url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
http://www.robotinker.com/entry/35/
|
code
|
For the first time since last summer, I made a game I can show! Ludum Dare 35 had the theme "Shapeshift," which was decent. I went to a jam site in Eugene with my audio guy, but we showed up a little late and it looked like a lot of people already had teams. I was thinking of doing an abstract puzzle game to minimize art requirements, but at the last minute we teamed up with a group of 3 who were discussing what they wanted to make.
Their programmer had never made a WASD/mouse shooter before, and since I've made quite a few I decided that we should make his wish come true and do another. We ended up making a top-down shooter where your head, body, and legs were all either from a spider, robot or cactus, independently. It's like of like "exquisite corpse" - the game kids play in class where they fold notebook paper into thirds and each of 3 people draw part of the person. When you open it up, things are mismatched and hilarity ensues. So yeah, that, as a shooter!
Secondly, merge conflicts are a nightmare. We were using Unity, which is okay so long as you hide metafiles, but I was advised not to hide them at first and had to basically start over after the first night. Setting up source control was tough, but we made it work the second try.
Finally, and worst of all, my computer died on submission day. We'd worked through the weekend and had something pretty cool - dynamic music with FMOD, 3-layered state changing that makes you mix and match weapons and special abilities, and a decent enemy spawning system as well. I worked through that Sunday night to get everything working well, but on Monday afternoon my laptop screen wouldn't turn on. It ended up being in the shop for almost a week, and since implementing FMOD broke our source control the only version of the game we had for submission had zero audio and a totally broken enemy spawner :(
I ended up staying at my audio guy's place out in the country, which was sort of a drive from the jam site but totally gorgeous. Sure, I slept on the floor and the bathroom was in a different house, but waking up to the misty quiet of the woods was really, really nice.
This project was ambitious - especially with no full-time artist - so the fact that we got anything done at all is a miracle. Sad that it took a week for me to get my computer back, but downloadable versions of our final game are available here!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578526923.39/warc/CC-MAIN-20190419001419-20190419023419-00101.warc.gz
|
CC-MAIN-2019-18
| 2,386 | 6 |
https://security.stackexchange.com/questions/80828/what-is-the-benefit-of-adding-data-encrypting-key-then-store-it-encrypted-alon
|
code
|
To protect user's sensitive data, I am considering the following 2 approaches:
- Create 1 data encrypting key (DEK) for each user, use it to encrypt (using AES CBC mode with a random IV for each encryption operation) all data of the same user. DEK is protected and stored separately from data.
- Use multiple DEKs, 1 each time a new piece of user data needs to be encrypted (using AES/CBC with IVs like above). The DEK is then ecrypted using a KEK corresponding to that user, and stored side by side (e.g. same row in database) with the data that is ecrypted with it. The KEK is stored securely, separatedly from the data and DEK.
Is there known vulnerabilities in AES/CBC with good random IVs? What is the benefit of the 2nd approach, other than minimizing the amount of data encrypted with the same key, thus reduce the risk of being cryptanalyzed?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100290.24/warc/CC-MAIN-20231201151933-20231201181933-00324.warc.gz
|
CC-MAIN-2023-50
| 850 | 4 |
https://davidvielmetter.com/tricks/print-dialog-is-slow-to-come-up/
|
code
|
So I ran into an issue the other day where a system would take up to 30 seconds to display a print dialog on any installed printer. Almost as if the system was encountering some kind of timeout when trying to render the print dialog. Turns out the problem manifested itself only in applications like Adobe Acrobat, WordPad, and QuickBooks, but not in Microsoft Office 2010 applications. After some digging, I found the issue is with the PrintDocument .NET method. It enumerates the available printers, so if one of these printers is a network printer that can’t be reached the system will search for it for up to 20 seconds. Here’s how to resolve the issue:
[Problem] Print dialog is extremely slow to come up in some applications on Windows XP/Windows 7.
[step 1] Click Start->Devices and Printers.
[step 2] Find any printers that are greyed out and try to delete them from the system (right-click and select delete). NOTE: If, after deleting a printer it doesn’t go away and states just deleting, you may want to check its queue for any pending jobs. To do this, simply double click (XP) or right-click and select “See what’s printing” (Win7) it and then cancel any pending print jobs in the queue. Once the queue is empty, you should be able to delete the printer.
[step 3] Check each remaining printer to make sure that it can bring up a print queue. If any printer hangs or fails to bring up a print queue, delete it and/or re-install it. Chances are, your delays are caused by a single network printer that is no longer connected to the network or is offline.
[step 4] Now send a test job to a working printer to confirm that the issue has been resolved.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890187.52/warc/CC-MAIN-20180121040927-20180121060927-00389.warc.gz
|
CC-MAIN-2018-05
| 1,672 | 6 |
https://www.baldurbjarnason.com/notes/web-and-ebooks/
|
code
|
There isn’t, at least not when it comes to development, production, design, and editing. The only thing the two have in common today are some of the nuts and bolts that make up the file formats.
When it comes to the nitty gritty of making things, they have about as much in common as a bespoke suit and a woollen cardigan, having the same base materials might be the only thing they have in common.
There are efforts underway to change this. In the long term, the point of EPUB3, as I understand it, is to move ebooks onto the web stack. That doesn’t mean ‘do what you’re doing now, but render it in webkit’, although that’s what most people seem to think.
It means fundamental change to the development, production, design, and editing processes behind ebook publication.
Because the ‘End of ebook development’ was really about applying web processes to ebook development.
It’s not really about abolishing development but about decoupling it from the writing and publishing process. So no ebook development, just theme, systems, and tools development.
In most cases, the way web development works today is as follows (generalised and simplified, of course):
The web guy (that’d be me), the designer, and somebody from either marketing or sales work together on the basic design of the website. The designer, after taking on board the needs and specifications of the company, comes up with a few ideas. Those get discussed. I give feedback on whether those would be good web designs and if there would be any implementation issues.
After a few iterations of this, the designer has put together the designs for some key websites and a design language that we can use to create all of the necessary components that the company needs to put their websites together.
I go and implement a theme or set of templates for their CMS, sometimes doing the necessary server-side programming to make it work, sometimes working with their programmers to get the integration done.
Once I’m done and the work has been fully tested, approved, and accepted, I and the designer can go away.
Whenever the marketing department wants to update the website they go into Drupal or Wordpress, write the post in the rich text editor widget and press preview. If it looks all right in the preview, then the markup is probably semantic because the only elements that are given styles in the CSS are semantic elements in that context.
A well structured stylesheet and a good CMS means that all of the pages have a solid semantic structure, which is good for search engines.
They then press ‘publish’ and the page is live. No need to call in the web guy or the designer.
They can manage google analytics, optimise their keywords/SEO, update their website, add news items, rewrite their product descriptions, etc., etc., all without ever calling the web guy again.
If web development worked like ebook development:
- The marketing department would write everything in an old version of Word and call the web guy whenever they wanted to update the website to do a ‘conversion’ from .doc to HTML.
- The ‘conversion’ would be done mostly by hand and regexes, an error-prone process that requires a massive QA process before every publication. It’s just much too easy to delete something you shouldn’t have or mistype something when you’re doing it by hand.
- All of the design would be done after the fact, leading to massive lead times from writing to publication. No company would be able to use their website to respond to rapidly changing events. Synchronising website updates to an event would require plans worthy of a large-scale military invasion. Each page would get a somewhat custom design.
- It would be impossible to do any testing on the same machine that the work is being done on. The site has to be uploaded to a special ‘web browser’ device that has no testing features and caches everything like mad so that you can’t see your changes or find out if they work.
- Every browser would be a version of IE6, incompatible with all of the other versions of IE6, each broken in subtly different ways.
- The writer would have no way of previewing what they write and have to go by Word’s WYSIWIG interface to set their document’s structure, leading to a largely unstructured document with unsemantic markup.
- A few of the browsers wouldn’t even bother to load any of the website’s CSS at all, preferring their own styles, even though they only cover a fraction of the structural semantics in the site’s code, leading to massive usability issues and miscommunication.
- There would be no serious tools anywhere. No Coda. No Expresso. No BBedit. No BlueGriffon. No Firebug. No Aptus. No Dreamweaver. No Hype. No Sandvox. No Rapidweaver. No Flux. Instead people would be trying to jury-rig Indesign to create websites.
If I had a dollar for every time I had to go in and fix a page somebody broke by hand-editing the markup, I’d have enough for another iPad and a couple of really nice accessories.
(Of course, I’ve been making websites with other people for over twelve years now.)
HTML is human-readable, but experience tells me that it certainly isn’t human-writable. Browsers use a complex parsing algorithm to compensate for errors because people keep insisting on editing markup by hand and keep doing it wrong. Even with the compensation algorithm, these errors still often manage to cause rendering glitches and massive security problems, not to mention ruining the HTML file’s overall semantics.
(Ebooks have it even worse because ereaders treat everything as XML, which allows for no errors. Which just makes the current status quo in ebook production that more insane.)
Hand-editing markup or CSS should never be done as a part of a website’s publishing process unless it’s a web developer’s personal website. Even then, they should have the sense not to do it unless they just can’t avoid it.
Write out the themes/templates by hand. Test the hell out of them. Then use either a simplified markup language (like markdown) or a CMS’s rich text editor to write and publish. Fewer errors. Less QA. Nobody touches the HTML (it’s all generated from templates, etc.). Everybody wins.
The worst, least semantic, markup I have ever seen didn’t come from WYSIWIG web design tools. It’s generally either hand-written markup or generated by an ignorant, lazy, server-side programmer.
A few CMSes I’ve seen that transitioned from table-based layouts to div-based layouts, for example, didn’t actually change the markup’s structure, but just replaced everything with divs (think thousands of nested divs instead of table, tr, and td tags). The result was a nightmare to work with.
Even the worst tool-generated markup isn’t as bad as the crap people write out by hand or some of the indistinct tag goo generated by a lazy server-side programmer.
Most modern CMSes generate tolerable markup because their survival depends on it. SEO is a major driving force in web development and the foundation of good SEO is good markup.
The exceptions are WYSIWIG tools such as Hype, but they are both edge cases (you wouldn’t use them for every page) and specialised (there isn’t much harm done if the markup for an animation isn’t that semantic). They also improve over time. Dreamweaver generates much better code now than it did a few years ago. There’s no reason to assume other, newer, tools won’t improve as well.
Complex and powerful design tools (the web equivalent to Indesign) are an edge case in web development. Most of the time you create a theme that matches the specific design needs of the client and there isn’t any need to do a complex custom design after the fact.
Given how extensible CMSes today are, there is no reason to believe that even the most complex design needs can’t be met by a combination of a custom theme and plugins/extensions to the CMS. There are very few cases that aren’t covered by this and it has the benefit of being able to reuse the design as often as you want.
At worst, you’d have to do a custom job in django or something similar.
Even one-off publications would benefit from this process as it enables the writers and editors to preview the final work throughout the writing process, which tends to improve the quality of the project’s structure and generated markup enormously.
So, there’s no reason why theme-based development can’t address complexity in design as long as it’s a standard complexity based on a reused design language.
For this to work in the ebook context there needs to be a single ebook platform (that’s why I called it an utopian fantasy, an ideal to aim for, in the original post). It needs to reach the same state as the web platform does once IE10 is released. (The web being a single platform despite its variances.) That one platform thing is an inevitability, but it looks like it might take decades.
There’s also a difference between single app one-button-publishing (one app to serve all) and an ecosystem of simple publishing tools and extensible systems. I’m advocating the latter.
The more difficult and complex the ebook is, the greater the likelihood is that it should have been a website or an app. The means need to suit the ends (to use John Dewey’s terms). A lot of what is non-fiction in publishing today is being taken over by websites and apps. They should be websites or apps. Trying to extend ebooks to cover all of these use cases (ends) is foolish.
It’s crazy that I can only buy Merriam-Webster’s English Usage Dictionary as a Kindle book and not as an app. It’s a piece of work that would benefit enormously from a custom interface, detailed searching and cross-referencing tools, and other custom gewgaws that a bespoke app could give it. Ereader platforms can never address all of those specialised features for every specialised genre of text.
(Tech references belong on the web, for example, which is why Safari Books is such a piece of genius).
Some works – some ends – do benefit from the means that ebooks and ereaders afford. But the longer ebook development and production remains as difficult as it is, the more appealing websites and apps become as alternative means to those ends.
Fixing these processes – simplifying them drastically – is key towards making sure that ebook growth doesn’t stall once fiction and simple non-fiction has transitioned. It isn’t the manifest destiny of ebooks to rule all publishing.
Unless the industry gets its act together, large parts of publishing will migrate over to the web and to apps, not to ebooks.
Web production isn’t ideal. It’s a highly flawed process based on inherently insecure technologies that are always on the verge of broken. But even at its worst (which would be mobile web dev, today) it doesn’t even come close to being as broken as ebook development.
The current state of ebook production is insane. The sooner people realise this and accept it, the sooner they can work towards fixing it.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817200.22/warc/CC-MAIN-20240418061950-20240418091950-00608.warc.gz
|
CC-MAIN-2024-18
| 11,061 | 50 |
https://serverfault.com/questions/609930/secast-blocking-ips-that-fail2ban-is-not
|
code
|
There can be many reasons for this (and I can assure you SecAst isn't pulling addresses out of thin air).
Geofencing: SecAst can block source IP's based on their geographic location. Do you have geogencing setup in the secast.conf file? If so, go to the telnet interface of SecAst and test the blocked IP's to see if they originate in a restricted geographic area.
Heuristic Patterns: Could the source IP / extension be doing things you don't expect? If a set of valid credentials have been leaked it could be that someone is making calls using these credentials, and their usage patterns are what is normally seen during fraud.
Fail2Ban missing it: It's possible that SecAst is catching things fail2ban is not. Attackers are now spreading "tests" of your security/credentials over days and SecAst may be catching those.
So...those are just some of the answers. Can you post the relevant portions of your secast.log and asterisk messages/security file? (Or if you are concerned about exposing extension names or IP information please send them to support at generationd.com)
The bottom line is that fail2ban can detect only a subset of what SecAst detects so don't expect the same IP's detected. If you post your log files (or email them) I can tell you specifically the cause(s)
Here's feedback based on the files you sent:
- The SecAst logs show all of the bans and explain why. Take a look at [Jun-5-2014 6:14:20] as an example; it shows that the IP was on the watch list and this registration attempt tripped it over the edge. Your Secast config file shows you are using a 3 day interval for detection (which is good), and this IP appears to be attempting to register every 15 hours. So fail2ban won't catch this, but SecAst is properly catching it.
- The SecAst log shows LOTS of sudden calls from extension 100, and the IP is a non-routable address. So a couple things are wrong here: first, there is clearly a suspicious calling pattern here so banning was the correct action (and you can change the sensitivity of the detection in the secast.conf). Next, since the IP for this attack is internal - you should have setup the internal IP range so that internal phones are not watched for calling patterns.
I don't see any geofencing violations - at least not in the logs you sent.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998581.65/warc/CC-MAIN-20190617223249-20190618005249-00306.warc.gz
|
CC-MAIN-2019-26
| 2,286 | 10 |
https://www.indiastudychannel.com/experts/5852-Perfect-objective-for-BPO.aspx
|
code
|
Answers1 Answers found.
It is simply the unit which provide services to unit who gave the business task to perform them.
It provides various services like call centre service, technical service, software development, data entry service etc.
Most of the companies like Airtel, Wipro, TCS etc have its own BPOs and some of others take services from others BPOs. like Genpact.
Thanks & regards
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247503249.58/warc/CC-MAIN-20190221071502-20190221093502-00020.warc.gz
|
CC-MAIN-2019-09
| 390 | 5 |
http://askubuntu.com/questions/tagged/nomodeset+11.10
|
code
|
I only just installed Ubuntu 11.10, so excuse me if this question is silly ;-) I have a Fujitsu Esprimo Mobile V655, nvidia 8200 graphics, and recently installed Ubuntu 11.10 using wubi. I had to ...
I bought a Toshiba Sattellite L755D-12F two days ago with Windows 7. I wanted to install Ubuntu 11.10, but whenever I boot it from a live cd or USB I get a blank screen. Now i've seen similar topics ...
Unable to boot into 11.10 in normal (get a black screen) OR recovery (get just a flashing cursor, no cli)
Okay, so I had a dual boot of Tango Studio (based on Ubuntu 10.04) and Windows XP. Yesterday I downloaded the .iso for Ubuntu 11.10 and attempted to install from a USB (my BIOS won't normally boot ...
I'm having trouble with Ubuntu 11.10. It has to do with nomodeset. After I boot into Ubuntu, it goes to a purple screen for about 10 seconds and then goes blank. After that nothing happens. I've read ...
Why do I briefly see a black srceen with white writing which then disappears when trying to install Ubuntu on an HP Pavilion G7?
I recently bought a HP Pavilion G7 laptop. I made a nice Ubuntu 11.10 USB using pendrivelinux. When I try to install it a black screen with white letters appears (like normally) but disappears again. ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500813241.26/warc/CC-MAIN-20140820021333-00254-ip-10-180-136-8.ec2.internal.warc.gz
|
CC-MAIN-2014-35
| 1,246 | 7 |
https://forum.keyboardmaestro.com/t/monterey-voice-control-and-button-triggers/26449
|
code
|
I'm experimenting with Voice Control in Monterey. Works great! I just have a question about triggering a Prompt button using the key assigned with "/" in KM action.
Below, the "Enter Text" button can be triggered with "e". But creating a "Custom Voice Command" to "Press E" does not work. Instead, I have to create a separate KM macro to "Simulate keystroke "E"". Why is this?
My advice comes from reading the KM documentation which says that the /e feature "will cause the Button to respond to a keystroke of ⌘«character»" but in your screenshot you have CTRL-COMMAND-Character rather than just COMMAND-Character. So based on what I read there, if you remove the CTRL modifier it should work.
My hodgepodge of screen images were not very clear. I actually created a stand-alone macro with a ""Cntrl+Cmd+E" trigger to simulated the keystroke "E" (my screen grab did not capture the trigger).
I need to read the WIKI more thoroughly. Thanks.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510297.25/warc/CC-MAIN-20230927103312-20230927133312-00271.warc.gz
|
CC-MAIN-2023-40
| 944 | 5 |
https://sixohone.mit.edu/fall17
|
code
|
Introduction to EECS via Robotics
If you are a current student, please Log In for full access to the web site.
Note that this link will take you to an external site (https://oidc.mit.edu) to authenticate, and then you will be redirected back to this page.
Week 3 (Week of 18 September)
Lecture: System Functionals and Poles
Software Lab: Wall Follower, Part 1
Design Lab: Wall Follower, Part 2
Readings and Homework
Readings: Signals and Systems
Homework: Signals and Systems
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687820.59/warc/CC-MAIN-20170921134614-20170921154614-00419.warc.gz
|
CC-MAIN-2017-39
| 475 | 10 |
http://www.sapbasis1solution.com/connect-sap-java-system-to-sld/
|
code
|
This article covers below points:At the end of this article you should be able to understand below points:
- How to Connect SAP JAVA SYSTEM TO SLD.
- Setting Up the SLD Data Supplier for AS Java Systems
- How to push JAVA System data to SLD
- Your Central SLD server is running.
- Login to the SAP NetWeaver Administrator ( http://<host>:<HTTP port>/nwa ) as an AS Java administrator.
STEPS TO CONNECT SAP JAVA SYSTEM TO SLD :
Go to –> Configuration Management –> Security Management –> Destinations->Create
Here we are creating new destination to connect with SLD Server.
Make sure destination type should be “HTTP” with name “SLD_DataSupplier” if already created then edit same destination.
Enter HostName for your SLD Server as below format and do Ping Destination to check connectivity.
Provide credential for SLD server to connect:
SLD Destination is created:
Now SLD destiantion has been created and we are ready to collect Java System data and send to SLD. Perform SLD Data Supplier Configuration.
SLD Data Supplier Configuration:
Now Click on Collect and Send Data.
You should get below successful message .
Now you can verify your Java System detail in SLD server.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817253.5/warc/CC-MAIN-20240419013002-20240419043002-00083.warc.gz
|
CC-MAIN-2024-18
| 1,187 | 18 |
https://dev.to/dailydotdev/what-s-hot-in-web-development-weekly-picks-158-2pij
|
code
|
Every week we publish the top 10 popular posts on daily.dev.
This week's articles will help you move your development environment to the cloud, become a web developer, and learn cool new libraries.
Shout out to all the authors 👏
🏅 Clean Coding is all about readability. Help others or even your future-self to maintain this code you just wrote. Here 10 guidelines for you to follow.
📝 Mainly basic facts about operators but there are also some cool easter-eggs that you probably didn't know about some operators.
🤯 A walk-through with code-snippets to lax.js. A super cool library if you ask me.
☁️ A cost-efficient method to migrate your development environment to the cloud.
🤔 Overcoming the clickbait title, this article extracts some information from the StackOverflow's survey. The data is laid out nicely, not sure if this will help you to choose your next language.
🆚 A slightly biased comparison of Go and Nodejs. It includes some aspects such as performance and development tools.
🧙♂️ The journey of a 30-years-old guy that never wrote a line of code for building his first product. This post includes useful resources, courses, and tools.
🛣 A comprehensive roadmap for becoming a web developer. It includes 3 parts tools, languages, and libraries. Every step has a reference for a course or tutorial to learn from.
🗜 Squoosh is an image compression tool. The Chrome team just launched a new version with great new features and perks.
🌑 GitHub recently launched a dark mode but could it be too dark? Apparently, yes.
That was all for this week. We will come back with another list of interesting development posts next week.
daily.dev delivers the best programming news every new tab. We will rank hundreds of qualified sources for you so that you can hack the future.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818374.84/warc/CC-MAIN-20240422211055-20240423001055-00862.warc.gz
|
CC-MAIN-2024-18
| 1,815 | 15 |
https://forum.xojo.com/t/dynapdf-how-to-resizing-pdf-pages/33082
|
code
|
I would need to be able to resize a PDF document which I am able to but I still do not know how to scale the contents to fit the new page size.
Currently my codes are as follows
[code] call pdfexport.openimportfile(fx,0,"")
// do resizing of PDF pages if mresizingmethod <> "As Is" then dim px,py as integer py = pdfexport.getpagecount for px = 1 to py call pdfexport.editpage(px) call pdfexport.SetPageheight(newheight) call pdfexport.SetPageWidth(newwidth) call pdfexport.endpage next end if call pdfexport.closeimportfile [/code]
I did consider using the ImportPDFFile with scaling but I got no idea which ImportFlag to use and also how do I get the yet imported pages dimensions to work out the scaling ratios as each page may be of a different size.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.78/warc/CC-MAIN-20220817001643-20220817031643-00668.warc.gz
|
CC-MAIN-2022-33
| 754 | 5 |
https://www.ques10.com/p/68916/explain-introduction-to-ccn-content-centric-netw-1/
|
code
|
CCN is a new networking paradigm. The routing is based on the information itself, so as to find sources that can deliver the requested content without having an a priori location for the content.
The communication is then largely different from the IP model, where a communication path between two end hosts is established first before the actual exchange of information. In CCN, there is no connection, and any node (source or caches) having the content can provide it; the decision is just based on the content names.
This approach can present a great opportunity for the Internet of Things (IoT) networks, where the main goal is to collect information provided by some IoT objects (say, sensors for temperature, pollution, heart rate, metering, etc.).
In IoT, the end-user wants to know what the value of some parameter is and have a network which follows similar principles can then offer ease to gather this information.
In CCN, information objects are hierarchically named so that they can be aggregated into prefixes.
The main motivation for hierarchical naming is that forwarding content by name can be performed by using concepts similar to IP forwarding based on longest prefix matching lookups. Names are hierarchically organized in a lexicographic ordered tree data structure.
With the hierarchical naming scheme, the trust establishment between content publishers and content consumers in CCN can also be hierarchically structured by using the SDSI/SPKI model and authorization at one level of the namespace can be granted by a key certified at a higher level.
CCN communications are based on two packet types: Interest and Data. A consumer asks for content by broadcasting over the network an Interest in that content.
Any host hearing this Interest forwards it to its neighbors unless it locally holds the queried content and can immediately serve the consumer with a Data message.
The latter case means that the name in the Interest is a prefix of the content name in the Data packet. As Interest and Data packets are identified by the full or relative name of queried content, any CCN node involved in the communication can cache data or use the Interest to update its Forwarding Information Base (FIB).
CCN forwarding is actually similar to the IP forwarding plane for fast lookup of content names in the Interest packets.
The figure describes the functional parts of a CCN node: the FIB to find the appropriate interface(s) to which arriving Interest packets should be forwarded to reach the providers of queried content, a Content A store that is the buffer memory for content caching (typically using an LRU policy to keep new content), and a Pending Interest Table (PIT) to keep track of the inbound interfaces of received Interest packets so that a Data packet sent back as a response to an Interest registered in the table will be delivered to the right interface(s).
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100112.41/warc/CC-MAIN-20231129141108-20231129171108-00650.warc.gz
|
CC-MAIN-2023-50
| 2,891 | 12 |
http://disability-hist.livejournal.com/381.html
|
code
|
Hi everyone! I hope to get some good discussions going here about disability history or anything related. I hope there is some interest in this community since there really isn't anything else on LJ like this (at least that has ever been updated.) I hope you all enjoy yourselves and learn something while you're at it! :) Feel free to post something to get us started!
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00090-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 369 | 1 |
https://chromium.googlesource.com/chromiumos/graphyte/+/refs/heads/master
|
code
|
|author||Mike Frysinger <[email protected]>||Tue Aug 04 15:23:57 2020|
|committer||Commit Bot <[email protected]>||Wed Aug 05 00:19:53 2020|
fix OWNERS path The find owners module will use the path in the current repo as the implicit prefix even when crossing repo boundaries, so make sure we have an explicit / anchor when loading. It doesn't make a difference in this repo, but might as well avoid copy & paste confusion. BUG=None TEST=find owners can find owners for this Change-Id: I6b20e46e6e8c5f7a4e41f5474cff4a31f888525a Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/graphyte/+/2336815 Tested-by: Mike Frysinger <[email protected]> Auto-Submit: Mike Frysinger <[email protected]> Reviewed-by: Hung-Te Lin <[email protected]> Commit-Queue: Hung-Te Lin <[email protected]>
Graphyte (Google RAdio PHY TEst) is a Python based software framework for the calibration and verification of wireless connectivity radios in design and manufacturing. It is designed with an open, extensible architecture enabling wireless silicon and instrumentation vendors to develop their own plugins for PHY calibration and verification. The initial focus is on Wi-Fi and Bluetooth with 802.15.4 on the horizon.
Please refer to the user manual for more details.
No build step is required.
$ (sudo) make install
$ (sudo) pip install .
$ (sudo) pip uninstall graphyte
Create a tarball by: make dist The tarball can be found under the folder ‘dist’
Copy the tarball to target machine
Extract the tarball
Inside the extracted folder, type the command to install:
$ (sudo) pip install
Please find the user manual here for more details.
An interactive shell is also implemented to analyze the interactions between a DUT and an instrument step by step.
Follow these steps to start the interactive shell:
Install the graphyte framework and necessary plugins.
Follow the user manual to create a valid config file.
Run the interactive shell by:
$ python -m graphyte.plugin_shell path/to/config/file
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107893845.76/warc/CC-MAIN-20201027082056-20201027112056-00459.warc.gz
|
CC-MAIN-2020-45
| 2,034 | 21 |
https://www.celtic-heroes.com/forum/viewtopic.php?f=4&t=103550&view=print
|
code
|
Hey there, sorry to hear about that issue!
First of all, I'd highly recommend removing your username from your post - this is a public forum, and it's not a great idea to make half your login information available to the public.
Secondly, you don't need to post 3 times about the same issue. One is usually more than enough.
Thirdly, that error can only be resolved by Support. You'll need to email them ([email protected]
), tell them the error, then give them your username and any info about the account that you can remember (character names, classes, servers, rough level estimates etc). It may take them anywhere from a day to a week for them to get back with you (depending on the current Support ticket backlog), but be patient and they will respond!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178389798.91/warc/CC-MAIN-20210309092230-20210309122230-00578.warc.gz
|
CC-MAIN-2021-10
| 771 | 5 |
http://www.catforum.com/forum/38-health-nutrition/160056-recurring-urinary-infection.html
|
code
|
Nope! It's a little less than what the maximum would be (34mg).
So, that first injection - prednisolone - wasn't an antibiotic, but, a steroid used as an antiinflammarory. Sorry to have "gone on" about the Convenia - a best guess based on what was known.
UTIs can be very hard to eradicate, so longer-than-usual dosings are to be expected. For Baytril, the max recommended duration is 30 days - but, some cats require even longer.
Just curious, was an urine culture ever done?
Last edited by marie73; 12-25-2012 at 10:11 PM.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320263.78/warc/CC-MAIN-20170624133941-20170624153941-00685.warc.gz
|
CC-MAIN-2017-26
| 524 | 5 |
http://www.northernsounds.com/forum/showthread.php/67376-A-Few-Questions
|
code
|
Hi I am brand new to this forum and am very sorry if this topic is in the wrong place or these questions have already been answered, but I am a total noob to playback etc. and I have 3 questions.
1. often when I am playing back my score (a larger one) in finale 2008 with GCM it will skip and fall out. Then when I close finale I get the error message Mem_Bad_Pointer. Can anyone help with this?
2. I am trying to play back an entire marching band show that I'm writing however once I get all of my staves setup and stuff, some of them playback other staff sounds (i.e. a percussion staff plays back flute sounds) or they don't play back at all. I am a noob to playback software; is there something I can do about this?
3. I have been pretty satisfied with the GCM so far. however, to me the trumpet playback hasn't been quite what i'd hoped for. Has anyone else experienced this and are there solutions?
Thank You so much in advance for any help you can offer. I am very new to this software and I trying to get going on some stuff.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718426.35/warc/CC-MAIN-20161020183838-00010-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 1,033 | 5 |
https://prograftmedical.com/en/best-blackjack-local-casino-web-sites-united-kingdom-2024-gamble-online-black-jack-regarding-the-uk/
|
code
|
The new black-jack games offered is actually Vintage 21 black-jack, Suit ’em Upwards blackjack and Primary Sets. Such 3 video game is played inside trial form which demands no deposit. The fresh black-jack game, in particular, also provides a choice of four investors, with Oliver being a standout to have his enjoyable identity and promising statements. As the band of table video game could be minimal, the new live dealer and you can video poker options compensate for they having an array of fun games.
https://top-casino-promo-codes.com/jonny-jackpot-casino-promo-codes/ While it appears to be just the right opportunity, while the Alive Broker Black-jack doesn’t believe in RNGs, the reality is that card counting within the alive video game try impossible. Not merely perform live dealer online game play with 6 to 8 porches, and that complicates the issue by itself, nonetheless they as well as merely rise to 50percent penetration. Thus you’ll never ever work through 50 percent of the fresh patio, hence to make their depending feel totally useless. Certain real time black-jack video game try used apparently reduced stakes, which makes them best for beginners.
It has been estimated that local casino’s chances of successful is actually a bit 1percent more than the ball player’s. Just before getting permitted to enjoy live black-jack the real deal currency, you need to perform a free account with an on-line gambling enterprise. Only select one of one’s operators out of my personal number and you can indication right up by the filling out a registration function. As soon as your membership is made, put some funds in it and you can initiate playing. All the modern real time blackjack video game is cellular-compatible, and therefore you may enjoy playing him or her on your private portable otherwise pill. Above all else, mobile people have the ability to a comparable alternatives while the desktop users.
Usually, he or she is compatible with Window, Android, and you will apple’s ios. To the left otherwise right, you’ll understand the settings, game, and character. Really casino apps have fun with the same user interface so you already learn where things are. Comfort – You could potentially enjoy on the web Blackjack from anywhere and at at any time, as long as you features a steady net connection. Immediately after the guy really does, you could potentially grab the opportunity and you may split up or double down.
One gambling on line that takes place to your sites found exterior Asia is not illegal. Since most web based casinos are found outside India, on the web blackjack remains judge. JeetWin is amongst the top web based casinos to own Indians, and they’ve got a mobile software one black-jack players are able to use. Aside from Microgaming, Playtech stands while the prominent and more than common supplier out of gambling establishment online game to several gambling on line web sites. The software program supplier came into existence 1999 that is replaced in public places for the London Stock exchange. An educated Australian online casinos wish to share with you bonuses and advantages in order to invited the fresh players and create up customer commitment with their established people.
For many who’re also trying to find on line black-jack game, searching not any longer than just People Gambling enterprise. If you’re also seeking to gamble black-jack on the internet real money, this is one of your finest alternatives. They give numerous immediate winnings headings in addition to keno, hi-lo and digital scrape cards along with having a fantastic black-jack experience. Should anyone ever need assistance on the webpages there is also a dedicated customer service line that’s unlock and you will operational twenty four times twenty four hours and seven days a week.
Of numerous black-jack players such doing by using the games’s free models. So it 100 percent free blackjack practice allows people to try out other procedure and have a better comprehension of the chance just before to try out blackjack video game the real deal money. Smaller serious gamers prefer to try out on the internet black-jack enjoyment simply because they don’t need to make a deposit, manage an internet account, otherwise give people private information. Online game designers have created a lot of apps that enable players to participate societal black-jack games.
We should win because there is money involved, that can be used in the real world. Stake small amounts if you lose they doesn’t damage their money. Brief bets is studying enjoy that can be used to set up oneself to have high bet. When you begin profitable continuously visit the 2nd stake level and find out how you manage there. PlayAmo – PlayAmo also offers certain Black-jack video game, and live specialist Black-jack, and allows players playing at no cost or for real money. The new local casino are authorized and you will controlled by Curacao age-Gambling and provides secure and easier financial possibilities.
Bovada has a lengthy record in the market for quick earnings and you will fair enjoy. Blackjack professionals can enjoy a good step 3,100000 bonus from Bovada, coordinating 100percent of one’s earliest about three deposits (around 1,100000 for each). Bovada welcomes Bitcoin, Zelle-to-BTC deposits, and you can biggest borrowing and debit places. That have cellular betting and offered, Bovada is the greatest 21 selection for AZ players.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817442.65/warc/CC-MAIN-20240419172411-20240419202411-00305.warc.gz
|
CC-MAIN-2024-18
| 5,498 | 9 |
https://universetoday.fireside.fm/1054
|
code
|
[Interview] Can Life Exist Around Red Dwarf Stars?
Red Dwarfs will be the longest living stars in the Universe. Many of them have planetary systems, like the famous Trappist-1. But there is a big problem, as red dwarfs can emit mega-flares which could render planets uninhabitable. Finding out, if there is any hope for finding life and how can we study red dwarfs better with Dr Ward Howard.
👉 Ward Howard's website:
🦄 Support us on Patreon:
📚 Suggest books in the book club:
- 00:00 Intro
- 01:31 How bad are red dwarf flares
- 16:28 How to solve the flares problem
- 21:43 Lifecycle of red dwarfs and their planets
- 30:02 Any hope for life?
- 35:25 Brown dwarfs
- 36:40 Our place in the Universe
- 41:21 Future of explanatory research
- 48:58 More interviews and final thoughts
📺 VIDEO VERSION
📰 EMAIL NEWSLETTER
Read by 60,000 people every Friday. Written by Fraser. No ads.
Subscribe. It's FREE: https://universetoday.com/newsletter
📩 CONTACT FRASER
Creative Commons Attribution 4.0 International (CC BY 4.0)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00467.warc.gz
|
CC-MAIN-2023-50
| 1,032 | 20 |
https://www.theladders.com/job/engineering-manager-customer-solutions-infrastructure-clinc-ann-arbor-mi_41645962
|
code
|
Who We Are
We started Clinc in 2015 with the mission to use the best advancements in academic research, science and technology to create a meaningful and tangible impact on the world. Since then, we have seen exponential growth delivering cutting-edge technology at global scale, and empowering people to lead more enjoyable lives with conversational AI. We are a passionate group of change-makers inspired by the world's most difficult challenges and a gritty resolve to take them on. If you want to influence the future of AI and make our world a better place to live, join us.
About the Role
We're looking for an experienced engineering manager for our Customer Solutions engineering team, who are looking to work on cutting-edge technology alongside a group of talented engineers in our Ann Arbor HQ!
Valid through: 2020-2-17
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875142323.84/warc/CC-MAIN-20200217115308-20200217145308-00024.warc.gz
|
CC-MAIN-2020-10
| 829 | 5 |
https://developer.jboss.org/thread/9814
|
code
|
My problem - run rich(3.14) application into jbossportal (2.6). I have a next link
But in my case, this dont work :-(
And i am not understand why!!!! I have a different exception.
PS. This web application work fine on the tomcat.
It would be great if you gave more information about what happens. Do you get an exception, isn't the link shown, anything strange logged, is the link part of a page flow you're executing, isn't a method on the backing bean called?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659063.33/warc/CC-MAIN-20190117184304-20190117210304-00177.warc.gz
|
CC-MAIN-2019-04
| 461 | 5 |
http://ngosecurity.blogspot.com/2011/12/security-theater.html
|
code
|
Vanity Fair has a great article on "security theater
" with insights by two of my favorite security and risk commentators (Bruce Schneier and Paul Slovic). Read the piece and reflect on how it applies to humanitarian security. While it's easy to take potshots at TSA and government airport security practices, it's a lot more difficult to take a critical look at your organization's and your own decisions following a crisis event.
Some questions I always ask myself following such an event include: Are my decisions based more on emotional aftermath versus the reality of the situation? Have I thought about the actual cost of my decisions? Am I perhaps guilty of engaging in security theater? And if so, is that always bad?
Mindfulness paves the path for better coping with future crisis...
Labels: Perception, TSA
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119995.14/warc/CC-MAIN-20170423031159-00059-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 816 | 5 |
https://lists.freedesktop.org/archives/cairo/2020-August/029019.html
|
code
|
[cairo] cairo_image_surface_create(), limited width
stan at jesmanowicz.com
Sun Aug 2 11:25:14 UTC 2020
I am using x11-libs/cairo library on Unix/Linux platforms for a long time.
Back in 2005 I have found out one limitation, that caused me a problem
to generate running text (ticker) form rss feeds.
Basically the ticker generates a 'long thin image', where width can be
quite big and height relatively small.
I had to modify function _cairo_image_surface_is_size_valid() in file
I have forgot to send this observation then, but better late then never ...
The original function, as in cairo-1.17.3:
/* Limit on the width / height of an image surface in pixels. This is
* mainly determined by coordinates of things sent to pixman at the
* moment being in 16.16 format. */
#define MAX_IMAGE_SIZE 32767
_cairo_image_surface_is_size_valid (int width, int height)
return 0 <= width && width <= MAX_IMAGE_SIZE &&
0 <= height && height <= MAX_IMAGE_SIZE;
_cairo_image_surface_is_size_valid (int width, pixman_format_code_t
uint64_t stride = (uint64_t) (width * PIXMAN_FORMAT_BPP(pixman_format));
return (stride > INT32_MAX) ? 0 : 1;
And my 'long images' ware working OK then.
Some questions regarding the original implementation:
- What is 16.16 pixman format?
As I see in the pixman 0.40.0 implementation:
CAIRO_FORMAT_ARGB32 is PIXMAN_a8r8g8b8 (this is what I mostly use)
and one of the 16 pixman format is PIXMAN_r5g6b5
- Where from came the MAX_IMAGE_SIZE 32767?
It is maximum of 16-bit integer - 1, hex 0x7FFF
- Do we really need this conservative check
Because pixman checks this also and much more precisely in function
(pixman/pixman-bits-image.c, line 1335):
bits == NULL || (rowstride_bytes % sizeof (uint32_t)) == 0, NULL);
Please consider to change it like in the attached patch file,
or remove the check completely.
Stanislaw Jesmanowicz stan <at> jesmanowicz <dot> com
Amsterdam voice : + 31 20 6126193
The Netherlands mobile: + 31 653380520
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 2402 bytes
Desc: not available
More information about the cairo
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585270.40/warc/CC-MAIN-20211019140046-20211019170046-00138.warc.gz
|
CC-MAIN-2021-43
| 2,096 | 43 |
https://elbruno.com/2016/11/28/podcast-news-from-connect-2016-google-linux-net-foundation-samsung-tvs-visual-studio-2017-visual-studio-for-macs-and-more/
|
code
|
Today’s podcast have some updates from Connect 2016. The format is quick podcast, only with myself and I am pleased to share a little about what most caught my attention from the event.
Topics as Google joining .net Foundation, Microsoft announcing it’s Platinum support at Linux Foundation, support for the development of apps for Tizen (Samsung TVs!), and finally everything new in the family of Visual Studio: Visual Studio 2017 RTM, Visual Studio Mobile Center and Visual Studio for Mac.
This time it makes more sense than ever reference materials, so I recommend you to see the post related to this podcast to see all links.
And bonus, 136 videos recorded on Connect 2016 for free on Channel 9 (link)
I hope you enjoy it. Podcast Link
Greetings @ Toronto
- Podcast, Novedades desde Connect 2016: Google, Linux, .Net Foundation, Samsung TVs, Visual Studio 2017, Visual Studio for Macs y más !
- Connect(); 2016: Microsoft joins the Linux Foundation and releases new solutions for any developer, any app, and any platform
- Microsoft Steps Up Its Commitment to Open Source
- Microsoft Fortifies Commitment to Open Source, Becomes Linux Foundation Platinum Member
- Welcome, Google and Congratulations Samsung!
- Microsoft’s Commitment to Open Source Expands Opportunities
- Microsoft Azure Announces Industry’s First Cloud Bot-as-a-Service
- Google Cloud to join .NET Foundation Technical Steering Group
- Introducing Visual Studio Mobile Center (Preview)
- Announcing the new Visual Studio for Mac
- Visual Studio 2017 Release Candidate
- Linux, Microsoft Steps Up Its Commitment to Open Source From
- Music, Safety Net https://www.youtube.com/audiolibrary/music
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710968.29/warc/CC-MAIN-20221204072040-20221204102040-00352.warc.gz
|
CC-MAIN-2022-49
| 1,675 | 19 |
https://github.com/xelifret0
|
code
|
- Joined on
Feb 6, 2010
- developer_access 5 allow or deny access to a PHP application based on if a $_GET or $_COOKIE is set
- datelib 3 This lib offers extensions to the standard python 2.5+ datetime and dateutil.relativedelta modules. It allows to work with start and end dates with ease.
- rdns.py 3 Reverse IP DNS Console Script - Scrapes Whois.WebHosting.Info - Complete with Captcha sensing and validation capability by use of imagemagick
- application_developer_tools 2 tools to assist in development
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824204.27/warc/CC-MAIN-20160723071024-00291-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 508 | 6 |
https://hacktober.weareasterisk.com/?fbclid=IwAR02qesXBCCw-Tp_mAwFSzwiwxnmFXqakCRUBI7HJeCVPMbPC7jJatOJNqo
|
code
|
T-MOBILE HACKATHON – TERMS AND CONDITIONS
Sponsored by T-Mobile US, Inc. (“T-Mobile”)
Eligibility. The Hackathon is open to individuals who are invited by T-Mobile to participate in the Hackathon. Employees, family members of employees, contractors, or other affiliates of T-Mobile are not eligible to participate in the
Hackathon. Notwithstanding the preceding sentence, the relatives of T-Mobile employees, contractors, or other affiliates may participate at T-Mobile’s discretion; provided, however, that relatives of T-Mobile employees, contractors, or other
affiliates will not be eligible to win prizes or awards. Participation in the Hackathon constitutes Participant’s full and unconditional agreement to and acceptance of these Terms and Conditions (“Terms”). The term “you” refers to
you, and may be used interchangeably with, the “Participant”.
Your Participation. You must make your own travel and accommodation arrangements and cover all associated costs and expenses. T-Mobile is not responsible for, and will not assist in resolving, any disputes between you and other Hackathon
Participants. You must make your own travel and accommodation arrangements and cover all associated costs and expenses.
Your Devices. During the Hackathon, you will use your own devices, including mobile devices, tablets, and laptops, you assume all risk associated with the use of your devices, and T-Mobile’s shall have no liability for damage to your
No Employment. You are not an employee of T-Mobile and participation in the Hackathon does not and will entitle you to a job with T-Mobile.
Prizes, Awards, and Scoring Criteria. The prizes for the Hackathon shall be selected at the sole discretion of T-Mobile and awarded to participants by T-Mobile in its sole discretion. All decisions of T-Mobile relating to Prizes,
Awards, and Scoring Criteria are deemed final and binding.
Indemnity. You agree to release, indemnify, defend and hold T-Mobile, its affiliates, subsidiaries, parents, directors, officers, employees, sponsors and agents, including advertising and promotion agencies, and assigns, and any other
organizations related to the Hackathon, harmless, from any and all claims, injuries, damages, expenses or losses to person or property and/or liabilities of any nature that in any way arise from participation in the Hackathon or acceptance
or use of a prize or parts thereof, including without limitation (i) any condition caused by events beyond T-Mobile’s control that may cause the Hackathon to be disrupted or corrupted; (ii) any claim than a Participant’s entry infringes
third party intellectual property or proprietary rights; (iii) any disputes among Participant team members, (iv) any injuries, losses, or damages (compensatory, direct, incidental, consequential or otherwise) of any kind arising in connection
with or as a result of the prize, or acceptance, possession, or use of the prize, or from participation in the Hackathon; (v) any printing or typographical errors in any materials associated with the Hackathon; technical errors that may
impair your ability to participate in the Hackathon; or (vi) errors in the administration of the Hackathon.
DISCLAIMER. IN NO EVENT WILL T-MOBILE BE LIABLE TO YOU FOR ANY DIRECT, SPECIAL, INCIDENTAL, EXEMPLARY, PUNITIVE OR CONSEQUENTIAL DAMAGES (INCLUDING LOSS OF USE, DATA, BUSINESS, PROPERTY OR PROFITS) ARISING OUT OF OR IN CONNECTION
WITH YOUR PARTICIPATION IN THE HACKATHON, WHETHER SUCH LIABILITY ARISES FROM ANY CLAIM BASED UPON CONTRACT, WARRANTY, TORT (INCLUDING NEGLIGENCE), STRICT LIABILITY OR OTHERWISE, AND WHETHER OR NOT T-MOBILE HAS BEEN ADVISED OF THE POSSIBILITY
OF SUCH LOSS OR DAMAGE. Some jurisdictions do not allow the limitation or exclusion of liability for incidental or consequential damages, so the above limitation or exclusion may not apply to you.
General. The Hackathon is subject to federal, state, and local laws and regulations. The Hackathon is offered by T-Mobile, which is not responsible for (i) late, lost, damaged, incomplete, or misdirected Hackathon entries, responses,
or other correspondence, whether by e-mail or postal mail or otherwise; (ii) theft, destruction, unauthorized access to or alterations of Entries; or (iii) phone, electrical, network, computer, hardware, software program or transmission
malfunctions, failures or difficulties. All intellectual property associated with a Participant entry will remain property of the Participants(s) authoring the same. T-Mobile reserves the right, in its sole discretion, to cancel, modify
or suspend the Hackathon in whole or in part, in the event of fraud, technical or other difficulties or if the integrity of the Hackathon is compromised, without liability to the Participants. T-Mobile reserves the right to disqualify any
Participant, as determined by T-Mobile, in its sole discretion. These Terms are governed by the law of the State of Washington, without reference to rules governing choice of laws. Any action, suit or case arising out of, or in connection
with, this Hackathon or the Terms must be brought in either the federal or state courts located in the State of Washington, County of King, City of Seattle. T-Mobile’s failure to enforce any provision of these Terms shall not constitute
a waiver of that provision.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358953.29/warc/CC-MAIN-20211130050047-20211130080047-00078.warc.gz
|
CC-MAIN-2021-49
| 5,326 | 28 |
https://arxiv-check-250201.firebaseapp.com/each/2404.00633v1
|
code
|
IPT-V2: Efficient Image Processing Transformer using Hierarchical Attentions
Recent advances have demonstrated the powerful capability of transformer architecture in image restoration. However, our analysis indicates that existing transformerbased methods can not establish both exact global and local dependencies simultaneously, which are much critical to restore the details and missing content of degraded images. To this end, we present an efficient image processing transformer architecture with hierarchical attentions, called IPTV2, adopting a focal context self-attention (FCSA) and a global grid self-attention (GGSA) to obtain adequate token interactions in local and global receptive fields. Specifically, FCSA applies the shifted window mechanism into the channel self-attention, helps capture the local context and mutual interaction across channels. And GGSA constructs long-range dependencies in the cross-window grid, aggregates global information in spatial dimension. Moreover, we introduce structural re-parameterization technique to feed-forward network to further improve the model capability. Extensive experiments demonstrate that our proposed IPT-V2 achieves state-of-the-art results on various image processing tasks, covering denoising, deblurring, deraining and obtains much better trade-off for performance and computational complexity than previous methods. Besides, we extend our method to image generation as latent diffusion backbone, and significantly outperforms DiTs.
updated: Sun Mar 31 2024 10:01:20 GMT+0000 (UTC)
published: Sun Mar 31 2024 10:01:20 GMT+0000 (UTC)
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817819.93/warc/CC-MAIN-20240421194551-20240421224551-00227.warc.gz
|
CC-MAIN-2024-18
| 1,603 | 4 |
http://www.ehumanities.nl/ray-siemens/
|
code
|
Canada Research Chair in Humanities Computing
Faculty of Humanities, University of Victoria
Dr. Raymond Siemens is Canada Research Chair in Humanities Computing and Distinguished Professor in the Faculty of Humanities at the University of Victoria, in English with cross appointment in Computer Science. Siemens is also Visiting Senior Research Fellow in the Department of Digital Humanities at King’s College London, and has been Visiting Research Fellow at the Institute for English Studies London (2005, 2008), Visiting Research Professor at Sheffield Hallam University (2004-11), and Visiting Research Professor in Digital Humanities at Ritsumeikan University, Kyoto (2010).
The editor of several Renaissance texts, Siemens is also the founding editor of the electronic scholarly journal Early Modern Literary Studies. He has authored numerous articles on the intersection of literary studies and computational methods and is the co-editor of several book collections on humanities computing topics, among them Blackwell’s Companion to Digital Humanities (with Susan Schreibman and John Unsworth), the Blackwell Companion to Digital Literary Studies (with Susan Schreibman), and Mind Technologies: Humanities Computing and the Canadian Academic Community (with David Moorman).
Siemens’ larger research projects focus on human-computer interaction, interface, and the electronic book in the Implementing New Knowledge Environments (INKE) project, the Professional Reading Environment (PReE) project, initiatives associated with the TAPoR and Synergies groups and the Public Knowledge Project, and work on digital humanities communities and teams.
In 2009, he received the U Victoria Humanities Award for Research Excellence and, from U Waterloo, the Arts in Academics Alumni Achievement award.
His current literary studies work centres on two early Tudor manuscript miscellanies, the Henry VIII Manuscript (BL Add Ms 31922), and the Devonshire Manuscript (BL Add Ms 17492). His Electronic Textual Cultures Lab (ETCL) is academic home to a number of postdoctoral fellows, graduate students, and academic staff. Siemens’ research has been supported by the Canadian Foundation for Innovation, the Social Science and Research Council of Canada (SSHRC), the Killam Trust, the Canada Research Chairs program, and others.
In addition to his teaching and research activities, and local service activities, Siemens serves as Vice-President (Research Dissemination) of the Canadian Federation for Humanities and Social Sciences, Chair of the Alliance of Digital Humanities Organisations, Director of the SSHRC-funded Major Collaboration Research Initiative INKE project, Director of the Digital Humanities Summer Institute, and member of the Modern Language Association (MLA) Committee on Scholarly Editions. In the past, he has served as President (English) of the Society for Digital Humanities/Societe pour l’etude des medias interactifs (SDH/SEMI), Chair of the MLA Committee on Information Technology and the MLA Discussion Group on Computers in Language and Literature, and Director of the Centre for Digital Humanities Innovation. He also serves and has served in administrative, steering committee and board advisory capacities for the International Association of University Professors of English, Iter, the Text Encoding Initiative Consortium, Gale, Canadiana.org, Compute Canada, CenterNet, Records of Early English Drama, the Renaissance English Text Society, the Text Creation Partnership, SSHRC, and others.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400192778.51/warc/CC-MAIN-20200919142021-20200919172021-00357.warc.gz
|
CC-MAIN-2020-40
| 3,524 | 8 |
https://community.rstudio.com/t/modern-updated-dplyr-way-to-remove-columns-with-na-values/150552
|
code
|
I saw online with many similar guides as the above, but they use the deprecated functions such as
What is the updated way to remove all columns with any NA values? I tried some with
select(if_any()), but I think I'm missing the nuance.
df = data.frame(abc = c(1, 2, 3), def = c(4, 5, NA), ghi = c(NA, NA, NA)) # DOES NOT WORK -- tells me if_any needs to be in a dplyr verb... df |> select(if_any(colSums(is.na(.) > 0)))
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499790.41/warc/CC-MAIN-20230130003215-20230130033215-00827.warc.gz
|
CC-MAIN-2023-06
| 419 | 4 |
http://20sim.com/9-products.html
|
code
|
Hardware-in-the-Loop (HIL) simulation is a technique that is used for the development and testing of control systems which are used for the operation of complex machines and systems. With HIL simulation the physical part of a machine or system is replaced by a simulation. This allows rigorous testing of the control system with great benefits.
Controllab offers HIL simulators based on 20-sim. If you want to know more on HIL simulation please visit our website www.hil-simulation.com.
Controllab offers a range of products for model based design.
- With 20-sim you can simulate the behavior of dynamic systems, such as electrical, mechanical and hydraulic systems or any combination of these.
- With 20-sim 4C you can run c-code on hardware to control machines and systems. 20-sim 4C imports models (c-code) from 20-sim and Scilab and runs them on hardware like embedded arm boards, PC 104 systems and much more.
- A line of hardware products is offered ranging from low cost single board computers to high quality industrial controllers.
- Several books have been released describing the use of 20-sim and modeling with 20-sim.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118519.29/warc/CC-MAIN-20170423031158-00022-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,130 | 7 |
https://git.cacert.org/cacert-votebot.git/tree/src/main/resources/messages.properties?id=ccb91d913af8d6f48c799785e310f055a87bb05a
|
code
|
blob: ff24c5b31b2c3f947f699e70a19d933eabdced57 (plain
# Copyright (c) 2016. Jan Dittberner
# This file is part of CAcert votebot.
# CAcert votebot is free software: you can redistribute it and/or modify it
# under the terms of the GNU General Public License as published by the Free
# Software Foundation, either version 3 of the License, or (at your option)
# any later version.
# CAcert votebot is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
# or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
# more details.
# You should have received a copy of the GNU General Public License along with
# CAcert votebot. If not, see <http://www.gnu.org/licenses/>.
assign_bot_not_called=assignBot() has not been called.
count_proxy_vote=Thanks %s I count your vote for %s as %s
count_vote=Thanks %s I count your vote as %s
invalid_channel_name=%s is not a valid channel name
invalid_nick_name=%s is not a valid nick name.
invalid_proxy_vote=Sorry %s, you tried an invalid proxy vote. Please use 'proxy <voter> <vote>'
no_vote_running=Sorry %s, but currently no vote is running.
vote_not_understood=Sorry %s, I did not understand your vote, your current vote state remains unchanged!
vote_running=Sorry, a vote is already running
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347434137.87/warc/CC-MAIN-20200603112831-20200603142831-00075.warc.gz
|
CC-MAIN-2020-24
| 1,327 | 22 |
https://blog.tardate.com/2008/06/uncommon-sense-out-of-box-thinking-for.html
|
code
|
|Peter Cochrane's Uncommon Sense is an interesting collection of opinion pieces taken from his silicom.com blog through to around 2004. While you can read much of the material (and catch later articles) in his blog archives, the book does enhance the content will a liberal scattering of charts and also some additional commentary.
Some of the topics are evergreen, such as the failures of the education system, and the gap that often exists between the actual and the perceived in conventional wisdom. Some are specific to a point in time, like his pre-occupation with the 3G bandwidth auction debacle.
Certainly worth grabbing a copy for a thought provoking read, and ample encouragement to add his blog to my reader for continued entertainment.
Cochrane also has a nice practice of introducing many of his articles with a related quote. One of my favourites is from Douglas Adams:
Technology is the name we give to stuff that doesn't work properly yet.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817181.55/warc/CC-MAIN-20240417204934-20240417234934-00439.warc.gz
|
CC-MAIN-2024-18
| 955 | 5 |
https://stats.stackexchange.com/questions/138262/multivariate-normality-in-discriminant-analysis-when-using-dummy-variables?noredirect=1
|
code
|
I've studied statistics now for almost two years and I'm starting to believe I have missed something very fundamental.
I'm doing discriminant analysis where, as I understand it, I can use dummy variables as independent variables. However, one assumption seem to be that the data is drawn from a multivariate normal distribution. Further, the marginal distributions of a multivariate normal distribution are normal (but not necessarily the other way around).
Now, if I use a dichotomous variable (yes/no, etc) as a independent variable, how can the multivariate distribution be normal since a dichotomous variable certainly is not?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585828.15/warc/CC-MAIN-20211023224247-20211024014247-00372.warc.gz
|
CC-MAIN-2021-43
| 630 | 3 |
https://godoc.org/golang.org/x/build/cmd/releasebot
|
code
|
Releasebot manages the process of defining, packaging, and publishing Go
releases. It is a work in progress; right now it only handles beta, rc and
minor (point) releases, but eventually we want it to handle major releases too.
gcs.go git.go github.go http.go main.go markdown.go
Package main imports 26 packages (graph).
Tools for package owners.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510287.30/warc/CC-MAIN-20200403030659-20200403060659-00023.warc.gz
|
CC-MAIN-2020-16
| 347 | 6 |
https://forums.opera.com/topic/6351/opera-freezes-my-whole-computer
|
code
|
Opera Freezes My Whole Computer
Frequently, while browsing the web, I encounter a problem. I may be in a forum and click on a link. Instead of quickly entering the site, the circle thing freezes and the new site does not come up. I get no warning or advice that it's taking too long. After about 30 seconds, my entire screen freezes. No matter what keys I hit, nothing happens.
I have to manually turn off the computer and go through the entire startup again.
I've tried following the instruction for setting the time it takes to connect but the instructions don't match the version of Opera that I'm using.
Any suggestions would be appreciated
If it is nuOpera, it may be a CPU/memory consumption issue.
What Opera is it?
Same thing happens for me recently, every time I launch Opera. The entire PC freezes for 2-3 minutes.
Opera Version 12.17
Try clearing the browsers cache.
Oh, and how many tabs do you have opened when Opera is starting up, and do any of them contain flash of some sort ?.
Clear cache (as already said) and configure your antivirus not to scan Opera cache (if possible). For O12 this can make quite a difference.
configure your antivirus not to scan Opera cache
That is not recommendable in my opinion. Especially if your antivirus doesn't act as some sort of proxy and scanning these files before forwarding them to the browser. In this case possible exploits won't be stopped, which the antivirus might have found.
I've cleared the cache. I've checked the hardware and software and even have a new modem.
It continues to freeze. I have no problems using IE9, so it has to be Opera.
I'm getting pretty damned tired of having to manually reboot the PC in order to be able to use my computer.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948520042.35/warc/CC-MAIN-20171212231544-20171213011544-00198.warc.gz
|
CC-MAIN-2017-51
| 1,713 | 17 |
https://anime.jhiday.net/hof/challenge/unrated
|
code
|
Category : Statistics
Thread : MAL forum
Created on : 2016-05-18
Number of Turn-ins : 163 (16 not validated yet)
- Easy [0.25pt - 10 items] : 51 completed (7 not validated yet)
- Medium [0.5pt - 20 items] : 34 completed (3 not validated yet)
- Hard [0.75pt - 30 items] : 35 completed (3 not validated yet)
- Conquered [1pt - 40 items] : 43 completed (3 not validated yet)
- This challenge requires watching a given number of anime.
- No previously seen nor previously started anime can be used for this challenge.
- Ongoing anime are allowed for this challenge, provided you are up to date on them (as "Currently Watching", "On Hold" or "Dropped").
- This challenge can be submitted twice for each difficulty.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499790.41/warc/CC-MAIN-20230130003215-20230130033215-00650.warc.gz
|
CC-MAIN-2023-06
| 709 | 12 |
https://ebu.io/project/qc/
|
code
|
The EBU Quality Control tool provides access to over 200 QC Test Items, each of which includes a detailed description of the test that can be performed on audio/visual material. The tool is used to develop (new) Tests and by users to access the existing knowledge base.
The tool helps drafting new versions of the Tests by offering (non-exhaustive list):
The tool allows any (public) user to access published QC Tests and use them in personal selections.
For clarity: the platform does NOT perform any QC testing itself. It provides a common, single reference for the definition of the tests and the sharing of QC test sequences.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00196.warc.gz
|
CC-MAIN-2022-33
| 629 | 4 |
https://forums.theregister.co.uk/forum/1/2014/08/11/2285295_aussie_email_addresses_nabbed_in_russian_password_haul/
|
code
|
Why not name and shame?
My concern is that it won't do anything to just silently contact the companies, in hopes of them fixing the problems (which shouldn't have happened in the first place: seriously, SQL injection in 2014?!).
Maybe it's high time to go beyond and legislate it: you *must* disclose the breach(es) and you are also liable if negligence can be shown (as above: SQL injection in this day and age *is* negligent)
IIRC, California does that, or tried to. (quick google shows me that they did, though I didn't easily find anything showing the effectiveness)
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891705.93/warc/CC-MAIN-20180123012644-20180123032644-00648.warc.gz
|
CC-MAIN-2018-05
| 570 | 4 |
https://www.ostalks.com/about/
|
code
|
I am Clint Christopher Canada, and I am a web applications developer/system administrator by profession. I’ve been involved in a number of open source projects in the past, and find contributing in open source projects to be a great and satisfying experience.
On a spare note, I enjoy listening to good Christian and Jazz style music, and am involved in a number of ministry activities (personal stuff), as well as doing talks in schools in the past on promoting open source awareness. I am also part of a linux users group on my local area.
You can also look for me in my Google Plus page here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370493818.32/warc/CC-MAIN-20200329045008-20200329075008-00098.warc.gz
|
CC-MAIN-2020-16
| 597 | 3 |
https://www.synergyaustralia.com.au/services/seminars/project-management/
|
code
|
The purpose of project management is to foresee or predict as many dangers and problems as possible; and to plan, organise and control activities so that the projects are completed as successfully as possible. It requires a team of individuals with different skills. That team of people are responsible for planning and executing the project, which is done by using different Project Management tools. This seminar is designed to provide an insight of what Project Management is and how to implement it.
Click here for more info.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103558.93/warc/CC-MAIN-20231211045204-20231211075204-00892.warc.gz
|
CC-MAIN-2023-50
| 529 | 2 |
http://www.melonwall.com/2010/06/polling-booth-models-final-finish-ideas.html
|
code
|
Question on the outside
I like this the one the best due to the outside has more space, so i could have one side with the question then other surfaces covered in facts and recorded discussions.
Question on the Inside
Book Cover Idea
I dont like this idea however the idea of your fake vote is actually writing the inside of the booth like a book is kinda cool.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887224.19/warc/CC-MAIN-20180118091548-20180118111548-00604.warc.gz
|
CC-MAIN-2018-05
| 360 | 5 |
http://statisticsprojecthelp30255.thezenweb.com/The-Fact-About-python-homework-help-That-No-One-Is-Suggesting-19167727
|
code
|
Most of the time, you will need to contend with knowledge that may be soiled and unstructured. You'll master some ways to scrub your facts which include making use of normal expressions.
Avinash and his workforce are actually a whole lifestyle saver. They tackled my homework with no issue in any respect. I'm extremely satisfied with their function And that i will certainly maintain performing enterprise with them. Thank you men a great deal of!!
Could it be ok to #contain .c resource file for maintainability of embedded C code? far more very hot concerns lang-py
Van Rossum's eyesight of a small Main language with a large standard library and simply extensible interpreter stemmed from his frustrations with ABC, which espoused the other approach.
In the initial chapter we make an effort to protect the "massive picture" of programming so you will get a "desk of contents" of the remainder of the e book. Don't fret Otherwise almost everything tends to make fantastic feeling the first time you hear it.
CPython's general public releases come in three sorts, distinguished by which Element of the Variation selection is incremented:
“If you don’t need to fill the shape, electronic mail me your necessity at [email protected] and have the moment reply”
Once the 5 7 days course I went from understanding in essence almost nothing about Python to employing it as among my “head to” instruments through which I am ready to accomplish responsibilities at operate daily.
All round it had been difficult, but a useful intro to a useful tool that was simpler to approach with real-everyday living classes than self-review demos by myself. I’ll unquestionably take lessons with NYC Knowledge Science Academy in the future and would advise it to my friends.
A lot of the persons believe that Economics is focused on dollars. Nevertheless the term Economics can not be confined to the monetary transactions. It can be more about generating the best choice out of all the options you have.
PyCharm helps assign a Python interpreter to get a project. So accomplishing, each look at here now one of the projects, opened in the exact same window, may have an interpreter of its personal, selected from the checklist of available interpreters.
I'm doing post-graduation in mechanics. There are several numerical In this particular subject and it becomes difficult for me to deal with time for the same. So I switched to this assignment help site for an easy and easy Option.
Any people who find themselves not that comfortable with coding but who have an interest in Machine Finding out and want to apply it conveniently on datasets.
Python employs whitespace indentation, as an alternative to curly brackets or search phrases, to delimit blocks. A rise in indentation arrives right after sure statements; a minimize in indentation signifies the tip of the present block.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826145.69/warc/CC-MAIN-20181214162826-20181214184826-00511.warc.gz
|
CC-MAIN-2018-51
| 2,877 | 14 |
https://estherleibel.com/bio/
|
code
|
I am a PhD candidate in Management at the NYU Stern School of Business. My research interests lie at the intersection of institutional, entrepreneurship, and sustainability theories. Specifically, I am concerned with identifying the micro-processes behind the development of new fields, markets, and movements, as well as the elements underlying institutional variation and heterogeneity of vocabularies, meanings, and practices.
Prior to joining academia, I worked in Italy and Europe as a management consultant for Deloitte and Arthur D. Little. In the United States, I did research for the New York office of Corriere della Sera, the leading Italian newspaper, and for the public affairs firm APCO Worldwide.
- Qualitative research (ethnography)
- Institutional theory
- Field emergence
- Practice variation
- Meaning making
- M.S., with Distinction, in Public Relations and Corporate Communications, New York University
- Post-Graduate Diploma, Cum Laude, in Economics, Sant’Anna School of Advanced Studies, Pisa, Italy
- B.S., Cum Laude, in Business Administration, University of Pisa, Italy
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592778.82/warc/CC-MAIN-20180721203722-20180721223722-00587.warc.gz
|
CC-MAIN-2018-30
| 1,098 | 10 |
https://aigloballab.com/a-deep-ranking-personalization-framework/
|
code
|
A deep ranking personalization framework
Generalized Deep Mixed Model (GDMix) is a framework to train non-linear fixed effect and random effect models. This kind of models are widely used in personalization of search and recommender systems. This project is an extension of our early effort on generalized linear models Photon ML. It is implemented in Tensorflow, Scipy and Spark.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474659.73/warc/CC-MAIN-20240226094435-20240226124435-00220.warc.gz
|
CC-MAIN-2024-10
| 380 | 2 |
https://qomtv.org/ivideo/168-hadith-explanation-by-imam-khamenei-seek-refuge-from-6-traits-farsi-sub-english/
|
code
|
Ayatollah Sayyid Ali Khamenei narrates and explains a tradition narrated from the Messenger of Allah (S), where his eminence speaks about the 6 traits that even the holy Prophet (S) used to seek refuge from in Allah, the Mighty, the Exalted.
Yet, what are those 6 traits that we must all seek refuge from?
And what is the meaning of Taqwa?
What is the meaning of hidden polytheism?
And what happens when a person becomes angry?
Finally, what is the meaning of a rebel?
Ayatollah Sayyid Ali Khamenei expounds upon the wise words of the Messenger of Allah (S).
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662593428.63/warc/CC-MAIN-20220525182604-20220525212604-00466.warc.gz
|
CC-MAIN-2022-21
| 558 | 7 |
https://apps.lametric.com/apps/fortnite_stats/6390
|
code
|
This app allows you to show :
- Number of wins
of a player on PC/PS4/Xbox1
Support : https://github.com/pgrimaud/lametric-fortnite
Get the Good Stuff First
Subscribe and get news, offers and 5% off on your first order
Awesome! You’re in the LaMetric community now. We’ll share our best stuff with you.
Thank you for signing up!
Last step left...
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823712.21/warc/CC-MAIN-20181212022517-20181212044017-00122.warc.gz
|
CC-MAIN-2018-51
| 349 | 9 |
https://yourbrainrebalanced.com/forum/index.php?threads/ed-as-a-result-of-nofap.116865/
|
code
|
So I've not masturbated in 6 Days. I've never gone longer than 3, so I feel like I'm making big progress. My concern is that things that would normally arouse me and get me hard aren't doing the trick like they did before I started this. Stuff that I'd normally find very arousing is only giving me a semi at best now, and it's taking longer to get there. Is this a common occurrence for those of us who aren't used to stopping masturbating and go cold turkey?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000164.31/warc/CC-MAIN-20190626033520-20190626055520-00224.warc.gz
|
CC-MAIN-2019-26
| 460 | 1 |
http://www.cheapassgamer.com/forums/showpost.php?p=8684515&postcount=31
|
code
|
Dude, the charity thing was a decision after the initial posting. After the contest ends, whatever the book's made goes to CheapyD and the CAG charity. You can check with him personally if you like.
Thanks for trying to crap on someone trying to do a good deed. Now troll somewhere else.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698924319/warc/CC-MAIN-20130516100844-00025-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 287 | 2 |
https://community.spiceworks.com/topic/2188342-share-folder-access-issue
|
code
|
I have two servers in our DMZ space, assigned to the same work-group called 'service'. Server1 needs to talk to Server2 and vise versa. While logged on as "Administrator", shared folders are displayed from each respective server (server1 can see the shared folder on server 2 and vice versa).
If I setup a unique user id (DMZAdmin) and have it be assigned it assigned to the Administrators Group on both server (server1 has a user called DMZAdmin and server2 has a user called DMZAdmin), Server2 can browse the shared folders on Server1; however, Server1 cannot see the shared folders on Server2.
When attempting access, pop-up window appears reporting network error (Windows cannot access \\server2. Details include Error Code: 0x80070035 (The network path was not found).
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663048462.97/warc/CC-MAIN-20220529072915-20220529102915-00051.warc.gz
|
CC-MAIN-2022-21
| 773 | 3 |
https://www.orlandosentinel.com/news/os-xpm-1986-09-24-0250440132-story.html
|
code
|
A LETTER complains about a politician who said: "I've done a lot of stuff." The writer then defines stuff as: "worthless material, silly words and thoughts, to fill with rubbish."
What's the beef? Such candor is all too rare in politics (even when possibly unintentional).
M. Oakmont Biddle
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578806528.96/warc/CC-MAIN-20190426133444-20190426155444-00105.warc.gz
|
CC-MAIN-2019-18
| 290 | 3 |
http://stackoverflow.com/questions/13043718/adding-image-to-mfmessageviewcontroller-works-fine-in-ios5-but-not-in-ios6
|
code
|
What you are trying to do has never been supported. The only valid way to get an image into an email is to add the image as an attachment. But even then you can't reference the image attachment in the mail message body.
What works in the simulator is irrelevant for something like this since you can't actually send the email in the simulator. Let me ask this - when running this on an iOS 5 device, does the received email sent from the app actually show the image or does it only appear correctly in the mail composer in the app? I'd be quite surprised if such an email sent from the app and opened in some email client on a user's computer showed the image.
Edit: It turns out this really did work under iOS 5 but doesn't under iOS 6. I'm quite surprised. I did my own quick test. Under iOS 5.1 sending an email with such an image reference to a local file on the iOS device actually does get sent along with the email and does appear in the client email program on their computer. When the app is run under iOS 6, the image does not appear in the mail composer in the app nor in the received email. So at least that is consistent.
One other little side note. This line:
imagePath = [imagePath stringByAppendingPathComponent:[NSString stringWithFormat:@"%@",imageName]];
imagePath = [imagePath stringByAppendingPathComponent:imageName];
stringWithFormat: unless you are actually using a string format. Also, there is no need to create the extra
Also, here's a better way to get the path to a file in your resource bundle:
NSString *imagePath = [[NSBundle mainBundle] pathForResource:@"classroom_tile" ofType:@"png"];
That one line would replace the first three lines you posted.
One last note. When using an HTML email message, include the
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257823387.9/warc/CC-MAIN-20160723071023-00171-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 1,742 | 11 |
https://docs.typo3.org/c/typo3/cms-core/main/en-us/Changelog/11.4/Deprecation-94654-GenericExtbaseDomainClasses.html
|
code
|
Deprecation: #94654 - Generic Extbase domain classes¶
Most Extbase "generic" domain model and repositories have been marked as deprecated: They are opinionated implementations and can't be "correct" since the domains they are used in are unique.
The following classes have been marked as deprecated:
Using or extending the above classes is deprecated since TYPO3 v11. They will be removed with TYPO3 v12.
Various Extbase based extensions may use or extend the classes. The extension scanner will find usages with a strong match.
The migration paths are usually straight forward.
Extensions that extend the repository classes should extend Extbase
TYPO3\CMS\Extbase\Persistence\Repository instead and maybe copy
body methods like
initializeObject() if given and not overridden
Extensions that use the Extbase repositories directly should copy the class to their extension namespace and use the own ones instead.
Extensions that extend the model classes should extend
TYPO3\CMS\Extbase\DomainObject\AbstractEntity instead and copy
the properties, getters and setters they need from the Extbase classes.
Those copied properties may need database mapping entries, which can
be copied from
Extensions that use the Extbase models directly should copy the class
to their extension namespace, ideally strip them down to what the extension
actually needs, and copy the needed mapping information from
No database update of existing rows should be needed when transferring
the models to an own namespace, since none of the Extbase models
recordType in the mapping file at
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475757.50/warc/CC-MAIN-20240302052634-20240302082634-00624.warc.gz
|
CC-MAIN-2024-10
| 1,562 | 22 |
http://www.roseindia.net/answers/viewqa/JSP-Servlet/4246-Error-500-Server-are-not-find-the-jar-file-in-the-program-of-upload-the-file.html
|
code
|
Error 500-Server are not find the jar file in the program of upload the file 2 Answer(s) 5 years and 4 months ago
Posted in : JSP-Servlet
December 10, 2008 at 9:41 AM
Dear Sir, previous issue have solvd.But now different Error 500 I am face. Error 500--Internal Server Error java.lang.NoClassDefFoundError: org/apache/commons/io/output/DeferredFileOutputStream at org.apache.commons.fileupload.DefaultFileItemFactory.createItem(DefaultFileItemFactory.java:103) at org.apache.commons.fileupload.FileUploadBase.parseRequest(FileUploadBase.java:358) at org.apache.commons.fileupload.FileUploadBase.parseRequest(FileUploadBase.java:310) at UploadFile.doPost(UploadFile.java:30) at javax.servlet.http.HttpServlet.service(HttpServlet.java:760) at javax.servlet.http.HttpServlet.service(HttpServlet.java:853) at weblogic.servlet.internal.ServletStubImpl$ServletInvocationAction.run(ServletStubImpl.java:1053) at weblogic.servlet.internal.ServletStubImpl.invokeServlet(ServletStubImpl.java:387) at weblogic.servlet.internal.ServletStubImpl.invokeServlet(ServletStubImpl.java:305) at weblogic.servlet.internal.WebAppServletContext$ServletInvocationAction.run(WebAppServletContext.java:6291) at weblogic.security.acl.internal.AuthenticatedSubject.doAs(AuthenticatedSubject.java:317) at weblogic.security.service.SecurityManager.runAs(SecurityManager.java:97) at weblogic.servlet.internal.WebAppServletContext.invokeServlet(WebAppServletContext.java:3575) at weblogic.servlet.internal.ServletRequestImpl.execute(ServletRequestImpl.java:2573) at weblogic.kernel.ExecuteThread.execute(ExecuteThread.java:178) at weblogic.kernel.ExecuteThread.run(ExecuteThread.java:151)
file upload error - JSP-Servlet
understood that this error occurred because of a jarfile missing. But, i am...fileupload error Hello friends,
In my project when i am trying to upload a file i used the roseindia.net coding from URL:
file upload error - JSP-Servlet fileupload error Iam doing jsp project. File uploading is one part...
I think jar problem. so Please add servlet-api.jar file in lib folder
file upload error - JSP-Servlet fileupload error Iam doing jsp project. File uploading is one part of the project. In this particular part i got an error... by multipart/Form-data encrypted form. And this error occurred in the processing
Struts 2 File Upload error
Struts 2 FileUpload error Hi! I am trying implement a fileupload using Struts 2, I use this article, but now the server response the error... solve this?
Please visit the following link:
JAR FILE JAR FILE WHAT IS JARFILE,EXPLAIN IN DETAIL?
A JARfile... and applications.
The Java Archive (JAR) file format enables to bundle multiple... link:
File path for jar file jarfile of that application, unfortunately it is giving the error that resource...File path for jar file Hi Experts,
I have created one eclipse... handle the paths given to program in jar files
jar file jar file how to run a java file by making it a desktop icon i need complete procedur ..through cmd
File Upload File Upload when i execute the image upload to mysql database it shows an exception that file path cannot be found
Program to find no of metrics in a file ----- Java code Program to find no of metrics in a file ----- Java code Hi Friends,
I got a task to calculate the metrics of a program, like to find the no of SELECT and INSERT statement is a program. With that I have to even calculate
File Upload File Upload Hi
I need script / string in PHP where I uploaded the file in html frontend and it should sent the uploaded file as attachment to my email address
file upload file upload how to recieve the uploaded file on the next jsp page for modification if its uploaded to the previous page using a from
jsp upload file to server
jsp uploadfile to server How to create and uploadfile to server in JSP?
Find the given example that explains how to upload single and multiple file on server using JSP
Jar file - Java Beginners Jar file Hello
this is my second question and i hope atleast i will get answer
i bulid a jarfile of my project using netbeans but now problem is when i open that jarfile in command prompt i got error exception in thread
Extract Jar File
Extract Jar File How to extract jarfile?
Please open the command Prompt and to the jarfile and write the command jar -xvf JaraFileName.jar
jar file - Java Beginners jar file jarfile When creating a jarfile it requires a manifest... options in jarfile. What is JarFile? JAR files are packaged in the zip format What is JarFile?JAR files are packaged in the zip format making
File Upload and Retrive files FileUpload and Retrive files Can any body help me am getting an error in uploading file. into mysql database....
thank's in advance
jar file with html jarfile with html I have a jarfile. On double click it shows an applet page. Please tell me how to connect that applet into html or jsp page
File Upload in FTP - JSP-Servlet FileUpload in FTP hi sir,
i am doing upload files in FTP using java application.
is there any jarfile to use the privileges of sun.net.ftp.
i am writing my program in java servlet. i am getting errors like
Creating an executable jar file
Creating an executable jar file When I try to create jar.exe through CMD, the manifest file created doesn't contain Main-Class attribute, even though it is included in text file used during creation of jarfile
JAR File - Swing AWT JAR File Is there anybody to solve my problem of not executing the JARfile?
I have asked the question previously but I haven't got any answer yet. Please help me
File Upload - JSP-Servlet File Upload Hi everyone,
I am facing file uploading problem.the multiple fileupload code of roseindia is working on localhost but the same code is not working on server.i think the package commons-fileupload-1.2.jar
Executing JAR file - Swing AWT
created the JARfile of my project with the Manifest File including my Main... Manifest.txt secl/*.class
and my jarfile is created. But there is a problem, when I execute this jarfile at command prompt by the following command:
File upload - JSP-Servlet File upload I am trying to do a fileuploadprogram. But, it shows... that.
1.Input file sending program
Display fileupload form to the user
How to create a jar file
The given code creates a jarfile using java.
System.out.println("JarFile is created successfully.");
} catch (Exception ex...How to create a jar file Hello!!!!
I have a project which has
upload and save the file upload and save the file upload and save a file from a computer to specific location of remote computer using jsp
Java upload file to ftp
Java uploadfile to ftp Hi,
How to uploaded file to a ftp server in Java?
It's very easy to write a program in Java....
View complete example at FTP FileUpload in Java
servlet file upload
servlet file upload please tell me the complete code to upload a file on localhost using servlet
File upload - JSP-Servlet
to do a fileupload part. For this, i designed two files one for input and other...();
%>You have successfully upload the file by the name... in the problem part] Hi friend,
Display fileupload form to the user
AJAX file upload
If you want to uploadfile asynchronously means
You need to create a form with file fields you
wish to upload and define
upload a file - Framework upload a file Hi to All,
I need to upload a file from the client and that uploadfile should be sent to our co., mail please if any one provide....
Thankyou in Advance. Hi friend,
For upload a file in JSP visit
struts jar file problem
struts jarfile problem hi..
I'm using struts-core-1.3.9.jar.
it works well if am using ma application with internet
it shows me an error while initializing ActionServlet when i disconnected to Internet
The error stack trace
How to use JAR file in Java
to digitally sign the JARfile. Users who want to use the secured file can check... do not use JARfile, then they will have to download every single file one... in JAR files, then you just need to download one single file and Run it.
Upload file to MS Access Uploadfile to MS Access Iam beginner and need to uploadfile to msaccess using jsp . Iam using netbeans platform.
Kindly explain do I need to mention Attachment format in the table
Struts upload file - Framework
Struts upload file Hi,
I have upload a file from struts... and send to fileupload struts..how to get the sheets and data in that sheets
Thanks. Hi friend,
For upload a file in struts visit to :
file upload in spring - Spring fileupload in spring Is it necessary to use Multipart support in spring framework for file uploads.If not please let me know the other ways to do
Upload file with ather Fieldn Uploadfile with ather Fieldn hello
i want uploadfile with other record to database for my project,like that
see( uploadfile with path) i can send data to database
Java Jar File - Java Beginners
Java Jar File What is a Java JARfile ..and how can i open a .jarfile in Java? Just create a Jarfile and Double click on it, it will automatically runs main method in that Jar : to create Project as JAR
What is a JAR file in Java
What is a JARfile in Java
JARfile is the compressed file format. You can store
many files in a JARfile. JAR stands for the Java Archive. This file format is
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678705763/warc/CC-MAIN-20140313024505-00084-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 9,186 | 104 |
https://www.unite.ai/a-guide-to-mastering-large-language-models/
|
code
|
Large language models (LLMs) have exploded in popularity over the last few years, revolutionizing natural language processing and AI. From chatbots to search engines to creative writing aids, LLMs are powering cutting-edge applications across industries. However, building useful LLM-based products requires specialized skills and knowledge. This guide will provide you with a comprehensive yet accessible overview of the key concepts, architectural patterns, and practical skills needed to effectively leverage the huge potential of LLMs.
What are Large Language Models and Why are They Important?
LLMs are a class of deep learning models that are pretrained on massive text corpora, allowing them to generate human-like text and understand natural language at an unprecedented level. Unlike traditional NLP models which rely on rules and annotations, LLMs like GPT-3 learn language skills in an unsupervised, self-supervised manner by predicting masked words in sentences. Their foundational nature allows them to be fine-tuned for a wide variety of downstream NLP tasks.
LLMs represent a paradigm shift in AI and have enabled applications like chatbots, search engines, and text generators which were previously out of reach. For instance, instead of relying on brittle hand-coded rules, chatbots can now have free-form conversations using LLMs like Anthropic's Claude. The powerful capabilities of LLMs stem from three key innovations:
- Scale of data: LLMs are trained on internet-scale corpora with billions of words, e.g. GPT-3 saw 45TB of text data. This provides broad linguistic coverage.
- Model size: LLMs like GPT-3 have 175 billion parameters, allowing them to absorb all this data. Large model capacity is key to generalization.
- Self-supervision: Rather than costly human labeling, LLMs are trained via self-supervised objectives which create “pseudo-labeled” data from raw text. This enables pretraining at scale.
Mastering the knowledge and skills to properly finetune and deploy LLMs will allow you to innovate new NLP solutions and products.
Key Concepts for Applying LLMs
While LLMs have incredible capabilities right out of the box, effectively utilizing them for downstream tasks requires understanding key concepts like prompting, embeddings, attention, and semantic retrieval.
Prompting Rather than inputs and outputs, LLMs are controlled via prompts – contextual instructions that frame a task. For instance, to summarize a text passage, we would provide examples like:
The model then generates a summary in its output. Prompt engineering is crucial to steering LLMs effectively.
Word embeddings represent words as dense vectors encoding semantic meaning, allowing mathematical operations. LLMs utilize embeddings to understand word context.
Techniques like Word2Vec and BERT create embedding models which can be reused. Word2Vec pioneered the use of shallow neural networks to learn embeddings by predicting neighboring words. BERT produces deep contextual embeddings by masking words and predicting them based on bidirectional context.
Recent research has evolved embeddings to capture more semantic relationships. Google's MUM model uses VATT transformer to produce entity-aware BERT embeddings. Anthropic's Constitutional AI learns embeddings sensitive to social contexts. Multilingual models like mT5 produce cross-lingual embeddings by pretraining on over 100 languages simultaneously.
Attention layers allow LLMs to focus on relevant context when generating text. Multi-head self-attention is key to transformers analyzing word relations across long texts.
For example, a question answering model can learn to assign higher attention weights to input words relevant to finding the answer. Visual attention mechanisms focus on pertinent regions of an image.
Recent variants like sparse attention improve efficiency by reducing redundant attention computations. Models like GShard use mixture-of-experts attention for greater parameter efficiency. The Universal Transformer introduces depth-wise recurrence enabling modeling of longer term dependencies.
Understanding attention innovations provides insight into extending model capabilities.
Large vector databases called semantic indexes store embeddings for efficient similarity search over documents. Retrieval augments LLMs by allowing huge external context.
Powerful approximate nearest neighbor algorithms like HNSW, LSH and PQ enable fast semantic search even with billions of documents. For example, Anthropic's Claude LLM uses HNSW for retrieval over a 500 million document index.
Hybrid retrieval combines dense embeddings and sparse keyword metadata for improved recall. Models like REALM directly optimize embeddings for retrieval objectives via dual encoders.
Recent work also explores cross-modal retrieval between text, images, and video using shared multimodal vector spaces. Mastering semantic retrieval unlocks new applications like multimedia search engines.
While model training remains complex, applying pretrained LLMs is more accessible using tried and tested architectural patterns:
Text Generation Pipeline
Leverage LLMs for generative text applications via:
- Prompt engineering to frame the task
- LLM generation of raw text
- Safety filters to catch issues
- Post-processing for formatting
For instance, an essay writing aid would use a prompt defining the essay subject, generate text from the LLM, filter for sensicalness, then spellcheck the output.
Search and Retrieval
Build semantic search systems by:
- Indexing a document corpus into a vector database for similarities
- Accepting search queries and finding relevant hits via approximate nearest neighbor lookup
- Feeding hits as context to a LLM to summarize and synthesize an answer
This leverages retrieval over documents at scale rather than relying solely on the LLM's limited context.
Rather than training individual LLM specialists, multi-task models allow teaching one model multiple skills via:
- Prompts framing each task
- Joint fine-tuning across tasks
- Adding classifiers on LLM encoder to make predictions
This improves overall model performance and reduces training costs.
Hybrid AI Systems
Combines the strengths of LLMs and more symbolic AI via:
- LLMs handling open-ended language tasks
- Rule-based logic providing constraints
- Structured knowledge represented in a KG
- LLM & structured data enriching each other in a “virtuous cycle”
This combines the flexibility of neural approaches with robustness of symbolic methods.
Key Skills for Applying LLMs
With these architectural patterns in mind, let's now dig into practical skills for putting LLMs to work:
Being able to effectively prompt LLMs makes or breaks applications. Key skills include:
- Framing tasks as natural language instructions and examples
- Controlling length, specificity, and voice of prompts
- Iteratively refining prompts based on model outputs
- Curating prompt collections around domains like customer support
- Studying principles of human-AI interaction
Prompting is part art and part science – expect to incrementally improve through experience.
Streamline LLM application development using frameworks like LangChain, Cohere which make it easy to chain models into pipelines, integrate with data sources, and abstract away infrastructure.
LangChain offers a modular architecture for composing prompts, models, pre/post processors and data connectors into customizable workflows. Cohere provides a studio for automating LLM workflows with a GUI, REST API and Python SDK.
These frameworks utilize techniques like:
- Transformer sharding to split context across GPUs for long sequences
- Asynchronous model queries for high throughput
- Caching strategies like Least Recently Used to optimize memory usage
- Distributed tracing to monitor pipeline bottlenecks
- A/B testing frameworks to run comparative evaluations
- Model versioning and release management for experimentation
- Scaling onto cloud platforms like AWS SageMaker for elastic capacity
AutoML tools like Spell offer optimization of prompts, hparams and model architectures. AI Economist tunes pricing models for API consumption.
Evaluation & Monitoring
Evaluating LLM performance is crucial before deployment:
- Measure overall output quality via accuracy, fluency, coherence metrics
- Use benchmarks like GLUE, SuperGLUE comprising NLU/NLG datasets
- Enable human evaluation via frameworks like scale.com and LionBridge
- Monitor training dynamics with tools like Weights & Biases
- Analyze model behavior using techniques like LDA topic modeling
- Check for biases with libraries like FairLearn and WhatIfTools
- Continuously run unit tests against key prompts
- Track real-world model logs and drift using tools like WhyLabs
- Apply adversarial testing via libraries like TextAttack and Robustness Gym
Recent research improves efficiency of human evaluation via balanced pairing and subset selection algorithms. Models like DELPHI fight adversarial attacks using causality graphs and gradient masking. Responsible AI tooling remains an active area of innovation.
Beyond text, LLMs open new frontiers in multimodal intelligence:
- Condition LLMs on images, video, speech and other modalities
- Unified multimodal transformer architectures
- Cross-modal retrieval across media types
- Generating captions, visual descriptions, and summaries
- Multimodal coherence and common sense
This extends LLMs beyond language to reasoning about the physical world.
Large language models represent a new era in AI capabilities. Mastering their key concepts, architectural patterns, and hands-on skills will enable you to innovate new intelligent products and services. LLMs lower the barriers for creating capable natural language systems – with the right expertise, you can leverage these powerful models to solve real-world problems.
- Wondershare Filmora Review: The Easiest AI Video Editor?
- Top 10 Takeaways from Stanford’s AI Index Report 2024
- Next-Gen AI: OpenAI and Meta’s Leap Towards Reasoning Machines
- Transformative Potential of a Healthcare-Specific Foundational Model
- Instant-Style: Style-Preservation in Text-to-Image Generation
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817780.88/warc/CC-MAIN-20240421132819-20240421162819-00097.warc.gz
|
CC-MAIN-2024-18
| 10,184 | 94 |
https://wesmckinney.com/blog/conda-forge-centos-moment/
|
code
|
Summary: It's finally time we worked as a community to create a reliable, community-governed repository of trusted Python binary package artifacts, just like Linux, R, Java, and many other open source tool ecosystems have already done. Enterprise-friendly platform distributions do play an important role, though. I examine the various nuances within. I also talk about the new conda-forge project which may offer the way forward.
Python environment management hell: a personal story
When I needed to get Python code using "primordial pandas" into production at AQR in 2008, the hardest part by far was the "installation problem". At that time we didn't have a centralized cluster framework for running all production jobs; many processes where Python needed to run were on Windows desktops sitting under people's desks. Later, in 2009, we bought a rack of machines and we wrote a distributed task queue and scheduler (similar to Celery) that ran on these systems, but they were still Windows.
I didn't want to have my efforts to use more Python to be stymied, so I engaged
on a stressful tango with our IT staff to get consistent Python environments
with NumPy, SciPy, matplotlib, and other heavy packages deployed on dozens of
Windows desktops. Part of the difficulty was Windows, but the bigger issue was
that installing a "blessed" Python environment was not as simple as "hey, run
this one weird batch script". It required a lot of typing, clicking and
python.exe (and a large helping of tears and
R, where I had also done a lot of work, comparatively had its act completely
together. Install R, then run
install.packages(c(...)) and you were
done. Like magic. By comparison, especially on Windows, installing anything
containing C extensions or depending on 3rd-party libraries using
Binary package installers: apt, brew, yum, conda, enstaller, brew, and friends
One of the ways to solve the packaging hell is to have a tool that can analyze package dependency graphs and download and install the appropriate binary artifacts from one or more trusted channels. Strong emphasis here must be put on the word trusted.
Installing any software, whether open source or proprietary, is a risky proposition because you are purposefully executing code written by someone else. You may be giving that software access to your networks, data, secrets (security credentials, SSH keys), or even existing production processes. If you are a business working with sensitive data, it is justifiable to be extremely paranoid about the provenance of any x86 instruction executed on hardware under your control. The most sensitive of businesses (e.g. 3-letter US government agencies) may use air-gapping to protect against hackers or malicious code run from within their walls.
The way around the trust issue is to use a packaging tool, like
along with a trusted binary artifact repository. Often the binary artifacts are
provided by a company you trust not to modify the code maliciously
(e.g. inserting telemetry or malware code) in binary builds of otherwise open
source software. The packaging tool verifies a MD5 or SHA1 hash of the
artifacts to make sure that a man-in-the-middle has not tampered with the
compiled code inside. Turns out this is not that unrealistic, as recently
happened with Transmission.
Platform distributions: making open source work for the enterprise
As soon as a collection of related open source projects becomes viable as a solution to a major business problem (obvious examples: Hadoop, Linux, R, Python, Kafka, etc.), a common business strategy is to create a platform distribution, a big bundle of code, with the intent of making using open source software more palatable for use by large companies.
The notion of a platform distribution is appealing to enterprise users for many reasons. The distribution provider is handling a bunch of annoying problems for you:
- Assembling components and all of the correct versions which are known to work well together.
- Packaging components together and making them easy to install.
- Compiling binaries for multiple platforms and running the test suites for individual components to verify a valid build.
- Performing integration testing to verify that the components work well together.
- Providing tools for upgrading components over time
Usually, the distribution gets its own umbrella version number, like "Red Hat Enterprise Linux 5" to indicate the "blessed" collection of software.
Making money from 100% open-source platforms is very difficult. One of the more successful models used is known as "open core" or (increasingly) "hybrid open source", where anyone (individuals or businesses) can download and use the open source components for free, but you can buy services, support, indemnity, and valuable add-on proprietary software from the platform vendor.
One of the most important aspects of paid support for open source is having priority bug fixes and patched builds when something goes wrong in production. All software has bugs, and by the inherently anarchic nature of open source software, paying for peace of mind is something many big companies are willing to do.
The importance of community-governed package channels
In the late 1990s and early 2000s, there were many efforts to create community-led Linux distributions. Red Hat was founded in 1993, and as Red Hat and other enterprise vendors worked to commercialize open source Linux in the enterprise, I suspect the push for community-governed distributions became all the stronger. I won't present a revisionist history for what motivated the creators of Debian, CentOS, and others, but the commercialization of Linux likely played some significant role.
In Linux, like other open source ecosystems, one of the most important components outside of the Linux kernel itself is the package repository. From a minimal kernel installation with networking and a package manager, you can install a complete system. Thus, the stewardship of the source and binary packages is extremely important, including:
- Governance: in general, no single commercial entity can decide what packages can be installed or not installed
- Quality standards: Packages are deemed of acceptable quality and suitable in a production environment
- Build verification: a binary's build has been tested as appropriate for that package
- Trusted distribution: Packages are signed so that package managers and users can trust the provenance of a binary build
- Dependency management: Installing a package also installs its dependencies, which have been similarly verified and known to work together
Each distribution may have different goals. CentOS, for example, aims for
compatibility with Red Hat Enterprise Linux and accordingly uses the
package management tool. Debian and Ubuntu, by contrast, don't target
compatibility with any enterprise distributions, but provide multiple flavors
focusing respectively on long-term stability versus bleeding-edge innovation.
Community-led packaging and distribution is not unique to Linux: R, for example, has CRAN and the CRAN submission policy. It also has R-Forge to provide a community-governed service for posting project builds.
Python: Enterprise distributions and
Anaconda is a freely-available Python platform distribution created by the venture-backed start-up Continuum Analytics (folks I know quite well!), that has grown extremely popular in recent years. It plays a similar role as any other enterprise platform distribution based on open source software, just like Red Hat (Linux), Revolution Analytics (R), or Cloudera (Hadoop. Disclaimer: this where I work) have done.
Anaconda is not the only Python platform distribution, nor the first. Canopy (formerly EPD: Enthought Python Distribution) preceded it, and many of the same people have worked on both projects.
One of the sources of Anaconda's success is that it makes cross-platform Python environment management much easier than it used to be, and Continuum provides trusted builds of multiple Python versions and all of the Python and non-Python library dependencies needed to assemble a complete Python data analysis environment.
At the heart of Anaconda is a new packaging tool
conda. I won't go into the
technical or open-source-politics reasons why Continuum created a new binary
packaging tool for installation and dependency management for Anaconda. The
bottom line is that it:
- Provides an alternative to the pip / distribute / setuptools / virtualenv stack: use one command-line for everything and in general it just works.
- Works well for managing both Python and non-Python (e.g. C/C++) library dependencies
- Works consistently on all major platforms (Windows, OS X, Linux)
- Is freely available (the conda tool)
In practice, conda works extremely well. It's the packaging tool I wish existed in 2008, and I'm glad we got it eventually!
The downside of the Anaconda distribution itself is that ultimately, just like other enterprise platform companies, Continuum will inevitably be faced with decisions that pit the needs of enterprise customers (valuing stability and long-term support) with the community (valuing innovation and community governance). The most obvious source of conflict would be getting new packages included in Anaconda requiring a lot of work (from Continuum employees) to build, test, and package. Another would be providing updated builds for projects that only matter to a small, but passionate subset of users (which may not be paying customers).
Community governance of the code is typically handled through organizations like the Apache Software Foundation. This is a whole different beast of a problem, and I'll write about my thoughts on open source project governance some other time.
conda-forge: Community-led packaging using conda
The point of this is not to say "Anaconda is bad for the Python
community". Quite the contrary: Anaconda has been and continues to be good for
the community, and
conda is an excellent packaging tool. Bigger picture:
acceptance of the Python data stack in the enterprise is existentially
important for the continued succcess and growth of the ecosystem. Just like
Linux needed RHEL and Hadoop needed CDH, PyData needed Anaconda to get where it
has gotten now. High quality projects like pandas and scikit-learn were not
enough by themselves.
Having a community-governed package channel for conda and a community process for submitting, verifying, and storing signed project releases would be ideal. Additionally, there would need to be shared build and continuous integration infrastructure so that we aren't all having to install Visual Studio on our desktops to be able to create reliable Windows builds.
Some will note that there is the anaconda.org, a product created by Continuum for free and paid use (for private builds). The problem with anaconda.org is that it is mainly a place to put binary artifacts.
Given all this, I was incredibly excited when I learned about conda-forge. If we all as a community can throw our weight behind this effort, I believe we can achieve:
- A community-led process for posting trusted binary builds of projects, like CRAN has worked for many years for R.
- Easier integration testing amongst groups of projects, especially on Windows
- Someday, a community-governed Anaconda-like Python distribution
It's complicated, though. Doing this well will require a lot of money and people's time. The R community has sustained itself through the support of academic institutions over the years which the Python data stack doesn't have as much of. NumFOCUS may be able to provide a fiscal conduit for tax-deductible support of conda-forge.
I've long been envious of the community package management infrastructure that the R community has, But many enterprises prefer to use "blessed" platform distributions, e.g. R has Revolution R (now Microsoft R Open). So, we need both, and I encourage readers to help where possible, either through development or money, to help the nascent community effort (i.e. conda-forge) grow.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499468.22/warc/CC-MAIN-20230127231443-20230128021443-00576.warc.gz
|
CC-MAIN-2023-06
| 12,051 | 85 |
http://www.troublefreepool.com/threads/48046-pump-hums-but-doesnt-start
|
code
|
I have a AO SMITH UST1102 1hp pump. The pump hums but won't start. If I hit it with a hammer, it starts and will continue to run all day until it shuts off by a timer. When it shuts off it won't run again unless I hit it with a hammer.
What can be the problem?
How can I fix this?
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719437.30/warc/CC-MAIN-20161020183839-00240-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 280 | 3 |
https://discourse.shapr3d.com/t/non-uniform-scaling/9822
|
code
|
I saw that this is a pretty common question but is there any plan to bring this feature into Shapr? The app itself works great but you shouldn’t have to export to another Cad software just to do one operation. This and a box select feature would help Shapr start to compete with autodesk Fusion360. I work in games and use Shapr 40+ hours a week on average, please throw me a bone lol.
Do you also want non uniform scaling?
- yes, please!
- no, not necessary at all
Won’t vote as third option should be: Yes, be not important as other features needed that are more important.
I don’t know what other features would be considered more important (box selection probably).
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141681209.60/warc/CC-MAIN-20201201170219-20201201200219-00349.warc.gz
|
CC-MAIN-2020-50
| 675 | 6 |
http://metathoughtfacility.blogspot.com/2008/11/gone-but-maybe-not-completely-posted.html
|
code
|
Don't you just hate it when you think you have a good idea and Google tells you there have been quite a number of people that already had the idea a long time ago...
When I was recently pondering the usefulness of models the thought occured to me that it would be not so difficult to generate a model repository from Java source code in a manner like JavaDoc but more advanced or enhanced. This idea as I suggested and expected was realised by others such as Compuware's JavaDoc enhanced with UML models.
Taking it one step further; all roudtrip UML-Java tools offer even more.
An interesting fact of course and completely in line with current development in MDA/code generation tools, ok, I never said it was a revolutionary idea ;-)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120461.7/warc/CC-MAIN-20170423031200-00356-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 734 | 4 |
https://vid.me/bUgq/war-never-changes-nuclear-war-amiga-part-2
|
code
|
Today's weather: excessively violent, with a chance of dismemberment. Stay tuned for our Five-Day Forecast!
Public domain music courtesy of MusOpen - https://musopen.org/
Octotiggy on Facebook - https://www.facebook.com/Octotiggy
Octotiggy on Twitter - https://www.twitter.com/Octotiggy
Nuclear War is a single player turn-based strategy game developed by New World Computing and released for the Amiga in 1989 and later for MS-DOS. It presents a satirical, cartoonish nuclear battle between five world powers, in which the winner is whoever retains some population when everyone else on earth is dead.
The game's introduction includes an homage to Dr. Strangelove. Each player - one human, four computer-controlled - is represented by a caricature of a national leader (the MS-DOS version allowed more than one human player). If there is a computer-controlled winner at the end of the game, that leader is depicted jumping for joy in the middle of a blasted wasteland, crowing "I won! I won!". If the player wins only the high score board is shown. Once a player (computer or human) loses, all of their stockpiled weapons are automatically launched. It's possible for a game to have no winner because of this. If this happens, a cut scene of the earth shattering and exploding is shown, and the high score table appears (though without any new entries).
The following characters are available in the game; the public figure being satirised is listed in brackets.
Ronnie Raygun (Ronald Reagan)
P.M. Satcher (Margaret Thatcher)
Infidel Castro (Fidel Castro)
Col. Malomar Khadaffy (Muammar al-Gaddafi)
Ayatollah Kookamamie (Ruhollah Khomeini)
Mao the Pun (Mao Zedong)
Jimi Farmer (Jimmy Carter)
Tricky Dick (Richard Nixon)
Mikhail Gorabachef (Mikhail Gorbachev)
Ghanji (Mahatma Gandhi)
The game was reviewed in 1990 in Dragon #159 by Hartley, Patricia, and Kirk Lesser in "The Role of Computers" column. The reviewers gave the game 4½ out of 5 stars. Computer Gaming World in 1990 favorably reviewed the game's graphics, fast and brief game play, and humorous computer opponents. A 1992 survey in the magazine of wargames with modern settings gave the game three and a half stars out of five.
Nuclear War (video game). (2015, September 1). In Wikipedia, The Free Encyclopedia.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948579564.61/warc/CC-MAIN-20171215192327-20171215214327-00178.warc.gz
|
CC-MAIN-2017-51
| 2,275 | 19 |
https://www.experts-exchange.com/questions/28986140/Accessing-WinXp-drive-on-Win10-access-denied.html
|
code
|
I found one of my old XP drives, and I want to see what files are on it, copy them off, delete, etc. however when I hook it up via USB/SATA, it shows me the file folders, but when I try to access them, it says "you don't have permission to access this folder." I have gone to the security tab and nothing seems to help me. Options?
As noted, you need to change the file permissions so you can access the files. The process for doing this is described in detail here:
Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.
Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc.
This document explains the different types of consol…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172404.62/warc/CC-MAIN-20170219104612-00519-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 1,218 | 6 |
https://www.hindawi.com/journals/vlsi/1998/024951/
|
code
|
VLSI Design On Self-Checking SystemsView this Special Issue
Design of CMOS PSCD Circuits and Checkers for Stuck-At and Stuck-On Faults
We present in this paper an approach to designing partially strongly code-disjoint (PSCD) CMOS circuits and checkers, considering transistor stuck-on faults in addition to gate-level stuck-at faults. Our design-for-testability (DFT) technique requires only a small number of extra transistors for monitoring abnormal static currents, coupled with a simple clocking scheme, to detect the stuck-on faults concurrently. The DFT circuitry not only can detect the faults in the functional circuit but also can detect or tolerate faults in itself, making it a good candidate for checker design. Switch and circuit level simulations were performed on a sample circuit, and a sample 4-out-of-8 code checker chip using the proposed technique has been designed, fabricated, and tested, showing the correctness of the method. Performance penalty is reduced by a novel BiCMOS checker circuit.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649348.41/warc/CC-MAIN-20230603233121-20230604023121-00699.warc.gz
|
CC-MAIN-2023-23
| 1,015 | 3 |
https://rdrr.io/cran/PAMmisc/f/README.md
|
code
|
PAMmisc is a collection of random utility functions that might be useful for anyone working in passive acoustics. If you have any useful tools you'd like to add, please contact Taiki Sakai: [email protected].
Install the latest version from GitHub:
# make sure you have Rtools installed if(!require('devtools')) install.packages('devtools') # install from GitHub devtools::install_github('TaikiSan21/PAMmisc')
writeClickWave - Create synthetic delphinid click wav files
writeAMWave - Create synthetic amplitude modulated wav files
decimateWavFiles - Decimate .wav files to a new sample rate and write them
to a new folder. Works on either a single .wav file or an entire folder. Currently
only works with single channel data, if multi-channel wav files are fed in it will
only process and output the first channel.
squishList - A utility for compressing a list that has elements with the same
name. See examples.
peakTrough - Find multiple peaks and the troughs / valleys between those peaks
in the spectrum of a click. Also has a plotting feature so that you can easily
see the values being chosen as peaks / troughs in the spectrum and adjust the
search parameters. See help file for algorithm details.
wignerTransform - Compute the Wigner-Ville transform of a signal, and optionally
plot the result. This will zero-pad the input signal to the next power of two,
and the result is an NxN matrix where N is the zero-padded length. Returns a list
with the NxN matrix, as well as the values for the time and frequency axes.
addPgEvent - Add a new Event to a Pamguard database. Provide the database to
add the event to, the UIDs of the individual detections for this event, the binary
files that these detections are found in, and an "eventType" name for the event.
Existing events cannot be added to, so all detections for an event must be added
at the same time. This function should only add to an existing database, it will not
modify or remove existing entries in the database.
addPgGps - Add a gpsData table to a Pamguard database. Gps source can either be
a dataframe, SPOT csv file, or SPOT gpx file, or csv file with UTC, Longitude, and
Environmental data fetching functions to be described later
decimateWavFiles to work with multi-channel data.
Any scripts or data that you put into this service are public.
Add the following code to your website.
For more information on customizing the embed code, read Embedding Snippets.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646076.50/warc/CC-MAIN-20230530163210-20230530193210-00785.warc.gz
|
CC-MAIN-2023-23
| 2,433 | 32 |
https://www.producthunt.com/alternatives/gitshot
|
code
|
Alternative products to GitShot
GitShot is the fastest way to report issues you find in your mobile product *with screenshots* directly to GitHub.
4 alternative and related products to GitShot
What is the best GitHub issues client with screenshot upload for iPhone?
Product Hunt surfaces the best new products, every day. It's a place for product-loving enthusiasts to share and geek out about the latest mobile apps, websites, hardware projects, and tech creations.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159006.51/warc/CC-MAIN-20180923035948-20180923060348-00196.warc.gz
|
CC-MAIN-2018-39
| 466 | 5 |
https://forums.ubports.com/category/76/bq-m10-fhd
|
code
|
@luksus No, that's a separate issue. Audio does go through pulseaudio already in QtWebEngine, so microphone can be used, but camera on Android based devices is done via a Qt plug-in which talks to the Android HAL via libhybris, however video/camera support in QtWebEngine does not go through QtMultimedia, therefore it does not use that plug-in. Instead, it expects v4l devices, and QtWebEngine itself has no knowledge of what libhybris is or how to use it.
Therefore, someone needs to do the work to write a system service which bridges the Android HAL for CameraService as v4l compatible device on the Ubuntu side of things, so that apps using v4l for camera access will just work.
I went back and installed the original Ubuntu Touch with the SPFlash Tool and was able to update to the latest UBPorts version using the desktop app with no issues after that. Thanks for the prompt feedback everyone.
With BQ formally out of business now, it will give my M10FHD some extended life. I still remember how excited I was when it arrived from Spain here in the US way back when.
I will send a donation to the UB Ports Team as soon as I finish checking everything out.
@marathon2422 I have a BQ M10 HD running OTA 15. It connects to my Panasonic TV with my Blackberry Playbook HDMI cable. Video playback is great, but no audio over HDMI. All you get is audio from tablet speaker. Such a shame.
it is possible to reach system settings via the battery indicator, so you can update to the latest version or change channels. Touching the "about" icon while in system settings will cause a crash.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662539131.21/warc/CC-MAIN-20220521143241-20220521173241-00453.warc.gz
|
CC-MAIN-2022-21
| 1,585 | 7 |
https://www.kylewise.net/citrix/xendesktop-7-8-3d-pro-master-image/
|
code
|
Creating a Citrix XenDesktop 7.8 HDX 3D Pro Master Image with VMware and PVS 7.8.
This is a guide on how to create a new Windows 7 X64 master virtual machine for XenDesktop HDX 3D Pro. I’ll also go through the steps on how to use one vDisk master image that will work for all versions of your graphics cards so you don’t need to create separate master images for each GPU profile.
Creating a base Windows 7 x64 virtual machine.
Login to VMware
Right click and Select New Virtual Machine > New Virtual Machine.
From the menu choose Create a new virtual machine.
Type in a name for the virtual machine and select the location.
Select a compute resource
Select a Datastore to create your virtual machine on.
Select Compatibility: ESXi 6.0 or later for my environment.
Guest OS- Select the Guest OS Family and Guest OS Version.
Customize the Hardware.
I changed the disk size, CPUS, Memory, Network, added a floppy, and PCI Shared Device.
Assign a GPU profile.
I added a floppy drive so I can install the VM Paravirtual drivers right away during the Windows 7 installation.
Ready to Complete-
Click Finish to start creating your new virtual machine.
Verify the virtual machine creation completed.
Power on the new virtual machine.
Click Install Now.
Accept the Microsoft Software License Terms, click Next.
Use Recommended Settings or click Install Important Updates Only.
Set Time Zone and Date.
After Windows 7 initial configurations are completed, mount the VMware tools ISO.
Installing VMware tools on your Master Image
Select Custom Set up Type.
On the custom setup screen, click on SVGA and choose the option Do not install.
When ready click Install.
Click Yes to reboot the virtual machine.
After the virtual machine is rebooted, install all your standard Microsoft Windows updates.
Then install the Citrix Recommended Hotfixes for Windows 7/2008R2. Skip this if you want, but I usually always install the 10 plus Microsoft hotfixes after Win7 SP1 so I don’t have issues later and end up having to make an image update to correct a known issue.
Before Installing the Nvidia Graphics Drivers and the XenDesktop VDA remember to enable Remote Desktop.
NVIDIA Graphics Driver Download and Installation
Download the Nvidia drivers. We have K2Install Nvidia Graphics Drivers.
Search for the drivers that match your specific graphics card.
Click Agree & Download.
Right Click and Run as Administrator
Leave the Default Path or change it if you want to. Click OK
Wait for the the installation files to finish extracting.
Click Agree and Continue.
Click Yes to restart the virtual machine after the drivers have installed successfully.
Install Citrix Provisioning Services Target Devices Software.
Install the CDF 64bit requirement.
User Name and Organization. Install Application for Anyone who uses this computer (All Users)
Click Install to start the process.
When the virtual machine starts up, connect and login to the the virtual machine using Remote Desktop Connection.
Install Citrix XenDesktop 7.8 HDX Pro VDA.
Mount the XenDesktop 7.8 ISO, then open a RUN prompt. Type in XenDesktopVDASetup.exe /enable_hdx_3d_pro to launch the VDA Setup.
Select XenDesktop – Delivery Applications and Desktops. Start.
Choose Virtual Delivery Agent for Windows Desktop OS.
Create a new master image.
Select “Yes, Install the VDA for HDX 3D Pro”.
Select Citrix Receiver or unselect if your users don’t need it installed.
We set the delivery controller list with Group policy Registry preferences so the XenDesktop vDisk images can be easily moved to another site if needed. You can either choose to do it later or click the drop down and specify the delivery controllers.
Select or unselect any of the features that you want installed.
Configure Firewall rules automatically.
Review the Citrix XenDesktop 7.8 VDA prerequisites and components. Click install when ready.
Wait for the Installation to Finish. If the setup prompts for a restart, click yes and reboot then log back into the virtual machine to restart the installation process.Click Finish and Restart the virtual machine.
After the XenDesktop 7.8 VDA has installed successfully and the VM has rebooted we can configure the virtual machine for the other K2 Graphics cards profiles. This will allow you to use the same vDisk/master image.
Go to VMware vSphere Web Console and login.
Right Click on the virtual machine and select settings.
Expand the PCI Device setting and under GPU Profile, select the next GPU Profile. Click OK when finished.
Login to the virtual machine through remote desktop connection.
After logging into the virtual machine you should be prompted to restart, click yes.
Wait for the virtual machine to start back up, then shut it down again. Go back to the VMware web console and adjust the PCI device again and repeat the steps above until all the drivers have been installed.
After you have a vdisk in PVS, spin up additional virtual machines using Streamed VM Setup Wizard or XenDesktop Setup Wizard. Then create a new machine catalog and delivery group and assign some users to test.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818067.32/warc/CC-MAIN-20240421225303-20240422015303-00506.warc.gz
|
CC-MAIN-2024-18
| 5,071 | 66 |
https://www.grapecity.com/forums/ar-dev/could-not-load-file-or-assembly-grapecity-documents-imaging-version-5-1-0-790
|
code
|
Posted 21 July 2022, 11:55 pm EST
I’m getting the below error in each control when viewing in designer view in 16.1.3:
Could not load file or assembly 'GrapeCity.Documents.Imaging, Version=184.108.40.2060, Culture=neutral or one of its dependencies. the system cannot find the file specified.
I’ve tried uninstalling references and also reinstalling Visual Studio. It’s strange because it looks like the most recent assembly should be GrapeCity.Documents.Imaging version=220.127.116.115, which I have installed.
Any other specific suggestions?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949181.44/warc/CC-MAIN-20230330101355-20230330131355-00020.warc.gz
|
CC-MAIN-2023-14
| 549 | 5 |
http://nugetmusthaves.com/Category/IoC?page=95
|
code
|
Top 20 NuGet IoC Packages
Hazel Networking is a low-level networking library for C# providing connection orientated, message based communication via TCP, UDP and RUDP.
Unitysync.Async is a library of extension methods that lets you preform async continuations on Task/Task<T> Types. Allowing you to non-blockingly call async methods on the Unity3D main thread and continue on the Unity3D main thread when the Task/Task<T> is completed.
The instance/object pool for C#, Esay to use, thread safe, "automic distinguish type".No config, no need to specific type or key, that all automicly. just use Instance() and return() methods, MagicPool will handle other things. MagicPool provide fully contorl of instance/object in two ways, and sui...
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794872114.89/warc/CC-MAIN-20180528072218-20180528092218-00591.warc.gz
|
CC-MAIN-2018-22
| 738 | 4 |
http://www.platecoverage.com/home/lets-give-away-a-book
|
code
|
Already following Plate Coverage on Twitter? You're still eligible. Just re-tweet!
Named a Best Baseball Book of 2016 by Sports Collector's Digest, Baseball's Most Baffling MVP Ballots looks at the past, present and future of the MVP Award through the most controversial ballots of all time. Which of the so-called “worst MVPs” can hold up to contemporary statistical analysis? Who cast the single worst vote in MVP history? Does racial bias influence the MVP vote? Who really deserved the award in a given year?
Baseball's Most Baffling MVP Ballots answers these questions, rights some wrongs, unravels some threads, and looks at some very familiar faces in unfamiliar ways.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320368.57/warc/CC-MAIN-20170624235551-20170625015551-00371.warc.gz
|
CC-MAIN-2017-26
| 679 | 3 |
https://www.migal.org.il/en/postdoctoral-researcher-research-assistant-flow-transport-microfluidic-porous-media
|
code
|
We are Hiring
Open position for a postdoctoral researcher or research assistant (F/M) for flow and transport in microfluidic porous media
We seek a postdoctoral researcher or research assistant (F/M) for a new research group at MIGAL – Galilee Research Institute, working on the nexus of soil science, environmental hydrology, and experimental fluid mechanics using porous media microfluidic flow experiments.
The aim is to investigate the impact of porous medium structure on unsaturated flow processes (such as drainage, infiltration, and drying), solute transport and mixing in heterogeneous porous media, and more. The primary motivation is understanding how these processes impact the fate of pollutants, microbial activity, and root activity in soils.
- Designing and constructing microfluidic experimental systems mimicking porous environmental media (soil, sediment, or rock)
- Performing flow experiments with fluorescent tracers, acquiring images, processing, and analyzing them.
- Summarizing results, writing and publishing articles and reports, and presenting results at conferences. (Depending on the specific role)
- Instructing and supervising students (Depending on the specific role)
- Logistic management of the lab, equipment, and materials.
- Masters or Ph.D. in natural or engineering sciences or other relevant fields
- Experience with MATLAB or Python – required
- Experience in laboratory flow experiments – highly preferred
- Experience with microfluidic fabrication techniques and flow experiments – highly preferred
- Knowledge of image processing and analysis – preferred
- Knowledge of numerical simulations with Comsol or OpenFOAM – preferred
- Independent learning and working ability, diligence, reliability, high organization level, and good communication skills.
Please send CV to [email protected]
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945183.40/warc/CC-MAIN-20230323194025-20230323224025-00023.warc.gz
|
CC-MAIN-2023-14
| 1,845 | 17 |
https://www.downturk.net/page/48780/
|
code
|
CudaText 184.108.40.206 (x86/x64) Portable | 10.0/10.9 Mb
CudaText is a code editor, with syntax highlight for 160+ languages. Has lite interface with tabs. Has JSON config files instead of option-dialog. Supports Python plugins. Create programming scripts with this powerful tool that allows users to work concurrently on as many as six groups of projects. Programming scripts can come in a wide variety of containers, with similarly varied options for the actual coding language employed. Fortunately, this abundance of options does not mean that developers must necessarily employ a myriad of programs to write their code, as detailed tools such as CudaText allow software engineers to write down new code sequences quickly.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178381989.92/warc/CC-MAIN-20210308052217-20210308082217-00423.warc.gz
|
CC-MAIN-2021-10
| 727 | 2 |
https://community.oracle.com/message/10390558
|
code
|
This content has been marked as final. Show 8 replies
I've seen those errors when I have had a bad memory chip on the hardware. Best to send an explorer off to Sun.
That's really what I'm thinking it might be. I completely powered it off / removed power and opened it up and reseated all memory cards. When my console machine logs back in, I'm going to power it back up and see what happens.
I had another M4000 here so I removed the entire ram bank from this M4000 and swapped it with the other one and now I'm no longer seeing the memory address not aligned errors, however; it seems to just reset / reboot.
I can enter single user mode if at the >boot cdrom --s and mount the hard drive and running fsck on /dev/dsk/c0t0d0s0 returns no errors. If I run a reboot though, it goes back to
bootOs-io hostname unknown
the file system /dev/rdsk/c0t0d0s0 is being checked
syncing file systems... done
And then back to the post.
Is this hardware or is this something wrong config wise? I'm at a total loss here and I need to get the system back up ASAP.
Thanks for all the help.
I need to get the system back up ASAP.Your time constraints aren't anyone's concern here in these user-to-user forums.
This isn't Techsupport. No one is being paid to respond with suggestions.
Contact Oracle support, use your service contract credentials and privileges, and log a Support Request. For a computer system that is that expensive to purchase, you have a service contract.
It wasn't meant as a directive, it was I'm trying to find information. I understand this isn't technical support and I apologize about that comment. People here have been more than helpful with problems and issues and if it offended, again, I do apologize.
It just that it has been more than four days since you initially posted the inquiry to the forum. In all but the most remote locations on this World of ours, a SR logged with TechSupport could have had a field service engineer into your data center by now.
It's a special case here that I can't go into details of why a service person can not come to where this machine is located, but that's neither here nor there.
As an aside, I was able to achieve single usermode with the cdrom drive and reading on other forums, tried doing a boot -f "failsafe" and it rebooted correctly after post. Also, not having the hostname was a problem, which I can't seem to understand since it had, static defined IP addresses. Now, I'm rebooting again, and seeing if it will boot correctly this time without the restart / reboot errors that I was seeing since it now isn't giving me the Hostname undefined message.
Now, I'm getting other errors, but it is rebooting! So I'm happy, I think I can figure out everything else on my own.
Best of luck to you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738609.73/warc/CC-MAIN-20200810042140-20200810072140-00350.warc.gz
|
CC-MAIN-2020-34
| 2,752 | 20 |
https://www.xonebros.com/podcast/2017/12/8/podcast-190-game-awards-2017-analysis
|
code
|
The Game Awards show has happened. We break down the winner, the loser, and what we thought. We got some great new trailers and discuss which ones we're most excited for. As always it's a great time talking all things games and Xbox with the most positive gaming community on the planet the Xonebros.
Support The Show - https://www.patreon.com/PositiveGaming
Our Facebook Page - https://www.facebook.com/Xonebros
Subscribe On itunes - Click Here
Mixer - https://mixer.com/xonebros
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315258.34/warc/CC-MAIN-20190820070415-20190820092415-00019.warc.gz
|
CC-MAIN-2019-35
| 480 | 5 |
https://www.redhotpawn.com/forum/announcements/debates-forum-suspended-temporarily.186084/page-3
|
code
|
02 Jul '20 20:13>2 edits
@no1marauder saidI disagree with this, and I have said as much in private forums.
I'd prefer non-subscribers have less influence over Debates not more. Perhaps they should be limited to a certain number of posts and/or participation in a limited number of threads per week/month.
Many of the most toxic and disruptive posters in Debates have no "skinny" in the game and some periodically start new usernames. It would be nice if something was done to control these problems.
I don't think that whether someone is a subscriber should influence the application of any new rules for moderation. This implies that subscribing would allow a poster to get away with something that a non-sub would not when they really should not be connected. It would be analogous to the wealthy being treated differently by the law by being punished less harshly for the same crime.
Making treatment different for subscribers on something unrelated to chess like the debates forum makes the site look bad by making it seem as though they only care about profit. That could cause un-subs on principle and deter people from subbing. I honestly don't believe that people's posting behaviour would change by becoming a subscriber or by unsubscribing.
I have always subscribed. It's not that I particularly need or want the extra features, but I like to support a site that I get enjoyment from. However, I don't believe the solution to solving the toxicity in the debates forum should be tied to money. There are plenty of good writers who are non-subs, and plenty of bad ones who are. Applying restrictions to all non-subs for the sake of curbing a few bad eggs (I'm sure you can imagine whom I am thinking of) wouldn't be very nice.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038468066.58/warc/CC-MAIN-20210418043500-20210418073500-00572.warc.gz
|
CC-MAIN-2021-17
| 1,734 | 7 |
http://stackoverflow.com/questions/2793435/pop3-transmission-process/2793456
|
code
|
The best way of looking at something like this is to have a look what something else does. Run Wireshark or some other packet capture software, and use an e-mail client to check. Anyway, the basics of a POP3 session are as follows:
LIST <-- Shows the size of each waiting message
UIDL <-- Shows a unique ID for each waiting message
RETR 1 <-- Retrieves message with index 1
DELE 1 <-- Deletes the message you just retrieved
The first char of all of the responses except RETR will be a + (success) or a - (failure).
If you are deleting messages off the server after retrieving them, you don't need to bother with UIDL. If you are leaving them, you can use UIDL to get a unique ID for each message which you store locally to show you have retrieved that message before.
For more details, see the RFC. Wikipedia also lists a more in depth example, showing the server response.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776431152.42/warc/CC-MAIN-20140707234031-00083-ip-10-180-212-248.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 873 | 8 |
https://outdoors.stackexchange.com/questions/4576/learning-to-find-north-using-moon-phases
|
code
|
How to learn to find north using moon phases? I'm looking for easy-to-remember rule of thumb, at best some simple graphic.
It's quite trivial by full moon. Since full moon is in direct opposition to the sun, at the midnight it will be exactly on south.
Some time ago someone have explained to me how to navigate when the moon is in other phase, using the term of C-shaped and D-shaped moon, with deviation from north at midnight depending on how C- or how D- was that phase. He have made a sketch on the sand. I should have made photo or drawing of it, but I haven't thought about it and now I have problems finding similar sketch or similar rule of the thumb in internet.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100399.81/warc/CC-MAIN-20231202105028-20231202135028-00367.warc.gz
|
CC-MAIN-2023-50
| 672 | 3 |
https://techcommunity.microsoft.com/t5/microsoft-forms/forms-pro-multilingual/td-p/1068418
|
code
|
I have several Forms Pro Surveys that I will be translating to multiple other languages. I have already translated all of the English text to the other languages in an excel file. Is there an easier way (than hundreds of copy/paste steps) to push the translated text back into the Form? I was expecting/hoping there is an entity in the CDS where I could upload/push the translated text to, but I can't find where the translated text is stored in any entity.
Any ideas or suggestions?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648695.4/warc/CC-MAIN-20230602140602-20230602170602-00010.warc.gz
|
CC-MAIN-2023-23
| 483 | 2 |
https://groups.io/g/BITX20/message/54576
|
code
|
Re: #ubitx-help Strong Audio Tones in and outside audio receive passband #ubitx-help
toggle quoted messageShow quoted text
If you have a v4 with the socketed Nano, probably easiest to just buy a bunch of Nano's.
Find one that does not have the processor clock at the wrong frequency.
Be sure to buy Nano's that don't already have the pins soldered to the Nano,
since the pins must be added to the back side of the Nano.
The Nano's use a 16mhz ceramic resonator to determine the CPU clock frequency,
and that can vary by 50khz or more between units.
Apparently, harmonics of the 16mhz oscillator beat with harmonics of the 12mhz BFO, creating the tones.
If you hear the tones while using a v3 uBitx, try putting a finger on the (very dinky, about 2x3 mm)
ceramic resonator near the ATMega328P processor, on processor pins 7 and 8.
You will have to remove the LCD first to get your finger in there, but the radio will still work.
Since on the v3 uBitx the Nano is soldered down to the Raduino, it will be much tougher to
swap the Nano out. Might be easier to add small capacitors (10pf) to ground from one or
both ends of the resonator. But that resonator and ATMega328P are quite small, will be
a difficult solder job. Might work to put insulating tape over the resonator, then grounded copper
foil over the top of that, effectively duplicating what happens when you put a finger on it.
There is also a 12mhz resonator associated with the Nano clone's ch340 USB chip.
This resonator is not active unless there is a USB connection to a host computer for a firmware download,
so interference from the 12mhz oscillator should not normally be an issue.
On Wed, Jul 4, 2018 at 06:19 PM, <groupsio@...> wrote:
Is replacing the Arduino still the easiest way to fix the 13kHz tone in the headphones?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178351134.11/warc/CC-MAIN-20210225124124-20210225154124-00174.warc.gz
|
CC-MAIN-2021-10
| 1,790 | 22 |
http://www.typologycentral.com/forums/the-fluff-zone/25206-random-thread-6599.html
|
code
|
I thought I'd been absorbed (literally) by the chair in the office about an hour ago. Turns out I'd just fallen asleep.
I woke up from the dream, but the feeling remains.
'Consciousness is not simply a sensory-perceptual affair, a matter of mental imagery, as the contents of our mind would have us believe. It is deeply enmeshed with the brain mechanisms that automatically promote action readiness' - Jaak Panksepp
I miss the old shrug emoticon from like 5 years ago. It was accurate. Whereas no one shrugs like our current emoticon. Unless they consider, and then re-consider, and then RE-re-consider the thing that they originally shrugged about?
Originally Posted by Nørrsken impersonating EJCC
It's strange. I keep banning morons, but they keep signing up? What is this?
ESTJ - LSE - ESTj (mbti/socionics)
1w2/7w6/3w4 so/sx (enneagram)
lawful good (D&D) / ravenclaw + wampus (HP) / boros legion (M:TG)
conscientious > sensitive > serious (oldham)
want to ask me something? go for it!
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188623.98/warc/CC-MAIN-20170322212948-00253-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 990 | 11 |
http://themostsearched.com/watch/buku-abi-makes-allegations-of-abuse-against-her-father-r-kelly/LW9DdWhPIJs
|
code
|
Buku Abi makes allegations of abuse against her father R Kelly.
Everybody complains that all Black Youtubers sound the same. White Supremacy this. White Supremacy that. Black women this. Black women that. Well, here we just talk real. So please support THIS channel the same way THEY support those other Youtubers. Thanks for your donations https://www.paypal.me/AkintundeNation
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247508363.74/warc/CC-MAIN-20190221193026-20190221215026-00079.warc.gz
|
CC-MAIN-2019-09
| 378 | 2 |
https://techsuggest.org/about/
|
code
|
Passionate Work. Award are Loading…
Tech Suggest is a Blog where I write about the Best Tech Products and Software for consumer use and Suggest People the Best Tech Products by researching overall. The purpose of the site is to help and provide you with the Best & Trusty Tech & Internet Stuff that you are finding for.
Meet The Creator
Vinayak is a Tech Researcher, web geek, and solo entrepreneur who loves Discovering and Creating useful Blogs on the Internet.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950383.8/warc/CC-MAIN-20230402043600-20230402073600-00221.warc.gz
|
CC-MAIN-2023-14
| 465 | 4 |
https://royals.org/forum/viewtopic.php?f=1&t=186123&start=60
|
code
|
Brain TraysersSilver Foxgenome Paddy Power:
Would be good if these people actually did some research
So actual goals improved but xG didn't? I know which one I'll take thanks ya bunch of nerds
I'm confused by these takes - PP literally reference their reasoning for their view.
Secondly, xG has been shown to far better explain/predict future results than previous results has. That's a justifiable red flag to people who care about that - NTT20 in this case. You could of course take the view that because we have over-performed xG for what feels like forever, we will continue to do so, but then again 9 tails in a row doesn't mean we won't see heads next flip.
(Of course you are all equally entitled to not care in the slightest about it)
Isn’t the bit people find weird the claim that ‘performances didn’t improve’. They did, unarguably.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735882.86/warc/CC-MAIN-20200804191142-20200804221142-00053.warc.gz
|
CC-MAIN-2020-34
| 850 | 7 |
https://www.2-spyware.com/ask/problems-with-searchhwildforscrapbookingcom-removal
|
code
|
This morning I found search.hwildforscrapbooking.com set as my browser’s homepage. I was surprised because I was used to my old Chrome homepage. I tried to delete this domain via settings. However, once I restarted my computer, this search engine appeared again. Well, I tried few more times to get rid of it, but I failed. What did I do wrong?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583897417.81/warc/CC-MAIN-20190123044447-20190123070447-00496.warc.gz
|
CC-MAIN-2019-04
| 346 | 1 |
https://nanovms.gitbook.io/ops/getting_started
|
code
|
Currently Ops support various forms of UNIX operating systems.
$ curl https://ops.city/get.sh -sSfL | sh
If the script complain about missing HomeBrew on Mac, please install it from https://brew.sh/ and re-run the above command.
On Linux flavors ensure that you have QEMU version 2.5 or greater installed.
QEMU, run the following command...
$ sudo apt-get install qemu
$ sudo dnf update$ sudo dnf install qemu-kvm qemu-img
$ sudo yum update$ sudo yum install qemu-kvm qemu-img
During installation setup will attempt to configure the PATH. Because of differences between platforms, command shells the modifications to PATH may not take effect until the console is restarted, or the user is logged out, or it may not succeed at all. If after installation, running ops version in the console fails, try
source ~/.bash_profile or open a new terminal.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107885059.50/warc/CC-MAIN-20201024223210-20201025013210-00185.warc.gz
|
CC-MAIN-2020-45
| 846 | 10 |
https://community.flic.io/user/poczta/posts
|
code
|
Q1 2020 has already went to history. Any news about the 'hub sdk'?
Posts made by poczta
RE: Flic IR pinout
Do you mean on the IR accessory or the hub itself? Do you have the old Hub or the new Hub LR?
Either the Hub (which color of cable goes to which pin on the connector) or the jack itself (which color f a cable is soldered to which part of a jack).
Something like this:
I've got a new hub.
I'm not exactly sure how I could help you, would you like a photo of how it should look like?
Yes, basically which color of flic IR cable goes to which part of jack /connector. There are four cables inside the wire for IR connector: white, black, green and red.
Could you post a photo of your broken jack?
The jack itself is stuck in the wall (I tried to push it through the hole to my server room). I want to buy a new 2,5 mm jack and solder it to this wires:
Flic IR pinout
I've accidentaly broken the 2,5mm jack connector to the IR blaster. Can you please state the pinout so I can solder the replacement pin? I'd like to Save myself the trial an error way as there's too many possibilities.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817181.55/warc/CC-MAIN-20240417204934-20240417234934-00483.warc.gz
|
CC-MAIN-2024-18
| 1,089 | 13 |
http://gamingfreedom.org/
|
code
|
The freedom of both the creators of games and the players of games have been slowly disappearing for a long time, with DRM and everything else making life more difficult for everybody, except the pirates. The first steps towards a more free world of gaming experiences came in 2008 when The Gamer's Bill of Rights was introduced at PAX in 2008.
Since then, there has been much discussion and activity, and it is the belief of the Gluon team that the world is ready for something new: The freedom of gaming taking to a new level. We propose a new method of game development and distribution, which brings the creators of games and the players of games together.
The Gluon project is building a game engine and distribution system, which allows the creators of games to build games easily and collaboratively, powered by open technologies such as Qt, OpenGL, OpenAL, Git and many more. All of this is wrapped up in a nice, easy to use tool called Gluon Creator, from where you can publish games directly onto the GamingFreedom.org website.
On the website, the players of games can discuss and compete with each other, and with the creators of games, who have an instant community for the games they publish.
How Free Must I Be?
Not everybody in the game development world is equally happy with opening up their work to the world, and as such, the games distributed through GamingFreedom.org can be any of the Creative Commons licenses.
What this means is that you have a choice in how free you want your work to be - all the way from the classic public domain license, allowing everybody to do anything they want with what you have made, all the way to allowing people to only redistribute the work you have created as-is, with no changes at all.
What About My Inner Capitalist?
People must of course be able to survive in a world in which the movement of little pieces of green paper supposedly define happiness. As such, GamingFreedom.org provides many ways for the players of games to give back to the creators of the games they enjoy. While games are free to download, the players of games are encouraged to donate to the makers through a wide variety of avenues:
Supporting both PayPal and Nokia Money, as well as the new kid on the micropayment block Flattr, GamingFreedom.org gives the players of games every opportunity to support the creators of games by giving them money, and thus encourage them to continue creating amazing games.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471983026851.98/warc/CC-MAIN-20160823201026-00239-ip-10-153-172-175.ec2.internal.warc.gz
|
CC-MAIN-2016-36
| 2,440 | 10 |
http://eventghost.net/forum/viewtopic.php?p=34960
|
code
|
bernd wrote:Hello Aquila,
Now I have a much better understanding of the function thank you for this detailed explanation.
Unfortunately my Python skills tends to be virtually zero but I will try to test it according to your instruction at the weekend. I have still one little question to the “get sensor status” what sensor can I use for this function or what sensor do you use?
I have myself not used this function. But you can get the last pushed button on the Hue Tap, that I have tested. So far there are not that any more sensors available in Norway, where I live, at least. To use this function would require some knowledge of python. The plugin will fire an event when a sensor changes state, that would be more useful for most. I use this to catch clicks on the Hue Tap.
If you want to save and restore settings, please try the new version. It has functions to handle this for you without any extra Python.
I use the plugin with two Hue stripes, so far, in my flat, I plan to buy another starter set soon.
Mainly I use a universal IR-Remote to control the Hues (set scenes, set brightness, turn on/off) but I also use it for special events. For example when I start Kodi (XBMC) then a certain scene starts or when I get an email the hue blinks or when the sun is going down the lights turn on. Thanks to EG and this plugin the opportunities are unlimited to use the Hues.
I have played a little with the plugin and all functions are self-explanatory and works fine for me until the “modify scene” function. There is the following error message:
The error you have a image of looks like it's from the "Create Scene" function. But I can't recreate it. It looks like maybe the plugin can't find the scene on the Hue Bridge. This could happen if the scene changes name since you created the action.
And I found several bugs in the "modify scene" function. I hope I fixed them all now. I don't use scenes my own setup, so it's harder to detect bugs. :p Please retest it.
What I have also noticed is when I create a new Scene I have to click first on the “test”-Button otherwise when I only click at “OK” or “apply” the new scene won’t be saved. Just for information.
As I say all other functions works fine
Ahh, this is "working as intended". If you execute the action after configuring it, it will work the same way as if you push the "test" button. I have made it this way because then you can create a scene without using the computer/EG. You can create a scene for all lights, then show an alert and recall the scene after the alert. So in your e-mail example you can save a scene, show your alert and then recall the scene to get back the settings from before the e-mail.
More functions, if that's what you're asking it would be nice to see one time a function which can interact with the music or video signal means that the light change the colour and brightness with the music or with the colour from the video signal. (Ambilight like) I don’t have programming knowledge but I know this is hard to realise. It’s just a thought, I am very happy with the current features.
It is very nice and unselfish from you to say I should donate to the EG-Project. I will do it.
Ohh, I think it's more than this plugin will ever be able to do alone. But if someone creates a plugin that fires events based on music or video it can be linked to this plugin. And those posibilitys is why I love EG. I can get Spotify to change my lighting, and someone else can use those same plugin for something completly different.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337625.5/warc/CC-MAIN-20221005105356-20221005135356-00434.warc.gz
|
CC-MAIN-2022-40
| 3,539 | 16 |
https://mjha91.github.io/research/bondb
|
code
|
The increasingly diverse holdings of institutional investors, who hold around 70% of public US firms’ outstanding equity, raise questions about whether they actively vote their shares and monitor individual companies. For example, each of the three largest mutual fund families in terms of total net assets (Vanguard, Fidelity, and BlackRock) held equity positions in around 5,000 US companies as of December 2018, casting doubt on their ability to monitor every company in their extensive portfolios. However, recent evidence suggests these institutions are attentive owners for stocks that comprise a larger portion of their overall portfolio and that even institutions primarily holding indexed positions play an important governance role. This paper analyzes whether institutions’ large corporate bond portfolios might affect how actively they monitor and vote their shares.
We analyze whether institutional investors’ increasingly extensive corporate bond holdings are associated with how actively institutions vote and monitor their equity investments. We find that institutions conduct more governance research and are less likely to follow proxy advisor vote recommendations for companies whose bonds represent a larger proportion of their overall portfolio. Corporate bonds held in equity-focused funds and shareholder proposals that are more likely to require investors’ attention drive these findings. There is no evidence that creditor-shareholder conflicts explain these findings. Our results suggest that institutions’ bond holdings contribute to their overall incentive to be engaged monitors.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662510117.12/warc/CC-MAIN-20220516104933-20220516134933-00185.warc.gz
|
CC-MAIN-2022-21
| 1,618 | 2 |
https://research.aalto.fi/en/datasets/electromagnetic-response-and-optical-properties-of-anisotropic-cu
|
code
|
We investigate the electromagnetic response of anisotropic copper antimony disulfide (CuSbS₂) nanoparticles and layers embedded with them for solar applications and near-infrared (NIR) sensors using computational methods. To this end we calculate the scattering and absorption efficiencies of oblate spheroidal CuSbS₂ nanoparticles using the surface integral equation method. We further investigate the optical response of thin layers containing CuSbS₂ spheroids at low volume fraction using a Monte Carlo method. We find that response of these layers can be considerably modified by changing the short axis length and the orientation of the particles within the layer with respect to the incoming radiation. This allows engineering the layers for specific polarization-dependent-response applications.
|Date made available||2022|
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100674.56/warc/CC-MAIN-20231207121942-20231207151942-00212.warc.gz
|
CC-MAIN-2023-50
| 836 | 2 |
https://forums.unrealengine.com/t/how-to-upgrade-unreal-engine/68410
|
code
|
I supper new in unreal engine, so my question maybe a little noobish
How to upgrade unreal engine to new version? I have 4.11.2, and I see that there is a 4.12 version exist.
Do I need to delete engine, and install again?
You should be able to just hit the yellow/orange update button where you can boot up the engine from inside the launcher
As seen in this picture for example:
No, i don’t have this options
I found answer by myself
Pressing this button solves this problem:
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153814.37/warc/CC-MAIN-20210729011903-20210729041903-00470.warc.gz
|
CC-MAIN-2021-31
| 478 | 8 |
https://www.dcac.com/uncategorized/emc-world-day-0/
|
code
|
Yesterday was Day 0 or EMC World which means that it’s party day. The day started with Registration and the Welcome reception. If you’ve never been to EMC World, registration is probably the longest line in the place. You’ve got all 10,000 or so attendees trying to get checked in. Fortunately for me I’m a returning attendee so my line was much shorter than the general registration line (thank god).
After the welcome reception was the concert featuring the Counting Crows. The Counting Crows put on a pretty good show, so far I’d have to say that the Bare Naked Ladies are still my favorite concert at EMC World so far.
I took a bunch of pictures at the party and registration which I’ve posted to Flickr.
Probably my favorite picture of Day 0 is this one of me with the walking Celerra.
I’ll try and post sessions daily about everything that I’ve seen though out the sessions.
|
/fsx/guilherme/cc2023-50/r2378/input/1700679100264.9/warc/CC-MAIN-20231201021234-20231201051234-00378.warc.gz
|
CC-MAIN-2023-50
| 896 | 5 |
https://blenderartists.org/t/strange-bumpmap-behaviour-in-2-53/485755
|
code
|
well, there is defenitly something wrong here, trouble is that i don’t have enough undertanding of the inner workings to say what it is exactly and how to fix it.
i did some more fiddling and found that there are definetly two different ways blender handles textures to use as normal maps.
there is the one, wich apparently only gives good results with aa, used when the texture is directly applied to the material.
and the other wich is used when you use texture nodes to input the normals from the image texture and feed them into the material.
this method gives a rather standard rgb normal map but the effect is far too extreme and i havn’t found a way to decrease the strenght yet.
heres a screen of what i mean:
the top section shows the normals from the texture beeing fed into the material and the lower sections shows the normals beeing fed into the output to show the normal map.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039594808.94/warc/CC-MAIN-20210423131042-20210423161042-00370.warc.gz
|
CC-MAIN-2021-17
| 893 | 7 |
http://endurancerobots.com/azbnmaterial/linphone-overview/
|
code
|
Linphone is an open source SIP Phone, available on mobile and desktop environments (iOS, Android, Windows Phone 8, Linux, Windows Desktop, MAC OSX) and on web browsers.
Linphone has inside a separation between the user interfaces and the core engine, allowing to create various kinds of user interface on top of the same functionalities.
The user interface frontends:
Liblinphone, the core engine: this is the library that implements all the functionalities of Linphone.
Liblinphone is a powerful SIP VoIP video SDK that anyone can use to add audio or video call capabilities to an application. It provides a high level api to initiate, receive, terminate audio & video calls.
Liblinphone relies on the following software components:
Liblinphone and all its dependencies are written in pure C.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195527907.70/warc/CC-MAIN-20190722092824-20190722114824-00556.warc.gz
|
CC-MAIN-2019-30
| 793 | 7 |
http://www.boddie.org.uk/david/Projects/Python/DUCK/Examples/Serpentine/OrientationCompass/docs/orientationcompass.html
|
code
|
This example shows how to use an orientation sensor in a device in order to display a compass.
We import the classes and modules that will be needed by the application. The most relevant are the classes from the android.hardware module.
from java.lang import Math from android.app import Activity from android.content import Context from android.graphics import Canvas, Paint, Path from android.hardware import Sensor, SensorEvent, SensorEventListener, SensorManager import android.os from android.view import View, ViewGroup from android.widget import LinearLayout, TextView
The OrientationCompassActivity is derived from the standard Activity class and represents the application. Android will create an instance of this class when the user runs it.
class OrientationCompassActivity(Activity): __interfaces__ = [SensorEventListener]
We declare that the class implements the SensorEventListener interface. This means that we need to implement the onAccuracyChanged and onSensorChanged methods.
The initialisation method calls the corresponding method in the base class before requesting access to sensors and setting up the user interface.
def __init__(self): Activity.__init__(self) @args(void, [android.os.Bundle]) def onCreate(self, bundle): Activity.onCreate(self, bundle)
We call the getSystemService method to obtain a sensor manager object which we cast to the correct type so that we can call its methods. From this object, we obtain an object that represents the orientation sensor.
sensorManager = self.getSystemService(Context.SENSOR_SERVICE) self.sensorManager = CAST(sensorManager, SensorManager) self.orientation = self.sensorManager.getDefaultSensor(Sensor.TYPE_ORIENTATION)
We create a layout and a view to display information about the sensor.
layout = LinearLayout(self) layout.setLayoutParams(ViewGroup.LayoutParams( ViewGroup.LayoutParams.MATCH_PARENT, ViewGroup.LayoutParams.WRAP_CONTENT)) layout.setOrientation(LinearLayout.VERTICAL) self.infoView = TextView(self) layout.addView(self.infoView)
If the sensor was not found, we write a message in the text label to indicate this.
if self.orientation == None: self.infoView.setText("No orientation sensor found.")
Before making the layout the main view in the activity, we create an instance of a custom view class and add it to the layout.
self.compass = CompassView(self) layout.addView(self.compass) self.setContentView(layout)
When the activity starts or is navigated to by the user, the onResume method is called. We call the corresponding method in the base class before showing the name of the sensor in the name label and registering the activity as a listener for the sensor if a sensor is available.
def onResume(self): Activity.onResume(self) if self.orientation != None: self.infoView.setText(self.orientation.getName()) self.sensorManager.registerListener(self, self.orientation, SensorManager.SENSOR_DELAY_UI)
When the user navigates away from the activity, the onPause method is called. We call the onPause method in the base class and unregister the activity as a listener with the sensor if it was previously registered.
def onPause(self): Activity.onPause(self) if self.orientation != None: self.sensorManager.unregisterListener(self)
The following two methods are required to implement the SensorEventListener interface. Although we do not handle the first one in this example, we still need to provide an implementation.
@args(void, [Sensor, int]) def onAccuracyChanged(self, sensor, accuracy): pass
The onSensorChanged method is called when the sensor notifies the activity that a change has occurred. We respond to this by passing on information about the sensor's new values to the custom view we created earlier. This only occurs if a sensor is available.
@args(void, [SensorEvent]) def onSensorChanged(self, event): if self.orientation != None: self.compass.updateNeedle(event.values)
The CompassView class is derived from the standard View class and is used to display the representation of a compass in the activity.
As with other views, the initialisation method accepts a Context as its parameter and initialises itself by calling the initialisation method of the View class.
class CompassView(View): @args(void, [Context]) def __init__(self, context): View.__init__(self, context)
We define a paint that defines how lines will be drawn and a path that will be used to display a compass needle.
self.paint = Paint() self.paint.setStrokeWidth(float(2)) self.paint.setFlags(Paint.ANTI_ALIAS_FLAG) self.paint.setStyle(Paint.Style.STROKE) self.path = Path()
We also define and initialise some attributes that we use to hold information about the position and size of the graphics in the view, and the orientation of the compass needle.
self.x = self.y = self.r = float(0) self.angle = float(0)
The onSizeChanged method is called when the view is first shown and whenever it changes size afterwards.
@args(void, [int, int, int, int]) def onSizeChanged(self, width, height, oldWidth, oldHeight): self.x = width/2 self.y = height/2 self.r = Math.min(self.x, self.y) * 0.8 L = self.r * 0.9 l = self.r * 0.1 self.path.rewind() self.path.moveTo(0, -L) self.path.lineTo(l, 0) self.path.lineTo(0, -l) self.path.lineTo(-l, 0) self.path.close()
The onDraw method is called when the view needs to be displayed. The parameter is a Canvas object that we draw onto. We call the onDraw method in the base class before adding our own decorations.
@args(void, [Canvas]) def onDraw(self, canvas): android.view.View.onDraw(self, canvas) self.paint.setARGB(255, 192, 192, 192) canvas.drawCircle(self.x, self.y, self.r, self.paint) canvas.translate(self.x, self.y) canvas.rotate(-self.angle) self.paint.setARGB(255, 255, 192, 192) canvas.drawPath(self.path, self.paint)
When we have orientation information, we call this method to update the orientation of the compass needle.
@args(void, [[float]]) def updateNeedle(self, values): self.angle = values self.invalidate()
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948514113.3/warc/CC-MAIN-20171211222541-20171212002541-00769.warc.gz
|
CC-MAIN-2017-51
| 5,944 | 37 |
https://www.cash-master.com/lay-the-place-38/
|
code
|
Anybody who has purchased this system can email this site to get the settings I am using on the greyhorse bot. Put lay the place in the subject line and quote rule 1 of the system ebook word for word in your email and you will have the settings emailed back to you by Graham.
I am aware that this is probably not the best day to mention this as yesterday was a total bloodbath for this system, but it’s had those before and recovered so I wouldn’t write it off yet. It’s been rough going over the last week mainly because the few races that qualified were not really competitive enough to give us a decent chance. I am sure it will pick up again and will give an update later this week.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141186414.7/warc/CC-MAIN-20201126030729-20201126060729-00520.warc.gz
|
CC-MAIN-2020-50
| 692 | 2 |
https://docs.alfresco.com/6.1/tasks/deploy-acs-eks.html
|
code
|
The deployment is built using a main template that also spins up sub-stacks that are defined in a number of nested templates, that include the stack configuration for Alfresco Content Services and Virtual Private Cloud (VPC), file storage, and database. If you're a System administrator, ensure that data persistence, backups, log storage, and other system-level functions have been configured to meet your needs.
Since we need to use private (Enterprise-only) Docker images from Quay.io, you need credentials to be able to pull those images from Quay.io. Alfresco customers can request their credentials by logging a ticket at https://support.alfresco.com/.
Here is a summary of the steps required:
- Set up the prerequisites:
- Create a Public Hosted Zone.
- Create an SSL Certificate.
- Check the permissions for the IAM role/user.
- Prepare an S3 bucket for the CFN template deployment.
- Deploy Alfresco Content Services using the AWS Console.
- Alternatively, you can deploy Alfresco Content Services using the AWS Cli.
- Check the status of your deployment.
- Administration and REST APIs: http://$EXTERNALHOST/alfresco
- Share: http://$EXTERNALHOST/share
See the Alfresco/acs-deployment-aws GitHub project documentation for the prerequisites and detailed setup:
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496330.1/warc/CC-MAIN-20200329232328-20200330022328-00207.warc.gz
|
CC-MAIN-2020-16
| 1,269 | 14 |
https://search.usi.ch/en/courses/35259876/consumer-behavior-in-tourism
|
code
|
Consumer Behavior in Tourism
In this course, we deal with a special context of consumer behaviour: consumer behaviour in an experiential setting. This context is closely related to a service context, where
- we lack tangible goods (experiences are intangible);
- purchases are often highly emotional and/ or associated with risk;
- consumers are highly involved in the purchase decision (sometimes even also highly engaged);
- the uno actu in services results in special consumption settings (co-production, pricing, and the like).
We shall discuss a number of general consumer behaviour models but also go in-depth with a number of different issues related to the topic of the course. We further discuss selected empirical results mostly with the scope of the country in which USI is in: Switzerland.
At the end of this course, the students are familiar with the following topics related to consumer behaviour in tourism:
- general models describing and explaining consumer behaviour
- specifics in tourism influencing the way we view consumer behaviour in tourism (mostly stemming from a service perspective)
- model specifics with regard to consumer behaviour in tourism
- selection of special topics in consumer behaviour in tourism
The marking (grades given) will be based on a 60’ written exam, closed book at the end of the course/ semester. Students are expected to prepare the lectures by scanning the 1st tier readings/ papers in such a way that they can participate in a discussion about the content of the papers. 2nd tier papers are for further reading.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738964.20/warc/CC-MAIN-20200813073451-20200813103451-00151.warc.gz
|
CC-MAIN-2020-34
| 1,568 | 13 |
https://smarterbalanced.alohahsap.org/teachers.html
|
code
|
Access systems used before, during and after testing and review key resources.
Access and view interim assessment items for administrative or instructional purposes.
Complete required training on using the TA Interface and administering tests.
Become familiar with the testing system and types of questions on the operational and interim tests.
Manage users and student information, monitor test progress, and submit testing incident requests.
Access the Smarter Balanced Tools for Teachers website.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153814.37/warc/CC-MAIN-20210729011903-20210729041903-00502.warc.gz
|
CC-MAIN-2021-31
| 499 | 6 |
https://www.aei.mpg.de/969193/mlgwsc-1?c=26149
|
code
|
Results from the first mock data challenge for machine learning gravitational-wave search algorithms
An international team of researchers led by a PhD student at the AEI Hannover has pitted six different algorithms, four of them machine learning methods, against each other in a friendly competition. The goal of the exercise was to determine how well such algorithms perform in the search for gravitational-wave signals from binary black hole mergers. To find out, the team created a mock data challenge: six participating research groups submitted their search algorithms, which where then used to identify gravitational-wave signals hidden in four data sets of an increasing complexity and degree of realism. The study shows that these algorithms – within the limits of this challenge – are competitive to current state-of-the-art searches. Additionally, they have low computational cost and allow for a trivial implementation of the algorithms on highly efficient graphics processing units. The team identified three key areas of research to realize the full potential of machine learning algorithms in gravitational-wave detection pipelines.
We present the results of the first Machine Learning Gravitational-Wave Search Mock Data Challenge (MLGWSC-1). For this challenge, participating groups had to identify gravitational-wave signals from binary black hole mergers of increasing complexity and duration embedded in progressively more realistic noise. The final of the 4 provided datasets contained real noise from the O3a observing run and signals up to a duration of 20 sseconds with the inclusion of precession effects and higher order modes. We present the average sensitivity distance and runtime for the 6 entered algorithms derived from 1 month of test data unknown to the participants prior to submission. Of these, 4 are machine learning algorithms. We find that the best machine learning based algorithms are able to achieve up to 95% of the sensitive distance of matched-filtering based production analyses for simulated Gaussian noise at a false-alarm rate (FAR) of one per month. In contrast, for real noise, the leading machine learning search achieved 70%. For higher FARs the differences in sensitive distance shrink to the point where select machine learning submissions outperform traditional search algorithms at FARs ≥200 per month on some datasets. Our results show that current machine learning search algorithms may already be sensitive enough in limited parameter regions to be useful for some production settings. To improve the state-of-the-art, machine learning algorithms need to reduce the false-alarm rates at which they are capable of detecting signals and extend their validity to regions of parameter space where modeled searches are computationally expensive to run. Based on our findings we compile a list of research areas that we believe are the most important to elevate machine learning searches to an invaluable tool in gravitational-wave signal detection.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948217723.97/warc/CC-MAIN-20240305024700-20240305054700-00768.warc.gz
|
CC-MAIN-2024-10
| 3,009 | 3 |
https://stefanos.cloud/blog/grpc-support-on-azure-app-service/
|
code
|
Microsoft announced today that gRPC is now available and supported on Azure App Service for Linux workloads. This was made possible by recent platform upgrades to the HTTP reverse proxy layer to leverage YARP and Kestrel.
This is an important announcement as it removes the native support limitation in Azure App Service which prevented the migration and usage of gRPC-enabled applications in Azure App Service. In such cases, running the Azure App Service migration assessment tools would report incompatibility errors, leaving you with the pain of having to decide upon an alternative design option for your net.tcp, wcf or gRPC applications.
gRPC utilizes the remote procedure call (RPC) framework to streamline messages between clients and servers over the HTTP/2 protocol. Using gRPC protocol over HTTP/2 enables the use of features like multiplexing to send multiple parallel requests over the same connection. gRPC is currently available for use with .NET Core 3.1 and .NET 6. Node and Python will soon be supported as well.
Microsoft also provides a step-by-step guide on how to deploy a .NET 6 gRPC app on Azure App Service. This involves first carrying out a few configuration steps in the gRPC server before uploading the application code to Azure App Service. After uploading the code and before deploying the new Azure App Service, you will need to perform the following additional actions:
- Enable HTTP version
- Enable HTTP20ProxyFlag
- Add HTTP20_ONLY_PORT application setting
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102637.84/warc/CC-MAIN-20231210190744-20231210220744-00113.warc.gz
|
CC-MAIN-2023-50
| 1,493 | 7 |