url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://iict.bas.bg/bilateral-projects.html
code
НАУЧНОИЗСЛЕДОВАТЕЛСКА ДЕЙНОСТ В ИИКТ-БАН МЕЖДУНАРОДНИ ДВУСТРАННИ ПРОЕКТИ - Microstructure and Multiscale Modelling in Bio- and Geo-Environment, Joint Research Project with Institute of Geonics, bilateral cooperation between BAS and the Academy of Sciences of Czech Republic, - Robust Scientific Computing Methods and High Performance Algorithms, Joint Research Project with Johann Radon Institute of Computational and Applied Mathematics, bilateral cooperation between BAS and the Austrian Academy of Sciences. - Multi-criteria Decision Making. Bilateral research project with the University of Malaga, Spain. - Biometrics of Face and Signature. Bilateral research project with the University of Ljubljana, Slovenia. - Study of Biomedical Data by the Methods of Multiresolution Analysis. Polyspline Wavelet Analysis in Immuno-Computations and Brain Research, Bilateral Bulgarian-Greek project, Bulgarian National Science Fund B-G-17/2005, 2005-2007.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103940327.51/warc/CC-MAIN-20220701095156-20220701125156-00383.warc.gz
CC-MAIN-2022-27
1,014
7
https://meta.discourse.org/t/please-better-describe-the-relationship-between-emails-and-notifications/175899
code
I have users who want to interact with Discourse via email a lot. One thing I’m noticing that isn’t clear to people is that notifications → emails, but maybe only sometimes. This becomes particularly confusing in these settings: … which say nothing about “send me an email when a new post occurs in a Category” I’m watching. Actually, I’m not even sure if these settings affect that case, and if so, which one — it’s not a message, nor is it a quote, reply, mention, or invite. I also sometimes struggle with the way the user preferences are categorized and described. If you have specific suggestions for improving it, with specific rationale and proposed better copy, let us know. One improvement I’d agree with is that the notifications > categories / tags preference sub-sections is where you determine which categories and tags you are watching but it doesn’t indicate there when you will be emailed. I think that goes along with this email preference: I guess this could be changed to something like this to include the topics being watched because of category/tag notification settings: Send me an email when someone posts to a category or tag I am watching, quotes me, replies to a post I wrote, mentions my @username, or invites me to a topic. I’ve added “, and also regarding categories and topics I’m watching.” to the standard text in the screenshot above. This isn’t perfect either, for instance it doesn’t mention watching tags. There are some topics about the email and notification confusion and I think there are some suggestions for improvement there. I’ve been reviewing the previous forum discussions on this, (fact checking for a topic I was involved in) and I’m wondering if part of the previous confusions are due to a difference in mental model (because of greater familiarity?) between the discourse devs and everyone else… My basic model for the current behavior would be: - Notifications are about which pieces of data Discourse tries to highlight for my attention. - Email settings specify which delivery mechanisms I prefer for getting my notifications. Note: this is already missing some subtleties: - unread posts show up next to the topic in certain modes. This is not a notification, as such, but it’s linked to/controlled under the notification settings. - Invitations to a topic are emailed based on the option that I associate with “notification deliveries,” but in my mind are more akin to a specialized personal message. (As opposed to @mentions, which are public within the topic.) If the team is using a different conceptual model, maybe explaining that model would help the community to give more useful feedback on settings and descriptions. If the team’s conceptual model can’t be broken down to ~3 bullet points, maybe it’s time to revisit the model? I think the unspoken question here is, as often, how can a user avoid missing out without having to log in all the time? Ultimately the answer here is that the defaults are fine. Even if you change nothing, you will be notified about everything you need to know, even if you don’t log in on a regular basis. But because it’s a forum and not a mailing list, the experience will always be better if you log in to join discussions and to see what notifications are popping up for you, and to click the link in emails you do receive to read the topic on the site and engage there. For those people who really truly never want to log in we offer mailing list mode.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103624904.34/warc/CC-MAIN-20220629054527-20220629084527-00290.warc.gz
CC-MAIN-2022-27
3,512
20
https://www.sitefinity.com/developer-network/forums/suggestions---/theme-switching-front-end-functionality
code
25 Nov 2005 12 Feb 2011 Link to this post I just looked at an old site of mine where I implmented the ability for the user to have different font sizes small | normal | big Could it make sense to have a Theme Switching Widget kind of like the language widget. Benefits could be - Different themes for different font sizes and stuff - Different themes like spring / fall (or just blue, green, red) for the client to choose - A print theme (mostly just a @print css) funkionallity easely included. Just some wild ideas. I think the whole print stuff is a commen requirement which would be nice to have something out of the box. Brainstorming is wellcome I guess. Also how you do it now.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221219692.98/warc/CC-MAIN-20180822065454-20180822085454-00191.warc.gz
CC-MAIN-2018-34
684
12
https://docs.microsoft.com/en-us/microsoft-365/compliance/compliance-score-setup
code
Microsoft Compliance Score (Preview) setup Before you begin The Microsoft 365 global administrator for your organization will likely be the first user to access Compliance Score. We recommend the global admin sign in and set user permissions as outlined below when visiting Compliance Score for the first time. - Go to the Microsoft 365 compliance center and sign in with your Microsoft 365 global admin account. - Select Compliance Score on the left navigation pane. You should then see your Compliance Score dashboard with your score. Set user permissions and assign roles Compliance Score uses a role-based access control (RBAC) permission model. Only users who are assigned a role may access Compliance Score, and the actions allowed by each user are restricted by role type. Where to set permissions The global admin for your organization can set user permissions in the Microsoft 365 compliance center or in Azure Active Directory (Azure AD). Once roles are set in either of these locations, users will be able to access Compliance Score (as well as Compliance Manager). Note that existing Compliance Manger roles do not transfer over to Compliance Score. This means that if you were previously assigned a role in Compliance Manager, that role will not grant you access to Compliance Score. Your global admin will need to set permissions and a role for you in the Microsoft 365 compliance center or Azure AD so that you can access Compliance Score. The table below shows how each Microsoft 365 compliance center role maps to existing Compliance Manger roles, and the functions allowed by each role. |User can:||Microsoft 365 compliance center role||Compliance Manager role| |Read but not edit data||Azure AD global reader||Azure AD global reader| |Read but not edit data||Security reader||Compliance Manager reader| |Edit data||Compliance administrator||Compliance Manager contributor| |Edit test results||Compliance administrator||Compliance Manager assessor| |Manage assessments, and template and tenant data||Compliance administrator Compliance data administrator |Compliance Manager administrator| |Assign users||Global administrator||Portal admin| When you go from Compliance Score to Compliance Manager to complete a task (for example, to manage assessments), your browser will open a new tab and a dialog box appears. In the top section with the header, “Already a Microsoft cloud services customer? Sign in to your account,” select Sign In to access Compliance Manager; you will not need to re-enter your credentials. How to set permissions and roles in the Microsoft 365 compliance center To set permissions in the Microsoft 365 compliance center: - Go to the Microsoft 365 compliance center and sign in with your global admin account. - Select Permissions on the left navigation pane. From here, you can view roles and assign permissions. Configure automatic Secure Score updates By default, all new tenants have Secure Score automatic updates turned on. This means that all actions that are monitored by Secure Score will automatically update the status for the same action in Compliance Score. Your global administrator can manage this setting to turn off automatic updates for all actions, or set updates for actions individually. During public preview, you will need to go to the Microsoft Service Trust Portal (where Compliance Manger is located) to manage Secure Score updates. To manage automatic Secure Score updates, follow these steps: Sign in to the Service Trust Portal with your global administrator account. On the Service Trust Portal top menu bar, under More, select Admin and then choose Settings. In the Secure Score tab, select the corresponding button to either turn on for all actions, turn off for all actions, or set per action. If you choose set per action, take these additional steps to turn on Secure Score updates for individual actions: Select Compliance Manager from the top menu (note: do not select "Compliance Manager (classic)"). Select Tenant Management in the upper-right corner of your screen. On the Customer Actions pane, find your intended action with an ellipsis (...) under the Affected Actions column. Click on the ellipses and select Edit. Switch the Secure Score continuous update toggle switch to On. Select Save. Secure Score continuous monitoring is now turned on for that action. Note: Only the global administrator can turn on or off automatic updates for all actions. The Compliance Manager administrator can turn on automatic updates for individual actions, but not for all actions globally. Read more about managing Secure Score updates. Understand the Compliance Score dashboard The Compliance Score dashboard is designed to provide you an at-a-glance view of your current compliance posture. Overall compliance score Your compliance score, featured prominently at the top, shows a percentage based on points achievable for completing improvement actions addressing key data protection standards and regulations. When you come to Compliance Score for the first time, your initial score is based on the built-in Microsoft 365 data protection baseline—a set of controls that includes common industry regulations and standards. Because Compliance Score scans your system of existing Microsoft 365 solutions, it gives an initial assessment of your compliance posture based on privacy and security settings currently enabled by your organization. As you add assessments that are relevant to your organization, your score becomes even more meaningful. Learn more about how your score is calculated. Key improvement actions This section lists the top improvement actions you can take right now to make the largest positive impact on your overall compliance score. It lists actions that are not completed or failed with the assessment with high risks. Solutions that affect your score This section shows which solutions contain actions with the greatest opportunity to positively impact your score, and how many outstanding improvement actions you have in each solution. Compliance Score breakdown This section gives you a more detailed view of your score in two different ways: - Categories: shows the percentage of your overall score within data protection categories, such as “protect information” or “manage devices.” - Assessments: shows the percentage of your progress in managing assessments for particular compliance and data protection standards, regulations, or laws, such as GDPR or NIST 800-53. Filtering your dashboard view You can filter your dashboard view to see only the items related to particular regulations and standards, solutions, type of action, groups of assessments you set up, or data protection categories. Filtering your view in this way will also filter the score on your dashboard, showing how many points you’ve achieved out of total possible points based on your filter criteria. To apply filters: - Select Filter on the upper-right side of the dashboard. - Select your filter criteria from the flyout Filters pane, then select Apply. Once a filter is applied, you will see your score adjusted in real-time. The compliance score percentage and breakdown information, and the improvement actions and solutions, now only pertain to data covered by your filter criteria. If you sign out of Compliance Score, your filtered view remains when you sign back in. To remove filters: - At the Applied filters heading above your compliance score, select the X next to the individual filter you want to remove; or - Select Filter on the upper-right side of your dashboard, then select Clear filters. Visit Working with Compliance Score to understand the workflow of how to take actions to improve your score.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145746.24/warc/CC-MAIN-20200223032129-20200223062129-00266.warc.gz
CC-MAIN-2020-10
7,707
65
https://www.knoldus.com/connect/jobs/srconsultant.knol
code
Knoldus is an organization which helps partners right from Startups to Fortune 500 realize their product dream. The products that we create are Scalable, Resilient and highly performant. They would harness the power of the machine like no other. The technology of choice are based on the Typesafe stack augmented with strong Agile focus and skills of the team at Knoldus. We are one of the forerunners on Big Data Analytics and Big Data Crunching using functional programming. Experience with Java/JEE and open source frameworks. Strong OOPS knowledge, functional programming including experience with design patterns. Experience with databases like MySQL/Oracle, MongoDB, Cassandra, Riak, Neo4j. Exposure to Web Services - SOAP and RESTFUL. Exposure to Agile/Scrum, TDD, Continuous Integration tools like Jenkins, Bamboo etc. Taking complete ownership of technical solution and ensure technical expectations of deliverables are met. Experience in leading teams in Agile environment and a good understanding of Agile methods. Experience with â Hadoop, Storm and/or Spark, Scalaâ will be a big plus. Be responsible for the technical design and experience in guiding/mentoring others. Able to work in a no-hierarchy environment, and fast sprint work cycles. Excellent analytical aptitude and problem solving skills. Excellent communication and customer interfacing skill. Constantly upgrade self-knowledge & share with team. Team player skills. At Knoldus respect comes with knowledge and not with years of experience. Blogger, Conference Speaker, Open Source Contributor. Timely and successful completion of assignments. Communicating Project status/Issues etc, on time and efficiently Adherence to the quality process defined for the project Adherence to the operational process defined for the company Constantly updating technical knowledge and skills by attending in-house and/or external courses, reading manuals ,accessing new applications and investigating new technologies Problem-solving and thinking laterally as part of a team, or individually, to meet the needs of the project Should be able to contribute in estimation for modules/tasks Help in recruitments. Mentoring Trainees/Junior Consultants Enhancing and maintaining work culture & environment Expertise in object-oriented programming with strong coding and debugging abilities. Ability to resolve technical queries/issues of their team members. Grasp the big picture, and be curious about and engaged in the broader world. Nimble and flexible enough to thrive in a rapidly evolving business environment. An independent thinker and not a technologist who just executes on specs. Able to have big thoughts and the courage to voice them. Enthusiastic for emerging technologies. 3 to 7 years of industry experience. M Tech/MS/MCA/BTech in computer science, information systems, or similar technical field would be the preferred. Draw a line between Http/1.1 and Http/2 Client on 18th July, 2019 at 10:00 PM IST / 12:30 PM EDT Register here!
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525004.24/warc/CC-MAIN-20190717001433-20190717023433-00481.warc.gz
CC-MAIN-2019-30
3,007
35
https://svencharleer.com/category/development/
code
This must have been my favorite project during my time at academia. This article is also available on Medium. My PhD was funded through multiple (European and smaller) projects, on topics such as Learning Analytics, Digital Humanities, and Unemployment. And they were interesting: I designed data visualizations on tabletops, desktop, and mobile, I researched the user’s perception and experience… all fun and games. But no, not games. I’ve always had a soft spot for games. I moved abroad for two years (and had my wife give up a great job) just so I could live the dream and be a game developer (a story for another time perhaps). And combining my research with games was something I had dreamed of for quite a while. Alas, no funding to support this research. But life finds a way, right? ;) Students to the Rescue Students! Of course! Every year we had new Master in Engineering students working on both fun (and sometimes boring) Master thesis topics. So I introduced a new one: eSports dashboards to support spectators. The high paced action of different players across large battlefields is not easy to follow. So how could we help spectators get better insights in what was going on, real-time, during these hectic games played by professional gamers. A huge success among students, but sadly enough spots were limited, and two students “won the lottery” (we have no say in the matter. It’s quite random): Hans Cauwenbergh and Bram Luycx. And we got lucky. This turned out to be one of the best collaborations with students ever. Hans jumped on League of Legends, while Bram took on Counter-strike: Global Offensive. We designed and set up a couple of surveys on Reddit in order to get insights in spectators’ motivations and perceived usefulness for different statistics provided by the respective games to inform the design of the dashboards. And then, they were off! League of Legends The dashboard is the result of five iterations: two digital non-interactive designs, two interactive prototypes, and the final fully functioning prototype developed with React.js and D3.js. Iteration one to four were developed using the interface design tool Figma. 22 participants took part in the evaluations of the iterations of the prototypes. The main view is split in three modules: Gold, Damage, and Vulnerability. All modules are continuously updated in real-time. Gold and Damage are quite obvious. Let me explain Vulnerability. Vulnerability provides an indication of how vulnerable each player is. A simple linear equation combines the position disadvantage of the player to the rest of the team and/or enemies, current health and mana points, defensive statistics and summoner spells availability. These values are combined and visualized around the player icon as a summary indicator. This view lets spectators make predictions regarding the state of the game. Hans also added an interesting Jungler visualisation: Counter-strike: Global Offensive This dashboard is the result of three iterations: a paper prototype, a non-interactive digital prototype designed using Figma, and a fully functioning prototype developed with React.js and D3.js. 14 participants took part in the evaluations of the iterations. The dashboard consists of Round Progression, Economy, Map, Scoreboard, Money Distribution, and Average Damage per Round. Through semi-structured interviews and eye-tracking we managed to get further insights into the perception and experience of participants spectating these eSports games while using our dashboards. It resulted in an interesting list of design goals for spectator dashboards that we published and presented at CHI PLAY 2018 in Melbourne, Australia. I’ll refrain from turning this digestible blog post into a long scientific article. But if you are interested in the guidelines, you can find the article here. Or go through the slides below! If there is enough interest, I’ll post a summary of the guidelines on Medium ;) Just let me know in the comments! Hans (full-time) and I (freelance part-time) haven’t stopped here though and are working for GRID eSports Gmbh where a lot of eSports data magic is happening! Next to that, I’m a Freelance Data Visualisation Experience Designer/Adviser. I’m for hire, so if you have any dataviz needs, send me a message!
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647614.56/warc/CC-MAIN-20230601042457-20230601072457-00289.warc.gz
CC-MAIN-2023-23
4,318
23
https://practicaldev-herokuapp-com.global.ssl.fastly.net/ben/who-wants-to-post-videos-natively-on-devto-51f5
code
We want all you glorious devs to upload videos! We had started doing some videos in collaboration with a couple of members, for example: We have had these videos on-site for a while now, but initially our video experience was pretty iffy. Is anyone else experiencing issues playing the video? I am on Firefox (tried a few different networks). Edit: Oh, videos do not work in Firefox! Actually. Edit edit: Firefox seems to buffer the entire video before playback starts. But we made a lot of improvements and playback is much improved. It better be, I put a lot of work into making the transcoding work properly and automatically. Everyone will soon be welcome to upload programming videos to the platform now. Warning, the upload process is still quite ugly but it seems to work for the most part. But we're not going to sit around until the UX is perfect. We'd love to have a handful of folks give this a try and start uploading tutorials, vlogs, or anything in between. Even though the early days are janky, this should be a great part of dev.to and ultimately I think this is going to make videos folks make much more discoverable, contextualized, and with healthier discussions than on YouTube. Leave a comment here if you want me to switch on your access. Please link to an example of a video you've made in the past or describe the kinds of videos you plan to share. Basically show that you are legit in some way, that you plan to upload videos soon. Posting videos you've already posted to YouTube is 100% okay. Regular dev.to users with lots of on-site activity will have a lower burden of proof. Eventually this will be available for everyone, but will be limited early on.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358786.67/warc/CC-MAIN-20211129164711-20211129194711-00326.warc.gz
CC-MAIN-2021-49
1,682
12
http://www.nrcweb.org/outreachitem.aspx?nNRCID=80&nActivityID=17921
code
Center for Russian, East European, and Eurasian Studies <- Back Film Screening/Lecture. The film Russian "Pilots" with commentary by visiting historian, Scott Palmer. University of Kansas During the course of the semester, our Center offers a monthly viewing of a popular movie from the region. These movies are not only great language tools, but also help students to better understand the target culture.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368711406217/warc/CC-MAIN-20130516133646-00069-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
406
4
https://researchdata.edu.au/discovery-projects-grant-id-dp160103005/664127
code
[Cite as http://purl.org/au-research/grants/arc/DP160103005] Researchers A/Prof Michael Lee Brief description This project aims to address a high-profile evolutionary controversy – the origin of snakes – by reconciling the anatomical and fossil evidence with the burgeoning genomic data. New genomic data surprisingly links snakes with the un-snakelike iguana, prompting claims that the genetic and the fossil/anatomical data are irreconcilable. The project aims to evaluate these key fossils, and reptile anatomy in general, in light of the new genomic tree. This has potential to greatly elucidate major evolutionary changes across the lizard-snake transition (for example, extensive mobility in the snake skull). The project also plans to assess the long-term evolutionary consequences of ‘snakiness’, such as the hypothesised irreversibility of limb loss, and increased resilience to mass extinction. Funding Amount $351,100 Funding Scheme Discovery Projects
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703547475.44/warc/CC-MAIN-20210124075754-20210124105754-00454.warc.gz
CC-MAIN-2021-04
970
5
https://neuvoo.pl/view/?id=ffe143e0469f
code
Salary : PLN per month : 8.5k-11.5k (B2B), 8.5k-11.5k (UZ). Requirements : Java, Spring, Hibernate, Git, REST. Tools : YouTrack, Wiki, GitLab, GitHub, SonarQube, GIT, GitLab CI, Agile, Scrum. Additionally : Private healthcare, Team Events, Private health care, Free coffee, Bike parking, Playroom, Shower, Free snacks, Free parking, No dress code, Kitchen. Thank you for reporting this job! Your feedback will help us improve the quality of our services.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107863364.0/warc/CC-MAIN-20201019145901-20201019175901-00645.warc.gz
CC-MAIN-2020-45
454
6
https://wiki.edmcouncil.org/pages/diffpagesbyversion.action?pageId=786661&originalVersion=181&revisedVersion=200
code
Note: Our meeting schedule has changed. As of the week of April 11th, 2022, the FIBO Securities (SEC) FCT will be has been combined with the FIBO Indices and Indicators (IND) FCT and will meet meets Friday mornings at 9 am pacific time / noon eastern time. The FIBO-SEC FCT meets weekly on Friday at 9 am pacific / 11 am central / 12 pm eastern. Our next several meetings are listed below. Meeting link: https://thematixpartnersllc.my.webex.com/thematixpartnersllc.my/j.php?MTID=m7c7486099cda1c58b9b62b0648de36bb Meeting number (access code): 126 751 3761 Meeting password: FIBOind2020 (34264632 from phones and video systems) Join by Phone: +1-415-655-0001 (US Toll) Global call-in numbers: https://thematixpartnersllc.my.webex.com/thematixpartnersllc.my/globalcallin.php?MTID=mf5ea8c9a7b1cc77009a1b98e1f1f5873 JOIN BY VIDEO SYSTEM, APPLICATION OR SKYPE FOR BUSINESS Dial sip:[email protected] You can also dial 184.108.40.206 and enter your meeting number. Please feel free to reach out to our moderator, Elisa Kendall, if you have issues joining the meeting. Next few meetings: Nov 18th - working session Nov 25th - working session (most members will be available despite the Thanksgiving holiday) Dec 2nd Apr 29th - working session May 6th - at risk Dec 9th - no telecon due to the Knowledge Graph Conference in NYCOMG technical meeting in Austin Dec 16th May 13th - working sessionMay 20th Dec 23rd - working session Dec 30th - no telecon due to the holidays Jan 6th May 27th - working session Jun 3rd Jan 13th - working sessionJun 10th Jan 20th - working session Jun 17th Jan 27th - working sessionJun 24th - no telecon due to the OMG Technical Meeting in Orlando
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100112.41/warc/CC-MAIN-20231129141108-20231129171108-00406.warc.gz
CC-MAIN-2023-50
1,669
21
https://collaborate.pega.com/question/question-about-relaystate-saml-authentification
code
When using Service Provider initiated request, when you access the Pega URL first, we generate the RelayState and send it with the SAMLRequest to the IDP. The IDP will then echos it back along with the SAMLResponse to the AssertionConsumerService. The RelayState is generate value and in a database record associated we store the original URL the user requested. The AssertionConsumerSerivce then redirects back to that original URL after it's done processing. (IDP shouldn't have to do anything here) When using a IDP initiated request, when you access the IDP first, we require a RelayState parameter along with the SAMLResponse. The value should be the URL of the requested resource. For example https://<prpc_host>/prweb/PRAuth/<AuthAlias>. This is important because with the Pega Platform your AuthService record is the access point and part of the relationship created between SP and IDP. Since you can define more than one AuthService record the IDP has to at least use the AuthService URL as the default RelayState for IDP initiated requests. You should not modify the ACS processing to set the default RelayState when one is not provided. Some IDP's have a way to set default RelayState as part of the relationship configuration, example Okta. Others require the default RelayState to be a parameter in the initial IDP initiated request. For SP initiated request the sent RelayState should be echoed back. You shouldn't have to "force" anyone to do anything...this is part of normal SAML 2.0 and unless you're using some custom developed IDP you shouldn't have a problem with this. The RelayState also has nothing to do with determining if the SAMLResponse received was initiated from a Request from Pega. That is handled with normal SAML attributes like "inResponseTo".
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703496947.2/warc/CC-MAIN-20210115194851-20210115224851-00221.warc.gz
CC-MAIN-2021-04
1,779
4
https://www.blogsolute.com/uninstall-windows-media-player-12/2447/
code
Uninstall Windows Media Player 12 Upgraded to Windows 7, but don’t like the Windows Media player 12 / WMP 12 which is present by default. If you fall in these category of people then uninstall WMP 12 and use the earlier version you like. Follow the tutorial step by step to remove WMP 12 and downgrade / replace with Windows media player 11. 2. Now Type services.msc on windows 7 search bar 3. Stop Windows Media Player Network Sharing Service. 4. Take Ownership of following files All files in “Program Files\Windows Media Player\” folder All files starting with “wmp” in System32 folder wmploc.dll.mui in “Sytem32\en-us\” folder 5. Now Run Windows Media Player 11 Installer 6. Now type Regedit on Start Menu Search bar 7. Delete following Registry key (Don’t forget to take Backup of Registry before modifying registry /editing/deleting any registry key) 8. Finally, go to C:\Program Files\Windows Media Player, right click wmplayer.exe and in the details tab copy the “Product Version” (eg in my pc it’s 11.0.6000.6324). Then open regedit again, open “HKEY_LOCAL_MACHINE\Software\Microsoft\MediaPlayer\PlayerUpgrade\PlayerVersion”, and replace the value with the one you copied before, but where you see dots, replace them with commas. Personally, I removed WMP 12 before of tagging problem and its executing speed. So, I searched for procedure and compiled from the search results. Thanks Sandip.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233508959.20/warc/CC-MAIN-20230925083430-20230925113430-00857.warc.gz
CC-MAIN-2023-40
1,426
15
https://www.biztalkgurus.com/blogs/msft-biztalk-community/export-biztalk-server-msi-packages-directly-from-visual-studio-using-btsmsitask-2/
code
Getting a full Continuous Integration (CI) process working with BizTalk Server is hard! One of the big advantages in a working CI process is to always have tested and verified artifacts from the build server to deploy into test and production. Packaging these build resources into a deployable unit is however notorious hard in BizTalk Server as a Visual Studio build will not provide a deployable artifact (only raw dlls). The only way to get a deployable MSI package for BizTalk Server is to first install everything into the server and then export – until now. Why Continuous Integration? Continuous Integration is a concept first described by Martin Fowler back in 2006. At its core its about team communication and fast feedback but also often leads to better quality software and more efficient processes. A CI process usually works something like the above picture. A developer checks in code to the source control server. The build server detects that a check in has occurred, gets all the new code and initiates a new build while also running all the relevant unit tests. The result from the build and the tests are sent back to the team of developers and provides them with a up to date view of the “health” in the project. If the build and all the test are successful the built and tested resources are written to a deploy area. As one can see the CI build server acts as another developer on the team but always builds everything on a fresh machine and bases everything on what is actually checked in to source control – guaranteeing that nothing is build using artifacts that for some reasons is not in source control or that some special setting etc is required to achieve a successful build. In step 4 above the CI server also writes everything to a deploy area. A golden rule for a CI workflow is to use artifacts and packages from this area for further deployment to test and production environments – and never directly build and move artifacts from developer machines! As all resources from each successful build is stored safely and labeled one automatically achieves versioning and the possibility to roll back to previous versions and packages if needed. What is the problem with CI and BizTalk? It is important to have the build and feedback process as efficient as possible to enable frequent checkins and to catch possible errors and mistake directly. As mentioned it is equally as important that the resources are written to the deploy area are the ones used to deploy to test and production so one gets all the advantages with versioning and roll back possibilities etc. The problem with BizTalk Server is however that only building a project in Visual Studio does not gives us a deployable package (only raw dlls)! There are a number of different ways to get around this. One popular option is to automate the whole installation of the dlls generated in the build. This not only requires a whole lot of scripting and work, it also requires a full BizTalk Server installation on the build server. The automated process of installation also takes time and slows down the feedback loop back to development team. There are however great frameworks as for example the BizTalk Deployment Framework to help with this (this solution of course also enables integration testing using BizUnit and other framework). Some people would also argue that the whole script package and the raw dlls could be moved onto test and production and viewed on as a deployment package. But MSI is a powerful packaging tool and BizTalk Server has a number of specialized features around MSI. As MSI also is so simple and flexible it usually the preferred solution by IT operations. A final possibility is of course to directly add the resources one by one using BizTalk Server Administration console. In more complex solutions this however takes time and requires deeper knowledge into the solution as one manually has to know in what order the different resources should be added. Another option in BtsMsiTask Another option is then to use BtsMsiTask to directly generate a BizTalk Server MSI from the Visual Studio build and MsBuild. The BtsMsiTask uses same approach and tools as the MSI export process implemented into BizTalk Server but extracts it into a MSBuild task that can be directly executed as part of the build process. BtsMsiTask enables the CI server to generate a deployable MSI package directly from the Visual Studio based build without having to first install into BizTalk Server!
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100912.91/warc/CC-MAIN-20231209134916-20231209164916-00646.warc.gz
CC-MAIN-2023-50
4,510
22
https://www.physicsforums.com/threads/a-question-in-keplers-second-and-third-laws.55771/
code
I am doing this project on kepler's law and can't figure out something. part a (in the process of proving kepler's second law)of this is to show that h = |r|^2(d(theta)/dt) k when r = (|r|cos(theta))i + (|r|sin(theta))j and h = r x r' = r x v. I showed it by taking derivative of r and cross producting it with the original r. I did this part, but now i don't know how to deduce that r^2(d(theta)/dt) = |h|. I actually have no understang of what h represents and stuff. If you can explain to me how to deduce this relationship, it would be helpful. Another question that's about proving kepler's third law is that i have to show that h^2/(GM) = ed = b^2/a. Its previous part was to show that T = 2(pi)ab/h (where a=major axis, b=minor axis) and h = the magnitude of vector h). I proved it using the second law of kepler and showing T is equal to the total area divided by the rate of the area swept by the planet. I don't know what e and d are though. any clues? and how might i approach this problem(showing that h^2/(GM) = ed = b^2/a)?
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512679.76/warc/CC-MAIN-20181020080138-20181020101638-00208.warc.gz
CC-MAIN-2018-43
1,037
1
https://www.dtechy.com/machine-cycle/
code
Machine Cycle Definition A Machine cycle, also known as instruction cycle or a processor cycle. In computer architecture, it is also sometimes called as (fetch-decode-execute cycle). The Machine cycle consist of a sequence of three steps, which includes fetch, decode and execute. But actually there are four steps in the Machine cycle, the fourth one is Store. In the fetch process, the control unit of the microprocessor retrieve the instruction from the main memory (RAM), that is stored at the address indicated by the Program counter. The Control unit in the CPU decodes the instruction in the Instruction register. Decoding the instruction in the IR involves the splitting the operand field into its components depending upon the Opcode. After the Instruction and data is fetched and decoded the instruction is executed by the ALU (arithmetic logical unit) of the CPU. The output of the instruction is generated at this stage. This whole process of generating the output is known as execution (execution cycle). After the Output is generated the computer stores the results in the memory for later use. As soon as the instruction is executed and results are saved, machine cycle is restarted and begins with fetch cycle again.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337625.5/warc/CC-MAIN-20221005105356-20221005135356-00389.warc.gz
CC-MAIN-2022-40
1,232
7
https://www.wowebook.com/book/gamesalad-beginners-guide/
code
GameSalad: Beginner’s Guide GameSalad is as an easy to use Game development platform that can be used to develop games without having to write any code. That way, with GameSalad, you don’t have to worry about debugging and testing. Once you learn to use GameSalad, you will be able to build games within days. GameSalad Beginner’s Guide will give you a detailed overview of the tool and teach you how to use it to build your best game along with the author’s very own tips and tricks to design an interesting game. This book will take you through the different steps of building a game with GameSalad. As an example, the book will build three games that will enable you to work on any kind of game with GameSalad. The book begins with some tips from the author to design a game that everyone will want to play and how to plan for it. Then we move on to setting up GameSalad and building projects in it. Once the tool is set up, the book moves on to creating and working with sprites. The next section of the book includes building a whole ball drop game including gravity, touch controls, triggers and particle effects. The second game that the book builds is the space defender. It includes building an interesting user interface, enemies, explosions, space ship movements and testing this game on iDevices. The third game is Metal Mech. This chapter includes sound effects, particle explosions, and numerous enemies, setting up Game Center Leader boards, and getting ready for App store. The last section of the book discusses how to get started with developing for iDevices. What you will learn from this book - Planning and designing an original game - Creating storyboards and detailing characters and the story of the game - Create new projects, and get familiar with Actor Behaviours, Keyboard Controls, Collisions and how to preview your game without deploying it to a device, and prototyping your game, putting your idea together with no complexities just to see if it all works - Design sprites and import them into GameSalad for use in their game; how to trigger a sound effect, and how to make use of GameSalad’s particle engine to spruce up the overall look of your game - Create the canvas of the game finished and add behaviours to the actors - Add gravity, physics, and collisions to your game along with touch controls - Creating user Interface and button & touch controls - Wrapping Actors around levels and controlling their movements - Adding sound effects and getting your game ready for the App store This book is a step-by-step, tutorial-driven guide to game development using GameSalad. You will learn through first-hand experience how a GameSalad developer goes from literally nothing to a finished game. Along the way there are illustrations to explain anything that could be difficult and to display screenshots of the games. In addition, every art and audio asset required by the tutorials is provided, so you can start building your game right away. Who this book is for If you are a game enthusiast, who is looking to build games with GameSalad quickly, then this book is for you. You need not know any programming. The book does not deal with GameSalad’s installation and basic set up. The ideal reader would know how to install and set up GameSalad. - Paperback: 308 pages - Publisher: Packt Publishing (March 2012) - Language: English - ISBN-10: 1849692203 - ISBN-13: 978-1849692205
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816904.18/warc/CC-MAIN-20240414223349-20240415013349-00829.warc.gz
CC-MAIN-2024-18
3,427
24
https://www.nintendo.com/de-ch/Rechtliche-Informationen/Urheberrecht/Copyrights-von-Nintendo-und-Drittfirmen-655030.html
code
COPYRIGHT AND PERMISSION NOTICE Permission is hereby granted, free of charge, to any person obtaining a copy of the Unicode data files and any associated documentation (the "Data Files") or Unicode software and any associated documentation (the "Software") to deal in the Data Files or Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, and/or sell copies of the Data Files or Software, and to permit persons to whom the Data Files or Software are furnished to do so, provided that either (a) this copyright and permission notice appear with all copies of the Data Files or Software, or (b) this copyright and permission notice appear in associated Documentation. THE DATA FILES AND SOFTWARE ARE PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THE DATA FILES OR SOFTWARE. Except as contained in this notice, the name of a copyright holder shall not be used in advertising or otherwise to promote the sale, use or other dealings in these Data Files or Software without prior written authorization of the copyright holder. © 2024 Nintendo.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817253.5/warc/CC-MAIN-20240419013002-20240419043002-00012.warc.gz
CC-MAIN-2024-18
1,621
5
https://boards.greenhouse.io/chronosphere/jobs/4284187003?gh_src=eaf14f263us
code
Chronosphere is the provider of the only observability platform that puts engineering organizations back in control by taming rampant data growth and cloud-native complexity, delivering increased business confidence. Teams at startups to well-known global brands in the Fortune 500 around the world trust Chronosphere to help them operate scalable, highly available and resilient applications. Chronosphere is looking for trailblazers who are experts in their space and are passionate about creating meaningful solutions for engineers and digital businesses. Chronosphere is a series C startup with more than $250M in funding and a $1B+ valuation. We’re a remote-first company, backed by Greylock, Lux Capital, General Atlantic, Addition and Founders Fund. About the role As a key member of the infrastructure engineering team, you will design and build a runtime environment that layers on top of cloud infrastructure to form the backbone of our reliability, efficiency, and operability. This is a hands-on software development role that focuses on infrastructure systems that are used by the entire engineering and field organizations. You might be working on a global control plane that bridges Kubernetes clusters across the world, building deployment tools to safely control the rollout of tens of thousands of high load time series database nodes, or optimizing critical portions of our stack to push cloud capacity as far as it can go. Regardless of the project, you’ll leverage your deep understanding of cloud infrastructure, strong system software development skills, and empathy for other developers to build an infrastructure product that impacts teams across engineering. - Design, implement, and operate system level services and developer tools in Go on top of Kubernetes/GCP/AWS/Azure, with a focus on reliability, efficiency, and operability. - Collaborate with other engineers and with the business to identify the highest priority needs of the organization, and maintain a roadmap to address those needs. - Refine the way we build and release the platform by contributing to build systems, test frameworks, deployment tools and monitoring What you will achieve In the first month, you will build a deep understanding of Chronosphere’s business and platform and begin contributing to the product. You will have time to learn about the space, our customer’s needs, and the underlying technology. Within 90 days, you will have shipped several enhancements to our infrastructure platform and contributed to designs shaping the overall direction of the infrastructure at Chronosphere. Over time you will implement new tools and services and become the go-to person for core elements within Chronosphere’s infrastructure. - The ability to independently own projects from inception to delivery. - Deep understanding of cloud infrastructure and open source technologies such as Kubernetes, with a practical view of how to apply these technologies to achieve business outcomes. - Empathy for the problems faced by developers, and a passion for building tools and systems that address those problems. - Excellent skills in a system level language such as Go, C++, Java, C#, or Rust. Knowing a specific language isn’t important; what matters is that you’ve become fluent in one by spending a lot of time on the types of projects where these languages are used - Strong interest in how things work. Building software at this layer requires you continue to go deep into the systems you depend on, and not just take documentation at face value. Curiosity and persistence is key to building the understanding needed to apply - A flexible, collaborative working style. We’re a small team working in a rapidly evolving space, and we’re looking for people that will help build a positive, supportive environment. United States - Remote #LI-Remote Reporting to Mantas Klasavicius, Head of Engineering, Europe - Health Insurance Coverage - Free Lunches - Unlimited Vacation Time - Competitive Salary - Stock Options - And More Chronosphere is an equal opportunity employer. You're encouraged to apply even if your experience doesn't line up exactly with the job description. Your skills, passion, and desire to make a difference will stand out. At Chronosphere, we welcome diverse perspectives and people who think rigorously and aren't afraid to challenge the standard. If you need additional accommodations to feel comfortable during your interview process, please email us at [email protected]
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710980.82/warc/CC-MAIN-20221204204504-20221204234504-00860.warc.gz
CC-MAIN-2022-49
4,526
26
http://www.newgrounds.com/portal/view/404972/review_page/10?footer_feature=channels
code
Possibly the most evil cartoon series on the planet. Life isn't easy when you're a disembodied head without skin. Follow Dr. Shroud in these serials as he tries to find his missing daughter in the vampire-ridden city of Necropolis! My entry for the Halloween Contest. Lights out and sound up for maximum enjoyment! :D I'll probably turn this into a series. Thanks to John Hodge (carlhyperweevil) for doing some of the voices.
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021097827/warc/CC-MAIN-20140305120457-00060-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
425
6
http://forums.amd.com/game/messageview.cfm?catid=449&threadid=164174&enterthread=y&STARTPAGE=1
code
The graphics card im running is the AMD Radeon HD6800 AMD Catalyst Driver Version, and Driver History Currently running version 13.1, but used serveral before without issue Windows 7 64 bit Basically the issue is hdmi cable is connected from card ->TV as its has awlays been, woke up today after no updates being done previouslythe amd hdmi output is no longer registering that its plugged in, tried different hdmi cables etc. and I can still run videos etc. But under hdmi output it says not plugged in.
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246640001.64/warc/CC-MAIN-20150417045720-00281-ip-10-235-10-82.ec2.internal.warc.gz
CC-MAIN-2015-18
504
5
https://wordpress.org/support/topic/problem-reading-a-wp-22x-feed-on-wp-223
code
I have parent and child installations of WordPress. They use the feedlist plugin to display each others' headlines. They were running WP 2.0.6 and all was well. I upgraded the child to 2.2.1 and all was well. Then I upgraded the parent to 2.2.3 and the parent could show several other feeds through feedlist, but could no longer display this particular child's headlines. [Didn't check the other direction since the parent isn't out of test yet.] Problem feed: rwc.aauwnc.org/feed/ which looks fine in all the other RSS display tools I've checked. I turned off all plugins (including feedlist) in the parent and investigated using the sample code for fetch_rss, and couldn't show the headlines from the child until I added include_once(ABSPATH . WPINC . '/rss-functions.php'); to the page that was trying to display the headlines. Is that an appropriate workaround for fetch_rss? Should its documentation be changed to include rss-functions.php INSTEAD of rss.php?? Is it okay to include them both?
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257823935.18/warc/CC-MAIN-20160723071023-00261-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
998
8
https://ladyjupiter.com/tag/milso/page/2/
code
One of the defining traits of a military marriage or career is the need to… Quick chat about my Key Spouse folio; how I organize information. This is military-specific for me, but the organization style is universal! #Moleskine #folio #KeySpouse New week, new picks! This week has a military slant, but isn’t only for military families. #picksoftheweek #Huel #Nespresso Most people have different friend groups, that’s good and normal! Military spouses certainly experience the same, and here is where I talk more about three distinct types. #milso #friends #milblogger Do you ask questions in Facebook groups, but the answers given don’t suffice? Try being more specific – I have some things to look for, with examples! #communication #askingquestions #askgroups
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991772.66/warc/CC-MAIN-20210517115207-20210517145207-00428.warc.gz
CC-MAIN-2021-21
773
8
https://www.gumtree.com.au/s-classes/north-sydney/c18325l3003914
code
Want to get into Crypto but dont know where to start? Let us make it really easy for you. We can guide you step by step, get you familiar with how it works and help you get started. We have a 6 week course for absolute beginners that wish to get into Crypto trading, but don't know where to begin. Visit our website for more information about the course. https://crypto-republic.com/course First course commences on 19th of July, in North Sydney at 18:00.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487649731.59/warc/CC-MAIN-20210619203250-20210619233250-00614.warc.gz
CC-MAIN-2021-25
455
2
http://bigpondguide.com/driver-is/driver-is-hogging-interupts.php
code
This is because of the existence of onboard hardware that ESX Server does not control. MSM Utilities Might Show Incorrect Disk Drive Count After Drive Inserted or Removed (6522536) The MSM utilities might show incorrect disk drive counts after a drive is inserted or removed. Extended Vital Product Data (EVPD) is optional data provided by SCSI devices. I'm beginning to think that it could depend on the compiler (gcc 4.0 vs. http://bigpondguide.com/driver-is/driver-is-hogging-interrupts.php Maybe my card is old enough, it is PCI: 01:07.0 VGA compatible controller: S3 Inc. If you suffer the consequences, let us show you how to roll back your driver and block future... The system is not able to work without the noacpi parameter (apparently related to PATA disks). All rights reserved. The following errors are found in /var/log/messages: Mar 3 12:05:24 hostname kernel: warning: many lost ticks. How did you discover this bug? I still have some latency probs - hence messing with the driver in the first place as I read that nvidia video drivers could be the cause. The error is rather consistent: about 1.5 minutes lost every 5 minutes. Have you checked that all drivers are up-to-date? 5n4pJul 28, 2010, 12:52 AM Yes.ATI Radeon HD 4670.Up to date with the latest W7 drivers.There were a lot of related driver issues Reopen the MSM application. Workaround You can set the swap partition manually as described in the following steps. 1. Abit NF-M2 Motherboard. Samson View Public Profile Visit Samson's homepage! If Solaris detects that the workaround for Erratum 131 is needed but it is not yet implemented, Solaris logs and displays the following warning message: WARNING: BIOS microcode patch for AMD Workaround None. Try disabling the HD audio device. Interrupts are a form of communication between software and hardware with the CPU. In Windows 10, Windows Update automatically updates hardware drivers. Workaround This problem does not occur if you perform a net install. The very first one fixed it, i.e., "noapic nolapic." The clock now runs at the correct rate. How to Fix the High CPU Usage If system interrupts constantly hogs more than 5% to 10% of your CPU, something is wrong and you’re most likely dealing with a hardware checking if CPU frequency changed. Quote: Feb 11 14:07:50 boralis kernel: warning: many lost ticks. Reply amir April 9, 2017 at 4:17 pm thank you for all this useful post. I opened up the sound controller by expanding System Devices in the device manager, checked the "High Definition Audio Controller". (there were two listed, because I had multiple audio sources, with Comment 10 Roberto Ragusa 2006-05-23 15:56:32 EDT I have 4 300GB SATA disks on nv_sata. If you have any questions, please contact customer service. Booting the FC4 partition with kernel x86_64 2.6.16-1.2096_FC4smp, the problem is not present. Confirm with OK and check how system interrupts is doing now. 6. This has no impact on system usability or performance, and these messages can be safely ignored. It is safe to ignore this error. If it only works when you disable a specific controller and leave the other one enabled to correct it, then the disabled controller is likely the device or driver/s you should You can safely ignore this message. Like I said, however, this could apply to different devices than an audio controller so if multiple audio controllers don't apply to you, look into other devices for the same issue. Interrupts can signal to the CPU that an error occurred and this can cause the CPU usage of system interrupts to increase. In the /etc/fstab file, make an entry for swap partition (if it not already present), with option default. VMware ESX Server IssuesCurrent IssuesESX Server Message, invalid vmkernel id, Indicates Networking Failure (6471417) The ESX Server Console Operating System (COS) might report the following error at the main menu screen: Advertisement Latest Reviews Haier XShuai Robot Vacuum Review Haier XShuai Robot Vacuum Review Dual-Sensor Camera and Under $100: The Blackview A9 Pro Dual-Sensor Camera and Under $100: The Blackview A9 Pro RHEL4 U4 Lost Timer Ticks Messages Can Be Safely Ignored (6481870, 6486383) The message file and dmesg log file might show messages similar to the following: Warning many lost ticks Your This is caused by a bug in the HID driver. No luck, always losing ticks. ViRGE/DX or /GX (rev 01) (The machine is a file server and doesn't need a gfx card at all.) Comment 15 Dan Carpenter 2006-07-17 23:49:04 EDT Actually the real the problem AMD Erratum 131 Warning Message Can Be Safely Ignored During OS Startup (6438926) (Fixed in Solaris 10 8/07.) Solaris AMD x64 support includes a boot-time check for the presence of a RHEL4 NMI Watchdog Timer Must Be Disabled In Servers With BIOS 38 (6486170) The Non-Maskable Interrupt (NMI) Watchdog in RHEL4 is a mechanism used by software and hardware developers to detect Need access to an account?If your company has an existing Red Hat account, your organization administrator can grant you access. Log in as superuser (root). 2. All Rights Reserved Tom's Hardware Guide ™ Ad choices Home Forums Posting Rules Linux Help & Resources Fedora Set-Up Guides Fedora Magazine Ask Fedora Fedora Project Fedora Project Links The Fedora It should look like the following: /dev/sdj5 swap swap defaults 0 0 Resolved IssuesPCI Gigabit Ethernet Driver Cannot Be Installed (6592540) (Fixed in Software 1.3. any takers?(A virus is out of the question, it is a clean install)Included is a screen shot of the running processes and resource mon.http://img819.imageshack.us/img819/5037/desktopss.pngAny suggestions...?
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947759.42/warc/CC-MAIN-20180425080837-20180425100837-00236.warc.gz
CC-MAIN-2018-17
5,645
14
https://www.instructables.com/community/Portable-hydropower/
code
Portable hydropower Answered Hi! I am in a senior in high school and am required to do a project as a part of my stem class. I am planning to make a portable hydropower power bank that someone could use when they're camping to charge their mobile devices. The problem is I don't know how to go about actually doing this. I was planning on making a small stator and rotor for my generator but after further research I found out that I could use a motor and a diode instead. Any help on which would be better would be greatly appreciated. I also am confused on what type of battery to use(it will be inside my device and will be the power bank for charging devices). I was planning on using a 5000 mAh, 5V lithium polymer battery, but am not sure where to buy one(If u just search 5000mah 5v battery, the responses come up with 3.7V. I will also need at least 2 usb charging circuits. Honesty any guidance in what I should would be helpful. Thanks! If your looking for examples of this I would look up the blue-freedom portable hydropower.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141652107.52/warc/CC-MAIN-20201201043603-20201201073603-00066.warc.gz
CC-MAIN-2020-50
1,037
3
http://newsletter-phenomenology.ophen.org/pub-179805
code
Cognitive science and the computer metaphor "Cognitive science" is not the name of any well-defined research project but rather a whole family of overlapping research areas, including work in what would traditionally be thought of as psychology, artificial intelligence (AI), linguistics, anthropology, philosophy and even neurophysiology. Nonetheless, within this vast stew of different research aims and methods, there was until fairly recently a prevailing core idea of cognitive science. To put it very crudely, the idea was that the mind functions like a digital computer. Mental states are computational states and mental processes are computational processes. Many hardcore cognitive scientists still insist that the "computer metaphor" is not a metaphor at all, that the brain is literally a digital computer and the mind is simply a computer program (see, for example, Pylyshyn 1984). For this reason, many researchers see work in AI as absolutely essential to the cognitive science enterprise. So in this chapter, when I talk about the prospects for cognitive science, I am going to be talking about the prospects for a research programme based on the artificial intelligence, computational model of the mind.2 Searle, J. (1991)., Cognitive science and the computer metaphor, in M. Negrotti (ed.), Understanding the artificial, Dordrecht, Springer, pp. 127-138. This document is unfortunately not available for download at the moment.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655890105.39/warc/CC-MAIN-20200706042111-20200706072111-00352.warc.gz
CC-MAIN-2020-29
1,444
4
https://devblogs.microsoft.com/dotnet/the-week-in-net-5102016/
code
The week in .NET – 5/10/2016 To read last week’s post, see The week in .NET – 5/3/2016. Last week in On .NET, we had the pleasure to speak with Andy De George about SadConsole, his text-based gaming engine. This week’s guest is still TBD. Post of the week: Stack Overflow – How we do deployment This week, I want to do something exceptional for an exceptional post: extract it from the list to make sure that nobody misses it. Nick Craver, from Stack Overflow, wrote a very detailed post on how they do deployments. There’s something to learn for everyone in there, and I highly recommend you check it out and take the time to read the whole thing. It’s really worth it, and absolutely outstanding. Nick was on the On .NET show about a month ago to talk about performance. Tool of the week: Git Diff Margin Git Diff Margin displays live Git changes of the currently edited file on Visual Studio’s margin and scroll bar. It also facilitates navigation between pending changes, and makes them easy to undo. Project of the Week: Intercom-dotnet Intercom is a suite of services that web sites can use to chat with their visitors, gather feedback, and provide support. Intercom-dotnet is a client library that gives .NET applications access to Intercom user data. Xamarin app of the week: JetBlue JetBlue turned to eGate Solutions and Xamarin to move to iOS and Android from specialized devices, which weren’t available on all flights and often lost credit card transactions during syncing. JetBlue’s flight attendants use the app to process purchases and track inflight inventory, resulting in smooth transactions and better service. Game of the Week: Endless Legend Endless Legend is a beautiful 4X turn-based strategy/RPG style game where players control one of eight factions (eleven with DLC). Each of the factions brings unique gameplay style and storyline. Additionally, each time a game is started the world and quests are randomly generated, giving players the feel of always conquring a new world. When loading the map for Endless Legend, the first thing that you’ll notice is how beautiful the world is. (I admit, I zoomed in and out several times to watch the map changing effect). Expand, explore, exploit and exterminate to ensure your survival while at the same time juggling the seasonal influence to your civilization. Endless Legend can be a bit trying to learn at first, but once you get the hang of it the game is an absolute blast to play! User group meeting of the week: Building Microservices Based Apps on Azure Today Tuesday, May 10, at 6:30PM, Jeffrey Richter and Boris Scholl will be at the Microsoft Reactor Facility in San Francisco with the Bay.net group to talk about building microservice-based apps on Azure. - .NET Core RC2 – Improvements, Schedule, and Roadmap by Scott Hunter. - Introducing docs.microsoft.com by Jeff Sandquist. - Infographic: Who is the .NET Developer of 2016? by Nora Georgieva. - Welcoming WiX Toolset to the .NET Foundation by Martin Woodward. - Introduction to .NET Framework Compatibility and Tooling to Facilitate Framework Migrations by Mike Rousos. - Using Mocks or Stubs, Revisited by Jeremy D. Miller. - Diving into Visual Studio 2015: Code Analyzers by Akhil Mittal. - Continuing with C# and Nats, now looking at NatsObservable by Daniel Wertheim. - Arithmetic Overflow in .NET – Some Nitty Gritties by Rasik Bihari Tiwari. - Versioning NuGet packages in a continuous delivery world: part 1 by Matt Cooper. - Notes from the ASP.NET Community Standup – May 3, 2016 (video + transcript) by Jeffrey T. Fritz. In the video, Sébastien Ros makes a demo of Orchard 2 running on Ubuntu, and shows some really cool stuff with tag helpers. - Deploying ASP.NET Core with Docker Swarm to Azure Container Service by Anthony Chu. - Working with Developer Pages (video) by the ASP.NET Monsters. - ASP.NET Core: Factory Pattern Dependency Injection by Armen Shimoon. - Build an ASP.NET Core Application With User Authentication by Nate Barbettini. - How to Web with ASP.NET by Jeremy Likness. - Tag Helpers in ASP.Net Core (video) by Martin Beeby and Martin Kearn. - WebForms can Gulp too, Where did my bundles go in ASP.NET Core? (video), and npm and Gulp part 2 (video) by Jeffrey T. Fritz. - Akka.NET with F#: Getting Functional with Reactive Systems, by Russ Cam - Types from Data: Making Structured Data First-Class Citizens in F#, by Tomas Petricek, Gustavo Guerra, and Don Syme - Akka.NET Streams vs Hopac (vs AsyncSeq – Sort Of), by Vasily Kirichenko - Let’s Make a Bayesian Deal, by Jack Fox Check out F# Weekly for more great content from the F# community. - C# tutorial in CRYENGINE V – adding Collectables (video), Game From Scratch C# tutorial in CRYENGINE V (video), and A 3D maze using C# in CRYENGINE V (video), by James Brady. - Build A Unity Game Part 1 (video), by Stacey Haffner. And this is it for this week! Contribute to the week in .NET As always, this weekly post couldn’t exist without community contributions, and I’d like to thank all those who sent links and tips. You can participate too. Did you write a great blog post, or just read one? Do you want everyone to know about an amazing new contribution or a useful library? Did you make or play a great game built on .NET? We’d love to hear from you, and feature your contributions on future posts: - Send an email to beleroy at Microsoft, - comment on this gist - Leave us a pointer in the comments section below. - Send Stacey (@yecats131) tips on Twitter about .NET games.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817184.35/warc/CC-MAIN-20240417235906-20240418025906-00182.warc.gz
CC-MAIN-2024-18
5,540
48
http://www.17thshard.com/forum/topic/383-the-ultimate-list-of-questions-for-brandon/?do=embed
code
If you have any question about Brandon's books that hasn't been resolved yet, post them, and I'll just keep aggregating them to this list. This is a resource to be used by people who will have an opportunity to ask questions of Brandon, so it has been decided that if a question has a considerable chance of being RAFO'd with no extra information gained, then we will not add it to this list. There's no point in wasting a question after all. If a staff member decides that your question shouldn't be added you are welcome to appeal the decision by telling us why you think Brandon will answer the question. Admins and/or staff have final calls though. Also any question you submit may be edited for clarity. If you are heading out to a signing this is a great resource for finding a good question about an area that you would like to know more about. If the question you wish to ask is not on this list then I'd appreciate if you checked the Interview Database to see if it has already been answered. A couple tips for checking are: Use keywords in your search, chances if someone has already asked the same question they won't have used the same exact words If Brandon has RAFO'd a question similar to the one you wish to ask, he'll probably do the same to yours After you do one search for some keywords, using "ctrl f" is a useful way to further narrow your search by finding other relevant words on the results page Remember if you do accidentally ask something someone else has its not the end of the world, we won't be mad. Just be sure not to ask Brandon to sign your book with a Cosmere clue. He has requested that we no longer do this and simply ask a specific question. If you ask a question and it has been answered I will post the answer and PM you you to let you know. Let's determine precisely what we know, and questions we must ask in the future!
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156224.9/warc/CC-MAIN-20180919122227-20180919142227-00351.warc.gz
CC-MAIN-2018-39
1,863
8
https://www.telerik.com/forums/report-paging-w-subreport-problem
code
5 Answers, 1 is accepted I assume you're using the Web Report Viewer which uses the HTML rendering, thus creating logical pages. The output of a report rendered in HTML and page oriented e.g. PDF differs because both medias are quite different. The 1st (HTML) is dedicated to displaying information on screen and the page is infinite by width and height; in contrast the 2nd format - PDF - supports physical pages and is meant not only for reading on screen but for printing. According to whether the format supports physical pages, we separate the export formats on two groups: page-oriented (PDF, Image (print preview), print, XPS, RTF) and non-page oriented (HTML/MHTML, Excel, CSV). For the page-oriented formats the content layout is on horizontal and vertical pages according the the page settings of the report, while for the rest of the formats take into considerations other characteristics of the media like the grid of the Excel worksheet. In short, the only way to force the subreports to be placed on different pages is to create 12 unbound groups and place each subreport in a separate groupheader or groupfooter with PageBreak property After or Before depending on whether you're using header or footer. the Telerik team I've already explained the reason for this behavior - the fact that HTML is not page oriented format and thus the page settings mean nothing to it. Think of the HTML format as "Interactive" layout of the report, while page oriented formats like PDF are the "Print" layouts. the Telerik team This seems to be from a previous poster that replied to this thread that was deleted: "This is a serious draw back for me. I am replaceing Actuate Reporting with Telerik and I need to have the paging of Sub reports. Also when it pagenates in the PDF output I do not get a header for the sub reports. I would hate to have to withdraw my recommendation to go with Telerik tools because I can not create the format that is expected from my web/pdf reports." I understand your explanation but the fact remains, my report behaves properly when rendered with the HTML control (pages are broken @ 11in) until I add sub-reports. Why don't sub-reports get rendered along with the rest of the report in the proper page size? You say "the fact that HTML is not page oriented format and thus the page settings mean nothing to it.". If this is the case, then why does my normal header/detail/footer report get formatted properly in HTML? Wouldn't it also end up being 1 long report when output via HTML? What's the point of paging controls if this cannot be accomplished? Threads in our system are not deleted under any circumstances, especially when coming from users with valid accounts. If a post contains adds or offensive language it can be edited to remove that content or migrated to our support system so we can warn the user, but never completely deleted, unless the user has been warned and he continues to be vocal in our forums. This is not the case with this particular thread and after advising with our web team, it seems that this could be due to a continuous migration they're doing for all of our sites. Up to your and the other user's concerns: - I need to have the paging of Sub reports - they are paged even now for page oriented formats. This does not apply for SubReports in non page oriented formats as HTML only and is by design. See previous replies in this thread for more information. Also this is duly noted in our documentation: Design Considerations for HTML Rendering. - I do not get a header for the sub reports - page sections (page header and page footer) are not related to the report itself, but are relative to the margins of the report's media, i.e. to the paper or screen. In short they precede all report sections and there can only be one page header/footer. On the other hand, SubReports are nested in report section as part of the main report which already has page sections. This info is also duly noted in our documentation: SubReport. In that article we suggest a workaround by using unbound group headers. - report behaves properly when rendered with the HTML control until I add sub-reports - non page oriented formats have logical paging based on the report rules and not based on the page settings. In this line of thoughts, any item that grows to normally accommodate more than a single page, would be rendered as a single page in HTML. You do not have other items that exhibit this in your report and that is why the SubReport item seems like renegade to you. Try placing a TextBox with very large text that would surely surpass single page according to report page settings and you would observe exactly the same behavior. This information is present in the Design Considerations for HTML Rendering. Hope this clears any further confusion on the matter. the Telerik team
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644506.21/warc/CC-MAIN-20230528182446-20230528212446-00484.warc.gz
CC-MAIN-2023-23
4,838
18
https://spark.adobe.com/page/glfleqKDiA2M3/
code
Hello, my name is Ashton. I researched Popular Trends. I was interested in this topic because a lot kids of course do Popular Trends. The purpose of my research was to see who participates in Popular Trends . I asked the question, "What Trends do students at Monroe Jr High think are popular?" To answer my research question I asked 9 people. The sample group was made up of all 7th graders. I avoided sample bias by using a random group generator. I was expecting to find that students participate because I see them with different trends. I did find what I was expecting. Almost 90% of students participate in trends. I was surprised to find Water Bottle Flipping low because mostly in the entire world has done it. My survey did achieve its purpose. This is because I was able to find what I was looking for. As a next step I would I would think of a new trend. If I was to do my survey again I would not change some of the questions.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247494449.56/warc/CC-MAIN-20190220044622-20190220070622-00049.warc.gz
CC-MAIN-2019-09
937
3
http://answers.ea.com/t5/FIFA-14/Fifa-14-Manager-Mode-Crash-Notification/td-p/1564009
code
Hi, this is to report a bug which I've identified and I would imagine is an easy fix. It relates to a replicatable manager mode crash. When you play as Arsenal with Current Customised squads, the game will always crash. This is because there is a player (GK, No 128) on the current squad which is glitched. Trying to edit this player also crashes the game and you cannot delete this player. This is on the PC Version. If anyone has a fix let me know. September 2013 - last edited September 2013 It's not just with Arsenal! Every team i've tried with ( while having a cusomised squad") has the GK No 128. It's really annoying and i hope someone can fix this soon! Edit: I actually had this problem with FIFA 13 too, alltho then it wasent even a broken player which made the game crash it just did it by itself and i never found a way to fix it. Edit 2: I also noticed that this happens when you do the "download latest squads" in career mode, alltho this time it didn't crash for me but i was missing a player in my squad (Edin Dzeko) I have no idea what's going on but i hope someone can fix this. I got this as well when I added a few custom players to teams and downloaded the latest squads, so as to get all the rosters correct as of deadline day (Ozil to Arsenal, Bale to Madrid etc) Then when selecting Arsenal, and current customised squads, the game freezes when loading up the new career, just after putting in the manager details. Has happened 4 times in a row now, so its definitely not a fluke! Prseumably, the edits I have made are interfering with the updated squads, but I want to simply add my edits on top of the latest updates! Any suggestions to resolve this? I would quite like to play a career with my created players in it! Especially seeing as the EA Servers seem to be constantly down. I've got a half solution for this. My problem was I wanted to have my own player in my team but I also wanted to be the manager, but whenever I tried to press "advance" it froze. Instead, I just moved my player to the free agents and then signed him on a free transfer at the beginning of the season and it's been working fine since. As long as you're quick and offer them decent wages, they should come to you instead of someone else. when i play in managers mode with latest squad i am not able to make any chnages to squad. As i try to do it , it crashes. this problem seems to affect latest squad update in manager mode. i am playing now in customised squad which works fine Hi! I am having the same problem. There is a keeper no.125 appear in my latest update team list. I click on that player my game crash. Now I can't play at all as whenever i want to start a match, it crash. I've tried uninstall the game, reinstall the game and delete all my previous folder, personal setting and all the previous manager mode files but still don't work. Now i can start any game as it will crash. Please help. im trying to attempt the same thing you are and everytime i go to view his initial pricing from the club im trying to purchase him from the game crashes. your work around seems to be what i am trying to go for. could you please explain further as to how you did it, it would be much appreciated Having the same problem on FIFA 14 career mode. Had a squad with a created player and once I downloaded the latest updates, a GK, kit number 128 and level 0 with all the specialties just appeared in my team. I can't do anything apart from load another squads file. Annoying thing is, if you load an old squads file, then you can't update it to the latest squads. If anyone knows how to get rid of the GK that constantly crashes career mode whenever you try and start a new save, then please reply. Thanks. I also had this problem but on PS4, not sure if this fix will work for PC, i went onto my fifa 14 profile and deleted manager mode history including squad updates etc, then it let me use current customised without a crash Hey Guys...I'm not sure if m late at posting this but I had the same issue and that happened for me because my fifa was not registered on my PC as in the Registry. Once I registered it it worked fine except for Career mode.
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822822.66/warc/CC-MAIN-20171018070528-20171018090528-00187.warc.gz
CC-MAIN-2017-43
4,160
27
https://devsolus.com/2023/03/17/how-can-assign-value-on-rails-model/?amp=1
code
I am trying to set the value in the User model on the after_create callback, but one of my model field values is not getting set. before_create: set_value def set_value self.assign_attributes( company_name: self.company.name location: self.company.location ) end Location values are set in the user model, but company_name is always nil. I don’t know where I am making a mistake. When I do User.last, I am getting all values except the company_name, and the company name is also present in self.company.name When I try to create new model from rails console and set the value to company_name it throws an error SystemStackError: stack level too deep I think according to this error, SystemStackError, you have the same-name method in your model as setter. If you have, then change the name of the method; the issue will be resolved, and the value company_name will also be set on the after_create callback.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510326.82/warc/CC-MAIN-20230927203115-20230927233115-00039.warc.gz
CC-MAIN-2023-40
908
6
https://post.lurk.org/@mathr/103861312754177114
code
pdfjam --nup 2x2 flyer.pdf '1,1,1,1,2,2,2,2' -o flyers.pdf This turns a 2 page PDF into another 2 page PDF, but with the original pages duplicated in a 2x2 grid, handy for 2-sided flyer printing. I used scissors to cut them up, which is fine for the 3 sheets I needed to print, for more a guillotine would be useful. @mathr ohhh did not know that one thanks Welcome to post.lurk.org, an instance for discussions around cultural freedom, experimental, new media art, net and computational culture, and things like that.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738855.80/warc/CC-MAIN-20200811205740-20200811235740-00240.warc.gz
CC-MAIN-2020-34
518
4
https://community.open-emr.org/t/error-messages-with-availity-covid19-hrsa-uninsured-testing-and-treatment-fund-claims/16719
code
I am trying to submit claims through Availity but I got these errors: - “Functional Group Not Supported.” - “Element GS02 (Application Sender’s Code) has a data type of ‘Alphanumeric’ (AN). Trailing spaces are not allowed. Segment GS is defined in the guideline at position N/A.” Availity support told me to remove the 2 spaces after the “Interchange Sender ID” which I did, will this resolve these errors or is the extra space a third error? If so any insight on the first two errors? Thanks in advance
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153491.18/warc/CC-MAIN-20210727202227-20210727232227-00524.warc.gz
CC-MAIN-2021-31
521
6
https://hubpages.com/technology/optimizing-mysql-for-vps-dedicated-server
code
Optimizing MySQL For VPS / Dedicated Server Tuning Server Parapeters MySQL is an open source database software based on the SQL vocabulary which can be employed in combination with most server-side languages, but which is most commonly employed with PHP. MySQL has become the de facto standard for high-traffic web sites because of its high performance, stability and ease of use. You can Tune your MySQL server parapeters to try to optimize your configuration. As a reminder, you can check the current values of server parameters with this: You can see the effects of your server configuration by looking at the output of this: There's a number of performance tuning scripts that will analyze your server settings and current status and give you information on recommended changes that you should make. You shouldn't necessarily follow all of the suggestions, but it's worthwhile to take a look at anyway. 1) You need ssh access to your server. If you don't have root ssh access, you will need to contact your web host. 2) To connect to your server: If you are on Windows, you can use PuTTY. In the Session section: - Enter yourdomain.com or your ip as Host Name - Select SSH2 as protocol - Click Open You can now login secure to your server. If this is your first time using PuTTy, then read this page for more details on how to set up PuTTy. Using a MySQL Performance Tuning Analyzer Script MySQL Performance Tuning Primer Script is a script that analyzes your MySQL performance and, based on the statistics it gathers, gives recommendations which variables you should adjust in order to increase performance. That way, you can tune your my.cnf file to tease out the last bit of performance from your MySQL server and make it work more efficiently. This script takes information from "SHOW STATUS LIKE" and "SHOW VARIABLES LIKE" to produce sane recommendations for tuning server variables. It is compatible with all versions of MySQL 3.23 and higher (including 5.1). Before you continue, make sure your MySQL server has at least 48 hours uptime. It's very important for the script in order to adjust variables corectly. While logged into your server through ssh, type: wget http://day32.com/MySQL/tuning-primer.sh to download it then chmod u+x tuning-primer.sh to set the proper permissions, and finally ./tuning-primer.sh to run the program. The script will analyze your server and suggest the proper settings. You should carefully read the output, especially the recommendations at the end. It shows exactly which variables you should adjust in the [mysqld] section of your my.cnf (on Debian and Ubuntu the full path is /etc/mysql/my.cnf). Whenever you change your my.cnf, make sure that you restart MySQL. You can then run MySQL Script again to see if it has further recommendations to improve the MySQL performance. This way, you can optimize MySQL step by step. Blue color means the name of the server parameter checked. White color is common text. Green color means that value/parameter is set OK while red one means there are some deficiencies found and recommendations for better performance are offered. How to edit my.cnf There are two editors that are pre-installed on your server that you can use. They are called "nano" and "vi". Of the two, nano will be easier to use, because its key combinations are provided right on the screen as you work. To edit a file, first make a back-up: cp /etc/my.cnf /etc/my.cnf.old You can edit your mysql configuration (/etc/my.cnf) by typing: vi /etc/my.cnf or nano /etc/my.cnf. When finished, ctrl X back out and type "y" to save and overwrite the file. Then restart mysql /etc/init.d/mysql restart (or /etc/init.d/mysqld restart) The settings below should work well for a server with 512MB Guaranteed RAM: This changes can be made on the MySQL DB but any mysqld restarts would revert the changes back again. SET GLOBAL query_cache_type=1; SHOW VARIABLES LIKE 'query_cache_type'; Tuning MySQL Performance with MySQLTuner MySQLTuner is a Perl script that analyzes your MySQL performance and, based on the statistics it gathers, gives recommendations which variables you should adjust in order to increase performance. That way, you can tune your my.cnf file to tease out the last bit of performance from your MySQL server and make it work more efficiently. You can download the MySQLTuner script as follows: In order to run it, we must make it executable: chmod +x mysqltuner.pl Afterwards, we can run it. You need your MySQL root password for it: The script should now run and display various stats and recommendations. Below is a example: Run OPTIMIZE TABLE to defragment tables for better performance To optimise all tables in a single database; mysqlcheck --optimize -p -u user_name database_name To optimise all tables in all databases; mysqlcheck --optimize -A -p -u user_name Repair, check, optimize mysqlcheck --auto-repair --check --optimize --all-databases
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337473.26/warc/CC-MAIN-20221004023206-20221004053206-00625.warc.gz
CC-MAIN-2022-40
4,916
51
https://www.africansnakebiteinstitute.com/snake/highveld-garter-snake/
code
Full Name: Highveld Garter Snake (Elaspoidea sundevallii media) Other Names: Hoëveld Kousbandslang The Highveld garter snake is secretive and seldom encountered. Juveniles have 16 – 23 pinkish or orange-yellow bands on the body and tail that fade with age. Adults are usually plain blackish brown or dark brown with a lighter belly while some may still have traces of banding. It is a fossorial snake that may emerge at night from an underground shelter or deserted termite mounds. These snakes are quite placid and rarely bite. They feed on snakes, lizards and their eggs and frogs, especially rain frogs. Small rodents are also taken. Little is known about their venom and bites have caused nausea, vomiting, pain and swelling.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039375537.73/warc/CC-MAIN-20210420025739-20210420055739-00112.warc.gz
CC-MAIN-2021-17
732
5
https://archive.ismrm.org/2021/3405.html
code
A deep neural network, referred to as DIFFnet, was developed to reconstruct the diffusion parameters from data with reasonable b-value and gradient scheme (gradient direction and the number of gradients). For the generalization, Qmatrix was proposed via the projection and quantization of q-space. DIFFnet was trained by simulated datasets with various b-values and gradient schemes. Two DIFFnets, one for DTI and the other for NODDI were developed. DIFFnet successfully reconstructs the diffusion parameter maps of two in-vivo datasets with different b-values and gradient schemes.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337244.17/warc/CC-MAIN-20221002021540-20221002051540-00440.warc.gz
CC-MAIN-2022-40
582
1
https://www.elastic.co/es/blog/logstash-7-4-0-released
code
We’re happy to announce the general availability of the Logstash 7.4.0 release. This is the latest stable release and is now available for download! Please refer to the release notes for the complete list of bug fixes and features. Pipeline-to-pipeline communication GA The pipeline-to-pipeline communication feature is now officially GA with the Logstash 7.4.0 release, enabling a production ready approach for connecting multiple pipelines within the same Logstash instance. This provides our users the ability to leverage more pipeline logic isolation and modularity, ultimately leading to better processing performance while retaining at-least-once delivery semantics across the entire chain of delivery. The power of chaining pipelines unlocks a plethora of different use cases in practice. Whether you want to separate processing logic for multiple data types coming through a single input or guarantee stronger delivery when using multiple outputs, pipeline-to-pipeline communication allows sophisticated processing to be done more efficiently and in an easier to manage fashion. Check out a few different architectural patterns we’ve outlined as inspiration; we’re excited to see the myriad of ways you may take advantage of this feature in your own deployments! NetFlow module deprecation The Logstash NetFlow module has been deprecated in Logstash 7.4.0 and we plan to remove it completely in a future major release. For users interested in NetFlow data analysis, we recommend checking out the Filebeat NetFlow module. It has functional parity with the Logstash module equivalent while complying with the Elastic Common Schema (ECS) for easy usage with the Elastic SIEM application and more seamless correlation with other data sources that reside together in your Elastic Stack deployment. Try it out yourself! Please download Logstash 7.4.0, try it out, and let us know what you think on Twitter (@elastic) or in our forums. You can report any bugs or feature requests on the Logstash Github issues page or within the respective plugin repositories.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474412.46/warc/CC-MAIN-20240223121413-20240223151413-00294.warc.gz
CC-MAIN-2024-10
2,067
8
https://dev-playbook.prospect.io/the-team/how-we-work
code
We do sprints of 2 weeks, starting on Wednesdays with a sprint kick-off. At the end of the sprint, the goal is to have deployed on production what was scheduled. Prior to that meeting, priorities will be fixed by the product team, specs and designs will be provided if possible. During the kick-off, we will decide who work on what, favoring large teams and trying to keep the parallelism at the lowest. Every morning, before 10:00, share on the #developers channel the answer to the following 3 questions: What is my goal today? Did I reach my goal Yesterday? Do I need help today on a specific topic? + tag people you want them to help you Following discussions are more than welcome. Favor face-to-face discussions or face calls over ping-pong chat.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046155529.97/warc/CC-MAIN-20210805095314-20210805125314-00429.warc.gz
CC-MAIN-2021-31
752
9
https://www.avsforum.com/threads/mpc-home-cinema-black-bars-all-around.1164136/
code
If using an ATI graphics card do you have the Overscan compensation slider set to 0 in CCC? Originally Posted by scotty588 /forum/post/16855539 I enabled GPU scalling and selected maintain aspect ratio. Didn't seem to help. Also selected VMR9 (renderless) in output. Still can't find the overscan in CCC. Originally Posted by walford /forum/post/16855650 Since your display has a 16:10 aspect ratio and your source has a 16:9 aspect ratio if you maintaing aspect ratio you will most likely get a black bar on the top and bottom of the display. Originally Posted by jrwalte /forum/post/16855853 Have you looked at the image? His problem is he has black bars on the sides of the movie. Originally Posted by jrwalte /forum/post/16855659 You're not going to see it because you aren't using a device (DLP, projector) that CCC would see as requiring underscanning. Do a reboot after making those changes just in case. Go to MPC-HC settings and click on playback. There is a section called output (not the output tab) to the right. It has an auto-zoom feature. Is this turned on and at 100%? Originally Posted by Bigbird999 /forum/post/16855697 What version of CCC? Pre version 8.xx (cant remember exactly) there was no slider but there was a picture size/position adjustment. What is the output resolution of your PC? PC specs? Originally Posted by jrwalte /forum/post/16855829 Also try right clicking while video is playing and make sure Video Frame is set to Normal Size. You can also try turning off VMR9 mixer mode under 'Output' options as that's off by default. Originally Posted by jrwalte /forum/post/16859749 I was able to test this when I got home. It is the Haali Renderer causing the pixel for pixel display. When you change the filter to VMR9 you have to close and reopen MPC-HC for it to take effect. Originally Posted by walford /forum/post/16862419 Is your PC desktop and the resolution you are outputting to your display both set at 1680x1050? If you are not trying to play a movie does your PC desktop display at full screen? Originally Posted by robnec /forum/post/16863719 Hello. I had the same problem. Mine was solved using a setting "touch picture from inside". Hope it will help. Robert. Originally Posted by Bigbird999 /forum/post/16864035 Have you tried another media player like VLC to see if it has the same issue?
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652207.81/warc/CC-MAIN-20230606013819-20230606043819-00674.warc.gz
CC-MAIN-2023-23
2,336
26
http://www.v7n.com/forums/coding-forum/299295-im-needing-style-scrollbar-div-not-browser.html
code
I'm needing style scrollbar (a div (not the browser))... I'm needing style scrollbar (a div (not the browser)), but found no simple solution. All depends on CSS itself that ultimately ends up being inadequate for css site. Does anyone have any tips? I want to style a scrollbar (if horizontal) of a DIV, altering length of the bar, bar width, changing the course of an image, etc ... If anyone knows of any tutorial or link, I am grateful.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702849682/warc/CC-MAIN-20130516111409-00050-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
439
4
https://bestestredteam.com/2018/08/11/offensive-security-wireless-attacks-wifu-review/
code
Before I start this review the opinions of this post are those of the authors. Less than a month ago I purchased and passed the Offensive Security's online course Wireless Attack, more commonly known as the WiFu course. Before starting this course I have been heavily involved in the world of radio frequencies and wireless security testing from a purely hobbyist point of view. This previous knowledge might have helped with the course. However, I wanted to validate my knowledge through one of the most trusted certification providers in the industry. As well, more and more devices are introduced with wireless capabilities, and wireless knowledge will soon become an industry standard for penetration testers, and system administrators. It was time to pull the trigger and dive into the world of wireless penetration testing. The material of the WiFu course is publicly available and can be referenced here. The course begins by performing dive into the standards and protocols for the 802.11, and the history of WiFi. Followed by the how a wireless network operates, and the different types of WiFi. After the brief introduction the Offensive Security course moves into an exhausting description of how wireless packets are built and transmitted. This knowledge is great for background knowledge showing the very intricacies of how wireless works, however I found this section to be painful to work through. However, working through these many pages really helps the student understand how the Aircrack Suite works on a lower level instead of simply describing what a command is doing. Unlike the OSCP labs that are offered by Offensive Security the WiFu course is all self hosted in a local network. Offensive Security as well references some hardware that is a prerequisite to help setup the lab network in order to attack locally. Albeit, there are no instructions contained in the PDF on configuration of the hardware that is suggested. This can be problem causing as you move into the practical lab section as certain attacks were unable to be performed even with the troubleshooting sections that are provided in the PDF. There were certain sections where I have still yet to successfully perform on the suggested hardware which could be due to updates in firmware or changes in the rolling Kali release. Additionally, I should mention here that when purchasing the course the student is provided with a version of BackTrack r5 to practice with. I downloaded the ISO and fired it up in my version of VMware. However, I wanted to utilize my wireless card I had purchased in 2018 for the lab. The version of BackTrack is obviously deprecated and will therefore no longer get updates or be able to install packages to support the Alfa AC1200 that I had purchased. With these problems considered I decided to just run a bleeding edge release from the rolling Kali 2018.2 build. This might have caused some of the issues mentioned previously. If you have suffered through all of the background knowledge and deep dives into packet building you will be rewarded with learning the practical side of wireless penetration testing processes. To begin with Offensive Security begins by talking about administration of the wireless card and using the Aircrack Suite to get the cards into a "monitor" mode. As mentioned earlier in the post I just had to make this process more difficult on myself by using an unapproved wireless card, in which I had to learn how to place the card into monitor mode in a more manual mode using the iwconfig command. Per the course agenda referenced above the course covers common WEP and WPA/WPA2 attack methods. Unfortunately, it will only cover Pre-Shared Key (PSK) encryption and skips over common Enterprise level encryption attacks. Surely the reason for not covering a common encryption method is due to the complex nature of setting up a wireless access point with some sort of centralized authentication behind it. This could be a future selling point by providing a small lab for the WiFu course with additional topics covered. After covering the two encryption methods WEP and WPA the course also provides a brief description of wireless reconnaissance section which demonstrates connections between access point and client devices. Whereas, this section is not necessarily critical it really seems like a fun way to demonstrate some of the more flashy skills that might help with building reports or just enjoying the world of wireless testing. The testing section has an exam guide just like the OSCP exam. The exam guide provides the general guideline on the pitfalls that might cause a student not to pass the exam. All of the information is clearly explained and provides a great checklist for making sure the directions were followed appropriately. The maximum time allotted for the test is 4 hours with 24 hours to write the report, however I was able to wrap up the exploits in under 50 minutes. Then spent the next 2 hours preparing the documentation and submitted under the initial 4 hour mark. My final opinion on the OSWP. Overall this is a great course for a beginner wanting to break into the world of wireless testing and reconnaissance. The course does not feel updated though. It still focuses heavily on the WEP encryption attacks instead of focusing on the market leading WPA/WPA2 encryptions. As well there were no attacks for the WPS pin attack using the Reaver tool, and of course since I took the test before the latest WPA attack was released it wasn't expected. However, these new methods that are still being developed and reported should be added to the course. I would absolutely pay an additional fee to get an updated version of the PDF and to retake the test with more current attack methods.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644683.18/warc/CC-MAIN-20230529042138-20230529072138-00497.warc.gz
CC-MAIN-2023-23
5,764
9
https://www.bitcraze.io/2014/08/crazyflie-2-0-bluetooth-low-energy-connectivity/
code
One of the nice new functionality of Crazyflie 2.0 is the Bluetooth 4.0 low energy (BLE) connectivity. In Crazyflie 2.0 we are using a radio microcontroller chip from Nordic semiconductor, the nRF51822. This radio chip allows us to keep compatibility with the existing Crayradio (and future Crazyradio PA), and to support BLE connectivity as well. The radio chip is a bit bigger that the one we used so far, and with the Power amplifier, we end up having the radio taking more space on the PCB: The extra footprint is offset by the fact that we are now using smaller sensors and that the nRF51 is also handling the power management thus freeing pins on the main CPU. The main usage of BLE will be to fly Crazyflie from a compatible mobile device like an Android phone or an Iphone. This could be used both to ‘just fly’ or to develop crazyflie control apps using the mobile phones capabilities. For example the phone camera could be used to detect and control Crazyflie autonomously. We have prototyped the BLE communication both on the existing Android client and for IPhone. The plan is to provide basic apps for the Crazyflie 2.0 release so that the copter can be flown from a mobile device out of the box. So far we have got the copter to fly from both Android and IOS: We are not planning on implementing any BLE support for the PC client, so Crazyradio is still the main way to communicate with Crazyfle. It is possible to have BLE on PC but it would require a major effort to get it to work for Linux, Windows and Mac (there is no cross-platorm Python BLE lib as far as I know. If there is some please tell me in the comments!). Also Crazyradio is lower latency and has an higher datarate which makes it better for flying and communicating with one or many Crazyflie 2.0 from a PC. We are also implementing BLE in the bootloader. This means that it will be possible update the Crazyflie 2.0 firmware from both a PC or a mobile device. Technically we are using the Nordic Semiconductor soft device BLE stack. The stack runs a little bit like an operating system, behind and independently of the firmware: the firmware is not linked to the stack. This will make things a little bit easier to have an open-source firmware even though the nordic bluetooth stack is closed. Another nice thing about the nordic chip is that the radio peripheral is well documented so implementing open source stacks in the future is potentially possible. Practically we where originally planning to have two modes for the firmware: one Crazyradio and one bluetooth mode. However the new release of the Nordic BLE stack allow to mix BLE and Crazyradio at the same time. So we are working on having a seamless connection procedure between Crazyradio and BLE: when starting Crazyflie 2.0 it will be accessible both via BLE and with the Crazyradio. When connected the unused mode will be disabled until disconnection. Also the name of the copter will be communicated both in BLE and Crazyradio mode and can be changed by the user. This will help a lot people having more than one Crazyflie (us first!) to differentiate them. 12 comments on “Crazyflie 2.0: Bluetooth low energy connectivity” Damn this new PCB Design with the arms on the edges is looking nice. In Crazyflie 2.0, you’re using a radio microcontroller chip from Nordic semiconductor, the nRF51822. While nRF51822 has its own chip based on Cortex-M0,and it has enought pins and peripheral resources to use,does that mean we could use it to replace the STM32f103cbt6 to control the copter? And how did the Crazyflie 2.0 deal with it? The nRF51822 is handling only power management and radio communication in the Crazyflie 2.0, we have an STM32F405 that handle the rest (flight control&co). Currently the Nordic bluetooth stack takes too much resources (hardware and real-time CPU) to allow to fly only from the nRF51 and also we wanted a bit more power that the 32MHz CM-0 in Crazyflie 2.0 :). I see, thank you for your reply, look forward to your Crazyflie more rods! Looking forward to your Crazyflie is getting better and better. Does the Crazyflie2.0 ‘s bluetooth antenna power amplifier chip is the SE2425U-R? Which PA chip ?thank We use the RFX2401C. I see this article has been posted in 2014. But can the crazyflie client be controlled with laptop’s bluetooth now? Unfortunately not, BLE support for computer OS is still very fragmented and I do not know of any python lib that would allow support for Linux/Windows/Mac. A bit of details about the current state: The closest we have is the Windows uap client (https://github.com/bitcraze/crazyflie2-windows-uap-client) that was originally made for Windows phone but compiles and runs on a Windows computer as well. Last time I checked only UAP apps had access to BLE, not normal application (like python). Mac has good BLE support for native app as far as I know, but I am not aware of anyone that has done one for the Crazyflie (in theory the iOS client could be ported to mac, the BLE api are similar). In theory there could be a python binding for this API. Linux is still in pretty bad shape as far as I know, I do not know of any easy way to use BLE directly in linux (ie. without poking into gatttool or re-implementing GATT…). BLE support on computer is still not a priority since Crazyradio works well in that case, though I am still looking every now and then to see if things evolve and if it would be possible to add BLE support to the current python client. If anyone has a multi-platform solution for BLE I am interested :-) I am trying to flash the crazyflie 2.0 from scratch using just the hex files. I first flashed the STM32f4 ‘cloader.hex ‘ followed by the ‘cf2.hex’ both using the stlink and the STM32 Cube Programmer. Then I flashed the nrf using the Jlink in nrfgo app. first i flashed the soft device ‘s110_nrf51822_7.3.0_softdevice.hex’ followed by the ‘cf2_nrf.hex’. My board however does not respond. Please help me know if am using the correct format. I want just to use the hex files. You are probably missing the “master boot switch” and bootloader in the NRF51.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657735.85/warc/CC-MAIN-20230610164417-20230610194417-00680.warc.gz
CC-MAIN-2023-23
6,129
27
https://www.talkbass.com/threads/help-with-government-stuff.60554/
code
I need to find a copy of the US and North Carolina constitutions. If anyone can help me w/ this it would be greatly appreciated. For our student legislature program i'm in, my partner and I have to propose a bill or amendment and my partner and I are wanting to make an amendment to the NC constitution that would allow us to succed from the Union if we felt like the government was treating our state unfairly. This idea should spark alot of debate and controversy (guaranteing it'll get into the "bills to debate" booK). But we need to know what references there are to this in the US and NC constitution. If anyone could point me to an online copy i'd appreciate it. peace.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202530.49/warc/CC-MAIN-20190321172751-20190321194751-00528.warc.gz
CC-MAIN-2019-13
676
1
https://blog.kimbrand.com/2007/01/vitamin-fear.html
code
Thinking about bringing a new partner into Server Partners, the FileEngine company. This partner has left fear of failure behind - he recently closed a sale of his business worth several million dollars. I was thinking about how we could relate to each other. How our world views would be different - in fact, worried whether there would be enough common ground for us to work together. It struck me that my life is still affected by fear. Fear of failure. But then I realized that fear leads to excitement. My life certainly isn't boring. Would having a lot of money make life boring without the fear? Maybe fear is a vitamin.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819971.86/warc/CC-MAIN-20240424205851-20240424235851-00010.warc.gz
CC-MAIN-2024-18
627
3
https://realtimevfx.com/t/official-vfx-sketch-29-pumpkins/11041
code
Create an effect featuring (a) pumpkin(s) for halloween. Scoring and Winning: We will have some of our very own vfx wizards to judge your work. These judges will select a favorite and runner up. Judging criteria includes: - Effect includes pumpkins - You showed pumpkins at regular intervals. - Your pumpkins are technically and artistically well-exectuted. - Followed challenge rules. Submitting: Create a new topic in the “Events > 29 - Pumpkins" category with your name and sketch number (Like this : “Zoko Rey: Sketch #29” ), and post your updates to this while the event is running. When you are finished, Edit your first post so it holds the final effect in the form of Youtube/Vimeo Video or High-Quality GIFs. - Always cite your sources! Is your work based on that of someone else, let us know. Show your references. - All entries must be made during this running period - Do feel free to use any tool, system or workflow that pre-existed. Although we encourage experimentation. - Using a simple environment for presentation is allowed, but should remain simple and serve only as background. November 3th → November 30th Favorite : Will recieve a golden badge and avatar icon. Runner up : Will recieve a silver badge and avatar icon. All Participants : Will recieve a participations badge. If you have any questions, ask them down below! Good luck, have fun!
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103034170.1/warc/CC-MAIN-20220625034751-20220625064751-00427.warc.gz
CC-MAIN-2022-27
1,374
21
https://club.myce.com/t/replacing-audiofiles-on-psxgames-with-your-own-music/7649
code
I heard that it is possible to replace the audiofiles with music you like better. How can this be done? please let me in on the specifics. This is something I have been meaning to try for a while. It should be possible using CDRWin, as it can extract Mode2 data tracks. On a CD like Wipeout, there is a single data track and a number of audio tracks. In theory, you should be able to relace the audio tracks, and then write the CD. Use the Record Disk function, and go to “Load Tracks”. Select CD+G, then load up the tracks. Note that audio tracks need to be in *.BIN format, not *.WAV. I haven’t actually tried this yet, but it should work. Note my cd-rom wouldn’t read Mode2 data without errors ocurring, but my writer had no problems reading the same data. Hope this helps,
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742253.21/warc/CC-MAIN-20181114170648-20181114192648-00314.warc.gz
CC-MAIN-2018-47
784
3
https://studylib.net/doc/11478158/chapter-15.-network-integrity-project-15a---network-docum...
code
Chapter 15. Network Integrity Project 15A: Network Documentation (team lab) Results will vary greatly. Be sure that each of the following is contained in the document: LAN/WAN topology Hardware Software Server information Router and switch configuration User policies and profiles (if appropriate) Baseline documentation Network service configuration Change Log Project 15B: Disaster Recovery (can be done as a team lab) The results will vary widely for this exercise. Be certain that the following elements are part of the document: Risks, threats, and vulnerabilities Business Impact Assessment (BIA) Definition of needs Detailed plan of action when a disaster is encountered Project 15C: Test a UPS (can be done as a demonstration) Time to Complete: 15 minutes Needed: Uninterruptible Power Supply connected to a workstation and functioning (2)When the power cord is removed, the workstation will begin using the auxiliary power of the UPS. (4)Based on the configuration of the UPS software, the workstation should go through a graceful shutdown.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655143.72/warc/CC-MAIN-20230608204017-20230608234017-00552.warc.gz
CC-MAIN-2023-23
1,049
1
https://wiki.ipfire.org/addons/zabbix_agentd
code
This addon provides the agent for monitoring a host by Zabbix Montitoring. You need a running Zabbix Server and you should be aware of how to integrate hosts monitored by agents into your environment. The addon is shipped with a default configuration file and some additional directories and files: /etc/zabbix_agentdAll configuration files should be put below this directory. The entire directory will be included in a backup of this addon. /etc/zabbix_agentd/zabbix_agentd.conf The configuration file. See the original documentation for help. Please note: The parameters ServerActive have to be set to your Zabbix Server's (or Proxy's) IP/DNS in order to allow access to the agent. They are both set to 127.0.0.1 by default for security reasons. /etc/zabbix_agentd/zabbix_agentd.d Files containing UserParameters should go here. They need to have the extension /etc/zabbix_agentd/scriptsAdditional scripts e.g. for UserParameters should go here /etc/sudoers.d/zabbix.userThis file can be modified to allow certain commands to be executed with sudo if needed by a UserParameter. This file will be included in a backup of this addon. Do not change the filename! /etc/logrotate.d/zabbix_agentdIncludefile for logrotate. The logs are rotated monthly and kept for 12 month by default.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400234232.50/warc/CC-MAIN-20200926040104-20200926070104-00026.warc.gz
CC-MAIN-2020-40
1,281
10
https://www.icesi.edu.co/revistas/index.php/sistemas_telematica/article/view/920
code
Internet Based Software Architecture for Virtual Simulation of Endoscopic Surgery in Otolaryngology In this work, the term architecture refers mainly to the overall structure of its logical software components. However, when required, other aspects, like the hardware and the operating system, are taken into account. The aim of the resulting system is to provide two telemedicine services in otolaryngology for doctors in remote locations or to practitioners. Difficult access to medical services in remote geographical location is a common situation in Latin America. According to this, a support system would be helpful. The suggested services, remote training using virtual simulation and remote decision support, must be supported using a software architecture that is appropriate for the Internet. This document presents first an introduction to the project followed by a description of the problem and the novelty of the work. Next a preliminary description of the architecture is done before the results of the project are shown. Finally, conclusions and further work are presented. This journal is licensed under the terms of the CC BY 4.0 licence (https://creativecommons.org/licenses/by/4.0/legalcode).
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258003.30/warc/CC-MAIN-20190525104725-20190525130725-00104.warc.gz
CC-MAIN-2019-22
1,213
3
https://community.mendix.com/link/space/microflows/questions/108286
code
Hello everyone, There are two fields called employee and manager. If we select the manager name in the ‘manager’ field dropdown then there is another field called employee drop-down and only the employee list under that manager should get reflected in the drop-down. Could anyone please help me in this functionality. Thanks in advance, Apurupa. I am not sure how your domain model is designed, but if it is designed properly then you can use the constrained by feature and limit the records to show only those who are under that manager. You need to create two entities Employee and Role employee-role where each employee will have one role (or many roles) manager-employee where each manager will have multiple employees
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474581.68/warc/CC-MAIN-20240225035809-20240225065809-00667.warc.gz
CC-MAIN-2024-10
726
5
http://classic.chem.msu.su/cgi-bin/ceilidh.exe/gran/gamess/forum/?C30a000202bHW-9916-11+00.htm
code
certain parts of Firefly, including MCSCF code, do not correctly check for TIMLIM when running in parallel and this may result in hangups. Moreover, it is not always possible for Firefly to perform graceful shutdown, especially when running multi-threaded code. I'll try to improve TIMLIM handling in the next minor version of Firefly. Note, many parts of Firefly just ignore TIMLIM completely so that the use of TIMLIM is not an universal solution. All the best, On Tue Feb 21 '17 11:35pm, Bernhard Dick wrote >I usually set TIMLIM to a very large value and run Firefly on my desktop. Now I got it installed on a Linux cluster where I have to specify the runtime. We see that Firefly gives a message in the output file that time is up, but nevertheless crashes against the time limit set by the operator. >I checked this behavior on my desktop (under Windows), and it appears to be the same: I set TIMLIM=2400, and Firefly writes into the output file: > ITER TOTAL ENERGY DEL(E) LAG.ASYMM. SQCDF MICIT DAMP > ----------START APPROXIMATE SECOND ORDER MCSCF---------- > 1 -262.902475823 -262.902475823 0.010114 5.018E-04 1 0.0000 > 2 -262.904007205 -0.001531381 0.002691 1.113E-04 1 0.0000 > RUNNING OUT OF CPU TIME... > MCSCF IS NOT CONVERGED! > A $VEC GROUP OF CURRENT MO-S IS IN THE PUNCH FILE > USE THIS WITH GUESS=MOREAD TO RESTART THIS RUN > FINAL MCSCF ENERGY IS 0.0000000000 AFTER 2 ITERATIONS >but the processors continue to run at full speed (100% in Task Manager), until I stop the run manually. >What do I need to do to let Firefly stop it?
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500076.87/warc/CC-MAIN-20230203221113-20230204011113-00613.warc.gz
CC-MAIN-2023-06
1,551
22
https://manager-tools.com/forums/new-direct-opportunity
code
I'm looking for some advice on an interesting challenge (opportunity?) that has come my way. I manage a team of 11 and have been pretty successful thanks to Manager-Tools and the conference. In our latest employee climate survey, my team's score was among the highest in our division. Our clients are very happy with our work, we are meeting or exceeding all of our metrics, and everyone is generally performing where they need to be or better. Life is good! Another manager has an employee that has struggled over the past few years. The role he is in has grown, and the employee hasn't been able to keep up with the needs of the job, to the point where he is no longer a good fit for the position. The manager is unhappy, the employee is unhappy, and work isn't getting done at the level it needs to be. Our director and HR folks have determined that he isn't going to be let go, and in "recognition" of my team's high performance, they'd like to assign the struggling performer to me. He's not an exact fit skills-wise for my team either, and wouldn't be someone I'd actively recruit given a choice. In reviewing his last few year's performance reviews, there has been only small mention of any sort of problem - in fact, in a few areas, he was graded as "excellent". On the one hand, I'd like the challenge to bring this guy up to spec - he likely hasn't been getting actionable feedback, and I suspect (as I've seen before) between regular O3's and some good feedback he can make progress. Nothing would make me more proud than to be able to give the guy a legitimate high rating at review time. Still, he isn't entirely qualified to work on my team, and initially, at least, he's likely to bring down morale on the rest of my team. Additional headcount is hard to come by in my organization, but I'm not sure if it is worth the "cost" in trying to bring him in and the risk of having to let him go later anyway. Anyone been in a similar situation? Any suggestions?
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103669266.42/warc/CC-MAIN-20220630062154-20220630092154-00488.warc.gz
CC-MAIN-2022-27
1,970
8
http://xagminecraft.blogspot.com/2011/09/industrialcraft-2-released.html
code
And you can download it here! It requires Minecraft Forge 1.0.6, so download that aswell. However, remember to visit Alblaka's blog, in http://www.industrial-craft.net/ How to install the mod: right now it seems (I cannot promise anything) to work like buildcraft and redpower: ypu download the file, put it in your mods folder, and profit. Alblaka advices to inject the contents of the file inside the minecraft.jar (remember to keep a backup in order to not need to make a clean install from scratch). I'm curently testing the mod, but this month is quite a busy one for me, so it will be small updates most of the time. Meanwhile, I can tell you that a new suit (a quantum one) has been added, with some more machines (like an induction forge, able to work with two ores at once, and that requires time for warm-up, after which it will burn the items faster and faster), and new cable types. I'll add some data: the gold cables don't seem to transmit current, and there are insulated and uninsulated versions. Oh, and the new cables look a lot like Builcraft pipes, since they no longer use a whole block. And by the way, a heads up: Industrialcraft2 has block ID conflicts with Better than Wolves. There goes my dream of having them together, at least for now...
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741151.56/warc/CC-MAIN-20181112215517-20181113001517-00428.warc.gz
CC-MAIN-2018-47
1,266
5
https://www.coursera.org/learn/aadcapstone
code
The Capstone project integrates material from throughout the Android App Development Specialization to exercise and assess the ability of learners to create an interesting Android app. Learners will apply knowledge and skills learned in previous MOOCs in this Specialization, including Java programming features; Android activity, broadcast receiver, service, and content provider (plus SQLite) components; and unit, integration, and user interface testing. The project itself is similar in scope to previous assignments in the earlier MOOCs in the Specialization. However, it is intentionally designed to enable learners to create a customized app that demonstrates their creativity and mastery of the Specialization topics. About this Course Learner Career Outcomes Dr. Douglas C. SchmidtProfessor of Computer Science and Associate Chair of the Computer Science and Engineering Program Michael WalkerInstructor - Graduate Student pursuing PhD in Computer Science Learner Career Outcomes Vanderbilt University, located in Nashville, Tenn., is a private research university and medical center offering a full-range of undergraduate, graduate and professional degrees. - 5 stars - 4 stars - 3 stars - 2 stars - 1 star TOP REVIEWS FROM CAPSTONE MOOC FOR "ANDROID APP DEVELOPMENT" Good specialization completion project in general. Only found some of the weeks a little hard to complete. Enjoyed and learned a lot, also recapped concepts I do not work with on a daily basis. Perfect course for overview and becomic basic android developer About the Android App Development Specialization This Specialization enables learners to successfully apply core Java programming languages features & software patterns needed to develop maintainable mobile apps comprised of core Android components, as well as fundamental Java I/O & persistence mechanisms. Frequently Asked Questions When will I have access to the lectures and assignments? Access to lectures and assignments depends on your type of enrollment. If you take a course in audit mode, you will be able to see most course materials for free. To access graded assignments and to earn a Certificate, you will need to purchase the Certificate experience, during or after your audit. If you don't see the audit option: - The course may not offer an audit option. You can try a Free Trial instead, or apply for Financial Aid. - The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience. What will I get if I subscribe to this Specialization? When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free. Is financial aid available? Yes, Coursera provides financial aid to learners who cannot afford the fee. Apply for it by clicking on the Financial Aid link beneath the "Enroll" button on the left. You'll be prompted to complete an application and will be notified if you are approved. You'll need to complete this step for each course in the Specialization, including the Capstone Project. Learn more. Will I earn university credit for completing the Course? More questions? Visit the Learner Help Center.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402131412.93/warc/CC-MAIN-20201001112433-20201001142433-00612.warc.gz
CC-MAIN-2020-40
3,557
28
https://www.makeuseof.com/answers/bluray-player-140/
code
I don’t really want one with a lot of bells and whistles. I would like region free and the one that has the best audio and picture quality. I have been looking at the Samsung BD-E5300 (you can use a code to unlock it to be region free) I don’t really need internet connectivity or 3D. Thanks I would really appreciate any help I can get. I have given myself a headache and spent the best part and night of a few days on this! It’s doing my head in!!!
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347419056.73/warc/CC-MAIN-20200601145025-20200601175025-00141.warc.gz
CC-MAIN-2020-24
456
3
http://www.meetup.com/Passion-for-Technology/events/146509512/
code
If you want to become good at something, you need to practice. We're trying the Coding Dojo concept, where we'll do a code kata together using the round-robin ping-pong method. (Basically we sit around a table with one computer hooked up to a projector. Two people pair program while the others watch/comment. After a while we rotate so a new pair sits at the computer) It's a fun excercise and you'll learn alot! The language will be C# but you should be ok as long as you know any other OOP language. Code kata examples here
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1433195036742.18/warc/CC-MAIN-20150601214356-00051-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
526
5
http://www1.udel.edu/htr/Statistics/Notes/class15.html
code
DEPARTMENT OF POLITICAL SCIENCE EXPLAINING VARIATION AND ANALYSIS OF - Touring the net and obtaining data - The idea of "explained" variation - Analysis of variance - Using box plots to compare measures of central tendency and dispersion among different populations. - Examples of explanation with box plots. - SOURCES OF STATISTICAL INFORMATION AND DATA: - The course internet site contains an information page that leads to some interesting statistical resources, and learning tools. We'll briefly visit some of them if we can connect. Carneige Mellon Statistics Library a set of materials on statistical graphics - STATISTICAL EXPLANATION: - As noted before (see most recently the notes for Class 14), the variation of is usefully summarized by the total sum of squares: - Note that this concept of variation measures differences around a - Statistical explanation can be viewed from two perspectives: - The numerical quantity, TSS, is partitioned into parts, an explained by independent variables portion and an unexplained or error part. - But explanation also involves comparisons among measures of central tendency such as the mean or median. - As an example, some of the total variation in Y may be "due to" the fact that some units belong to a group that has a different average value on Y than members of other groups. - This idea is best illustrated with an example. - EXAMPLE OF "EXPLAINING VARIATION": - Consider these data pertaining to median weekly earnings of various occupational groups. The analysis of these numbers has several purposes. - First, it shows how tabular data can be summarized. - More to the point, it illustrates how variation in a variable, here wages, can be partially explained by introducing another variable, here gender. - The following table shows a portion of the data. |Math & Computer |Writers & Entertainers The summary statistics for these data as a whole are: - That is, these numbers represent the mean, median, and so forth for all of the categories regardless of gender. Figure 1 shows the distribution, using the familiar box plot. - Some points to note: - Analysis of variance works with the TSS. Think of this number as a description of the data, just as, say, a number describes a person's height or a county's percent vote for Perot. - The exact number, although it does not have an intuitive interpretation, simply describes the variation in Y (e.g., weekly wages). - The social scientist's job is to explain this variation: if every occupational category had the same weekly median earnings, TSS would equal 0. But since it doesn't, one wonders what factors produce the variation, just as one can wonder why one person is tall, another short, or why one county gave Perot a substantial percent of its vote at the same time that others did - Explanations of the variation are obvious: different occupations command different salaries and wages because they are perhaps worth more to society or their workers are organized or...you can think of other - Columns two and three, however, suggest another source of variation, gender differences in pay: at every level women earn less than men. - Figure 2 shows the point: - Clearly, the average weekly earnings for women is less than for men. Here we use the median to compare; traditional analysis of variance relies on the mean, but, as we have, noted the mean is "sensitive" to extreme scores and so we will use the median and pictures to help "explain" variation. - In this instance, we would conclude that a substantial, but not total, part of the variation in wages is due to gender differences in pay. - As an aside, think about how you would interpret Figure 2. - Is there evidence of discrimination? Suppose that is your hypothesis. The statistical equivalent is that the population measures of central tendency differ. That is, think of males as comprising a subpopulation, females another. In the analysis of variance case, the research hypothesis is - Note: remember that a box plot displays medians so the above is just a way to think about the two plots. - It is clear that the data are consistent with this hypothesis or one cast in terms of medians (as in Figure 2). A more important question is why do the averages differ. That is, we have taken a first step toward explaining variation in wages but it's not a very long first step. A more interesting question is why do gender differences exist? Here are a couple of possibilities that these data cannot address (but we could find other data to sort them out): - Sex discrimination - Different work histories: men in each category have been employed longer, have more experience, more education, and so forth. - Can you think of other explanations. - ANOTHER EXAMPLE OF STATISTICAL EXPLANATION: - To see if sub-population or subgroup averages differ, we can use multiple box plots. That is, we draw a box plot for the units in each category of the independent - Here's another example: - Figure 3 on the next page perhaps shows how opinions of Jesse Jackson, an American political and religious leader, differ by "ideology." In the past Jackson has been very controversial in that some people respect him greatly whereas others can't stand him. - What explains the variation in opinions? - Political ideology seems to be related as the Figure shows. - We see that the more liberal a person is the more he or she rates - STILL ANOTHER EXAMPLE: - I obtained this example and data from the Data and Story Library at Carnegie Mellon University's "StatLib" web site. - It's a great place to visit and can be reached by clicking on sources of information and links on the class internet site. - N.M. Meltz, in "Interstate and Interprovincial Differences in Union Density," Industrial Relations, [28:2 (Spring 1989), 142-158.] wanted to explain variation in the percentage of state employees belonging to labor unions. - One variable he considered was "right to work" laws: some states make union more difficult than others by enacting rules and regulations that prevent people from being forced to join a union in order to work. - Apparently Delaware does not have such a law. - Common sense suggests that the presence of such laws, which perhaps reflect an "anti-union" attitude among citizens, would be associated with public union membership. - This idea is easy to test as in the box plot in Figure 4. - This figure suggests that the presence of right to work laws affects the rate or percentage of union membership. - We'll discuss this sort of conclusion and its supporting evidence in much more detail latter. - The data are available on the web site. - ANALYSIS OF VARIANCE: - The sort of analysis conduct above represents an "analogue" of an important statistical technique known as analysis of variance (ANOVA). - The objective is to "explain" be reference to an independent variable(s) the statistical variation in a dependent variable. - There is, for instance, variation in union membership among the states. - An investigator might suggest that this variation is due to differences in public attitudes as reflected in laws. - Of course, such a hypothesis assumes that laws reflect the will of the people, a very controversial assumption to say - In any event, ANOVA partitions the total variation (see the Section II, above) into a part that is "explained by" or attributable to the independent variable (e.g., presence or absence of right-to-work laws) and to random - We take up the statistical method in detail in the second semester of applied statistics, but for now look at this equation: - These sums of squares are just numbers. The total sum of squares represents total variation in Y (see above), the "explained by..." sum of squares is that part attributable to X, an independent variable while the "error SS" represents what is unknown or unaccounted for or "left over" after X has "done its work." - For instance, suppose TSS = 100 and we find that - In this instance we would say that X explains 50 percent of the variation in Y and that the remaining 50 percent remains, for now, unexplained. - Someone might add another variable, Z, in an attempt to reduce the unexplained or error SS further. - CREATING PLOTS WITH MINITAB: - You can create multiple box plots with MINITAB. - But the independent variable must consist of a relatively small number of - In the example above states having no right-to-work laws were coded or represented by "0" and those with such laws by "1." - Hence, the independent variable here has just two categories. - A common mistake is to attempt to create multiple plots with an independent variable having a large number of categories or levels such as more than 20. See the attached figures for information about annotating the plots. For further examples and discussion go to: Data Story and Library - They will be demonstrated in class (I hope). This site, Carnegie Mellon University Statistics Department, has a huge web site that contains numerous examples and explanations not simply of box plots but of all sorts of statistical methods. We 're going to be going back in all likelihood. - NEXT TIME: - Correlation and causation. Go to Statistics main page to H. T. Reynolds page. Copyright © 1997 H. T. Reynolds
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890514.66/warc/CC-MAIN-20180121100252-20180121120252-00512.warc.gz
CC-MAIN-2018-05
9,240
165
https://www.freertos.org/FreeRTOS_Support_Forum_Archive/June_2018/freertos_pthread_join_alike_function_5008b18bj.html
code
Hi, Is there a way to wait for a certain task to terminate? There is no explicit function that I know of, but you could put at the end of the task a notification (either direct to task or using a semaphore/queue) that the other task waits for. Perhaps you could you could implement a trace macro in the task delete trace hook that did something like write the handle of the task being deleted to a queue, then block on the queue until the handle of the task of interest showed up in it. Copyright (C) Amazon Web Services, Inc. or its affiliates. All rights reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347392057.6/warc/CC-MAIN-20200527013445-20200527043445-00403.warc.gz
CC-MAIN-2020-24
566
4
http://simplyvie.com/tag/purple/
code
New theme for your keynote in purple color. Purple is the color of people seeking spiritual fulfillment. But for me, purple give a nuance of mystery and royalty. Purple also give the feeling of warmest and coolest. So I do hope this simple keynote template can contribute in your presentation.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141216175.53/warc/CC-MAIN-20201130130840-20201130160840-00669.warc.gz
CC-MAIN-2020-50
293
1
https://www.sourcetrail.com/c/csharp/hello-world-program-in-csharp/
code
Sure, here’s a comprehensive article on a simple Hello World program in C#. Every adventure into programming starts with the classic “Hello World” program. This is a simple program that outputs “Hello World” on the screen. We will write this program in the C# (C-Sharp) programming language. C# is developed by Microsoft as part of their .NET initiative and has grown into a very popular language for both desktop and web development. static void Main() Understanding Hello World Program in C# The `using System;` at the start of the code is called a using directive. In C#, the system namespace contains all the basic classes. These include the Console class which provides a method to output data to the console. The class `Program` is declared next. This is a simple class that houses the `Main()` function. Our Main function is the entry point of our program. The .NET runtime calls the Main method. In the Main method, the `Console.WriteLine(“Hello, World!”);` statement is given. It tells the console to output the string “Hello, World!”. The semicolon at the end of this statement signifies the end of this statement. The System Namespace in C# The System namespace is a crucial part of any C# program. It provides classes and interfaces that support a wide variety of functionalities. Apart from the Console class that we used earlier, it includes mathematical functions, file input/output (I/O), network communication, threading, and many more such functionalities. All these capabilities make the System namespace a preeminent aspect of the C# programming environment. Concept of Classes and Methods in C# The concept of classes and methods is fundamental to C#, and indeed, any object-oriented programming language. A class is a blueprint for creating objects, and it encapsulates data for the object. Methods define what a class’s object can do. In our Hello World program, `Program` is the class. The `Main` method inside the class is the action that an object of the `Program` class can take. Since the action is to output “Hello, World!” on the console, that is exactly what our Hello World program does. By understanding the simple Hello World program, we take the first step in unraveling the rewarding journey of C# programming.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510387.77/warc/CC-MAIN-20230928095004-20230928125004-00355.warc.gz
CC-MAIN-2023-40
2,270
13
http://elliot-ross.me.uk/
code
Email Marketing Creative, Design & Development at Action Rocket Marketing and Advertising | United Kingdom, GB I run Action Rocket, a studio specialising in creative, design and development for the email channel. We're based in London, and work with national and international brands based in Europe and America. Before that, I was a Senior Creative Designer at e-Dialog (eBay Inc), where I was creative lead on the British Airways, London 2012 and IKEA accounts. I write a blog on email design here - http://www.emaildesignreview.com My portfolio's at http://www.elliot-ross.co.uk and I'm on Twitter at http://www.twitter.com/iamelliot Specialties: Concept, design and development for web, social, email and mobile.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697917013/warc/CC-MAIN-20130516095157-00021-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
716
7
https://bugs.webkit.org/show_bug.cgi?id=106245
code
http://www.w3.org/TR/css3-transitions/#transition-duration-property specify that a negative value for transition-duration should be treated as 0s. It's not the case in WebKit today. I wonder if the spec is accurate, I remember it was discussed not so long ago in the CSS WG. My quick test in js (not actually looking the rendering) shows that Opera returns negative values when querying the transition-duration on the computed style and Firefox seems to just drop the negative sign, so -10s would be a 10s. I really should read the editor's draft http://dev.w3.org/csswg/css3-transitions/#transition-duration-property has been updated to "A negative value for transition-duration renders the declaration invalid." so WebKit behaves correctly.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371618784.58/warc/CC-MAIN-20200406035448-20200406065948-00480.warc.gz
CC-MAIN-2020-16
742
4
https://www.experts-exchange.com/questions/28959726/Determine-whether-I-have-a-valid-connection-to-a-SQL-database.html
code
This code bombs out on the line that starts: SET rs = strDriver = "SQL Server Native Client 11.0" cnn = "ODBC;DRIVER=" & strDriver & ";SERVER=" & ServerName _ & ";Trusted_Connection=Yes;APP=Microsoft Office 2003;WSID=" & ServerName _ & ";DATABASE=" & DBName & "; " Set db = CurrentDb Set qdf = db.CreateQueryDef("") qdf.Connect = cnn qdf.ReturnsRecords = True qdf.SQL = "SELECT top 1 dbo.SomeTableName. * from dbo.SomeTableName" Set rs = qdf.OpenRecordset() rs.Close and create a new pass-through query with identical SQL string, it returns the 1 record I'm looking for, so the connection is valid, but I keep getting this error message. ODBC;DRIVER=SQL Server Native Client 11.0;SERVER=ServerName;Trusted_Connection=Yes;APP=Microsoft Office 2003;WSID=ServerName;DATABASE=dbName; Experts Exchange always has the answer, or at the least points me in the correct direction! It is like having another employee that is extremely experienced. When asked, what has been your best career decision? Deciding to stick with EE. Being involved with EE helped me to grow personally and professionally. Connect with Certified Experts to gain insight and support on specific technology challenges including: We've partnered with two important charities to provide clean water and computer science education to those who need it most. READ MORE
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038064520.8/warc/CC-MAIN-20210411144457-20210411174457-00063.warc.gz
CC-MAIN-2021-17
1,329
10
https://european-big-data-value-forum.eu/speaker/krishna-gummadi/
code
Krishna Gummadi is a tenured faculty member and head of the Networked Systems research group at the Max Planck Institute for Software Systems (MPI-SWS) in Germany. He also holds an honorary professorship at the University of Saarland. He received his PhD (2005) and B.Tech. (2000) degrees in Computer Science and Engineering from the University of Washington and the Indian Institute of Technology, Madras, respectively. Krishna’s research interests are in the measurement, analysis, design, and evaluation of complex Internet-scale systems. His current projects focus on understanding and building social computing systems. Specifically, they tackle the challenges associated with (i) assessing the credibility of information shared by anonymous online crowds, (ii) understanding and controlling privacy risks for users sharing data on online forums, (iii) understanding, predicting and influencing human behaviors on social media sites (e.g., viral information diffusion), and (iv) enhancing fairness and transparency of machine (data-driven) decision-making in social computing systems. Krishna’s work on online social networks, Internet access networks, and peer-to-peer systems has been widely cited and his papers have received numerous awards, including SIGCOMM Test of Time, IW3C2 WWW Best Paper Honorable Mention, and Best Papers at NIPS ML & Law Symposium, ACM COSN, ACM/Usenix SOUPS, AAAI ICWSM, Usenix OSDI, ACM SIGCOMM IMC, and SPIE MMCN. He has also co-chaired AAAI’s ICWSM 2016, IW3C2 WWW 2015, ACM COSN 2014, and ACM IMC 2013 conferences.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948609.41/warc/CC-MAIN-20230327060940-20230327090940-00088.warc.gz
CC-MAIN-2023-14
1,560
3
https://docs.microsoft.com/en-us/previous-versions/sql/sql-server-2008-r2/gg399139(v=sql.105)
code
View and Edit Relationships The Design tab in the PowerPivot window contains tools to help you view and manage table relationships that have been defined in your workbook. For information about how relationships are used in PowerPivot for Excel, see Relationships Overview. In Windows Vista and Windows 7, features in the PowerPivot window are available on a ribbon, which is discussed in this topic. In Windows XP, features are available from a set of menus. If you are using Windows XP and want to see how the menu commands relate to the ribbon commands, see The PowerPivot UI in Windows XP. To view and edit existing relationships Considerations for Editing Relationships When editing a relationship, consider the following: There can be only one relationship between each pair of tables. The data values in Related Lookup Column must be unique. In other words, the column cannot contain duplicates. Each table must have a single column that uniquely identifies each row in that table. The data types in Column and Related Lookup Column must be compatible. For more information about data types, see Data Types Supported in PowerPivot Workbooks. For a complete list of requirements, see "Requirements for Relationships" in Relationships Overview.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866326.60/warc/CC-MAIN-20180524131721-20180524151721-00552.warc.gz
CC-MAIN-2018-22
1,249
11
https://docs.roboticsys.com/rmp/software-tools/rapidsetup/dashboard
code
View and track RapidCode objects all in one place. The Dashboard allows you to visualize data in real-time. it lets you gauge information across RSI APIs and objects effortlessly. All while allowing you to import/export it to keep different RapidSetup instances across your organization the same. The Dashboard contains Rows (draggable) that contain predefined Columns (non-draggable) which contain Widgets (draggable). Allows you to add/move rows and widgets. Allows you to delete the entire Dashboard. Allows you to save your Dashboard as a file. Allows you to load an existing .dashboard file. Allows you to visualize the Dashboard without other RapidSetup items. Widgets represent different objects within an API (Currently only supporting RapidCode API). Each widget contains different fields and values since each widget has a different data source. An Axis widget will allow you to select any GET method as the value source. An IO widget will allow you to select an analog/digital input/output value. Add Widget Popup Hover widget to see its toolbar appear. Click edit to edit. Make changes, then click edit again to save/exit. Title of the widget. Shows where the data/value is being taken/displayed from. Represents the graphical form of the value. Numeric, string, and bool values all have different displays. A numeric value gets multiplied by this. Choose how many decimal places you would like to display. If assigned, this will display next to the value. Enlarge or reduce the size of your widget display. If non-zero, it will display ticks every X times. If non-zero, it will display bold ticks every X times. This sets the minimum value the gauge will count from. This sets the maximum value the gauge will count to. Displays allow you to visualize data in many different ways and troubleshoot problems instantly. Zoom in, change colors, add a multiplier, and more. - 1.Label (available for all datatypes) - 2.Numeric Circular Gauge (available for numeric values only) - 3.Numeric Linear Temperature Gauge (available for numeric values only) - 4.LED (available for boolean values only) Full Screen (Light Theme) Full Screen (Dark Theme) Full Screen - Dashboard Edit Mode (Dark Theme) Full Screen - Dashboard Edit Mode - Widget Edit Mode (Dark Theme)
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950528.96/warc/CC-MAIN-20230402105054-20230402135054-00118.warc.gz
CC-MAIN-2023-14
2,265
34
https://www.stechies.com/display-459gb-input-bytes-display/
code
I have Database logical size is 459 gb and Rman compressed backup size 164gb and Input bytes for rman backup is 964gb Input bytes should be equal to logical size which is 459gb or closer to that? It should display 459gb in input bytes display? Kindly share your valuable views here. Thanks in advance.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863834.46/warc/CC-MAIN-20180620182802-20180620202802-00094.warc.gz
CC-MAIN-2018-26
301
4
http://www.apparelsearch.com/fashion/widgets/fashion_widgets.htm
code
What is a Widget? In computer programming, a widget (or control) is an interface element that a computer user interacts with, such as a window or a text box. Widgets are sometimes qualified as virtual to distinguish them from their physical counterparts, e.g. virtual buttons that can be clicked with a mouse cursor, vs. physical buttons that can be pressed with a finger. Widgets are often packaged together in widget toolkits. Programmers use widgets to build graphical user interfaces (GUIs). This definition has been obtained under the GNU Free Documentation License. Definition from http://en.wikipedia.org/wiki/Widget This section of Apparel Search previously contained various fashion widgets that we created using a system from SpringWidgets. We had created widgets that website owners (fashion blogs, fashion websites etc.) could use to put fashion news onto their own website. The widget contained news from the Fashion Newspaper website (another site owned by the Apparel Search Company). Unfortunately, in an effort to control costs and consolidate products, MySpace parent company Fox Interactive Media is shuttering the SpringWidgets (which launched in 2006) and Flektor (acquired in 2007) widget platforms. Therefore, the widgets we previously created no longer work. Here is an example of a Fashion Widget if you are not sure what one would look like. Example of Amazon Widget. Here are examples that show how you would have been able to add gadgets to your own sites (if the SpringWidgets system was still working): Fashion News Widgets, Fashion Blog Widgets, Fashion Article Widgets, Clothing Industry Jobs Widget, and Fashion Model Widgets. Check out the Apparel Search Gadgets. You can also add a Fashion Industry Search Engine to your website. Don't forget to check out the Fashion Gadgets
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121355.9/warc/CC-MAIN-20170423031201-00343-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,810
17
https://electronics.stackexchange.com/questions/276820/identifying-source-and-drain-terminals-for-mosfet-circuit
code
This question already has an answer here: This is a circuit exercise from Razavi's book. He used to point to the direction of current leaving the source in his circuit for N type of MOSFETS. But here, I think the drawn arrow refers to the current leaving the drain. Now I am confused, why he made it like this? Is this even NMOS or PMOS?! Which method should I use to distinguish between source and drain?
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986653876.31/warc/CC-MAIN-20191014150930-20191014174430-00208.warc.gz
CC-MAIN-2019-43
405
2
https://devblogs.microsoft.com/oldnewthing/20060928-04/?p=29543
code
When you crash, make sure you crash in the right place Last time, I recommended that functions should just crash when given invalid pointers. There’s a subtlety to this advice, however, and that’s making sure you crash in the right place. If your function and your function’s caller both reside on the same side of a security boundary, then go ahead and crash inside your function. If the caller is a bad guy who is trying to get your function to crash, then there’s nothing the caller has accomplished if your function runs in the same security context as the caller. After all, if the caller wanted to make your program do something bad, it could’ve just done that bad thing itself! If it gave you a pointer to invalid memory and you crashed trying to access it, well the caller could have accomplished the same thing by just accessing the invalid memory directly. If your function resides on the other side of a security boundary, however, then having your function crash or behave erratically gives the malicious caller a power which he did not already have. For example, your function may reside in a service or local server, where the call arrives from another process. A malicious caller can pass intentionally malformed data to you via some form of IPC, causing your service or local server to crash. Or your function might reside in the same process as the caller but under a different security context. For example, it might be impersonating, or it may be operating on untrusted data. Another example of a security boundary is the boundary between user mode and kernel mode. Kernel mode cannot crash on parameters passed from user mode, because kernel mode runs at a higher protection level from user mode. In these cases, you want to make sure you crash in the correct context. In the IPC case, there typically will be a stub on the client side that does the hard work of taking the parameters and packaging them up for IPC. If the stub is given an invalid pointer, it should crash in the stub, so that the crash occurs in the same security context as the caller. A caller who passes an invalid pointer by mistake can then debug the crash in a context that is meaningful to the caller. (Of course, a malicious caller won’t use your stub but will instead package the data manually and IPC it directly to the server. Your server can’t crash on malicious inbound data, since that data came from a different security context.) If you’re feeling really ambitious (and few people do), you can have the server react to malformed data by returning a special error code, which the stub detects and converts to an exception. Again, this doesn’t do anything to crash the malicious caller, because the malicious caller is bypassing your stub. But it may help the caller who thought it was passing a valid pointer.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817181.55/warc/CC-MAIN-20240417204934-20240417234934-00008.warc.gz
CC-MAIN-2024-18
2,830
3
https://www.appsian.com/blog/emailing-scheduled-psquery-results/
code
One question that occasionally pops up is how to email the results from running PS/Query through the process scheduler. This isn’t supported by PeopleTools currently, but you can do it with a minor customization. The customization involves changing the PeopleTools delivered PSQUERY application engine job. That is what actually gets run when you schedule a query. There is some PeopleCode in there that uses the PS/Query API to actually run the query. So, what we want to do is grab the output after it has been generated, but before it gets posted out to the report repository. Instead of doing the customization directly inline, we’ll add the bulk of it as an external function and then just reference that function from inside the PSQUERY app engine program. For those that have been participating in our webinars (specifically in the Development Best Practices session) know that we do it this way because we can cut the cost of maintaining the customization quite a bit like this. Here’s the function that we’ll define in our work record. * Custom function for sending scheduled queries via email. * This gets called from the PSQUERY Application Engine program. Function EmailQueryResult(&qryFile As string, &queryName As string, &fmt As integer, &to As string) Returns integer; Local string &CR = Char(13) | Char(10); Local PT_MCF_MAIL:MCFOutboundEmail &email; &email = create PT_MCF_MAIL:MCFOutboundEmail(); &email.Recipients = &to; rem Calculate our file attachment information; Local string &ext = "txt"; When = 2 &ext = "pdf"; When = 5 &ext = "html"; When = 8 &ext = "xls"; Error ("Don't know how to handle output type " | &fmt); Local string &attachName = &queryName | "." | &ext; Local string &attachDescr = "Query Results for " | &queryName; rem Tailor these for your own use; &email.From = "[email protected]"; &email.Subject = "This is the subject line"; &email.Text = "The query is attached." | &CR | &CR | "I hope you like it."; &email.AddAttachment(&qryFile | "." | &ext, %FilePath_Absolute, &attachName, &attachDescr, "", ""); &email.SMTPServer = "localhost"; In the PSQUERY application engine program you’ll want to declare a reference to that function, and then add the following lines immediately after the line with the .RunToFile() method call. When that returns, the query has been run and the generated file is stored in the local process scheduler file system. After PSQUERY finishes running and the process scheduler sends the output over to the report repository, the files stored locally will be deleted, so this is a good spot to hook in. PSQUERY changes - these lines go directly after the &aQry.RunToFile call REM Should test result and/or file exist ence before emailing; Local string &to = "comma.separated.list, of.recipients.goes.here"; Local integer &res = EmailQueryResult(&sOutFile, PSQUERY_AET.QRYNAME, %OutDestFormat, &to); Now when you schedule a PS/Query to run, it will automatically email the results. Obviously this code isn’t completely production ready. The email subject and body and from are hard-coded, and the list of email addresses to actually send the query output to would need to be calculated from the process request itself, but this is good enough for you to see how it would work in your environment. If you’re interested in learning more about how to cut the cost of creating and maintaining customizations like this, let us know and we’ll get another “Development Best Practices for PeopleSoft Enterprise” webinar scheduled.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145746.24/warc/CC-MAIN-20200223032129-20200223062129-00154.warc.gz
CC-MAIN-2020-10
3,522
37
https://www.experts-exchange.com/questions/20280247/dotnet-studio-conflicts-with-IIS5.html
code
I've had some problems with VS.NET. When running an aspx page with code behind the form on a vb page, I get an error that the namespace.class (namespace of the project and class of the vb page) cannot be loaded. I resolved this by reinstalling IIS. But then some Net Windows components are missing so I have to reinstall Windows components and the problem comes back again. I expect I will continue reinstalling until I find the problem in the process. Anyone, seen this problem or know of a solution?
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794871918.99/warc/CC-MAIN-20180528044215-20180528064215-00016.warc.gz
CC-MAIN-2018-22
501
1
https://write.flossmanuals.net/jubler/installing-mplayer-on-windows/
code
Software name : MPlayer Homepage : http://www.mplayerhq.hu Software version used for this installation : 1.0rc2 Operating System use for this installation : Microsoft Windows (XP) Recommended Hardware : 200 Mhz processor (CPU) minimum First go to http://www.mplayerhq.hu/design7/dload.html We want to select a version from the "HTTP" column. The choices in the columns reflect ways of downloading the files - it is not necessary to understand the difference between HTTP (Hyper Text Transfer Protocol) and FTP (File Transfer Protocol) and BT (Bittorrent) - just choose the 'HTTP' column. Choose the second download line which reads "Mplayer1.0rc.2 Windows" (the name may alter slightly as a new version may be available by the time you read this). Regardless of the version you choose, don't choose the "GUI" version (line 3). I clicked on the 'UK' link - this is not a choice of language it is a choice of download locations (ie. which country you download the file from - choose the one closest to you). I am using the Firefox browser and so I see this : You may see something slightly different depending on what browser you use. Save the file, it will most likely download to your Desktop (but not necessarily, depending on how you have configured your browser). This file will end in '.zip' and is known as a ZIP file. The icon may be a folder icon with a 'chain' around it like this: ZIP files are compressed collections of files and you must first 'decompress' or 'unzip' the file. Windows XP and Vista have built-in helper applications for this. You need to Unzip the file to a location in your "Program File" directory (technically, it doesn't matter where you install the files, but it is good practiceto put them all software in the 'Program Files' directory). Do this by right-clicking on the file and choosing "Extract All" This will display the first screen of the 'unzip' process : Now press "Next >" and you will see the following : You must choose "Browse" and then a 'file browser' window opens : Highlight the 'Program Files' folder similar to how I have done it in the example above. Then press 'OK'. You will see the following : Click "Next >" and the Unzip process will actually start (!) : When the process is complete you will see this final screen : Now click "Finish". There has been error in communication with Booktype server. Not sure right now where is the problem. You should refresh this page.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487611641.26/warc/CC-MAIN-20210614074543-20210614104543-00165.warc.gz
CC-MAIN-2021-25
2,425
21
https://www.whonix.org/wiki/Qubes/Update
code
How to update Qubes-Whonix. It is inadvisable to run software that has reached end-of-life status. Developers do not fix existing defects, bugs or vulnerabilities in this case, leading to serious security risks. For example, in 2018 VLC Media Player in Debian jessie had reached end-of-life status in May of that year. In that case, Whonix users who did not utilize a different media player were at risk, because VLC in Debian jessie has unpatched security vulnerabilities. This VLC vulnerability does not apply to the current stable Whonix 17 release which is based on Debian Installing Additional Software See Install Software. Standard Update vs Release Upgrade Before applying a release upgrade, it is recommended to first complete a standard update in both the whonix-workstation-17 Templates, via Qubes App Menu(blue/grey "Q")→ Qubes App Menu(blue/grey "Q")→ Afterward, perform the Standard Update Steps below in both terminals. Standard Update Steps 1. Update the Package Lists For similar reasons, it is also discouraged to open a terminal in the Template and run. sudo apt update The output should look similar to this. Hit:1 https://deb.qubes-os.org/r4.0/vm bookworm InRelease Hit:2 tor+https://deb.debian.org/debian bookworm InRelease Hit:3 tor+https://deb.whonix.org bullseye bookworm Hit:4 tor+https://deb.debian.org/debian bookworm-updates InRelease Hit:5 tor+https://fasttrack.debian.net/debian bookworm-fasttrack InRelease Hit:6 tor+https://deb.debian.org/debian-security bookworm-security InRelease Hit:7 tor+https://deb.debian.org/debian bookworm-backports InRelease Reading package lists... Done If an error message like this appears. Hit:1 https://deb.qubes-os.org/r4.0/vm bookworm InRelease Ign:2 tor+https://deb.debian.org/debian bookworm InRelease ... Err:12 tor+http://5ajw6aqf3ep7sijnscdzw77t7xq4xjpsy335yb2wiwgouo7yfxtjlmid.onion/ bookworm/updates Release Connection failed Reading package lists... Done E: The repository 'tor+http://5ajw6aqf3ep7sijnscdzw77t7xq4xjpsy335yb2wiwgouo7yfxtjlmid.onion/ bookworm/updates Release' does no longer have a Release file. N: Updating from such a repository can't be done securely, and is therefore disabled by default. N: See apt-secure(8) manpage for repository creation and user configuration details. Done. 500 Unable to connect Then something went wrong. It could be: - A temporary Tor exit relay or server failure that should resolve itself; or - One or more Onion Services might be non-functional. In the first case, check if the network connection is functional by changing the Tor circuit and/or run systemcheck to try and diagnose the problem. In the second case, try setting clearnet repository links before attempting to update again. Sometimes a message like this will appear. Could not resolve 'security.debian.org' It that case, it helps to run. And then try again. If using a terminal, run the following command to install the latest system package versions. sudo apt full-upgrade 3. Never Install Unsigned Packages! If a message like this appears. WARNING: The following packages cannot be authenticated! thunderbird Install these packages without verification [y/N]? Then do not proceed! Press Man-in-the-Middle Attack, which is not that unlikely since updates are retrieved over Tor exit relays and some of them are malicious. Changing the Tor circuit is recommended if this message appears.and . Running again should fix the problem. If not, something is broken or it is a 4. Signature Verification Warnings There should be no signature verification warnings at present; if it occurs, it will look similar to this. W: A error occurred during the signature verification. The repository is not updated and the previous index files will be used. GPG error: https://deb.torproject.org stable Release: The following signatures were invalid: KEYEXPIRED 1409325681 KEYEXPIRED 1409325681 KEYEXPIRED 1409325681 KEYEXPIRED 1409325681 Caution is required in this case, even though apt will automatically ignore repositories with expired keys or signatures, and no upgrades will be received from that repository. Unless the issue is already known or documented, it should be reported for further investigation. There are two possible reasons why this could happen. Either there is an issue with the repository that the contributors have yet to fix or the user is the victim of a Man-in-the-Middle Attack. The latter is not a big issue, since no malicious packages are installed. Further, it may automatically resolve itself after a period of time when a different, non-malicious Tor exit relay is used, or following a manual change of the Tor circuit. In the past, various apt repositories were signed with an expired key. To inspect how the documentation appeared at that point, please click on Expand on the right. For instance, the Tor Project's apt repository key had expired and the following warning appeared. W: A error occurred during the signature verification. The repository is not updated and the previous index files will be used. GPG error: https://deb.torproject.org stable Release: The following signatures were invalid: KEYEXPIRED 1409325681 KEYEXPIRED 1409325681 KEYEXPIRED 1409325681 KEYEXPIRED 1409325681 W: Failed to fetch https://deb.torproject.org/torproject.org/dists/stable/Release W: Some index files failed to download. They have been ignored, or old ones used instead. This issue had already been reported. There was no immediate danger and it could have safely been ignored. Just make sure to never install unsigned packages as explained above. For another example, see the more recent Whonix apt repository keyexpired error. Although an unlikely outcome, please report any other signature verification errors if/when they appear. 5. Changed Configuration Files Be careful if a message like this appears. Setting up ifupdown ... Configuration file `/etc/network/interfaces' ==> Modified (by you or by a script) since installation. ==> Package distributor has shipped an updated version. What would you like to do about it ? Your options are: Y or I : install the package contributor's version N or O : keep your currently-installed version D : show the differences between the versions Z : background this process to examine the situation The default action is to keep your current version. *** interfaces (Y/I/N/O/D/Z) [default=N] ? N 6. Shutdown the Template Shutdown the Template from Qube Manager: Qube Manager → right-click on Template → Shutdown VM or via the contextual menu. 7. Restart/Update Whonix VMs If new updates were available and installed, it is necessary to either: - Restart any running Whonix-Gateway™ ProxyVMs ( sys-whonix) or Whonix-Workstation™ App Qube instances ( anon-whonix) so they are updated; or - Apply the same update process in any running VMs if an immediate restart is inconvenient. Note: If any dom0 packages were upgraded during Qubes system updates, reboot the computer to profit from any security updates. Non-functional Onion Services Sometimes the Debian, Whonix or Qubes onion servers are non-functional. This means updates cannot be completed automatically and an error message similar to below will appear. user@host:~$ sudo apt update Hit:1 https://deb.debian.org/debian-security bookworm-security InRelease Hit:2 tor+http://deb.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion bookworm InRelease Ign:3 https://deb.debian.org/debian bookworm InRelease Hit:4 https://deb.whonix.org bookworm InRelease Hit:5 https://deb.debian.org/debian bookworm Release Err:7 tor+http://5ajw6aqf3ep7sijnscdzw77t7xq4xjpsy335yb2wiwgouo7yfxtjlmid.onion bookworm/updates InRelease SOCKS proxy socks5h://localhost:9050 could not connect to 5ajw6aqf3ep7sijnscdzw77t7xq4xjpsy335yb2wiwgouo7yfxtjlmid.onion (0.0.0.0:0) due to: Host unreachable (6) Err:8 tor+http://2s4yqjx5ul6okpp3f2gaunr2syex5jgbfpfvhxxbbjwnrsvbk5v3qbid.onion/debian bookworm InRelease SOCKS proxy socks5h://localhost:9050 could not connect to 2s4yqjx5ul6okpp3f2gaunr2syex5jgbfpfvhxxbbjwnrsvbk5v3qbid.onion (0.0.0.0:0) due to: Host unreachable (6) Reading package lists… Done W: Failed to fetch tor+http://5ajw6aqf3ep7sijnscdzw77t7xq4xjpsy335yb2wiwgouo7yfxtjlmid.onion/dists/bookworm/updates/InRelease SOCKS proxy socks5h://localhost:9050 could not connect to 5ajw6aqf3ep7sijnscdzw77t7xq4xjpsy335yb2wiwgouo7yfxtjlmid.onion (0.0.0.0:0) due to: Host unreachable (6) W: Failed to fetch tor+http://2s4yqjx5ul6okpp3f2gaunr2syex5jgbfpfvhxxbbjwnrsvbk5v3qbid.onion/debian/dists/bookworm/InRelease SOCKS proxy socks5h://localhost:9050 could not connect to 2s4yqjx5ul6okpp3f2gaunr2syex5jgbfpfvhxxbbjwnrsvbk5v3qbid.onion (0.0.0.0:0) due to: Host unreachable (6) W: Some index files failed to download. They have been ignored, or old ones used instead. 1. Open Debian sources.list in an editor. /etc/apt/sources.list.d/debian.list in an editor with root rights. NOTE: When using Qubes-Whonix, this needs to be done inside the Template. Others and Alternatives - This is just an example. Other tools could achieve the same goal. - If this example does not work for you or if you are not using Whonix, please refer to this link. 2. Comment (#) the .onion address lines and uncomment the clearnet address lines. The code blocks should look like this; only these entries require editing. deb tor+https://deb.debian.org/debian bullseye main contrib non-free deb tor+https://deb.debian.org/debian bullseye-updates main contrib non-free deb tor+https://deb.debian.org/debian-security bullseye-security main contrib non-free deb tor+https://deb.debian.org/debian bullseye-backports main contrib non-free deb tor+https://fasttrack.debian.net/debian bullseye-fasttrack main contrib non-free #deb tor+http://2s4yqjx5ul6okpp3f2gaunr2syex5jgbfpfvhxxbbjwnrsvbk5v3qbid.onion/debian bullseye main contrib non-free #deb tor+http://2s4yqjx5ul6okpp3f2gaunr2syex5jgbfpfvhxxbbjwnrsvbk5v3qbid.onion/debian bullseye-updates main contrib non-free #deb tor+http://5ajw6aqf3ep7sijnscdzw77t7xq4xjpsy335yb2wiwgouo7yfxtjlmid.onion/debian-security bullseye-security main contrib non-free #deb tor+http://2s4yqjx5ul6okpp3f2gaunr2syex5jgbfpfvhxxbbjwnrsvbk5v3qbid.onion/debian bullseye-backports main contrib non-free Save and exit. 3. Confirm the clearnet repositories are functional. sudo apt update 4. Optional: Revert and update the package lists. Consider reverting these changes later on because onion repositories have various security advantages. Afterwards, apply Updates to refresh the package lists. Updating with Extra Care - See: How to update. Quote Andrew David Wong, Community Manager, @QubesOS. CCO, Invisible Things Lab: 3. Selecting a VM in the Qube Manager and pressing the "Update" button. [...]. (3) is a weird in-between method that is inferior to (2). For example, historically, not all of the Salt fixes applied by (2) have been applied by (3), which is a security problem. - Steps 1 and 2 can be combined with: - Rollback or indefinite freeze attacks as defined by The Update Framework (TUF) - Threat Model - Attacks and Weaknesses - https://theupdateframework.io/security/ -. - Or Whonix changes can be delayed, inspected, and then backported if the effort is worth it. Whonix uses package config-package-devwhich assumes ownership of configuration files coming from “other distributions” (mostly Debian, although third party repositories might be added by users). (Whonix on - If similar issues occur with Whonix or Qubes onion services then follow the same procedure and modify the - There is no Debian onion for fasttrack yet.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100264.9/warc/CC-MAIN-20231201021234-20231201051234-00768.warc.gz
CC-MAIN-2023-50
11,534
92
http://homebrew.stackexchange.com/questions/tagged/primary-fermentation+airlock
code
I was checking the gravity on my fermenting beer and took the top off my bucket to do so. When reattaching the airlock, the black rubber gasket on the bucket fell in. I tried to fish it out with a ... I'm attempting my first brew using a kit with all the provided ingredients (it's a lager). My brew is still in the big tub and has been there for about 2 weeks now. Initial SG was 1.040 and it's now ... I'm wondering what other peoples' experiences are with krausen at the start of fermentation. I've had some beers that have bubbled along happily without producing huge amounts of foam, and others ...
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507444339.31/warc/CC-MAIN-20141017005724-00326-ip-10-16-133-185.ec2.internal.warc.gz
CC-MAIN-2014-42
603
3
https://windows-hexerror.linestarve.com/q/so66600319-synapse-analytics-server-less-pool-every-day-morning-gives-problem-in-reading-data-from-external-tab
code
This is on Synapse Analytics Server less Pool >> Every day morning gives problem in reading data from External Table. I have a external table created on Synapse Analytics Pool and every day morning - for the first time , when I do a select * from external table - it says "Access check for 'READ' operation again 'https://abc.dfs.core.windows.net/container/12/' failed with HRESULT = ;0x80070005' then once I run the select OPENROWSET command and try to run the same query again ( select top 5 * from external table ) - it works fine. I am wondering - what may be causing this issue. Once I move to production - what if , the same issue occurs every day ? ( I mean - I can think of creating a stored proc or something to run the OPENROWSET command everyday - but wondering, is there anything else causing this issue ?) Note - I have seen this behavior for last 4 days and since its being reproducible almost everyday - thought of seeking any inputs on this. Have tried explaining the same with snapshots below. Thanks !!! Log out and Login back to the SSMS instance made the trick to resolve this issue. One of the Microsoft team member - helped us to get the root cause as "this is caused by the expired AAD token in SSMS" + "Please make sure that you are reconnected when using SSMS/ADS if you are leaving it more than an hour." User contributions licensed under CC BY-SA 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818067.32/warc/CC-MAIN-20240421225303-20240422015303-00825.warc.gz
CC-MAIN-2024-18
1,377
8
https://premium.wpmudev.org/forums/topic/there-my-wordpresss-network-appears-to-be-running-slow
code
My wordpresss network appears to be running slow. I'll be making it live by the 30th April. I also have the caching plugin installed, but have it turned off at the moment, as every time I update it, I have to delete the cache in order to see the update. Is there any way to make it run faster? I'm trying to add a menu item and it comes up with the loading icon, then stalls...
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255944.3/warc/CC-MAIN-20190520121941-20190520143941-00193.warc.gz
CC-MAIN-2019-22
377
3
https://forum.aspose.com/t/cell-locking-alternatives-for-readonly-effect/113552
code
Hi everyone, we’re currently trialing Aspose.Excel for an Excel import/export process and we’re concerned about its support for protecting individual cells. What we’d like to achieve is to be able to set individual cells as ‘readonly’ without effecting the overall usability of the spreadsheet. eg. using the Style.IsLocked property requires the worksheet to be protected. Fair enough, but when the worksheet protection is set to ProtectionType.All or Content, then also: - cell grouping becomes locked - resizing columns becomes locked - all cells default to IsLocked = true This is not the behaviour we want. We must be able to prevent a user from modifying the values of certain cells while preserving the ability to group cells, resize columns, without every cell defaulting to ‘IsLocked = true’. Any ideas? I was thinking that perhaps there may be a way to use validation instead of worksheet protection…
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668682.16/warc/CC-MAIN-20191115144109-20191115172109-00163.warc.gz
CC-MAIN-2019-47
925
16
https://serverpilot.io/blog/announcing-support-for-ubuntu-14.04-lts/
code
Announcing Support for Ubuntu 14.04 LTS April 17, 2014 We're excited to announce that ServerPilot supports Ubuntu 14.04 from the first day of its release! Ubuntu 14.04 ("Trusty Tahr") is the next in the line of LTS releases following 12.04. Even though 14.04 was only released today, we've been working on support for 14.04 while it was still in beta so that we'd be ready for its release. Many providers also released support for 14.04 today. You can already spin up Ubuntu 14.04 servers at DigitalOcean, Rackspace, and Amazon EC2. Ubuntu 14.04 includes an updated compiler, GCC 4.8.2, which can give speed improvements for compiled services like Nginx, Apache, MySQL, and PHP. Your SSD servers may also run faster on Ubuntu 14.04 due to its support for SSD TRIM. Ubuntu will be supporting 14.04 for five years (through 2019). If you're spinning up a new server that you intend to have for a long time, using Ubuntu 14.04 is a great way to know that you won't have to worry about migrating to a new server for many years to come. For ServerPilot users, all of your applications will work seamlessly on Ubuntu 14.04. Here at ServerPilot, we package the latest versions of Nginx and Apache so that your apps work the same across all of your servers. We also package and provide the same selection of PHP versions on both Ubuntu 12.04 and 14.04 so that you aren't stuck with the version of PHP the distribution shipped. Learn more about ServerPilot's support for Ubuntu LTS.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662584398.89/warc/CC-MAIN-20220525085552-20220525115552-00236.warc.gz
CC-MAIN-2022-21
1,472
9
https://www.telerik.com/forums/mapping-to-raw-type-fields
code
Hi Devanand Chahal, OpenAccess maps a RAW column to a byte. You can specify mapping as below (length of 20 is just an example) for your field and convert it to a System.String based on what the contents of the column are. <extension key="db-column" value="oracle"> <extension key="db-type" value="VARBINARY" /> <extension key="db-column-name" value="RAWCOL" /> <extension key="db-sql-type" value="RAW" /> <extension key="db-length" value="20" /> All the best, the Telerik team Do you want to have your say when we set our development plans? Do you want to know when a feature you care about is added or when a bug fixed? Telerik Public Issue Tracking system and vote to affect the priority of the items.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141195198.31/warc/CC-MAIN-20201128070431-20201128100431-00072.warc.gz
CC-MAIN-2020-50
703
13
http://www.philadelphiaspeaks.com/forum/fishtown-northern-liberties-kensington-port-richmond/27183-kielbasa-place-near-2nd-girard.html
code
Someone told me of a place to get fresh kielbasa near 2nd & Girard; however, I can't remember the name. I think it is on one of those small streets north of Girard. Anyone know the name or exact location? Thanks. (and yes, I know of the awesome places in Port Richmond, but I am interested in this one.)
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382764/warc/CC-MAIN-20130516092622-00085-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
303
2
http://associate.com/groups/futurebasic/0::53500read.html
code
On Oct 28, 2010, at 5:39 PM, Brian S wrote: > Or just check to make sure the returned mutable array ref is non-zero. The demo is sloppy code. I’ve updated the demo if you want to see it. I do this, it returns a nonvalid mutable array. I renamed a binary file in place of the file the demo writes and when it tries to read it crashes after CFArrayCreateWithContentsOfFile which returns a non-zero mutable ref.
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891811794.67/warc/CC-MAIN-20180218062032-20180218082032-00428.warc.gz
CC-MAIN-2018-09
410
1
https://community.wd.com/t/can-i-get-5-1-discrete-audio-channels-from-my-wd-tv-live-hub/61920
code
Am I able to experience surround sound through “WD TV LIVE HUB” if I have a home theatre? I usually play movies downloaded from the internet. These movies usually have audio encoded in AC3. I used to play these movies in my PC with 5.1 surround sound. Will i be able to get the same audio output (5.1 channels) from “WD TV LIVE HUB”? If yes, which all hardware, cables I need to accomplish this?
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400232211.54/warc/CC-MAIN-20200926004805-20200926034805-00093.warc.gz
CC-MAIN-2020-40
403
4
https://dirteam.com/sander/2020/07/09/knowledgebase-if-one-of-the-address-families-on-a-dual-stack-domain-controller-is-not-enabled-adding-vmware-esxi-hosts-to-the-domain-might-randomly-fail/
code
There is an issue in VMware ESXi 7.0, where adding ESXi hosts to Active Directory Domain Services fails randomly in networks with both IPv4 and IPv6 enabled. In many environments, VMware vCenter environments or VMware ESXi hosts are added to Active Directory Domain Services to allow for single sign-on with domain accounts and role-based access control (RBAC). The default configuration of Windows Server is to offer a dual network stack, offering both IPv4 and IPv6 connectivity to hosts on the network. When you’re adding VMware ESXi hosts to Active Directory Domain Services, this action fails randomly. You may experience time-outs. You may experience an error: Error: NERR_DCNotFound [code 0x00000995]. As a result, you might fail to add ESXi hosts to the domain. One of the address families on a dual stack Active Directory Domain Controller is not enabled, for example IPv6. Even after disabling IPv6 on the Domain Controller, a CLDAP ping to the IPv6 address may remain possible and gain precedence. This issue is resolved in VMware ESXi 7.0, Patch Release ESXi 7.0b and described as part of VMware PR 2556037. ESXi-7.0b-16324942 rollup bulletin contains the latest VIBs with all the fixes since the initial release of ESXi 7.0. Starting with vSphere 7.0, VMware uses components for packaging VIBs along with bulletins. The ESXi and ESX-update bulletins are dependent on each other. Always include both in a single ESXi host patch baseline or include the rollup bulletin in the baseline to avoid failure during host patching.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571996.63/warc/CC-MAIN-20220814052950-20220814082950-00551.warc.gz
CC-MAIN-2022-33
1,536
10
https://juliahub.com/company/media/2022/11/juliacomputing-is-now-juliahub/
code
November 16, 2022 – Cambridge, MA – We are pleased to announce that Julia Computing is now JuliaHub. The JuliaHub platform is designed to accelerate the development and deployment of Julia programs by technical users in a variety of engineering and computational disciplines. JuliaHub makes it easy for Julia users to explore the open source ecosystem to create, share and manage packages, to leverage parallel computing and GPUs for large-scale computations, and to serve Julia applications through web APIs. In addition to being a general purpose platform, JuliaHub also provides a suite of vertical domain-specific products that leverage this platform, including JuliaSim, Pumas, PumasQSP and Cedar. JuliaHub is cloud-first but is also available on-prem and even air-gapped. “JuliaHub has become the heart of our business and strategy, to the extent that people in the Julia community often think the company is already named JuliaHub. It only makes sense to rename the company to reflect that focus and direction,” explains Stefan Karpinksi, Julia co-creator and JuliaHub co-founder and Chief Product Officer. What isn’t changing? Our participation in the open source Julia project JuliaHub powers a game-changing, composable product suite for modeling and simulation. This includes Pumas and PumasQSP for drug development, JuliaSim for modeling and simulation of multi-physical systems, and Cedar for electronic design automation JuliaHub is led by the same co-founders: Dr. Viral Shah (CEO), Deepak Vinchhi (COO), Stefan Karpinski (CPO), Dr. Jeff Bezanson (CTO), Keno Fischer (CTO – R&D) and Dr. Alan Edelman (Chief Scientist) About JuliaHub and Julia JuliaHub is a fast and easy-to-use code-to-cloud platform that accelerates the development and deployment of Julia programs. JuliaHub users include some of the most innovative companies in a range of industries that include pharmaceutical, automotive, energy, manufacturing, and semiconductor companies. Julia is a high performance open source programming language that powers computationally demanding applications such in modeling and simulation, drug development, design of multi-physical systems, electronic design automation, big data analytics, scientific machine learning, and artificial intelligence. Julia solves the two language problem by combining the ease of use of Python and R with the speed of C++. Julia provides parallel computing capabilities out of the box and unlimited scalability with minimal effort. Julia has been downloaded by users at more than 10,000 companies and is used at more than 1,500 universities. Julia co-creators are the winners of the prestigious James H. Wilkinson Prize for Numerical Software and the Sidney Fernbach Award.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100781.60/warc/CC-MAIN-20231209004202-20231209034202-00060.warc.gz
CC-MAIN-2023-50
2,735
10
http://www.bikeforums.net/general-cycling-discussion/363265-price-question.html
code
Dear Biking Community, I recently received a Shimano bicycle as a gift and I already have a bike, and so I am interested in selling this new one. I tried to look up it's type online so I can ask for a fair price, but I can't seem to find what I'm looking for. The bike is Shimano and it says Ocean and Dart on it. Can someone who knows bikes please help me out? Thanks a lot!
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049275328.63/warc/CC-MAIN-20160524002115-00087-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
375
4
https://www.acte.in/senior-devops-engineer-now-hiring-in-intel-apply-now/
code
Senior DevOps Engineer | Now Hiring in Intel- Apply Now! Last updated on 23rd Oct 2020, Blog, Jobs in Bangalore JOB DESCRIPITION : - Setup, configure and maintain GIT repos, Jenkins, UCD etc for multi hosting cloud environment. - Working on Docker images and maintain Kubernetes clusters. - Develop and maintain the automation scripts using Ansible or other available tools. - Maintain and monitor cloud Kubernetes Clusters and patching when necessary. - Working on Cloud security tools to keep application secured. - Participate in software development lifecycle, specifically infra design, execution and debugging required to achieve successful implementation of integrated solutions within the portfolio. REQUIRED SKILLS : - Minimum 6 -8 years of experience in IT industry - Expertise in implementing and managing Devops CI/CD pipeline - Experience in DevOps automation tools. And Very well versed with DevOps Frameworks, Agile. - Working knowledge of scripting using shell, Python, Ansible or puppet or chef. - Experience and good understanding in any of Cloud like AWS, Azure, Google cloud. IBM Cloud, Redhat Open Shift. Knowledge of Docker and Kubernetes is required. - Proficient in troubleshooting skills with proven abilities in resolving complex technical issues. - Experience with working with ticketing tools (Service now is preferable) - Willing to take additional responsibilities to understand on-premise/legacy system and perform deployments as needed PREFERRED TECHNICAL : - Middleware technologies knowledge or database knowledge is desirable - Experience and well versed with Jira tool is a plus - Basic understanding of IBM Cloud and Redhat Open Shift is a plus. - Proven communication skills in a customer/stakeholder facing environment and provide support and fix the issues related with devops and cloud - You love collaborative environments that use agile methodologies to encourage creative design thinking and find innovative ways to develop with cutting edge technologies - Ambitious individual who can work under their own direction towards agreed targets/goals and with creative approach to work - Intuitive individual with an ability to manage change and proven time management - Proven interpersonal skills while contributing to team effort by accomplishing related results as needed - Up-to-date technical knowledge by attending educational workshops, reviewing publications ROLE : Technical Support Engineer INDUSTRY TYPE : IT-Software, Software Services FUNCTIONAL AREA : IT Software – Network Administration, Security EMPLOYMENT TYPE : Full Time, Permanent UG :Any Graduate in Any Specialization PG :Any Postgraduate in Any Specialization Doctorate :Doctorate Not Required
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652569.73/warc/CC-MAIN-20230606114156-20230606144156-00231.warc.gz
CC-MAIN-2023-23
2,709
35
https://addons.opera.com/en/search/?developer=jeremy-schomery
code
Popup Blocker (strict) Strictly block all popup requests from any website Alter the browser's built-in privacy settings in a toolbar popup Block third-party or all resources of style, script, image, font, xmlhttprequest types Google Reverse Image Search is a powerful capturing reverse image search tool built on top of Google Image engine. Google Translate Anywhere Access to a floating multilingual Google™ Translate panel on any webpage Tetris is a tile-matching puzzle game. Feedly Notifier Plus is a smart badged powered toolbar notifier for feedly.com Capture, Reverse Image Search a powerful capturing reverse image search tool built on top of TinEye/Google Images engines YouTube™ on Hover View YouTube while hovering mouse over a YouTube link on any website Web Clipper: Easy Screenshot all-in-on capturing tool for the visual part, the entire page, or a selective area with auto-scrolling and editing support Haven't found what you need? Check out the Chrome Web Store.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816853.44/warc/CC-MAIN-20240413211215-20240414001215-00448.warc.gz
CC-MAIN-2024-18
983
18
http://www.unitedbimmer.com/forums/99540-post1.html
code
I have read guides on how to activate your BMW E36 OBD from this article: and for my E36, I cannot get the timing right to press the petals. Does anyone know what to count or am i doing something wrong I put the key in the second position "on", I pump the petal 5 times. and nothing happens! anyone know a count i should use?
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164561235/warc/CC-MAIN-20131204134241-00076-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
325
6
https://forum.sparkfun.com/viewtopic.php?f=169&p=226538
code
I see that under "Link Loss" there is an "Alert Level" that supports both READ and WRITE. What I would like to do is use the Serial Monitor to keyboard type in a code and have the Artemis send that code to the phone app. Is there some hacky but reliable way of doing this? I am creating an embedded prototype with a companion app. I suspect that for now at least, I will send off bursts of these alert levels so that they match some lookup table that contains the data I need to Read and Write. Unless any of you have another way of doing this. Thank you for your input.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487621273.31/warc/CC-MAIN-20210615114909-20210615144909-00098.warc.gz
CC-MAIN-2021-25
570
2
https://osgeo-org.atlassian.net/jira/secure/ReleaseNote.jspa?projectId=10000&version=14800
code
- [GEOS-5615] - Disk quota negative bytes free - [GEOS-7512] - Tile Caching / Tile Layers for global layer groups result in Wicket Error - [GEOS-7708] - Border colour around reprojected GeoTIFF is not rendered as transparent one - [GEOS-7793] - Raster oversampling + reprojection issue EPSG:2154 -> EPSG:3857 - [GEOS-7855] - New style editor thinks old GeoServer CSS styles are SLD - [GEOS-7873] - Styles in json layergroup still doesn't work - [GEOS-7900] - GetMapKvpReader is not Thread-safe - [GEOS-7915] - Can not display table based pages in Turkish locale - [GEOS-7918] - Invalid scope attribute in gs-restconfig applicationContext.xml - [GEOS-7928] - Labels artifacts appears in the upper left corner of image. - [GEOS-7929] - WMS 1.3.0 GetCapabilities response doesn't validate against the schema when using LayerGroups - [GEOS-7930] - Editing style and moving it into workspace loses the edits - [GEOS-7938] - GeoFence: error in interaction with monitoring plugin - [GEOS-7941] - WfsCompatibilityTest fails if a local GeoServer is running without the sf:archsites layer - [GEOS-7944] - Null object returned when "Discard Legend" - [GEOS-7947] - New created styles will not be published by JMS plugin - [GEOS-7948] - JMS plugin handlers don't initiate transient fields of layer groups associated data stores - [GEOS-7985] - Exception thrown by GeoServer during GetMap requests on a ImagePyramid - [GEOS-7991] - Style Edit Page: Apply then Submit causes WicketRuntimeException - [GEOS-7994] - Force transformation of ROI and NoData to transparent/bg color in direct raster rendering path - [GEOS-7995] - NULL pointer exception when using JMS plugin and updating a layer resource using REST - [GEOS-7962] - Add a WMS vendor FORMAT parameter to force the return of WMS 1.1.1 capabilities in text/xml - [GEOS-7921] - Handle non error http codes (from HttpCodeException) as normal response. - [GEOS-7937] - Remove or make optional URL checks for grid formats - [GEOS-7939] - Promote YSLD community module to extension (GSIP-154) - [GEOS-7960] - Factor out non-ui specific data from GeoServerNodeInfo. - [GEOS-7980] - Reducing output size of PDF with graphic fills by using tiling patterns The text area below allows the project release notes to be copied to another document.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056974.30/warc/CC-MAIN-20210920010331-20210920040331-00229.warc.gz
CC-MAIN-2021-39
2,278
28
https://apps.mob.org/apps/floating_apps.html
code
To download Floating apps (multitasking) for Android for free we recommend to select the model of your mobile device and our system will offer you compatible files of this Android app. It is very easy to download Floating apps (multitasking) to phone or tablet: select the needed apk file and tap "Download"! Description of Floating apps (multitasking) app: Floating apps - the biggest collection of floating apps. The only application which allows you to create your own apps windows from widgets and web sites. Every application opens in a floating window on the background of other working apps which allows you to use multitask option in your device. You can move and change size of each window as well as easily start and close them. - Different floating applications - Apps over other apps - Flexible settings Download Floating apps (multitasking) app for free Specify your device and we will select compatible apps. Select phone / tab
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103624904.34/warc/CC-MAIN-20220629054527-20220629084527-00166.warc.gz
CC-MAIN-2022-27
941
9
https://dailycoursereviews.com/data-structures-and-algorithms-for-programmers-udemy-discount-global/
code
Data Structures and Algorithms for Programmers [Udemy Discount Global] Data Structures and Algorithms for Programmers Improve your logical and programming skills by mastering essentials of data structuresTake This Course ! What Will I Learn Construct a solid structure in computer technology Completely recognize information frameworks as well as formulas Create effective reasoning for a program utilizing information frameworks where called for End up being an excellent software program programmer Tackle software program interviews effortlessly Fundamental mathematics abilities A passion to find out information frameworks as well as formulas Description: Data Structures and Algorithms for Programmers For any person understanding code, the topics of information frameworks as well as formulas are directly up intimidating! Also if you have actually been coding a while, these can still be tough topics. Yet this course intends to assist you dominate these difficult ideas. Externally, information frameworks are not that puzzling to comprehend. An information framework is simply a collection of information arranged in a certain means to ensure that we can do computational procedures on its information successfully. Consider a shelf packed with publications. You can take into consideration the shelf as the information framework, as well as guides as the information. Not so terrifying currently right? … But where do formulas be available in? Mean you wished to discover a particular publication on the shelf, or kind guides in a particular order. Well, that’s where we make use of a formula. A formula is just a collection of sensible guidelines for executing a predefined job, like locating a certain publication for instance. In this instance, you would certainly check via guides on the rack, trying to match guide on the self to guide you are searching for. When you have a suit, you understand you’ve located the your publication! Incidentally, formulas are not simply scheduled for information frameworks, however they are generally linked due to the fact that we utilize formulas to communicate as well as do procedures on the information framework. Whenever you are developing a collection of guidelines to accomplish a job, you are developing a formula. Certainly, there is a whole lot even more to it than that. Simply for a begin, you have various sorts of information framework such as Lists, Trees, Stacks, Queues, and so on. This course gives a complete review of all information frameworks and also formulas Who is the target market? Any person thinking about finding out datastructures and also formulas. Pupils as well as Software Professionals Udemy 100 Coupon Code Udemy 10 Dollar Coupon Code Udemy 10 Dollar Coupon Udemy Coupon Sites Udemy Coupon 75
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488249738.50/warc/CC-MAIN-20210620144819-20210620174819-00195.warc.gz
CC-MAIN-2021-25
2,788
29
https://discuss.bitrise.io/t/git-fetch-tags-fails-on-20-04-stack/15955
code
After switching from 16.04 Ubuntu Stack to the new 20.04 one, we get the following error when calling git fetch --tags: fatal: remote error: upload-pack: not our ref ccb1f96eedeca63cc4c6f6172edb4b1708da71ca I was able to workaround this by using git fetch --tags --no-recurse-submodules. I guess thats because of the git bump from version 2.7.4 to 2.25.1 and no issue on the bitrise configuration side? Maybe someone with more git experience can verify that.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056348.59/warc/CC-MAIN-20210918062845-20210918092845-00470.warc.gz
CC-MAIN-2021-39
458
7
https://asgardia.space/en/forum/forum/feedback-11/topic/text-formatting-bar-suggestions-4916/?post=25502
code
Apr 16, 17 / Tau 22, 01 02:47 UTC Re: Text Formatting Bar Suggestions ¶ Please add Link/URL icon to add hyperlinks to referenced sites. Apr 16, 17 / Tau 22, 01 02:48 UTC Please add [BlockQuote] function. This is something I often used under the old system to indicate I'm quoting someone... Apr 17, 17 / Tau 23, 01 00:45 UTC Direct quoting other posts, if possible. Insert option for media (photo, video, audio, gifs, screengrab) Formula formatting, if possible. Apr 18, 17 / Tau 24, 01 15:54 UTC At least the features there was (even if hidden) before IT Team stripped them off, please. I really feel the need of a link creation icon (the write-url-yourself method works 1 time of 10, and 0 to 10 when copy/pasting) with text editing fields not black-on-black, if possible (I'll buy black-light goggles, if not possible ;-)). Worth noticing I'm not asking to implement something new as, I'm sure, the current framework is very full of editing features (nicely exposed by the good @nihylum de), even if disabled. Apr 24, 17 / Gem 02, 01 10:50 UTC The actual implementations remove markdown entirely. I strongly recommend to let the user decide what is used and provided a switch to a markdown editor that allows a proper markdown syntax (markdown + markdown-extra + custom tags for quoting with references + latex math notation). The WYSIWYG Editor (this is what we currently can use) should also allow expressing math equations (using latex math or whatever is considered as good), should provide a quotation interface for previous replies, code and external resources, maybe github gists. The editor should also add a guessed names list for name notations (triggered by an @) to ease to mention someone. Apr 24, 17 / Gem 02, 01 14:13 UTC > The editor should also add a guessed names list for name notations (triggered by an @) to ease to mention someone. I agree: that's why, in all my posts, I refer to other persons as @<full_profile_name>: maybe, in the future, all these meta-references will be correctly replaced by @<link_to_profile> as someone is currently doing, by hand, at now. welcome back, @nihylum de :-)
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711637.64/warc/CC-MAIN-20221210005738-20221210035738-00153.warc.gz
CC-MAIN-2022-49
2,120
21
https://letestbusiness.com/top-7-metaverse-companies-list.html
code
Top 7 Metaverse Companies List Zhengzhou to fund metaverse companies - Roblox: Roblox is a popular online platform that allows users to create and play games in a virtual world. It has a strong user base and offers a wide range of user-generated content. - Epic Games: The company behind the popular game Fortnite, Epic Games has been actively exploring the metaverse concept and has recently raised significant funding to support its development. - Decentraland: Decentraland is a blockchain-based virtual world where users can buy, sell, and trade virtual land, as well as create and experience content in a decentralized manner. - Somnium Space: Somnium Space is a virtual reality platform that aims to create a persistent, open-world metaverse where users can own virtual land, build structures, and engage in various activities. - Sandbox: Sandbox is a user-generated content platform where users can create, share, and monetize their virtual experiences using blockchain technology. It offers a decentralized virtual world and is built on Ethereum. - Spatial.io: Spatial.io is a collaborative workspace platform that allows users to meet and work together in a shared virtual environment, enabling remote collaboration and communication. - High Fidelity: High Fidelity is a company that focuses on building virtual reality technologies and platforms for social interactions, aiming to create a more immersive metaverse experience.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474526.76/warc/CC-MAIN-20240224080616-20240224110616-00673.warc.gz
CC-MAIN-2024-10
1,436
9
https://atomic-lollypop.itch.io/netblast/devlog/23043/fixed-installer-prerequisite-problem
code
Fixed Installer Prerequisite Problem Fixed a problem where a Visual Studio 2015 Redist package won't install if you already have a Visual Studio 2017 Redist package installed since they have the same major version numbers (v.14). Now, if you have a 2017 redist package at minor version 25008 or greater already installed, the Dig installer won't try and install the 2015 redist. Thanks to "lkkir" and "Thomas C. " from the TIG Discord channel for helping to identify and solve the issue! Leave a comment Log in with itch.io to leave a comment.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221209980.13/warc/CC-MAIN-20180815063517-20180815083517-00207.warc.gz
CC-MAIN-2018-34
543
6
https://mafiamods.com/forums/reply/163160/
code
Reply To: Mafia 3 Modding (Mega Thread) Okay maybe M3ScriptHook needs to be updated for game version 1.02. I was using M3 game version 1.01 last time. You have mentioned the new lua classes. How is your progress releasing the corresponding functions like you already did for game.game etc. I don’t know how to find them. I need especially functions from game.police. Is it possible to use events in lua scripts atm? Btw it would be nice if someone could host a wiki for scripting or a nice function page like the one from gta 5 here
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703517159.7/warc/CC-MAIN-20210118220236-20210119010236-00417.warc.gz
CC-MAIN-2021-04
534
5