url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://www.newsproplus.com/covid19-pfizer-shot-slightly-less-effective-but-protects-against-indian-variant/
|
code
|
Covid19 – Pfizer Shot Barely Much less Efficient However Protects In opposition to Indian Variant
Covid19 – Pfizer shot barely much less efficient however protects in opposition to Indian variant
The Pfizer-BioNTech is coronavirus vaccine is much less efficient however nonetheless seems to supply safety in opposition to variant first detected in India, in line with a examine by France’s Pasteur Institute.
“Despite slightly diminished efficacy, the Pfizer vaccine probably protects” in opposition to the Indian variant, in line with laboratory check outcomes, mentioned Olivier Schwartz, the institute’s director and co-author of the examine that was printed on the BioRxiv web site forward of peer evaluation.
Twenty-eight healthcare staff within the metropolis of Orleans had been a part of the examine, out of which 16 acquired two doses of the Pfizer-BioNTech vaccine, whereas 12 got one dose of AstraZeneca-Oxford College vaccine. There was a three-fold lower within the variety of antibodies of people that had taken the Pfizer-BioNTech vaccine in opposition to the B.1.617 variant, however nonetheless, there was safety.
Sufferers who had had Covid-19 inside the previous yr and folks vaccinated with two doses of Pfizer retained sufficient antibodies to be protected in opposition to the variant present in India, however three to 6 occasions much less antibodies than in opposition to the UK variant, Schwartz mentioned.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488539480.67/warc/CC-MAIN-20210623134306-20210623164306-00189.warc.gz
|
CC-MAIN-2021-25
| 1,444 | 6 |
https://www.legacy-collectibles.com/recently-sold-items/beautiful-colt-detective-special-factory-letter.html
|
code
|
SOLD - Beautiful Colt Detective Special - Factory Letter
Availability: Out of stock
691219 - 10213
9/9/19 - This is a near-mint Colt Detective Special with two-inch barrel and six-shot cylinder. The revolver is accompanied by a Colt factory letter that states it was shipped in 1957. It has 98-99% of the original high-polish blue, with only minor muzzle and high edge wear, and a thin roll mark on the cylinder. Excellent bore and grips. The gun comes in an unmarked Colt box.
We found other products you might like!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153854.42/warc/CC-MAIN-20210729074313-20210729104313-00194.warc.gz
|
CC-MAIN-2021-31
| 517 | 5 |
https://ibm-developer.gitbook.io/cloudpakforintegration-workshop/docs/pre-work
|
code
|
grant clustermethod will assign access permissions to a cluster or namespace in a cluster that was created prior to the workshop. Creating a cluster and provisioning the VMs and other resources and deploying the tools may take up to an hour and longer if queued. Permissioning access to an existing cluster in contrast happens in 1 or 2 minutes depending on the number of concurrent requests.
Note: You can click on any image in the instructions below to zoom in and see more details. When you do that just click on your browser's back button to return to the previous state.
lab keygiven to you for this workshop and your IBM Id to access your IBM Cloud account,
Note: The lab key can be found on the session information page or by asking your instructor.
The active account should be the account on which the cluster is created, which is not your personal account. Click the account dropdown if you need to change the active account.
Workshop Informationapplication. This application is pre-deployed on your cluster and can be accessed using the following steps:
Note: Each student will be assigned to a different namespace on their assigned cluster with a name in the format studentnnn (e.g. student012)
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363290.59/warc/CC-MAIN-20211206072825-20211206102825-00091.warc.gz
|
CC-MAIN-2021-49
| 1,206 | 7 |
https://us.vestiairecollective.com/kids-shoes/trainers/dolce-gabbana/pink-leather-dolce-gabbana-trainers-32903749.shtml
|
code
|
Very good condition
Unfortunately, due to shipping restrictions this item cannot be shipped to your country.
Lithuania, from the seller beata
Authenticity & Quality control
- Online since:2023-04-25
- Categories :Kids
- Designer:Dolce & Gabbana
- Condition:Very good condition
- Size:34 FR
- Location:Lithuania, from the seller beata
This item is offered by an individual seller. Its price has been suggested by its seller.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643585.23/warc/CC-MAIN-20230528051321-20230528081321-00201.warc.gz
|
CC-MAIN-2023-23
| 423 | 11 |
https://kodekloud.com/blog/virtualization-vs-containerization/
|
code
|
Traditionally, software engineers used to run and deploy applications on physical machines. But what happens when you have one application that requires Windows and another that requires Linux?
How could you run these two on the same physical machine? In addition, what if the deployed applications need to handle more user requests? In that case, you need to add more RAM and CPUs to your machine, which is usually costly and can’t scale infinitely. This is where virtualization and containerization come into play.
Virtualization and containerization are popular because they let you easily run and scale applications in different environments. Although virtualization and containerization are somewhat similar, they are fundamentally different technologies. Understanding the differences between these two technologies will help you to choose the one that best suits your project needs.
This article will present the six key differences between virtualization and containerization.
- Choose virtualization if you want an isolated environment to implement your tasks. For instance, when using Kali Linux to execute penetration testing.
- Choose containerization when you want to quickly test an application that’s in the development stage.
- Choose containerization - for its scalability capabilities - if you want your application to handle a growing number of requests without sacrificing performance.
What is virtualization
Virtualization uses a wholly isolated operating system from the host machine. It uses hypervisor software to abstract the physical characteristics of the host machine and apply them to the virtual machines.
The hypervisor sits between the host operating system and the virtual machines and provides configurable physical resources from the host to the virtual machines. Below is a diagram demonstrating the use of virtualization in running applications.
What is Containerization
Containerization is virtualization but much lighter, allowing applications to run in isolated environments. It packages applications into units called containers. These containers can be deployed and run consistently across different computing environments: development, testing, and production. Below is the diagram which illustrates how applications are managed using containerization.
6 Key Differences Between Virtualization and Containerization
You have learned what virtualization and containerization are in the previous sections. Now let’s go through the key differences between them.
Virtualization and containerization offer different levels of isolation. Virtualization creates a virtual machine that acts as a standalone separating system that emulates low-level hardware devices like CPU, disk, and networking devices. On the other hand, containerization does not emulate low-level hardware devices and relies on the host operating system to create lightweight virtual machines called containers.
In terms of security, virtualization is more secure than containerization. If one of the virtual machines is being exploited, the other virtual machines are still safe because virtual machines are completely separate from each other. With containerization, containers share the same underlying system hardware with the host machine. If one of the containers is exploited, other running containers and the host machine are put at risk.
2. Operating System
Containerization relies on the resources belonging to the host machine OS. Virtualization, in contrast, creates a whole new operating system separate from the host operating system. The operating system in the virtual machine with virtualization technology can be Windows or Linux.
3. Start-up time
The start-up time, also known as overhead, is short for containers because they rely on an already-running host operating system. Virtualization takes longer because virtual machines must boot their own OS first.
Virtualization creates a fully isolated environment for the virtual machine with its own operating system. A container, on the other hand, only contains the dependencies and the source code. Because of this, the instance size of a virtual machine is much larger than that of a container.
Generally, a host server can only host a few virtual machines due to the resources that they require. With containers, the required resources are fewer, and the sizes are smaller, so a host server can even serve hundreds of containers. As a result, the cost of using virtual machines is much higher than that of using containers.
Regarding scalability, containerization is much better than virtualization since it does not require a lot of resources to run and does not have much overhead. Also, with the introduction of orchestration tools like Kubernetes, you can quickly scale the containers’ resources and instances to suit your needs.
Below are some of the common questions.
Which one should I apply, virtualization or containerization, to build software applications?
Virtualization saves infrastructure costs by spanning multiple virtual machines on a single host server. However, it lacks support for application management and also requires a significant amount of resources to run.
Containerization, on the other hand, allows you to easily bundle your application code with all the dependencies it requires to run. With that said, you should use containerization for building software applications.
Can I apply containerization inside a virtual machine?
Yes, you can apply containerization inside a virtual machine to group different sets of applications from each other. For example, you can have one Windows 11 virtual machine with containers for your application. Your teammate can have an Ubuntu virtual machine in the same physical machine as yours to run their app.
In sum, Virtualization simulates a physical machine’s aspects, such as CPU cores, disk, and memory. Containerizatization simulates the OS of a machine. Virtualization creates a much larger instance that takes longer to boot but is more secure. Containers, on the other hand, are lightweight, easily scalable, and boot fast. However, they are less secure than virtual machines.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100724.48/warc/CC-MAIN-20231208045320-20231208075320-00795.warc.gz
|
CC-MAIN-2023-50
| 6,141 | 30 |
https://ec2-52-14-41-105.us-east-2.compute.amazonaws.com/tedxbocaratonsalon-theme-communication-overload-part-ii/
|
code
|
Ted Talks are always a source of great presenters, which make you think about tools and techniques that are far and wide in benefits.
Today’s talk included a dive into Machine Learning, Information overload, a moving presentation of the psychology behind suicide, and an AI-controlled dog aptly named #ASTRO.
- Amazon AWS showcases Generative AI Roadmap. - April 14, 2023
- Full Event Video. Microsoft: Introducing your copilot for the web: AI-powered Bing and Microsoft Edge. - February 8, 2023
- Microsoft: “Reinventing Search.” - February 8, 2023
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510412.43/warc/CC-MAIN-20230928130936-20230928160936-00321.warc.gz
|
CC-MAIN-2023-40
| 555 | 5 |
http://www.ha.upatras.gr/en/undergraduate-studies/courses/b-semester/yar204/
|
code
|
YAR204 Classical Archaeology II
The lectures present the evolution of ancient Greek art from the end of the 5th century BCE until the end of the Hellenistic period (30 BCE). Among the important achievements of these periods are the monuments on the Athenian Acropolis and the 4th c. sculpture, as well as the groundbreaking changes that were established in ancient art and society by the conquests of Alexander the Great and the formation of the large Hellenistic kingdoms.
- Η ΤΕΧΝΗ ΣΤΗΝ ΕΛΛΗΝΙΣΤΙΚΗ ΕΠΟΧΗ, POLLITT J.J. (Eudoxus code: 86053791)
- Κλασική αρχαιολογία, 2η έκδοση, Hölscher Tonio, Μτφ. Παπαγεωργίου Πάρις, Επιμ. Καραναστάση Παυλίνα (Eudoxus code: 77118819)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100674.56/warc/CC-MAIN-20231207121942-20231207151942-00699.warc.gz
|
CC-MAIN-2023-50
| 765 | 4 |
http://blogs.msdn.com/b/patrickdanino/archive/2009/05/01/model-view-viewmodel-toolkit-0-1-released.aspx
|
code
|
It’s been a while since my last update. I’ve been busy working on a new WPF Model-View-ViewModel toolkit, which you can find on the Codeplex WPF Futures site.
The template is meant to introduce the Model-View-ViewModel (M-V-VM) design pattern to the WPF community. It includes:
We hope you find it useful. Feel free to try it out and share your comments/suggestions!
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454702032759.79/warc/CC-MAIN-20160205195352-00228-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 370 | 3 |
https://www.itprotoday.com/sql-server/how-can-i-compare-contents-two-tables-are-identical
|
code
|
A. A couple of methods :-
1. BCP them both out and use the NT COMP.EXE command to compare them.
2. (Courtesy of Roy Harvey)
If tableA and tableB have unique indexes on them:
select count(*) from tableA
select count(*) from tableB
If they don't have unique indexes on them, then do
select count(*) from (select distinct * from tableA) as a
select count(*) from (select distinct * from tableB) as b
Check that the counts are the same. If they are not then obviously the tables don't match. If the counts do match then do:
from (select * from tableA
select * from tableB) as t
If the count from this query is the same as the previous counts, then the two tables are identical. This is because a UNION does a DISTINCT merge of the two resultsets. Therefore the two tables will "collapse" back into one if and only if they are identical.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512323.79/warc/CC-MAIN-20181019041222-20181019062722-00091.warc.gz
|
CC-MAIN-2018-43
| 832 | 13 |
https://forums.raspberrypi.com/viewtopic.php?f=56&t=116975
|
code
|
Specifically, I'm going to explain how I created a Berryboot image for "ubuntu-mate-15.04-desktop-armhf-raspberry-pi-2.img" but I believe the general concept can be extrapolated for use with other distributions.
Requirements: Working Linux system with "squashfs-tools" and "kpartx" packeges installed to be used for editing.
The image that I dealt with is somewhat unique in that the "virgin" image when copied to a microSD card and booted starts by running ubiquity in a specialized O.E.M. install mode. This is both a blessing and a curse. It is a blessing in that it forces one to install the image to a microSD card and run it at least once which I maintain is wise with an image for the R.Pi 2 and it is a curse because you cannot operate directly on the image as it was downloaded in the original downloaded state.
The Berryboot loader for the R.Pi 2 contains a broken version of "mksquashfs" so you will be unable to make a backup copy using the Berryboot menu of any images "WITH CHANGES" once the image is installed into a Berryboot managed system. (Making a backup copy can be done, just not by using the Berryboot menu.)
Hence if you wish to deploy a Berryboot compatible image multiple times it is best to make as many changes and install as many packages as you can think of on a system that was booted using the distribution's native R. Pi bootloader before you create your Berryboot compatible image.
While booted into one of your sessions using the distributions bootloader, open a terminal window, execute the command "ps -p 1 -o command" in the terminal and make a note of the output from the command.
It is my belief that after the Berryboot system initializes and mounts the squashed filesystem it will try to load either the "init" file located under "/sbin/" or the ""systemd" file located in the path "/usr/lib/systemd/" into memory and start executing this file. The output from your "ps" command must point to one of these two locations or you will need to perform some additional steps, which I will not detail.
While still in the terminal window (assuming the output of the "ps" command was "/sbin/init") , execute an "ls -l /sbin/init" command and determine if the init file is a symlink that points to a file elsewhere in the system. While Berryboot can accommodate symlinks to a certain extent during the load operation, Berryboot has no real understanding of the file layout of the squashed filesystm it mounted. Thus Berryboot cannot resolve symlinks which use absolute path names. In other words a symlink with the "init" label which points to the absolute pathname file "/lib/systemd/systemd" is not acceptable but the same "init" label pointing to the relative pathname file of "../lib/systemd/systemd" is aceptable. If the output from your "ps" command indicates a symlink with an absolute pathname file, it will be necessary at some point to delete the symlink and recreate it with a relative pathname and the same label. While you could change the symlink now on your running system and your system would still boot correctly, I advocate waiting until later in the process because there may be more changes that are neccessary.
Now I believe you have the minimum information necessary and you can power down and create a backup copy of your microSD card using either win32diskimager or "dd" if you're an experienced linux user.
Now start your other linux system which you are going to use for editing and begin to follow the steps on the Berryboot site for "Adding your own custom operating systems to the menu" from the Berryboot site. Stop following the steps before the step that begins "sudo sed -i 's/^\/dev\/mmcblk..." and instead first execute the command "sudo cp /mnt/etc/fstab /mnt/etc/fstab.bak". Then perform edits manually with "sudo nano /mnt/etc/fstab" and insert a "#" symbol at the beginning of each line that begins "/dev/mmcblk...". This will make that line in fstab appear as a comment line. When you have finished with changes to each "/dev/mmcblk..." line type "Ctrl o" and save the file followed by a "Ctrl x" to exit. Now it is time to address the symlink issue. Navigate to "/mnt/sbin" in a new terminal window and rename the "init" label to "init.bak". ("sudo mv ./init init.bak"). Now create a new symlink with "sudo ln -s ../lib/systemd/systemd init". Close this terminal window. Continue on to make the squashfs as in "Adding your own custom operating systems to the menu" but omiting the step that began with "sudo sed -i 's/^\/dev\/mmcblk..." in its entirety. Once the squashfs is created and before the step that begins "sudo umount /mnt" you may wish to reverse the changes you have made or your "backup image" will no longer be a viable backup image as the changes you have made have been made in your backup image file. Finally, you can "sudo umount /mnt" to unmount your image and "sudo kpartx -d image_you_want_to_convert.img" to destroy the loop.
A final step is required for the "Ubuntu Mate 15.04" image once you have successfully booted it using Berryboot. This shouldn't be necessary for other distributions. The Ubuntu Mate image contains a custom "update-initramfs" command which by default runs after the addition of any new packages. This custom command depends on a mounted "/dev/mmcblk..." device and /dev/root which will not exist in the berryboot image and the update-initramfs command will fail. To resolve this, I edited the "/etc/initranfs-tools/update-initramfs.conf" file and changed the line which says "update_initramfs=yes" to "update_initramfs=no". There may be a more proper method to accomplish the same result but I do not know the proper method to achieve desirable results.
There will be other annoyances with the Ubuntu Mate image under Berryboot such as the manner in which USB disks are mounted which prevents access to anyone without root privileges. Thus you will probably wish to create a launcher for a "Root File Manager" either before or after you create your Berryboot image.
Good luck to any who attempt to follow my disjointed and rambling guide!
1 post • Page 1 of 1
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100484.76/warc/CC-MAIN-20231203030948-20231203060948-00284.warc.gz
|
CC-MAIN-2023-50
| 6,083 | 14 |
https://www.techyv.com/questions/install-mcafee-quickclean-my-computer/
|
code
|
Install the MCafee quickclean into my computer
Hello expert, My computer got slow since last month. It is still slow and my friend told me to install the McAfee quickclean into my computer to delete unnecessary files. But I don’t know the website to download it free. All sites are provided registered ones. So I need to download it free and full version. Please suggest me some URLs to download it. Thank you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257889.72/warc/CC-MAIN-20190525044705-20190525070705-00168.warc.gz
|
CC-MAIN-2019-22
| 412 | 2 |
https://teamtreehouse.com/community/i-have-a-problem-can-any-help-me-pleasethanks
|
code
|
Welcome to the Treehouse Community
Want to collaborate on code errors? Have bugs you need feedback on? Looking for an extra set of eyes on your latest project? Get support with fellow developers, designers, and programmers of all backgrounds and skill levels here with the Treehouse Community!
Looking to learn something new?
Treehouse offers a seven day free trial for new students. Get access to thousands of hours of content and join thousands of Treehouse students and alumni in the community today.Start your free trial
I have a problem can any help me pleasethanks
Title: Assume you have images named 'Robot1.png','Robot2.png','Robot3.png','Robot4.png', create an array of UIImage objects called 'robotImages'.
My Answer: NSArray *robotImages = [[NSArray alloc] initWithObjects: [UIImage imageNamed:@"Robot1"]; [UIImage imageNamed:@"Robot2"]; [UIImage imageNamed:@"Robot3"]; [UIImage imageNamed:@"Robot4"], nil];
Micahyah Hawkins3,496 Points
I haven't taken this course yet but from what I'm seeing right away is you are leaving off the extension like Robot1.png and even possibly where they are located in the file path.
It doesn't need it
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511053.67/warc/CC-MAIN-20231003024646-20231003054646-00524.warc.gz
|
CC-MAIN-2023-40
| 1,146 | 10 |
https://www.alphinat.com/en/support/data-mask-example/
|
code
|
Creating the first page
The first page will be used to collect the name, age and marital status of the applicant. Once deployed, the page will appear as follows:
When the Smartlet was created, a first page was also created automatically named Page 1 and titled Untitled page.
To modify the page properties:
- Click the edit icon in the list of page actions:
- Enter the following information:
- Click the OK button.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817819.93/warc/CC-MAIN-20240421194551-20240421224551-00679.warc.gz
|
CC-MAIN-2024-18
| 415 | 7 |
https://www.br.freelancer.com/projects/c-programming/task-19756171/
|
code
|
You can use c or c++ for this task. Further details will be discussed in chat.
30 freelancers estão ofertando em média $146 para esse trabalho
Hello, Sir. I have sufficient experience and skill in C/C++ programming. I can satisfy your project in time. I believe you will select me. Thank you.~H~
hi I am really interested in your project I have full experience of c++ programming I could make your c++ project as you want I could satisfy you Everything will be done well if you work with me Thank you
Hi. I would like to do this project for you. I am familiar with both, C and C++ and depending on your problem we can decide together what is better to use. Message me to discuss more details about your project.
I have a major in Computer Science. I have done various projects in C and C++ as you can see in my reviews. I will complete the whole task in the given deadline. Looking forward to having a positive response.
As a software expert, I am very interested in your project. I hope to discuss this project with you. I think we can get good results if we cooperate. I will wait for your response. Thanks.
I am really interested in this project! I am familiar with c and c++ I have long outsourcing experience on upwork! But I am new here! I can handle this project with low budget! Please give me a chance!
Hello I'm an embedded software engineer and I would like to hear about your project requirements to estimate how much effort is needed to complete the job. so I can adjust my bid to job complexity. Best regards
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524679.39/warc/CC-MAIN-20190716160315-20190716182315-00223.warc.gz
|
CC-MAIN-2019-30
| 1,524 | 9 |
https://discourse.southlondonmakerspace.org/t/laser-cutter-how-to-engrave/4994
|
code
|
Ok, I don’t have the right words for this, so, I’m going to try to explain myself.
Is there any way to engrave in a way to not have only “black and white” but shades of gray as well?
only via dithering the greyscale - there’s options in the print menu for this, If you’re about tonight I can show you.
Check the jobcontrol manual:
There are several options for how to interpret greyscale images - dither, power modulation, passes etc. You can do some clever stuff with it (even pseudo 3-axis CNC if your material is soft enough)
On other machines in the past I’ve done this by making multiple images and engraving them in several passes with different power/speed settings. It takes a fair bit of tweaking, but the results can be reasonably good.
I think I’ve come across a valuable tutorial for the laser cutter. This is from Trotec.
How to achieve light and dark engravings
The process utilises a grayscale matrix image to control the power output on a test piece.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814493.90/warc/CC-MAIN-20180223055326-20180223075326-00158.warc.gz
|
CC-MAIN-2018-09
| 982 | 9 |
https://joeliwashige.com/category/programming/
|
code
|
I believe my kids’ lives will be better if they learn at least the basics of computer programming. They’ll learn a logical way of thinking, learn patterns of analysis and synthesis, and gain an ability that adds value in a wide variety of careers. I’m not alone in this belief.
Fortunately, a lot of budget-friendly, kid-friendly options are available for learning to code. Here, I’m listing just a few, most of them available for a “Chromebook School” environment:
- One fun offline option: ThinkFun’s Robot Turtles board game, an introduction to basic programming concepts, where kids tell the adults what to do. 🙂
- codeSpark Academy with The Foos (USD 8/mo, ages 4-9). Apparently based on the Scratch visual programming language. It looks like a very “cute”, fun approach to learning basic coding concepts.
- LightBot Jr (ages 4-8, USD 3) and Lightbot (ages 9+) use visual tiles to “program” an on-screen robot to turn on various lights, learning programming concepts along the way.
- Scratch Jr (free, ages 5-7) is a free, visual programming-language environment for young kids to play in; Scratch is its fun, but more textual, big brother. This has been the inspiration for a number of other apps.
- Khan Academy (free, ages 8+) includes quite a number of courses. Their “hour of code” projects are listed here.
- CodeCombat (free/USD 10 depending on options) is, I think, oriented more toward older kids, and those with a competitive streak–but looks intriguing as well.
- For kids who’ve “caught the bug” of programming, check out the post The Coding Game (Dewdney’s book, long out of print, should still be awesome!), or Project Euler for a simple, no-frills series of exercises. Or check out CodeWars for a environment with some “pizzazz” that offers coding exercises as “katas”, or HackerRank for yet another community and set of pre-made challenges.
- Check out other resources at Code.org. Or here. Or here.
- I haven’t even started to talk about “real-world” robotics. For now, Google it.
I started whetting my taste for computer programming when my family didn’t have a computer. We actually had had one earlier, a Radio Shack TRS-80 that my dad had purchased, and upgraded to 768KB of RAM. I’d enjoyed playing Asteroids-style and other ASCII-graphics games on its green screen. Eventually, though, the TRS-80’s floppy drives gave out, and we were without a family computer for several years.
During this time, we loved going to the local public library. We’d go with half-bushel laundry baskets, and come home with them full of books. I loved browsing the shelves, finding mysteries, biographies, fantasies…and a few lovely books, designed for kids and filled with arcade-style graphics and BASIC code for simple computer games. When we finally got another family computer, a Packard Bell 486-DX2 66Mhz with 8MB of RAM and a 540-MB hard drive, running Windows 3.11, I was ready to go! With Microsoft’s QBasic language bundled with DOS, I had fun writing my own small programs–even getting as far as a visualizer for the Mandelbrot set (courtesy of A.K. Dewdney’s The Armchair Universe, also from the public library). And when I realized that Microsoft had even included the QBASIC source code for several games, Gorillas.bas and Nibbles.bas, I was thrilled!
The CodinGame site seems to do a great job of re-capturing some of that early sense of wonder at what one can do with just a bit of code. It uses dramatic graphics (such as the Space Invaders-like shot above), but has you write the code to solve each puzzle. It’s simple enough for coders just starting out, but also has more challenging puzzles–and support for many languages. If your niece wants to learn to program, if you want a nice set of C++ (or standard-library) kata , or if you’re an expert developer and want to learn Ruby, Swift, Go, or Rust…this may well be the game you’re looking for.
If the stories, graphics, and online environment of CodinGame aren’t doing it for you, also check out Project Euler, for a set of basic-to-challenging problems to be solved in the language of your choice.
I recently learned about Project Euler, and have found it addictive. It’s a wonderful site for learning programming. It’s not powerful tools that make it great. The site’s design looks ancient; it has no programming editors; it doesn’t even have any tutorials. But it has wonder, and a series of progressively harder challenges, and lets you discover what you need to learn in order to solve those challenges. Basically, it’s a site to support exploratory learning–learning of the sort that happens when you start a new job, a new business, or a new hobby. Learning of the kind that delights when you figure out the problem, learning that sticks. Learning that happens when you dive in, get your hands dirty, and learn what you need to know along the way.
James Somers wrote a good article about Project Euler at The Atlantic. I’m still in the first dozen or so problems out of over 500, but if you want to follow my progress, my profile is here and my friend key is 858072_k8PHIvJ2fpmYfHwCObWWZ59Ql4jckfYS.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650264.9/warc/CC-MAIN-20230604193207-20230604223207-00198.warc.gz
|
CC-MAIN-2023-23
| 5,181 | 17 |
https://jcmr-online.biomedcentral.com/articles/10.1186/1532-429X-12-S1-P84
|
code
|
- Poster presentation
- Open Access
An interleaved-navigator projection dual-echo bSSFP sequence for respiratory self-gated imaging
© Herzka et al; licensee BioMed Central Ltd. 2010
- Published: 21 January 2010
- Resolution Projection
- Lower Temporal Resolution
- Readout Direction
- Waveform Design
- Irregular Breathing
Recently, self-navigation has become an alternative to breath-holding and respiratory navigators for cardiac MR scans [1–3]. Current sequences acquire a high spatial-resolution navigator projection every cardiac phase [i.e. ], a lower resolution navigator every TR, or a complete image with lower temporal resolution . Temporal or spatial resolution is sacrificed to minimize the loss of imaging efficiency. Here, we propose a dual-echo balanced SSFP-based imaging sequence that acquires a constant navigator projection during every TR and alternates navigator projection direction for robust motion measurement.
To develop a self-gating cine sequence for high-resolution imaging studies.
We present a pulse sequence specifically designed for high-resolution imaging, with two different but constant nav projections acquired in alternating TRs. The navigator direction was used to minimize TR. Neither image nor navigator orientation was chosen to align with the lung-liver interface: having dual navigators should increase the chance of capturing relevant motion patterns. The processing steps necessary to fully and automatically utilize such high spatial/temporal resolution projections remains to be explored. This technique has application in patient scans where breath-holds are not possible, or where the desired resolutions make breath-holds untenable.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247487595.4/warc/CC-MAIN-20190218155520-20190218181520-00214.warc.gz
|
CC-MAIN-2019-09
| 1,686 | 13 |
https://gretlml.univpm.it/hyperkitty/list/[email protected]/thread/L5273KD72M2VIUTCBGWDFJKRISIKMUIL/
|
code
|
-- ping --
Am 25.03.2016 um 21:22 schrieb Sven Schreiber:
a list-returning function should also accept a string
array argument. The string elements in this array would be used by the
function as the names of the exported list members.
take the labels from the string array and use it for the returned
(inside the user-defined function). That is the concrete request right now.
An alternative might be that the function caller can specify some kind
of namespace prefix, perhaps by the "set" mechanism.
function list exmpl(void)
series s = normal()
list L = s
set funclist_prefix "mypr_"
list L2 = exmpl()
# ... and the series in L2 would be called "mypr_s"
Reminder: The point is that the caller has the power to avoid
nameclashes which would lead to series being overwritten.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101282.74/warc/CC-MAIN-20231210060949-20231210090949-00655.warc.gz
|
CC-MAIN-2023-50
| 775 | 17 |
http://vangoghsgear.biz/supplies/sculpture.html
|
code
|
Beginning with the new year we will be forced to raise prices on some items. So, to lessen the burden on our wonderful customers, we are expanding the student discount program to include everyone who shops at VGG!
When you have saved up $100.00 worth of VGG receipts (not counting taxes or returns), you may trade them, on your next visit, for $10.00 off any purchase in the store.
You must present only original receipt(s) to qualify for this offer. Van Gogh’s Gear cannot be held responsible for lost or stolen receipts.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123102.83/warc/CC-MAIN-20170423031203-00399-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 524 | 3 |
https://moveit.ros.org/install/docker/
|
code
|
Docker is an open-source project that automates the deployment of Linux applications inside software containers. See https://www.docker.com/.
Docker can help you easily evaluate someone else’s code changes without changing your local setup, as well as test on versions of Linux other than your locally installed one. MoveIt has an official MoveIt Docker build that lets you quickly run MoveIt in a local container.
Before starting this tutorial, please complete the installation as described in Docker’s installation instructions. Installation instructions are available for multiple operating systems.
Note that for recent Linux distros, the installation is basically just a single wget command. You may also want add your user to the docker group to avoid having to use sudo permissions when you use the docker command.
If you are running a recent version of Ubuntu (e.g. 16.04, 18.04) it can be as simple as:
sudo apt-get install curl curl -sSL https://get.docker.com/ | sh sudo usermod -aG docker $(whoami)
And you will likely need to log out and back into your user account for the changes to take effect.
To use Rviz (and other GUIs), you probably want to set up hardware acceleration for Docker as described here.
Then, the wrapper script
gui-docker can be used to correctly setup the docker environment for graphics support.
For example, you can run the MoveIt docker container using the following command:
./gui-docker -it --rm moveit/moveit:melodic-source /bin/bash
You can test that the GUI works by running rviz:
roscore > /dev/null & rosrun rviz rviz
If you specify a container name (via
-c <name>), you can also continue or re-enter a previously started container:
./gui-docker -c my_moveit_container -it moveit/moveit:melodic-source /bin/bash
As the previous command dropped the
--rm option, the container will be persistent, so changes you make inside the container will remain.
gui-docker in multiple terminals will connect them all to the same container.
For convienence, the script defines sensible defaults. So, just running
will run an interactive bash inside the
melodic-source container and make it persistent with the name
To stop and remove the container, just issue the following commands:
docker stop default_moveit_container && docker rm default_moveit_container
If you want to use the command line only (without GUI interfaces like Rviz) in a non-persistent container, simply run this command:
docker run -it --rm moveit/moveit:master-source bash
There are many variants of the MoveIt Docker available as documented here. For example, any of the two current distros work: [kinetic, melodic]. Other variations include:
Error response from daemon: OCI runtime create failed...
Your container may have an issue. Try deleting it by
docker stop default_container && docker rm default_container and running
You can link a folder on your hard disk to the Docker container, so you can edit them with your favorite tools on the host, with the
volume option, e.g.:
Use this option when you first create the container (or after deleting it with
docker rm my_moveit_container), like this:
./gui-docker -c my_moveit_container -v ~/moveit_ws:/root/linked_moveit_ws
After the container is created, the folder will stay linked. So you can simply enter it on subsequent calls like this:
./gui-docker -c my_moveit_container
Files created inside the Docker container are usually owned by root. Check and fix permissions, if you run into issues. You can execute
chown . -R 1000:1000 in the container to assign files to the host user, by replacing
1000 with your host user ID (which you can obtain with
id -u on an Ubuntu host).
The Docker container does not contain development and testing tools. You might want to install some in the container:
apt-get install less ssh bash-completion tree nano
MoveIt’s docker containers are built automatically on dockerhub.com, but you can modify the
Dockerfile and build locally if desired with the following command:
cd moveit/.docker/source docker build -t moveit/moveit:master-source .
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144165.4/warc/CC-MAIN-20200219153707-20200219183707-00150.warc.gz
|
CC-MAIN-2020-10
| 4,042 | 47 |
http://codeandcoffee.blogspot.com/2009/12/dan-north-at-jaoo-2009.html
|
code
|
(writers note: This post was originally intended for today.jaoo.dk but I thought I'd start by posting it here as a draft since nobody reads this blog anyway :-) Thanks to Rolf Njor Jensen for co-authoring this post!)
Have a shaman - be a shaman
Every team needs a shaman. A shaman is person who tells stories. So, when someone in the team asks "Why the hell is this code like this?". The Shaman tells the story of this partibular piece of code, its past and how it fits into the rest of the stuff.
Strip away everything you can
When you start to strip away stuff that has no real value in your codebase. You of course will get a simpler system. But another advantages is that other unnecessary stuff pops up and becomes visible.
Use transitional architectures
Developing software is performing structural changes on existing bodies of code, occasionally adding new pieces of code and chipping away old, unnecessary code. If you want a nice loosely coupled architecture with good performance but your current architecture is a big pile of crap. Then it might sometimes be necessary to take one step at a time and for instance start by removing all God classes. An architecture with no God classes then becomes a transitional architecture (or you could say a temporary solution). This architecture does not fully fulfil the goal but is one step towards the wanted solution. It is very important that everyone are aware of the fact that the transitional architecture is not the final solution.
Dan gave another example of a transitional architecture namely to get from the current build system to Ivy. Maven was used as a transitional solution. Maven is this obsessive compulsive friend. When you bring Maven on a date it brings all its friends from all over the internet. The obsessive compulsive disorder has one advantage: Since Maven is very rigid about the placement of different parts of the source less duplicated code is created (since developers discover that the needed code has already been developed before introducing a duplicate solution). After Maven had done its tricks the team was ready to move to Ivy. As Dan put it “When bringing Ivy on a date, Ivy asks if he can bring one of his friend who will clean up the house during the dinner”.
Avoid Standup Stasis
Dan gave a nice demo of how daily standups should not be performed. It is hard to replicate in words so I will try with a strip instead:The team that Dan started working on as an consultant had stopped doing daily scrums. Dan asked how they used to do it and the team did as the above strip tries to explain – i.e. everybody on the team just reported. No one listened and no one commented on others statuses – Scrum Stasis. The team refused to start doing scrums again so Dan did a clever trick. The next day he said “Well I've just had this fantastic idea: why don't we meet each morning and have a chat about the rest of the day answering the question - how we can have the best today?”. The team thought this was a brilliant idea and this way Dan North reintroduced daily scrums (without using the term).
Finally, here is a list of points and citations that did fit into this post:
There is always a reason
Ensure deterministic deployment
You shouldn't "buy" architecture
Nice architects listen, and are not-very-self-important.
“Take a pile of crap A, take another (larger) pile of crap B, and make them into a nice lightweight group of services.”
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335530.56/warc/CC-MAIN-20221001035148-20221001065148-00061.warc.gz
|
CC-MAIN-2022-40
| 3,441 | 16 |
https://academy.bigbinary.com/learn-sql/pages/deleting-specific-data-from-table
|
code
|
We have a
students table below. Let’s say we want to delete the record rows for all the students who have
SQL provides a
DELETE FROM statement, which can be used to make the above change.
DELETE FROM statement can be broken down in two parts.
The first part is
DELETE FROM followed by the name of the table records are to be deleted from.
The second part is simply a filter, a
WHERE clause with one or more conditions to fulfil for the records to be deleted.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039526421.82/warc/CC-MAIN-20210421065303-20210421095303-00502.warc.gz
|
CC-MAIN-2021-17
| 460 | 9 |
https://utc.jobs/sterling-va/senior-software-engineer-simulated-environment-interoperability/BF354B0C9B6D4688B083A234AEB1428B/job/?utm_source=USNLx.com-DE&vs=1&utm_campaign=USNLx.com&utm_medium=NLX
|
code
|
United Technologies Corporation Senior Software Engineer - Simulated Environment & Interoperability in Sterling, Virginia
Job ID: 01355053
Country: United States
Job Type: Full Time
United States of America
HVA34: Sterling, VA 22640 Davis Dr , Sterling, VA, 20164-7104 USA
Senior Software Engineer - Simulated Environment & Interoperability
This software engineering position is within the Simulation & Training Solutions (STS) business area. STS develops and builds simulators and training systems for both military and commercial customers. Devices range in complexity from desktop training all the way up to high fidelity weapons system and full-flight training systems including full visual, motion, and simulator interoperability. As part of the simulated environment and interoperability team, this position will involve modeling and simulation of tactical data networks and designing interoperability interfaces for standards such as HLA and DIS.
Architect effective software & engineering product designs
Assist in development of detailed software & engineering specifications and provide accurate time estimates for the software development
Design, develop, implement, test, and debug real time, multi-threaded, multiprocessing software applications and associated user interfaces
Support and enhance existing software products as necessary
Prototyping, designing, acquiring parts, and writing code
Strong Object Oriented Programming (OOP) skills
3 - 5+ years of professional experience building applications using: C#, C++, Python, or similar
Experience with software engineering concepts and the software development life cycle (requirements, design, implementation, test, support)
Active DOD Security clearance or ability to attain one (US Citizenship Required)
Good written and verbal communication skills
Experience on AGILE teams
Scripting Languages (Python, Perl, etc.)
Source code control (SVN, Git, ClearCase etc.)
Active or recent Secret Level clearance is highly preferred. All candidates must possess the ability to obtain a security clearance with the DoD (US Citizenship Required). Applicants selected will be subject to an additional security investigation and will need to meet eligibility requirements for access to classified information. To comply with U.S. export laws and regulations, this position may only employ "U.S. Persons" as defined by the International Traffic in Arms Regulations (ITAR) (22 CFR 126.1) https://www.pmddtc.state.gov/embargoed_countries/ . All applicants and employees may be subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation.
Apply now and be part of the team that’s redefining aerospace, every day.
United Technologies Corporation is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age or any other federally protected class.
Click on this link to read the Policy and Terms
United Technologies Corporation is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other federally protected class.
Thank you for your interest in a career at United Technologies! We will soon upgrade to an improved job application system to simplify the apply experience. You will still be able to apply to any of our current job openings through December 18, 2018. On January 2, 2019, our new and improved job application system will launch; please check back on that date to see all of our job openings.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540487789.39/warc/CC-MAIN-20191206095914-20191206123914-00280.warc.gz
|
CC-MAIN-2019-51
| 3,862 | 27 |
https://community.sap.com:443/t5/supply-chain-management-q-a/queue-clearing-taking-long-time/qaq-p/7128560
|
code
|
We deleted SNP orders from APO using the program /SAPAPO/RLCDEL. We are sending this deletion to R/3.
However there are lot of queues getting stuck in R/3 inbound and they are taking long to get cleared.
When we debugged, we found that its taking a long time on MDSB table in R/3.
Could someone provide some inputs on this?
MDSB is not a table, it is a view. It basically represents the RESB table.
When you delete a planned/production order, you also delete the dependent requirements, which are found in RESB.
However there are lot of queues quote getting stuck in R/3 inbound
What do you mean by 'a lot'?
and they are taking long to get cleared.
How long is too long?
Deleting orders by use of RLCDEL should be considered to be a non standard process. If you are talking about 10 orders taking a half hour, then this is excessive, and you should consult with your Basis people for possible bottlenecks, starting with the R/3 server. If you are saying that deleting a thousand orders takes a half hour, I don't see this as excessive. You can restart 'stuck' cif queues periodically using standard SAP reports, perhaps in a batch job.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817289.27/warc/CC-MAIN-20240419043820-20240419073820-00612.warc.gz
|
CC-MAIN-2024-18
| 1,135 | 11 |
http://www.solarwinds.com/documentation/en/flarehelp/vman/content/vman-historical-performance-analyzer-charts-sw644.htm
|
code
|
Analyze historical performance in charts
Virtualization Manager collects historical information about resources, and is most effective when enough time has elapsed to create a large base for comparison.
For example, I/O latency data are not available until sufficient data have been collected, and the accuracy of the information increases as more data are gathered. The historical performance analyzer charts provide in-depth views to issues and trends in resources.
Performance data that can be visualized over time includes:
- CPU Ready
- CPU Used
- CPU Wait
- IOPs (Input/Output per second)
- Memory Active
- Memory Ballooning
- Memory Consumed
- Memory Swap In
- Memory Swap Out
- Memory Utilization %
- Net Packets Rx
- Net Packets Tx
To view data for an object, select one or more objects, and click Add to Chart.
The performance chart will be displayed.
Add lines to charts for comparison
- When viewing a performance chart, click Add Line.
- Select a line from the list, and click OK.
Display additional chart lines and component values
- Click to add lines to the performance chart from this VM, its parent cluster, its parent host, or related data stores.
- Click to display the component values that determine the overall value of this line. For example, the component values for CPU usage display the individual vCPU cores. If the line is made up of multiple components, only eight components are displayed on the chart.
Click to view the component values as a stacked chart.
Plan capacity by displaying best fit lines
All lines on the performance charts include an optional best fit line that shows a flat line which best fits the points for that metric. Select Best Fit at the top of the chart to display this line.
The best fit line is useful if there is an underlying long term trend in resource utilization. For some resources, for example, disk space, this is almost always the case. For others, for example, CPU, it only applies if the externally applied system load is driving a trend in the data set. The calculation is done on the data range selected in the graph. Hover over the best fit line to see additional details.
For any metric that is a percentage of total resources, the best fit line also includes an estimate for when that value will reach 100%.
View additional details of the chart
Select the options above a chart to display additional data.
- Config Collections
Displays the configuration collection times.
Displays the relevant notes.
Displays alert notifications.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948623785.97/warc/CC-MAIN-20171218200208-20171218222208-00483.warc.gz
|
CC-MAIN-2017-51
| 2,503 | 35 |
https://pureinfotech.com/surface-pro-lte-microsoft-store/amp/
|
code
|
Although Microsoft started selling the Surface Pro models equipped with LTE at the beginning of December, it was only available for business customers. However, now the company is making available the tablet with cellular connectivity to anyone at the Microsoft Store.
If you’re in the market for a new LTE version of Surface Pro, you can pick up one of the two models. A lower-end that features a 128GB of storage and 4GB of memory for $1150, or the most expensive model that comes with 8GB of memory, 256GB of storage, and sells for $1449. Both devices come with an Intel Core i5 and up to 13.5 hours battery life.
While many consumer customers have been waiting for a Surface Pro with LTE connectivity for a long time, the options are limited, and it’s not yet clear if there will be other options available in the future.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813818.15/warc/CC-MAIN-20180221222354-20180222002354-00728.warc.gz
|
CC-MAIN-2018-09
| 829 | 3 |
https://www.telerik.com/forums/tabstrip-and-pageload-events
|
code
|
I have been using the following example as my guide in trying to utilize the TabStrip in a wizard type application.
Each tab will load a user control and allow the user to submit the information. When the user clicks the next button it will load the data into our database and continue to step them through. If they however leave the application the next time they log in they can pick up where they left off. The problem is the Page_Load event with the 2nd tab and others down the line. It will not get to the point where it loads the data.
Should I be trying to call the GetData from the button control from the first tab?
Code below is used on each of my user control page. How might I fix this?
Protected Sub Page_Load(ByVal sender As Object, ByVal e As System.EventArgs) Handles Me.Load
If Not IsPostBack Then
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823214.37/warc/CC-MAIN-20171019012514-20171019032514-00241.warc.gz
|
CC-MAIN-2017-43
| 814 | 6 |
https://wiki.blender.jp/Dev:Doc/FAQ
|
code
|
- 1 Blender Dev FAQ
- 1.1 What Language is Blender written in?
- 1.2 Why C/C++/Python?
- 1.3 What Editors/IDE's do blender developers use?
- 1.4 Where is the right place to request features in blender?
- 1.5 Why did my Blender compile fail?
- 1.6 Why did my Blender compile with warnings?
- 1.7 Whats the situation with automated testing?
- 1.8 How Does Blender Deal with Security?
- 1.9 Source Code FAQ
- 1.9.1 How do I build Blender?
- 1.9.2 What documentation is there?
- 1.9.3 Where does blender start and what happens next?
- 1.9.4 What is an overview of how the files and subsystems are organized?
- 1.9.5 Where is the UI code?
- 1.9.6 How are Operators connected to C code?
- 1.9.7 What is this DNA and RNA stuff?
- 1.9.8 Where are the icons?
Blender Dev FAQ
What Language is Blender written in?
Short Answer C/C++/Python.
- C - for Blender's [startup/main-loop/shutdown] and most internal functionality, tools, drawing, GUI and editors.
- C++ - physics, audio, game-engine and Cycles render engine.
- Python - The interface definitions, addons, most format import/export and some tools.
Part of it is historic, part of it is convention and choice of the current developers.
Early on when Blender was developed, (1990's), C was very common for developing graphics applications (C++ compilers were expensive, where C compilers were free).
Python was selected because of its great community.
Nowadays Blenders core is still in C, some libraries are in C++, and OSX integration even uses Objective-C, Scripting is done in Python.
Currently this works fairly well and we don't have plans to rewrite large parts of Blender in some other languages.
What Editors/IDE's do blender developers use?
These IDE's are known to work well for blender development where CMake is used to create project files.
- XCode on OSX
- MSVC 2013/2015/2017 on Windows
- Eclipse on any
- QtCreator on any
- Netbeans on any
Some developers use editors such as vim, emacs, geany, notepad++ and scite.
Note that its common to use a different editor/ide for C/C++ and Python code.
Where is the right place to request features in blender?
There are so many possible features to add to blender that its difficult to manage them usefully so we don't accept feature requests on our tracker as some projects do.
If the feature requests are small, like an option to an existing tool you could try to contact the developer of that tool, or at least the maintainer.
See Module Owners
If you're suggestion is a larger change, try make this a suggestion on bf-funboard and use this to get feedback,
See bf-funboard mailing list
Why did my Blender compile fail?
There may be many reason why it failed, but here are some common causes. Also remember to look for the first error that is printed, as this is usually the root cause, further errors may only be a result of this.
File not found or Unresolved Symbols
This usually means a library was not installed, not configured in the build system, or the wrong version of the library was used. Also make sure to download the lib/ folder on Window and Mac, and to install the needed development packages on windows. It's also possible to disable certain libraries when building Blender to avoid the issue. See the Building Blender documentation for details on dependencies.
Blenderplayer failed to compile due to missing functions
Many developers don't compile the blenderplayer, so don't notice this - if it happens grep the source, find the function prototype and copy and paste the function prototype in the stubs.c file with the appropriate NULL or 0 return. If a struct is return you should cast NULL to the appropriate struct type
DNA compile errors
Usually this means you added something to a struct in a header file and forgot to adjust the amount of padding in the struct. Blender requires that the structs be multiples of 8, see the SDNA Notes for more detail. So if you add a short, and there is a char pad; you change it to char pad, to keep it a multiple of eight. Of course if you forget the rules just keep adding a char pad till it compiles without errors :) (which is what you will do if it compiles in your 32 bit machine and others say it is failing in their 64 bit ones... save some time and read the rules instead, alignment matters too, no matter how much padding you add).
RNA compile errors
This usually means the wrong DNA struct type or property name was specified.
Missing Interface Buttons and Menus
Usually this means you added something to the user interface python code and made a mistake. Check the console for errors, often this is because of mixing tabs and spaces. All python scripts in Blender uses spaces for indentation.
Menu or checkbox defaults to the wrong value
Make sure you added a default value in the function that creates the struct, and that you create a version patch in do_versions in readfile.c to initialize values on existing structs.
Why did my Blender compile with warnings?
While Blender can compile warning-free on some platforms/configurations, some warnings persist and can't simply be "fixed" or supressed.
If you see warnings while compiling, you can assume Blender developers are aware of them and they're almost certainly false-positves, or at least not causing real-world problems.
(This goes for static analysis tools too).
However this doesn't mean you should ignore warnings completely, For code you write, check warnings carefully and resolve them where appropriate (fix/supress).
Whats the situation with automated testing?
Testing in Blender is a work in progress, and while we aren't anywhere near full coverage, we have tests for:
- Python: some basic tests exist already in: source/tests/.
- GTest: tests for C/C++ code.
- CTest (from CMake), can be used to call the tests above.
See the project-page: Automated Testing
How Does Blender Deal with Security?
Blender does not attempt to achieve the same level of security as many other applications (web browsers for example),
The ability to have blend files that execute bundled Python scripts does pose a security risk if you don't know who created the file.
The Trusted Source option has been added to the file so you can load a blend file without running scripts as a precaution to simple attacks.
However this is no protection against more advanced exploits such as hand crafting a blend file which uses buffer overflows to run malicious code.
For more discussion on this topic:
- http://lists.blender.org/pipermail/bf-committers/2013-June/040502.html 2013, Jun 4
- http://lists.blender.org/pipermail/bf-committers/2010-April/027216.html 2010, Apr 28
Source Code FAQ
How do I build Blender?
Follow the excellent instructions on Dev:Doc/Building_Blender.
What documentation is there?
Dev:Source/Architecture has a bunch of documentation on the concepts behind Blender's C code. It is not easy for a newcomer to understand, there is a lot to read, and it is not completely up to date. But you should keep coming back to it - the more you understand pieces of Blender, the more all of this will make sense and be helpful.
Where does blender start and what happens next?
source/creator/creator.c has the
main() routine in it.
After parsing args, a bunch of initialization, and reading a .blend file,
main() passes control to
source/blender/windowmanager/intern/wm.c. That is an infinite loop that just processes events and notifications and draws updates on the screen. Events and notifications are things caused either by the user doing something (e.g., mouse click) or the internal blender systems signaling to other parts of blender that something has changed and that means something has to be recalculated, redrawn, or something else.
What is an overview of how the files and subsystems are organized?
Here is a great picture.
Most of the code you will care about is under the
source/blender/ subdirectory, though some Python code you may want to look at is under
Where is the UI code?
The UI layout is defined in Python but the drawing is done in C, and some of the UI is defined in C too.
The Python code is in
space_view3d.pyin that directory is the code for the 3D View editor type (space).
The C interface drawing code is in:
The glue code defining the API python uses to create interfaces
The Python UI code mostly just lays out user-interaction widgets that adjust properties of operators. Operators are Blender tools. At some point you should read Dev:2.5/Source/Architecture/Operators.
How are Operators connected to C code?
If you hover over a button like Spin in the user interface, it shows you the Python name for the operator that will be invoked if you hit the button -
bpy.ops.mesh.spin(). This is implemented in C by an operator named
MESH_OT_spin (see the naming convention in Dev:2.5/Source/Architecture/Operators). If you look for that name, you'll find it as a function that fills in various function pointers and flags in a
wmOperatorType struct. The important one is the invoke function, in this case
spin_mesh_invoke(). If you put a breakpoint on that you'll find that it gets called soon after you push the Spin button.
bpy_operator.c code knows how to go back and forth between module.func and MODULE_OT_func.
What is this DNA and RNA stuff?
The names come from the genetic nucleic acids and hint at their function: DNA, as in genetics, is the code that lets you reproduce something. In the case of Blender, this is essentially what is written to and read from disk as a .blend file - it has all of the user settings and mesh, object, scene, etc. data. RNA, as in genetics, is a helper to transmit the DNA code into the rest of the internal Blender system.
.h files in
source/blender/makesdna/ define the structs, enums, etc., for all the data that needs to be persisted to disk. These are usually used in memory in the running system too. For example,
DNA_mesh_types.h defines the
Mesh struct that has enough information to store a user's mesh on disk. While running, there may be a
Mesh in memory, but there will likely be various derived mesh structures that are more efficient to use during editing, say.
Another aspect of DNA is that it is also a system for helping compatibility between different versions of Blender. The way this works is that a coded description of the layout of each struct is also written to and read from disk. This means that the layout does not have to stay fixed. The C files in the
makesdna directory are for generating and interpreting the structure descriptions. See Dev:Source/Data_Structures/DNAStructs.
RNA is also something that is partially made by code generation, using code in
source/blender/makesrna. It is supposed to be a somewhat more abstract and nicer interface to the DNA data. For example, where a DNA struct might use a particular bit in a short for some flag, RNA would expose that as a bool property. So far, this nicer Data API isn't used too much in the C source code. Where it is heavily used is as the interface to and from Python. Most of the Python access to Blender data is generated automatically to use the RNA system. See Dev:2.5/Source/Architecture/RNA for more information about RNA.
Where are the icons?
The icons are stored in a file called
blender_icons.svg is one large SVG file with almost all of the button icons in a kind of matrix arrangement in it. There is a shell file to convert that file into 16x16 and 32x32 per icon versions of the SVG file as data files (not user editable), these are stored in
The brush icons are separate PNG files in the
brushicons subdirectory. The
datafiles directory also has the splash image and some TrueType fonts.
All of these data files are turned into C files that declare their data as char arrays at build time, so any modifications to these files will be visible after rebuilding.
The code for initializing the icons is in
source/blender/editors/interface/interface_icons.c, in the
init_internal_icons() function. The order of the icons in the image is, bottom to top, left to right, the order of the
DEF_ICON declarations in
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100540.62/warc/CC-MAIN-20231205010358-20231205040358-00887.warc.gz
|
CC-MAIN-2023-50
| 12,001 | 128 |
https://www.smashwords.com/profile/view/JAWD
|
code
|
Here are a few things that might interest you about me as an author:
I live somewhere above the Equator.
My e-mail, for business and fan letters, is [email protected]
I recently started to work with the cool people at Radish Fiction. Radish is an iOS app, for serialised fiction, with an Android version of the app coming out soon.
JAWD, if you couldn't have guessed, is a synonym/pseudonym.
The whole reason that I'm a writer is so that whoever's reading my work can get something out of my writing, whatever it may be. So, if you read something of mine, and you feel that you got something significant out of it, or you just want to write me, please feel free to e-mail me at the above address.
You can connect with me on social media at the following link if you wish: https://www.instagram.com/jawdthewriterofficial/?hl=en
This member has not published any books.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583660020.5/warc/CC-MAIN-20190118090507-20190118112507-00480.warc.gz
|
CC-MAIN-2019-04
| 867 | 8 |
http://www.placehold.it/
|
code
|
.gif, .jpeg, .jpg, .png
Adding an image file extension will render the image in the proper format. Image format is optional and the default is a gif. jpg and jpeg are the same. The image extension can go at the end of any option in the url
Custom text can be entered using a query string at the very end of the url. This is optional, default is the image dimensions (300×250). A-z (upper and lowercase), numbers, and most symbols will work just fine.
Note: Spaces become +
background color / text color
Colors are represented as hex codes (#ffffff is white)
The first color is always the background color and the second color is the text color.
width x height
Height is optional, if no height is specified the image will be a square.
Note: Size must be the first option in the url
Achieve truly responsive images in your site or app with imgix.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119120.22/warc/CC-MAIN-20170423031159-00592-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 845 | 11 |
https://forum.bits.media/index.php?/profile/39424-fra124/
|
code
|
WELCOME TO BUY COIN We really happy you ve chosen to engage this thread because we love to have new members in our community and new investors too.
Buycoin this coin for traders is a all world.
Anyone is free to buy and sell these coins at a favorable rate on any stock exchange, Where the coins are listed.
In turn, we will try to keep the course coins at a decent level.
But, dear traders, the final price of a coin depends on you!
Coin name: Buycoin
Short name: BUY
Address letter: B
Mining phase: POW
Block reward: 15 coins
Total supply: 7.875.000 coins
Premine: ~20% (to bounty and other services)
Maturity: 20 block
Confirmations: 6 block
Target spacing: 5 minutes
RPC port: 9370
P2P port: 9369
Block Explorer & Mining pool's
Faucet's & Game's
Block explorer and mining pool start bounty: Block explorer - 120000 coins. 1st Mining pool - 65000 coins+Node - 50000 coins. 2st Mining pool - 45000 coins+Node - 50000 coins.
Web wallet - Reserved
Mac wallet - Reserved
Android wallet - Reserved
Raspberry Pi - Reserved
Bounty to 1 faucet - 1200 coins.
Bounty to 2 faucet - 1100 coins.
Bounty to 3 faucet - 1000 coins.
Game for Android - 10000 coins.
Other games - 3000 coins
Translate to other language - 1500 coins.
Trade [bUY] BUYCoin with MegaCrypton.com Secured Crypto trade Platform. BTC/BUY: https://live.megacrypton.com/market/2155 LTC/BUY: https://live.megacrypton.com/market/2156 USD/BUY: https://live.megacrypton.com/market/2157 DOGE/BUY: https://live.megacrypton.com/market/2158 Megacrypton BUY WebWallet: https://live.megacrypton.com/login SIGNUP FOR MEGACRYPTON: https://live.megacrypton.com/user/register
BUYCOIN added Livecoin exchange vote list.
BUYCOIN added C-cex exchange vote list.
In the future we will be adding new services that can be bought with the help of our coins
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232262369.94/warc/CC-MAIN-20190527105804-20190527131804-00536.warc.gz
|
CC-MAIN-2019-22
| 1,793 | 34 |
http://www.instructables.com/id/Planning-a-good-daily-cycle-route./
|
code
|
So yet another cycling 'ible from me, this one's been prompted by the fact that I've taken up having a daily cycle in my free time while the weather's good.
The idea is to get a nice daily cycle route, just for the sake of cycling, for both leisure and fitness, cycling's a great way to relax and is also great cardiovascular excercise, better than running, which is bad for your knees over time, that and it's better because you can travel further and have more variation and sceneray changes than from running...
Step 1: Thinking about where to go.
have a think about all the places around you that you could gor for a good cycle, think about cycle paths, parks and forests.
Along with this think of ways to get there and have some recce cycles for your ideas, try new routes for a while until you find one that you really like.
Things to consider are:
*Your own fitness (start simple and build up your fitness as you go along
*Free time (If you don't have alot of it then this can hamper you, making free time is always good though)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174124.9/warc/CC-MAIN-20170219104614-00100-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 1,035 | 8 |
https://trac.osgeo.org/grass/ticket/869
|
code
|
Compile libs with -fexception
|Reported by:||rblazek||Owned by:|
Description (last modified by )
I know, I want probably too much. Would it be possible to compile GRASS libraries (at least core libs gis, vect, ...) with -fexception by default?
The problem is, that for example QGIS, sets error routine which throws an exception, everything works (even on Windows) but only if GRASS libs are compiled with -fexception. If -fexception flag is not used, the exception is thrown, but cannot be caught in QGIS and program is terminated.
QGIS ticket http://trac.osgeo.org/qgis/ticket/1878
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499911.86/warc/CC-MAIN-20230201045500-20230201075500-00811.warc.gz
|
CC-MAIN-2023-06
| 582 | 6 |
http://bliulab.net/DefaultPage/
|
code
|
The IE browser, QQ browser are not supported! Google Chrome browser, Firefox browser, 360 browser and Edge browser are recommended!
Bin Liu's lab at Beijing Institute of Technology (BIT) is focusing on applying the natural language processing techniques to bioinformatics. The research areas of Bin Liu's lab include:
1) Proposing the language models of biological sequences;
2) Studying the natural language processing techniques;
3) Developing the computational tools for biological sequence analysis;
4) Protein remote homology detection and fold recognition;
5) Predicting DNA/RNA binding proteins and their binding residues;
6) Disordered protein/region prediction based on sequence labelling models;
7) Predicting noncoding RNA-disease associations;
8) Identifying protein complexes;
9) DNA/RNA sequence analysis.
Please constact us by email
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141195656.78/warc/CC-MAIN-20201128125557-20201128155557-00601.warc.gz
|
CC-MAIN-2020-50
| 847 | 12 |
https://blogs.msdn.microsoft.com/microsoft_uk_health_blog/2014/04/02/project-sienna-lets-you-build-an-app-today-with-no-code-and-no-cost/
|
code
|
Have you ever tried to learn a foreign language? Did you find it a little frustrating? Did you find yourself asking questions like, “Why do I need to learn the subjunctive tense for all these irregular verbs?” Did you ever wish you could just learn how to ask for directions to your hotel, without having to really understand how the language works?
Learning to code can be frustrating in a very similar way – they’re called coding languages for a reason, after all. You might just want to build a simple app to support your organisation, but you can’t just learn to build the app that you need. First, you’ll need to spend some time learning how the language works. Who has the time?
Make no mistake: Learning to code is a worthwhile pursuit. It can be rewarding, even life-changing. But sometimes, you don’t have time to acquire a new skill for one project. Sometimes, you just need to be able to build something that works and deploy it, so that you can get back to your regular job. For all those moments, there’s Project Siena.
Project Siena is a free app from Microsoft that allows people with absolutely no coding knowledge to build simple, but powerful Windows 8.1 apps on the fly. If you can edit a Word document, you can build an app in Project Siena. The interface is simple enough that you can build an app entirely on a touch screen, no mouse or keyboard required.
Here’s how it works: You choose a few visual elements, customise them and then link them to existing data sets or Web services. If your app is a little more sophisticated, you can add logic commands with a few simple Excel-like expressions. Then you publish your app to the Web and it’s ready for use. That’s it.
Best of all, Project Sienna is compatible with a variety of content from other platforms, including SharePoint lists, Excel and Azure tables, RSS feeds and more. That means it’s easy for you to build an app that takes the data your office is already producing and puts it to work. Now you can build an app to estimate expenses based on past costs or track personnel or manage a project, all without breaking a sweat.
Project Siena isn’t a replacement for learning to code. It’s not going to put seasoned developers out of a job any time soon. But it can free you up to experiment without wasting a lot of money on developer costs or spending a lot of time learning a new skill for one project.
Ready to get started? The app is free and there are loads of sample app designs you can use to get inspired and get a feel for what Project Sienna can do. Give it a shot and then share what you’ve built in the comments below.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589618.52/warc/CC-MAIN-20180717070721-20180717090721-00215.warc.gz
|
CC-MAIN-2018-30
| 2,640 | 8 |
https://developer.salesforce.com/docs/marketing/marketing-cloud/guide/emailtype.html
|
code
|
The EmailType object specifies type of email. Requests can’t update the EmailType. If the EmailType is included in an update request, it is ignored.
|Indicates that messages are formatted as HTML.
|Text Only (Text)
|Indicates that the data extension field holds text data, so the email message consists of text-only content.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476180.67/warc/CC-MAIN-20240303011622-20240303041622-00759.warc.gz
|
CC-MAIN-2024-10
| 326 | 4 |
http://codingzone.net/candcplusplus/program-to-calculate-gross-salary-of-an-employee-by-demonstrating-how-the-private-member-functions-can-be-accessed-from-within-its-class-in-c
|
code
|
Whats in this post?
- Background and Explanation of the code
To copy code: Click “View Source” on the right of this code snippet.
Background and Explanation of the code
The above program is used to calculate the gross salary of an employee whose basic pay is known by using the formula
Gross salary = basic pay + hra + da.
We assume here that hra = 15% of basic pay and da = 50% of basic pay.
The class employee contains two private data members and two private member functions cal_da ( ) and cal_hra ( ).These private member functions are not accessible from outside the class and acts as utility functions for computing gross salary.The public member function read ( ) inputs the name and basic pay of the employee .The public member function display_salary ( ) calculates and display the gross salary by calling private member functions of the class within itself.
Enter employee name = Rahul
Enter basic pay of employee = 3000
Gross salary of the employee = 4950
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998473.44/warc/CC-MAIN-20190617103006-20190617125006-00143.warc.gz
|
CC-MAIN-2019-26
| 971 | 11 |
http://ackgsm.xyz/archives/21188
|
code
|
Novel–The Cursed Prince–The Cursed Prince
Chapter 584 – In Awe aboard apologise
Gewen was not a coward and, typically, he could take on a few wolves by themself, however he was encompassed by no less than nine ferocious-seeking wolves. They were all displaying their pearly whites and fangs at him, as well as their eye bloodshot.
The attractive guy batted his eye in frustration when he spotted a black color shadow shifting so quickly, pursuing the noisy scream. The following thing he understood, the 2 greyish wolves to his correct have been all howling in pain… and blood stream spurted just about everywhere.
Somehow, he is at amazement.
Oh, regardless of what. He could rinse it afterwards. What’s significant now is to find this victim in a position to prepare food and feed on!
Right after every thing was set, Gewen able to go property. He received on Masai’s back and started out steering returning to the metropolis.
Gewen experienced unsheathed his sword, prepared to fight for him or her self once the wolves assaulted him. Even so, abruptly, he been told a boisterous scolding from his perfect.
Patrician and Plebeian
Even so, just as he idea his chance got altered, out of the blue Gewen listened to alarming wolves’ howlings from three directions.
Ahh… when he at last took the 1st bite, Gewen imagined the various meats dissolved in the mouth area.
Gewen couldn’t believe his personal sight. The individual that was on the eliminating rampage right before him was… a girl?
Gewen looked down at his new clothing and sighed seriously. He forgot to vary his ensemble and now his new clothing could be soiled using the doe’s blood flow.
The Cursed Prince
cohen of the rebellion wiki
Ahh… when he lastly got the initial nibble, Gewen idea the various meats dissolved in their jaws.
It’s genuine that Gewen could take in out of the dogs he hunted, even so the overnight accommodation wouldn’t cover per se. The inn he decided was especially pricey because he idea all his forfeit for the past a few weeks must be paid with respectable relax within a great cozy bed.
Only twenty-four many hours down the road, he was back at accomplishing this matter which he despised.
He cleaned his perspiration and took off his cover if the fire grew to become too very hot to get around. Impatiently, he trim some huge pieces of meats and grilled them over the blaze. He licked his lip area numerous occasions although looking forward to the meats to anticipate to try to eat.
Awww… Gewen!!! He is infatuated immediately after Kira kept his everyday life. Although Kira… becomes more satisfied that he or she can be a weakling. XD
Not less than, if he died in the hands of the opponent, they might still recognize him to be a human being and present him a proper burial. His new mother can someday pay a visit to his grave.
He was so delighted when he eventually arrived at Castilse as he didn’t should do it any more. Sigh.
Abruptly, she will no longer checked average in their vision.
He looked to see his cherish, the 3 preys, and pursed his mouth. He realized the wolves can have smelled our blood and thought to appear on this page to get the free beef.
Gewen had unsheathed his sword, willing to defend him or her self as soon as the wolves infected him. However, all of a sudden, he noticed a excessive scolding from his proper.
Soon after he accomplished five significant pieces of meats, Gewen could barely relocate. He set down on his back and shut down his eyes in bliss.
Just after every little thing was all set, Gewen able to go property. He obtained on Masai’s back and started going to this town.
Gewen strapped individuals limbs in addition to the rope he moved and interconnected the stretcher to Masai’s saddle. His quest back in town could be very much reduced because he was required to drag the dogs, but he obtained no option.
It’s genuine that Gewen could feed on coming from the pets or animals he hunted, though the places to stay wouldn’t pay money for alone. The inn he decided was especially pricey because he believed all his compromise within the past a few weeks must be paid back with good rest in a nice cozy bed.
Who would have considered he would in fact pass away getting attacked and devoured with a load of wolves. Such a unfortunate solution to expire.
Right after he accomplished five major chunks of various meats, Gewen could barely switch. He set down on his back and closed his sight in happiness.
Supernacularnovel 《The Cursed Prince》 – Chapter 584 – In Awe necessary complain propose-p3
Novel–The Cursed Prince–The Cursed Prince
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334987.39/warc/CC-MAIN-20220927033539-20220927063539-00783.warc.gz
|
CC-MAIN-2022-40
| 4,628 | 33 |
http://lists.ironpython.com/pipermail/users-ironpython.com/2011-March/014514.html
|
code
|
[IronPython] numpy / IronClad?
jmccampbell at enthought.com
Tue Mar 15 07:43:46 PDT 2011
On Tue, Mar 15, 2011 at 9:19 AM, Jones, Larry <Larry.Jones at aspentech.com>wrote:
> Great work on SciPy and NumPy!
> Any plans for IPython?
Not that I'm aware of, but a lot depends on how the IronPython community
develops and how it's used. Microsoft has released their Python Tools for
Visual Studio package that has some similar functionality which looks quite
interesting, though I haven't had a chance to really work it yet.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Users
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424610.13/warc/CC-MAIN-20170723202459-20170723222459-00266.warc.gz
|
CC-MAIN-2017-30
| 626 | 13 |
https://community.intel.com/t5/Intel-Makers/Can-t-Install-Intel-Edison-Dev-Kit-on-Linux-Mint-17-3/td-p/537610
|
code
|
I'm trying to install the dev kit using the install_gui.sh and install.sh scripts, but the Prerequisites page is saying:
Detected operating system is not supported. Supported operating systems for this release are:
I'm running Linux Mint 17.3 on a 2014 Macbook Pro 13 (11,1)
Here is what uname -a returns:
Linux MintMac 3.19.0-32-generic # 37~14.04.1-Ubuntu SMP Thu Oct 22 09:41:40 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux
What am I missing here? Is there any way around this issue?
Downloading from the link on the getting starter page:
Thanks for your help
We had no issues installing the Edison Dev Kit on Linux Mint 17 (Qiana) .Mint 17.3 (Rosa) is currently not supported. I'd suggest you to downgrade to Mint 17.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058263.20/warc/CC-MAIN-20210927030035-20210927060035-00136.warc.gz
|
CC-MAIN-2021-39
| 716 | 9 |
https://www.reddit.com/r/IAmA/comments/48omuq/i_am_michael_shanks_aka_timtimfed_im_an_indie/
|
code
|
My name is Michael Shanks, I'm an independent filmmaker whose been working on the Internet for about... 8 years now?
I've made lots of stuff that's been successful online basically ENTIRELY because reddit has liked and shared it.
You might have seen some of my old sketch work like a George Lucas special edition trailer for The Force Awakens: https://www.youtube.com/watch?v=v93Jh6JNBng
Thanks to Reddit, the trailer for my first TV show 'THE WIZARDS OF AUS' went to the front page, and now the ENTIRE show is available for FREE on YouTube: https://www.youtube.com/watch?v=yv3DedNXN4o&list=PLJSMFXYSojXotCa_NrjYM54ICmSmmCygg&index=1
PS: I have nothing to do with Stargate x I'm also joined by the Series Producer /u/chrishocking
Giovanna Taormina, Kiku Johnson, Uli Amaral
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826842.56/warc/CC-MAIN-20181215083318-20181215105318-00434.warc.gz
|
CC-MAIN-2018-51
| 773 | 6 |
http://stackoverflow.com/questions/tagged/windows-xp-sp3+ruby-on-rails
|
code
|
I've looked at the similar issues but none of them fit. I created the world-renowned sample_app from the Ruby on Rails Tutorial. I created the repoFOO.git repository and I successfully pushed my ...
I have a Ruby on Rails application running on localhost:3000. I would like to make it available world-wide, using x.x.x.x:3000 (my IP address). I'm on Windows XP SP3.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657138086.23/warc/CC-MAIN-20140914011218-00212-ip-10-234-18-248.ec2.internal.warc.gz
|
CC-MAIN-2014-41
| 365 | 2 |
http://social.msdn.microsoft.com/Forums/en-US/sqldataaccess/thread/f9539fdc-431e-4557-9117-90f27ed2f374
|
code
|
I delete a single record in a table. i want to retrieve that single record. what can i do?
There is no direct way. What you can do is restore the database to a time point before deletion if your db is full recovery mode and have necessary backups. or restore it from any recent database backups where you have a chance of loosing some data.
Microsoft is conducting an online survey to understand your opinion of the Msdn Web site. If you choose to participate, the online survey will be presented to you when you leave the Msdn Web site.
Would you like to participate?
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701670866/warc/CC-MAIN-20130516105430-00064-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 568 | 4 |
https://discourse.osmc.tv/t/install-emby-server-on-vero4k/72680/11
|
code
|
Hoping for some help, and this might be a dumb question so bear with me!
I have a vero4k and it’s a sweet device. Recently I’ve started watching some tv shows on my computer just because i can use headphones and it’s more convenient (sleeping baby/wife )
A little bit of detail - connected via USB to my vero4k is a 1tB hard drive. This is my source for media for the vero. I have no always-on server or NAS. My computer is a laptop that is off most of the time. The vero is on most of the time. Right now when watching something on my laptop, i map across the network (\osmc\USBdrive) and just double click the file i want to watch, and some windows video player app plays it for me.
I thought it might be a cool idea to see if there was a solution out there where I could have the my progress through tv shows synced between my PC and my vero4k.
So, after some googling it seems emby is a pretty good solution. From what I can see emby requires a client, and considering vero runs kodi, i figured i might as well run kodi on my laptop and then the experience should be pretty similar. So i installed emby on my laptop, and i guess it does it’s thing. I installed the emby-kodi addon on the vero, but then I had a thought: if i try and watch a show on the vero with my laptop turned off, i guess it’s not going to work, as the emby server won’t be available?
So, can i install emby server on my vero (which is usually on), and have my laptop kodi and the vero use it for their database?
or, alternatively, is there a different solution where i can sync what i have watched across both devices?
ok, excuse my ignorance here.
I have gone to the My OSMC option in the vero, I have selected the Network option, and i see a MySQL nav menu item on the left. I selected it, i ticked the “Enable MySQL VideoDB” option, and i entered this:
user : kodi
as the vero is going to be my sql server source of truth… ?? is this the right way to do it?
Very honestly, I had the same issue (not because of the kids, but because i wanted it to work )…
I scrapped the server and use Yatsee as a Kodi remote control on my android devices.
The thing is, with yatsee, you can buy (I got it for 3 euro or so), the extension allowing you to actually watch/listen to the medias on your local device (here android phone/tablet).
In case you want to use a different Kodi instance, then you’ll need a Database server somewhere (Using mariadb/mysql) on my NAS - and I have 4 devices accessing the same DB and Medias for Videos, and 3 more for Music only
And of course the kids access music etc. through Yatsee too.
I have used the above link to install everything (MySQL (MariaDB…), apache, phpMyAdmin), and it all seems to be running as expected. I went back into the My OSMC thing, clicked on Network option, selected the MySQL section, ticked the “Enable MySQL VideoDB”, and set it up as below:
I then back out and try and select the Exit menu item. It then throws up a notification “Unhandled exception caught… please see logs”. I uploaded the logs HERE, but I can’t see any exceptions mentioned. Does anyone have any idea what’s happening?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710829.5/warc/CC-MAIN-20221201153700-20221201183700-00449.warc.gz
|
CC-MAIN-2022-49
| 3,153 | 18 |
http://www.imechanica.org/blog/18297
|
code
|
I'm currently achieving a Mines ParisTech post-master degree in computational mechanics at the Center for Metal Forming (CEMEF) in France. I'm looking to a career in computational mechanics software development. To reach this goal, I'm looking out for a PhD in this field. I'm more interested in numerical methods (software engineering) than in rheologic approach of materials. Remeshing methods, crack growth modeling, crash analysis, parallel computing or multidisciplinary optimization are attractive fields I would be motivated to work on.
You'll find my CV as attached file.
Feel free to contact me for any further information you might require or for talking over a PhD study which you seem to be able to interest me.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703662159/warc/CC-MAIN-20130516112742-00073-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 723 | 3 |
http://mayug.pro-penosteklo.ru/international-dating-2016-63.html
|
code
|
Free live xxx cam to cam - International dating 2016
The total prize of The International 2013 grew to .8 million Since the tournaments inception, 52 different teams have appeared in the group stages of The International.
It drew attention due to its staggering $1.6 million prize pool (with $1 million for the champion). In 2012 The International moved to Seattle, Washington. Only 14 teams were invited; two additional slots were awarded to the winners of regional qualifiers.
Since 2013, the Dota 2 community has been able to contribute to the prize pool.
The charts below provides up-to-date information on officially announced upcoming ACT test dates for the 2016-2017 school year and the first semester of the 2017-2018 school year, both in the U. They also give projected ACT test dates for the second semester of the 2017-2018 school year and for 2018-2019.
*These are projected registration and score release dates based on past history.
At First Blood in each individual game, 500 exclusive Attendee Treasures will drop, each containing visually-unique versions of this year’s Secret Shop Immortals.
To be eligible, you must have a badge linked to a Steam account and be in the arena when First Blood occurs. We recommend that you prepare your Ticketmaster account and log in before tickets go on sale to help ensure a smooth purchasing experience.
In some countries, it is also called “summer time”.
When DST is not observed, it is called standard time, normal time or winter time.
The Midweek ticket—available for —will grant attendance to the first four days of the event August 8th – 11th, and includes access to the opening ceremony and the All-Star match.Tags: Adult Dating, affair dating, sex dating
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243990584.33/warc/CC-MAIN-20210513080742-20210513110742-00495.warc.gz
|
CC-MAIN-2021-21
| 1,728 | 11 |
https://forum.bestpractical.com/t/rt-compatibility-with-mod-perl-1-9-14/12325
|
code
|
RT has stopped running and getting the following type of message in
“failed to get bucket brigade: 70014:End of file found, referer:”.
Apache stops running and I have to remove the httpd.pid file and restart
the httpd service and all is OK.
I have seen a post that recommended upgrading Mod_perl to 1.9_13 (this
is at 14 now) Will RT now run OK with this version and has anyone come
across this problem before. Could the mysql database cause this to
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500904.44/warc/CC-MAIN-20230208191211-20230208221211-00202.warc.gz
|
CC-MAIN-2023-06
| 453 | 7 |
https://www.monki.com/en_eur/accessories/bags-wallets-and-belts/product.travel-pouch-pistachio.0870976005.html
|
code
|
We just sent you a link to confirm your subscription. Check your email for more info.
Thanks for signing up to the Monki newsletter. Seriously good news are on their way.
Low in stock!
Go hands-free with this nifty travel pouch in faux snake skin, featuring a back card holder.
Read more here.
Shell: Polyester 100%, Coating: Polyurethane 100%, Lining: Polyester 100%
Product number: 0870976005
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304572.73/warc/CC-MAIN-20220124155118-20220124185118-00450.warc.gz
|
CC-MAIN-2022-05
| 394 | 7 |
https://www.lexaloffle.com/bbs/?pid=113393
|
code
|
NOTE: this is NOT finished, I am just posting an alpha
if you want to see a cart added, post it here
press down arrow to enable key controls, up arrow to disable them
celeste (+old site +farland )
alex kidd in pico world
METROcubeVANIA (+the bee movie +metrocubevania png )
the dead should die
pico night punkin' (+jo560hs mod collection )
pico zombie garden
he get up
added the all games category
Clicking the pico-8 logo does nothing...
Also, Comments about the launcher in general or really anything other than requests are fine.
SuperGamer, why don't you do this ?
EDIT your post (the 1st one at the top). Copy all of it CTRL+A CTRL+C to NOTEPAD. Then DELETE this post, all of it, create a new one. PASTE the contents of Notepad. CTRL+V in the empty page.
Save it. Then Immediately LOCK THAT THREAD before anyone can comment in it. You have that ability with the down facing triangle at the top.
Then you can control that single post on your own with zero comments - would be easier than everyone deleting their posts since they don't seem to understand. Every time you update the main cart it will be put at the top so no worries - and no comments.
[Please log in to post a comment]
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511717.69/warc/CC-MAIN-20231005012006-20231005042006-00128.warc.gz
|
CC-MAIN-2023-40
| 1,187 | 18 |
https://blog.adafruit.com/2019/10/04/europython-2019-deep-learning-with-tensorflow-2-0-machinelearning-artificialintelligence-deeplearning-tensorflow-tf2-0-keras-europython-bradmiro-tensorflow/
|
code
|
EuroPython 2019: Deep Learning with TensorFlow 2.0 #MachineLearning #ArtificialIntelligence #DeepLearning #Tensorflow #TF2.0 #Keras @europython @bradmiro @tensorflow
Videos from EuroPython 2019 are up on YouTube! Brad Miro from Google gave a talk about “Deep Learning with TensorFlow 2.0“. The talk walks through TensorFlow use cases at Google, changes in TensorFlow 2.0, examples with the new API and tips for getting started. Check out the details below:
TensorFlow at Google – TensorFlow was released in 2015 as an open-source project and is used worldwide with 2,000+ contributors. Google is using TF for optimizing data centers, for AR directions with Google Maps and to identify planets in distant solar systems. If you’d like to learn more about TensorFlow projects at Google take a look at Jeff Dean’s I/O talk or Adafruit’s post on diabetic retinopathy.
2.0 features – This release addresses some of the shortcomings of TensorFlow that did not feel pythonic (Miro specifically points out ‘session.run’). Session.run was replaced with eager execution and Keras was adopted as the high-level API. Overall, the API was simplified moving towards ‘one way to do everything’. TensorFlow 2.0 aims to be easy, powerful, scalable and deployable anywhere — Including on edge devices and in the browser with TensorFlow Lite and TensorFlow.js using saved models.
TensorFlow 2.0 focuses on simplicity and ease of use, featuring updates like:
Easy model building with Keras and eager execution.
Robust model deployment in production on any platform.
Powerful experimentation for research.
API simplification by reducing duplication and removing deprecated endpoints.
Miro also hits on a number of TensorFlow resources such as TensorFlow Hub which is a place to “store and download pre-built models”, a bit like GitHub for models. TensorFlow also has datasets for testing out your TensorFlow models.
Stop breadboarding and soldering – start making immediately! Adafruit’s Circuit Playground is jam-packed with LEDs, sensors, buttons, alligator clip pads and more. Build projects with Circuit Playground in a few minutes with the drag-and-drop MakeCode programming site, learn computer science using the CS Discoveries class on code.org, jump into CircuitPython to learn Python and hardware together, TinyGO, or even use the Arduino IDE. Circuit Playground Express is the newest and best Circuit Playground board, with support for CircuitPython, MakeCode, and Arduino. It has a powerful processor, 10 NeoPixels, mini speaker, InfraRed receive and transmit, two buttons, a switch, 14 alligator clip pads, and lots of sensors: capacitive touch, IR proximity, temperature, light, motion and sound. A whole wide world of electronics and coding is waiting for you, and it fits in the palm of your hand.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710765.76/warc/CC-MAIN-20221130160457-20221130190457-00529.warc.gz
|
CC-MAIN-2022-49
| 2,822 | 11 |
https://lang-ship.com/reference/unofficial/M5StickC/Class/ESP32/BLEAdvertisedDeviceCallbacks/
|
code
|
A callback handler for callbacks associated device scanning.
Called when a new scan result is detected.
As we are scanning, we will find new devices. When found, this call back is invoked with a reference to the device that was found. During any individual scan, a device will only be detected one time.
virtual void BLEAdvertisedDeviceCallbacks::onResult(BLEAdvertisedDevice advertisedDevice)=0
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764495001.99/warc/CC-MAIN-20230127164242-20230127194242-00396.warc.gz
|
CC-MAIN-2023-06
| 395 | 4 |
https://theunlockr.com/how-to-root-the-motorola-cliq-xt-quench/
|
code
|
I. Install the Motorola Drivers
1. Download the drivers for your computer and unzip them. Then double click the program inside to install the drivers.
2. On your phone, go to Menu > Settings > Applications > Development > and make sure USB Debugging is checked ON.
II. Install the Android SDK
1. Follow our How To Setup ADB procedure just until you can see the device’s serial number at the end of step 6. Then come back to this procedure.
III. Root the Phone
1. Download the Rooting Files and extract them to the C: drive on your computer (like you did the AndroidSDK).
2. Plug in your phone via USB cable and select Charge Only on the phone.
3. On your computer, open a command prompt by clicking on the Start menu then typing in cmd and hitting enter in the search box.
4. In the command prompt, type the following, with hitting enter at the end of each line:
adb push c:\Superuser.apk /sdcard/Superuser.apk
adb push c:\su /sdcard/su
adb push c:\rageagainstthecage-arm5.bin /data/local/tmp/rageagainstthecage-arm5.bin
adb push c:\install-root.sh /data/local/tmp/install-root.sh
chmod 0755 rageagainstthecage-arm5.bin
chmod 0755 install-root.sh
5. Once you have done that, leave the phone plugged in and go to the Market and download the Free version of ConnectBot and install it.
6. Open the ConnectBot, select local in the dropdown menu, then type local into the field and hit enter. Then type the following in, on the phone, with hitting enter at the end of each line (leave the phone plugged in to the computer while you do this).
7. If it worked, you should see the following on the screen.
[+] Forked xxxx childs. (xxxx will be an actual 4 digit number)
If you do not, then close the ConnectBot and reopen it and try again.
8. If it worked, close the terminal by either typing exit and hitting enter or by hitting menu and clicking close.
9. Once it is closed, reopen ConnectBot.
10. You should now see a # symbol, if so continue. If not then start over from step 4 or go here for a tip from another reader.
11. Now, with the # symbol in ConnectBot on your phone, type the following with hitting enter at the end of the line:
You should see nothing pop up after you hit enter, that means it worked, you now should have root access and be able to open your App Drawer on the phone and see Superuser Permissions inside.
12. To load a custom ROM and other fun stuff, head from here to our How To Load a Custom ROM procedure.
Thanks Sebastian Krahmer!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358966.62/warc/CC-MAIN-20211130080511-20211130110511-00139.warc.gz
|
CC-MAIN-2021-49
| 2,457 | 28 |
https://uniquegadgets.com.pk/Raspbery-Pi-2-Model-B
|
code
|
The Raspberry Pi 2 Model B is the second generation Raspberry Pi. It replaced the original Raspberry Pi 1 Model B+ in February 2015. Compared to the Raspberry Pi 1 it has:
Like the (Pi 1) Model B+, it also has:
Because it has an ARMv7 processor, it can run the full range of ARM GNU/Linux distributions, including Snappy Ubuntu Core, as well as Microsoft Windows 10 (see the blog for more information).
The Raspberry Pi 2 has an identical form factor to the previous (Pi 1) Model B+ and has complete compatibility with Raspberry Pi 1.
We recommend the Raspberry Pi 2 Model B for use in schools: it offers more flexibility for learners than the leaner (Pi 1) Model A+, which is more useful for embedded projects and projects which require very low power.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243990929.24/warc/CC-MAIN-20210512131604-20210512161604-00423.warc.gz
|
CC-MAIN-2021-21
| 753 | 5 |
http://www.emacswiki.org/emacs/Bongo
|
code
|
Bongo is a beautiful, flexible and usable buffer-oriented media player for Emacs, developed in parallel to EMMS 2.0. It runs on GNU Emacs 21 and above.
<[email protected]>(see http://lists.nongnu.org/mailman/listinfo/bongo-devel) — in Gmane as
Notable features of Bongo include
Bongo currently comes with backends for VLC, mpg321, ogg123, speexdec, TiMidity and MikMod. All backends support pausing and resuming, but only VLC and mpg321 support interactive seeking. Defining your own non-interactive backends is very simple. For example, this is how a couple of the built-in backends are defined:
(define-bongo-backend speexdec :matcher '(local-file "spx"))
(define-bongo-backend timidity :pretty-name "TiMidity" :extra-program-arguments '("--quiet") :matcher '(local-file "mid" "midi" "mod" "rcp" "r36" "g18" "g36"))
Of course, it is also possible to add your own complex backends with support for interactive operations like seeking. For example, see BongoMPlayer?.
There is a collection of nifty hacks at BongoHacks.
As of November 11, 2006, the Last.fm functionality is enabled by default if the
‘lastfmsubmit’ executable can be found (if it’s not in your
‘exec-path’, please customize
‘lastfmsubmit-program-name’). To toggle Bongo Last.fm mode for individual playlist buffers, use
‘bongo-lastfm-mode’. To toggle it for all playlist buffers, use or customize
‘bongo-global-lastfm-mode’. (The file bongo-lastfm.el has been merged into bongo.el, and if you use Custom it is no longer necessary to put anything in your
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163038307/warc/CC-MAIN-20131204131718-00087-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 1,543 | 14 |
https://books.google.fi/books?id=isboswEACAAJ&hl=fi&source=gbs_book_other_versions_r&cad=4
|
code
|
World Seas: An Environmental Evaluation: Volume III: Ecological Issues and Environmental Impacts
World Seas: An Environmental Evaluation, Second Edition, Volume Three: Ecological Issues and Environmental Impacts covers global issues relating to our seas, including a biological description of the coast and continental shelf waters, the development and use of the coast, landfills and their effects, pollutant discharges over time, the effects of over-fishing, and the management methods and techniques used to ensure continued ecosystem functioning. The relative importance of water-borne and airborne routes differ in different parts of the world is explored, along with extensive coverage of major habitats and species groups, governmental, education and legal issues, fisheries effects, remote sensing, climate change and management.
This book is an invaluable, worldwide reference source for students and researchers concerned with marine environmental science, fisheries, oceanography and engineering and coastal zone development.
Mitä ihmiset sanovat - Kirjoita arvostelu
Muita painoksia - Näytä kaikki
World Seas: An Environmental Evaluation: Volume II: The Indian Ocean to the ...
Rajoitettu esikatselu - 2018
World Seas: an Environmental Evaluation: Volume II: the Indian Ocean to the ...
Esikatselu ei käytettävissä - 2018
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578582584.59/warc/CC-MAIN-20190422195208-20190422221208-00200.warc.gz
|
CC-MAIN-2019-18
| 1,339 | 9 |
http://www.smashwords.com/books/tags/detective/_/10
|
code
|
A Death In Beverly Hills
When the wife and three year old step-daughter of fading movie star, Tom Travis, disappeared, a massive, fruitless, search was launched. Three months later, the body of Travis's wife was discovered in a shallow grave only a few miles from where Tom had been riding his dune buggy on the day she vanished. Travis is on trial for capital murder. But did he do it?
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657102753.15/warc/CC-MAIN-20140914011142-00271-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
CC-MAIN-2014-41
| 386 | 2 |
https://news.ycombinator.com/item?id=5470082
|
code
|
It can also be extremely unhelpful, for example to this chap today on reddit:
Who didn't seem to know about return transactions and seems to have lost 90 BTC on that. (Because he/she used a "secure" live environment that would work with a temporary wallet and just one extra address with his/her money.)
Brain wallets are always a terrible idea, either the pass phrase is too simple and easily cracked, or too complicated and easily forgotten.
Paper wallets are only useful for savings, if you want to spend the coins you should move the full amount.
As said elsewhere, if you use the stock client as designed, and don't use brain or paper wallets, then you should never lose coins.
That 7208 BTC would be worth about $680,000 today.
There will be a lot fewer than 21 million BTC in actual usable existence after all these errors are tallied!
As long as you use the software in a relatively standard way and don't ever delete your wallet files, you'll be fine.
Some bitcoin clients fix this by using a deterministic generation of new addresses for the wallet.
That kind of screenshot can easily be produced by changing a little HTML on a 0 balance account.
edit: obviously forgot my compliment, very clever idea and cool implementation this digital art right here ladies and gentleman
also this gave me an idea: how about a Bitcoin ECG?
Looking at the source, you are, however, correct, that the pitches are selected at random.
You could write a script to play these randomly!
var maxBitcoins=1000;var minVolume=0.3;var maxVolume=0.5;var volume=bitcoins/(maxBitcoins/(maxVolume-minVolume))+minVolume;if(volume>maxVolume)volume=maxVolume;Sound.playRandomAtVolume(volume100);
A few weeks ago, prices were around 26 USD/1 btc... So are we going to see a swing down that low again? Or is this SilkRoad talking?
You can now use bitcoin to pay for services and even fines at some municipalities, cities and what not http://www2.egovlink.com/press-release-bitcoin.cfm
You can buy things on amazon via bitspend as well as other services.
And if you still don't trust bitcoin value to not go down, you can use services like bitpay that will convert for you instantly in whichever currency you want.
There's even some VISA prepaid you can top up with bitcoin for the places that don't accept them.
And you can now use bitcoin to pay for expenses and contractors http://techcrunch.com/2013/03/27/expensify-now-offers-suppor...
And while all this happens, the USD keeps getting printed at a far superior rate.
It gets highlighted and is really easy to spot
What feed/API are you pulling from to track these changes. I've been looking for a solid way to chart bitcoin transactions and haven't been able to find one.
I know you were really trying to be snarky about Bitcoin, but in case you hadn't heard, you can actually do things with them. Also notable are https://wrapbootstrap.com/ and Reddit
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528290.72/warc/CC-MAIN-20190722221756-20190723003756-00506.warc.gz
|
CC-MAIN-2019-30
| 2,883 | 25 |
http://osungmusic.xyz/archives/1962
|
code
|
Boskerfiction Nanomancer Reborn – I’ve Become A Snow Girl? – Chapter 887 Birthday hysterical feeble recommendation-p3
Republican Party Reptile
Novel–Nanomancer Reborn – I’ve Become A Snow Girl?–Nanomancer Reborn – I’ve Become A Snow Girl?
Chapter 887 Birthday functional cloth
In a natural way, she dismissed that Yin was already ingesting from the part. Thankfully, Mio understood about Yin’s eating routine so she made more than enough meals for every individual.
“Mn I will. Just after dealing with for so long, I would like to have a break. So exhausting to punch skulls each day.” Keomi sighed.
“Sis!” Keomi shouted out as she burst open into your demand place.
“Delighted special birthday s.h.i.+ro.” Lyrica referred to as out as s.h.i.+ro nodded her top of your head.
“Sis!” Keomi shouted out as she burst within the instruction home.
“It’s an unexpected.” s.h.i.+ro chuckled considering the fact that she want to give Keiko insights on getting to level 6. Which include Keiko, they might potentially have 4 tier 6 powerhouses. She wasn’t sure if Lisandra may also grow to be tier 6 so she didn’t include her but when she could, they’ll have a grand whole of 6 powerhouses such as s.h.i.+ro.
Up-to-date from lightnovelpub[.]com
“Hais, the two of you are tinkering with blaze. But I’m glad that issues figured out considering that you’re now degree 500 and Keomi is degree 330.” s.h.i.+ro smiled since before she discovered Keomi she was still on the mid stages of tier 4.
“Indeed. Frankly, I completely neglected about my bday if they are not with this.” s.h.i.+ro shrugged while getting a drink of the liquid.
“True. I recently arrived at amount 500 way too. I do believe I’ll be wanting to get to tier 6 after I organize out some more factors. Want to sit down with all others?” s.h.i.+ro required because they already sat down and happy to try to eat.
“We may be very active then using the new time and everything else.” Lyrica shrugged.
Mailing a note into the event, s.h.i.+ro sought everyone to fulfill up in one of the exercising rooms.
“Ha?” Reviewing almost everything having a puzzled phrase, s.h.i.+ro didn’t know how to take action.
“Absolutely sure, what do you want me for?”
“Appears like you two acquired quite the experience. I’ll get some of the robots to arrange your spaces. Also, Keiko, I really want you in order to meet me again later currently.” s.h.i.+ro said as Keiko nodded her go.
“Joyful birthday celebration s.h.i.+ro.” Lyrica called out as s.h.i.+ro nodded her top of your head.
“Mn, I suppose I just now never centered on my birthday party. I could have probably removed about my time not understanding that nowadays was my birthday party.” s.h.i.+ro shrugged.
“What bday granny. I mean birthday party lady. Yeah ahaha, let’s get the juice.” Aarim quickly retreated.
Visit lightnovelpub[.]com for the greatest innovative looking at experience
“Positive, what do you require me for?”
“Keomi?” s.h.i.+ro heightened her eyebrow as Keiko was right after behind her.
“Certainly, what do you require me for?”
“Really. Seriously, I completely did not remember about my birthday bash if not because of this.” s.h.i.+ro shrugged while using a drink in the juices.
“Nonsense. I’m absolutely sure we will sacrifice a day for your personal birthday bash.” s.h.i.+ro chuckled.
“Pft! You actually escaped a queen’s quest?” s.h.i.+ro questioned with shock as Keiko grinned and offered her a thumbs up.
little big planet
“Happy special birthday s.h.i.+ro.” Lyrica termed out as s.h.i.+ro nodded her head.
Checking out the roof of her bedroom, s.h.i.+ro shut her view and made certain the fact that recollection of her very first birthday bash as s.h.i.+ro was secure.
Looking at each of the celebration decorations plus the foods that lay out, s.h.i.+ro smiled gently.
“Mn, Keiko saved generating clones and shifting areas with them so the princess was heading to and from trying to get us. Since our focus was not on dealing with, it had been straightforward to focus on tricking the princess.” Keomi laughed.
Pay a visit to lightnovelpub[.]com for the very best novel browsing working experience
A Discourse of Life and Death, by Mornay; and Antonius by Garnier
Glancing from the windows, she could see countless homes remaining designed since Nan Tian was making an effort on shifting all people on the town. Up to now, the sect obtained already completed going and they also were actually working on Miriel. After that’s performed, they were heading to venture to Asakura.
“Oh right… I forgot it’s my bday currently.” s.h.i.+ro sighed as she had lots of stuff in her thoughts these days.
Delivering a message on the party, s.h.i.+ro wished anyone to meet up at one of the education bedrooms.
“Pft! You really escaped a queen’s quest?” s.h.i.+ro questioned with astonish as Keiko grinned and gifted her a thumbs up.
Needless to say it can do. You’re surrounded by individuals you enjoy. It’s a shame that Madison couldn’t enroll in us although. She’s still in the crystal. Nimue sighed.
“Who the h.e.l.l will be the birthday bash granny oh!?!”
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00522.warc.gz
|
CC-MAIN-2023-14
| 5,236 | 42 |
https://medium.com/@markelog/jscs-end-of-the-line-bc9bf0b3fdb2
|
code
|
JSCS — end of the line
JSCS 3.0 is finally out, and we are both very excited and a little sad. Excited because this new version is something that we’ve worked very hard on, and sad because this will be the last version of JSCS.
With your help, JSCS has become a success. We have over 5,000 stars on GitHub and have over 27,000 npm downloads each day. Even so, we’ve made the difficult decision to deprecate JSCS.
The Story of JSCS 3.0
This decision didn’t come easily to us, we worked very hard on JSCS 3.0, as you might notice by the long list of commits. What’s not clear from the commits is just how much additional work we (biggest thanks goes to founder of JSCS — @mdevils) put into a new project that powers JSCS: CST.
Having a working version of a CST (Concrete Syntax Tree) was incredibly important to us. The CST makes it easy to provide autofixing for the more complicated problems, such as unused variables, dead code elimination, and whatever the linter of your wildest dreams should fix. (We wrote more about CSTs in our 2.2.0 release.)
We also wrote our own CST scope analyzer, rewrote every single rule in JSCS, fixed numerous bugs, and worked hard on performance. So why put in all this work only to deprecate JSCS?
Projects like JSCS require a lot of effort — reviewing pull requests, triaging issues, writing documentation, and maintaining a website. We also spent a lot of time (sometimes overnight) providing support via Gitter. And of course, there’s also the work of continuing to write code and tests for that code.
Maintaining JSCS takes a lot of time, and the entire team works on it in their spare time (nights and weekends) while working full-time jobs. As we’ve been seeing fewer users, contributors, and feedback, it’s gotten harder for us to continue the work.
We came to the realization that ESLint and JSCS are really solving the same set of problems in very similar ways. The community seems to want to use a single linter, and we want to help that become a reality.
We thought, why continue to “compete” with ESLint? Why we can’t we join efforts in providing the most efficient, robust, and feature-rich tool? Why not combine teams, work together, and spread out the hard work across a larger number of people?
In the end of the beginning
As mentioned earlier, we will continue to support JSCS for the next three months, fixing significant bugs. The JSCS repository will be left in place, so you are free to fork it and otherwise use the code.
Moving from JSCS 2.x to 3.0 should be as easy as updating your version in `package.json`. Eventually, you’ll want to use ESLint instead. We are working with the ESLint team to create some tools and processes to make the transition as easy as possible. Our hope is that it will be a smooth upgrade and you wouldn’t even notice :).
Farewell and Thanks
We are very grateful to all the awesome contributors of this release (and previous ones). It’s because of you that JSCS reached the success that it has, and we’d like to invite you to join us in contributing to ESLint going forward.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103661137.41/warc/CC-MAIN-20220630031950-20220630061950-00518.warc.gz
|
CC-MAIN-2022-27
| 3,094 | 16 |
https://www.lgwebos.com/profile/38516-yetiboy/
|
code
|
a lot of people have the same issue:
this guy pasted a 'fix', but i didn't try it myself:
1 point·22 hours ago
I think I've found a quick fix, til LG releases a new update;
Enter the Network menu (Settings - Network) and make sure you're connected and just wait a sec.
then, close all open TV apps from the "recent" tab, and lunch the one you want again.
this works for me, hope it'll help anyone here.
fwiw in my situation whether the video was paused or not didn't matter. however i do agree it appears to be some sort of issue with the tv going idle on the network, and I can see the rx speed in the router drop to 6 (from 766). it's possible that when i have been experiencing it i had already prebuffered the entire video and it went into some sort of network sleep mode and couldn't come out - but that's wild speculation.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703524743.61/warc/CC-MAIN-20210121101406-20210121131406-00008.warc.gz
|
CC-MAIN-2021-04
| 829 | 8 |
http://travel.stackexchange.com/questions/34028/car-insurance-for-a-canadian-car-in-mexico-crossing-the-us-mexico-border
|
code
|
I have a similar question to one asked in June 2014. We have a Canadian car with valid Canadian registration but no insurance. We are planning a ten-day trip to Texas. Is there any temporary US insurance available to us?
migrated from expatriates.stackexchange.com Jul 18 '14 at 6:23
This question came from our site for people living abroad on a long-term basis.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115862015.5/warc/CC-MAIN-20150124161102-00152-ip-10-180-212-252.ec2.internal.warc.gz
|
CC-MAIN-2015-06
| 363 | 3 |
https://bsv.guru/metahandle-review/
|
code
|
I came across Metahandle.net today and i think this is something that is going to be needed as the content that is stored on-chain grows.
The below is taken from the Metahandle website.
“A major problem of onchain content is that it is referenced by a transaction id, which is impossible to memorize. The result is that you need to keep long lists of bookmarks with onchain links or transaction ids.
MetaHandles solves this problem by introducing human readable references for txids, which are stored on-chain. This allows you to bookmark or tag any on-chain file with an immutable handle which is always accessible.
MetaHandles can be used in a lot of ways, both privately and publicly. They are basically just any reference to any txid.
You don’t want to forget an on-chain file you found? Just store it as a handle.
Click on the Store button, set a handle, copy the transaction id, write a title and a description. If you want to use your handle only as a private bookmark, activate encryption of the txid. If you want your handle to be publicly shown on the metahandle site, activate “publicize handle”. In this case your handle will be stored in our database.
When you have stored your handle you can access your files by crawling the handle.
The current implementation of MetaHandles is only made to allow to remember and tag files.”
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00732.warc.gz
|
CC-MAIN-2022-33
| 1,349 | 9 |
http://blog.airesoft.co.uk/2014/08/the-road-to-windows-xp-windows-whistler-build-2211/comment-page-1/
|
code
|
Build Tag: main.000309-1512
Download from Archive.org
Watch on Youtube:
So 38 days and nine builds after the humble beginnings of 2202 and we find ourselves with a build that categorically identifies itself as part of the next versions’ lineage. Sporting a desktop branding that’s both slightly awkward and long winded, ‘Whistler Windows 2001 Professional’ finally has some new features worthy of being mentioned.
Before you even reach the desktop however, you get to recognize that this is no longer your daddy’s Windows 2000. The first grafts of code and components from the initial successor to 2000, an aborted project called Windows NepTune, are front and centre on the brand new logon screen.
The new logon screen takes a registry tweak to enable but functions just perfectly, with one caveat. One of its components, shgina.dll, contains some curious code in its DllMain, code which deletes the registry entry for the Users control panel. Despite the revisions the logon screen went through all the way upto final XP, from this HTML version to normal CreateWindow to DirectUI, this piece of code remained.
As another visual change, I mentioned in the post for the last build that the germination of the new nice and shiny common controls, those you need a manifest to get in final XP. And it does, though not completely. The initial incarnation of UxCtrl.dll which Raymond Chen recounts was the first stab at updating the controls, didn’t look nice and new at all. This wasn’t completely fault of uxctrl.dll though, to render some of the controls it looked for a shared memory mapping and window called ThemeMgrSharedMemory and ThemeMgrWindow respectively. Unfortunately neither string exists anywhere else in this build, so the updated rendering never happens. There’s no doubt Theme Manager was an early name for uxtheme.dll, especially since in the next build uxtheme makes its debut and presents such named shared memory.
Even at this early stage, you could tell PC reliability and error management were a big part of Microsoft’s plans. This build implemented a big component of that strategy, Headless operation or as it became known EMS (Emergency Management Services). This feature allows remote administration of a Windows computer over an out-of-band (i.e. non-ethernet) network. It’s named headless as it doesn’t require the computer to have a monitor nor any input devices attached. Given that, it’s probably no surprise that it’s a feature mainly aimed for servers. Indeed, the component differs between servers and workstations. Servers have the fully featured SAC (Special Administrative Console) command prompt which can start processes, monitor memory and lots of other stuff. The build of 2211 available is a workstation build so only has the poor-relative !SAC prompt. The kernel also got a new API to be able to access this stream programmatically, though I feel sorry for anyone who actually wrote something against it. The API was remodeled into a single multi-purpose function by the next build.
To go along with the PC reliability stuff, ntbackup was upgraded with a fourth backup option that allowed creation of an ASR (Automated System Recovery) floppy disk. This option performs a regular backup of ‘\Windows’ and ‘\Program Files’ on the boot volume, then writes a bunch of setup-like sif/ini files to the floppy. Should your computer then get borked, you run setup from the CD/RIS, press F5 at the ASR prompt, insert the floppy and watch the magic happen. Setup restores your boot partition, runs enough of normal setup to be able to restore the full backup, and restores it.
The final thing worth mentioning is something that you would never see if you installed this and had a play around. You see, this build has all the resources to enable the seemingly hated “Show in Groups” Explorer feature. So much so, that there’s a hidden bit of unreferenced UI which would let you select the attribute to group by, albeit more clunkily that it finally turned out. The problem is not that it requires a registry tweak to enable or anything, it’s that although Explorer/shell32 (I forget which) has the code for the two supported ICategorizer’s, no code has been added to create them, so they sit unused.
Other miscellaneous things introduced in this build include mouse button ClickLock, though there is no UI for it. WebView Barricades (The ‘Are you sure you want to look at the files in C:\|System32|Program Files? pages) are now per user & per folder instead of per explorer session. Disk Management can now make GPT partitions, and MMC despite being version 1.2, got a Version 2 WordArt banner added to its resources.
That’s it for notable things in this build, the next contains a lot of hidden UI, the pretty useless rudiments of Fast User Switching and CD Burning, and as mentioned the introduction of uxtheme and a Visual Theme that the known internet had no knowledge of. Exciting!
: Set the LogonType value under HKLM\Software\Microsoft\Windows NT\Winlogon to 1
: Change the UserPreferencesMask value at HKCU\Control Panel\Desktop from ‘xx 3E 00 80’ to ‘xx BE 00 80’ then logoff and log on again. SystemParametersInfo doesn’t recognize SPI_SETMOUSECLICKLOCK yet.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125654.80/warc/CC-MAIN-20170423031205-00314-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 5,257 | 14 |
https://www.codaworx.com/project/githubxouchhh-datacosmos-installation-publicart-github
|
code
|
GitHubXOuchhh_DataCosmos installation is an interactive immersive experience of the Github user and their relations. It used approximately 7 million users real-time data and 30 million connection. We collected a huge data corpus that represents a GitHub user and users interconnected amongst each other, based on who they follow and by whom they are followed.
In order to visualize this information in an interactive way, we distributed all the users in space. Then, we moved each and every user closer to those they follow and those follow them. By using an iterative approach, the entirety of the user base is analyzed over and over in a random order for their repositioning. As a result of this approach, the islands of well-connected users emerged. Starting out complete randomness, from clusters of users, connected to each other by information; just like galaxies.
For the interactive part of this installation; we invited our guests to search for their - or for their favourite programmer’s - GitHub user handle.
Every user search transported our gaze to that user’s position in space, as well as pulling near everyone who follows them for a glimpse of their relation to the rest of the Github Universe.
GitHub brings together the world's largest community of developers to discover, share, and build better software.
GitHub DataCosmos Installation
Share Via Email
CODA: Collaboration of Design + Art
The global online community that celebrates design projects featuring commissioned artworks.
[ manifesto ]
Art matters. Attention to the details of our environment leads to love of place, which brings us to take responsibility for the spaces where we live and work. And by extension, the people with whom we live and work. And by extension, to our local communities, our cities, our nations, and our world.
We champion the role of artists in our society. We need artists to provide us with inspiration, creativity, and imagination, and to help us envision a better world.
Architects and designers know that remarkable design can change everything. They connect the dots across disciplines, collaborating with artists to make the world a more beautiful place. They are the ultimate patrons of the arts.
In the process, design professionals promote imagination and creativity, and through their commissions, make original art integral to and accessible in people's lives.
Art in our public and private spaces helps us fight ordinary buildings, ordinary streets, ordinary cities. We celebrate the extraordinary.
The architecture of our buildings and the design of our interiors affect our happiness and well-being. Each of us deserves a daily dose of inspiration.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146123.78/warc/CC-MAIN-20200225141345-20200225171345-00241.warc.gz
|
CC-MAIN-2020-10
| 2,672 | 16 |
https://forum.xojo.com/t/prob-with-desktopdesktopcanvas-on-container/67010
|
code
|
I updated my app from 2021r2 to 2021r3 and find that DoublePressed on all desktopcanvas that are on a desktopcontainer won’t fire, works ok if desktopcanvas is on a window and not on a container. I tested it in a window with only a canvas and a container with a canvas on on it to be sure something on my app didn’t cause the problem.
Confirmed. MouseDown and MouseUp continue to work, so you could roll your own in the meantime. I have opened the following Feedback case:
I did switch the code to mousedown but I preferred doublepress.
I hope we get a R3.1 before Christmas.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103033816.0/warc/CC-MAIN-20220624213908-20220625003908-00314.warc.gz
|
CC-MAIN-2022-27
| 579 | 4 |
http://ieeexplore.ieee.org/xpl/abstractAuthors.jsp?reload=true&arnumber=4636719&sortType%3Dasc_p_Sequence%26filter%3DAND(p_IS_Number%3A4648460)
|
code
|
We consider the problem of recognizing 3-D objects from 2-D images using geometric models and assuming different viewing angles and positions. Our goal is to recognize and localize instances of specific objects (i.e., model-based) in a scene. This is in contrast to category-based object recognition methods where the goal is to search for instances of objects that belong to a certain visual category (e.g., faces or cars). The key contribution of our work is improving 3-D object recognition by integrating algebraic functions of views (AFoVs), a powerful framework for predicting the geometric appearance of an object due to viewpoint changes, with indexing and learning. During training, we compute the space of views that groups of object features can produce under the assumption of 3-D linear transformations, by combining a small number of reference views that contain the object features using AFoVs. Unrealistic views (e.g., due to the assumption of 3-D linear transformations) are eliminated by imposing a pair of rigidity constraints based on knowledge of the transformation between the reference views of the object. To represent the space of views that an object can produce compactly while allowing efficient hypothesis generation during recognition, we propose combining indexing with learning in two stages. In the first stage, we sample the space of views of an object sparsely and represent information about the samples using indexing. In the second stage, we build probabilistic models of shape appearance by sampling the space of views of the object densely and learning the manifold formed by the samples. Learning employs the expectation-maximization (EM) algorithm and takes place in a ldquouniversal,rdquo lower-dimensional, space computed through random projection (RP). During recognition, we extract groups of point features from the scene and we use indexing to retrieve the most feasible model groups that might have produced them (i.e., hypothesis generation). - - The likelihood of each hypothesis is then computed using the probabilistic models of shape appearance. Only hypotheses ranked high enough are considered for further verification with the most likely hypotheses verified first. The proposed approach has been evaluated using both artificial and real data, illustrating promising performance. We also present preliminary results illustrating extentions of the AFoVs framework to predict the intensity appearance of an object. In this context, we have built a hybrid recognition framework that exploits geometric knowledge to hypothesize the location of an object in the scene and both geometrical and intensity information to verify the hypotheses.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257826736.89/warc/CC-MAIN-20160723071026-00038-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 2,692 | 1 |
https://elixirforum.com/t/is-there-a-way-to-pass-a-list-of-structs-back-to-the-controller-from-the-view/33332
|
code
|
After a user filters an index page I pass a list of structs to the view to be displayed. Is it possible to pass that list back to the controller for sorting?
Why do the sorting in the controller? That sounds like a view concern to me.
Sorting logic defines the sort which requires business logic, I believe, this would be best handled by the controller or a service layer.
You can not pass the list back. But what is stopping you from passing it in already sorted?
Trying to allow the user to sort asc/desc depending on which table header is clicked on. There is also a filter system involved. As far as I know the only way to accomplish this after a sort is selected to take the currently applied filters, pass that through the query, and then apply the newly selected sort. I was just curious if there was a way to bypass running another query and just filter the current list. Perhaps through serialization or something similar.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500758.20/warc/CC-MAIN-20230208092053-20230208122053-00267.warc.gz
|
CC-MAIN-2023-06
| 931 | 5 |
https://news.ycombinator.com/item?id=12628380
|
code
|
FreeWheel helps the television industry generate revenue from their premium content through a robust technology platform, which enables consumers to watch entertainment on any devices from PC, mobile, set-top box to traditional TV.
FreeWheel New York Engineering Team is part of our global engineering team who are building advanced and high quality applications, servers and tools to manage million dollar deals, handle billions of daily requests and process terabytes of raw data everyday. We are hiring for:
- Golang Developer (select Software Engineer when applying)
- Test Infrastructure and Tools (select Test Engineer when
- Linux System Engineer
Detail & apply: http://freewheel.tv/careers/ (please mention HN as source)
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257889.72/warc/CC-MAIN-20190525044705-20190525070705-00312.warc.gz
|
CC-MAIN-2019-22
| 728 | 6 |
http://docs.shippable.com/platform/integration/azureDcosKey/
|
code
|
Azure DC/OS Integration
The Azure DC/OS integration is used to connect Shippable DevOps Assembly Lines platform to Azure DC/OS to deploy Docker based applications.
Creating an Integration
You can add an integration to Shippable by following steps on the Managing integrations page.
Here is the information you need to create this integration:
- Integration type -- Azure DC/OS
- Name -- choose a friendly name for the integration
- Username -- Username to login to Mesos master VM
- URL -- DNS or IP address of Mesos master VM
Usage in Assembly Lines
The Azure DC/OS integration can be used in the following resources:
The main scenarios for using this integration can be found in the Deploy Docker applications docs.
Default Environment Variables
When you create a resource with this integration, and use it as an
OUT for a
runCI job, a set of environment variables is automatically made available that you can use in your scripts.
<NAME> is the the friendly name of the resource with all letters capitalized and all characters that are not letters, numbers or underscores removed. Any numbers at the beginning of the name are also removed to create a valid variable. For example,
my-key-1 will be converted to
my_key_1 will be converted to
||Username supplied in the integration|
||URL supplied in the integration|
Shippable Utility Functions
The platform also provides a command line utility called
shipctl that can be used to retrieve the values of these environment variables.
The specific function that can be used in the jobs yml is:
shipctl get_integration_resource_field <resource name> <field name>.
Here is a table that provides the mapping from the environment variable to the field name.
|Environment variable||Field Name|
More information on other utility functions is documented here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657907.79/warc/CC-MAIN-20190116215800-20190117001800-00059.warc.gz
|
CC-MAIN-2019-04
| 1,799 | 29 |
https://cac.queensu.ca/wiki/index.php/Software:vi
|
code
|
The Mother of all Unix Editors, vi was originally written by Bill Joy in 1976 and is loosely based on a combination of ed and ex. vi comes standard with Unix environments. It is not graphically driven, hence there is no overhead associated with exporting graphics across a network. The new user to vi may find it somewhat cumbersome at first, but with experience many choose to solely use vi as it provides a portable and dynamic editing environment from which to work. There exists a wealth of documentation and tutorials on the use of vi.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103624904.34/warc/CC-MAIN-20220629054527-20220629084527-00170.warc.gz
|
CC-MAIN-2022-27
| 540 | 1 |
https://asqed.com/English/Archives/2013/Technical_Papers/207.html
|
code
|
Product or design quality encompasses many aspects. One of them is the robustness with respect to perturbations. This robustness depends on the implementation technology, but can also be improved at design time. This paper is focused on designs implemented in SRAM-based FPGAs that are sensitive to soft errors in the configuration memory. An approach is proposed to increase the robustness with respect to configuration errors, at no cost, by selectively hardening parts of the design. The selection of locally duplicated functions is made so that the protections take advantage of FPGA resources that would not be used by the implemented design. An automated design flow is presented for Xilinx Virtex V devices and fault injection results show that the design robustness may be noticeably improved without additional cost for a given product.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363598.57/warc/CC-MAIN-20211208205849-20211208235849-00232.warc.gz
|
CC-MAIN-2021-49
| 845 | 1 |
https://www.construct.net/en/forum/construct-classic/your-creations-42/retrorun-32572/page-3
|
code
|
[quote:3cl47pxu]The movement will be exactly the same, but maybe your goal is to shoot stuff?
[quote:3cl47pxu]I had an idea and implemented a new gamemode : DODGE.
Basically very small and slow blocks come toward you creating an "asteroid field" that slowly moves. You have to figure out a path to stay alive while passing through.
The new game mode sounds very interesting! Can't wait. But you dropped the idea about shooting stuff? I'd still like to see that actually. Or did you mean that you can shoot those asteroids? Would be great.
[quote:3cl47pxu]Also you and Arcade are very good... ~20000-25000 scores! Not everyone is good as you, so don't except new highscores soon.
Hehe, people need to train harder then! I played against Arcade for hours, since we are in messenger contact. I even made a small construct app which would show the RR highscore and update itself frequently. So I could have it in another window while I'm playing.
I said I was a little obsessed with RR.
Oh and finally customizable spaceship in the next version. YAY!!!
Nah you don't shoot stuff, I don't think it fits the style, really.
Also that app could be useful... If you can contact me either on steam(victorius72) or MSN(
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652494.25/warc/CC-MAIN-20230606082037-20230606112037-00638.warc.gz
|
CC-MAIN-2023-23
| 1,208 | 10 |
http://technicalmarketing.io/web-technology/how-i-improved-my-websites-load-time-by-more-than-27-in-under-10-minutes/?utm_source=blog&utm_medium=referral&utm_content=portent&utm_campaign=comment
|
code
|
I recently launched a new service offering with my consulting business and in doing so I went ahead and put together a well designed landing page in order to help promote it.
When I had finished creating the page I was slightly horrified to realise that it came in at a fairly heavy 2.1 MB as you can see below. I knew right away that unless I did something about this the load times on anything other than an amazing connection was going to end up costing me money. So it was around that time that I decided that it might be a good time to see how well I could optimise my site performance metrics with the least amount of effort.
Since I had tried to ensure that the page was created with just about every single best practice that I could think of I decided to reach out for some help by using Google’s amazing Page Speed Insights tool.
I was quickly presented with a laundry list of tasks to work on in order to start moving the needle.
Looking through the list it was clear that none of these tasks was particularly difficult from a technical perspective but they sure were time consuming if you wanted to do them all by hand which I had little interest in doing if I am going to be honest.
That’s when I remembered about a little project that Google had been working called mod_pagespeed that was designed to handle all of this for me automatically meaning that I could simply set it up once and then never have to think about it again.
So in this blog post I am going to show you how to do exactly that. If you aren’t technically savvy Google is looking to offer a separate version of this where they will handle all / most of the implementation detail for you. However, if you would like to save yourself some cash and maybe learn something along the way then you can just follow along with this guide.
So mod_pagespeed works directly with your web server software (it currently supports either Apache or Nginx). If you are one of the unfortunate souls who are stuck with IIS then you can check out a clone by the name of IISpeed that operates in more or less the same way.
That means that we are going to have to fire up the command line by SSHing into the web server in order to get started. Unfortunately if you are using Nginx the process of installing mod_pagespeed is a bit more difficult as it requires you to recompile your web server from scratch which is no ones idea of a good time.
So with all that in mind these instructions are designed to work best with Apache 2.2 and Ubuntu 12.04 (64-bit). However if you have a different setup hopefully these instructions should require minimal if any changes.
Let’s begin by downloading the mod_pagespeed module for Apache like so.
cd /tmp wget https://dl-ssl.google.com/dl/linux/direct/mod-pagespeed-stable_current_amd64.deb
Then we need to actually install it with the following commands.
sudo dpkg -i mod-pagespeed-*.deb apt-get -f install
So 4 commands in and we are close to done already because this module automatically enables itself when it is installed. However, we will need to actually restart the Apache before it will begin working. That’s easily done with the following command.
service apache2 restart
NOW it should be working. That wasn’t too painful was it? The only problem now is that out of the box mod_pagespeed only enables a small number of filters (optimisations) by default. In order to really start making the kinds of improvements that I want I will need to do a tiny bit more tinkering.
Thankfully that isn’t at all difficult and is simply a matter of editing a text configuration file which we can open with:
sudo nano /etc/apache2/mods-available/pagespeed.conf
Now all I need to do is take a look back at the results I got earlier from the Page Speed Insights tool in order to figure out which filters I should enable.
I decided to go with the following:
You can find a complete list of all the filters and what they do in Google’s provided documentation however for the sake of brevity I will give you a very brief rundown of the particular filters that I have enabled here.
This will remove all the unnecessary whitespace in the HTML source code for the page. Having nicely formatted code is essential for when you are working with it but when it is live on a web server all those extra spaces just translate into additional bytes of information that your browser has to download each time. This might not seem like much but those extra bytes can add up especially on big pages. It’s a simple quick win with no risk. In short there is no reason not to enable this one.
In HTML there are sometimes more than two ways of writing the same piece of markup. That is because the default behaviour of some elements is the same as the more explicit and clearer to understand code you may have written originally. However there is no need to worry because this filter will very smartly figure out any instances where you might have done that and rewrite the code for you to only do the bare minimum in order to get the job done thus finding yet another way to reduce the overall size of your page.
recompress_png & recompress_jpg
One of the recommendations that the tool had for me originally was to go through each individual image on my website and recompress them to that their quality remained the same but the filesize was reduced. Any time I need to add a new image to my page I have to go through that process all over again. In my experience these are the kinds of recommendations that make people just say “it’s not worth it” and they move onto the next thing on their list. However with these two filters mod_pagespeed will automatically do all this for me no matter what images I put on the page. What would take me who knows how long to do by hand can be done for me by adding this one line of code to my configuration file. Great success!
Knowing that they don’t change browsers can be instructed to save a copy of these files on the users hard drive so that next time they decide to visit the page the browser can just load these files from the hard drive rather than having to download them all over again thus making things much faster.
Now one of the things that the initial Page Speed Insights tool told me was that I should leverage this feature of all my images, CSS and JS files. That is exactly what this line does. It will tell the browsers that they can keep a copy of those files on the users hard drive for up to a year before they need to bother checking again for an updated version.
So unless you are a geek there is probably no reason why you would know this but every time a browser comes across a URL it has to match that domain name with the IP address of that server. This is done through what is known as DNS.
What this filter will do is it will instruct the browser to begin looking up those IP addresses from the start and in the background meaning that by the time it needs that information it will already have it and it won’t hold up everything else on the page from loading.
I keep my HTML code fairly well documented with comments when developing any page. However like the whitespace these serve absolutely no purpose in production, so let’s strip them out and further cut down on the number of unnecessary bytes the user needs to download in order to display the page.
Finally, one of the other things that the tool was complaining about was my use of Google Fonts or more specifically the way in which I was calling the external files associated with them. Nothing on the page could load until these had loaded and to make matters worse I was downloading things that I wasn’t even really using.
Thankfully mod_pagespeed is smart enough to understand exactly what I DO and DON’T need and will again handle all of this gracefully for me.
So without further ado let’s restart apache one more time and check out the results for ourselves.
There is a huge difference in scores between where we were when we started 10 minutes earlier and now and yes I am aware that the tool still mentions the leverage browser caching but it is only for one file that I specifically don’t want to be cached for various reasons.
Take a look at the difference between where we started in terms of not just load times but the overall size of the page and the associated files not to mention to fewer requests that are needed to be made.
Overall, I think we can agree that was a rather productive 10 minutes of time and now I have things entirely set up so that I don’t ever need to touch them again, everything just works as it should.
If you have any questions make sure to leave them in the comments below otherwise hit me up on Twitter @mdhoad.
Hopefully, this guide is able to help others in the same way that this little experiment helped me.
If you are interested in bringing world-class online marketing insights and analysis to your business you may want to consider working with me as a part of a new service I have launched called Easy Insights.
I currently only have a small number of positions left so get in touch if you would like to be a part of it now as I am likely raising my prices in the near future. Even if this service isn't for you check out how you can make $500 simply by referring a client to me.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917126538.54/warc/CC-MAIN-20170423031206-00618-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 9,269 | 41 |
http://manpages.ubuntu.com/manpages/disco/man1/rmeventc.1.html
|
code
|
Provided by: omnievents_2.6.2-5build1_amd64
rmeventc - destroy a CORBA EventChannel
rmeventc [-n channel-name] [-h] [-ORBparameter value] [channel-uri]
rmeventc connects to an event channel and calls its destroy() operation. If the channel is located by the -n option, then the name is unbound (removed) from the Name Service. Example: rmeventc -nfoo/bar/baz.qux
-n channel-name The CORBA Name Service name used to look up the EventChannel CORBA object. Format for channel-name: [CONTEXT-ID[.CONTEXT-KIND]/]*OBJECT-ID[.OBJECT-KIND] Examples: foo, foo.bar, foo.bar/baz/qux, foo/bar/baz.qux. The default is EventChannel -h Display a short summary of command-line options. -ORBparameter value Standard omniORB options. see omniORB documentation for details. This option is commonly used to set the omniORB traceLevel, in order to get more detailed output. Example: -ORBtraceLevel 5
OMNIORB_CONFIG The location of the omniORB configuration file.
Copyright © 2003-2005 Alex Tingle. This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. RMEVENTC(1)
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986700435.69/warc/CC-MAIN-20191019214624-20191020002124-00514.warc.gz
|
CC-MAIN-2019-43
| 1,139 | 7 |
https://en.itu.dk/about-itu/calendar/events/2018/21st-acmieee-international-conference-on-model-driven-engineering-languages-and-systems-models
|
code
|
21st ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MODELS)
We invite you to join us at MODELS 2018 at the IT University of Copenhagen, Denmark on October 14-19 2018, and to help shape the modelling methods and technologies of the future!
MODELS is the premier conference series for model-driven software and systems engineering. Since 1998, MODELS has covered all aspects of modeling, from languages and methods, to tools and applications.
Attendees of MODELS come from diverse backgrounds, including researchers, academics, engineers and industrial professionals. MODELS is a forum for participants to exchange cutting-edge research results and innovative practical experiences around modeling and model-driven software and systems.
The industry program features meetings about systems modeling and sysml, domain specific languages and MPS, Shlaer-Mellor method and xtUML with speakers from modeldriven.com, HCL, Continental, Bernafon, Airbus, Thales, Bombardier, and AVL. You can also join the academic program as part of your registration to access cutting edge results.
This year’s edition will provide an opportunity for the modeling community to further advance the foundations of modeling, and come up with innovative applications of modeling in emerging areas of cyber-physical systems, embedded systems, socio-technical systems, cloud computing, big data, security, open source, and sustainability.
Read more and register here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475203.41/warc/CC-MAIN-20240301062009-20240301092009-00724.warc.gz
|
CC-MAIN-2024-10
| 1,477 | 7 |
https://hi.service-now.com/kb_view.do?sysparm_article=KB0523430
|
code
|
Errors Generated from Solaris "awk" Utility During Discovery
During Discovery of a Solaris 10 system, the following error was received:
System Configuration: Sun Microsystems sun4u
awk: syntax error at source line 437
modelname=10*sprintf >>> "%d\n" <<< , ((cpuclock/10)+0.5)
awk: illegal statement at source line 437
awk: syntax error at source line 444
The error was generated from the Solaris awk utility. It appeared that the awk binary generating the error was corrupt.
For a quick workaround, copy the awk binary from another Solaris 10 host server where the awk utility is working correctly, and replace the awk binary on the host server where it is not working correctly.
Replacing the awk binary fixed the issue so Discovery could run normally.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315174.57/warc/CC-MAIN-20190820003509-20190820025509-00479.warc.gz
|
CC-MAIN-2019-35
| 753 | 10 |
https://devsupport.flightsimulator.com/t/sdk-documentation-errors-in-g-limit-descriptions/7988
|
code
|
There are some errors in the online SDK for the description of the positive and negative g-limits in the [Airplane Geometry] section:
The dimension should be g’s, not ft/sec. This was mentioned in both FCS PARAMETERS and Positive_g_limit_flaps_up etc are documented oddly, but is still not fixed.
The statement that the aircraft will crash if it reaches the g-limit calculated by this number is misleading. It does not say the the g-limit leading to a structural failure is calculated by multiplying the g-limit specified here by the parameter, “load_safety_factor,” nor does the description of the “load_safety_factor” parameter state how that parameter is used. (As apparent in the screenshot in the response to FCS PARAMETERS, there used to be a reference to “scaling” the limit load factors by the load safety factor, but that seems to have been removed.
Not only are the airplane structures certified to withstand limit loads without detrimental permanent deformation or any deformation that interferes with safe operation, the structure must be able to withstand up to ultimate loads (limit load factor multiplied by the safety factor). Therefore, structural failure should not occur until the load factors exceeds the limit load factors times the load safety factor.
- The link provided for “Overstress Damage” leads to an error page that says the requested content does not exist.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475311.93/warc/CC-MAIN-20240301125520-20240301155520-00291.warc.gz
|
CC-MAIN-2024-10
| 1,406 | 5 |
https://sites.projectsday.info/t1/
|
code
|
Lead Website Developer
Lead Mobile App Developer
Reamogetse looked over the project and the team, making sure all use cases were implemented. He made sure all the meetings were attend there was clear communication with the mentor when the team could not made. Reamogetse facilitated communication amongst the team and with the team mentor.
Karabo implemented the website and database. He also implemented most of the website pages and added functionality to them. He made sure there was a connection between the clien side and the database through a WCF web service which is also consumed by the mobile app. He is also responsible for maintaining the website.
Evelyn developed the mobile app, making sure all the use cases necessary for the app are well implemented. Shemaintained mobile app. SHe made sure to consume the API in such a way that changes to the database are done in real time and the are no delays in data transfers. She also did the website and app deployment.
AJM/ Automated Job Manager is a digital system designed for Maipi Electrical & Civil Engineering to digitze the core of the business and acheive high productivity efficiently. The need for the systems was realized when the team noticed a lot of operational errors because the company had a paper based system, which led to many human errors
All clients are required to create accounts before they can request a service. Once that has beendone, they can request a service. Their request will be automatically be allocated to an employee best suited for their request who will then visit the client's home to assess the situation and set a fee for the service. once the service has been rendered the client will have to pay the service fee. Both parties can comment and rate each other.
Browsers were used to launch the websites. Converting computer language into readable English. HTML & CSS were used to write the website. An API (application programming interface) allows other developers to use some of the app’s functionality without sharing the code. We used one to interface between the database, the website and the mobile application. Azure was used to host the database allowing for the website and the mobile app to transfer data between each other in real time
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496664437.49/warc/CC-MAIN-20191111191704-20191111215704-00207.warc.gz
|
CC-MAIN-2019-47
| 2,249 | 8 |
https://ondrejcertik.blogspot.com/2008/03/sympy-accepts-google-summer-of-code.html
|
code
|
Why should you apply? And why to SymPy?
Well, let me give you some reasons:
- First of all, it's fun. To get some idea, read the GSoC2007 SymPy page, where you can find out what the last year students did and especially read their reports, where they describe their impressions from the summer, how they tackled problems and their overall conclusions.
- It's not just about coding, we enjoy the social part too. There is a great community around numpy, scipy, ipython, matplotlib, Sage and similar tools and if you do scientific computing with Python, you gain a lot just being part of it, because you learn new things from the others.
- I currently live in Prague (most people say it's a beautiful city, but I actually like Los Angeles, or the Bay Area:), if there are enough interested people, we can make a coding sprint here (plus of course some sightseeing+pubs). Anyone with a good commit history is welcome to stay at my apartment. :)
- You earn $4500, some of which I suggest to spend on travelling to conferences/workshops, here are some tips: SciPy2008 (see also SciPy2007), EuroSciPy2008, Sage Days (you can read my impressions from SD6 and SD8), watch the numpy/scipy mailinglists for announcement of other meetings.
Read also the current status and motivation of SymPy and it's relation to Sage. If you want to apply, all the necessary information is on our wiki page.
Nevertheless, if you decide SymPy is not for you, but still you'd like to do GSoC project in a similar area, there are other good options too - one is SciPy/NumPy, the other is Sage. Unfortunately Sage was not accepted as a mentorship organization, but it has several good projects too, some of which you can do for example under the umbrella of the Python Software Foundation.
One of them is improving the Sage notebook. If you've never seen that - download Sage, start it (./sage), type "notebook()" and a nice Mathematica like notebook will popup in the browser. It allows collaborative editing ala Google Docs and many other things. If you'd like to work on it, reply to the email on sage-devel.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.3/warc/CC-MAIN-20230923194908-20230923224908-00172.warc.gz
|
CC-MAIN-2023-40
| 2,081 | 9 |
http://blogs.perl.org/users/sawyer_x/2012/01/anyevent-timers-shouldnt-use-type-constraints.html
|
code
|
AnyEvent timers shouldn't use type constraints
While I'm rambling about AnyEvent (which I'll probably do more often), here's a note I'd like to give myself.
I'm using AnyEvent in a big app with objects (objects are, generally, good!) and I have a lazy attribute (lazy attributes are good!) of an AnyEvent timer. This is so the timer doesn't lose scope and will be closed.
At first the constraint was a EV::Timer object. On one machine this failed the type constraint while on another it worked. Some of you already know why. Then I changed it to a generic Object. This failed one as well. Why?
Because AnyEvent is basically like a hub for many event loops (ANY event loop, get it?) and apparently on one machine it used EV (a high-performance kickass event loop written by Marc Lehmann) while on another it hadn't. This meant that one AnyEvent->timer() returned an EV::Timer object while another returned an Array Reference. I removed the type constraint complete. It's now good. :)
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00688.warc.gz
|
CC-MAIN-2022-33
| 982 | 5 |
https://www.frankysnotes.com/2020/03/reading-notes-419.html
|
code
|
Every Monday, I share my "reading notes". Those are the articles, blog posts, podcast episodes, and books that catch my interest during the week and that I found interesting.
It's a mix of the actuality and what I consumed. Enjoy!
Suggestion of the week
- Approval Workflows With GitHub Actions (Aaron Powell) - Wow! That's a very clever and impressive way to have step flow in GitHub. All the details are in the post if you would like to create your own.
- How to use Azure App Service managed certificates (Michael Crump) - It's that simple. A few clicks and you will; have https.
- Using GitHub Actions to deploy a .Net Web App (Gregor Suttie) - A nice tutorial to learn how to deploy a Hugo website.
- Blazor WebAssembly 3.2.0 Preview 3 release now available (Daniel Ruth) - OMG! Super excited about all those new features as they will all help me in a current project I'm working on...
- Creating an event-driven architecture out of existing, non-event-driven systems (Richard Seroter) - An interesting post that explains the different options to go event-driven.
- GitHub with Azure DevOps | Premier Developer (GitHub with Azure DevOps) - Very interesting post that explains al the benefits of using this mixt, and why an enterprise would be interested to do that.
- The Joy of making with LEGO Master and Cosplaying Engineer Amie DD (Hanselminutes with Scott Hanselman) - A delicious episode and BTW I watch Lego master because of that.
- #31: Julie Lerman - Software Coach, Writer & Speaker (The Solo Coder Podcast) - I was really looking forward to listen to this interview. Julie is an extraordinary person and an amazing communicator.
- 193: UI Is Messy (Merge Conflict) - I, once more, had a nice moment listening to that discussion/ argumentation about different patterns pros and cons.
- Bond At A Distance With The Remote Team Cooking Challenge (Alexia) - We are so creative when we want. Super.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950110.72/warc/CC-MAIN-20230401160259-20230401190259-00739.warc.gz
|
CC-MAIN-2023-14
| 1,910 | 13 |
https://modulesunraveled.com/podcast/112-kalabox-20-mike-pirog-modules-unraveled-podcast
|
code
|
Published: Thu, 06/26/14
- What is Kalabox?
- How is it different from MAMP, Aquia Dev Desktop, etc.?
- What comes with Kalabox?
- How does it work?
- What if a shop already has a standard set of tools? How difficult is it to start using Kalabox?
- Some VMs get slow when you run more than one at a time, how does Kalabox scale/perform?
- How does it integrate with Pantheon?
- Can you pull cone from dev and database from live?
- Are you planning to integrate with other platforms?
- Are you planning/willing to work directly with other providers like #AberdeenCloud to build their integration plugin?
- What’s different in the 2.0 version?
- You’re running a kickstarter. Tell me about that.
- Support the kickstarter here
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945287.43/warc/CC-MAIN-20230324144746-20230324174746-00079.warc.gz
|
CC-MAIN-2023-14
| 728 | 14 |
https://forums.comodo.com/t/application-crash-cfp-exe-3-0-23-362/222185
|
code
|
I have been a happy user of Comodo Firewall Pro for quite a few months now, but unfortunately i am now in need of a little help! Ever since the latest Comodo update, the firewall crashes as soon as i login to the PC (i have administrator rights).
Crash Dump Information
Problem Event Name: BEX64
Application Name: cfp.exe
Application Version: 22.214.171.1242
Application Timestamp: 48357ead
Fault Module Name: tiptsf.dll
Fault Module Version: 6.0.6001.18000
Fault Module Timestamp: 4791adda
Exception Offset: 0000000000057fb0
Exception Code: c0000005
Exception Data: 0000000000000008
OS Version: 6.0.6001.2.1.0.768.3
Locale ID: 2057
Additional Information 1: 00ec
Additional Information 2: 7dd10e24b2121c9b61dc8dbf634152b2
Additional Information 3: f298
Additional Information 4: ba46015060885f7348d95a42d000b4ee
I can only assume that it was something in the latest update that caused this as before this it was working perfectly. I did attempt to fix this problem by un-installing and re-installing the application, but with no luck. However after the application crashes on login I can start the program manually and it won’t have any problems until the next time i restart the computer.
I am running Vista SP1 x64, and have scanned my system with a number of security scanners but everything is clean.
Has anyone else had this problem or, know of a way in which to fix it?
That actually is an older version. Its is now version 126.96.36.1998. Try doing a complete uninstall and reinstall. I mean complete. I use Revo Uninstaller in advanced mode. When Comodo says reboot dont and click next on Revo and delete the left over registry and program entries it finds. Then reboot. Use CCleaner registry cleaner and reboot. Install the latest Comodo. (R)
Ok, I’ll give Revo Un-installer a try, and then use CCleaner which i already have installed. However it seems odd that it should be out of date as when I re-installed the program (yesterday) I re-downloaded the latest x64-bit version from the Comodo website. Also what I also don’t understand that is in the about section of the Comodo program it reports that the version I am using is the latest version, and the automatic updater reports that there is no newer version available.
It only seems to be the tiptsf.dll which appears to be out of date. However i shall give this a try and report back to let you know if it is still giving me hassle or whether this has solved it.
What version does it say in “about”?
v188.8.131.528 is what it says in about.
After 4-5 restarts later it appears to be fine now. However i am now wondering whether a program i had recently installed called ‘spyware terminator’ had something to do with the application crashing upon start-up due to the ‘HIPS’ protection method, which may have accidentally prevented the application .dll’s from initializing.
After I un-installed Comodo i removed this application and did another restart and followed that up with another file and registry sweep with CCleaner. All appears to be fine now, except another small niggly problem where the icon doesn’t appear to show on the task bar now, but the firewall is running in task manager which is fine.
The icon now appears ok after yet another restart. Thanks
Well in your post under subject you wrote version 184.108.40.2062 so thats why I told you what I did. Spyware Terminator is bloated useless garbage. Use SuperAntiSpyware and Malware Bytes Anti Malware on demand along with a good av.
Yes, the error dump reported that the application number was indeed ‘220.127.116.112’ but in the program about section it reported it as being v18.104.22.1688, so quite which version it thought it was I have no idea. But I assumed it was the most up to date after the automatic updater reported that there was no newer version available.
And as you quite rightly say ‘Spyware Terminator’ does not seem very effective and I will carry on using Avast and Comodo for the time being.
Unfortunately I can’t reproduce the error as it has now been sorted, but I have a strong feeling that Spyware Terminator was having a negative effect with the application by somehow causing an error in the ‘tiptsf.dll’ file. If it does arise again, then I shall be able to catch the error with Windows Error Reporting now enabled.
I may try and re-create the conditions again using some virtual machine software I have to see if I can track it down.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817158.8/warc/CC-MAIN-20240417142102-20240417172102-00321.warc.gz
|
CC-MAIN-2024-18
| 4,429 | 34 |
http://forums.macrumors.com/archive/index.php/t-17735.html
|
code
|
View Full Version : Video out for ibook 600Mhz
Jan 16, 2003, 10:00 AM
I am planning to hook up my ibook to my monitor whenever I am home.
However, I cannot get the ibook to display to the external monitor when I close the lid of the ibook.
It just goes to sleep when I do that. I am pretty sure that this can be done on the pb cause I have seen my professor done that.
Another question is how I am able to power on the ibook from the external keyboard? I remember that old macs can do that (really really old macs; mac newbie).
Jan 16, 2003, 10:08 AM
It may be possible to run the iBook closed, but it is not recommended as the iBook vents some heat throught the keyboard.
Jan 16, 2003, 07:06 PM
Any way that I can do that?
And to power up the ibook from the keyboard?
Jan 17, 2003, 02:33 PM
Anyone know where I can find information about that?
Jan 17, 2003, 02:57 PM
No powerbook will work with the lid closed. I do not know if the Ti can do it.
Jan 17, 2003, 03:33 PM
what ar you talking about? both my brothers G3 wallstreet PB and my dad's Ti will work with the lods closed. All you do connect the monitor and external keyboard/mouse, then close the lid so it goes to sleep, then wake from sleep using the external keyboard and the thing will wake up without using the internal monitor!!
Jan 17, 2003, 03:51 PM
I didn't think this was possible on the iBooks. I just thought all they could do was video mirroring. Maybe I'm wrong, but I don't think I am.
All the powerbooks since I think at least Wallstreet have had the ability to work with a closed lid assuming an external monitor, keyboard, and mouse were connected.
Jan 17, 2003, 03:59 PM
Here is the only thing I can find on it, but it really doesn't answer your questions. I would think its possible, but may not be good for the computer.
Jan 17, 2003, 04:27 PM
As far as I know the only way to operate your laptop with the lid closed is by hooking up an external display, keyboard, and mouse. I am pretty sure that is confirmed on Apples website.
Jan 17, 2003, 04:33 PM
Thanks guys, after much research, i found out from apple's discussion forum that ibook does not support lid-closed operation. This is like what robbieduncan mentions, the ibook uses the keyboard as one way of venting heat...what a shame! :(
Here's the link:
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500823333.10/warc/CC-MAIN-20140820021343-00405-ip-10-180-136-8.ec2.internal.warc.gz
|
CC-MAIN-2014-35
| 2,288 | 27 |
https://discuss.flarum.org/all?page=1
|
code
|
Something went wrong while trying to load the full version of this site. Try hard-refreshing this page to fix the error.
Dev Diary: Beta 11
Flarum 0.1.0-beta.10 Released
Guidelines for Posting Your Extension
Extension developer - first read
Flarum Community Guidelines
How much ram size is required for 20+ users?
preload pages and load instantly
Default avatar background color
Free Flarum hosting on an expert platform by FreeFlarum.com
Flagrow Ads, bombarding your users with ads everywhere, if you want..
Syndication extension (RSS & Atom feeds)
Cant make new discussion after new installed update
How to generate a flarum login cookie?
Single Sign On (SSO) with Wordpress integration
getting "internal server error" for newly installed flarum instance
Extensions translation : In their own repository or in Language pack?
How to setup Gmail to send Flarum mail
ReCache - Speed up your forum
How to add header in flarium
FriendsOfFlarum Username Request
Next Page »
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986693979.65/warc/CC-MAIN-20191019114429-20191019141929-00237.warc.gz
|
CC-MAIN-2019-43
| 970 | 22 |
https://lists.debian.org/debian-user/1998/10/msg03374.html
|
code
|
Re: Debian Questions
On Wed, Oct 28, 1998 at 03:58:33PM +0000, [email protected] wrote:
> What if there wasn't a deb source package. Is there a way to force an
> install and ignore the dependices?
Yes. In fact, I've used qmail before there was a .deb - the solution
then was to use the equivs package. It's ugly but it works. Another
solution would be to build a .deb on your own; when you're building a
local .deb, you don't have to follow the Debian Policy so the
packaging becomes quite easy¹ :-)
¹ But don't publish such a .deb :-)
Antti-Juhani Kaijanaho A7 <[email protected]> ** <URL:http://www.iki.fi/gaia/> **
The FAQ is your friend.
Trust the FAQ.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814002.69/warc/CC-MAIN-20180222041853-20180222061853-00350.warc.gz
|
CC-MAIN-2018-09
| 671 | 13 |
https://cphss.wustl.edu/Projects/Pages/ICTS-TrackingAndEvaluation.aspx
|
code
|
Funder: National Institutes of Health
Staff Contact: Bobbi Carothers
Project Duration: 2011-present
CPHSS is part of the evaluation team for the Institute of Clinical and Translational Sciences
(ICTS) Tracking & Evaluation Program. Washington University in St. Louis was granted a Clinical and Translational Science Award (CTSA) in 2007 and consequently formed the ICTS. The aims of the institute are 1) to provide the infrastructure needed for interdisciplinary research; 2) to create a centralized home for Clinical and Translational Research Training and Career Development Programs for multiple disciplines; and 3) to establish inter-institutional partnerships for clinical research and training with community, academic, health care, and industrial organizations in the St. Louis region.
The Tracking & Evaluation Program of the ICTS is a collaborative program comprised of partners from CPHSS, the Washington University School of Medicine, Becker Library, and members of the ICTS Administrative Core. This is a large-scale institutional and scientific evaluation designed to utilize evidence-based and innovative evaluation methods to provide information necessary to ICTS leadership to make effective decisions leading to organizational change. The evaluation is also designed to demonstrate the impact of ICTS support on scientific outcomes that result in clinical applications and meaningful community health results.
Products from this evaluation include:
Community-Engaged Research in the St. Louis Metropolitan Area: Mapping Existing Relationships
ICTS Research Collaboration Executive Summary
ICTS Research Collaboration Survey Results
2012, Bobbi Carothers, Science of Team Science
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814002.69/warc/CC-MAIN-20180222041853-20180222061853-00541.warc.gz
|
CC-MAIN-2018-09
| 1,695 | 11 |
https://issues.openmrs.org/browse/RA-502
|
code
|
We should have smoke tests for all "happy paths" of the registration workflow implemented so far:
- basic patient registration
- unknown person registration
- baby registration, etc.
If any of these paths are not implemented yet when you implement this ticket, then add a note to those tickets saying they need a test.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738735.44/warc/CC-MAIN-20200811055449-20200811085449-00581.warc.gz
|
CC-MAIN-2020-34
| 318 | 5 |
https://blogs.itemis.com/en/how-can-i-capture-complex-logic-in-an-app
|
code
|
Several customers of ours need Apps that represent internal logic that cannot be externalized to backend services.
The complexity reaches from registration and login scenarios, where the current user’s state needs to be tracked, to control the internal states of an external device. The latter scenario often occurs in IoT scenarios.
They need to capture the system’s state within the Apps logic, so that it can act asynchronous or completely independent from a backend server or cloud service.
Additionally we often have the requirement of developing fully native code for the Apps to grant direct access to the mobile OS’s functions or create the best achievable User Experience.
Preparing for complexity
Being confronted with these requirements, we have three possibilities (basically talking about Android and iOS):
- Implement the logic by hand for every platform in the target language.
- Create a C/C++ library that can be used almost cross-platform for iOS as well as Android (i.e. using the NDK).
- Use cross-platform tools to develop the logic only once and later generate the platform specific code.
Using the first option, you will have a – hopefully – stable version of the logic. The effort for implementing is almost the factor of platforms you need to support. Adjusting the business logic for later versions requires the developers to implement the changes for every single platform.
The second option has several limitations:
First of all the low level development for iOS and Android has several pitfalls and calls for very experienced experts for porting and integrating those developed libraries in the Apps.
Additionally C/C++ developers aren’t usually used to mobile development – and mobile developers aren’t usually very firm in C/C++ development.
For the third option you need the knowledge of an additional tool or workbench to generate your logic from. But it can ease your effort, since you only have “think through” your algorithm once.
Let’s dive into that third option a bit deeper:
Capturing the complexity
Usually you will have requirements defined for a specific workflow, a certain business logic and the like in textual or graphical form. This logic needs to be explained to the developer and transferred to code by them. Then challenged and refactored to display the technical possibilities and cover side tracks that might have been forgotten in the first idealistic definition of the flow. And in reality, you’ll repeat that last sentence again and again...
Having those tasks done directly within code leads to massive effort and need for refactoring. Wouldn’t it be wise, to have a model of what the stakeholders meant before transferring it to code? That’s what e.g. UML is for. Wouldn’t it be nice to also execute that model to see and test the flow setup in that model, so that you can track possible problems upfront - before implementing code? That’s what tools like YAKINDU Statechart Tools can help you with. You need tools, that can help you with modeling the logic platform independent. The logic itself is target platform agnostic, so it is easy to swap a platform or generate for multiple platforms, even if you start of with just one like Android.
Basically you need to think the process through, before putting any code to paper.
Coding the complexity
Having modelled your way through the logic, you’ll have a validated, verified specification of the algorithms you need to cover. Now you could implement these documented functions using on of the approaches mentioned above being either code in Swift, Java, C or C++ by hand, always being concerned that your implementation really matches the requirements.
Or you could press a button and generate code for your required platforms.
Here again YAKINDU Statechart Tools enters the game.
You’ll get standardized code, that by design is independent to your UI following standard patterns.
It helps you with clean separation of application and business logic. It’s even easier to exchange your ViewControllers or Fragments since the logic is completely encapsulated and independent from additional libraries.
Also by using tools like YAKINDU Statechart Tools you’ll benefit from shorter development cycles. Especially in mobile development the turnaround cycles can be long and tedious, when waiting for Android Studio to build and run, to have a quick test of your implemented logic.
Either way – having it hand-written or generated – at some point you’re done with coding. Time to test and maintain, right?
Maintaining the complexity
Obviously when developing, you need to test. The higher the complexity of your logic, the higher the effort for creating UnitTests and performing manual tests.
Let the system grow and age and you’ll be confronted with the everyday problem of mature software systems: they are hard to maintain.
From our experience, it is required that automatic tests are either created up-front or setup after the first development steps. Otherwise regression tests will be hard to accomplish.
With tool support you can test and verify your modelled logic up front. It can be tested on the semantic level of the state machine and you don’t have to worry about the generated code – it just works.
Nevertheless, test cases can also be generated from models. You might need that for later verification or if you choose to add additional platform specific logic to the generated code – keeping in mind that abstraction would be the better choice here.
Wrapping it up
I myself am not convinced by platform independent development with tools like PhoneGap or Titanium. Especially not in the projects we are involved with. I tend to promote the way of native development because it is the most powerful, better in User Experience, more mature.
On the other hand I’m lazy and I encourage my team to be the same.
I don’t want to code the logic of several different states of a steam cabine in Swift and Java, then test it myself, then have the customer test it, to adjust it, to test it myself, then have the customer test it, ….. and then with version 2 having the whole stuff changed again.
I want to discuss the control on a different level and then just press a button.
For Android that already works like a charm with YAKINDU Statechart Tools. For iOS we’re currently working on it.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817382.50/warc/CC-MAIN-20240419074959-20240419104959-00856.warc.gz
|
CC-MAIN-2024-18
| 6,361 | 39 |
http://www.functionpointmodeler.com/fpm-infocenter/topic/org.eclipse.team.svn.help/gettingStarted/subversion/svn_folders.html
|
code
|
Trunk is a main (head) line of development. That's where you share your project and do initial commit. Branches are the additional lines of development. Used when branching for different versions from one initial is needed or when each developer has his own development line and plan. Tags are a kind of specific labels for a set of files each with its own revision number. Used to track the important events if project's life cycle.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949387.98/warc/CC-MAIN-20230330194843-20230330224843-00356.warc.gz
|
CC-MAIN-2023-14
| 433 | 1 |
https://xrpl.org/blog/2018/rippled-1.1.0.html
|
code
|
Introducing XRP Ledger (rippled) version 1.1.0
Ripple is pleased to announce the release of XRP Ledger (
rippled) version 1.1.0.
The XRP Ledger version 1.1.0 release includes the DepositPreAuth Amendment, which, combined with the previously released DepositAuth Amendment, allows users to pre-authorize incoming transactions to accounts, by whitelisting sender addresses. XRP Ledger version 1.1.0 release also includes incremental improvements to several previously released features (fix1515 Amendment), deprecates support for the sign and sign_for commands from the rippled API and improves invariant checking for enhanced security.
Ripple recommends that all server operators upgrade to XRP Ledger version 1.1.0 by Thursday, 2018-09-27, to ensure service continuity.
If you operate a XRP Ledger server, you should upgrade to XRP Ledger version 1.1.0 by Thursday, 2018-09-27, to ensure service continuity.
Impact of Not Upgrading
Ripple expects the DepositPreAuth or fix1515 amendments to become enabled on or after Thursday, 2018-09-27. When this happens, if you are not running release 1.1.0 or greater, your server will become amendment blocked, meaning that it:
Cannot determine the validity of a ledger;
Cannot be able to submit or process transactions;
Cannot participate in the consensus process;
Cannot vote on future amendments; and
Could rely on potentially invalid data.
If the DepositPreAuth and fix1515 Amendments do not become enabled, then your XRP Ledger server will not become Amendment blocked and should continue to operate.
For instructions on updating the XRP Ledger server on supported platforms, see here: Updating
rippled on Supported Platforms.
The SHA-256 for the RPM is:
The SHA-256 for the source RPM is:
For other platforms, please compile version 1.1.0 from source. See
rippled build instructions by platform, or Build and Run
rippled on Ubuntu Linux for further instructions.
The first log entry should be the change setting the version:
commit 3e22a1e9e8f2de450eded6ca4c2db6411e329b2a Author: Nik Bougalis <[email protected]> Date: Wed Sep 5 18:34:43 2018 -0700 Set version to 1.1.0
The Ripple technical operations has deployed version 1.1.0 to all XRP Ledger servers under its operational control, including private clusters, as of Thursday, 2018-09-13.
Learn, ask questions, and discuss
Related documentation is available in the XRP Ledger Dev Portal, including detailed example API calls and web tools for API testing: https://developers.ripple.com/
- The Ripple Forum (Disabled. Formerly
- The Ripple Dev Blog: https://developers.ripple.com/blog/
- Ripple Technical Services: [email protected]
- XRP Chat: http://www.xrpchat.com/
Bug Bounties and Responsible Disclosures
On behalf of the XRP Community, Ripple would like to thank Guido Vranken, for responsibly disclosing several issues related to some of the encoder / decoder logic in rippled. As always, Ripple welcomes reviews of the XRP Ledger open source codebase and urge reviewers to responsibly disclose any issues that they may find. For more on Ripple's Bug Bounty program, please visit https://ripple.com/bug-bounty/.
When compiling XRP Ledger from source, you must use a compatible version of the Boost library. As of XRP Ledger version 1.1.0, Boost 1.67.0 is required for all platforms.
1.1.0 Change Log
Add DepositPreAuth ledger type and transaction (#2513)
Increase fault tolerance and raise validation quorum to 80%, which fixes issue 2604 (#2613)
Support ipv6 for peer and RPC comms (#2321)
Refactor ledger replay logic (#2477)
Improve Invariant Checking (#2532)
Expand SQLite potential storage capacity (#2650)
Replace UptimeTimer with UptimeClock (#2532)
Don’t read Amount field if it is not present (#2566)
Remove Transactor:: mFeeDue member variable (#2586)
Remove conditional check for using Boost.Process (#2586)
Improve charge handling in NoRippleCheckLimits test (#2629)
Migrate more code into the chrono type system (#2629)
Supply ConsensusTimer with milliseconds for finer precision (#2629)
Refactor / modernize Cmake (#2629)
Add delimiter when appending to cmake_cxx_flags (#2650)
Remove using namespace declarations at namespace scope in headers (#2650)
Deprecate the ‘sign’ and ‘sign_for’ APIs (#2657)
Use liquidity from strands that consume too many offers, which will be enabled on fix1515 Amendment (#2546)
Fix a corner case when decoding base64 (#2605)
Trim space in Endpoint::from_string (#2593)
Correctly suppress sent messages (#2564)
Detect when a unit test child process crashes (#2415)
Add missing virtual destructors (#2532)
Improve JSON exception handling (#2605)
Handle WebSocket construction exceptions (#2629)
We welcome external contributions to the XRP Ledger codebase. Please submit a pull request with your proposed changes on the GitHub project page at https://github.com/ripple/rippled.
On behalf of the XRP Community, Ripple would like to thank those who have contributed to the development of the XRP Ledger (rippled) open source code, whether they did so by writing code, running the software, reporting issues, discovering bugs or offering suggestions for improvements.
The following is the list of people who made code contributions, large and small, to XRP Ledger prior to the release of 1.1.0:
Aishraj Dahal, Alex Chung, Alex Dupre, Andrey Fedorov, Arthur Britto, Bob Way, Brad Chase, Brandon Wilson, Bryce Lynch, Casey Bodley, Christian Ramseier, crazyquark, David Grogan, David Schwartz, Donovan Hide, Edward Hennis, Elliot Lee, Eric Lombrozo, Evan Hubinger, Frank Cash, Howard Hinnant, Jack Bond-Preston, jatchili, Jcar, Jed McCaleb, Jeff Trull, Joe Loser, Johanna Griffin, Josh Juran, Justin Lynn, Keaton Okkonen, Lieefu Way, Luke Cyca, Mark Travis, Markus Teufelberger, Miguel Portilla, Mike Ellery, MJK, Nicholas Dudfield, Nikolaos D. Bougalis, Niraj Pant, Patrick Dehne, Roberto Catini, Rome Reginelli, Scott Determan, Scott Schurr, S. Matthew English, Stefan Thomas, The Gitter Badger, Ties Jan Hefting, Tim Lewkow, Tom Ritchford, Torrie Fischer, Vahe Hovhannisyan, Vinnie Falco, Warren Paul Anderson, Will, wltsmrz, Wolfgang Spraul and Yana Novikova.
As XRP Ledger moves to the 1.0 series, we look forward to more external contributions and are excited to see the broader XRP Ledger community grow and thrive.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224651325.38/warc/CC-MAIN-20230605053432-20230605083432-00204.warc.gz
|
CC-MAIN-2023-23
| 6,275 | 64 |
https://money-mod.com/3013-garage-54-car-tuning-simulator.html
|
code
|
Garage 54 - Car Tuning Simulator
Garage 54 - Car Tuning Simulator (MOD Money) - an interesting simulation where the player will restore vehicles and keep his vlog about it. The project has a rather unusual mechanics, due to which you will be simultaneously engaged in several profitable businesses. To begin with, your goal will be to attract as many subscribers to your channel as possible, because your earnings will depend on the audience. You will also need to find cars that can be restored, you will clean them of rust, old paint and remodel.
Like Tuner Z - Car Tuning and Racing Simulator, you don't need to carry out complete vehicle repairs. You can only change certain parts of it, for example, tires, body color and the like. Users will monitor your progress, rate you and write comments. As a result, your task will also be to earn as much money as possible, due to which you will become incredibly popular.
You can spend the money and gold you want in the game, it increases as you spend.
Download Garage 54 - Car Tuning Simulator
- download .apk file;
- install .apk; (if there is no access to the installation of the .apk file from unknown sites, navigate to Settings > Security > Unknown sources check the option and tap OK on the prompt message);
- download data for the game (zip archive);
- unzip data on the Path: /sdcard/android/obb/ru.garage54.game/
- launch the game.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337516.13/warc/CC-MAIN-20221004152839-20221004182839-00181.warc.gz
|
CC-MAIN-2022-40
| 1,390 | 10 |
https://www.pwcforum.com/threads/94-yamaha-wave-runner-bogging-overheating.4154/
|
code
|
I just bought a 94 WaveRunner III. It runs like a scalded ape (that's good) for the first 20 minutes or so then it starts to hesitate and sputter. I think that it is overheating and some sort of rev limiter is kicking in. What do you think. How do I check to see if water is pumping well and getting to the engine. I would appreciate any help. Thanks in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499758.83/warc/CC-MAIN-20230129180008-20230129210008-00486.warc.gz
|
CC-MAIN-2023-06
| 362 | 1 |
https://docs.singlestore.com/cloud/user-and-workspace-administration/use-the-workload-manager-and-set-resource-limits/set-resource-limits/
|
code
|
Set Resource Limits
The Resource Governance (RG) feature restricts the resources that queries can use by grouping the queries into “pools” and then assigning quotas of resources to these pools.
Resource limits are for all databases in a workspace.
The resources controlled by resource pools are:
Concurrency: Limits the total queries that can run simultaneously in any given pool.
For example, if you define a pool with a max concurrency of 25 and there are 4 aggregators in the workspace, each aggregator will only allow FLOOR(25/4)=6 queries to run at a time in that pool. The rest of the queries will be queued in FIFO order. Only queries are queued to limit concurrency.
CPU: Limits the percentage of total cores available to a pool.
It includes both aggregator and leaf node CPUs. For example, if your leaves have 100 cores, and Pool A has 20% as its cpu limit, 20 cores will be assigned to Pool A on each leaf node. All queries running in Pool A will share the same 20 cores between themselves. The OS will manage context switching between the queries. There are two variants:
CPU_ LIMIT_ PERCENTAGE: Pool B can temporarily use cores from Pool A when Pool A is underutilizing its CPU reservation. As a result, Pool A might temporarily have less than 20 cores at its disposal but there will be overall better performance.
CPU_ LIMIT_ PERCENTAGE: Pool B can’t use cores from Pool A and hence the performance is more deterministic.
Each pool can have both SOFT_
CPU_ LIMIT_ PERCENTAGE and HARD_ CPU_ LIMIT_ PERCENTAGE set. Which mode the resource governor is running in is determined by the variable
governor_ cpu_ limit_ mode To display it, execute:SELECT @@resource_governor_cpu_limit_mode;
All pools run in either the hard or soft mode, i.
e. all pools have the same mode.
Memory: Limits the total leaf node memory that all queries running in a specific pool can together use.
Once this limit is reached, the first query to request more memory will be killed and result in an Out Of Memory (OOM) error. It is not possible to control exactly which query will be killed. It is best to make sure queries don’t reach this limit by controlling the concurrency of the pool.
Query Timeout: This can be specified to kill queries if they have been running or queued for a long period of time.
For more information on the above settings, see CREATE RESOURCE POOL.
Each client connection is assigned to a resource pool that specifies some (or all) of these limits.
Resource limits also apply to any
LOAD DATA queries, internal sampling queries, or stored procedures that are run by a user within a given resource pool.
To see the status of queries running in pools run:
SELECT * FROM INFORMATION_SCHEMA.MV_RESOURCE_POOL_STATUS;
To see the details about properties of pools run:
SELECT * FROM INFORMATION_SCHEMA.RESOURCE_POOLS;
To see how much memory a query is using, check
To see the total memory allocated (not reserved) by a node currently use:
SHOW STATUS EXTENDED LIKE '%TOTAL_SERVER_MEMORY%';
Related to setting resource limits through governance is the concept of workload management.
In this section
Last modified: April 26, 2023
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100550.40/warc/CC-MAIN-20231205073336-20231205103336-00103.warc.gz
|
CC-MAIN-2023-50
| 3,140 | 32 |
https://digitalnordic.net/cheap-web-builder-and-hosting/
|
code
|
Cheap Web Builder And Hosting
Discovering a high-quality cheap web hosting carrier isn’t simple. Every internet site will certainly have various requirements from a host. And also, you need to compare all the attributes of an organizing company, all while trying to find the most effective bargain possible.
This can be a lot to sort via, especially if this is your first time purchasing holding, or building a website.
A lot of hosts will use very economical introductory prices, just to increase those prices 2 or 3 times higher once your first get in touch with is up. Some hosts will certainly offer complimentary incentives when you subscribe, such as a totally free domain name, or a free SSL certification.
While some hosts will be able to supply much better efficiency and high levels of security. Cheap Web Builder And Hosting
Listed below we dive deep into the most effective affordable webhosting plan there. You’ll learn what core hosting features are essential in a host and also how to analyze your own hosting demands to make sure that you can select from among the best low-cost organizing suppliers listed below.
Disclosure: When you acquire a webhosting bundle through links on this web page, we gain some commission. This aids us to maintain this website running. There are no extra prices to you whatsoever by utilizing our links. The listed here is of the most effective low-cost webhosting bundles that I have actually directly utilized as well as checked.
What We Think about To Be Affordable Host
When we explain a web hosting bundle as being “Cheap” or “Spending plan” what we mean is hosting that falls under the price bracket in between $0.80 to $4 each month. Whilst looking into low-cost hosting carriers for this guide, we checked out over 100 different hosts that fell into that cost array. We then analyzed the top quality of their least expensive organizing plan, worth for cash and customer care.
In this article, I’ll be looking at this first-rate internet site organizing firm as well as stick in as much appropriate info as feasible.
I’ll discuss the attributes, the pricing options, and also anything else I can consider that I believe could be of benefit, if you’re deciding to register to Bluhost and obtain your websites up and running.
So without further ado, let’s check it out.
Bluehost is one of the most significant web hosting business worldwide, obtaining both massive advertising assistance from the business itself and also associate marketers that promote it.
It actually is a huge business, that has actually been around for a long time, has a huge online reputation, and is certainly one of the leading choices when it comes to host (certainly within the top 3, at the very least in my publication).
However what is it precisely, and should you obtain its services?
Today, I will address all there is you need to understand, offered that you are a blogger or a business owner who is looking for a webhosting, and also does not recognize where to get started, because it’s an excellent option for that target market in general.
Allow’s envision, you want to hold your sites and also make them visible. Okay?
You already have your domain name (which is your site location or LINK) and now you wish to “transform the lights on”. Cheap Web Builder And Hosting
You need some organizing…
To achieve all of this, as well as to make your internet site noticeable, you require what is called a “web server”. A server is a black box, or device, that saves all your site data (data such as images, texts, video clips, links, plugins, and various other details).
Currently, this server, needs to get on regularly as well as it has to be connected to the net 100% of the time (I’ll be pointing out something called “downtime” later).
Additionally, it additionally needs (without getting also fancy as well as into details) a file transfer protocol commonly known as FTP, so it can show web browsers your internet site in its desired type.
All these points are either pricey, or need a high degree of technological ability (or both), to produce as well as preserve. And also you can completely go out there and find out these things by yourself as well as set them up … yet what about instead of you purchasing as well as maintaining one … why not simply “renting holding” instead?
This is where Bluehost is available in. You rent their servers (called Shared Hosting) as well as you release a site making use of those servers.
Because Bluehost maintains all your documents, the firm also permits you to establish your material administration systems (CMS, for brief) such as WordPress for you. WordPress is an extremely prominent CMS … so it simply makes good sense to have that alternative readily available (virtually every organizing firm currently has this option as well).
In other words, you no more require to set-up a web server and afterwards integrate a software where you can construct your web content, separately. It is currently rolled into one package.
Well … visualize if your server is in your residence. If anything were to occur to it at all, all your files are gone. If something goes wrong with its internal processes, you require a service technician to repair it. If something overheats, or breaks down or obtains damaged … that’s no good!
Bluehost takes all these headaches away, and cares for everything technological: Pay your web server “rent”, and also they will look after whatever. And as soon as you get the service, you can after that start focusing on adding material to your website, or you can place your effort right into your marketing campaigns.
What Solutions Do You Receive From Bluehost?
Bluehost offers a myriad of different services, but the primary one is hosting certainly.
The organizing itself, is of various kinds incidentally. You can rent a common web server, have a specialized web server, or additionally an onlineexclusive web server.
For the objective of this Bluehost evaluation, we will concentrate on hosting services and also various other services, that a blog writer or an on-line business owner would need, rather than go unfathomable right into the rabbit opening and discuss the various other services, that are targeted at even more experienced folks.
- WordPress, WordPress PRO, as well as shopping— these organizing services are the bundles that permit you to host a website making use of WordPress as well as WooCommerce (the latter of which permits you to do ecommerce). After buying any of these packages, you can begin developing your site with WordPress as your CMS.
- Domain name Industry— you can likewise purchase your domain name from Bluehost instead of various other domain name registrars. Doing so will make it simpler to direct your domain name to your host’s name web servers, given that you’re making use of the same market.
- Email— when you have actually acquired your domain name, it makes sense to additionally get an e-mail address connected to it. As a blog writer or on-line business owner, you should pretty much never utilize a totally free email service, like Yahoo! or Gmail. An email such as this makes you look unprofessional. The good news is, Bluehost offers you one free of cost with your domain.
Bluehost likewise supplies committed servers.
As well as you may be asking …” What is a dedicated web server anyhow?”.
Well, things is, the fundamental webhosting packages of Bluehost can only a lot traffic for your website, after which you’ll require to update your hosting. The reason being is that the typical web servers, are shared.
What this suggests is that a person web server can be servicing 2 or even more web sites, at the same time, among which can be yours.
What does this mean for you?
It indicates that the solitary web server’s sources are shared, and it is doing numerous jobs at any offered time. Once your site starts to strike 100,000 site check outs monthly, you are mosting likely to need a committed server which you can also get from Bluehost for a minimum of $79.99 per month.
This is not something yous must bother with when you’re beginning however you should keep it in mind for sure.
Bluehost Prices: Just How Much Does It Cost?
In this Bluehost testimonial, I’ll be focusing my interest primarily on the Bluehost WordPress Hosting plans, considering that it’s one of the most preferred one, as well as very likely the one that you’re seeking and that will fit you the best (unless you’re a significant brand name, business or site).
The 3 offered strategies, are as complies with:
- Basic Plan– $2.95 monthly/ $7.99 regular cost
- Plus Plan– $5.45 each month/ $10.99 regular cost
- Choice And Also Strategy– $5.45 monthly/ $14.99 regular rate
The very first rate you see is the rate you pay upon register, and the 2nd cost is what the expense is, after the very first year of being with the firm.
So generally, Bluehost is going to charge you on a yearly basis. As well as you can also select the amount of years you intend to host your website on them with. Cheap Web Builder And Hosting
If you select the Fundamental strategy, you will pay $2.95 x 12 = $35.40 beginning today and by the time you enter your 13th month, you will now pay $7.99 monthly, which is also charged per year. If that makes any feeling.
If you are serious about your website, you must 100% obtain the three-year option. This means that for the basic plan, you will pay $2.95 x 36 months = $106.2.
By the time you hit your 4th year, that is the only time you will pay $7.99 monthly. If you consider it, this technique will certainly conserve you $120 throughout three years. It’s not much, but it’s still something.
If you intend to get greater than one site (which I highly recommend, and if you’re serious, you’ll possibly be getting more at some time in time) you’ll want to take advantage of the selection plus strategy. It’ll enable you to host limitless sites.
What Does Each Strategy Deal?
So, in the case of WordPress holding plans (which resemble the common organizing plans, but are much more geared towards WordPress, which is what we’ll be concentrating on) the functions are as follows:
For the Standard plan, you obtain:
- One internet site just
- Guaranteed website using SSL certification
- Maximum of 50GB of storage
- Totally free domain for a year
- $ 200 advertising and marketing credit scores
Bear in mind that the domains are acquired separately from the organizing. You can obtain a complimentary domain with Bluehost right here.
For both the Bluehost Plus hosting and Choice Plus, you obtain the following:
- Unlimited number of web sites
- Free SSL Certification. Cheap Web Builder And Hosting
- No storage space or data transfer restriction
- Complimentary domain for one year
- $ 200 marketing credit history
- 1 Office 365 Mailbox that is cost-free for one month
The Choice Plus strategy has an included benefit of Code Guard Basic Alternative, a back-up system where your file is saved and replicated. If any type of accident occurs as well as your site data disappears, you can restore it to its initial kind with this feature.
Notice that even though both plans set you back the very same, the Option Plan after that defaults to $14.99 per month, regular rate, after the set amount of years you’ve chosen.
What Are The Benefits Of Using Bluehost
So, why select Bluehost over other host solutions? There are thousands of host, many of which are resellers, however Bluehost is one select few that have actually stood the test of time, and it’s probably one of the most well known around (and completely reasons).
Right here are the three primary advantages of choosing Bluehost as your webhosting provider:
- Server uptime— your site will certainly not show up if your host is down; Bluehost has greater than 99% uptime. This is incredibly essential when it concerns Google SEO as well as positions. The greater the better.
- Bluehost speed— just how your server feedback determines how rapid your web site reveals on a browser; Bluehost is lighting quickly, which suggests you will decrease your bounce price. Albeit not the most effective when it concerns filling speed it’s still widely important to have a quick rate, to make individual experience far better as well as better your ranking.
- Unrestricted storage— if you obtain the And also strategy, you need not worry about how many files you store such as video clips– your storage space ability is unrestricted. This is truly essential, because you’ll possibly run into some storage space problems in the future down the tracks, and you do not want this to be a trouble … ever.
Finally, customer support is 24/7, which indicates regardless of where you are in the globe, you can contact the support group to repair your internet site issues. Pretty common nowadays, however we’re taking this for approved … it’s likewise really essential. Cheap Web Builder And Hosting
Additionally, if you have actually gotten a free domain with them, after that there will be a $15.99 charge that will be deducted from the amount you initially acquired (I envision this is since it kind of takes the “domain out of the marketplace”, not exactly sure about this, but there possibly is a hard-cost for registering it).
Last but not least, any type of demands after one month for a reimbursement … are void (although in all sincerity … they ought to probably be stringent below).
So as you see, this isn’t always a “no questions asked” plan, like with a few of the other holding alternatives around, so make certain you’re alright with the plans prior to continuing with the hosting.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662517018.29/warc/CC-MAIN-20220517063528-20220517093528-00255.warc.gz
|
CC-MAIN-2022-21
| 13,744 | 82 |
https://books.google.com/books?id=8ZxQAAAAMAAJ&dq=related:ISBN3540518231&lr=&hl=en
|
code
|
What people are saying - Write a review
We haven't found any reviews in the usual places.
An Optomized Concurrency Control Algorithm for Transaction Processing
Knowledge Engineering for Software Engineering
An Integrated System for Query Formulation and Database Design
37 other sections not shown
abstract data type abstraction activities actor algorithm analysis application approach architecture Artificial Intelligence attributes CLP(R compilation complex components Computer concept constraints construction context cycle data blocks data type database defined definition described diagram domain entity environment evaluation example execution expert system Figure files formal function goal graph graphic object Horn clause IEEE implementation inheritance input instance instantiation integration interaction interface knowledge base knowledge engineering knowledge representation layout logic program method module node object types object-oriented operations OPS5 output performed predicate problem Proc procedure process models production programming language Prolog protein prototype query recursive relation relationship represent representation requirements reusable reuse reverse engineering rules schema semantics sequence simulation software development Software Engineering Software Maintenance software process software system SPEC specification task tion transaction transformation tuple variables version space
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806426.72/warc/CC-MAIN-20171121204652-20171121224652-00292.warc.gz
|
CC-MAIN-2017-47
| 1,430 | 7 |
https://www.dimi.uniud.it/eventi/simulation-based-testing-and-validation-of-mbd-systems/
|
code
|
Simulation-based Testing and Validation of MBD Systems
Università di Udine
Model-based development (MBD) is a design approach where diagrams are used instead of code. MBD significantly simplifies the design process, but the verification and debug of models remains a challenging task. Simulink from MathWorks is an MBD tool for systems design and simulation that has become a de facto standard in automotive industry. Its lack of a formal semantics makes it difficult, if not impossible, to check whether a model satisfies a specification. In this talk we will consider the following problem: given a Simulink model, an input space, and a property expressed in terms of a Signal Temporal Logic (STL) formula, find a sequence of input under which the model does not satisfy the property. We propose a simulation based technique inspired by the Rapidly Exploring Random Tree algorithm (RRT) originally created for robot path planning. In our context we try to generate traces that maximize the coverage of the state space of the model and possibly falsify the formula. Experimental results obtained by applying our technique to industrial automotive models are encouraging. This work has been done in collaboration with the Toyota Model-Based Development research group in Los Angeles, California.
Join work with: T. Dang (Verimag), A. Donzé (Berkeley), J. V. Deshmukh, X. Jin, J. Kapinski (Toyota Technical Center)
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232262029.97/warc/CC-MAIN-20190527065651-20190527091651-00365.warc.gz
|
CC-MAIN-2019-22
| 1,415 | 4 |
https://www.container-solutions.com/learn-with-cs/gitops
|
code
|
GitOps is a fast-growing technology movement that has become a hot topic in the Cloud Native community.
The concept originated in a blog post from the software consultancy Weaveworks in 2017 entitled ‘GitOp —Operation by Pull Request’.
The word itself combines the name of the source-control tool (Git), and its application to software operations (Ops).
GitOps seeks to reduce load on operational teams by leveraging key features of Git that make reasoning about software delivery and maintenance easier.
Since its inception, GitOps has grown as a movement alongside related technologies, including Kubernetes Terraform, ArgoCD, FluxCD,and JenkinsX.
GitOps Essentials is the latest offering from Container Solutions' education services. We offer a two-day workshop that introduces the concept of GitOps and gets you hands-on with popular tooling. Our workshop is aimed at software developers, DevOps engineers, and architects who want to gain experience implementing GitOps on a Kubernetes platform
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358208.31/warc/CC-MAIN-20211127163427-20211127193427-00566.warc.gz
|
CC-MAIN-2021-49
| 1,004 | 6 |
https://criticalfuture.tech/pt/issue-13-november-2021-joao-graca-b743c0dd804f/
|
code
|
There's always a first time for everything. In this case it's the first time an issue is delayed! Attempting to multitask can pay a toll... As per Mozart's words: "The shorter way to do many things is to only do one thing at a time."
For this 13th edition, Unbabel's CTO and cofounder João Graça joins us for a wide-ranging conversation on the human-AI relationship and the future of work, the difficulty of doing machine translation and the possible dangers of AI
Lawrence - Hi everyone. Today we have João Graça, the cofounder and CTO of Unbabel.
João has a PhD in natural language processing and was a postdoctoral researcher at the University of Pennsylvania.
He's also one of the cofounders of the Lisbon machine learning summer school, has authored several papers in machine learning with side information and supervised learning and machine translation.
And also, as a disclaimer, being the cofounder of Unbabel, he is my boss. So I must disclose that I work for Unbabel as well.
Hi João, welcome to Critical Future Tech.
João - Hello Lawrence, how are you doing?
L I'm doing fine. So on this Monday morning, rainy Monday morning, one of the main topics that I told you I wanted to discuss with you is something that in society, when you have an AI powered company – a company that uses AI – one thing that comes to people's mind is that AI is going to take over the world. It's going to replace us all. It's going to take our jobs.
Sometimes, because we (Unbabel) essentially provide translation services supported by AI, people think that we are just replacing translators, but that's not really the case.
What I wanted to discuss with you is this dichotomy between AI taking over our jobs or AI supporting us, and showing that we are actually more towards the AI supporting humans instead of replacing them, right? I guess over time, you've had this conversation with many people, right? Can you tell us a little bit about it?
J So that is a fundamental question that has been asked about Unbabel, but also about society.
Let's start with that. So the first thing is that there's a problem. People speak different languages and they want to communicate and right now there's two options. You either assume that people know all the languages in the world, which is not feasible, it doesn't happen. Or that everyone will know at least one language, which is pretty much English, like the lingua franca to communicate, or you need to have some translation in the middle.
And so translation has been growing a lot. And for instance there was a study, I think four or five years ago, that if you took all of the professional translators together, they could not translate 1% of the content that was being produced. So there's not enough manpower, there's too much content being produced at every given day to have translators.
So on the other hand, a lot of the content that is being produced is very simple and repetitive, and you don't need a professional translator. So for instance, you're a native Portuguese, like I am but we are talking in English and we write emails in English so we're not kind of like professional translators and we can do this translation job.
So the premise of Unbabel from the beginning was that we can use non-professionals translators to do translations and basically increase the amount of translations that you can do massively. And by this the side effect is you're actually bringing a lot of jobs for non- specialized persons.
Now at the same time, AI has been improving so a lot of the content that can be translated can already be translated with AI. And so let's do it. Let's make the goal of humans being able to communicate with each other a real goal and say that instead of just 1%, we can all do 70% and AI is going to make the most of it. Now, the question is whatever is left is still bigger than 1% so you're not removing jobs from humans.
There's another question which is: as AI progresses, are we going to get to a point where AI can translate everything? I am not a believer of that. Especially in the coming future there are some types of content that are very hard for AI to deal with.
AI doesn't know how to deal with, you know, hidden meanings or metaphors very well. So AI right now is a very good memorization machine. So you can read stuff and can memorize it and spit back. But it can do a lot of, like, emails. They are always the same. We don't need humans.
So there is a trend of: what are humans translating, that is going to be from everything, to kind of more complex things. And so for instance, at Unbabel, the way we work with people is on one hand to translate some data for us to train the machine and the machine gets better. And then basically we identify the areas where the machine is failing and to have the humans go there and correct these steps and fix them. And trying to make the machine better.
But we will still have more work for people to do. So I don't think that anytime soon you're going to be out of job as a translator. I don't have data to support this, but I'm quite confident of this statement: there's more work for translators now than there was ten years ago, five years ago.
L And that's because of market expansion? Companies going into other places? Or the remote workforce? Why is that?
J So first of all the internet is becoming more and more global and more trade is being done through the internet. And there's a lot of studies that show that people feel more confident in buying stuff if it's in their own language.
You're creating this internet in different languages. People are producing local content that needs to be translated. But then it's like, once you make it available for people to translate some part of the content with machine translation in a much simpler way, then it's a barrier to entry that becomes smaller.
So this is kind of like where we are right now in reflection. Now I think that over history, we always saw that technology tends to remove some of the existing jobs and create other jobs, which are normally higher cognitive load jobs.
So for instance think about agriculture. The amount of people that you need in agriculture is completely different than the one that we needed 50 years ago.
So there were a lot of jobs that would destroy agriculture, but you don't have more unemployed people than you had 50 years ago, you just created other jobs. So I think there's going to be an increase in the level of cognitive load that people will be doing work, which in fact I think is good for humans.
And then obviously if you keep pushing this topic further, you start getting to the point where, well "what happens if AI does all of this grunt work?" Well, then maybe people start having more time and that's where you're seeing all the discussions about the basic income for their work, which I think overall is going to be very good for us as a human species.
L We're still to see that, right? But that does seem to be the trend: that more and more we'll be able to eventually spend more time doing more intellectual work, creative work, instead of doing the repetitive and cumbersome work.
On the language side of things, a couple of months ago, I was reading this book that I really enjoyed by a Portland State University professor, Melanie Mitchell, on AI. And she basically recalls the story that initially some interns were recruited like in the fifties. I don't remember who the professors were and they were naively saying: "okay let's try to make a machine translation program during a summer internship".
And that was like 70 years ago. And still nowadays when you look at systems like Google, DeepL and others, ours. They are good enough to a certain extent but at some point they become kind of dumb because again, it's more than just translating words. You need to translate meaning and machines still have a hard time understanding the meaning of things.
They can translate the sentence, but they don't really know what that means. And when you meet a translator and when you know how to translate, even if you're bilingual. That's when you see how hard translating can be because of the meaning of words and the context that machines lack nowadays right?
And that's why we actually need someone, a human at the end of that, to actually see if the meaning of the translation makes sense, right? Not just the words themselves, but the meaning of what is being conveyed.
J To me it's semantics. I would say the same thing, but there's also all the cultural things. Like, are you conveying the same sentiment? That's something that is very hard for machines to do, for several reasons.
First of all, the models that we use are actually limited. So our models only look at one sentence at a time. So everything that you need from the previous sentence to disambiguate, you can't do that.
But also again we're not very good at taking these cultural nuances. Because if you think about one of the grand evolutions that happened on machine translation, there were several neural machine translations, but one of them was word embedding.
So it would be the case that you basically took one word and you look at the entire corpus and you say: "Okay, this word means this". You used to do it with just counting, counting some features. Then you have these vectors of representations. But for instance, one of the things that we had an issue with is that there was no way to solve this was words like "bank". "Bank" can be the financial institution, it can be the place where you sit, it can be the part close to a river. And so the algorithm had to kind of understand what it means based on two or three different words, but it was the same representation for that word, although there were different semantic components.
Now, with this new BERT model and word embedding this is not the case because you basically take the vector of a word, given the sentence where it's connected so you basically get different representations. You can see how even this already gave you a boost. But still, if you think about everything that we know about the meaning of a word in the current society where you live, for the age group that you are in, you know that there's a lot of dimensions of the word that you can't capture by this. It's just.. It's in your brain.
And so that is very hard to capture by a machine. So you need people to do that work. You know, the current systems, they fail for complex stuff. They're super powerful for easy things. And there's a huge amount of things that are very important.
So let me give an example that I was overwhelmed when I learned about it. We had a project a couple of years ago with Microsoft, Dublin university, Translators Without Borders, that was about crisis translation. So the idea was how fast can you train a model from a language pair that is normally very low resource and you can use a community of editors such as ours to bootstrap data? And when I say fast, you needed to get the model in one or two days.
What was the use case? So when there was an earthquake in Haiti it was a huge disaster, a lot of people were dying, a lot of people in the middle of the disaster that need to be rescued. And so a lot of countries send people there to help them, called first responders.
Now, they spoke some French Creole that was not easy to understand and the first responders were coming from Germany. All countries that couldn't speak that language. And this is actually people on the field that will tell you that they would go there and didn't know how to interact with the people that need help.
"Who is worse? Is it that person or that person?" You can't understand. And so Microsoft did something which is to create some bootstrapped models for the language pairs. If you look at the actual quality, it was terrible, but it was enough for people to start communicating and that made a huge impact.
So how can you do this with this technology? And that is actually saving lives.
L That's a very, very interesting example of deploying AI in this case for the societal good.
J So that was like a super interesting story. Now it raises a lot of interesting questions. Imagine that you're an editor of Unbabel and that you're sitting at home on a relaxed Monday holiday doing tasks and then suddenly the tasks we get to translate is of someone that is below two meters of dirt, dying. And you feel that if you don't do a translation fast enough or you miss, the person will die.
And so, the question is: "What kind of people can we use"? Do you need to train them psychologically? There's all these interesting questions that came up that I never thought about. But those are examples where even the most basic technology, because when this was deployed in Haiti, it was not even neural machine translation. It was like the previous iteration of systems whose quality was much worse. [It] already brought a lot of positive impact.
I think with the technology that we have, we can cover a huge portion of the needs. Now, the last 20%, those are always going to be harder. And if you're trying to translate like a Dostoevsky, then yes: machine translation will not do it anytime soon.
L Do you think that at some point AI is going to be able to translate a whole book as we were giving the example of Dostoevsky and, if yes, then how long do you think that would take?
J Okay. So I don't have an answer that tells a plan like: "I think it's five years because ABC is happening". I think we're still in the belief phase.
L You're not convinced yet that it's for the next 5 to 10 years.
J I mean, I think it's possible. I think we've been learning and improving a lot of things very fast.
But for instance the current technology in AI, everything that you hear about the big language models that's actually, for me, a really dumb approach. It's like a brute force. It's just putting a lot of engineering to make these models that are basically a super good memorization machine.
Now, one thing that has been taken for granted is that you can't memorize all the knowledge in the world. Even if you have super big models. Maybe I'm wrong. I was seeing the data set that they use for this new Microsoft model and it's huge. You need to have some reasoning. And the first thing you need to do is you need to have an abstraction, a semantic abstraction of the world.
And this is where a lot of research has been going. So we haven't progressed on that. Our abstractions are super basic and the research that you're hearing about, at least in the media, it's not about a better understanding of abstractions, it's about more volume, more memorization. But then you're just memorizing stuff. You don't know exactly what you're memorizing, what to pick.
And I believe that you might be able to translate a book with these systems because the book is just a bigger thing. The problem is in the nuances. There are nuances that you won't be able to get, and that will happen either in a book or an email because we don't have the proper reasoning mechanism.
I can't predict what we're going to do in 5 or 10 years because there's an exponential growth of technology that we've been doing. I don't think that the way that we're progressing towards that will solve this problem. I think that needs to be changed. And when that change happens, we might get closer.
Besides the lack of understanding of the actual structures, we still use these pretty basic models because of the computational limitations. There's still a lot of work that needs to be done for us to have a model that could potentially solve a translation problem.
What I'll say is that we'll see translation becoming much better. And we'll see a lot of use cases just using direct translation. Not only because it's becoming better, but because people are more willing to take machine translation errors and live with them than they were before.
So there's a compromise on the need to communicate.
L People are like fault-tolerant on the quality of those systems, but it's one of those super hard problems, it's funny. Sometimes the media doesn't do any favor because they're like "GPT-3's here and it's able to write whole articles". And then you go try it and it's very fantastic, but if you actually try to make it write without any human intervention, you'll just be laughing because it makes no sense.
Even if it constructs really interesting paragraphs, it's unable to keep its "line of thought" about the subject that you wanted to write about, which it deviates from. Some random tangents really well-written could be someone (a human), but it doesn't make any sense. It's tricky.
J And that has been one of the biggest issues with AI. You know, these computers that learn and will dominate the world. And then if you ask the practitioners, we're so far away from there, like we can't even envision how to get there. And there's a lot of really interesting talks about these. So for instance one talk that I thought was really interesting was about why AI wasn't dangerous.
Because AI is just trying to do a task. If you were able to implement a system that could self-reproduce physically and had the goal to basically survive, then it might become dangerous. But you're not training any AI to do that. You're just training AI to do translation.
But when you have this hype, people start having a lot of expectations and this always leads to the AI winters. There were a few of them. But then suddenly there's no investment and everything is bad. And you know, the thing is there have been so many things happening over the last 4... let's say 10 years, that a lot of applications of AI became actually useful to be used as a product they use.
They usen't to be used as a product and now they are. And at the same time, there were developments that put AI in the hands of everyone. So AI is becoming a commodity.
And I don't know if you remember, 4 years ago, all the hype was about chatbots. That was completely hype, we're not there. Because we don't know how to map the intent of a conversation and the consequences. So what you have is, you have glorified template systems like you have for the last 40 years.
They're still very useful by the way. The only part that is not true is that you have an agent that understands you and talks with you.
L That's a big switch case as I like to call it.
J It's a smarter switch. Let me give you another example: machine translation evaluation. So the new systems, like COMET from Unbabel or BLEURT from Google.
Before you had met measures, that would be lexical. So they look at the word, length of the word and measure how many words appear and are the same. This was BLEU. BLEU, METEOR, those have a lot of problems like, for instance, you could be saying the same thing with different words which made an appropriately correct translation: it would score zero. Or, you could have a translation with many similar words, but had the word "not", so completely different meaning, be very close.
So these new systems, because they don't do this, they take it to the semantic space. So they represent a sentence as a vector. So similar sentences are set to show similar vectors. So now these new systems can capture those things much better. You know, that was the progress.
L It's always very incremental. It seems that there is never like this crazy leap forward that you go 0 zero to 10.
J These are super hard problems. So this was only for the ability to relate to things, semantically that we do as humans, that was a leap forward.
And by the way, we don't know how we work ourselves. So we don't know how the brain works to even be able to model it.
L Or if we even have the right hardware to mimic our own hardware, biological hardware.
J I think that that will be easier. I think we can build better hardware than the one that we have here, I think it's the abstractions that we don't have.
L So, let me ask you something. What you were talking about, which is, the dangers of AI: is there a danger or there isn't? So if there is, in your opinion, what are the dangers of AI? If you have thought about that already.
J So I don't think there are dangers. I think there are opportunities. I think we're living in a world where we, as a society, can determine what we want. So let me give you an example. I don't think there's danger because I don't think there's any self-replicating AI system that can go and start creating their own society and decide they want to eliminate the human race.
There's nothing. They're not programmed for that. They do learn how to do one task, but I think it's very unlikely that the goal's system is going to decide that he wants to replicate because it's a computer. So let's remove the danger part because honestly, I don't think there is this.
Now what we have is we have a lot of AI systems taking daily decisions on the spot that can impact human lives.
L Yeah. It's a more realistic danger.
J Yeah. It's like self-driving cars. Or for instance, once we start going to war with drones that are controlled by AI, you know, it's not that the drones are going to revolt against the humans, but they're going to be making calls at a single point like "Who do we kill? Do we kill that person or do we kill that person"?
That is where I think they can make wrong choices and we need to be careful. How do we program those? What is your loss function? What is the error from missing that thing versus missing that thing? There's also an opportunity because for the first time we as a society can codify this. Because AI will not make individual choices in the sense of an individual like me, I'll make my choice on the spot. I'll make a call myself and then you will make a different choice. So each one of us has this ability to make our own choices.
When you have AI and you have 10 drivers, it's not going to be João or Lawrence who's driving. It will be the same AI that's reading from the same program where we as a society have codified. In the event that you have to kill one person because there's no other choice, that's a hypothetical event. And one is white and one is black, which one you wanna kill?
L One of the arguments of the danger is that AI can perpetuate certain stereotypes or certain biases within society right? That's been a lot of the conversation in the past 5-8 years, right?
So I guess what you're saying is that it will replicate what we do as a society, but then it can keep on pushing certain things that we don't actually want to keep on pushing, right?
J I'll get to the bias later. So the first one I want to make is that you now have a centralized point to make decisions, which we didn't have before.
If you ask the question like: "I have an older person, a younger person, the car has to drive (over) one. What do you do? I have a terrorist with a kid in their arms, but with a bomb. So if I kill the terrorist, I might kill the kid but I won't kill 500 people".
You know, all these things.. There's a point, there's a centralized point that's going to make a decision. You have control there. Until now you didn't. So that's where I think lies the opportunity.
Now the question is: I am saying these as if you could just write rules for every single situation. You can't. A lot of the rules are inferred from data and that's where the bias comes, right?
That's almost like an entire new episode: what to do with the bias? So I think that again as a society, we have the chance to remove some of the bias and removing the bias is easy. So that is the easy part. You can just look at the data, you can compute some statistics, you can see where the bias is coming from, and you can just add or change the weights on the learning algorithm, or you can replicate the data that you want to "unbias" and voilá. You have an unbiased dataset. So I think that is the easy question to answer. The hard question is what bias should society want to remove or not?
I was actually having a conversation with a friend about this and... Okay let me get through the controversial example which I don't know the answer to.
Let's say nowadays, you're a financial institution in a city where the black population is actually poorer. And so if you give a loan to a black person, you are in fact more likely to default than you're not. Okay, so this is the current situation. And now you have an algorithm that tells you exactly that. So there's a bias there. Now you might decide, or someone might decide that it's not fair to have that bias.
So you want to remove the bias from black people having a higher interest rate because they can default more.
First of all, who gets to make this call? Is it a committee? Is it the country? The state? Is it the bank?
Now when you make that call – this is an example, it's not the reality – if it's true that black people default more, when you basically put that constraint on the algorithm you're making the financial institution lose money. You're making a societal decision that will make a private entity lose money.
This is an example. It's pretty easy to say "Yes, but we need a positive bias, so we really want to do it". But then where's the limit? If you assume that you want to remove all bias, then basically what you're telling to financial institutions is like "You need to give credit to everyone without looking at anything". It's a flat rate. It's a 25% flat rate for everyone. But then what's going to happen is instead of some people having low rates, everyone's going to have the same rate and then the institution is going to start protecting itself.
And this, by the way, this happened in the UK with car insurance. They removed a feature that was discriminating towards, I think it was older people. And then what happened was like a lot of younger people didn't have money to pay the insurance, the car insurance, and they stopped having insurance with it became a problem.
So these unintended consequences of removing bias.
I think there's a much more deep conversation than the one that I'm reading a lot on the news about some of the biases. Because yes, they exist. Yes, some of them aren't fair. And we as a society have the opportunity to change it. Now, the question is where do you stop and where do you begin? You have to make a conscious call about what you want to remove and how you want to remove it. Does this make sense to you?
L It makes total sense. And it's a very hard question.
It's a question that the European Union is interested in knowing how to answer, right?
The thing is most if not all AI systems nowadays are deployed by private entities, right? It is private entities that have the most cash and the best researchers and the most, the most to gain from, right? Because they want to productize these solutions and then deploy them and they do so being a private entity.
So first, who is within those companies asking those questions. There aren't a lot of these companies with people asking that. You have the bigger ones, right? You have the FANGs, the usual suspects that, to a certain degree, will allow you to question it up to the point that it starts hurting the margins. And it's understandable, it's a business. But then the question should AI only be deployed when it clearly has a positive benefit to society. Right? So you can have an image recognition system that, regardless of bias, is looking at people on the street and is assessing threat levels depending on whatever data points the system decides to use, right? Your dress code, your gender, your age, whatever. And then you have the same sort of AI image recognition used to detect cancer.
So two very different applications of the same principle, but the purpose of that deployment is very different. Then who gets to decide, "You can deploy this, or you can deploy this"? And in my perspective, that's where I think we're getting there right now.
Let's pay a bit more attention to what systems are being deployed. What are the sort of outcomes that they generate and whether or not we want that to be put out there in our society.
But it needs to be, in my opinion, the governments, the institutions to kind of have this role to ask those questions and then maybe develop some regulations, some boundaries, otherwise we know what's going to happen. Private entities will want to maximize profits. And I think the danger of AI is precisely that. It's that you deploy it but then who controls those systems, right? Who gets to make the call at the end of the day of what is a bias and what isn't? And if it's very opaque, because it's private, so you don't have access to it.
It's a hard question for sure.
J So there's a lot to unpack on your statement. Let me just go back a little bit to where you started. So you started about who gets to decide and I agree with most of what you said. And this is a problem that has been solved before, you know, there's a lot of technologies that were developed that required some intervention. For instance, nuclear energy. There's a nuclear energy committee that decides who gets to produce nuclear bombs, nuclear power plants, because people realize that this is too dangerous to be used. And I think we need to have something like that.
Now, let's make no mistake. That is not fair, right? That committee is run by the most powerful countries, four or five. So, replace country with institution and you have pretty much the same. Take the example of Iran. Why can't Iran have nuclear power? Because someone who has nuclear power, who has nuclear bombs, has decided that they can't.
Now, I don't think there's a possibility of a world without something like this. This will always happen. So the same thing is going to happen to AI. Is it the companies? Is it a country? Is it the UN? Like how much do you control what people can do?
One thing that you hear a lot is like all this Facebook calamity. Like, what Facebook can do, what Facebook cannot do. And for me, I kind of understand the point and I think they could be more careful with their algorithms.
But one thing that people tend to forget: no one is forced to use Facebook. Facebook is a private company that offers a public service that people use on their own will. You don't have to. And then what they do is they sell advertisements. And the way it is monetized is by the number of times that people are looking at ads.
And so they are training an algorithm to maximize the time that you look at an ad to make some money. Now you might say: "Well, but they could do it for a better purpose. They could put things that are less controversial."
L If you leave it to companies, and you look at some of the history of companies that have business models that end up being against societal good for one reason or another, right?
It's kind of hard for them to self-regulate. And so there needs to be some sort of intervention, which I think it's going to happen. Europe is definitely interested in having some answers, at least some guidelines and some sort of regulation to some extent on how you can deploy and use AI for your business model.
And then we'll see what are the consequences of that. And one of the things that I also hope is that from within companies, technologists and also founders and everyone involved is able to make a decision to not use these solutions in a way that could harm groups, minorities or society at large. So that's what I'm hoping for.
Now, how do you do that? I guess it's by having discussions, bringing people together and just trying to solve this. Because it's not going to stop, you know, it's just moving forward, but we can move forward without knowing where we're going.
J And I agree with you that at some point there has to be some external intervention because you might be so closed in your inner circle that you don't even understand the harm that you're doing.
I think the point that I was making is that this is something that annoys me a little bit. It's the perception, sometimes, that some people have discussions that these companies own everything to society when... You know, for me, there's a motto, if you're not paying for the product, you are the product and you need to understand that because there's nothing bad with that.
Why do you need to understand it? Because you can just keep using Google, Google Maps, Gmail, you can't put all your life on a thing that costs a lot of money to develop and assume that that company is not taking anything on their interest for this. And I do think that a lot of these companies are... Most of them already give a lot of stuff for free that they could be charging. And sometimes I think you put too much weight on one of the sides of the scale. Now having said that if you have too much power, you need to be controlled in some way. The question again is: who controls?
L Yeah, we can also wrap it up, I think it was already a pretty interesting conversation, but it's exactly that. It's that these things... you need to be looking out for them because it kind of creeps on people, right?
Suddenly you realize five years from now "well this technology, this solution has really disrupted society" because it's so insidious and you just accept it and you start using it. Suddenly, it's like, well, that's the way it is now. If you don't have this then you cannot like, whatever, ride the subway or buy groceries.
And so we kind of need to step back a little bit as technologists. And that's why I also wanted to create the Critical Future Tech discussions. Just like step back, have a look at what you're doing. Have a look at what you're creating, ask some questions. Don't just blindly run towards the enticing complex problem.
Solve the problem but also ask yourself: what's the application of solving the specific problem, right? What are you, where are the unintended consequences maybe? And so for that, you need to kind of have a bird's eye view, maybe of society, maybe of other people. And just say: "if I do this, which seems to be the right way, the right choice, where are the things that I'm not seeing? What are the unintended impacts that I don't really know about?"
And one of the things that I've realized by talking with people here is that you need to bring other sorts of people. If you only talk with technologists, only with programmers or only with machine learning people, your opinion on things is going to be very narrowed.
And so one of the things is to bring other people from other parts of the industry, or even different industries, creative industries, psychologists, you know, like whomever. Have this conversation around technology and just have their say. I mean, that's a strategy I'm going for here.
J That's actually very interesting, because I always think about bringing more AI experts and their AI experts to the discussion but they're most likely going to say something similar to what I'm saying. So maybe get a different perspective from people who, maybe, don't understand technology, but are impacted by it.
L It was a pleasure having you here. We need to wrap it this way. Unfortunately, the internet is not participating today. I don't know why. But I'll guess we'll just wrap it up like this.
J Alright! Talk to you later, it was a pleasure. Bye-bye!
You can connect with João Graça on LinkedIn.
"Algorithmic tracking is ‘damaging mental health’ of UK workers" by Dan Milmo.
"The tech billionaire aiding the Facebook whistleblower" by Emily Birnbaum.
"How Digital Powers Will Reshape the Global Order" by Ian Bremmer
If you've enjoyed this publication, consider subscribing to CFT's monthly newsletter to get this content delivered to your inbox.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474737.17/warc/CC-MAIN-20240228143955-20240228173955-00599.warc.gz
|
CC-MAIN-2024-10
| 35,631 | 136 |
https://www.arxiv-vanity.com/papers/1302.6254/
|
code
|
Large deviations of Lyapunov exponents
Generic dynamical systems have ‘typical’ Lyapunov exponents, measuring the sensitivity to small perturbations of almost all trajectories. A generic system has also trajectories with exceptional values of the exponents, corresponding to unusually stable or chaotic situations. From a more mathematical point of view, large deviations of Lyapunov exponents characterize phase-space topological structures such as separatrices, homoclinic trajectories and degenerate tori. Numerically sampling such large deviations using the Lyapunov Weighted Dynamics allows one to pinpoint, for example, stable configurations in celestial mechanics or collections of interacting chaotic ‘breathers’ in nonlinear media. Furthermore, we show that this numerical method allows one to compute the topological pressure of extended dynamical systems, a central quantity in the Thermodynamic of Trajectories of Ruelle.
pacs:05.45.-a, 05.10.Gg, 05.40.-a, 05.45.Jn
In many physical systems, the typical situations are not the most interesting, and one is led to look for rare trajectories. For example, of all possible initial conditions of eight planets, only a small number lead to a stability comparable to the one of the solar system [1, 2, 3]. Exceptional configurations such as resonances and separatrices play an important role in this kind of system . Similarly, a study of the transport properties of almost-integrable systems requires the knowledge of chaotic layers that are extremely thin, because they are the structures responsible for the global diffusion mechanism [4, 5, 6]. Apart from being rare, often these relevant trajectories turn out to be unstable, a further source of difficulty. For example, unstable soliton and breather modes may be important factors in the transport of energy of Bose-Einstein condensates, and even macromolecules [7, 8]. Similarly, the phenomenon of intermittency, which has a profound effect in turbulent systems, is believed to be generated by localized spatial structures that appear and disappear in the flow .
Each physical situation will have one or more quantities whose large deviations are relevant. For example, for a rare ‘rogue’ wave, a quantity that is certainly interesting is its energy or its height, for a traffic problem the actual flow, and for a planetary orbit its eccentricity or inclination angle. Large deviations of Lyapunov exponents are a particular and important case, as has been recognized for years [10, 11, 12], which still attracts lots of attention from the dynamical system community nowadays [13, 14, 15, 16].
For a dynamical system defined by trajectories of -dimensional variables , consider an observable . We wish to study the trajectories such that, for example, . In particular, their total probability:
A more convenient object to study is the Laplace transform of
Note that is to what the inverse temperature is to the energy (density) in statistical mechanics: is nothing but a partition function in the space of trajectories and the large deviation formalism thus allows one to extend the static formalism of statistical physics to dynamical observables [10, 18]. It is thus natural to define
which plays the role of a free energy and
which plays the role of an order parameter, distinguishing between various classes of trajectories with markedly different values of .
Lyapunov exponents and their large deviations
Consider two nearby points and and their subsequent trajectories and in a dynamical system. The distance at long times will typically grow as
The quantity is a measure of the sensitivity to the initial conditions. Similarly, we may consider three non-colinear nearby points, and the two differences and . The lengths of and will grow as above, but we may ask about the area of the parallelogram defined by them. This defines a new exponent:
In general, for generic points and vectors , the -volume grows as:
The are the (finite-time) Lyapunov exponents 111To maintain the introduction as free of mathematical technicalities as possible, we reserve more precise definitions of (finite-time) Lyapunov exponents for section 7, whose large deviations will be the focus of this article. This means that we shall consider intervals of time , and the role of above will be played by, for example, . We can then classify trajectories according to the value of their first Lyapunov exponent and construct the probability distribution:
and the corresponding moment- and cumulant-generating functions
and their generalizations to higher Lyapunov exponents.
At this stage one may ask what is special about large deviations of Lyapunov exponents, that this should merit a separate article. There are a number of reasons why we think this is so. To begin with, it is clear that Lyapunov exponents are a measure of chaoticity, and rare trajectories having unusually low or unusually high values will represent havens of stability (important for, e.g., planetary systems), or chaotic bursts. We shall see several examples of this below.
The sum of the positive Lyapunov exponent is also related (via Pesin’s theorem [17, 18]) to the Kolmogorov-Sinai entropy: a space-time quantity ‘counting’ the number of typical trajectories, a useful measure of the geometry of the system.
Another important measure is the dimension of attractors. These are related to the cumulative Lyapunov exponents . Consider the value of such that and . The dimension of the attractor has to be intermediate between and , so that a volume element of the attractor advected by the dynamics neither overflows nor contracts on it: the precise value is encoded in the Kaplan-Yorke formula [17, 18].
An even more specific property of Lyapunov large deviations is that it allows us to pinpoint important topological features in the dynamics. For instance, the family
is related to normally hyperbolic invariant manyfold (NHIM) with unstable directions . These are manifolds which are unvariant under the dynamics and whose normal directions have the structures of saddles, with exactly unstable directions. To see this, consider an overdamped Langevin dynamics with very small noise. Computing amounts to selecting trajectories that emerge from a saddle point with exactly one unstable direction (see figure 1), the changes in distribution due to the acceleration or deceleration along the trajectory is exactly compensated by the factor . All degrees of freedom but one lie at the bottom of energy wells and has stabilized the unstable manifold emanating from a NHIM with one unstable direction. Similarly, computing , where we bias with , exactly compensates the area variations incurred when leaving from a saddle with two unstable directions, all other degrees of freedom again lying at the bottom of energy wells. In general, computing , the bias with , stabilizes the -dimensional unstable manifold emerging from critical points with unstable directions. What we have described is the basis of the relation between supersymmetry and Morse theory ([20, 21]), expressed in the context of stochastic equations. For dynamics more general than purely dissipative, the structures stabilized by are not restricted to unstable manifold emerging from critical points, as we shall see below for Hamiltonian dynamics.
Another area where fluctuations of Lyapunov exponents are expected to play a crucial role is that of intermittent dynamics. In such cases, the coexistence in phase space of trajectories with different chaoticities can be seen as the signature of a first order phase transition. Measuring the free energy and order parameter in intermittent system is thus an important challenge. To understand why intermittency can be related to first order dynamical transitions, consider the following example. Suppose there is a metastable structure, with a lifetime . Within this structure, the largest Lyapunov exponent takes an average value . On the other hand, the average of over the typical trajectories (the stable attractor) is, say, . We wish to calculate the large deviation function , and to estimate which trajectories contribute (see ). If , the trajectories that belong to the metastable structure will be favored by the bias in the measure. The quantities and are the biases per unit time attributed to trajectories in metastable and stable basins, they have dimensions time. This bias is compensated by the time of escape from the metastable state , so that the condition for the trajectories in the metastable state to dominate the large deviation computation is:
If is extensive, and the metastable state is rather stable ( is large), the transition takes place close to . It will be sharp, and first order.
In what follows we shall present several applications of the Lyapunov Weighted Dynamics (LWD), a cloning algorithm that allows to simulate a population of trajectories (or clones) with a biased measure . We will briefly review the numerical method in section 2 while the technical details, the underlying formalism and its extension to the case of several Lyapunov exponents are presented last, in section 7, to make the article more readable.
Then, we will show how the LWD can localize tiny regular island in almost completely chaotic systems (section 3) and detect the disappearance of the last regular islands steming from the Lagrange points in the restricted gravitational three-body problem (section 4). We will then show in section 5 that regular Hamiltonian systems develop positive Lyapunov exponents when perturbed by a weak, additive noise and that trajectories with atypical Lyapunov exponents are localized on interesting objects such as separatrix, degenerate tori or unstable manifolds. We will then turn to systems with large number of degrees of freedom, showing that trajectories with atypically large th Lyapunov exponent in the Fermi-Pasta-Ulam chain typically involve chaotic breathers (see section 6.1). Last, we will show in section 6.2 that the LWD allows one to compute the dynamical free energy and order parameter in one-dimensional coupled-map lattices.
2 Lyapunov Weigthed Dynamics - presentation of the algorithm
For sake of clarity, let us consider a given one-dimensional stochastic dynamical system
where is a complicated function that contains some noise terms. Let us call a parameter controlling the noise intensity so that is the deterministic limit of the system. To compute Lyapunov exponents, one also need to consider the linearized dynamics
From the solution of (13), one can then compute the largest Lyapunov exponent
The LWD is a population Monte Carlo algorithm whose purpose is to sample trajectories according to a modified measure so that a trajectory with a finite-time Lyapunov exponent is sampled with a probability
where is the probability to observe the trajectory with the unbiased dynamics (12). The algorithm was introduced in and briefly reviewed in (see also where it was used to localize atypical trajectories in convex billiards). It is presented in full details in section 7.3 after a quite extensive discussion of the underlying formalism at the beginning of section 7. Nevertheless, before we present several applications of the algorithm in the sections 3 to 6, we briefly present the method below and try to give hints about why it is efficient and where are its pitfalls.
The clone is then replaced, on average, by copies. If the dynamical system were deterministic (), all the copies would then follow the same trajectory and a given clone would yield, after a time , a total number of copies given by:
If one were to pick a clone at random in the population at time , the probability to choose a trajectory would thus be proportional to , where is the probability that the dynamics (12) produces the trajectory . This thus results in the biased measure (15). Of course, simulating many times the same trajectory is not enhancing the quality of the sampling and will not reveal any rare trajectories that brute-force sampling would miss. This is where the stochasticity of comes into play: when , all copies of a given clone made at a time will follow different trajectories for . Since the cloning is larger for trajectories that carry a large weight, their vicinity is well sampled by the algorithm. Conversely, trajectories with small weights rapidly die out and no computing power is spent on their simulation. In practice, there are some differences—mostly due to numerical efficiency—between the LWD and the algorithm presented above (for instance, the number of clones is kept constant in LWD), which are detailed in section 7.3.
In various parts of this paper, noise is not part of the original problem, and it is added only to let the different clones diffuse independently, to enhance the sampling of the algorithm. In those cases, the level of noise has to be taken as small as possible and one should ensure that the limit is not singular. Finally, can be taken to zero at the end of the run to check that the atypical trajectories that have been discovered are indeed solution of the equations of motion of the original system.
When the system conserves energy, it may be desired to search for trajectories within a specified energy shell – and the same can be said of other constants of motion, if present. It is then useful to consider energy-conserving noise. This may be implemented in a number of ways, such as rotating the velocity vector randomly, or, more generally proposing a small random change of the coordinates and projecting them back onto the energy shell (see A for a momentum- and energy-conserving noise in Hamiltonian systems).
The values of and play roles analogous to the inverse temperature and the step size in a standard Metropolis Monte Carlo programme. If is too large, the system may stay trapped in a locally favoured but globally non-optimal situation. If is too small, the noise might make the system miss a convenient but small structure. The same is true about the noise. Too small a noise makes the programme run very slowly, as the clones do not have time to evolve differently, and the selection process is inefficient. Too large a noise makes the system miss structures that are dynamically unstable: this is quite crucial when one is dealing with highly chaotic systems.
Last, one of the most difficult parameter to choose is the number of clones used in the simulations . Typically, small numbers () will suffice to locate atypical trajectories (say an integrable island in a chaotic sea) whereas much larger populations may be needed if one wants to compute accurately the averages or (see section 6.2 for a discussion of the convergence of the algorithm as ).
3 Testing the chaoticity of a system
An interesting question in dynamical systems concerns the existence of smooth potentials having completely chaotic, fully ergodic dynamics. A candidate for this was for many years the Hamiltonian
The expectation actually turned out not to be justified, as was proven by Dahlqvist & Russberg , who managed, using an elaborate strategy, to find a tiny (area ) regular island.
This seems like a good benchmark case to test the Lyapunov Weighted Dynamics . In order to select low-Lyapunov trajectories, we use LWD to bias the measure on trajectories by with and the largest Lyapunov exponent.
The energy may be taken by rescaling to be . A small amount of noise is added to the dynamics, which rotates the vector by a random angle with typical value , where is the integration step, and controls the amplitude of this energy-conserving noise. As the simulation proceeds, it is slowly taken to zero, much in the same way as in standard simulated annealing. Starting from a random point, the program falls in a few million steps in the island found by Dahlqvist et Russberg, which shows that it is a relatively large target for the programme. We next try to find a new island, but for this we have to avoid falling there. This may be easily done by killing all walkers that enter a region including this attractor (for example, the rectangle and ).
When this is done, the clones find a new island, with area of the order of . A trajectory within this island is depicted in figure 2. One knows that an island has been found by monitoring the finite time Lyapunov exponent (cf. figure 3): the beginning of the familiar regime is a signal that the Lyapunov is approaching zero . Note that this strategy works in all dimensionalities, and that it requires no special knowledge of the system. Let us note that the noise amplitude (here ) has to be small enough that the clones do not “step over” the integrable island in one time-step. The smaller the island one wants to detect, the smaller should be—whence the aforementioned annealing in done in the simulations.
4 Stability of the Lagrange points L4 and L5
Consider the restricted gravitational three-body problem (see e.g. ), with two rescaled masses and (e.g. Sun and Earth), and a small third body of negligible mass (such as a satellite or asteroid).
When the large bodies are moving in a circular orbit, there are points where the small mass may be placed such that in a rotating frame the three bodies are seen as stationary. These are the so-called Lagrange points L1-L5, of which L4 and L5 are stable. When the trajectories of the large bodies are elliptic, with an excentricity , they are not anymore stationary in this rotating frame, but Lagrange points still exist. For instance, when and are sufficiently small, it turns out that the vertex of the (time-dependent) equilateral triangle defined by the three bodies is a stable trajectory where the small mass moves in phase with the large masses. Many works starting from the one of Danby where devoted to studying this situation.
Denoting the positions of the larger bodies in the rotating frame and , and normalizing lengths and times so that the period of a circular orbit is , the Hamiltonian for the smallest particle in the rotating frame is:
with providing the Coriolis force and .
When the orbits of the large bodies are circular, and . When , and are obtained by solving the Kepler problem; the larger masses librate around and with an amplitude that is larger for larger excentricities. In both cases, the Hamiltonian (19) is the only constant of motion. This means that the restricted two-degree of freedom problem, where the small particle moves in the same plane as the large ones, is not integrable. It is, in fact, a mixed system with both regular and chaotic regions, the former containing the Lagrange points L4 and L5. When the eccentricity increases, or when the masses become comparable, the system is further perturbed by the apparent motion in the rotating frame of the large masses. The effect is to reduce further the regular islands. In particular, the regular regions containing L4 and L5 shrink and develop resonances, until they eventually disappear.
We have used the LWD to find the part of the plane where regular regions still exist around and . We have used a population of 100 clones and applied a strong bias (), favoring stable orbits. We used such a strong bias because as soon as the clones leave the regular vicinity of the Lagrange points, they quickly diverge to infinity and have a zero probabilty of coming back. A strong bias thus ensures that some clones will always remain within the integrable region. Just as in the previous section, the noise required to use LWD is provided by rotating the velocity by a weak random angle at each time step, thus conserving the Jacobi constant (19). The typical value of this angle is weak: , and it allows the different clones to search for the best situation. For each value of , we start all the clones at the Lagrange point L4 and adiabatically increase the eccentricity ( with ), until none of the clones is able to remain in the integrable islands and they all diffuse to infinity. This yields the first value at which the islands around L4 disappear. We have checked that the results do not depend on the parameter , as long as it is much smaller than all typical time derivatives in the natural dynamics (which are of order one). Note that such a protocol does not give access to the re-entrant part of the stability region (rightmost gray part of the figure). In order to obtain the two isolated points on the figure, we slowly increased not only but as well so that these points correspond to the first time the clones leave the integrable island. In this way we have obtained automatically (and blindly) the stability region of figure 4. Using a linear stability analysis of and , Danby was able to predict a lower bound of this stability region, which is very close to the one we observe numerically. This suggests that the regular region surrounding and quickly disappears when they become linearly unstable.
5 The case of integrable dynamical systems
5.1 Stochastic perturbation of integrable systems
An integrable system has obviously all its Lyapunov exponents equal to zero. However, a somewhat surprising fact is that if we perturb such a system with a weak, additive white noise, it acquires a non-zero Lyapunov exponent, defined as the rate of separation of nearby trajectories subjected to the same noise realization.
Let us consider first a problem with one degree of freedom. For example, for the Hamiltonian
the equations of motion, once the perturbation is added, read:
Here, is a white noise with variance . For small , energy drifts slowly, and one may prove that there is exponential separation of trajectories along the line of constant energy, induced by the noise . The origin of this surprising phenomenon is that noise allows some trajectories to move into a faster moving orbit of slightly higher energy, and then come back, a phenomenon that is related to, but distinct from, Taylor’s diffusion in hydrodynamics . It is, on the other hand, quite different from the usual form of ‘Noise Induced Chaos’, which is originated by the noise-induced occasional visits a system makes of unstable chaotic regions , there being in our case no chaotic regions at all.
Clearly, for a harmonic oscillator the present mechanism cannot work, as all orbits have the same period, regardless of the energy. As we will show elsewhere , when the variance of the noise , the diffusion occurs mostly tangentially to the tori on time-scales up to . The induced divergence of two nearby trajectories is exponential and the corresponding Lyapunov exponent can be computed explicitly :
where and are the action and angle variables of the problem, is the frequency. The variable is, in the absence of noise, a periodic function of , the overbar in (22) denotes average over a cycle of the noiseless dynamics. The Lyapunov time is proportional to , while the diffusion away from a torus takes times of order : for small there is then a wide range of times where the definition of a Lyapunov exponent associated with a torus makes sense.
An interesting limit of equation (22) corresponds to the approach of a separatrix of energy , where the frequency vanishes. One may easily check that, quite generally, in terms of :
Hence, as one may have expected, the Lyapunov exponent becomes large as one approaches a separatrix, on which it becomes larger than .
5.2 The special case
In order to see what kind of structures dominates the dynamical partition function , let us consider a system of two degrees of freedom that consists of a cartesian product of two systems of one degree of freedom. In figure 5 we show the result of LWD for a cartesian product of two double wells , with additive Gaussian white noise of variance :
This system has two normally hyperbolic invariant manifold (NHIM) with one unstable direction defined by for the first one and for the second one. They correspond to the cartesian products between the flat measure 222Note that (25) is the limit of a Kramers equation with friction and temperature when and with constant. Without cloning, the steady-state measure is thus the infinite temperature limit of a Boltzmann weight, i.e. the flat measure. over one double well and the saddle point of the other double well. It also has one NHIM with two unstable directions defined by which is the cartesian product of the two saddle-points. The walkers are biased to search for trajectories with either an atypically large ( and ) or an atypically large sum (, ).
When we bias the walkers with , we stabilize the unstable manifold of one NHIM with one unstable direction: the clones are localized on the separatrix in one of the double wells while they diffuse freely in the other one (since the noise does not conserve the total energy). On the other hand, stabilizes the unstable manifold of the NHIM with two unstable directions, i.e. the cartesian product of the two separatrices.
5.3 The most regular trajectories ()
As already mentioned above, choosing is such that the walkers populate the separatrix uniformly: the stretching and compressing in times of acceleration and deceleration are exactly compensated by the cloning rate . In the following we consider the converse case with .
In a Hamiltonian system, the motion in a regular region is constrained to a torus, labeled by the constants of motion , and spanned by the dynamic curves . By changing the values of the , one moves to different nested tori. Consider for definiteness a system with two degrees of freedom with two constants of motion and the corresponding angles which span the two-dimensional surface of the torus. The innermost of these tori reduces to a ring, spanned by only one of the two angles, say . In the vicinity of this ring, the dynamics of generically reduces to a harmonic oscillator. In mixed systems, such a degenerate trajectory corresponds to the center of an integrable island.
Let us now show how the LWD can be used to find such a degenerate structure. As shown in section 5.1, the noise-induced Lyapunov exponent in integrable systems come from the anharmonicities that make . This may be seen in equation (22) by checking that in the case of a harmonic oscillator, for which , the Lyapunov exponent vanishes. Looking for the trajectory with the smallest Lyapunov exponent in the presence of noise, amounts in fact to looking for the “most harmonic” of trajectories. In the case of nested tori, this generically corresponds to the innermost trajectory, which is degenerate.
As an example, consider the restricted three-body problem with and the large masses performing circular orbits. As mentioned above, the system has many regular islands, that correspond to non-chaotic orbits, many of which have been classified . Figure 6 concerns one such regular island: the typical trajectories in there, such as the red one, are rather complicated in real space. Now consider the degenerate “innermost” torus in the island, in black: it corresponds to the “flower” structure which is stationary in the rotating frame. Indeed, we recognize every other regular trajectories of the island as essentially this trajectory, with, in addition, librations of this basic pattern. Clearly, even for analytic purposes, it seems useful to be able to locate such a structure. (Their role is, by the way, reminiscent of the role played by “inherent structures” in glassy problems where all the vibrational motion is eliminated by treating as single configuration all points belonging to a same basin of attraction of the zero-temperature dynamics). Furthermore, while it is possible to “guess” that the red trajectory of figure 6 corresponds to librations around the black one, this would be impossible in higher dimensions while the LWD would nevertheless have no trouble finding the proper degenerate trajectory. Figure 7 shows, for the example above, the clones migrating to the center of an integrable island, when selected for low Lyapunov exponent.
Higher dimensional structures may be selected for an integrable problem with more degrees of freedom. For instance, minimizing the sum of the smallest positive exponents leads to tori that are times degenerate (i.e. they are dimensional). These considerations might be interesting to apply to extended integrable systems, such as the Toda lattice, because it might give a method to construct soliton solutions.
6 Spatially extended systems
6.1 Fluctuations of several Lyapunov exponents: the Fermi-Pasta-Ulam chain
Let us now turn towards spatially extended systems and enter the domain of condensed matter by considering the Fermi-Pasta-Ulam-Tsingou chain defined by the Hamiltonian
with . This corresponds to a chain of particles coupled with anharmonic springs. In the limit, the system is integrable and the chaoticity increases as and increase . In this paper, we consider the case and . In previous studies [24, 25] we showed that biasing this system in favor of chaotic trajectories reveals chaotic breathers, whereas regular trajectories correspond to a gas of solitons propagating ballistically through the system. The unbiased case corresponds to a mixture of short-lived solitons and breathers superimposed with thermal fluctuations.
Two questions arise naturally when considering spatially extended systems. First, what happens when we consider Lyapunov exponents beyond the largest? Second, how do the fluctuations scale with the system size? Answering the latter in the FPU case is a difficult task since even the average values already converge very slowly with the system size . Below, we thus address the former question. When using the LWD to sample the large deviations of the Hamiltonian dynamics associated with (26), we use the energy- and impulsion-conserving noise described in A. Since the chaoticity of the FPU chain depends on the energy of the oscillators, it is indeed quite important to prevent the system from decreasing its chaoticity by either decreasing its total energy or by using all its energy to create a uniform rotation of all the oscillators.
In it was shown that above a certain energy, a modulational instability of the FPU chain leads to the formation of a chaotic breather: the energy condensates on a small number of degrees of freedom and the largest Lyapunov exponent increases substantially. In we showed that these chaotic breathers are the trajectories that contribute the most to for large positive .
As we can see in figure 8, the appearance of a chaotic breather creates a gap in the Lyapunov spectrum, with the largest Lyapunov exponent increasing by a factor 5, and the second one by a factor 2. The plot of figure 8 includes cloning and noise, so that one may think that the individual trajectories differ completely from the underlying FPU dynamics, but this is not so: using the positions and momenta of a given clone as an initial condition for a numerical simulation without cloning and noise shows that the breathers are indeed a proper solution of the FPU chain. As explained in the introduction, the cloning simply stabilizes a metastable solution of the equations of motion. Since clones are constantly killed or copied as time goes one, one could be surprised that the trajectory in figure 8 does not show clear cloning events where, for instance, the breather would suddenly disappear and reappear few hundreds of site further. This can happen but is quite rare because, once a breather has been found, all the clones in a small population tend to be very similar. This “degeneracy” of the clone population, that sample the vicinity of one interesting trajectory while many exist, is one of the reason why in section 6.2 we will need much larger population to accurately compute the average .
The few first tangent vectors are localized on the breather, and one can thus wonder what happens when we require that other Lyapunov exponents be large. Either some internal degrees of freedom of the breather can be excited, leading to an increase in Lyapunov exponents beyond , or the system may divide the energy of the breather into several breathers, each of them corresponding to one atypically large Lyapunov exponent. A trajectory containing breathers is thus a natural candidate for large deviations of the first Lyapunov exponents but, as was shown in , the breathers have a tendency to merge upon collision which makes multi-breathers solution unstable.
As we show here, the breather-breather interaction is actually more complicated and multi-breather solutions indeed exist. In figure 9 we show that biasing with and favors the appearance of two breathers. Another Lyapunov exponent, , increases and the gap is now between and . The same is true for and that generate solutions with 3 or 4 breathers (see figure 9). A large also implies a large since by construction. Using and can thus also produce two breathers. However, as can be seen in figure 8, a single breather already has a larger so that either one- or two-breather solutions dominate the biased measure depending on the value of and . In practice, to maintain a small cloning rate and nevertheless be sure of seeing two breathers, we used and increased .
The question as to how one transitions from typical profiles (homogeneous for ) to atypical ones (with breathers for large enough ) is an interesting one. In particular, it would be interesting to know whether there is a phase transition for critical values and if so how the s scale with the system size. This is left for future work and we shall only here prove that the method can indeed single out atypical trajectories in spatially-extended systems.
Interestingly, it was reported in that the formation of a single breather starting from a short wavelength perturbation of the homogeneous state relied on the merging of breathers upon collisions. The only way to observe a multi-breather solution thus seemed to have a system large enough that two breathers would not have the time to meet during their life time. If that was the case, the solution presented in figure 9 would thus be artefact due to noise and cloning. To check that this is not the case, we pursued the simulations without noise and cloning, and found that the breathers indeed remain (meta)stable, even after encounters. This revealed a great diversity in breather-breather interactions, as plotted in figure 10. In addition to the coalescence reported in , the breather-breather interaction can also be repulsive, the breathers turning back before colliding, or they can simply cross each other with little energy exchange.
To conclude, multi-breather solutions thus exist and were not detected previously in the literature due to the difficulty of finding the proper initial conditions. This is here unessential thanks to the clone dynamics which automatically locate these highly aptypical trajectories 333We thank the anonymous referee for suggesting this synthetic summary..
6.2 Large deviation functions: the example of coupled maps
Beyond the detection of rare trajectories, one may be interested in measuring their actual probability of occurrence. Many systems exhibit intermittency, and show an apparent metastability in space-time of trajectories of different chaoticity levels. The construction of the cumulant generating function gives access to a free-energy like quantity that allows one to export the language of phase transitions to such dynamical phase coexistence . For instance, the average Lyapunov exponent in the clone population plays the role of an order parameter since it is the first derivative of the dynamical free energy :
As far as we know, the cumulant generating function of Lyapunov exponents has only be computed for low dimensional models, such as maps of the interval , with the notable exception of the Lorentz gas [40, 41, 42]. Recently, Vanneste extended the algorithms introduced in to compute the generating function of the Lyapunov exponents of products of random matrices . He showed how the cloning method helps reducing the variance of estimators based on finite number of clones and computed the large deviation functions for products of small random matrices (up to ). Here we show how the LWD can be used to compute the cumulant generating function of a spatially extended dynamical system: a one-dimensional lattice of coupled skewed tent maps (CSTM) .
We consider real variables whose discrete-time dynamics are given by
When , all the maps are uncoupled and fully chaotic. The stationary measure is uniform and all Lyapunov exponents are equal to
When is increased, the maps become locally coupled and the dynamics are made more regular by the diffusion terms, whence a decrease of the Lyapunov exponents (we use and in the following). This system is a good test for our method because it is simpler to simulate than continuous time dynamics and its Lyapunov spectrum converges quite rapidly when increases (see figure 11), compared to more complicated systems such as the FPU chain of section 6.1. Furthermore, we may check whether our algorithm allows us to go beyond the existing works on the fluctuations of Lyapunov exponents in coupled-map lattices, which have been limited to the study of the Gaussian regime .
To compute the Lyapunov exponents, we need to linearize the dynamics (28) to determine the time evolution of a tangent vectors :
Again, to use the LWD we will need to make (28) stochastic. To do so, we use the shift
where is a random number sampled uniformly in , set the scale of the noise and makes sure remains in for . We then replace by in (28). The “noise” (32) is clearly not the Gaussian white noise discussed in section 7 for Hamiltonian dynamics. One thus has to be careful and check that the observed fluctuations of Lyapunov exponents do not depend on the details and intensity of the noise (see below).
We first use brute-force simulations for to estimate the Gaussian scaling of the fluctuations of and check the effect of the noise (32) on the fluctuations of the coupled maps. After an initial run of 500 time-steps, the Lyapunov exponents are computed over the next iterations of the maps. For simulations, figure 12 shows that the pdf is well approximated by a Gaussian :
Note that the standard deviation of is , showing that these simulations do not allow to sample very far from the average value. Nevertheless, figure 12 shows the beginning of the large deviations regime since there seems to be a small but systematic asymmetric deviations from the Gaussian approximation when . Importantly, simulations with levels of noise and show no difference in , so that will thus be used in the following.
From the Gaussian approximation, one can construct a quadratic approximation to
Similarly, the value of the Lyapunov exponent that dominates the biased measure for a fixed value of is approximated by
One can then compare the Gaussian approximations with and obtained using the LWD of section 7.3. The simulations in figure 13 were obtained using varying numbers of clones, from to . For each value of and , and were obtained by averaging over 10 runs of clones. For the convergence with the number of clones is very fast, the difference in between and for is less than . For , the convergence with is slower when gets larger. To estimate the speed of convergence, one can check for which value of the difference between the estimators of for and clones goes above . One gets for and . The estimators for , , and always remain within , , and of the values obtained for . The same simulations done with different noise intensities ( or ) lead to the same asymptotic values for and when , though the convergence rate is slower at smaller noise intensities (see figure 14). For , the difference between for the three noise intensities is smaller than for whereas it goes up to at .
Let us highlight here that the number of clones used to compute is much larger than what was used in section 6.1 to detect the breathers. This is mostly due to the fact that in section 6.1, we simply wanted to detect an atypical trajectory, without quantifying its rarity, whereas in this section we aim at computing averages that require sampling over many different trajectories. There is no obvious rule as to when a large number of clones will be needed to compute (for the convergence is very fast, for instance). Also, many tricks exist in the literature for Sequential Monte Carlo simulations (see and reference therein) that could/should probably be extended to the LWD to speed up the convergence of the algorithm.
In figure 13 we see that the LWD indeed samples far beyond the Gaussian regime: the values of vary over an interval of order whereas was less than of . Let us also note that the deviations from the Gaussian scaling are more clearly seen in than in . This can be understood because the latter is nothing but the integral of the former. Since is quite small ( here), we need a large interval of for the error on to have an impact on . Nevertheless, it is quite reassuring that our simulations agree with the Gaussian scaling when .
Since there are neither analytical nor numerical benchmarks for our computations of and , we compared the results obtained using two different types of cloning algorithms. We used both the methods described in the core and at the end of section 7.3, that use resampling of the clone population respectively clone-by-clone or globally. Both methods gave similar results, the clone-by-clone method (which we generically refer to when we speak about LWD) being substantially faster that the global resampling scheme. We have thus shown that LWD can be used in spatially extended systems to compute the cumulant generating functions beyond the Gaussian regime. This now opens the way to systematic studies of the dependence of and with the system size, which should allow us to discuss the possibility of dynamical phase transitions separating different scalings with the system size of the exponents fluctuations.
7.1 Definition of finite-time Lyapunov exponents
Let us consider a system evolving under Hamiltonian dynamics, which can be written in a concise form
The Lyapunov exponents characterize the exponential convergence or divergence between two nearby trajectories. They are usually defined by considering the linearized dynamics of a tangent vectors :
There are two ways of defining finite-time Lyapunov exponents. For a given trajectory, let us call the matrix solution of the linear equation and the first eigenvalues of . We then obtain a first definition of the finite-time Lyapunov exponents as
Alternatively, one can look at a -volume and define
which thus corresponds to the exponential growth in the th dimension of the -volume . In the limit , for generic choices of the vectors , both definitions coincide, although they generically differ at finite time. Expression (38) is more satisfactory because the exponents do not depend on the choice of the s, but (39) is much simpler to implement numerically. The method developed in this paper uses a Gram-Schmidt orthogonalization procedure that relies on definition (39), but it would be interesting to see how the fluctuations of finite-time Lyapunov exponents differ using definition (38). A natural way to do so may be to use the recent algorithms introduced to compute covariant Lyapunov vectors [44, 46].
Let us note furthermore that both (38) and (39) explicitly depend on the choice of trajectory around which the linearized dynamics (37) is studied, and hence we could/should write . For non-ergodic systems, even the long time limit still depends on whereas for ergodic systems Osedelets ergodic multiplicative theorem ensures that adopts the same value for (almost all) . In the following we drop the dependence on but one should remember that it is an important source of fluctuations of .
whose dynamics can be inferred from (37)
One directly checks that so that the s remain orthogonal if they were chosen so at . Furthermore, , since an exterior product involving twice the same vector vanishes.
Let us then introduce the inner product
to express the norm of through so that the time evolution of is given by
All terms in parallel to vanish, yielding
We thus have to compute a sum of determinants of the type
where we have introduced the unitary vectors whose evolution read
Finally (45) can be solved to yield
One can thus rewrite (39) as
This formalism may seem complicated but (46) simply yields the continuous time evolution of the Gram-Schmidt vectors , while the defined in (48) can be computed using the rescaling factors that appear in the renormalization steps of the Gram-Schmidt procedure. This procedure indeed corresponds to evolving unitary vectors initially chosen orthogonal with the tangent dynamics
At every time step we re-orthogonalize them and normalize them, calling the rescaling factor of . Then, when , the dynamics of tends toward (46) and
Let us now show how this formalism allows us to sample the large deviations of Lyapunov exponents.
7.2 Large deviation formalism
In general, one needs different levels of control of the details of the algorithm depending on whether one wants to compute a dynamical free energy (or topological pressure) or simply look for atypical trajectories. One important point is that for the simulations, it is always necessary to add a small amount of noise to the system. We shall assume that this is the case below, but one should remember that in some cases the noise is simply an artifact and has to be chosen as small as possible. We thus consider a slightly different version of the dynamics (36):
where are unitary Gaussian white noises. To compute the dynamical partition function
we first need to define the average . In deterministic dynamical systems, finding a putative stationary measure is difficult and the addition of a Gaussian white noise simplifies drastically the situation. For instance, (51) would lead to a flat measure over the whole phase space, while considering a stochastic force acting tangentially to the energy surface would make the microcanonical measure be the correct steady-state (see A). In the latter case, the average (52) then amounts to choosing the initial conditions uniformly over the energy surface and averaging over the noise realizations.
From the mathematical point of view, the addition of a small noise changes the nature of the system. The question as to whether one recovers, in the small noise limit, the steady-state measure of the underlying deterministic system dates back to Kolmogorov (see ). This question of “stochastic stability” is actually a natural way for a physicist to define the steady-state measure of a dynamical system, and it is thus fortunate that when SRB measures exist, they can indeed be recovered as small noise limits of stochastic dynamical systems (see for a proper mathematical presentation of this procedure).
7.2.1 Largest Lyapunov exponent
For simplicity, we first consider the large deviations of the largest Lyapunov exponent and later generalize the formalism to fluctuations of several exponents. Furthermore, we will use the Gaussian noises introduced in equation (51) and discuss in A how to proceed with conserved noises. The probability density obeys a modified Liouville equation 444Derivatives apply to everything on their right when they appear as operator, as in , and not when explicitly applied to a function, as in .:
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655889877.72/warc/CC-MAIN-20200705215728-20200706005728-00393.warc.gz
|
CC-MAIN-2020-29
| 47,382 | 126 |