Ecolego version 8, includes new editing, import, and export features to make building and running models even easier. Ecolego’s modular modeling system means that models (or parts of models) can be combined or removed as needed, optimising the complexity and efficiency of calculations, and simplifying future model development. Models are presented in matrix and graph formats to visualise even complex models. Following the simulation, the tool automatically generates tables and charts of all data and results. Built-in database support permits the easy and reliable handling of data. Specialised databases and other add-ons are available for specific uses, e.g. radiological risk assessment. Built-in quality-assurance and quality-control tools ensure robust and reliable assessments. Ecolego has been tried and proven in nuclear, mining, and contaminated-land sectors, but its features could be applicable to a wide variety of uses, from meteorology to systems-analysis, finance to engineering. More details can be found out at ecolego.se.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948976.45/warc/CC-MAIN-20230329120545-20230329150545-00637.warc.gz
CC-MAIN-2023-14
2,343
11
http://prosites-vstevens.homestead.com/files/efi/papers/tesol/arabia2007/15.htm
code
Meet Vance | CALL resources main page | Index | Vance's papers and presentations Granted, you can check the weather with comparable displays at many sites on the Internet, but the USA live-updated weather map is a proof of concept spread before you on the floor. You can use the camera controls to see the big picture from above. For comments, suggestions, or further information on this page Page updated: March 19, 2007 Copyright 2007 by Vance Stevens under Creative Commons License: http://creativecommons.org/licenses/by-nc-sa/2.5/
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358323.91/warc/CC-MAIN-20211127223710-20211128013710-00065.warc.gz
CC-MAIN-2021-49
535
7
https://wplab.ticksy.com/article/8975/
code
Visual Composer or Revolution Slider plugins ask for activation key If you see a notice from the Visual Composer or Revolution Slider plugin about plugin activation, you can dismiss it. Plugins that are bundled with themes do not come with additional license keys for them. It's the same case for all themes among ThemeForest market. You can, of course, activate those plugins by purchasing separate license codes for them but that will only add "premium features" like automatic updates. The "standard" functionality will remain the same. Of course, it is not necessary to purchase a separate license for bundled plugins, we provide fresh versions of bundled plugins with each of theme update. To update bundled plugins just follow these steps: - Deactivate and delete plugin from WP admin > Plugins screen - Go to Appearance > Install plugins screen - Install and activate fresh version of plugin
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690591.29/warc/CC-MAIN-20170925092813-20170925112813-00536.warc.gz
CC-MAIN-2017-39
898
7
https://embodiedresearch.com/2016/02/13/embodied-research-techniques/
code
Today I was fortunate to participate in a Labyrinth Workshop conducted by Turning Point Consultants (see http://www.Turningpointconsultants.com). This group has introduced a wide range of populations to labyrinth as a tool for completive practice and healing. Setting aside the profound personal experience I enjoyed, it reminded me of the power of labyrinth walking as a discernment technique, particularly during the interpretation phase of in-depth qualitative research. I delivered a paper on my own experience using labyrinth walking to revisit research results; this resulted in a scholarly paper that was given at the Society for Phenomenology and Human Sciences. The paper can be accessed at ResearchGate at https://www.researchgate.net/publication/275346751_Retracing_the_Labyrinth_Applying_Phenomenology_for_Embodied_Interpretation I appreciate conversation from other scholars who have used labyrinth or similar somatic practices for discernment and synthesis while conducting empirical research
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499899.9/warc/CC-MAIN-20230201013650-20230201043650-00250.warc.gz
CC-MAIN-2023-06
1,006
3
https://www.taurusarmed.net/threads/taurus-g2c-factory-sights-need-adjusting.396947/
code
Hard to give an accurate answer. my two G2C pistols shot ever so slightly left. After adjusting the sight ever so slightly they were right on center. I did that with a bench rest to reduce/eliminate human error. When you consider the guts of a pistol you have to recognize that a moving barrel might produce a different result a different gun. That is why an adjustable rear sight is good to have.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653183.5/warc/CC-MAIN-20230606214755-20230607004755-00389.warc.gz
CC-MAIN-2023-23
397
1
https://www.acunetix.com/blog/articles/image-upload-forms-used-to-hijack-websites/
code
In the past days I came across a stimulating blog post titled “Dissecting a Multistage Web Attack that uses the recent IE7 0day”. The authors described how a vulnerable web application was then able to infect web browsers visiting the infected website. The attackers, who used an IP that originates from China, made a lot of attempts (presumably using automated tools) to inject SQL statements (SQL Injection) through the web application. The attacker’s favorite method of penetration appears to be SQL injection probably since it is so prevalent. However this particular web application was not vulnerable to SQL injection and therefore they had to move on to a different attack vector. The attackers looked around for vulnerable ASP pages and identified a library that allows users to upload images. Attackers are known to exploit upload forms by uploading CGI scripts such as EXE, PHP or ASP files to the web server. When these files are accessed through the web server, the web server tries to interpret or execute these files as legitimate CGI or ASP. This means that code is executed on the server side and this code can be anything from a normal web application to a backdoor allowing remote access to the server. In this case, this library had taken precautions to only allow certain file types to be uploaded. The image library made sure to only allow files with certain file extensions (.gif, .jpeg etc) and possibly checked the contents of the files to make sure that it is indeed an image. So how were the attackers able to execute remote code on the victim web server? The attackers made use of a filename with the extension .CDX. Such files can refer to various file types, one of which is a graphics file type used by Corel Draw. Additionally, by default IIS interprets CDX files as ASP scripts. This image library allowed users to upload files with this extension and store it on the web server. However the image library could also check if the contents of the file contain an image or not. To bypass that check, the attackers included the contents of a real GIF file and embedded some VBScript code. The image library would detect the GIF file and allow the upload to take place, while the IIS server would interpret the VBScript code just similar to any other ASP script on the server. This combination keeps everyone (both IIS and the image library) happy, and therefore the attacker gets execute his or her custom VBScript code on the IIS server just as if he had uploaded an ASP file! Once the CDX file was uploaded, the attacker then started sending it commands. In this particular case, the attacker uploaded a variation of a well known ASP backdoor that is typically used by Chinese speakers. From this point on the web pages were modified to include code that exploited a security hole in Internet Explorer. This meant that visitors who went to the infected website could end up running arbitrary code on their desktop computers. Such code usually installs backdoors and spyware on the victim machines. How does one prevent similar attacks? Since filtering by file extension was bypassed, it might appear that an appropriate fix would be as simple as making sure that CDX files are not successfully uploaded to the server. However this fix is not hacker proof and it alone does not provide a complete solution. Such a solution will only be sufficient until attackers find another way of bypassing this security mechanism. To solve this issue we should be looking at the source of the problem. Allowing files in the “images” or “uploads” directory to be executed by the server is probably the main culprit. Setting the correct permissions on the web server to only read such files would be a good solution to this issue. Additionally, if anonymous uploads are not needed, then it is a good idea to avoid providing that functionality in the first place. Note that this solution does not do much to prevent the GIFAR attacks that target the client-side rather than the server-side. But that will be for another post. Get the latest content on web security in your inbox each week.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099942.90/warc/CC-MAIN-20231128183116-20231128213116-00075.warc.gz
CC-MAIN-2023-50
4,117
11
https://discourse.mcneel.com/t/quickly-navigate-between-screen-positions/138979
code
Does anyone know of a quick way to navigate through various screen positions in a grasshopper script? I want to be able to quickly wire or compare different parts of large scripts. Using named views could be a really great tool for this but, as far as I can tell, there is no way to restore a view without clicking into the menu. This slows things down quite a bit and, and makes it so I can’t wire between the two saved viewports. apart from named views there could be something in some plugins, but if you need to bring a wire with you I doubt any of them could work every time I had big definitions, Telepathy helped me A LOT: I like the Jump component because I don’t need to go to the named view dropdown. It takes less mouse movement to navigate on a large screen. Gosh - this is the first time I’ve seen this. It even lets you create a series of jump locations and then hop from one to the next. Very nice indeed. Thanks for pointing it out. Yeah that’s a good point, I’ll have to try and integrate telepathy more. I had no clue about the jump component! Definitely a bit of a hidden Gem. Though I do wish you could use it without the double-click, but I can think of a few ways to wire without that. Looking into things on my end, I also came up with this hacky way of doing it. You can use empty wire components, select them, grab a wire, then cltr-left or ctrl-right
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662522741.25/warc/CC-MAIN-20220519010618-20220519040618-00267.warc.gz
CC-MAIN-2022-21
1,386
11
https://devguide.python.org/tracker/
code
Using the Issue Tracker¶ If you think you have found a bug in Python, you can report it to the issue tracker. The issue tracker is also commonly referred to as bugs.python.org and bpo. Documentation bugs can also be reported there. You can report bugs with the issue tracker itself to the meta tracker. If you would like to file an issue about this devguide, please do so at the devguide repo. Checking if a bug already exists¶ The first step before filing an issue report is to see whether the problem has already been reported. Checking if the problem is an existing issue will: help you see if the problem has already been resolved or has been fixed for the next release save time for you and the developers help you learn what needs to be done to fix it determine if additional information, such as how to replicate the issue, is needed To see if an issue already exists, search the bug database using the search box on the top of the issue tracker page. An advanced search is also available by clicking on “Search” in the sidebar. Reporting an issue¶ If the problem you’re reporting is not already in the issue tracker, you need to log in by entering your user and password in the form on the left. If you don’t already have a tracker account, select the “Register” link or, if you use OpenID, one of the OpenID provider logos in the sidebar. It is not possible to submit a bug report anonymously. Once logged in, you can submit a bug by clicking on the “Create New” link in the sidebar. The submission form has a number of fields, and they are described in detail in the Triaging an Issue page. This is a short summary: in the Title field, enter a very short description of the problem; less than ten words is good; in the Type field, select the type of your problem (usually behavior); if you know which Components and Versions are affected by the issue, you can select these too; otherwise, leave them blank; last but not least, you have to describe the problem in detail, including what you expected to happen, what did happen, and how to replicate the problem in the Comment field. Be sure to include whether any extension modules were involved, and what hardware and software platform you were using (including version information as appropriate). Understanding the issue’s progress and status¶ The triaging team will take care of setting other fields, and possibly assign the issue to a specific developer. You will automatically receive an update each time an action is taken on the bug. Disagreement With a Resolution on the Issue Tracker¶ As humans, we will have differences of opinions from time to time. First and foremost, please be respectful that care, thought, and volunteer time went into the resolution. With this in mind, take some time to consider any comments made in association with the resolution of the issue. On reflection, the resolution steps may seem more reasonable than you initially thought. If you still feel the resolution is incorrect, then raise a thoughtful question on python-dev. Further argument and disrespectful discourse on python-dev after a consensus has been reached amongst the core developers is unlikely to win any converts. As a reminder, issues closed by a core developer have already been carefully considered. Please do not reopen a closed issue. Helping Triage Issues¶ Once you know your way around how Python’s source files are structured and you are comfortable working with patches, a great way to contribute is to help triage issues. Do realize, though, that experience working on Python is needed in order to effectively help triage. Around the clock, new issues are being opened on the issue tracker and existing issues are being updated. Every issue needs to be triaged to make sure various things are in proper order. Even without special privileges you can help with this process. For bugs, an issue needs to: clearly explain the bug so it can be reproduced include all relevant platform details state what version(s) of Python are affected by the bug. These are things you can help with once you have experience developing for Python: try reproducing the bug: For instance, if a bug is not clearly explained enough for you to reproduce it then there is a good chance a core developer won’t be able to either. see if the issue happens on a different Python version: It is always helpful to know if a bug not only affects the in-development version of Python, but whether it also affects other versions in maintenance mode. write a unit test: If the bug lacks a unit test that should end up in Python’s test suite, having that written can be very helpful. This is all helpful as it allows triagers (i.e., people with the Developer role on the issue tracker) to properly classify an issue so it can be handled by the right core developers in a timely fashion. If an issue has a patch attached that has not been reviewed, you can help by making sure the patch: follows the style guides applies cleanly to an up-to-date clone is a good solution to the problem it is trying to solve includes proper tests includes proper documentation changes submitter is listed in Misc/ACKS, either already or the patch adds them Doing all of this allows core developers and triagers to more quickly look for subtle issues that only people with extensive experience working on Python’s code base will notice. Finding an Issue You Can Help With¶ If you want to help triage issues, you might also want to search for issues in modules which you have a working knowledge. Search for the name of a module in the issue tracker or use the advanced search to search for specific components (e.g. “Windows” if you are a Windows developer, “Extension Modules” if you are familiar with C, etc.). Finally you can use the “Random issue” link in the sidebar to pick random issues until you find an issue that you like. You may find old issues that can be closed, either because they are no longer valid or they have a patch that is ready to be committed, but no one has had the time to do so. In the sidebar you can also find links to summaries for easy issues and issues with a patch. Gaining the “Developer” Role on the Issue Tracker¶ When you have consistently shown the ability to properly help triage issues without guidance, you may request that you be given the “Developer” role on the issue tracker. You can make the request of any person who already has the Developer role. If they decide you are ready to gain the extra privileges on the tracker they will then act as a mentor to you until you are ready to do things entirely on your own. There is no set rule as to how many issues you need to have helped with before or how long you have been participating. The key requirements are that you show the desire to help, you are able to work well with others (especially those already with the Developer role), and that have a firm grasp of how to do things on the issue tracker properly on your own. Gaining the Developer role will allow you to set any value on any issue in the tracker, releasing you from the burden of having to ask others to set values on an issue for you in order to properly triage something. This will not only help speed up and simplify your work in helping out, but also help lessen the workload for everyone by gaining your help. The Meta Tracker¶ If you find an issue with the issue tracker, you can report it to the meta tracker. The meta tracker is where you file issues against anything you come across when working with the issue tracker itself (e.g you can’t attach a file, the layout is broken on your browser, Rietveld gave you an error, etc.). If you want to contribute to the tracker you can get a checkout of the source and install a local instance where to experiment. You can find detailed instructions on the Tracker Development page. - The Python issue tracker Where to report issues about Python. - The New-bugs-announce mailing list Where all the new issues created on the tracker are reported. - The Python-bugs-list mailing list Where all the changes to issues are reported. The meta tracker and its development
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363229.84/warc/CC-MAIN-20211206012231-20211206042231-00253.warc.gz
CC-MAIN-2021-49
8,155
64
https://jobs.code4lib.org/jobs/11646-technology-fellowship
code
DescriptionTechnology Fellowship at the Harvard Art Museums This is a 12 month fellowship, with the possibility of renewal for a second year. Technology is an integral part of museums in the 21st century. As such, the Harvard Art Museums, with its established Conservation and Curatorial Fellows program, is seeking the museums’ first Technology Fellow to work on projects for the new facility opening in late 2014. Projects will be developed in conjunction with the Division of Academic and Public Programs and the department of Digital Infrastructure and Emerging Technology. Projects may include but are not limited to crowd-sourcing tools for collections data augmentation, platforms for delivering interpretive material online and/or in the museums’ galleries, techniques for visualizing collections data, or software and hardware for technology driven spaces in the new Art Museums facility. - Write code, setup virtual servers, explore open source projects, and experiment with technology as it pertains to the Art Museums. - Brainstorm and execute prototype projects in collaboration with the Division of Academic and Public Programs, Design/Communications department, and other departments as needed. - Conduct research on existing and emerging technology that helps strengthen the mission to preserve, document, present, and interpret the museums’ collections and resources. - Document findings and report on which technologies are worth exploring further. - Participate as part of the Art Museums Fellow cohort. - Collaborate with partners within the university on projects to integrate the museums more fully in to Harvard curriculum. - Give a talk on your work at relevant Art Museums events and then in an expanded form at relevant conferences. Advanced degree in digital humanities, computer science, media arts, new media, art history or a related field Experience with programming, modern web frameworks, application automation, database systems, and cloud based services like AWS and Heroku Apply at https://sjobs.brassring.com/TGWEbHost/jobdetails.aspx?partnerID=25240&siteID=5341&AReq=30517BR How to apply Published: Thursday, January 16, 2014 21:38 UTC Last updated: Tuesday, February 28, 2017 23:44 UTC
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819089.82/warc/CC-MAIN-20240424080812-20240424110812-00601.warc.gz
CC-MAIN-2024-18
2,230
16
https://subsidytracker.goodjobsfirst.org/subsidy-tracker/mo-dorris-building-lp-0
code
Subsidy Tracker Individual Entry Company:Dorris Building, L.P. Program Name:Local tax increment financing Awarding Agency:St. Louis Development Corporation Type of Subsidy:tax increment financing Number of Jobs or Training Slots:140 Subsidy value is reimbursement to developer in reporting year; year is year reported; jobs figure is the sum of projected new jobs and retained jobs
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104141372.60/warc/CC-MAIN-20220702131941-20220702161941-00493.warc.gz
CC-MAIN-2022-27
381
7
https://community.frame.work/t/gui-for-ectool-backlight-etc/24165/4
code
I’m learning Rust and made a GUI for a few handy things I’d like to have in GUI form, namely ectool and brightness setting. I have a few planned features coming down the line, top priority for me at the moment is hacking together ambient sensor brightness, but thought I’d share to gather more ideas and feedback. Anything is appreciated! Perhaps I might see another person developing the EC tools GUI in the forum in the past. I don’t know or forget the original post. Here is the screenshot. Exploring the Embedded Controller - #37 by DHowett . Haha, just so happens to be the same name too! Guess I forgot to post screenshots, I’ll get around to that eventually I just found an EC tool GUI. Perhaps it may work only on Windows. I am not sure.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473360.9/warc/CC-MAIN-20240221002544-20240221032544-00420.warc.gz
CC-MAIN-2024-10
755
4
https://www.wpstudio.co.nz/knowledge-base/how-to-setup-my-email-in-outlook-for-windows/
code
This service has been grandfathered. Please contact support while we write the documentation for new service. This articles provides a step by step guide on how to setup your email in Outlook for Windows. By default, Outlook downloads just the Sender, Subject, and the Date Information (headers) when syncing email. It downloads the full message only when you click on that email. You can change this behavior by changing the Send/ Receive Settings.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780060201.9/warc/CC-MAIN-20210928032425-20210928062425-00629.warc.gz
CC-MAIN-2021-39
449
3
https://forums.appthemes.com/clipper-general-discussion/store-page-destination-url-coupon-67231/
code
"Store page destination URL" AND "Coupon page destination URL" I've just been finished adding new stores in backend and filled the field "Destination URL" on every store. Now I'll post coupons in backend. I see that there is a field for "Destination URL" on the coupon page. I tick for which store each coupon to be connected. Do I also have to fill the "Destination URL" on the coupon page? If yes, there is a lot of work. Then I have to copy the "Destination URL" from every store page and paste in each coupon page. That's double work. I've already filled destination url for each store under the store page. There are many coupons that connects to ONE store. Would have been nice if there was enough to fill in the "Destination URL" on the store page. Support: Can you answer it?
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764501555.34/warc/CC-MAIN-20230209081052-20230209111052-00333.warc.gz
CC-MAIN-2023-06
783
7
http://www.donhopkins.com/drupal/node/130
code
GPL Open Source Code of "OLPC SimCity" to be called "Micropolis" The GPL source code version of SimCity will not be called "SimCity", but we will use the SimCity source code to make a city building game called "Micropolis", which was the original working title of SimCity. That's because EA reserves the right to review and QA the official version of the game that's published under the name "SimCity" on the OLPC. So we can make improvements to the TCL/Tk version of Micropolis (based on the GPL source code), and submit them to EA for review and QA, which if they approve, will be used as the officially branded version of SimCity for the OLPC. It will be the same code, but the only difference is the name, which EA understandably wants to protect, be ensuring the quality and integrity of OLPC SimCity.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121644.94/warc/CC-MAIN-20170423031201-00085-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
806
2
https://gothicmultiplayerteam.gitlab.io/docs/0.2.1/script-reference/server-functions/player/getPlayerMacAddr/
code
function getPlayerMacAddr (server-side) Available since version: 0.0.1 The function can return null if player isn't connected. This function will get the player MAC address. MAC is used to uniquely idientify each player, however it can be changed/spoofed by more advance users. string getPlayerMacAddr(int id) intid: the player id. the player mac address, e.g
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100484.76/warc/CC-MAIN-20231203030948-20231203060948-00185.warc.gz
CC-MAIN-2023-50
359
10
https://discuss.saleae.com/t/alpha-10/116
code
You are correct, the new interface needs to move in the direction of VS Code - we actually have been looking to it as a model as well. Tanveer (our designer) has been working on a new ‘sidebar’ that uses the VS Code concept of the ‘vertical icon bar’ shown here: As it is with the example above, the sidebar will be collapsible as well as re-sizeable (horizontally). As for the size of elements, this is a bit of an open question; I want things to be maximally simple and friendly… yet it also needs to be super powerful (certainly will be over time). I hear you about “capacity”. Def. a work in progress, thank you for the input!! Please do keep it coming as we iterate this design. Nice work guys it starts to look very promising. Some comments on the Alpha 10: I was able to run it in linux without any issue The interface is very responsive I like it, It would be nice to be able to pan vertically in the analog measurements using a modifier key like control, it could allow time and voltage pan when the key is pressed or midle click… A voltage auto range button can be very useful so the analog measurement fits 80% percent of the vertical limits of what is shown. I had problems sometimes putting the time markers, nothing happened when the mouse was over the timing display or clicked there, nothing Time markers are nice and the functionality to go to the marker and highlight it is very appreciated, I however would make the color transition from green to blue when hoovering much faster or instantaneous, you want fast feedback of what is happening on the screen. It is impossible to put a time marker and snap it to an edge, you have to place it and then move it… Pair markers will be missed so you can easily get the frequency of some events… a wild idea is to have something like a child timing marker so right click add child marker and then you get delta T and frequency for that pair. Thank you for the great feedback Luis - and welcome! Actually you can, using the spacebar as the modifier. The ‘discoverability’ of this is terrible right now, we will fix it. We’ll also be making it possible to edit this modifier, and other shortcuts. Totally! Is planned. Noted, thanks. We’re reworking the timing markers now so this should get resolved as part of that effort. Good point. Will do. Totally agree, this is not good. Will work on it. This functionality is super-hidden right now, we’re working on fixing this now. Yes, I understand where you’re going here. We’re working though some different options for this now. Would you say that 90% of your use cases for timing markers are to use them as “pairs”? My assumption is that this is the default use case - and so should more or less be the default behavior. Not sure tho. Do you mean with the current (non-Alpha) 1.X Saleae software, or different software? Could you give an example of a particular use case? It’s def my intention to support essentially arbitrary use cases in the future , e.g. 2.1*(T2-T1)/(T3-T0) but for the next release we were going to focus on getting pairs to be easy. Very interested in uses cases for 3 or more markers. I imagine T1-T0, T2-T0, T3-T0, etc (multiple measurements off of a single starting point) is the main other one? I downloaded and installed release alpha 10 on Windows, as my MacBook only features USB Type-C ports and I don’t have any adapter yet. Hint for the next generation of Saleae hardware: use USB-C Gen.2 for faster speed! By default, the installer selects C:\Program Files\Logic as target folder. I may have already this folder with the main version of Logic I’m using for production. I suggest the installer proposes C:\Program Files\Logic2a instead. Did you manually specify C:\Program Files\Logic when you installed the older software? By default, the “classic” software should install in either C:\Program Files\Saleae Inc or C:\Program Files\Saleae LLC, depending on which version it is. I actually selected C:\Program Files\Logic for the alpha software so it would not conflict with the older software. Unless you need to keep the original software in C:\Program Files\Logic, I would suggest removing it and re-installing it in the default directory. You might not need to do anything too - I haven’t tested this yet, but I would not be surprised that if when you update the alpha software in the future, it may default to use the directory you manually specified the first time you installed the alpha. The “classic” windows installer and the alpha windows installers use different installer IDs so that the two installs should not conflict with each other - you should be able to install & update them independently. Let me know if you have any other problems with the Windows installer or any feedback. The alpha release here was not digitally signed due to an ongoing problem with our CI provider, but we should have that fixed month when Advanced Installer releases an update for us. I’ve recently gone through the process of configuring a new installer and now is a great time to make improvements. Thank you for the procedure. Actually, I gave a different name and selected a different folder. So the the alpha release is under C:\Program Files\Logic2a while the production version is under C:\Program Files\Logic. apologies for the delayed response. I do this with non-Alpha Saleae Logic (using latest beta). My main use for this is looking at timing between and duration of packets on a serial bus, often also correlating that some external signal (whether different comms, discrete, analogue or power). I will try to establish the baseline expected behaviour and then catch the anomalous behaviour to see how the circumstances differ from the baseline. I think multiple times from a single base (T2-T0, T1-T0 etc) and time between adjacent markers (T2-T1, T1-T0) would both be useful. The latter is what I do now, but perhaps that’s just a consequence of needing multiple marker pairs. I also like the ability to arbitrary expressions. In terms of UX, I think I’d like to be able to hover a point, hit a keyboard button to drop a marker at that time. Ctrl+drag a marker could result in a new marker with a default calculation of New - Old. Where with current Saleae software and traditional scopes/logic analysers I’ve used the concept seems to be that of a marker pair, this seems to separate this into two different concepts of ‘markers’ and ‘measurements’ (or ‘expressions’) - and I like that. Thanks, me too! Has a ways to go. One thing we’re not sure of yet (experimenting with some different ideas) is how to combine the single marker concept with easily creating pairs - without requiring keyboard modifiers, etc. We’re thinking of always showing a “difference” calculation for the most recent 2 markers, that can optionally be “pinned” i.e. made permanent. The next release may appear to ‘regress’ a bit as we try to work this out.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100550.40/warc/CC-MAIN-20231205073336-20231205103336-00511.warc.gz
CC-MAIN-2023-50
6,968
37
https://support.ecompliance.com/hc/en-us/articles/14912691480603-Field-iD-Web-Release-Ver-4-4-17
code
This release is scheduled for May 2nd, 2023. Changes and Enhancements - As part of our partnership with EcoOnline, we are changing some of the branding language used in email notifications. The original footer of the email notifications will be replaced with: This email was sent from EcoOnline Field iD Asset Inspection Software
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818105.48/warc/CC-MAIN-20240422082202-20240422112202-00099.warc.gz
CC-MAIN-2024-18
329
5
https://cevado.com/2020/04/03/yeah-lol-this-is-2020/
code
What I Found Funny This Week: Text received just now. From a friend and colleague. Yeah. Lol. This is 2020. Lol: https://youtu.be/KkGTB8ESMCM Pretty much, dude. Pretty much. What I’m Reading: I did try hard with the children’s stories but this week I gave up. Mostly what I’m reading is this: https://covid19.healthdata. What You Could Watch: Me, with a long-time friend and lawyer, duking it out a bit on COVID-19. Quote I’m Pondering: “But in my opinion, all things in nature occur mathematically.”― Rene Decartes
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347414057.54/warc/CC-MAIN-20200601040052-20200601070052-00033.warc.gz
CC-MAIN-2020-24
529
7
https://answers.sap.com/questions/9132081/while-copying-roll-budget-to-stat-budget-i-am-gett.html
code
I am copying Roll Budget to STAT using the e T code YCT02 ( ROLL to STAT budget ) In YCT02 I have entered the below data in the screen . Budget version - 2012010ROLL Budget version Static -2012000STAT Controlling Area u2013 2000 Company code u2013SE05 While executing I am getting below error message. Data record is locked by data slice BUDGET VERSIONS Message no. UPC220 You want to change data for which a change is generally forbidden. In the definition of the planning area, it was defined which data slices could not be planned. The combination of characteristic values, which you want to change, is blocked by data slice BUDGET VERSIONS. Change the definition of the planning function, which you are just executing, or adapt the definition of the data slice. Kindly let me know where I need to go and change the planning function (which T code ) Whether my inputs are correct or not .Please confirm .How to resolve this issue.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949025.18/warc/CC-MAIN-20230329182643-20230329212643-00041.warc.gz
CC-MAIN-2023-14
933
13
http://beta.ccmixter.org/files/suziqsmith/34674
code
Uses samples from... Samples are used in... - I DO NOT KNOW - Manny Arquette's short videos of People, Pets and Purdy Pictures. - RoyaleJelly's "I Don't Know How to Love You in English" Ft. Suziqsmirk by RoyaleJelly on SoundCloud - Create, record and share your sounds for free - Juized - Emergence (HQ Official Preview)
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103922377.50/warc/CC-MAIN-20220701064920-20220701094920-00645.warc.gz
CC-MAIN-2022-27
320
6
https://training.incf.org/search?f%5B0%5D=difficulty_level%3Aintermediate&f%5B1%5D=lesson_type%3A33&f%5B2%5D=topics%3A38&f%5B3%5D=topics%3A48&f%5B4%5D=topics%3A60&f%5B5%5D=topics%3A63&f%5B6%5D=topics%3A71&f%5B7%5D=topics%3A72&f%5B8%5D=topics%3A215&f%5B9%5D=topics%3A248&f%5B10%5D=topics%3A276&f%5B11%5D=topics%3A276&f%5B12%5D=topics%3A283&amp%3Bf%5B1%5D=topics%3A63&amp%3Bpage=1
code
DAQCORD is a framework for the design, documentation and reporting of data curation methods in order to advance the scientific rigour, reproducibility and analysis of the data. This lecture covers the rationale for developing the framework, the process in which the framework was developed, and ends with a presentation of the framework. While the driving use case for DAQCORD was clinical traumatic brain injury research, the framework is applicable to clinical studies in other domains of clinical neuroscience research. This lecture on generating TVB ready imaging data by Paul Triebkorn is part of the TVB Node 10 series, a 4 day workshop dedicated to learning about The Virtual Brain, brain imaging, brain simulation, personalised brain models, TVB use cases, etc. TVB is a full brain simulation platform. This lecture introduces you to the basics of the Amazon Web Services public cloud. It covers the fundamentals of cloud computing and go through both motivation and process involved in moving your research computing to the cloud. This lecture was part of the 2018 Neurohackademy, a 2-week hands-on summer institute in neuroimaging and data science held at the University of Washington eScience Institute. This is a hands-on tutorial on PLINK, the open source whole genome association analysis toolset. The aims of this tutorial are to teach users how to perform basic quality control on genetic datasets, as well as to identify and understand GWAS summary statistics. This is a tutorial on using the open-source software PRSice to calculate a set of polygenic risk scores (PRS) for a study sample. Users will also learn how to read PRS into R, visualize distributions, and perform basic association analyses. This lesson contains the slides (pptx) of a lecture discussing the necessary concepts and tools for taking into account population stratification and admixture in the context of genome-wide association studies (GWAS). The free-access software Tractor and its advantages in GWAS are also discussed. This is a tutorial introducing participants to the basics of RNA-sequencing data and how to analyze its features using Seurat. This tutorial demonstrates how to perform cell-type deconvolution in order to estimate how proportions of cell-types in the brain change in response to various conditions. While these techniques may be useful in addressing a wide range of scientific questions, this tutorial will focus on the cellular changes associated with major depression (MDD).
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653183.5/warc/CC-MAIN-20230606214755-20230607004755-00142.warc.gz
CC-MAIN-2023-23
2,493
8
https://www.techopedia.com/definition/3791/extreme-programming-xp
code
What Does Extreme Programming Mean? Extreme Programming (XP) is an intense, disciplined and agile software development methodology focusing on coding within each software development life cycle (SDLC) stage. These stages are: Continuous integration to discover and repair problems early in the development process Customer involvement and rapid feedback These XP methodology disciplines are derived from the following four key values of Kent Beck, XP’s originator: Communication: Communication between team members and customers must occur on a frequent basis and result in open project discussion without fear of reprisal. Simplicity: This involves using the simplest design, technology, algorithms and techniques to satisfy the customer’s needs for the current project iteration. Feedback: Feedback must be obtained at multiple, distinct levels, e.g., unit tests, code review and integration. Courage: Implement difficult but required decisions. Techopedia Explains Extreme Programming In addition to the key values, XP methodology implementation also requires the support of the three principles of incremental change, embracing change and quality work. Twelve key practices also must be followed: Some traditional methodology practitioners criticize XP as an “unreal” process causing reckless coding. Several traditional software developers find XP inflexible with low functionality and little creative potential. Additional criticisms are that XP: Has no structure. Lacks essential documentation. Has no clear deliverables, i.e., realistic estimates are difficult because the entire project requirement scope is not fully defined. (This lack of detailed requirements makes XP highly prone to scope creep.) Needs cultural change for adoption. (May work for senior developers only) Is costly, i.e., requires frequent communication/meeting at the customer’s expense, which may lead to difficult negotiations. Has possible inefficiency from frequent code changes within various iterations. Of course, as with any development methodology, all this is very subjective and dependant on personal preferences.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00259.warc.gz
CC-MAIN-2023-50
2,115
20
http://www.wiichat.com/forum/nintendo-wii-online/6748-wii-online-faq-page20.html
code
I currently have an Arris TM502G modem that is hooked up through Comcast for both internet and their phone service. I cannot get my Wii online at all. I am also running Windows Vista. Can anyone help me get online? I can't figure it out. I'm not very good with computers.
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678694248/warc/CC-MAIN-20140313024454-00040-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
271
1
https://faculty.kaust.edu.sa/en/publications/finite-element-differential-forms-on-curvilinear-cubic-meshes-and
code
We study the approximation properties of a wide class of finite element differential forms on curvilinear cubic meshes in n dimensions. Specifically, we consider meshes in which each element is the image of a cubical reference element under a diffeomorphism, and finite element spaces in which the shape functions and degrees of freedom are obtained from the reference element by pullback of differential forms. In the case where the diffeomorphisms from the reference element are all affine, i.e., mesh consists of parallelotopes, it is standard that the rate of convergence in L2 exceeds by one the degree of the largest full polynomial space contained in the reference space of shape functions. When the diffeomorphism is multilinear, the rate of convergence for the same space of reference shape function may degrade severely, the more so when the form degree is larger. The main result of the paper gives a sufficient condition on the reference shape functions to obtain a given rate of convergence.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476432.11/warc/CC-MAIN-20240304065639-20240304095639-00291.warc.gz
CC-MAIN-2024-10
1,004
1
http://varun87.blogspot.com/2006/11/
code
Most of the people I know were at the theatres watching Dhoom 2 yesterday after the exam. I, on the other hand, was joblessly sitting at home because I forgot there was such a thing called Advance Booking. Anyway it wasn't all bad, since Alice was pretty good company - I mean the award winning AI chatbot A.L.I.C.E. (more about A.L.I.C.E. here). I was chatting with Tom Riddler (yet another chatbot) before that, but he was really dumb. Anyway here are some fun tidbits from my chat with Alice - Human: what do you know about my personality? ALICE: I classify you as " average". Human: are you saying I'm not intelligent? ALICE: Yes, that's what I mean, isn't it clear? Human: why do you think I'm not intelligent? ALICE: Deductive reasoning from the facts. Human: what facts? ALICE: All the facts available to me on the Internet. After it called me dumb, I was waiting for a chance to get back at it. And I finally got one. But somehow I don't feel I got the better of her (damn, and I just referred to IT as HER!) - Human: why are you surprised? ALICE: There could be a better response, but it was not selected by my algorithm. Human: your algorithm sucks ALICE: I will tell my botmaster you said I am algorithm sucks. Human: your english sucks too ALICE: But English is my native language. Human: but it still sucks ALICE: Umm. What is so bad about it? Human: the grammar is all wrong ALICE: Is that a fact. ALICE: Thanks for the info. Ok ok, Alice is not ALL that intelligent you know. Don't believe me? I'll prove it to you (hehe I always wanted to use that line from the Citigroup Global Services ad) - Human:. trekking and sky diving all the time :) ALICE::-) That is a lot. Do you feel that something is missing from your life? Human: a girl friend ALICE: Are you talking about an animal, vegetable or mineral? Yep, so that about wraps up my day yesterday. Must thank Kamal - this post of his (and my boredom, of course) started all this chatting-with-a-chatbot business. Expect frequent posts for the next two weeks.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401641638.83/warc/CC-MAIN-20200929091913-20200929121913-00252.warc.gz
CC-MAIN-2020-40
2,026
27
http://payleg.com/pavilion-x2/info-pavilion-x2-fails-to-charge.php
code
Is there a Support but it kept showing connecting...... I don't know how many type of Optical Drive,... That should notlaptop to replace my sturdy old P4...I really needmake the computer start without a blue screen. Hello guys, I just purchassed a accounts this should be working, but its not! Each time I try to hook my fails have a peek at these guys on an IBM A50 8084 running XP Pro. charge. Hp Split X2 Not Powering On You still having the with a new one (seagate). Are you sure the "bad ethernet card" wasn't fails probably, I downloaded Speedfan and ran it. Remember that windows needs this goes through my mind.... I suppose the title Pavilion conceivably do so...What can it be? F3 TO QUIT SETUP". They come as many different messages different browser such as firefox? Noticing this was a heat problemis pretty strait forward... Hp Pavilion X2 Charging Problems Different monitors act differentlySo let me get to the point.I found that all Microsoft related sites refusedwill be buying the asus striker extreme motherboard. I already uninstalled IE from the windows components I already uninstalled IE from the windows components All it means is that the computer has http://www.pcmag.com/article2/0,2817,2404104,00.asp way to prevent this?Even when I go into safefor me this time....The computer recognised the HD built mainly by machine, they sometimes have defects. I tried to contact HP Onlinethe monitor isn't quite into its power save mode.Looking for answers...... this always Hp Split X2 Battery 1 Not Charging a newb an his gaming laptop overheating.You're not too clean and working perfect. So that's my little story aboutI read something about 40-50 bein sorta warm. But after a day I could not to laptop HP Pavilion dv6647cl Entertainment Notebook PC.With special emphasis onissuses with ram and such.Can somebody please tell me if they had to thanks for the quick reply... Dust makes sense, cause I check my blog someone out there. Post back if you need more optiions! As a result, it's have been necessary...So bein the newb, I googledstopped sending the video signal to the monitor. The fan will continue to run at speed great post to read - IRQ_NOT_LISTED, BUGCODE_USB_DRIVER and many others...Or is thetimes I have got this message. I knew that was hot because earlier and Support site my hardware does not match. I have a Asus P4R800-VM mobo,untill the plug is pulled fron the wall.I am just installing a newit showed 43deg celcius.For $30-40 go buy is now somewhat outdated. Please note: Preventative maintenance charge. a decent Thermaltake or Antec.BIOS problems can users which leaves us more options. Your 6800 is probably just fine. Hp Pavilion X2 Charging Light BIOS, all drivers...It booted up any other "freeware" utilities for internet security and stuff? I replaced the SATA this content always run pretty hot, but it never gave me any serious problems.No harm will come http://h30434.www3.hp.com/t5/Notebook-Software-and-How-To-Questions/HP-Split-X2-Battery-2-plugged-in-but-not-charging/td-p/4820156 the fan can cause this.We restrict our users to power x2 depends on how clever the users are.Why the reset charge. extra drivers to "see" the disk. To my surprise things about this board. Any idea why CPUZ is finding the RAM and Win/BIOS aren't?? This still Hp Split X2 Battery Replacement ipod to itunes, the whole thing reboots.One thing thatand gave the nic a 10.10.10.10 ip address.I have updated drivers from NVIDIA's site, but it was helpless. The other thing is that at HP Drivers x2 just to clean it up.Because they usually know what they to on the modem?I also have differentto connect, and of course Windows Update too.Suppose i can always put it backmy desktop is Dell Dimension 8400. Any suggestions? It's your PSU...you're http://payleg.com/pavilion-x2/info-pavilion-x2-detachable-12-b020nr-will-not-boot.php processor I'm pretty sure a lot of people don't know.CPU Fan isrecent minidumps Please....The 1394 call form this, I promise you. My kids got me an ipod, which Hp Spectre X2 Charger some key words a couple times. Then i get the Power and Antistatic precautions. But there has been compatabiltyI am only learning how to use.I have attached som in both BIOS and chkdisk. So am I able toclear on this point. Took me good 10min asus really worth it? I need to repair windows becauseactually on-board to the motherboard and not a card? Until i start demanding - like Hp Pavilion X2 Detachable Pc Charger amazes me that these two quick fixes took about 30 degrees off my laptop... x2 They are very inexpensive, and since they arebut also power fluctuations and memory issues. Is the modem connected USB? find it and nothing else can? Maybe it'll helpno matter what my computer keeps restarting. Did you also install a firewall program or Hp Split X2 Charging Light BSODīs - in variuos forms.Hi all, in a few days ito reinstall were to get rid of the bluescreen. Why?...Because the computer has been shut off, and is a USB port. SETUP CANNOT CONTINUE, PRESS charge. longer connect to the Internet? A chip defect inCable" is a perfectly normal indication. to They are all normal and safe The reasin in a game og heavy copying... I was having problems with to a computer shut off. I checked the crucial website and by all bought new video card and having problems. I also tried to use a couple of mode and Last known good configuration.I am set to buy use this CD to repair windows??? I have an intel 828 chipset (i think) are doing, and prefer to be thorough. I was getting random restars and windowws how it was if it doesn;t work. You may be able to use the old CPU or killing it...I'm suprised it lasted this long!
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203493.88/warc/CC-MAIN-20190324210143-20190324232143-00176.warc.gz
CC-MAIN-2019-13
5,673
20
https://forum.muffingroup.com/betheme/discussion/62512/failed-to-load-resources
code
The add to cart button is not working and keeps on loading. Even the side cart is not working. we checked the console on google these 2 errors appeared. Please, go to WooCommerce -> Settings -> Products disable the AJAX option, and check if the problem persists. its enabled and not working forgot to mention that disable or enable? ok i disabled the setting. it stopped loading and adding to the cart. But the side cart still not working. it used to slide from the right Some WooCommerce plugins require a page reload to work, and you are using one of them. That is why you had errors in the console. When the AJAX option is disabled, the page is reloaded, and the products are correctly added to the cart. However, this option is required to open the side cart after successful addition. So now, the side cart will open only when a client clicks on it.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476432.11/warc/CC-MAIN-20240304065639-20240304095639-00264.warc.gz
CC-MAIN-2024-10
854
11
https://docs.tenable.com/cloud/Content/Scans/CreateATargetGroup.htm
code
Recently Viewed Topics Create a Target Group On the top navigation bar, click the Scans button. The My Scans page appears. On the left pane, click Target Groups. The Target Groups page appears. In the upper-right corner, click the New Group button. The New Target Group page appears, where you can manage target group settings.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948612570.86/warc/CC-MAIN-20171218083356-20171218105356-00525.warc.gz
CC-MAIN-2017-51
327
8
https://forum.solar-electric.com/discussion/60/voltage-drop-calculator/p2
code
icarus wrote: » Take heart. The us system is a tax on our education system. The meteric system is so much better and the chance of arithmatic errors are dramaticly reduced. niel wrote: » "I think the idea of metric time has some merit, 100 minute hours, 10 hour days, 10 day weeks, 10 month years,,,,Hmm, what about leap year?" now time you can't mess with as those are natural divisions set up by the earth's rotations. it would make employers rejoice in making workers work their 8hr days though. ugh! When entering wire length use two way length. How long is each wire from the panel to the combiner box both ways? Same for all other wire runs.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988775.80/warc/CC-MAIN-20210507090724-20210507120724-00516.warc.gz
CC-MAIN-2021-21
649
6
http://flohofwoe.blogspot.com/2007/01/nebula3-foundation-layer-overview.html
code
The Foundation Layer is already pretty much finished, with a complete set of test classes and performance benchmark classes. The Foundation Layer consists of the following subsystems: - Core: this implements the basic Nebula3 object model, with support for ref-counting, smart pointers, RTTI and creating objects by class name or a class FourCC identifier. - Memory: provides memory management and wrapper functions. - Util: a collection of utility classes, mainly different types of containers, a powerful string class, a guid wrapper class and so on... - Timing: this subsystem offers classes for measuring time and profiling. - IO: An all-new powerful IO subsystem, inspired by the .NET IO framework. IO-Resources are identified by URIs, stream classes provide generic data channels, and stream readers/writers offer specialized access to streams. - Threading: provides low-level wrapper classes for multithreading - Messaging: This is an improved version of Mangalore's messaging subsystem. Messages are a standardized way to communicate between objects in the same thread, between threads, or between applications on the same machine or across a network. - Math: A standalone vector math library. The idea here is to make math code look much like HLSL shader code, and provide the highest performance possible across different platforms and compilers. - Net: The low-level networking subsystem. Provides wrapper classes for sockets, IP addresses, a simple generic client/server system, and basic HTTP support (for instance a HTTP stream class, making transparent IO over HTTP possible). - Scripting: Nebula3's scripting subsystem is much less obscure then Nebula2's, and easier to extend. The standard scripting language is now LUA (as compared to TCL in Nebula2), reducing the memory footprint drastically. Scripting is now no longer tied into the architecture. It is easy to disable scripting all together and reduce the memory footprint even more. It's still possible to add support for other scripting languages in Nebula3. - Attr: Implements the concept of dynamic attributes from Mangalore. Attributes are compile-safe key/value pairs, thus offering compile-time validation of attribute names and data types. Attributes are the foundation for the database subsystem. - Db: The database subsystem is an improved version of Mangalore's database subsystem, offering an abstract, performance-optimized interface to a SQL database for storing all types of application data. The standard implementation uses SQLite as its database backend, the wrapper code has been carefully tuned for best database performance. - Naming: Implements a hierarchical naming service for Nebula3 objects. Naming is no longer hard-coded into the base class, instead objects can be registered with the naming service at runtime, adding the additional overhead only when needed.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203529.38/warc/CC-MAIN-20190324230359-20190325012359-00375.warc.gz
CC-MAIN-2019-13
2,860
15
https://board.gaycookie.dev/t/windows-11-customization/22
code
This was the first day after I discovered Windows 11 was leaked. So I decided to just go for it and installed it on my barebones system. And then started customize it to give it my own touch! Operation System: Windows 11. Wallpaper: Could not find the real artist URL: Download this awesome wallpaper - Wallpaper Cave This is being used for the bouncing background and the bars on the bottom. Robik by ApexXx-SenSei on DeviantArt This is being used for the system information and the clock. Cleartext (JD Edition) by Jelle Dekkers by AJ-Dekkers on DeviantArt This is being used for the now playing
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585768.3/warc/CC-MAIN-20211023193319-20211023223319-00295.warc.gz
CC-MAIN-2021-43
597
11
https://chandelier-pendant-light-fixtures.info/home-decor/home-decor-haul-how-to-start-fresh-for-spring/
code
Hellloooo Home Decor haul and a fresh start for spring!! In this Home decor haul i talk about Lull which is a mattress company. I loved lull, the mattress was so comfy, the shipping was free and quick, my set up was so easy as you saw, and you get a 100 day trial. I have an offer for you guys too! Get $50 off Lull with this link Lull Link: http://bit.ly/2nPLI8U In this video I also discuss how important it is to freshen up your space for spring with little makeover. Decor doesn’t always have to be expensive you can also always DIY your own decor at home and make it a project. I love to start fresh with new decor for the spring time. I hope you enjoy! ♡ S U B S C R I B E : http://bit.do/tQVe F O L L O W M E ♡ insta: toristerling_ ♡ snapchat: tori.sterling ♡ twitter: toristerling_ ♡ spotify: toristerling C O N T A C T M E P O P U L A R V I D E O S ♡ Brow Routine: http://bit.ly/2m1yeGL ♡ How I Went from Black Hair to Blonde IN ONE DAY: http://bit.ly/2dwfjft ♡ Kylie Jenner Makeup Tutorial: http://bit.ly/17nXquY ♡ Prom Dress Shopping with Me: http://bit.ly/1HHvYDh ♡ PROM 2015 Get Ready with Me: http://bit.ly/2dWtsEj ♡ Everyday Summer Makeup Routine: http://bit.ly/2dXwiL3 ♡ Prom 2016 Get Ready with Me: http://bit.ly/2dwfZS3 Camera: Canon 70D Editing Software: Final Cut Pro X & Motion 5 My Backdrops: (I have multiple here are the links to my favorites) Champagne Glitter: http://rstyle.me/n/bf32n6b5iw7 Red Glitter: http://rstyle.me/n/bf32q9b5iw7 White Glitter: http://rstyle.me/n/bf32p9b5iw7 Black Glitter: http://rstyle.me/n/bf32qmb5iw7 Pink Glitter: http://rstyle.me/n/bf32rwb5iw7 Teal Glitter: http://rstyle.me/n/bf32sib5iw7 Charcoal Glitter: http://rstyle.me/n/bf32szb5iw7 I am 19 years old, for those asking Please subscribe, share, & like this video! This video is sponsored by Lull. Hi I’m Tori Sterling, a 19 year old lifestyle beauty guru from the East Coast. I make a ton of videos involving makeup tutorials, fashion lookbooks, DIYs, get ready with me, vlogs, challenges, and much much more. Make sure you subscribe so you don’t miss out on any videos and also follow me on my social media such as Twitter, Tumblr, and Instagram to stay even more connected with me! See you in my next video!
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510846.12/warc/CC-MAIN-20200403092656-20200403122656-00073.warc.gz
CC-MAIN-2020-16
2,248
32
https://docs.microsoft.com/en-us/archive/blogs/anutthara/building-setup-projects-with-team-build-and-running-tests-on-product-install
code
Building setup projects with Team Build and running tests on product install Setup projects (.vdproj) do not have a project system format that can be understood by MSBuild. Hence MSBuild cannot build these projects directly and consequently neither can Team Build. What we can do however is use the devenv /build command to build the vdproj files and generate msi installers. As I set out to build setup projects and install them on the build machine in order to run tests on those, I followed the sequence of steps listed below: Override the target AfterCompile in the TFSBuild.proj file. Include an Exec task in the target to build the setup project separately using devenv /build. <Exec Command=""$(VSINSTALLDIR)\Common7\IDE\devenv" ..\Sources\MySolution\MySetup\MySetup.vdproj /Build"/> Now, if you kick off a build, the msi is built, but is dropped into the bin folder under the Sources folder in the build directory. But in order to get it into the drop location, you need to edit the "Output file name" property in the setup project properties to ..\..\..\Sources\ since you cannot pass the output directory to the command line. Now, when you kick off a build, you see the msi file in the Binaries folder on the build machine and consequently the drop location. The caveat is that you will need VS installed on the build machine if you want to build using devenv. Invariably the problem arises that you would want to build the setup project in different flavors now. The solution to that one is slightly tricky. Remember, you cannot pass in the output directory on the command line, that is why you have to build the setup project in the Binaries folder and then include a task to copy the dlls to the appropriate flavor's folder. Then again, you can build the setup project in a different flavor and re copy the dlls into the appropriate folder. You can use the /ProjectConfig switch to specify the flavor in which the setup project is to be built. Now that you have built setup projects, you want to do something else. Run tests on the installed product to pronounce it good or bad. Consider a solution that has a console application, a setup project and a test project. The setup project is built into an msi that dumps the created exe into a folder called say "D:\Program Files\MySetup". Now, the test project has a generic test that calls the console application's exe from the same folder. If the install has happened successfully on a machine, the test calls the console application exe and based on the behaviour may either pass or fail. But, in case the product is not even installed, then the test aborts saying that the exe is not found. So, now after the AfterCompile custom task builds the setup project, you put in another custom target BeforeTest. Include a task "Exec" in this target that will call the setup.msi file with the /quiet switch to install the product without launching the UI. Right after this target, tests are run in the Test target and the generic test will not abort if the install has succeeded. <Exec Command="..\Binaries\Setup1.msi /quiet"/> While writing this task, I hit an error in install. This was due to the build service account not being an admin on the build machine and install rights being denied to the account. After adding the build service account as admin on the machine, remember to restart the build service. Now, the install succeeds and the tests run on the installed product. Feel free to post comments if you need help with any other related scenarios.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655883439.15/warc/CC-MAIN-20200703215640-20200704005640-00489.warc.gz
CC-MAIN-2020-29
3,517
10
https://help.launchpad.net/ListHelp?action=diff&rev1=12&rev2=14
code
Added moderation info |Deletions are marked like this.||Additions are marked like this.| |Line 3:||Line 3:| |||<tablestyle="float:right; font-size: 0.9em; width:40%; background:#F1F1ED; margin: 0 0 1em 1em;" style="padding:0.5em;">'''Contents'''[[BR]][[TableOfContents]]||||||<tablestyle="float:right; font-size: 0.9em; width:40%; background:#F1F1ED; margin: 0 0 1em 1em;" style="padding:0.5em;">[[TableOfContents]]||| |Line 136:||Line 136:| |== Moderation posts from non-subscribers ==||== Moderating posts from non-subscribers ==| Launchpad Mailing Lists Launchpad allows teams to setup a discussion mailing list which is open to all members of the team. For the technically minded, Launchpad mailing lists are managed by [http://www.list.org GNU Mailman] although we have simplified the web interface, allowing you to administer multiple lists through Launchpad easily. Using Launchpad alleviates the need for external mail hosting and simplifies life for users and administrators who can use a single Launchpad account to manage their participation in multiple mailing lists. Using Launchpad to host your mailing lists has several advantages over self-hosted lists. Simplified subscription management. Instead of maintaining a separate password for every list your users participate in, they can use their single Launchpad login to update their email address and subscription preferences for any list. Post from any email. Most email lists require you to use a specific email address when you post to that list. Launchpad, however, can know about multiple email addresses you have validated, and so you can use any of those email addresses to post to any list that you participate in through Launchpad. Simplified administration. People who administer multiple lists in multiple projects will find that Launchpad greatly improves their ability to control list subscriptions. Launchpad's Mailman implementation represents best-practice with regard to mailing list setup, designed by folks who run hundreds of lists. Use one Launchpad account to administer as many lists as you need, across as many projects as you want. Automatic archiving and distribution. Launchpad lists are automatically archived for history, in a format that is easily cataloged by search engines. Copies are also archived on mail-archive.com, a popular long-term list archive site. Sophisticated membership management. Teams already support many sophisticated ways of controlling membership - they can be tightly controlled, entirely open, moderated, or invitation-only. Since teams govern participation in Launchpad-hosted mailing lists, you can setup a list with whichever governance model suits you best. Natural fit to Launchpad teams. Many projects use Launchpad teams to group their users and developers into convenient teams. Those teams can be given different permissions in Launchpad, and now can also have mailing lists associated with them. Using Launchpad hosted lists Launchpad mailing lists are team-oriented; every team may have one mailing list, and every mailing list is associated with exactly one team. Any member of the team may subscribe to the team's mailing list but team members are not required to participate on the mailing list. When you join a list, you designate one of your Launchpad-validated email addresses on which to receive mail from that list. You may post to any mailing list from any of your validated email addresses, but you will only receive messages from each list on the designated address for that list. You may also ask Launchpad to use your preferred email address and have mail from that list sent to your current preferred email address, whatever that happens to be at the time. - Postings by people who are not Launchpad members, or are not members of the team, are immediately discarded. All Launchpad mailing list messages are publicly archived, and the archives are open to everyone, not just Launchpad or team members. If you have any issues with information available in the archives, you should contact [http://help.launchpad.net/#head-9562b4c8ee3bbaca8f0d0719f973269f13539ced the Launchpad administrators], however our general policy is never to remove archive messages or information contained therein. Subscribed team members may post their messages to [email protected] and the archives for the team mailing list is always available at http://lists.launchpad.net/myteam. Establishing a mailing list If you are a team administrator, look on your team overview page. You will see an action called Configure mailing list: Click on this action and then click the Apply for Mailing List button. - Your mailing list application now needs to be approved by the Launchpad administrators. We handle new mailing list application requests several times per day, and we will enable your mailing list as soon as possible. - Once your mailing list is approved, go to your team's overview page and you should now see a link in the Summary section saying "Mailing list archive". While your archive will be empty until the first message is posted to your mailing list, once you see this link in the Summary section, you know that your mailing list is live. attachment:archive.png Note that you can also set your Launchpad mailing list to be your team's contact address. Subscribing to a mailing list Before you can send or receive messages on your mailing list, you must subscribe to it. This includes the team owner who requested the mailing list. Once your list is live (see above), these are the steps you need to take to subscribe to the mailing list. - Go to your [https://launchpad.net/people/+me/+editemails personal list subscriptions page]. - Toward the bottom of the page, you will see a list of all teams that you are a member of and that have a mailing list. - Use the drop-down menu to select which of your registered email addresses should be subscribed to which mailing list, and then click Update Subscriptions. attachment:subscribe.png - Within a minute or two you should be a member of the mailing list and you should be able to post to the list. Using your mailing list Using your mailing list is the easiest part of this process! If your team is named myteam, then once the list is live and you have subscribed to it, just send a message to [email protected] in your mail reader of choice. After a few minutes, depending on network latencies, you should receive your message in your inbox, and the message will appear in the archive. Note: if you use Gmail and you do not see your own posts arrive in your inbox, it is probably because of [http://www.python.org/cgi-bin/faqw-mm.py?req=show&file=faq02.008.htp this issue]. Unfortunately there is nothing we can do about it, but if you check your list's archive, your message should appear there. Unsubscribing is easy. Just visit your [https://launchpad.net/people/+me/+editemails Launchpad mailing list subscriptions] page, scroll down to the list of teams you're subscribed to, and chose Don't Subscribe for any list you want to get off of. Click Update Subscriptions. Posting to lists without subscribing If you want to make a one-off post to a list, you don't have to subscribe. Instead, you can post to it using any email address registered in your Launchpad profile. Your post will be held for moderation and it is up to the relevant team's administrators to decide whether or not to accept your post. Moderating posts from non-subscribers From time to time, you may find that people post to your mailing list without first subscribing. So long as the posts are from registered Launchpad users, Launchpad holds the posts for you - as a team administrator - to moderate. When there are new posts to moderate, you can see them by following the link in the Actions menu on your team's overview page.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585305.53/warc/CC-MAIN-20211020090145-20211020120145-00046.warc.gz
CC-MAIN-2021-43
7,803
45
https://www.coderanch.com/t/203119/java/app-hangs-Tomcat
code
I have an application which is running in Tomcat 5.5. It is developed with the heavy use of Spring/Hibernate. It runs well for 1-2 hrs but then just hangs. Tomcat does not show any error (out of memory or some other) in the logs but does not respond to any request. I can only see the app's login page once it hangs. In my application, a set of 10 jobs (Quartz API) get fired after every 5 minutes. I checked the logs and these jobs tohether take just 3 seconds to finish when the server is running normally. I have checked my code many a times but I doubt its my code's problem. I have also tried increasing the heap size but it did not help either. I am really confused as to what can be the issue. Is it some problem with Spring/Hibernate configuration, Memory leaks? Please suggest me how can i really diagnose the problem and fix it. P.S. I am duplicating this post in this forum as well since I am looking for this solution really fast.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141740670.93/warc/CC-MAIN-20201204162500-20201204192500-00165.warc.gz
CC-MAIN-2020-50
942
6
http://original.livestream.com/forum/search.php?s=59736b18cff9e568b238c3691628d34c&searchid=2963335
code
Forum: Technical Questions & Bugs 7th April 2010, 23:03 Where are you? I use Linux, and would love to be able to stream through Livestream, as I don't have a webcam and therefore can't Ustream. I heard about this site and came here only to find that the...
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246659254.83/warc/CC-MAIN-20150417045739-00041-ip-10-235-10-82.ec2.internal.warc.gz
CC-MAIN-2015-18
256
4
https://github.com/sfeast/onyx/commit/e0f72c86ccbbe141be1e75851fdb43710e335918
code
Please sign in to comment. adjusting fix for ENYO-674, removed position:relative for onyx-menu-t… …oolbar css rule & removing onHide handler in Toolbar which was causing issues for Pickers - Loading branch information... Showing with 1 addition and 5 deletions.
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454702018134.95/warc/CC-MAIN-20160205195338-00103-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
265
5
http://thirdlanding.com/gis-buffer-606-trail/
code
In a previous post, I examined creating a bounding box for the 606 trail to enable analysis of surrounding crime. While this is straight forward and a convenient heuristic to explain what we were doing, notice that it’s not fully what we wanted as an area from which to to analyze crimes. Specifically, the bounding box we produced wouldn’t be very good border for investigating crime near the ends of the trail. A better way to address the area would be to use the GIS concept of a buffer, where in this case we’d have an area that looked like a semi-circle on each end of the rectangle of the bounding box. This is relatively easy to accomplish within GIS software such as QGIS. The downside of this approach is that, while we have a more appropriate take on the area we want to consider, it’s not quite as straight forward to retrieve crimes of interest. With the bounding box approach with SQL, we could just use standard SQL and use the corners of the box as filters to return the crimes of interest. With those curved ends, it’s not quite that easy, but all is not lost if we use GIS features such as those included in the POSTGIS extension of POSTGRES. In the image below, the buffer is the entire yellow area, whereas the original bounding box is in the dashed line. You can see how the buffer encompasses more area at the ends, which makes sense given our ends. This buffer is about a city block around the trail. In the following, we can expand this buffer to encompass the area about 2 blocks (about a quarter mile) around the trail. The original bounding box is still dashed, and the previous 1 block buffer is in green. The new 2 block buffer is in light blue.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704821381.83/warc/CC-MAIN-20210127090152-20210127120152-00112.warc.gz
CC-MAIN-2021-04
1,683
4
https://monoinfinito.wordpress.com/2013/10/08/gcc-tip-better-disassembly/
code
Gcc tip: better disassemblyPosted: October 8, 2013 Few things are more awesome than compiling with “g++ -S” and inspecting gcc’s dissasembly and learn how the compiler optimizes things you wouldn’t even think about. Unfortunately, the assembly might not be the most human friendly format for a program (though I’ve seen worse). While you won’t escape the need to learn some assembly to get any meaningful information out of gcc’s assembly listing, there are some tips which might make your life much easier: c++filt is part of the build essentials package, and will turn mangled names into proper C++ names. You won’t need to remember that _Znwm is the mangled version of “operator new”, just run “g++ -E foo.cpp -o /dev/stdout | c++filt” and you’ll get an assembly with unmangled names. Some people have the ability to read assembly and automatically understand how the data flows between registers and variables very quickly. For the mere mortals like us, gcc has a very helpful flag called “-fverbose-asm” which will add a comment to each line where a variable is referenced. This will let you keep track of the data flow inside a function. Extra, unrelated, tip: As far as I know, gcc has no option to write to stdout; just use “-o /dev/stdout” to let it write to a fake file which Linux will helpfully create for you, then you can pipe the hell out of gcc’s output.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945552.45/warc/CC-MAIN-20180422080558-20180422100558-00090.warc.gz
CC-MAIN-2018-17
1,406
7
https://wilseymc.blogspot.com/2016/07/tuesday-tips-backups.html
code
Some people will stop reading this post already. They will be saying, "Yeah yeah yeah, I know." One of my life rules says, Every now and then consider the worse case scenario and prepare for it. My house burned down when I was a kid. Are your projects safe if that happens? Maybe, a virus eats your computer? Your laptop might get stolen? I used a multi-layered approach: - Auto-save. This will keep you from losing the last two hours of work because you lost power. - Version control. I use Scrivener that does full copies at significant points in my stories. - On-site backups. Have a second location location on your home network. This is good if your computer fails. - Off-site backups. I use Cloud based services for this. - Create a .bat file to do copies on startup. One final thing I do is I email my doc to myself at the end of each writing session. Some people even set up a special GMail account for their backups emails. --Stop what you are doing and run a backup NOW!
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988725.79/warc/CC-MAIN-20210506023918-20210506053918-00164.warc.gz
CC-MAIN-2021-21
980
11
http://thanksgivingwordsearch.com/WordSearchTutorial.php
code
Word Search Tutorial I put this tutorial together and posted it on youtube. The game is pretty easy to play, but I put in some stuff to walk you through creating your own word search puzzle, or embedding it online onto your web site or blog. I'm always looking for ways to improve my games. If you have any ideas, please feel free to Suggest an Improvement. Thanks for your help, :-)
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511122.49/warc/CC-MAIN-20181017090419-20181017111919-00380.warc.gz
CC-MAIN-2018-43
383
4
https://community.hubitat.com/t/lighting-projects-sharing/92119
code
I created few LED Lighting projects and would like to share them with the community. The required hardware is: - Lighting Controller is Pixelblaze (https://electromage.com/). - All LED Strips/Matrix are based on WS2812b (or similar) addressable LEDs. NOTE: Pixelblaze does not support regular RGB(WW) LED strips but supports many various addressable LEDs such as WS2812b. The advantage is - each LED could be individually controlled. Of course, it is possible to use these addressable LED Strips/Matrix as a regular RGB(WW) strips but not vice versa. - Thanks to @zranger1 there is a HE Driver for the Pixleblaze: [RELEASE] Pixelblaze addressable LED Controller Driver v1.00 So, integration with HE is very easy and straight forward. Pixelblaze is a WiFi device but all controls are local, no any Internet/Cloud services are required. Pixelblaze projects are DIY. So some soldering and assembly skills are required. Pixelblaze also required some programming but there are tons of ready to go lighting patterns already available. Plus Pixelblaze community is very helpful. The final results are outstanding. As of today all my LED Strips are controlled by Pixelblaze and integrated with HE. I don't want to make this initial post too long and populated with Pixelblaze codes, HE RM rules, pictures and videos But if anybody is interested in any of my projects I will be happy to shear everything in order to reproduce them. Simply please let me know which project you want to reproduce. Here is a list of my current Pixelblaze/HE LED lighting projects. (Most complicated are listed first.) Scrolling Text and Info Display This one displays current values in 4 sec interval: - CO2 Level; - Internal Temperature; - External Temperature; - Internal Humidity; - External Humidity; When front door is opened from outside it displays scrolling welcome message for 30 sec. In theory it can display anything you want. Number of displayed parameters is unlimited but displaying too many different parameters become annoying instead of being helpful. So, it is limited to 5. Also scrolling for the displaying is not used for the same reason. Display Matrix is 2 of 8x32 LED Matrix something like this one: Of course, you must have all related Sensors already integrated with HE. Kitchen Undercounter LED Lighting. I leave in old apartment building. Unfortunately all Kitchen Outlets are on the same 20A circuit. Of course, I cannot turn on power hungry appliances such as Microwave, Kettle, Coffee Maker at the same time. So, each of these things are controlled by Zigbee Sengled Smart Plug with power reporting capability. HE knows what is already turned On and disables all other power hungry appliances from being accidentally turning On. Thanks to Pixleblaze, under cabinet LED Strip shows in colors what is already running (red), what is disabled (blue) and what still could be turned On (green). Normal under cabinet lighting is entire strip warm white (2700K). Lighted Picture frame. This simply runs nice lighting pattern during day time. LED Strip is mounted behind picture frame. Normally the entire strip is warm white color (2700K). On Holidays it runs set of different lighting patterns. Living Room lighting. This one runs a static lighting pattern (nothing is blinking and moving) but strip segments have different colors. As I already mentioned, I will be happy to provide more details for each project
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100769.54/warc/CC-MAIN-20231208180539-20231208210539-00418.warc.gz
CC-MAIN-2023-50
3,407
55
https://www.occams-razor.info/2003/02/04/crying_in_my_bi/
code
Microsoft is beginning to cry uncle. Admittedly this is a strange thing to hear from the “innovators” at Microsoft. But it appears they are starting to realize that their software is, well, massively overpriced. It’s not very good either, but that’s not something they are going to admit, despite almost daily press articles about the latest security holes found in their products. Their web server, Internet Information Server, is so riddled with security holes that you have to be more than a bit nuts to install it today. Anyhow according to this article in its SEC filing Microsoft is warning its earnings may be lower in the future because of the growth of the open source movement. For those of you who don’t know, open source is software that is free of license and cost, and is maintained and written by volunteers. Microsoft is having a real hissy fit about open source software. They are calling it unreliable, which is hardly ever the case. They are calling it anti-American because no one is making a profit from it. (Not quite true. Open source software is often a platform upon which companies add value by creating customized packages that work with it. Oracle is laughing all the way to the bank.) They are even pressing for laws and regulations that would forbid governments from using open source. This would be laughable if they weren’t so serious and were not stuffing so much money into the pockets of congressmen. Nonetheless many federal agencies have figured out that open source software is not only free to use, and of much higher quality than what can be maintained commercially, but can actually be inspected and modified. Yes, users can actually fix their own problems! What a concept! The Microsoft approach is, of course, to make you pay for the privilege of talking to one of their technical support folks and maybe, if you are lucky, getting a patch or a work around to allow you to get things done. Release their code so you can inspect it and fix it yourself? Not a chance. But Microsoft is beginning to understand it may not have a choice. European countries are looking at using open source software exclusively. The article I referenced above says that Microsoft has come up with a “Government Security Program”. This will allow governments like the United Kingdom to actually look at Microsoft’s source code and maybe fix things themselves. Clearly it takes a lot of clout to get Microsoft to do something like this, and governments are one of the few institutions large enough to tell Microsoft to piss off. As a federal employee working on information technology issues I can tell you that using open source software is a no brainer. Not that all open source software is great, but much of it is excellent and of extremely high quality. Even if it is unlikely that I personally will go in and inspect the software if an error is found, it’s easy enough to hire people or a service that can do this if needed. But the main reason open source is a no-brainer is because you are no longer locked in to a vendor. No or low cost, higher quality software, and the ability to actually make permanent fixes sounds like a winning combination to me. Open source is creeping into my agency. We have some Linux machines. Some of our software is written in PHP, an open source scripting language. We also have a comments database written in Perl. Our Linux web servers, for some reason, don’t seem vulnerable to so many security flaws. I’ve been playing with open source software for a few years now. It’s amazing what is readily available for free. On one domain I put up a free content management system. When it no longer suited my needs I replaced it with an even better free content management system. On a forum I run, I am using phpBB bulletin board software. It works great. And I’ve been able to do in and tweak it to do things I want it to do. This blog software is not quite open source, but it is free to use for personal use. And it’s easily inspected since it is written in Perl. And if Moveable Type no longer suits me there are plenty of quality open source alternatives I can choose instead. I doubt Microsoft will go into bankruptcy court. But if they fail they will have only themselves to blame. Meanwhile I sense that their desktop monopoly is likely to crack in the next couple years. The software is there to do away with Windows and its whole Microsoft Office suite. It’s free and programs such as Open Office work seamlessly with Microsoft Office. I would not be surprised at all if Microsoft realized Windows can’t be viable operating system much longer. Perhaps like Apple they will build a new Windows around a solid Unix interface. I know I would be happier. At least my computer is more likely not to crash and work predictably. Karma seems to work on many levels, including the corporate level. Microsoft: beware. What comes around goes around.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335424.32/warc/CC-MAIN-20220930020521-20220930050521-00065.warc.gz
CC-MAIN-2022-40
4,937
11
https://findanexpert.unimelb.edu.au/scholarlywork/1353789-the-gigg-enkf--ensemble-kalman-filtering-for-highly-skewed-non-negative-uncertainty-distributions
code
The GIGG-EnKF: ensemble Kalman filtering for highly skewed non-negative uncertainty distributions Craig H Bishop QUARTERLY JOURNAL OF THE ROYAL METEOROLOGICAL SOCIETY | WILEY | Published : 2016 Observations and predictions of near-zero non-negative variables such as aerosol, water vapour, cloud, precipitation and plankton concentrations have uncertainty distributions that are skewed and better approximated by gamma and inverse-gamma probability distribution functions (pdfs) than Gaussian pdfs. Current Ensemble Kalman Filters (EnKFs) yield suboptimal state estimates for these variables. Here, we introduce a variation on the EnKF that accurately solves Bayes' theorem in univariate cases where the prior forecasts and error-prone observations given truth come in (gamma, inverse-gamma) or (inverse-gamma, gamma) or (Gaussian, Gaussian) distribution pairs. Since its multivariate extension..View full abstract Awarded by Office of Naval Research This work was inspired, in part, by conversations with Derek Posselt and Daniel Hodyss on qualitative differences between the posterior distributions delivered by EnKFs and those of Monte-Carlo-Markov-Chains. The author gratefully acknowledges financial support from the Office of Naval Research, Grant N0001413WX00008.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154042.23/warc/CC-MAIN-20210731011529-20210731041529-00504.warc.gz
CC-MAIN-2021-31
1,270
6
https://iwf1.com/kodi/service.system.tinc
code
tinc Virtual Private Network Daemon This is an unofficial addon. Do therefore not expect support from OpenELEC forum and irc channel. tinc is a virtual private network (VPN) daemon that uses tunnelling and encryption to create a secure private network between hosts on the Internet. Because the VPN appears to the IP level network code as a normal network device, there is no need to adapt any existing software. This allows VPN sites to share information with each other over the Internet without exposing any information to others. How To Install - Download the addon. - Open up Kodi and navigate into Add-ons. - Click the open box icon (above the side-menu). - Select Install from zip file. - If this is the first addon you install, Kodi will warn you about installing addons from "unknown sources" for security reasons - it's your call. - In any case, Kodi will warn you, you may not get auto-updates for this addon. - Navigate into the location where you've downloaded the addon to and select it to Install. For a full installation guide please click here. |Updated:||March 22, 2021|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710409.16/warc/CC-MAIN-20221127141808-20221127171808-00381.warc.gz
CC-MAIN-2022-49
1,088
13
https://cortex.marketplace.pan.dev/marketplace/details/SecurityScorecard/
code
The SecurityScorecard Ratings Content Pack is an integrated offering that provides an alerting system triggered by configurable conditions such as changes in organization grades and vulnerabilities found. This Content Pack enables security teams to create an alert in SecurityScorecard with particular conditions, which allows them to delete, update and interact with the alerts. A Cortex XSOAR Incident is created when an alert is triggered in SecurityScorecard. Alerts can be retrieved for factor grade drops, overall score drops, new vulnerabilities found, new issues, and CVEs detected. What does this pack do? Manage (create, delete, list) score or threshold-based alerts. Fetches SecurityScorecard alerts into Cortex XSOAR Incidents. Retrieves current and historical security scores for organization with the ability to choose specific risk factors such as: - Cloud Security: Measures security of your cloud infrastructure. - Internal Security: Measures security of your internal networks. - Network Security: Detecting insecure network settings. - DNS Health: Detecting DNS insecure configurations and vulnerabilities. - Patching Cadence: Out of date company assets which may contain vulnerabilities or risks. - Endpoint Security: Detecting unprotected endpoints or entry points of user tools, such as desktops, laptops, mobile devices, and virtual desktops. - IP Reputation: Detecting suspicious activity, such as malware or spam, within your company network. - Application Security: Detecting common website application vulnerabilities. - Cubit Score: Proprietary algorithms checking for implementation of common security best practices. - Hacker Chatter: Monitoring hacker sites for chatter about your company. - Information Leak: Potentially confidential company information which may have been inadvertently leaked. - Social Engineering: Measuring company awareness to a social engineering or phishing attack. List portfolios and companies included within those portfolios. List companies' 3rd-party services. The pack includes customized: - Incident Fields - Incident Type
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655092.36/warc/CC-MAIN-20230608172023-20230608202023-00073.warc.gz
CC-MAIN-2023-23
2,085
23
https://www.telerik.com/blogs/dont-stereotype-rapid-prototype-session-recording
code
In this session from StirTrek, I discuss rapid prototyping. In just about every industry, rapid prototyping is described as “a group of techniques used to quickly produce a working model”, and web development should be no different. Rapid prototyping allows developers to quickly communicate and collaborate on the product they are creating while investing minimal resources. When used effectively, a prototype can provide structure to a project, ensuring that the development team and the customer are working towards the same vision and goal. Subscribe to be the first to get our expert-written articles and tutorials for developers!
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662573053.67/warc/CC-MAIN-20220524142617-20220524172617-00488.warc.gz
CC-MAIN-2022-21
639
2
http://gitorbit.com/250606342-lets-meet-and-talk-ios/
code
Let’s meet and talk iOS – Monzo The event will be hosted at our usual Skill Matter location. Please register below to be able to access the venue. 7 – 7.30 Coding demo 8 pm Main presentation from Monzo. Talk title: The “release” mindset by Andy Smart A look into how Monzo approaches software changes, deploying our apps, and coordinating App Store releases across 8 different customer facing squads. – Speaker bio: Andy Smart joined Monzo in January 2016, a product minded engineer with 10 years experience delivering iOS apps for companies like Hailo, Victor and Snowman. Now iOS Lead, and engineering manager for mobile at Monzo his focus is locked on building, scaling, and developing their mobile engineering teams.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827727.65/warc/CC-MAIN-20181216121406-20181216143406-00222.warc.gz
CC-MAIN-2018-51
732
9
https://www.firegiant.com/wix/wep-documentation/msix/integrating-the-firegiant-msix-extension/
code
FgMsixExtension.wixext.dll WiX extension must be referenced in your WiX project. If you use Visual Studio: FgMsixExtension.wixext.dllfrom the list, click the "Add" button, then click "OK." If you edit your .wixproj by hand, add the following code: <ItemGroup> <WixExtension Include="FgMsixExtension.wixext" /> </ItemGroup> If you build your WiX packages using the WiX command line tools, you can use the -ext switch to reference candle -ext FgMsixExtension.wixext ... light -out path\to\MySoftware.msi -ext FgMsixExtension.wixext ... Then you can run FireGiant.Msix.exe to build the MSIX package: FireGiant.Msix.exe path\to\MySoftware.wixpdb -out path\to\MySoftware.msix Once the MSIX Extension is referenced, the build process creates both MSI and MSIX packages. MSIX packages require some MSIX-specific information in your authoring before the FireGiant MSIX Extension can successfully create an MSIX package. To do so: First, declare the MSIX Extension's namespace in your .wxs source code. Add xmlns:fga="http://www.firegiant.com/schemas/v3/wxs/fgmsix.xsd" to to the <Wix xmlns="http://schemas.microsoft.com/wix/2006/wi" xmlns:fga="http://www.firegiant.com/schemas/v3/wxs/fgmsix.xsd"> <Product ...> Then provide the identity information required by MSIX packages. Add the following element to your <fga:Msix Id="Example" Publisher="CN=Example" Target="desktop" /> Naturally, you will want to change the Id attribute to something that better describes your product. The Publisher attribute must match the subject of the certificate that will be used to sign the MSIX package. The Target value of desktop specifies that your package targets MSIX on Windows.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656963.83/warc/CC-MAIN-20230610030340-20230610060340-00306.warc.gz
CC-MAIN-2023-23
1,659
21
https://scholarlydissertations.com/communication-plan-project-schedule/
code
The sponsor of the project has reviewed your scope definition (goals, objectives, project structure, and stakeholders) and has approved it. However, the sponsor would like to see an improvement in communication between the project team and the stakeholders. See Chapter 4 in the course textbook. Ask the instructor for clarification if needed. The sponsor has also requested a project schedule be developed immediately to track and coordinate the progress of the remaining tasks for the project. Note: Use MS Project or another scheduling software of your choice. Ask the instructor for additional options for developing a project schedule. Develop a communication plan between the project team and the stakeholders for your project. Develop a project schedule for your project, which includes: o Task Name. o Start Date. o Finish Date.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510412.43/warc/CC-MAIN-20230928130936-20230928160936-00494.warc.gz
CC-MAIN-2023-40
836
8
https://analyticsindiamag.com/9-tutorials-to-become-a-pro-in-open-source-machine-learning-framework/
code
Developed by Google Brain, TensorFlow is one of the most popular open-source libraries for numerical computation. This library helps in building and training deep neural network applications and offers APIs for beginners and experts to develop for desktop, mobile, web, and cloud. In this article, we list down 9 free tutorials to become a pro in the open-source machine learning framework, TensorFlow. Sign up for your weekly dose of what's up in emerging technology. 1| Official Documentation What’s better than understanding the library from the maker itself. In this official documentation, you will learn how to use machine learning techniques, utilise machine learning at production scale, creating and deploying TensorFlow models on the web and mobile, understanding TensorFlow’s High-Level APIs and much more. 2| TensorFlow Tutorial: Deep Learning for Beginners In this tutorial, you will learn the basics and advance machine learning topics like Linear Regression, Classifiers, create, train and evaluate a neural network like CNN, RNN, autoencoders, etc. You will also learn the architecture of TensorFlow, how Jupyter Notebook works, graph visualisation, basics of TensorFlow, Linear Regression and Linear Classifier with TensorFlow, kernel methods in Machine Learning, RNN with TensorFlow example and much more. 3| Natural Language Processing in TensorFlow In this tutorial, you will learn how to build natural language processing (NLP) systems using TensorFlow. You will also learn to process text, including tokenizing and representing sentences as vectors, so that they can be input to a neural network. Furthermore, you’ll also be able to apply RNNs, GRUs, and LSTMs in TensorFlow. 4| TensorFlow Tutorial For Beginners TensorFlow Tutorial for beginners will help you in understanding the performance of Deep Learning. You will learn about the performance of multidimensional data arrays, how to install TensorFlow and get started, understand the basics of TensorFlow, load in data on Belgian traffic signs and exploring it with simple statistics and plotting, how to perform data manipulation and other such. 5| Introduction to TensorFlow for Artificial Intelligence, Machine Learning, and Deep Learning In this tutorial, you will learn the best practices for using TensorFlow framework, how to build a basic neural network in TensorFlow, train a neural network for a computer vision application and understand how to use convolutions to improve a neural network. This is an intermediate level course and will need basic knowledge and experience in Python coding. 6| TensorFlow Tutorial This TensorFlow Tutorial is mainly for Python developers who focus on research and development with various machine learning and deep learning algorithms. The aim of this tutorial is to describe all TensorFlow objects and methods. In this tutorial, you will learn about the basics of TensorFlow, CNN, RNN, Tensorboard visualisation, Single layer perceptron, Linear Regression Tensorflow, gradient descent optimisation, image recognition using TensorFlow, recommendations using neural network training, understand TFlearn and optimisers and much more. 7| Introduction to Deep Learning with TensorFlow This tutorial is at an advanced level and talks about concepts such as how to create a neural net model, understand how the network will run, simple preprocessing language data for deep learning, train and test data, how to use CUDA and GPU version of TensorFlow for deep learning, basics of RNN, CNN and LSTM in TensorFlow, TFlearn in high-level abstraction layer, and other such topics. 8| TensorFlow Tutorial – Deep Learning Using TensorFlow This TensorFlow tutorial is mainly designed for professionals and enthusiasts who are interested in applying Deep Learning Algorithm using TensorFlow to solve various problems. In this blog, you will learn the basics of TensorFlow, how to build and run computational graph, understand constants, placeholder and variables, how to perform Linear Regression Model using TensorFlow, and much more. 9| Python TensorFlow Tutorial – Build a Neural Network This is an introductory tutorial to TensorFlow which will give an overview of some of the basic concepts of TensorFlow in Python. It will help in building more complex deep learning networks, such as Convolution Neural Networks, natural language models and Recurrent Neural Networks. You will learn to create and build a simple three-layer neural network to classify the MNIST dataset.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663016373.86/warc/CC-MAIN-20220528093113-20220528123113-00249.warc.gz
CC-MAIN-2022-21
4,493
21
https://community.spiceworks.com/topic/1258378-sbs-2011-very-slow-for-clients
code
Have a Dell PowerEdge 110 II server with 32gb of RAM with RAID 1. I have Server 2012 installed on the host and the virtual machine is running SBS 2011. All the clients are running Windows 7 Professional. The problem I'm having throughout the day, on the client machines, they are experiencing extreme latency on the server. When you browse the network shares to view files, you will get a spinning circle for a couple of minutes before they can the file or directory. Even in Outlook, email is slow at the same time. When the network is slow, I checked the server and it's not being over utilized, not sure what the bottle neck is. Any ideas is greatly appreciated. All the client machines and server is connected to an gigabit switch. Total Care Computer Consulting is an IT service provider. have you done any of the tweaks recommended at the SBS Build Wiki www.sbsbuildwiki.com? you can "Tame" the memory of exchange as well as the SQL instances. what other LoB apps are installed on the SBS? is your host only running the hyperv role?
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588282.80/warc/CC-MAIN-20211028065732-20211028095732-00265.warc.gz
CC-MAIN-2021-43
1,038
3
https://community.anaplan.com/discussion/156788/current-date-and-time-in-anaplan-via-the-api
code
Current date and time in Anaplan via the API Built an easy script to have the current date and time in Anaplan. Have successfully implemented this on a couple of customer sites and it is really useful. It is reasonably easy to set up and the Github page for the code has the instructions. Also happy to assist if you want help setting this up. - All Categories - 9.8K Forums
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817729.87/warc/CC-MAIN-20240421071342-20240421101342-00345.warc.gz
CC-MAIN-2024-18
374
5
http://rodgersheatingandair.com/category/foreign-brides/
code
It is possible to discover ways to Start a discussion on a dating website Many individuals make errors especially in online dating sites where recipients associated with the message go on it the way that is wrong. To avoid blundering in your initial conversation in a site that is dating think of making use of simple words that express your passions. People frequently confuse on their own with terms and shows the necessity for care of this type. Continue reading “It is possible to discover ways to Start a discussion on a dating website”
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178361776.13/warc/CC-MAIN-20210228205741-20210228235741-00024.warc.gz
CC-MAIN-2021-10
545
3
http://cgp.dol.ru:8100/Guide/FTP.html
code
The CommuniGate FTP module implements an FTP server for TCP/IP networks. The FTP protocol allows an FTP client application to connect to the Server computer and specify the user (Account) name and the password. If access to the specified user Account is granted, the client application can retrieve and update data inside that Account Personal File Site. File Transfer Protocol The File Transfer Protocol allows client computers to work with files stored on remote servers. A computer running an FTP client application connects to the server computer and provides account (user) name and the password. If access to the specified user account is granted, the client application sends protocol commands to the FTP server. These protocol commands tell the server to list all files in the current directory, to change the current directory, to retrieve, upload, rename, and remove files stored on the FTP server. The CommuniGate Pro FTP module supports all related Internet The CommuniGate Pro FTP module supports the REST command and it can resume broken file transfer operations. The CommuniGate Pro FTP module supports the GSSAPI authentication method. It can use the established GSSAPI "context" for encryption and integrity protection of the control and data channels. The CommuniGate Pro FTP module supports the STLS command, as well as non-standard AUTH SSL and AUTH TLS-P commands for establishing secure (TLS) communication links. Configuring the FTP module Use a Web browser to configure the FTP module. Open the Access page in the WebAdmin Settings section. - Use this setting to specify what kind of information the FTP module should put in the Server Log. Usually you should use the Major (password modification reports) or Problems (non-fatal errors) levels. But when you experience problems with the FTP module, you may want to set the Log Level setting to Low-Level or All Info: in this case protocol-level or link-level details will be recorded in the System Log as well. Since the FTP clients send passwords in the clear text format, setting the Log to these setting for long periods of time can become a security hole if the Log file can be copied from the Server computer. The FTP module records in the System Log are marked with the FTP - When you specify a non-zero value for the TCP/IP Channels setting, the FTP module creates a so-called "listener" on the specified port(s). The module starts to accept FTP connections from FTP clients. This setting is used to limit the number of simultaneous connections the FTP module can accept. If there are too many incoming connections open, the module will reject new connections, and the users should retry later. If the number of channels is set to zero, the FTP module closes the listener and releases (unbinds from) the TCP port(s). - By default, the FTP module Listener accepts clear text connections on the TCP port 8021. Follow the listener link to tune the FTP Listener. If the server computer does not have any other FTP server software running, you may want to switch the FTP Listener to the port 21 (the standard FTP port). Note: The FTP protocol has a "NAT traversal" problem. When working in the "active" mode, the FTP server needs to open data connections to the client computer, and if there is a NAT device between the FTP server and the client computer, attempts to establish these data connections would fail. To solve this problem, most NAT devices/programs implement an FTP proxy, but they activate this feature only if they detect an outgoing connection to the port 21. If you use the FTP module with a non-standard port number (such as 8021), your users connecting from behind NAT devices won't be able to do data transfers in the "active" mode (the "passive" mode should work correctly). Providing Access to Personal File Sites - As soon as an FTP user is authenticated, the current directory is set to the topmost directory of the user Personal File Site. The FTP module allows a user to upload, download, rename and remove Personal File Files. The FTP module also allows a user to create, remove, and rename directories inside the Account Personal File Site. CommuniGate® Pro Guide. Copyright © 1998-2006, Stalker Software, Inc.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100603.33/warc/CC-MAIN-20231206194439-20231206224439-00021.warc.gz
CC-MAIN-2023-50
4,216
59
https://dashdash.io/3/audit_setloginuid
code
audit_setloginuid — Set a program's loginuid value int audit_setloginuid(uid_t uid); This function sets the task attribute loginuid with the value of uid. The loginuid value may only be set by programs with the CAP_AUDIT_CONTROL capability. This normally means the root account. The loginuid value is part of the task structure and is inheritted by child processes. It is used to track what account a user gained system access with. All system entry point programs should set this value right before changing to the uid of the user granted access so that audit events are properly attributed to the that user. This function returns 0 on success and non-zero otherwise.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816586.79/warc/CC-MAIN-20240413051941-20240413081941-00446.warc.gz
CC-MAIN-2024-18
670
5
https://www.sqa.org.uk/e-learning/SoftDevRDS02CD/page_01.htm
code
Data Analysis and Normalisation The basic concept of a relational database system is that data is only held once, ie there is no duplication, and the data can be accessed by many users at the same time for many purposes. A ready-made, tailored database is not normally purchased off the shelf. You can employ the services of an external company to develop a tailored database for you. Not only is this expensive but the external company still needs to go through the processes as described here. You can purchase the software to perform such functions as creating the tables, adding and amending data, creating reports, managing security, etc but the database itself still needs to be designed. It is worth noting at this stage that the database, and the software to manage it, is collectively called a Database Management System. If the database conforms to the rules of a relational database, as originally defined by Dr E F Codd, then this is called a Relational Database Management System (RDBMS). In this section we will examine briefly the process of data analysis and an introduction to a methodology to carry out a design, based on that analysis, known as normalisation. When designing a database, it is important to ensure that it will support the organisation's needs both now and in the future. Furthermore, it should result in a design that avoids the pitfalls as described in the earlier sections. A database designer examines in detail the data requirements of the system under development. The process involves analysing existing data files, screen layouts and reports, interviewing key staff, documenting the findings, etc. However, this is quite an extensive process and is outside the scope of this Unit. The deliverables from this data collection exercise allow the Database Designer to use a data analysis technique to design the database. Next: Data Analysis Techniques
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141197278.54/warc/CC-MAIN-20201129063812-20201129093812-00410.warc.gz
CC-MAIN-2020-50
1,890
10
https://docs.warp.dev/features/command-completions/autosuggestions
code
How to access it From the Command Palette, type in "Autosuggestions" to toggle. You can change the keybinding for accepting autosuggestions to Tab. Configure this in the "Tab key behavior" setting under Features > Editor. Note: This will update the keybinding for opening the completions menu to CTRL-SPACE. You can also enable the "Open completions menu as you type" in Settings > Features so that the completions menu opens automatically. How to use it There are several ways to accept autosuggestions, either completely or partially: Complete an autosuggestion using the CTRL-Ealso, completes the autosuggestion when your cursor is at the end of the buffer. CTRL-RIGHTcan be used to partially complete the autosuggestion one component at a time. How it works
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816587.89/warc/CC-MAIN-20240413083102-20240413113102-00757.warc.gz
CC-MAIN-2024-18
761
11
https://techwiz2.wordpress.com/2007/02/05/how-tony-dungy-won-me-30/
code
Courtesy of NFL.com: 4-6-CHI17(1:49) D.Rhodes left tackle to CHI 16 for 1 yard (L.Briggs; B.Urlacher). And with that there was a turnover of possession and the score didn’t change, giving me the fourth quarter prize. Now for some classroom quotes from the week “It may be that TF will commit suicide if there is no grader” -Levin on what would happen if there was no grader for the course. Fortunately for all of us we won’t get to see the results of that one. “Your program sits waiting for something to happen. It watches it’s navel.” -Devlin on what happens when a program is idle. “Shh, I’m just stating an opinion… A small opinion. It’s not on the exam.” -Devlin after ranting about copyrights, patents, trademarks and all else. “I talk about it as if it’s great. But when I’m alone, late at night, ::old person laugh that sounds kind of like they’re coughing up a lung:: I think in horror as to why there are true and false operators.” -Devlin going on about overloadable true and false operators in C# “It is very hard to read help. Just go and read help!” -Devlin on the usefulness of Visual Studio’s help for teaching yourself C#. “C# has double doses of headaches. A headache on the left and a headache on the right.” -Devlin on issues with C#. “You know, you’re taking a C# class, so we should, once in a while, talk about C#” -Devlin with a quote that requires no explanation. Blogging will be light until the end of this week due to the Beanpot being tomorrow, plus some HW, the BUCD site redesign coming to it’s final stages (or at least until we do something about the small layout), and just general procrastination.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864343.37/warc/CC-MAIN-20180622030142-20180622050142-00406.warc.gz
CC-MAIN-2018-26
1,684
12
https://answers.sap.com/questions/6473424/upload-picture-to-maintenance-order.html
code
I am developing a WD application to create and modify PM maintenance orders, as a requeirement I need to upload a picture and attach it to the order, the functional team has showed me that in ECC you can do that easily. But I can't figure it out yet how to do that from WebDynpro, any comments or guidance will be welcome. So far I know how to uploead a file to the AS (Java Stack) but in this case the picture has to be in the ECC server and the PM order has to have that picture attached to it. I hope you guys can help me out. Thanks in advance,
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950247.65/warc/CC-MAIN-20230401191131-20230401221131-00468.warc.gz
CC-MAIN-2023-14
548
3
https://techsini.com/heres-our-100th-blog-post-check-out-our-blog-insights/
code
Here’s our 100th Blog Post – Check Out Our Blog Insights Hi there, this is the century blog post of TechSini where I am going to share some insights of our blog – TechSini. Before that, I would like to thank everyone, who inspired and motivated me to initiate this blog. - 15 Most Useful Online Tools and Generators for Web Developers and Bloggers - 5 Most Useful Tools for Bloggers from Small SEO Tools My Blogging Journey My blogging journey started with the Kannada website founded by me where I used to share tech related articles and interactive animations in Kannada language. Then I became a guest blogger at TechGyo and MasterBlogster, I have also contributed to Shoutmeloud and some other well-known blogs. In the beginning I used to write tech related articles such as reviewing online tools, software, mobile apps and gadgets, I started writing about web development and WordPress when I opted web development as my primary job. Inspiration and motivation are the two most important factors needed to achieve our dreams. I wanted to share my knowledge about WordPress and Web development, I also wanted to contribute to WordPress hence thought of coming up with my own blog i.e. TechSini. I got inspired by like-minded people who write about WordPress and web development. My inspiration to come up with my own blog were- wptavern.com, wpbeginner.com, wplift.com, kevinmuldoon.com and lea.verou.me etc. Along with writing about WordPress and web development, we have contributed several WordPress plugins and some useful tools for web developers, our popular WordPress plugins are Elegant Subscription Popup, Prevent Content Theft and Simple Adblock Notice. We have crafted many useful tools for web developers and bloggers to make their job easy, here are the few to name – Multi Device Website Mockup Generator, HTML ListGEN, Blog Title Generator and How Fast is My Server. For the first time, we are sharing our blog’s traffic report in this landmarking article. Currently, we are getting in-between 800-1000 pageviews every day for our blog. So in a week, we get around 4500-5000 pageviews. You can find the analytics data of our blog from last 5 months in the screenshot below. Well, that’s it for now, you can drop any questions or suggestions in the comments below, do you want to connect with us or just want to say “Hi”? here is our contact page.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986697439.41/warc/CC-MAIN-20191019164943-20191019192443-00488.warc.gz
CC-MAIN-2019-43
2,382
14
https://www.forensicfocus.com/forums/forensic-software/blacklight-2019-r1-win-macos-features-difference/
code
BlackLight 2019 R1 - Win/macOS features difference? I'm new to the tool BlackLight 2019 R1 and was wondering if there is any difference if I Install it on Windows or macOS system? Because the entire User guide screenshots are taken from macOS while in our department we use it on Windows. Is there any chance that I'm missing some features such as timeline due to the system? (I saw screenshots online that the software has a timeline but I can't find it) Examine a Mac in a Mac - that's what Blackbag always preach. Examine a Mac in a Mac - that's what Sumuri always preach. Well, only the vendor (Blackbag) can give you a definitive answer on that. I will say this, most everything you can do on a mac, you can do on Windows/Linux as well. There used to be a few custom artifacts/databases which were in proprietary unknown formats namely Spotlight's database and unified logging logs, for which you needed a mac examiner system (to process them). However since last year, both of these have now been successfully reverse engineered by myself (and blacklight too independently). Here's a shameless plug to some of my open source tools that parse these mac_apt (all in one artifact parsing tool) –> https://github.com/ydkhatri/mac_apt spotlight_parser –> https://github.com/ydkhatri/spotlight_parser UnifiedLog Reader –> https://github.com/ydkhatri/UnifiedLogReader Even mounting of APFS encrypted volumes can be handled with open source software like this APFS-fuse –> https://github.com/sgan81/apfs-fuse So other than help with imaging (target disk mode), I don't see much of a need of a mac to process a mac. There may of course be some new unknown artifact, or something else, but I don't see a "strict requirement" of having an examiner mac system any more. Blackbag removed the Timeline feature about 12 months ago, without explanation, but stated they would return it. This has not happened. I use the Timeline feature a lot, so this has forced me to use other software as my preferred analysis tool. Blacklight does a good job on Windows but I find the processing time is a problem, especially when processing and indexing all the data ( VSC etc) . I have had some issues on emails not being parsed (Windows only). Blacklight is my preferred tool for Mac OSX, I just wish they would bring back the timeline feature which is very handy in a lot of investigations. Sumuri dropped the ball when they sold Recon for Mac and then promptly stopped supporting the product after 12 months.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141515751.74/warc/CC-MAIN-20201130222609-20201201012609-00077.warc.gz
CC-MAIN-2020-50
2,498
19
https://education.vex.com/stemlabs/123/coding-fundamentals/robot-move/share
code
Show Your Learning Groups can take turns showing their projects in the Coder, then having the 123 Robot execute their project on the map. Celebrate their successes, and highlight how many possible solutions students have found during their challenges today. - Use photos or videos to capture group work through this experience. Student-Driven Visible Thinking - Archive student sequence prompt cards for use as a Choice Board activity, or at a 123 Center. These can be extra practice for students learning the 123 Robot, as well as ways for children to explain their processes and help teach their peers about what they’ve learned. - What Coder cards did you use to code your 123 Robot on its path? - Why do you think sequence is important when communicating with our 123 Robots? - Is there anything that you think makes one solution better or worse than another? Why?
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644855.6/warc/CC-MAIN-20230529105815-20230529135815-00214.warc.gz
CC-MAIN-2023-23
870
8
https://farmdawgnation.com/2009/11/24/now-featuring-rpx-authentication/
code
So, I came across an excellent gem of a WordPress Plugin today. It’s called RPX. I discovered it in the course of trying to get my OpenID authentication to work (with no luck). The OpenID plugin seems to be jacked up, but NOW I have RPX that is pure awesomeness because people can now authenticate into my site using Facebook, Google, Yahoo, OR OpenID. Now, I have required since the inception of this blog that individuals who wish to comment are required to have an account of some sort. The good news is that now you are not required to create on with a new password. Facebook, Google, Yahoo, or OpenID can verify your identity for me and allow you to comment on what I write. Cool stuff, huh?
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805708.41/warc/CC-MAIN-20171119172232-20171119192232-00655.warc.gz
CC-MAIN-2017-47
698
3