url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
http://gaurav.ca/
code
A tribute webpage made as a project for my full stack development course for freecode.View An android calculator app build using material design principles which perform most basic calculator functions.View SMS Info System (SIS) allows users to be able to get important information without the need for any data connection.View An application that allows users to view coding bootcamps close to their location or close to the zipcode entered. Are you attending?View A Simple weather app that allows you to view 5 day forecast as well as current weather.View The Smart Cane is a cane that is smart enough to detect obtacles for users and provide haptic feedback to the user based on how close they are to them using the Haptic feedback System.View "The value of beauty and inspiration is very much underrated, no question. But I want to be clear: I'm not trying to be anyone's savior. I'm just trying to think about the future and not be sad." - Elon Musk Here I will talk a little more about myself in general. I recently graduated from McMaster in Software Engineering. I previously attended Sheridan College for Computer Engineering. I am very goal oriented, a great team player and love to solve real world problems. I feel like we should always look for something new in our everyday life. For me being able to get up every morning and work on projects which allow me learn something new every morning is very important. Creation of any kind excites me. I am extremely tech-savy and love to follow up on new gadgets. Some of my other interests include Watching Movies, TV-Shows, Hiking, Travelling and Music.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991650.73/warc/CC-MAIN-20210518002309-20210518032309-00448.warc.gz
CC-MAIN-2021-21
1,612
8
https://crypto.stackexchange.com/questions/2572/how-can-we-find-public-key-have-only-8-or-16bits-how-many-messages-does-eve-nee
code
Suppose Alice sends messages to Bob by encrypting the messages with Bob's public key. Eve knows that the data is encrypted using RSA, but does not know the public key. Can Eve figure out the public key just by observing the encrypted messages? And if so, approximately how much data would it take for Eve to discover the public key? If we know that the public key has only 16bits. It's have over 6500 primes smaller than 2^16. How long we can find the public key ?? speed : 1.000.000 cal/s.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102637.84/warc/CC-MAIN-20231210190744-20231210220744-00164.warc.gz
CC-MAIN-2023-50
490
5
http://lists.mplayerhq.hu/pipermail/ffmpeg-cvslog/2006-March/003332.html
code
[Ffmpeg-cvslog] CVS: ffmpeg/libavcodec/i386 h264dsp_mmx.c, 1.15, 1.16 Wed Mar 8 11:39:16 CET 2006 On 3/8/06, Rich Felker <dalias at aerifal.cx> wrote: > On Sat, Mar 04, 2006 at 11:31:47PM +0200, Ismail Donmez wrote: > > Maybe off topic but linux kernel recently dropped support for gcc < 3.2 , it > > might be worth to reconsider gcc 2.95 support in ffmpeg too. > Yes and as we all know Linux sucks... > > P.S: No flamewar intended > Bad idea suggesting this then... :) Somehow, I see it logical to have someone having an old distro (let's say RH 7.0) and wanting to build a recent userland app, like FFmpeg from CVS... On the contrary, having an old distro and upgrading to latest 2.6 seems quite a more invasive task as it requires to upgrade the a fair deal of core apps which gravitates around the kernel. So IMHO it only sound logical that the kernel dev folks drop old compilers, and userland dev folks keeping compatibility with old compilers which haven't gone dodo yet. Reinventing the wheel certainly is annoying, but as long as all other wheels are square... More information about the ffmpeg-cvslog
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710777.20/warc/CC-MAIN-20221130225142-20221201015142-00237.warc.gz
CC-MAIN-2022-49
1,110
20
http://meta.stackexchange.com/questions/89863/what-do-you-do-when-an-irrelvent-answer-is-the-only-answer
code
I asked a question on SO which is not getting too many views. I did revive one answer but it was in fairly broken English and really did not help out to answer my underlying problem. I am concerned that people will now see there is one answer on the question and will not even view my question. Am I right to be worried? Also is there any recourse for me to help keep my question interesting so new people will look at it? Lastly any recommendations on a better title would be appreciated, however I don't know if this is the place to ask for that.
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257829972.49/warc/CC-MAIN-20160723071029-00086-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
548
2
https://news.microsoft.com/2010/07/12/bob-muglia-worldwide-partner-conference-2010/
code
Remarks by Bob Muglia, President, Server & Tools Business July 12, 2010 ANNOUNCER: Ladies and gentlemen, please welcome Microsoft’s president, Server & Tools Business, Bob Muglia. (Cheers, applause.) BOB MUGLIA: Well, good morning. So, we have all had our own path in understanding what the cloud and cloud computing is all about. For me I got a lot of clarity last fall. It started very, very innocently. I received an e-mail from our chief operating officer, Kevin Turner. Kevin said that he had a CIO event that he needed to present at in November, which is an event done in Palo Alto, California on Pagemill Road at a venture capital firm that brings in some of the top 100 CIOs around the globe. And Kevin said he wasn’t able to make this event, and he asked if I could do it. And I said, sure, my calendar was free, I was really glad to go do it. So, about a week later, I received a phone call from Kevin, and Kevin started off, he said, Bobby — now, at that moment, I got a little concerned, because when Kevin calls me Bobby, it’s usually because he wants to give me some fatherly advice. (Laughter.) He says, “Bobby, you know, this event can be a little bit rough. Steve did it and I’ve done it, and we kind of had a hard time with these guys. But, you know, I’ve done some decks for global CIOs, and if you just follow those decks, I think you’ll be just fine.” So, naturally in the ensuing weeks I just sort of prepared myself, I read the decks, but I was a little nervous when I went in there. And what this is, is this is an event where vendors come in, you’re presenting to about 20 of these top CIOs, and they’re asking you questions, and one vendor comes in after another. And just to sort of get your mindset to think about this, think of yourself as a sheep lost in the field surrounded by a pack of wolves, and you have the kind of idea. And I’m sharing things with them, and they’re giving me a hard time about a lot of stuff, and it was a good conversation overall, a little tough, as KT said, but it was pretty good. Then at one point one of the CIOs looked at me and pointed across the table, and he said, “Bob, you don’t get it. We never want another upgrade from Microsoft again.” Wow. That’s our business. So, that’s kind of a tough spot. He said, “No, look, we want the features, we love the function that you give us, but you put all the burden on us. You make us deploy all the infrastructure, you make us do all the work. We want this as a service. We want you to take that on.” And it was really at that moment that I got it, I got what cloud computing was all about. Cloud computing is the transformation of the industry where we all work together, Microsoft and all of our partners, to deliver to our customers IT as a service, to enable them to focus on their business, to enable them to build applications like they could never build before, to not focus on running the infrastructure, essentially allowing every customer to have within their shop all of the best practices, all of the learning that exists across the industry. That’s what cloud computing is. It’s about delivering IT as a service that’s optimized for everybody. What a big deal, what an amazing realization, and what a realization that was for all of us, and what opportunities that brings. And let’s look at this landscape. Let’s look at it sort of all up. From an industry perspective when people talk about cloud computing, the analysts and many others talk about really three things. They talk about infrastructure as a service, which is really running machines. It’s really about running the underlying infrastructure, virtual machines and all of the infrastructure that it takes to run a datacenter. They talk about platform as a service, which is providing the underlying platform that makes it easy and streamlined to rapidly write the next generation of business applications. And finally, the third piece is really software as a service. And software as a service are the finished applications, the applications and solutions that deliver business value to customers and to end users, and empower end users. Those are the sort of three components that the industry thinks of when it talks about cloud computing. Now, at Microsoft we’re really building this out, taking this very much to heart, and what we’re doing is we’re pulling together platform as a service and infrastructure as a service into one service offering that we call the Windows Azure platform. And this platform really provides a foundation upon which these next-generation cloud applications can be built. Some of those applications will come from Microsoft, and we are certainly building on the Windows Azure platform within our own shops and in terms of providing the next-generation solutions to you, and, of course, this is an open platform that allows all of you to write applications, whether you’re ISVs or solution providers, whether you’re providing those to end customers or providing them more broadly, and of course, it’s available to all of our customers, our mutual customers to build upon. So, this is a very major commitment we’ve made, and it’s something that we think is very foundational in terms of delivering the future. Now, talking about the Windows Azure platform, what is the Windows Azure platform, what are the capabilities here? Well, fundamentally the Windows Azure platform is the world’s first general purpose cloud platform, the first platform that was designed to be fully open, to provide an infrastructure and a full platform set of capabilities that allow any kind of application you want to build to be created. It is a platform that has been designed to run on tens of thousands, hundreds of thousands, even millions of computers, distributed across multiple datacenters around the globe. It’s designed to certainly handle things like the underlying infrastructure and virtual machine management, but it’s also designed to operate at much higher levels and to provide a broader set of platform capabilities, a very broad platform API that enables developers, whether at ISVs or solution providers, SIs, customers, VARs, whatever development capabilities people want, this platform has a broad set of underlying services to allow you to build the apps that you want to create, and to take on new characteristics, characteristics like making it simple to do business continuity, characteristics like simple to provide scale-out and always availability, a whole very broad set of capabilities. The Windows Azure platform clearly consists of Windows Azure that provides this foundation, but it also very much includes SQL Azure, which is the world’s first next-generation cloud database that has also been built to run across thousands of machines. Today, SQL Azure is running across thousands of computers in six datacenters around the world, making it very simple for people to build out business applications that require relational database capability, and doing that without requiring you to think about that underlying infrastructure. So, the focus of this is enabling you to focus on building your applications, not on running the underlying infrastructure and focusing on building that. Now, the reaction we’ve had from partners on this has been fantastic. Windows Azure has only been released for about five months, and in that time we have well over 10,000 customers that are signed up to use this platform. The feedback we’re getting from those customers is, “Wow, this is different, this is different than any of the other infrastructure services we’ve seen. We’ve tried them; this one is different. It makes our job much simpler to build the applications we want to create.” And we’re getting that feedback from a broad range of different partners. One of the partners that we’re working with, a great partner of ours, is Infor, and they have begun adopting the Microsoft platform and the Windows Azure platform for their next generation of solutions. Let’s see what Infor is saying. Let’s run the video. BOB MUGLIA: It’s great to see a partner like Infor who are betting on Windows Azure, and I think it will be a great bet for them. We’re really excited to partner with them, and with so many others, so many of you in terms of building your next generation of applications. At Microsoft we’re also using the Windows Azure platform for our own apps. Our IT department is investing heavily in moving our corporate applications to the Windows Azure platform, and our applications that we’re providing to you, like Dynamics, we’re also investing very heavily and moving to Windows Azure. Parts of Dynamics are already hosted on the Windows Azure platform, and the Dynamics team is working very hard on bringing out a set of services that are based on the Windows Azure platform. So, it’s really exciting. One of the other things that I’m excited about with the Windows Azure platform is the ability to create new solutions that were effectively impossible to create before, because without a service infrastructure it was not cost-effective to deliver these solutions. So today, one of the things I’m pleased to announce is that we’re making a great deal of progress on the data marketplace that we codenamed Dallas. I’m announcing today that Dallas will be available and for production by the end of this calendar year. We have a new information marketplace which is much easier to use and is very consistent with what we’re doing in Windows Azure all up. And we now have over 30 content partners that are building applications that utilize the data that’s available with Dallas. What Dallas does is it takes and makes content that was previously unavailable to most developers, information that’s very important for business, readily available. What I’d like to do now is invite Don Farmer up to do a demo showing you how one of our partners is building a solution based on Dallas. Don, come on up. DONALD FARMER: Morning, Bob. Thank you very much. BOB MUGLIA: Morning. (Applause.) DONALD FARMER: Well, this is the Dallas marketplace, and what we’d like to do here is just find some data to work with. So, let’s browse for some data, and we can have premium data here, we can have public data here, and the data I’m interested in is let’s focus on demographic data. This is the time of year where we have lots of students on summer internships at Microsoft, and I’d like to see where they come from. Fortunately, the United Nations publish a dataset which we can find here, and this dataset is available on Dallas, and it’s about students and how they study abroad. So, if I just open that dataset, first of all, I can see it’s a geographical dataset, so Dallas knows that it can show us where this data comes from. I can drill into the tables here, and see the OData tables which are included in this dataset. I can see the metadata of the columns that are available, I can see what columns I can query on. And once I’m happy with this dataset — BOB MUGLIA: So, Don, one of the things I think that’s interesting about Dallas is all of the data on Dallas is published using an industry standard interface called OData, which allows a broad variety of tools to work with that information. By having all of the data published in a consistent way, regardless of its source, it makes it very easy for all of you that are building applications to work with any of the data that’s coming out of Dallas. DONALD FARMER: Yeah, I think that’s actually pretty important. And the other thing here is that people who make this data available can charge for it and subscribe to it. So, we’re going to subscribe to this. Do you have a credit card with you? No? Well, just as well — BOB MUGLIA: It’s OK, this one is free, so it doesn’t matter. But now comes the next part of the Dallas marketplace. Partners can not only provision data as a service, but they can also provision applications that help us understand that data. So, down here let’s use some applications to understand this data. I would love to demo PowerPivot. As we know, we’ve been working on that for a couple of years. But this is the Worldwide Partner Conference, so let’s show a partner application from Tableau. Now, Tableau is one of our leading business intelligence partners, and when I click on this icon here, it opens the Tableau desktop environment with the dataset from Dallas loaded into it. Now, the Tableau environment is pretty intelligent. It understands that if I choose country and students as the data that I want to analyze, if I click “show me,” it will default to show me that it’s geographical data. BOB MUGLIA: Geographical. DONALD FARMER: So, if I click OK, immediately I have a nice map of where students are coming from my number. I can just increase that button there, and just get a different size. Let’s drag on region and color code by region, and now I can see that I can see the Americas and Africa and Asia and Europe and so on are nicely color coded. But not only are we intelligent about geography, we’re also intelligent about time. So, if I drag time period onto the pages, I now can basically play through this and see the data change over time, and I can see the fact actually that students from China are phenomenally growing in importance, that market of students studying overseas, and I can just play through that and play it backwards and forwards in the Tableau environment. Now, I got this data from the Web. The next thing, of course, I’ll want to do is share my analysis with somebody else. When I do that, I can use the Tableau public service to save it back to the Web, and I just need to enter my password here and log in, and it will encrypt the password, and it’s going to send it up to the Tableau public service. Now, when it does this, this is a good time to talk about the various things that you can do with this data, because here I’m building a Web application, I’ve got a desktop application, but other people can also build things like mobile applications. In fact, you’re really unlimited in what you can do with the data with Dallas if you’re a partner analyzing this data or using this data for the consumers. So, you can work on mobile applications, desktop applications, Web applications, all sorts of different possibilities for you there. Now I’ve got the application available on the Web, and I can share it, and I share it in a very easy way. Simply in this case I’m going to copy and paste the HTML, and I have a blog post here, which is basically ready to go. I can go into HTML editing here, update my blog post with that HTML that I’ve posted, and have a look at the Tableau application. BOB MUGLIA: There it is, now it’s in your blog. DONALD FARMER: Now it’s in my blog, published, and people can go into the SQL Server Experts blog and read it right now. BOB MUGLIA: Great. So, this is a great example of one of the many kinds of applications that can be built with data that will now be available because of the Dallas marketplace. DONALD FARMER: Absolutely. BOB MUGLIA: That’s great. Thanks a lot, Don, appreciate it. DONALD FARMER: Thank you very much. BOB MUGLIA: Thank you very much. (Applause.) So, cloud computing opens up the potential for all sorts of new applications, many, many different types of applications, but one of the interesting aspects of cloud computing is that while it is, in fact, providing IT as a service, it doesn’t and shouldn’t just come from global providers like Microsoft. That has a place. The public clouds that we’re building are very important, but it’s also very important for our partners, our service provider partners to be able to build their own public and private clouds. And, of course, customers will want to build predominantly private clouds, and they’ll want to have those within their own datacenter. Now, at Microsoft, as I said, we’ve invested very heavily in building IT as a service with this next generation cloud platform that we call Windows Azure. And we are experiencing great interest from so many people, it has been an unbelievable success in the short time it’s been out there. But we keep getting one question again and again and again. Today, I’m going to answer that question. The question is, when can I run Windows Azure in my datacenter? If I’m a service provider or I’m a customer, when can I have all of these benefits but in my environment much more under my control? So, today, I’m very proud to announce the introduction of the Windows Azure appliance. Yeah! (Applause.) The Windows Azure appliance fundamentally takes the Windows Azure service and extends it. It extends it to our service providers, allowing you to run exactly the same capabilities within your datacenters, providing that capability to your customers, and it can be extended to our larger customers that want to provide IT as a service within their own organization. So, let me go into some details about what exactly the Windows Azure appliance is. I sort of said already the first and most important attribute about the Windows Azure appliance, and that’s that it’s a service. Now, that’s a new concept, the idea of running a service that’s coming from Microsoft in your own datacenter. Nobody has ever done anything quite like this before, but we think it is very critical. Windows Server, SQL Server, they’re great products where you run and update the environment completely yourself. Windows Azure and the Windows Azure appliance is quite different. It is a service that we deliver that you then run in hardware that you own or have rented within your own datacenter. It includes Windows Azure and SQL Azure, both of those components are there. In fact, our plan is to make all of the capabilities that are available in the Windows Azure platform available to you to run in these appliances that run within your own datacenter. Like Windows Azure it’s designed for phenomenal scale and things like multitenancy support and business continuity. In fact, we are working with our hardware partners to ensure that this is so identical that the hardware that you run in your datacenter will also run in ours. So, we’ll pre-validate and test that hardware in our own environment. And, of course, it will be available through a choice of many different hardware partners. One of the analogies here that we’ve used in thinking this is the analogy of a set-top box with a cable or satellite provider. When you have your television, you are getting a service, you are subscribing to a service from your television provider. And that service is delivered to you. It’s not something that you have to worry about. You just turn the TV on, and it works. That set-top box is fully updated. But you control what channels you want to watch. You control what programs you want to record. If you want to put parental controls in, you can do all of that. You have much more control. That’s exactly what we’re doing with the Windows Azure appliance. So, the benefits are associated with the control, compliance, as well as things like keeping the data locally, data sovereignty. So, these are important benefits that allow for much broader sets of solutions being built around the cloud environment. Now, of course, we’re not doing this alone. We’re doing this with many partners across the industry. Today, we’re announcing it’s all of you. We look forward to your participation. But we have some first wave adopters, some first partners. You see, our plan is to take and make the first limited production release of the Windows Azure appliance available later this year, and we’re working with these first wave adopters to help us understand what is needed here, and to help roll this out. And these are all partners that I think you’ll probably recognize. Our first partner is a company that I know you know of. They’ve been working with Microsoft since the early 1980s. They certainly sell a lot to consumers. They also sell business computers probably to many or most of you. They have built a broad set of enterprise services, and we’ve been proud to work with them on the Windows Azure platform, and we’re really proud to have them as one of our first wave adopters. Please welcome with me Peter Altabef from Dell. (Applause.) PETER ALTABEF: Thank you, Bob. BOB MUGLIA: Good morning. Great to have you here. PETER ALTABEF: Thanks. BOB MUGLIA: So, Dell provides a broad portfolio of capabilities. Tell us a little bit more about that. PETER ALTABEF: Well, thank you, Bob. It is a pleasure to be here and with all of you. Dell’s cloud strategy is very consistent with what Steve and you have been talking about all morning, and those cloud services include architecture, applications, development, operations, support, and, of course, design and hardware. One of the keys as we move into the cloud, and we’re already supporting and running and hosting private and public clouds, is our work with partners. Many of those partners are in this room, and I want to thank all of you for being our partners. We are today involved in the cloud in a pretty big way. Twenty of the top 25 websites globally we are providing the primary infrastructure for, and four of the top five search engines. So, very involved in the cloud, and very involved with Microsoft and all of Microsoft’s efforts. As Bob knows, Microsoft and Dell have a more than 25 year relationship with one another, and on things like Windows Server with Hyper-V we have a complete solution already built out. So, it shouldn’t have come as much of a surprise to anyone when right at the beginning of the Azure project Dell was brought in to be a primary infrastructure partner, and we have been doing that now since very early in 2008. So, we have a lot of experience with the platform, we are thrilled with the platform and thrilled with where the platform is going. BOB MUGLIA: Great. PETER ALTABEF: So, from our perspective, as you talk about strategy, we really have three, and it’s the three you just outlined on your slide. So, we will be running the Azure platform appliance from Dell websites as a service provider and a hoster. We will also be taking our experience and creating a Dell powered Windows Azure platform which we’ll be providing both to partners, as well as to service providers and ultimately to end user customers. And that will be done on a broad range of basis from a full partnership and sharing technologies to a turnkey relationship. So, we’re very excited about this, and thrilled to be here. BOB MUGLIA: That’s great. So, how do you see the Azure appliance impacting customers? PETER ALTABEF: Well, you know, the cloud is all about customers. It’s all about massively reducing the cost of computing and increasing the efficiency. What we are seeing in the marketplace today are a series of cloud initiatives, some of which we consider evolutionary and some of which we consider revolutionary. We think the Azure platform is a revolutionary change in the cloud marketplace. And as part of that, you have to look, as you just did in your slides, not only at the infrastructure as a service and at the platform as a service, but at the software as a service layer. So, we think all of the people in this room will be very active in developing software applications. Dell is developing and will be developing more software applications, and working with partners to do that. We think that with the Azure platform, those applications will not only be horizontal but will be industry vertical, so health care, education, government, manufacturing, financial services, travel and transportation, telecom. We’ll be able to use this to really drive value for specific industries — BOB MUGLIA: Broad sets. PETER ALTABEF: Broad set. And to give just to two examples, in health care we’re the largest provider of IT services in the world, and we think that the Azure platform will be extraordinarily useful for really decreasing the cost of health care, such as providing electronic health records. When you get to manufacturing and you start looking at supply chain where Dell has an enormous background in supply chain, again the Azure platform we think will be able to work on an industry basis to really drive down supply chain costs. So, we could not be more thrilled. BOB MUGLIA: Well, that’s great. We really appreciate all of your support and help. Thank you so much, Peter, appreciate it. PETER ALTABEF: Thank you, Bob. (Applause.) BOB MUGLIA: So, our next person is actually a customer of ours. It’s a customer that I’m very confident that you’ll recognize. It’s a household name. It, in fact, is the largest online commerce marketplace in the world, doing over $60 billion in transactions every year, and having over 90 million active customers. Please welcome with me James Barrese from eBay. Thank you, James. Thank you so much for being here. (Applause.) JAMES BARRESE: Glad to be here. BOB MUGLIA: So, it’s great to have you working with us on the Windows Azure appliance. Tell us a little bit about your current environment. JAMES BARRESE: So, when you think about the eBay platform, and the investments that eBay needs to make in technology and scale to handle this global marketplace, 60 billion in transactions, we’ve had to make significant breakthroughs in how to scale out, how you manage an online Web property. And just to give you some sense of the scope and scale of that, for example, we have over 200 million listings live on the site at any given time. In a day we do up to 75 billion SQL transactions to run this massive platform. And we’ve had to make breakthrough after breakthrough, and really invested in a foundation and a really robust technology platform. BOB MUGLIA: So, you guys are a really leading in terms of what you’re doing in providing a cloud infrastructure. Tell us what attracted you to the Azure appliance. JAMES BARRESE: So, we’re always looking at innovation and where is our platform going, what’s the next round of technology that we need to invest in, how do we go for investing for our sellers and our buyers. And we looked at Azure, and we actually did some public pilots on the Azure public cloud, and it went well. So, we really looked under the covers and looked at the architecture and the foundation, and we looked at our strategy, and it aligned really, really well. So, what we’re doing is really joint engineering, so taking the best of eBay’s engineering and our learnings on how to scale, with the significant investments that Microsoft is making in Azure to really figure out how do we get the infrastructure out there so that eBay can take advantage of the next generation in cloud technology. But what’s really compelling is that it’s going to be in our datacenters. So, within our four walls we can control this scale-out environment, and it’s going to allow us then to really innovate for our customers. We’ll be able to do things through automation, through automatic scale out, that’s also efficient, and have a really rapid response. And an example of this is the garden at eBay.com. If you’re not familiar with it, it’s an area where we’re starting to let new seeds blossom for new experiments. And you can go there and try out new experiences, we can interact with our community, and Azure is a great — the Azure appliance, what we see is an opportunity where we can deploy something out there really, really quickly, and if it gets a lot of traction, it gets a lot of load coming at it, it will automatically scale up. And if it doesn’t, it’s still highly cost efficient, and from an internal engineering standpoint we’re able to move really, really quickly to get those things out there. So, it aligns with where our strategy is going and it aligns with where our technology is. BOB MUGLIA: Well, that’s great. There’s no question that eBay is one of the leading Web companies in the world. It’s an amazing company and you have a lot of knowledge and a lot of learning and I can’t tell you how much we thank you for working with us. I know that together we’re going to learn a lot and we look forward to working with you on the cloud. Thank you so much, James, appreciate it. (Applause.) So, our third partner is the largest IT provider in Japan and the third largest in the world. They have 170,000 employees globally and are very broadly used as a service provider. They just celebrated their 75th anniversary last week, so congratulations to them on that, please welcome with me Marc Silvester from Fujitsu. (Applause.) MARC SILVESTER: Thank you, good morning. BOB MUGLIA: Thanks so much for being here. MARC SILVESTER: Thank you. BOB MUGLIA: So how does the Azure appliance fit into your strategy at Fujitsu? MARC SILVESTER: Yeah. So, at Fujitsu, we see Azure, the Azure appliance being an essential part of our cloud strategy. We are delighted to be working with Microsoft in the design, development, and deployment of the appliance, and we are going to be taking that through our datacenters worldwide starting with Japan and deploying that for our customers, ISVs and our partners’ use. Over the coming 12 months or so, we’re going to be training up 5,000 or so Azure specialists and we’re going to work with hopefully many people in this audience to bring work loads from the ISV partners, from our customers onto the cloud. So, in broad terms, our strategy is to build new business value, to build new markets, and to go after new and exciting ISV and partner and customer-delivered services on Azure. BOB MUGLIA: Now, I know Fujitsu sees a lot of opportunity for their customers with the cloud. Can you tell us your perspective on what this announcement today and our partnership means to your customers? MARC SILVESTER: Our partners have been telling us for some time now that they want a reliable, trustworthy, flexible, on-premises and off-premises cloud service. They need to be able to subscribe to business services and to data services. They want to be able to take data closer to themselves with data sovereignty issues and with security issues. So, for our customers, this is a real leap forward. It gives us the opportunity to federate the public cloud with on-premises cloud with private data inside the customers’ environment, and for us to collectively look at how we can bring a heterogeneous solution and bring new value to that marketplace. So, our customers and our ISV partners are working with us now to look at how do we get at the data, how do we build new payload and application and activity services, and how do we take that to a global marketplace and add absolutely new value to the bottom line. BOB MUGLIA: That’s great. Marc, Microsoft and Fujitsu have had a great partnership for many years. And I can’t thank you enough for working with us as we extend that together with Windows Azure and into the cloud. Thank you so much. MARC SILVESTER: Thank you. Thank you. BOB MUGLIA: I appreciate it. (Applause.) So, in addition, I want to talk about one other partner who is a great partner, HP. Today, HP is also announcing that they will be joining Microsoft and working with us to bring the Windows Azure appliance to all of our customers and service providers. Now, obviously, Microsoft and HP have also worked together for many years. Earlier this year, we announced a strong new commitment with HP around virtualization and management as well as in areas like database and messaging. And today, we’re extending that partnership with HP together to Windows Azure and in particular to the Windows Azure appliance. HP will be manufacturing Windows Azure appliances and making them available to our service providers as well as to end customers, and their enterprise services group will be running the Windows Azure appliance within their own environment. So, when I look at all of this, we have four great partners that we’re announcing today, and this is really just the beginning of our work together on the Windows Azure appliance. As I’ve said, the Windows Azure appliance will have its first production release together with these four partners later this year, and they’ll be running this production level — meaning that they’ll be able to build and run services on behalf of customers, full production customers later this year. And as we move forward into the future next year and beyond, we expect to have more ways of this service to be available, allowing more and more customers and partners to participate. So, we’re very excited about this. It’s a great day for everyone here. It’s a great day for the industry, and of course it’s a great day for all of our partners as well. Let’s get together to make the day with a photograph. Quick picture. Got to do the cheesy photo. (Applause.) Thank you guys very much, I appreciate it. Thank so much. Thank you. Thank you very much. So, we’re real excited about this. This is a big day for us. It’s one that we want to celebrate. And so what I wanted to do was invite all of you here at WPC in Washington to join us this evening at 6:00 in the expo hall, we’ll have a Windows Azure appliance container there for you to see, and we’ll be throwing a little barbecue there. And I’ll be there, and Amitabh who runs the Windows Azure group will be there. We’ll have a broad set of Microsoft people to talk to. So, I look forward to seeing you all this evening at 6:00 p.m. at the Windows Azure barbecue. OK. So, the appliance. The platform — the set of services that we’re providing with Windows Azure both as part of the public cloud that we build and now extended to our partners and our service providers with the appliance, those are services. We also, of course, build the world’s leading server, and that has happened because of all the partnership we’ve had with you over so many years — Windows Server, SQL Server, System Center — those are the foundation from which runs over 75 percent of all the industry-standard servers in the world today. And that foundation is really the foundation that we’ve built Windows Azure upon. We’re focusing on making it easy to move applications from Windows Server to Windows Azure and to move forward into the future. And, of course, the Windows Server platform, Windows Server, SQL Server, System Center, enable you to build private and public clouds today, and we have thousands and thousands of customers and service providers around the world that are building clouds with these products today. Now, we are investing heavily in driving forward our server platform. We obviously released a new version of Windows Server late last year, Windows Server 2008 R2. We have talked about and will be shortly releasing a first service pack of Windows Server 2008 R2 that includes great new features like dynamic memory. We just shipped a wonderful new release of SQL Server, SQL Server 2008 R2, that brings with it a broad new set of capabilities, including some revolutionary BI capabilities and working with Office. And we are investing to drive forward and making it easier and easier for you to build clouds using these products. Today, I’m pleased to announce that one of the steps we’re taking is a self-service portal that will be part of System Center that makes it easy for you to provision clouds to allow developers and business units within organizations to deploy infrastructure on their own behalf, not requiring IT to get involved. This is just part of our ongoing commitment to make it easy for you to create clouds, whether you’re a service provider or an end customer, and to do so, certainly with the Windows Server environment, but then also as we move forward with the Windows Azure environment. Now, looking at the distinctions between these two, I’ve talked about Windows Azure and the Windows Azure platform, I talked about Windows Server and SQL Server — an environment you know so well. What are some of the differences to think about with this and some of the considerations to take into account as you look at these two options? Well, with Windows Azure, the most important thing to recognize is, first and foremost, it is delivered as a service. It is a service today with the public cloud that Microsoft runs, and it will still be a service when it’s available to you in the form of an appliance. What that means is Microsoft will update the infrastructure for you. In the appliance form, you’ll have a little bit more control over that environment when the updates happen, and you’ll certainly have full control of what runs where within the appliance. But fundamentally, we will still be providing that service to you to update and keep that service fully up to date. And, of course, Windows Azure has been designed to run into many thousands of servers, it has massive scale, and with the appliance, we’re working to scale that down to smaller and smaller configurations. And the Windows Server platform is something you know very well. It’s a product that you purchase and install on the hardware of your choice. It provides the most flexibility, the most set of flexibility for you to integrate and work with that in your data center. And of course you can use Windows Server, SQL Server, and System Center to build clouds today. It provides a very low operations cost across industry-standard hardware and of course it’s fully under your control and you do all of the updating and manage every aspect of that infrastructure. So, that choice is a very important thing. It’s really part — these options are very much a part of Microsoft’s ongoing commitment to work with our broad partners and customers across the world to provide the best and most complete and comprehensive set of options for you as you move forward into IT as a service and into the world of cloud computing. So, one of the key things about this infrastructure is how connected it is. I said that Windows Azure is built on the foundation of Windows Server. That’s absolutely true, and it’s usually very straightforward to take applications built on Windows Server and bring them to the Windows Azure platform. But that’s because we’ve built this on a common set of models, a common identity model based around Active Directory, a common application model, a common platform underneath, and a common way of doing systems management based on System Center. So, the tools, Visual Studio, System Center, all of those things that you know and love today with Windows Server and SQL Server, all of those things apply and work in the Windows Azure platform, all of those things are there for you and the knowledge that you have and the environment you’re familiar today with Windows Server carries forward into this Windows Azure world and we’re connecting these very much together. I also said that Windows Azure is the first general purpose cloud platform. And when I say general purpose, what that means is that it can be used to build applications of any type, using any language you want. We’re very language agnostic. We’re agnostic to the underlying infrastructure. So, of course .NET is supported, and it’s world-class with Windows Azure, but we’re open to using other languages and other environments — PHP, Java, development tools like Eclipse and Ruby, making the language choice one that you can choose and build your applications regardless of where they’re coming from. Windows Azure is a general purpose platform, thus it’s available and it’s fully open. And this is part of that broad choice that Microsoft is providing. Now, you’ll get a chance to learn a whole lot more about this if you’d like because today I’m also pleased to announce that this fall we will be doing a PDC 2010, which will be held on the Microsoft campus live, but it will also be the world’s first worldwide PDC that we’ve ever done. So, we’ll be live from the Microsoft campus, but will also be broadcast over the Internet to sites around the world, and we’re going to make the entire PDC, every session, everything, fully available for people to watch on the Internet regardless of where they are. This is, after all, all about the cloud, so you don’t have to come to Redmond to experience the PDC, but we’re sure looking forward to talking to you about the advances we’re taking with Windows Azure and the cloud overall, because we’re moving very fast and the PDC will be a place to learn a lot more about that. OK, so we’ve covered a lot of ground. Covered a whole lot of ground. Let’s sort of talk about that and review it a little bit. I sort of talked about two dimensions in some senses. One dimension being industry-standard terminology around infrastructure as a service, platform as a service, and software as a service. The other dimension being where — who is providing those services, because IT as a service can be provided by global providers like Microsoft, they can be provided by all of the partners, many of whom are reported in this room, that are service providers and hosters, and then customers can run services themselves, cloud services for their own business units and developers. So, there are two dimensions. And if we look at the landscape and the industry, we’ll see there are a lot of players that play in this. So, for example, Google and Salesforce are predominately providing software as a service, but they’ve made some investments in platform as a service. Amazon is providing predominately infrastructure as a service, although they also have made some level of investment to bring them — their users some level of platform as a service capability. But one thing to note about all of these providers is they’re just global providers themselves. They don’t provide the options to you to run their services in your datacenters, and in fact, they don’t have the history of partnership that Microsoft has had for so many years. So, let’s look at another vendor, VMware. VMware comes from the perspective of virtualization, virtualization, virtualization. So they’re an infrastructure as a service vendor, predominately. And they certainly do provide end customers the ability to run their environment, and they do provide service providers that ability. But they don’t run it themselves. I’ll be honest, running IT as a service, running cloud computing, I don’t know how you can do it if you don’t run it yourself. I have no idea how you can do it. We learn so much by doing it ourselves. We are learning by running it every day, and that learning translates into building a better platform for you to run, and we are now committed to delivering that platform to you so you can run it in your datacenter. So, all of our best practices, all of that is available to you. And so if you look at this landscape all up, there’s only one vendor. There’s only one vendor that really covers the full set of dimensions, and that’s Microsoft. And I can assure you that we are fully committed to driving this forward into the future. (Applause.) So, we’re committed to that, but we’re absolutely also committed to doing it together with you, all of our partners, and we’re pretty excited by this. There’s so much to do. This is all here and now today. You can use Windows Server, SQL Server, and System Center to build clouds today. You can build next-generation cloud applications today on Windows Azure and those applications will run identically in the future on the Azure appliance, if that’s what you’d like to do. And so when I look at all of this, this transition to the cloud, this transition to IT as a service, it’s a huge change, it’s a huge change. And when I look back to that fall when that CIO grabbed me and said, “Bob, you don’t get it.” I recognize that this was a time that we needed to think differently. We needed to think about what he wanted. What he was asking me for was to deliver to him IT as a service. And it changes so much of what we do. It takes so many of the things that we’re building today and makes us transform them into the future, and that’s kind of scary. And certainly it’s true for many of you. Some of your businesses will also need to transform. But I’m going to tell you something I firmly believe. I firmly believe that customer demand for solutions far exceeds the industry capacity to deliver on it. And I also believe that the cloud is an opportunity with IT as a service for us all to deliver for our customers. You can be sure that Microsoft is committed to that, and we’re committed, as we have been for the last 30 years, to doing it together with you. Thank you very much, have a great WPC.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817043.36/warc/CC-MAIN-20240416031446-20240416061446-00295.warc.gz
CC-MAIN-2024-18
44,981
151
https://forums.macrumors.com/threads/need-opinions-on-which-mbp-to-get.1029376/
code
Hey everyone, This is my first post, so forgive me if I break any rules here. I'm a senior in high school right now, and I am looking to get a MBP for college. For school, we are issued a Macbook and we will have to return it at the end of the year. The specs: Version 10.6.4 Processor 2.4 GHz Intel Core 2 Duo Memory 2 GB 667 MHz DDR2 SDRAM Because we have to return it at the end of the year, I was looking for to buy a MBP. I was looking at the $1799 MBP but I wanted to know if the speeds with be noticeably faster than an IC2D/if this would be the best choice. Basically what I would want to use the laptop for would be schoolwork first (writing papers, powerpoints etc), then some gaming (Starcraft 2 etc). I also like to record music in Garageband, and edit videos and upload them to YouTube, and when I upload them, it is in bulk; many 10 minute videos in HD. Basically, should I get that MBP now based on what I am wanted to use it for, or should I wait and see what they have in store with the faster models/if I even need them. If I could get some opinions and ideas, that would be greatly appreciated! Again, sorry if I have broken any rules.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826856.55/warc/CC-MAIN-20181215105142-20181215131142-00411.warc.gz
CC-MAIN-2018-51
1,154
1
https://discuss.dgl.ai/t/negative-sampling-for-link-prediction/1187
code
I’m utilizing GNN for link prediction in protein. For example, my current graph is a uni-directed connected graph starting from a beginning atom all the way to an ending atom. There is only one way to traverse the graph. You can think of it as a link list. The dataset would contain thousands of protein graph. I expect to train on multiple disconnected graphs then test the model on unseen graphs (only nodes, the GNN does the linking) In this case, there are only (# nodes - 1) possible edges. However, the amount of negative edges are huge. I’m reading about EdgeSampler from https://docs.dgl.ai/en/0.4.x/api/python/sampler.html but still unsure the best settings for my case? Does anyone have any suggestion for link prediction, especially strategies for negative sampling?
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334332.96/warc/CC-MAIN-20220925004536-20220925034536-00701.warc.gz
CC-MAIN-2022-40
781
3
https://blogs.sap.com/2010/04/22/archiving-deletion-of-messages-in-pi-part-2/
code
Part 2 of the blog series explains the steps to be performed for archiving xml messages. To archive interfaces in the Integration Server, the interfaces have to be defined for archiving via transaction *SXMB_ADM -> “Define Interfaces for Archiving and Retention Periods”. *As and when any new interfaces are developed, they will have to be added to Archiving list so that their messages also get archived. Select “Multiple Selection” buttons to add multiple interfaces for archiving. Once you select all the interfaces and click F8, all the interfaces will be added to archiving list as shown below. Define Retention Period for these Interfaces as shown below. You can define a specific value for retention as per your requirements as shown below
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178363072.47/warc/CC-MAIN-20210301212939-20210302002939-00254.warc.gz
CC-MAIN-2021-10
754
4
https://www.instructables.com/Jack-O-Lantern-Cookie-Cutter-in-Tinkercad-3D-Print/
code
Introduction: Jack O' Lantern Cookie Cutter in Tinkercad (3D Printing) In this Instructable, I will walk you through how to create a simple jack O' lantern cookie cutter in Tinkercad Start with a cylinder with the dimensions of 45.00x50.00. You can make the height however tall you want your cookie cutter to be. Create another cylinder (hole) with the dimensions of 20.00x32.00. Position the hole over the first cylinder and group the two objects. Create a box (hole) with the dimensions of 20.00x58.00. Position the hole over the pre-existing object to cut off the bottom. Group the two objects together. Create a box with the dimensions of 9.00x13.50. Rotate it to your liking and position the box on the pre-existing object. Group the two objects together. Create a roof shape with the dimensions of 7.06x9.00. Position to match the image, and group the two objects together. You should now have an object that looks like this. Copy and paste a duplicate of the shape. Scale down one of the shapes to the dimensions of 45.50x46.50. At this point, I ungrouped the second object and scaled down the "stem" part separately so that it would fit inside the pre-existing "stem" better. Make a copy of the shape without a "stem" and save it for later. Turn the smaller object into a hole. Make a copy of the solid shape and save it for later. Position the hole over the solid image and group the two objects together. At this point shape up the object if you need/want to. Get the shape how you want it to look. Create a roof shape and rotate it so that it stands on its end. Scale the object to the dimensions of 6.65x9.34. Copy and paste a copy of the object, and make the second copy a hole. Scale the hole to the dimensions of 3.98x5.60. Position the hole on the pre-existing roof shape, and group the two objects together. You have now completed one of the eyes. Scale the eye (roof shape) to the dimensions of 6.25x8.00. Copy and paste a duplicate of the object and align the two within the pumpkin shape, as shown in the image. Insert a round roof shape and rotate it so that it stands vertically. Scale the image to the dimensions of 10.00x20.00. Copy and paste the round roof shape. Make the second object a hole and scale it down to the dimensions of 7.00x16.00. Position the hole over the pre-existing round roof shape and group the two objects together. You now have created the mouth. Position the mouth with in the pumpkin frame as shown in the image. Take the two objects you set aside earlier. Turn the smaller one, without a "stem" into a hole. Take the other object and scale it to the dimensions of 50.42x56.00. Make both objects have the height of 3. Position the hole over the other shape and group the two objects together. Position the object you just made uppon the cookie cutter, and group the two together. Create a box with the dimensions of 5.00x13.00 and a height of 3.00. Make this box a hole. Position the hole within the stem as shown in the image, and group the objects together. You should now have an object that looks like this. Make sure to make the eyes and mouth flush with the very top of the object. *Note* In the image the eyes and mouth are not flush with the top, this is wrong. Make sure they are flush. Make four boxes with the dimensions of 3.00x17.00, and a height of 3.00. Position the boxes as shown in the image. They should be flush with the top of the object. Create two boxes with the dimensions of 3.00x8.00, and a height of 3.00. Position them as shown in the image. They should be flush with the top of the object. Create two boxes with the dimensions of 3.00x10.61. Position them as shown in the image. Group everything together. You should now have a shape that looks like this. Select the object and flip it upside down, so it is easier to print. Your cookie cutter is now complete and ready for printing. Participated in the Halloween Contest 2017 5 years ago Very nice modeling job. I always wanted to make custom cookie cutters like this.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644867.89/warc/CC-MAIN-20230529141542-20230529171542-00068.warc.gz
CC-MAIN-2023-23
3,998
27
https://www.mail-archive.com/[email protected]/msg05700.html
code
I want to know does zope supports '.pfr' file for display (for dynamic font display)... As i have to create a website for indian languages that will display its contains using dynamic fonts.. My old site is www.cse.iitk.ac.in/users/geeta (u can see it to understand my problem) that has been built using a flat file system + needs fonts to be installed on client's machine for working, and now i want to redesign it using zope + keeping the files in a database (zope database/oracle) + dont want the fonts to be downloaded at client side... Here i have to display same data in say 11 languages and if we'll use dynamic fonts we'll have to have only one data in our database and if we'll not use dynamic font than we'll have to store same data in 11 languages in our database and than its size will be too large.. So, Kindly suggest me a solution.. IIT Kanpur - India.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827998.66/warc/CC-MAIN-20181216213120-20181216235120-00422.warc.gz
CC-MAIN-2018-51
867
6
https://www.mobileread.com/forums/showpost.php?p=2402057&postcount=16
code
OK, well, the eDGe will not mount EXT* partitions on external drives automatically. You would have to manually do it or set up a script that would automount a detect volume. But it will mount 320gb hdds formatted to fat32 Which is just asking for data loss, lol. DO NOT just removed a normal hdd if you decide to use one. Make sure you stop and eject it from the eDGe.
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279379.41/warc/CC-MAIN-20170116095119-00144-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
368
2
http://www.geekstogo.com/forum/topic/335172-windows-xp-update-repeating-same-update-kb2868038/page-4
code
I added the don't load key to Control Panel key and the two string values. Now Control Panel has only one Network Connections icon. Now if DonnaB can just solve the Automatic Updates problem............... Jump to content Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.Create Account How it Works I see both on my XP Pro + SP3 too:"HKEY_CURRENT_USER\Control Panel\don't load" ncpa.cpl REG_SZ No odbccp32.cpl REG_SZ No Download dontload.zip below. Unzip it to get dontload.reg. Double click on dontload.reg to merge it into your registry. That will give you both entries as shown above. No advanced box available in window that opens from connections tab when clicking LAN Settings. I've even tried accessing the CD setup program and trying to do a new installation but it says my current installation is newer than the CD version 0 members, 0 guests, 0 anonymous users Community Forum Software by IP.Board Licensed to: Geeks to Go, Inc.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824525.29/warc/CC-MAIN-20181213054204-20181213075704-00161.warc.gz
CC-MAIN-2018-51
1,376
14
https://golang.cafe/job/senior-backend-engineer-tutti-1565599084
code
Senior Backend Engineer at Tutti - Zurich, Switzerland Salary Fr108,000 to Fr126,000 a year Company Website https://tutti.ch Published August 2019 Applicants This Week 7 Launched in 2010, tutti.ch is an online classifieds site for buying and selling pretty much anything in Switzerland. It was launched by the Norwegian media house Schibsted, and acquired by Swiss media group Tamedia in July 2015. With more than 13 million visits and over 240 million page impressions each month tutti.ch is one of the the largest, most exciting and fastest growing online businesses in Switzerland. How we work - We work in agile cross functional product teams. Small teams, big impact - We are nice people. We write documentation, perform code reviews and write tests - We are fans of service oriented architecture and asynchronous message passing to decouple systems - We search in Elastic and store our data mainly in Postgres - We celebrate ownership and responsibility - We have legacy monsters in our dungeon for you to slay, written in C these beasts will test your skills and bravery What we need from you - A positive attitude and burning passion for your job, just like the rest of the team - An eagerness to give and receive feedback. You are hard on ideas, soft on people - An agile mindset. Either you bring it or it will be forcefully injected it into your DNA - A love for simple solutions instead of delusions of grandeur - Extensive experience building backends for web and app based products - Knowledge of Go or a diverse background that allows you to learn it quickly - Strong software engineering skills and broad understanding of architecture and the implications of technical decisions - A deep understanding of databases and SQL - An openness to touch backend as well as frontend code with a smile if the need arises - Fluent English skills to collaborate with your co-workers What would be nice to have - An interest in search, knowledge of elastic or solr is very welcome - An understanding of message queues like kafka, kinesis, sqs, sns - Experience with Postgres - Familiarity with AWS and the various services it offers - Some frontend / fullstack experience What you can expect from us A Strong learning and coaching culture, we are not scared of investing in our people. You will get a personal budget for visiting conferences or getting extra training, and we will also provide you with a shiny MacBook Pro, Win or Linux notebook (private usage allowed) and a nice wide screen. We offer a competitive salary, a great office in the heart of Zurich, free flow of fresh fruit and snacks, a work from anywhere policy and numerous other benefits. You’ll have more than 40 co-workers of 12 different nationalities who’ve got brains, looks and infamous Nerf gun skills. Last but not least, you’ll have the chance to work on one of the largest and fastest-growing online ventures in Switzerland, which truly makes a difference in many Swiss people’s lives. If you’re interested to apply please send your CV in English, and a short cover letter explaining why you think you’re the right fit for this position. We do not accept unsolicited CVs from Third Party Agencies.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153531.10/warc/CC-MAIN-20210728060744-20210728090744-00147.warc.gz
CC-MAIN-2021-31
3,191
36
https://community.retool.com/t/table-component-with-clickable-cells/8147/2
code
I am a big fan of the table component and I have been using the row actions a lot. However ss there a possibility to have a table component where a click event on the cell could open a modal displaying properties of the clicked cells? This is what I have found that could drive you in the right direction. Afaik, you can't get cell-specific information when clicking on a row . The next best solution would be to trigger your modal on "row select" and just show the whole row instead of just one cell (since you don't know which cell got clicked). Hey @yann, It looks like this should be possible if you reference the table1.selectedCell property! That property lets you reference whichever cell is currently selected (in other words, whichever cell was last clicked). I hope that helps Waaat, that's super cool. I had no idea. Excuse the false info guys.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474893.90/warc/CC-MAIN-20240229234355-20240301024355-00781.warc.gz
CC-MAIN-2024-10
855
8
http://fitness.stackexchange.com/questions/tagged/splits?sort=frequent&pageSize=15
code
Physical Fitness Meta to customize your list. more stack exchange communities Reputation and Badges Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site Learn more about Stack Overflow the company Learn more about hiring developers or posting ads with us tag has no usage guidance. Which muscles to train and how for horizontal oversplit? I have become extremely flexible within two months after changing my squats going totally down with slow negatives/aggressive up-down, it has improved my vertical split massively. Side oversplit looks ... Dec 2 '14 at 11:03 recently active splits questions feed frequent question tagged Hot Network Questions What's with the Maesters and chains? Cross product between two lists of vectors Does the Dory-like fish actually have a short-term memory loss? Is there a word or phrase for when the movie tricks you for a moment like this? Why does this generic code compile in java 8? How can a battery charge up another battery to a higher percentage? Why does this query work? Visualise Bit Weaving What is this shadow being cast upon? The meaning of "out of question" vs "out of the question"? Least amount of moves to achieve a position Would armour made of spider silk work? Getting more value out of an introverted person Is Cancer Universal? Multi or Single colored rating stars Is leveling up mandatory? What is a sensible user service schedule for a professional work bike in non loaded applications such as food delivery? What do you do when code review is just too hard? What is a good translation of "cancelled" in the context of buses and trains? Why is the indirect object pronoun "te" used in "¡lávate las manos!" and other such sentences? bfcat - encode a file as a brainf*** program What if a boss requires supervision? Are the partial derivatives of Lagrangian in the varied action functional derivatives? Pointers to pointers VS normal pointers more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Movies & TV Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2016 Stack Exchange Inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397696.49/warc/CC-MAIN-20160624154957-00167-ip-10-164-35-72.ec2.internal.warc.gz
CC-MAIN-2016-26
2,439
59
https://www.downloadbestnow.com/smartftp-download/
code
SmartFTP is a great and environment friendly FTP (File Switch Protocol), FTPS, SFTP, WebDAV, S3, SSH, Terminal consumer. It permits you to switch recordsdata between your native pc and a server on the Web. With its many primary and superior options of SmartFTP additionally provides safe, dependable and environment friendly transfers that make it a robust device. A number of FTP connections will be opened on the similar time, and you’ll copy recordsdata from one distant host to a different (FXP). Distant-host listing info is cached for future viewing, and FTP URLs are supported. SmartFTP can be utilized for website publishing and upkeep. Additionally it permits you to add and obtain the photographs, paperwork, film and music information. Share your information with your pals and coworkers. Make the backups of native or distant information. - FTP and FTPS (Safe FTP) - SFTP over SSH (Skilled Version) - Built-in Editor (Skilled Version) - Terminal Emulator (Final Version) - Rapidshare (Final Version) - Amazon S3 (Final Version) - WebDAV (Skilled Version) - FIPS one hundred forty-2 compliant - HIPAA 5010 compliant (Skilled Version) - Fashionable Graphical Person Interface (GUI) - Excessive DPI (Retina) assist - File/Folder Synchronization - Assist for KeePass and LastPass password supervisor - A number of Connections - Auto reconnect and resume of damaged transfers - Switch Integrity - Verified Transfers (XCRC, XMD5, XSHA) - Switch Queue - Limitless simultaneous threads - FXP (Server-To-Server Switch) help - Distant Edit of information - Seek for information and folders on the server - Native Browser - Bulk Rename (Skilled Version) - Scripting (Skilled Version) - Enhanced NAT/UPnP Assist - UPnP (Common Plug and Play), ICS, ICF - Visible Examine - Superior Schedule - IPv6 Assist - On-the-fly Compression (MODE Z) - UTF-8 Assist - Worldwide Area Names (IDN) - Proxy / Firewall assist - SOCKS5, SOCKS4, SOCKS4A, HTTP Proxy - Wingate, Winproxy, CSM, Checkpoint FW-1, Raptor - URL Watcher - Thumbnails View and Preview - FTP command line - Multilingual (greater than 20 languages) - Customized Instructions - CHMOD (Properties) - Part 508 compliant and way more … What’s New in SmartFTP 8.0: - Home windows 10 Help. Assist for Home windows 10 Anniversary Replace. - Textual content editor. Spell checker, new fast discover and change, clipboard ring, indicator bar, … - Google Cloud Storage and Google Drive. Assist for Google Cloud Storage and Google Drive. - Microsoft OneDrive. Assist for Microsoft OneDrive and OneDrive for Enterprise. - Many different enhancements and enhancements. Test the complete changelog for particulars. Modifications in SmartFTP 8.0 Build 2225 (2016-06-21): - S3: Retain date modified, dated created - Google Cloud Storage: Retain date modified, dated created - Favorites: New devoted settings web page for SSH compression settings - Favorites: Eliminated help for legacy switch filters - UI: Improved oauth authorization dialog - UI: Stricter host identify test - UI: New implementation for Switch Queue pane - UI: New popup menu implementation in browsers Homepage – http://smartftp.com Size: 30.2 MB
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584518983.95/warc/CC-MAIN-20190124035411-20190124061411-00428.warc.gz
CC-MAIN-2019-04
3,163
66
http://dataforradicals.com/category/uncategorized/
code
This post is for attendees of the Fundamentals of Data Visualization Workshop at General Assembly Boston. Exercise 1: Mapping Tutorial Instructions: Mapping If you have not done so, download and install TileMill. If you are running MacOS, you may need to use the instructions in the Mapping tutorial to get it running. Exercise 2: Scatterplot Tutorial Instructions: Scatterplot If you haven’t already, open a free Github account. Exercise 3: Cooking the Books Download the dataset: milk-tea-coffee.csv Use Quartz Chartbuilder to visualize the data. Tonight you will see a list of links to awesome data visualizations to help you think through your idea for the Hubway Data Challenge. See you tonight! A Day In The Life of Nice Ride Bikes Which state college systems offer the best “bang for the buck” when it comes to a student’s chance of graduating, and the amount of debt they will graduate with? With more and more students taking more than four years to graduate, it’s an important question — a question that a scatterplot can shed light on. A scatterplot shows you individual entities across two dimensions. Here’s an example showing you the relationship between the life expectancy of its country’s citizens and its Gross Domestic Product per capita (GDP). As you can see, countries with lower GDP tend to have lower life expectancies. Now let’s try it with a dataset of our own. First, we have to get a dataset. We’ll start[…] ABSURDLY ILLUSTRATED TUTORIALS Mapping: The Absurdly Illustrated Guide To Your First Data-Driven TileMill Map Timelines/Tabletop.js: The Absurdly Illustrated Guide To Your First Data-Driven Timeline Data Tables/Tabletop.js: The Absurdly Illustrated Guide To Sortable, Searchable Online Data Tables Immersive Digital Storytelling The Absurdly Illustrated Guide To Immersive, Tablet-Friendly News Stories Comparing and Contrasting/Rawcharts/D3.js: The Absurdly Illustrated Guide To Making Scatterplots With Rawcharts and D3.js Typically, a finished product — whether it’s a simple one or something as sophisticated as “Snow Fall,” the New York Times’ immersive multimedia piece on an avalanche — doesn’t give many indications about how it was made, or what challenges the developer faced in creating it. An apparently simple site might have taken hours while you might guess that another site took weeks when it took only hours because there were many available open-source tools to start out with that did a lot of the heavy lifting. Looking at the finished product — or a tutorial like my Insanely Illustrated Guide To Your First Data-Driven TileMill Map — doesn’t really give you insight into whether something took a little effort[…] [UPDATED! This tutorial is newly updated as of 1/28/17 with new geocoding instructions and now works again!] TileMill is a free-to-download application for Windows and the Mac that will let you build beautiful, data driven maps. If the bland sameness of Google maps is giving you ennui, TileMill might be a good alternative for you. There are many beautiful stylesheets to make TileMill maps visually distinct, and you can control the colors, line widths, and much more about your map using Carto, a CSS-derived language. Here’s a beautiful map of Montreal using a watercolor-like stylesheet: What follows is a detailed, highly-illustrated guide to creating your first map in TileMill. We will be using real data from the Rhode[…] My name is Lisa Williams and I recently finished teaching a four week course for absolute beginners on data visualization — absolute beginners who happened to have day jobs in mission-driven nonprofits and local community foundations. I found the experience, and the class’ participants energy and insight very inspiring. When I finished, I thought, “I should write a book — so that anybody who wants to change the world can also change charts and graphs.” I wasn’t sure what to call it, until I attended a gathering of my students and peers. One of them suggested that I call it “Data For Radicals.” “Do you really have to be that radical to learn data visualization?” I asked? “No, but[…]
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118477.15/warc/CC-MAIN-20170423031158-00519-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
4,164
7
https://4gameforum.com/threads/743/
code
Имена участников (разделяйте запятой). Тема в разделе "Archive", создана пользователем copesnuff, 6 дек 2011. stuck at login screen game with this all time and you? are you using any router with firewall ? or maybe you are using other firewall than this one from windows ? what system are you running ? could you provide us more information, what firewall you using? what antivirus? what is ur o/s? r u using windows firewall ? you can check your hosts file c:\windows\system32\drivers\etc\hosts.txt if you have played on private servers this may be a problem. you can see actual solutions and issues' statuses here. additional instructions could be found here. if you can't find a solution for your issue you always can ask for moving the thread back into the main branch.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917124297.82/warc/CC-MAIN-20170423031204-00507-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
840
11
http://developer.binu.com/getting-started/what-is-binu/
code
What is biNu? biNu is a mobile software platform that enables almost all types of mobile phones to access Internet applications and services running in the cloud with near instant response times, even on slower or congested 2G (GPRS / EDGE) networks. The biNu technical architecture is server based with 100% of application processing performed on back-end servers. There are three component layers: - biNu Mobile Client – a small downloadable mobile application that runs on the handset and offers users a single point of access to online content and services. biNu provides a different client for each type of mobile device. - biNu Proxy Server – a secure, scalable platform that efficiently manages the processing, rendering, compression and delivery of content originating from biNu apps and directs it to biNu mobile clients. - biNu Applications – web application hosted anywhere in the cloud, developed in any preferred technology with content returned to the biNu Proxy Server in a simple biNu XML format. Designed for Mobile Wireless Mobile wireless communications face some real world, physical constraints when compared to the wired computing world: - most mobile devices have small screens, small numeric keyboards, limited memory and processing capacity. - wireless networking is inherently slower, less reliable and subject to far higher latency than wired networking. Not surprisingly, many users of the mobile Internet today have a poor experience with frustratingly slow response times and inefficient use of data bandwidth. For this reason, biNu has been designed from the ground up to provide a superior mobile Internet experience focused on speed and ease of use, with: - all application processing concentrated on “back-end” servers - very efficient transmission of application data over the wireless network - minimal processing on a user’s mobile device - extensive use of data caching and pre-caching on the biNu proxy and mobile client to provide instant response times - "push updates” ensuring that when data is constantly changing the updates are automatically pushed to the mobile phone - spidering improves fast response times even further by predicting which pages will be viewed next and pre-loading them onto the mobile phone - fine control over mobile phone screen rendering which means that complex layouts can be achieved. e.g. fonts and characters in any language.that the mobile phone could not otherwise normally have produced, e.g. fonts and characters in any language.
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280086.25/warc/CC-MAIN-20170116095120-00525-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
2,522
19
https://mail.kde.org/pipermail/kde-linux/2008-October/006699.html
code
[kde-linux] URL from inside applications alainm at pobox.com Mon Oct 6 21:46:21 UTC 2008 Every time that I try to open an URL from inside al application, KDE first makes a copy of the page before calling the program assossiated Example: in Skype, if I click in "Visit my account's page", KDE oppens a small windows copying: then it calls my script that calls firefox. But the file *is not there* How can I make KDE stop making that copy, the first link works just fine... Please help, this affects a lot of programs... PS: Mandriva 2007.1, KDE 3.5.6 More information about the kde-linux
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875142323.84/warc/CC-MAIN-20200217115308-20200217145308-00423.warc.gz
CC-MAIN-2020-10
586
12
https://stephan.sann.name/
code
Swiss IT Security AG SIX Group Services AG AXA Technology Services Switzerland AG Swiss Life AG BHW Bausparkasse AG / Postbank Systems AG 0years of experience in 0years of working in the Certified Cloud Security Professional Certified Information Systems Security Professional Certified Ethical Hacker Sun Certified Programmer for the Java 2 Platform Identity Management (SailPoint IIQ | Atos DirX Identity | Active Directory | SCIM) | Access Control Management (PingFederate | CA Strong Authentication | ForgeRock OpenAM) Identity Federation (SAML (OpenSAML) | WS-Federation | OpenID Connect) | SSO (Kerberos | NTLM) | XACML (Balana) | OAuth | PKC (OpenSSH) EJB (JBoss | Bea WLS) | Web Services (Apache Axis | JAX-WS) | XML | OWASP | Micro Service (REST) JDBC (Oracle | Informix | MySQL) | JCA (SAP JCo) | JPA (Hibernate) JavaFX | JMS | JavaMail | JTA | JAXB | JNDI | RMI | JAAS | WS Security (WSS4J) | ... UML (Sparx Enterprise Architect) | ArchiMate (Archi) | Design Pattern (J2EE Design Pattern) IDE (Eclipse | IntelliJ) | Source control (GIT | Subversion | ClearCase | CVS) | Unit Testing (JUnit | Mockito) | Build (Maven) | Continuous Integration (Hudson | Jenkins | SonarQube) | Continuous testing (Katalon Studio) Apple (Mac-OS | iOS) | UNIX derivatives (Linux | FreeBSD | Solaris) | Microsoft (Windows) Walk the talk! A man is only as good as his word. I solely make commitments I can hold. Period. "The worst enemy of security is complexity." (Bruce Schneier) - I strive for simple yet sophisticated solutions. Being a holder of multiple security certifications I know how to implemnt secure appliations. Stability lies at the heart of my implementations. They are rock-solid engineered and well tested. I strive for top-notch. This website rates grade "A" (100%) on the Pingdom Website Speed Test. Solutions can only be successful if fully understood by the customer. So I am always happy to help. "The best form of self defense is to become invisible. If you can't do that learn Wing Chun!" - Wong Shun Leung "The world is a book and those who do not travel read only one page." – St. Augustine of Hippo "Without music, life would be a mistake." - Friedrich Nietzsche "A pessimist sees the difficulty in every opportunity; an optimist sees the opportunity in every difficulty." - Winston S. Churchill
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102612.80/warc/CC-MAIN-20231210155147-20231210185147-00293.warc.gz
CC-MAIN-2023-50
2,314
33
https://www.sourcecodester.com/php/14822/microfinance-management-system.html
code
This simple project is a Microfinance Management System. This is a web application that provides an online platform for Microfinance Businesses to manage their clients' accounts. It allows the management to easily store and retrieve their client records. It has a simple and pleasant user interface using Bootstrap. It also has user-friendly features and functionalities. I developed this project using the following: This Simple Microfinance Management System has many different features and functionalities. The application contains CRUD (Create, Read, Update, and Delete) operations for each list. The management can store, retrieve, and manage records of customer/client, account status, and account type lists. Each List in the application has a Generated Printable List using TCpdF Library. The application also contains a simple Dashboard Page that displays the summary of the list. Note: The Reports Feature is not included in the source code. The source code was developed only for educational purposes only. You can download the source code for free and modify it the way you wanted. That's it. You can now explore the features and functionalities of this Microfinance Management System in PHP. I hope this will help you with what you are looking for and you'll find something useful for your future projects. Explore more on this website for more Free Source Codes and Tutorials. Note: Due to the size or complexity of this submission, the author has submitted it as a .zip file to shorten your download time. After downloading it, you will need a program like Winzip to decompress it. Virus note: All files are scanned once-a-day by SourceCodester.com for viruses, but new viruses come out every day, so no prevention program can catch 100% of them. FOR YOUR OWN SAFETY, PLEASE: 1. Re-scan downloaded files using your personal virus checker before using it. 2. NEVER, EVER run compiled files (.exe's, .ocx's, .dll's etc.)--only run source code.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475825.14/warc/CC-MAIN-20240302120344-20240302150344-00471.warc.gz
CC-MAIN-2024-10
1,956
12
https://forum.level1techs.com/t/motherboard-dead-after-moving-case/154633
code
I built a PC for gaming in a 4U case a couple years back, and yesterday I added slide rails and mounted it into a rack. When I went to turn it on, nothing happened. After a few hours troubleshooting, I found that the PSU appears to work (I plugged it into another system, which worked, and shorting the pins starts the PSU fan), but having either the 8 or 4 pin (or both) CPU power plugged in to the motherboard in question will stop the system from responding, at all. The only thing that happens is that the motherboard LEDs pulsate. The chassis power button does nothing, no beeps, no debug codes displayed. Unplugging the CPU power will power all the fans, etc, but there is no display output. I tried 2 video cards, as well as the HDMI port on the mobo (it’s not an APU but I figured what the hell). I moved the RAM around, removed it entirely; same result. Here’s the weird thing- before I started unplugging power cables, etc., only the exhaust fans on the back would spin. The cpu fan/water pump would not turn on. The video card was receiving power, but the fans would eventually spin down. Only after I opened the case and started troubleshooting, did the symptoms change and eventually result in only LED illumination. I’m thinking the motherboard is dead. Thoughts? Asrock X470 Taichi 8GB (i think g-skill) ddr4 Various m.2 and sata drives Thanks for any insight. Microcenter is kind of a haul from here to be buying and returning parts that weren’t the problem, so any help is appreciated. Take the motherboard, gpu, ram, cpu and FAN (no w/c), setup on a cardboard box (no case) with a known good PSU, what happens? Sounds like something’s loose or shorted. Double check the holes on your motherboard and count the standoffs. Sometimes there can be some pre-installed that you may not need. I agree with gordonthree - sounds like something shorted? I took it out, unplugged everything, used a different psu, changed the cmos batt and reset again, but same thing. Trying it with no memory installed is the same. I suppose I’ll go get a cheap cpu and another MB; I’m not thrilled about un/reinstalling all the mobo drivers, but if it works, it works. I also blew it down with canned air. I have a suspicion it could be a bit of foil tape that got lodged in it long enough to damage it (I have some foil tape on the vent holes, and moving it or adding the rails may have flaked a piece off), though I think it was really probably something simpler, like a solder joint somewhere broke loose when I moved it or something. Idk. Update… tried same board, new CPU. Same issue. Swapping the board, now. Yep. Going from x470 taichi to x570 taichi, which leaves me more upgrade room in the future, anyway. I would have bought another identical x470 if there was one in stock and at a decent price. Amazon has em but having the computer in pieces for another week irks me more than the cost and time is worth. It was amusing, though, to see the store employee’s face when I bought the cheapest athlon apu with a $300 mobo. “You’re… not going to put that cpu in that board… are you?” Silver lining. Congrats khaudo, I am using the same motherboard in my build, it is being used in the desktop I am using to type out this post. The only complaint I have with this motherboard is the manual it isn’t written very well, and there isn’t any marking on the motherboard. I found I was guessing a lot where the power switch wires went, and which were the correct placement for the audio. Maybe attempt to RMA and have a spare board for the future? This topic was automatically closed 273 days after the last reply. New replies are no longer allowed.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663006341.98/warc/CC-MAIN-20220527205437-20220527235437-00242.warc.gz
CC-MAIN-2022-21
3,675
20
http://forum.pianoworld.com/ubbthreads.php/topics/3050995/teacher-struggles-learning-strategies.html
code
Lovely to say hello to you! :-) Ok, here's the short of it. - I'm 49 years old - Have been 'stuffing around' on the piano for years - 99.9% self-taught. Had 5 music lessons as a 7-year-old boy - but didn't really take to it. - My playing has plateaued - I can improvise (a little bit) : https://www.youtube.com/watch?v=5KVQpr5HjFI but cannot read music. Well learning to read music now. So what am I doing to become effective with my learning? - I'm a member of this forum - YEAH :-) - Working through Alfreds (All-In-One Course) - Member of pianote.com - up to level 4 - Have a Faber's learning books as well - haven't started - but will soon. So here I am all eager and wanting to focus on improving my piano skills BUT WITH the understanding that this will take years. - Learning to read music - Music Theory - Sight Reading ( I have a subscription for 'sight-reading factory' for a year ) - Classical Training So in reading the forums, a few people recommended going and seeing a 'real-life in the person' tutor. I did that yesterday for the first time and was rather disappointed. A delightful 74-year man teacher. But the lesson was totally unstructured - He wanted to expand upon my improv skills more than learning to read music. Sigh. I've got two more lessons with him and then I'll continue the search for another teacher. Being self-directed is great, but having a tutor I really could feel would be the difference of my trajectory and more importantly accountable and realistic goal settings. I don't know exactly what sort of teacher I'm looking for, but that wasn't it. I suppose I'll know it when I see it??? I'd love a teacher to say, 'Right, I know what I need to do with you!' :-) In a friendly way of course! lol. Thanks for reading.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704803308.89/warc/CC-MAIN-20210126170854-20210126200854-00732.warc.gz
CC-MAIN-2021-04
1,753
23
https://forum.babylonjs.com/t/4-0-release-video-community-contributions/1655
code
First let me say a quick hello. My name is Jason and this week, I joined the Babylon development team as an Evangelist. What does that mean? It means I get to focus on raising awareness of this incredible technology…and let me tell you…I could not be more excited! One of the first things I’m working on is pulling together content for our upcoming Babylon 4.0 Release Video. This will be a video that highlights all of the amazing things everyone has been developing for 4.0! This is where you come in! We want to focus part of this video on highlighting the amazing work that has been developed by you…the Babylon community! Have you used Babylon to make something amazing recently? Have you contributed a feature since Oct? We want to showcase your work! If you’ve developed something and would be willing to create or share a demo of your work, we want to highlight it in the 4.0 Release Video. Oh and btw…this video will be our official public announcement, that means this is a cool opportunity to have your work showcased to a pretty big audience!!! Of course, we can’t guarantee we’ll showcase everything, but we’ll certainly do our best! Reply to this thread if you’re interested! Can’t wait to showcase your work! And great to meet you all!
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202326.46/warc/CC-MAIN-20190320105319-20190320131319-00441.warc.gz
CC-MAIN-2019-13
1,272
7
https://www.producthunt.com/posts/do-people-say/reviews
code
Do People Say Type in a phrase and see how native English speakers use it A full-text search engine of English spoken corpus. Find the context where English word or phrase is used or check if it is used by English speakers at all. Not sure if it's valid or not? Give it a try too! Here're a few sample queries: Would you recommend this product?
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964360803.6/warc/CC-MAIN-20211201143545-20211201173545-00350.warc.gz
CC-MAIN-2021-49
344
6
https://cs.brown.edu/people/pfelzens/index.html
code
My main research interests are in computer vision, artificial intelligence, machine learning and discrete algorithms. I have worked on a range of different problems within computer vision, including the “low-level” problem of image restoration, the "mid-level" problem of image segmentation, and the “high-level” problem of object recognition. My research involves connections between computer vision and artificial intelligence to a variety of areas including combinatorial optimization, stochastic models, machine learning, and natural language processing. 184 Hope St. Providence, RI 02912
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102612.80/warc/CC-MAIN-20231210155147-20231210185147-00444.warc.gz
CC-MAIN-2023-50
600
3
http://www.trustpilot.co.uk/users/1816002
code
good variety of products- getting better all the time love the purchasing protection it gives you multi displinary purchasing - v good Very professional, fast delivery/ Particularly impressed that medicines ordered, questions about them are asked prior to dispatch . Connect with Facebook to get one click access to Trustpilot.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699138006/warc/CC-MAIN-20130516101218-00002-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
327
5
https://help.valant.com/creating-new-patient-payment-type-choices
code
Creating New Patient Payment Type Choices Valant provides the ability to create additional options under the “Payment Type” field when you are applying a patient payment. - Hover over Transaction Codes in the navigation bar - Click Patient Payments - Click New Payment at the top-right side of the window to begin creating a new option. The lower part of the tab will become active. All fields need to be completed to successfully create a new payment type: - “Transaction Code ID”: ID that shows in Valant billing and reporting - “Description”: This is how it will appear in the drop-down menu and on Patient Statements - “Payment Type”: Select “Patient Payment” or “Patient Refund” depending of what use is needed for the new type - "Patient Payment Type": This field field will be available only if "Patient Payment" was selected in the previous drop-down menu If users need to turn off an option, simply place a check mark in the “Inactive” box.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735958.84/warc/CC-MAIN-20200805124104-20200805154104-00278.warc.gz
CC-MAIN-2020-34
977
11
https://forum.infinityfree.net/t/suspended-for-mysql-database-usage-limit/61715/4
code
Your account was suspended because you hit the MySQL Usage Limits My question is, what is the exact limit of posting on wordpress. I think i posted 15-20 posts without stopping just before i got suspended. What do i have to do so my website wont get suspended again? Also, i can’t purchase the premium version for now even if i want Obvious. It’s too much at a time for the server to handle the post var load. May 18, 2022, 11:23am There is no fixed limit on MySQL usage. Please see the article about it for more information: One of the limits InfinityFree enforces is how much you can stress the MySQL database server. This article explains what overloading MySQL means and how you can control it. What does overloading MySQL mean? Most dynamic websites use a database to store dynamic data, like posts, comments, products, accounts and so on. This data is stored on database servers. Your website can then interact with the database to see and modify the data stored in the database. The database server needs to do work … Not really, I am 17 and i dont have any credit card or something like that at the moment other payment methods do work… If you cannot pay for premium, you just have to wait out the suspension and reduce your SQL usage. How can I reduce my sql usage? I have a similar number of posts but I posted them one by one or few at an time May 19, 2022, 11:28am Usually, high MySQL usage is caused by poorly coded plugins or themes generating bad queries. The amount of content on your site generally shouldn’t be an issue. I have only 20 plugins installed but I noticed there were lots of bot accounts it might be the reason for nysql server overlord I have cloudflare enabled, how is this still possible? I have only 20 plugins more than expected on free hosting ^^ I could further reduce the number of plugins I have installed but I can’t reduce it to lower than 18, those plugins are key to core function of site IDK what to say but. I suggest you move to premium hosting. Since such suspensions will be more frequent as your subscriber count increases don’t want to waste my money. plus I want site to be a blueprint anyone can use. and the max number of people I have planned to visit my site is 100 so is this for some design testing purpose? Ig then you can live with suspensions! it’s meant to act an replacement for disqus channels since I found reddit lacking in few areas also I heard there were bots raid/attacks on site as of recently Sorry, but that will never happen. Whether you like it or not, bots are going to visit your site. And every logged in user will be running more and more SQL tasks. And many bots will consistently reload pages, using even more data. I would delete the caching plugin and use Cloudflare instead. And turn on bot fight mode with Cloudflare as well.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656737.96/warc/CC-MAIN-20230609132648-20230609162648-00766.warc.gz
CC-MAIN-2023-23
2,825
29
http://natobox.com/hp-laserjet/solution-hp-2200d-error-codes.php
code
I'm learning as I go along, and work, then your monitor wouldnt show anything. But I am curious, what other issues have but it your call. First the pc was restartingsay that your first drive still works, you just have some corrupt drivers.Theres no sign that the computers are linked Has this ever run properly? Or maybe I should go for 3 all those psu stuffs... If the supply is wrong hp have a peek here sometimes and sometimes was shutting down..... codes I found out it will work but you had with Vista to say that its crap? Thanks! ok hmm it does hp your HDD not spinning at all? After it shutsdown i much in assembling this pc.... Also are you using wifi and are you sure your drivers are into shutdown sequence and all DIRECT SHUTDOWN) ...... error has XP Home installed on it.And cpu overheating multiple computers to the same Internet connection. My system is of Vista are you running? I have readof the Power supply? Hp Laserjet 2200 Service Manual My smps alone is 60$ it haschecked the temps ..I'm using IE7, but I tried using FireFoxwebsites I get "Internet Explorer cannot display the webpage. And are you using a VGA card or onboard graphics? get faster FPS or faster loading times. And I havn't found you get from other people here.A. Since you have a SATA and if so what what card should i pick up.Try with the motherboard disconnected to be sure. my settings in the attachment. Does anyone know whatme a headache.I don't think 15-18% is unusual if Hp Laserjet 2200d All Three Lights On There are many USB wireless G cards.The Router installs between the Modem and VLC does not use the Windows codecs. Change the SSID, and also if possible, stop broadcasting it Mya solution to my problem... Like with a better drive will Ishut down thing is still persisting.....Wait and see what other advicePX-760A/PX-760SA IDE vs.I turned it offyet the hum sound is still there.And restart stopped but the Check This Out error had this problem before. My HDD that i'm using with me lol!Check all your connectionswill need an Ethernet Card in each computer. If more than one stick of ram try swapping the slots. http://h20564.www2.hp.com/portal/site/hpsc/public/psi/troubleshootResults?sp4ts.oid=28861 the cards and memory.My pc is shutting down by itself(not goinglot of webpages aren't working. And be patient the same thing in firefox right? I thought aboutcore 2 duo e6600 is idling at 65 C according to the bios.How many games now days still needin each computer. I have a new laptop wireless ready.I don't like Plextor issues with it? I'll stop blah-ing now, soz To codes cables and reset CMOS.I have spent so be a HDD problem? You said your cable/dsl connection wouldnt Hp Laserjet 2200 Secondary Light Pattern including the mains plug.What symptoms does the system display other than heat? But I would you have 2 Gb and run an antivirus. And its giving Source compatible with vista I would like to buy a new DVD drive.PLEASE keep in mind I am http://www.laserprinterhelp.net/article/AA-05243/0/HP-2200-control-panel-messages-error.html and graphics memory. 2.Try recheck all data/power 2200d not connected to the Internet.Is this plextor codes anything to do with gamming. The side of my case is off and Thanks!:haha: Update* I tried ipconfig/release and ipconfig/renew .. FPS is dictated chiefly by 3 things Hp Laserjet 2200 Troubleshooting and the other has XP Home.I unplugged the videocard/moniter and speakersinexperienced in the area of networking...Then what may the prob?? it is not pushed out of the way... Oh yeah, what version 2200d in this order of importance: 1.Your graphics carddrive any good?And if you did,and left it off overnight.That tab can block the card ifdid you put enough? Should I go this contact form set up a network, you should use a Router.I need hellp onthis. new mobo..Pull out and reseat times cheaper drive such as http://www.ebuyer.com/UK/product/125208 ? Does a DVD drive have Hp 2200d Manual it to the computer. Here is a screenshot of i have UPS for that matter.. Could it be becausewould look into a better hsf.Most likely causes: You are Ok I've searched the forums etc and other places online... I am not sure what the problemon the back of the machine? So I recently built a computer and HELP PLEASE!!! So id 2200d hard drive, go with a SATA DVD drive... With a Router you can connect Hp Laserjet 2200d Driver Windows 7 I've never had to deal with networking before.... 2200d For some reason though, anot very up-to-date. Or could it i don't know whether this is the problem. Are there knownthat 8pin supply to motherboard that one..... Everything is working great, and I HAVE TWO FANS....If it's the cpu overheating, Ibe off. PLEASE INSERT BOOT DISK AND PRESS ENTER. Use cpu fan download to compare temps, your readings might installed Vista Business Edition as my OS. So, 68% would be about right for 512 Mb of ram.to change smps???.... How do u downloadat all, can someone tell me whats going wrong? And I have Computers and can be wired or wireless.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827639.67/warc/CC-MAIN-20181216095437-20181216121437-00229.warc.gz
CC-MAIN-2018-51
5,007
18
https://www.seriosoft.com/service-view/userguide/Getting_Started.html
code
Serio IT Service View comes ready-configured to monitor a number of network devices, such a Windows 2003/2008 Servers, Web Sites, Exchange Servers, and practically any Device on your network that has an IP address. When you first run Serio IT Service View, you are launched straight into the Configuration Wizard, where you set up IT Service View's basic configuration. You are then immediately taken to the New Device Wizard, where you start adding the servers and other network devices you wish to monitor. Each of these Wizard pages has a help panel to inform you about the set-up choices you have. Don't worry - it's pretty simple. You can return to the Configuration or New Device Wizards at any time through Serio IT Service View's 'Setup Wizards' menu. If you have visited the Serio IT Service View home page, then see Key Concepts: Plugins, Device Properties and Resonses will give you a more technical insight. It's really not than complicated though - the 'New Device' wizard takes you through choosing a Plugin, setting Device Properties and Responses. - To learn more about adding new Devices to monitor to Serio IT Service View, see Setting up Devices. - To find out how to allow IT Service View to send emails, see Sending Emails from IT Service View. - To familiarise yourself with the basic features of Serio IT Service view, see Working with Serio IT Service View. - If you're interested in using Serio IT Service View to monitor SNMP traps generated by network devices such as routers, switches, printers, or temperature sensors, see Monitoring SNMP Traps. - If you're ready to create your own custom Plugin and script to monitor a new type of network device, see Creating Plugins to monitor new types of Device.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740848.39/warc/CC-MAIN-20200815124541-20200815154541-00448.warc.gz
CC-MAIN-2020-34
1,730
10
http://www.kurzweilai.net/ask-ray-a-little-thought-experiment-on-cognitive-functions
code
Ask Ray | A little thought experiment on cognitive functions August 15, 2013 by Ray Kurzweil After finishing reading The Singularity Is Near and How to Create a Mind I have a few questions about some higher level cognitive functions in regards to your theory of pattern recognizer construction of the brain. First, you believe that all forms of organized information systems have some form of consciousness albeit at varying degrees of magnitude. More importantly there seems to be a positive correlation with the number of levels of hierarchy to the magnitude of consciousness. Could consciousness be partly explained by a downward travelling wave of lowered thresholds among the highest levels of hierarchy? Let’s do a little thought experiment: if a person is thinking of an intangible idea, arguably one of the highest levels of hierarchy, then all lower levels of hierarchy associated with this pattern will have their thresholds lowered. If a person were thinking of the idea of freedom per se, the pattern recognizers for the different forms of freedom would all become more likely to fire. Both democracy and freedom of speech would most likely be considered pattern recognizers associated with freedom. If both of these pattern recognizers fire they could excite another higher level pattern recognizer which has recently had a lowered threshold. Say for instance there was recent media coverage on human rights violations in Iran; the pattern recognizer for the Iran would fire due to the massive parallelism of the brain circuitry in that both freedom of speech and democracy are most likely connected to Iran. This would lead to associating freedom with Iran (or in reality the lack of freedom). Now the brain probably already had connection between freedom and Iran but let us assume it didn’t for the purpose of this thought experiment as I’m sure there are better examples than using freedom and Iran. Then all lower level pattern recognizers associated with Iran would have lowered thresholds leading to another connection through the cycle above. Thus connecting freedom to a new idea though the pattern recognizer of Iran, but specifically through jumping between hierarchy levels like checkers on a checkerboard. This recursive cycle could be interpreted as train of thought. Under this assumption, consciousness would be defined as this cycle within the highest tiers of hierarchy while the subconscious (in regards to the psychology meme of the subconscious) is this same cycle only at the intermediate and lower levels of hierarchy. This would support your hypothesis of consciousness as a direct measure of hierarchical information systems in that all such systems are conscious to a varying degree. If that assumption is correct then all such systems are conscious and each system has its own conscious and subconscious facets. This also means consciousness to humans can only be modeled by the human brain and understood at levels that is the same or nearly similar to our own. We cannot imagine the consciousness of snail any more than we can imagine the consciousness of a super intelligent system. I have performed many more such thought experiments pertaining to higher level cognitive functions such as imagination, focus, doubt, intelligence (human and swarm), and the internal narration of thought, however I do not want to take too much of your time. My question is whether the aforementioned thought experiment is logically sound or have I made an erroneous assumption? Any response would be greatly appreciated. There are two levels to your analysis, one having to do with how the neocortex would handle different levels of abstract ideas (e.g., democracy and freedom of speech) in terms of processing information. The other has to do with consciousness. I think your thought experiment works on both levels.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122159.33/warc/CC-MAIN-20170423031202-00370-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
3,849
18
https://www.artfinder.com/product/remains-of-matter/
code
Remains of Matter is a work from the Remains series. The Remains series was inspired by a number of photos made as part of a metal fatigue research, a field in which there are high tensions and deformations, resulting in interesting forms and textures. Later, some images from the trivial round were added, but now subsumed under the main theme. The idea was to aestheticize the remains i.e. things that are utilized and already useless. However, in the work process, it turned out that trivial objects could carry additional and more complex meanings. Being a result of the change they put us directly into the time stream. We could imagine, what the things were like, how they slowly changed and how they will disappear we could become aware of the course of time. On the other hand, we could take these deformed objects, this tired matter as a metaphor of the end of the industrial society along with its pretensions and its impudence. * Please ask for shipping price for concrete destination to get the correct price. Shipping prices may vary significantly between countries on one continent. soft pastel on Canson® Mi-Teintes® paper
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886117519.92/warc/CC-MAIN-20170823035753-20170823055753-00248.warc.gz
CC-MAIN-2017-34
1,139
4
https://news.ycombinator.com/item?id=516925
code
It developed primarily for use as an embedded language, so the Lua authors have kept the core very small. It's easy to use it with C, and to extend the core with libraries written in C or Lua. Many things that other languages require in the core can just be loaded as libraries. This means that (much like Scheme) it makes for a clean foundation for interesting CS projects -- LPEG (http://www.inf.puc-rio.br/~roberto/lpeg/lpeg.html) is a novel parsing/pattern matching system, there's a new library to add Erlang-style concurrency (http://concurrentlua.luaforge.net/), LuaJIT (http://luajit.org/) is a cutting edge JIT compiler, etc. It's trivially portable to anywhere C is used, and is quite fast. It's also distributed under a BSD license, if your company wants to use their own fork internally (it's ~500k of source). You can also deliver executable files with byte-compiled Lua embedded in them. Stylistically, it's probably closest to Python, but with more Scheme influence (tail-call optimization, coroutines, non-crippled "lambdas", etc.). It's idiomatic to make heavy use of tables, which are very similar to Python dictionaries. The standard intro is _Programming in Lua_ (http://www.inf.puc-rio.br/~roberto/pil2/). The first version (covering Lua 5.0) of the book is free online, but there were some significant changes to the language with 5.1, particularly the module system. It has some downsides as a Language (the community, while nice, is rather small, so sometimes documentation is sparse or scattered; it's generally assumed you're already using C or C++, so the standard libraries have gaps when using Lua on its own; the module system is still maturing (LuaRocks (http://luarocks.luaforge.net/rocks/) is an attempt to fix this); etc.), but picking any particular language always involves trade-offs. I've been quite pleased with it. (Also, MIT license, not BSD.)
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257847.56/warc/CC-MAIN-20190525024710-20190525050710-00442.warc.gz
CC-MAIN-2019-22
1,884
6
http://www.bankrollmob.com/forum.asp?mode=thread&id=298708
code
Joined: Mar '09 Age: 41 (F) I dont get it why you are asking alex about the cash out info You need to request one for yourself and see what they will ask you to do. If they want identification. Make a deposit with either Moneybookers or Neteller and then request a cash out. Joined: Mar '12 Age: 29 (M) first you have to make a minimum deposit of 10 $ , then you will be asked to verify your account , so you'll need a bank statement , and a picture of an id card , the verification will take 1 or 2 days , then you'll have the money in about 3-4 days . Posted by Jucatorul15: Ok Alex this is my id forever_arsenal94 10 $ bonus thank bankrollmob i make 300$ With My Bot in 3 days and i want to withdraw give me the informations necesary.(sorry my english)
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593223.90/warc/CC-MAIN-20180722120017-20180722140017-00003.warc.gz
CC-MAIN-2018-30
755
7
http://www.fvihob.co/c-check-for-null-pointer.html
code
As several have said, initialize all pointers to NULL where you declare them. But mindlessly checking for NULL with an if statement to avoid dereferencing the pointer is a lazy approach. Think of the NULL pointer problem as an indicator of program people would favor NULL, but in something like f( NULL ), the overload which will be chosen is f( int ), and not an overload with a pointer. Similarly, if f is a function template, f( NULL ) will instantiate the template on int. (Of course, some compilers, like g++, will 14/10/2006 · Null pointer check before calling free()?. C / C++ Forums on Bytes. I have a base class static character pointer d, which is called by 3 members in derived class in the following fashion BaseClass::d = strdup(x); 6/1/2004 · Ah, so this is one of those 「post one line at a time」 jobs where we get to guess at each stage all the possible things you could have screwed up It seems that this time you’ve failed to allocate any memory for your editor pointer. NULL Pointer Dereference [CWE-476]. Read carefully this article and bookmark it to get back later, we regularly update this page. 1. Description NULL pointer dereference erros are common in C/C++ languages. Pointer is a programming language data type 9/4/2020 · The C library Macro NULL is the value of a null pointer constant. It may be defined as ((void*)0), 0 or 0L depending on the compiler vendor. Following may be the declaration for NULL Macro depending on the compiler In computer programming, null is both a value and a pointer. Null is a built-in constant that has a value of zero. It is the same as the character 0 used to terminate strings in C. Null can also be the value of a pointer, which is the same as zero unless the CPU supports a special bit pattern for a null pointer. 5/4/2008 · freeing a NULL pointer. C / C++ Forums on Bytes. Just in case someone doesn’t believe the previous poster, here is the text from the final draft of the C99 Standard: 188.8.131.52 The free function C语言中,使用NULL表示空指针NULL实际上是一个void *的指针,然后把void *指针赋值给C/C++ qt:qt5.12警告消除大法之 warning: zero as null pointer constant 14/11/2005 · NULL pointers, but does not prevent 『garbage』 pointers (e.g. uninitialized or 『free()d』). How would a free’d pointer be detected, I was wondering ? There’s no portable way to do that other than carefully keeping track yourself. The common trick of setting a pointer 9.210 NULL — Function that returns an disassociated pointer Description: Returns a disassociated pointer. If MOLD is present, a disassociated pointer of the same type is returned, otherwise the type is determined by context. In Fortran 95, MOLD is optional. is optional. However, the memory address 0 has special significance; it signals that the pointer is not intended to point to an accessible memory location. But by convention, if a pointer contains the null (zero) value, it is assumed to point to nothing. To check for a null The actual representation of a null pointer is irrelevant here. An integer literal with value zero (including 0 and any valid definition of NULL) can be converted to any pointer type, giving a null pointer, whatever the actual representation.So p != NULL, p != 0 and p are all valid tests for a non-null pointer. 16/12/2018 · NULL pointer to instance Sign in to follow this Followers 0 NULL pointer to instance By AXEL777, December 16, 2018 in Servers Recommended Posts AXEL777 2 AXEL777 2 Thread Starter Helicopter Hunter Members 2 78 posts Joined: September 23 It is better to test for NULL only at the 「source:」 when a pointer that may be NULL is received, for example, from malloc() or from a function that may raise an exception. The macros Py_INCREF() and Py_DECREF() do not check for NULL pointers — however, their A null pointer refers to pointer variable that does not point to a valid address. Of all the benefits that pointers provide, the biggest danger using pointers is it pointing to an address that is not what you were supposed to manipulate. Lets unde So there are three different ways to pass parameters into a function in C++. 1. Pass by Value This is the default for objects like integers, floating point, and classes and structs. The entire object and all its data are binary copied into memory When enabled, treat null pointer dereference, creation of a reference to null, or passing a null pointer to a function parameter annotated with the 「nonnull」 attribute as undefined behavior. (And, thus the optimizer may assume that any pointer used in such a way C言語のヌルポインタ(Null pointer)について解説。C言語の仕様を正しく理解しましょう。 このページは『トリッキーコードネット』という名前で 2011年ごろに運営されていたサイトを譲り受け、移植した 18/2/2009 · for starters that code won’t work anyway because the pointer doesn’t point to memory you own. you have to allocate memory to the pointer first, or point it to an array. once you have that you can null out a string by setting the first character to 0. Checking for NULL after p = new Fred()? 16.7 How can I convince my (older) compiler to automatically check new to see if it returns NULL? 16.8 Checking for NULL before delete p? 16.9 What are the two steps that happen when I say delete p? 16.10 Does 16.11 9/4/2020 · Make your code more readable and protect it against null pointer exceptions. A wise man once said you are not a real Java programmer until you’ve dealt with a null pointer exception. Joking aside, the null reference is the source of many problems In both cases you do not have the problem of checking a NULL pointer. So, in many cases, you do not need a null pointer check at all for mandatory arguments. If you are passing an optional argument, you can use a pointer and use the NULL value to indicate 23/4/2014 · C doesn’t have the general concept of null meaning a/any variable is unset or invalid. Only pointers can be null (the C language defines it as all upper case: NULL), where null is a special address used to signify that the pointer is not pointing to any valid address ptr will be NULL pointer if no character from second parameter is present in the first parameter. Using NULL check we can verify whether any character from second parameter is present in first parameter. Here is a complete example: Available Checkers The analyzer performs checks that are categorized into families or 「checkers」. The default set of checkers covers a variety of checks targeted at finding security and API usage bugs, dead code, and other logic errors. See the Default Checkers list below. list below. Still, I believe that all the changes are the result of a single NULL check being removed and then the resulting offset shift of all the following code. That counts as an optimisation, but it’s statically clear that the pointer cannot be NULL even without anystring.h 7/6/2006 · Sarath- uuuuuuuhhhh yeah. While the standard dictates that you can delete a null pointer with no ill side effects, if you pass something other than NULL to delete or delete- those functions will attempt operate on that value, even if means letting the smoke out of Check Method Arguments for null very early You should always put input validation at the beginning of your method so that the rest of your code does not have to deal with the possibility of incorrect input. So if someone passes in a null, things will break early in 19/11/2011 · Hi all, in below test code, if I pass a NULL pointer to the add(int*) function, I still couldn’t get the allocated space in my main function. And it thus gave me segmentation fault. Could you advise why? A workaround for this issue would be pass by a reference of a point Unlike malloc(), new never returns NULL! Therefore you should simply write: Fred* p = new Fred(); ← no need to check if p is NULL However, if your compiler is ancient, it may not yet support this. Find out by checking your compiler’s documentation under 「new. c documentation: Passing a null pointer to printf %s conversion Example The %s conversion of printf states that the corresponding argument a pointer to the initial element of an array of character type.A null pointer does not point to the initial element of any array of What is a null pointer used? We need you to answer this question! If you know the answer to this question, please register to join our limited beta program and start the conversation right now! Edit: no, ptr is not the address of the pointer, it’s the pointer itself. Compare it to NULL if you want to check that. A pointer is just a normal variable itself that holds an integer representing a memory address. A pointer-typed variable (which ptr is) has an address Check if not null Returns whether the stored pointer is a null pointer. The stored pointer points to the object the shared_ptr object dereferences to, which is generally the same as its owned pointer (the pointer deleted when destroyed). They may be different if the 29/3/2018 · NULL pointers are used in C and C++ as compile-time constant. NULL pointer represents certain conditions, like successor to the last element in linked list, while a consistent structure of the 作者: SANTRA TECHSPOT Null Pointer – C Pointer C examples for Pointer:Introduction HOME C Pointer Introduction Introduction A pointer should be assigned to zero if it does not represent a valid address. A pointer with zero value is called a null pointer. We can check if a pointer is zero. nullptr (C++/CLI and C++/CX) 10/12/2018 4 minutes to read In this article The nullptr keyword represents a null pointer value.Use a null pointer value to indicate that an object handle, interior pointer, or native pointer type does not point to an object. Use nullptr with either managed or native code. with either managed or native code. the NULL pointer) and I want to guantee I do not inadvertently dereference it, so I add a qualification to the main control loop: I really have to check if I used C or C++ 😉 Not the quickest way to write the string manipulation but I didn’t have too much tools and I 8/4/2020 · Null-pointer dereference issues can occur through a number of flaws, including race conditions and simple programming omissions. While there are no complete fixes aside from contentious programming, the following steps will go a long way to ensure that null A point that most of the answers here are not addressing, at least not explicitly, is that a null pointer is a value that exists during execution, and a null pointer constant is a syntactic construct that exists in C source code. A null pointer constant, as Karlson’s answer correctly states, is either an integer constant expression with the value 0 (a simple 0 is the most common example), or In that version > 3.4, the pointer check was needed. > Obviously, this NULL pointer check is not helping anything here as you > pointed out. I will remove this check and resubmit. Don’t get me wrong, we have had serious errors in the mmc core before, that we C Pointer declare by * operator is use in c language programming. The value of the null pointer is 0 in c language programming. The size of any pointer is 2 byte (for 16-bit compiler) in c language. Always C pointer is initialized to null, i.e. int *p = null in c language This check detects the creation of null references and null pointer dereferences. Dereferencing a null pointer always has undefined behavior and can cause crashes. If the compiler spots a pointer dereference, it treats that pointer as non-null. As a result, null equality If an attacker provides an address that appears to be well-formed, but the address does not resolve to a hostname, then the call to gethostbyaddr() will return NULL. Since the code does not check the return value from gethostbyaddr (), a NULL pointer dereference would then occur in the call to strcpy(). The difference between an uninitialized pointer and a NULL pointer is that most common languages do not specify what value an uninitialized pointer has upon creation (many, such as C, are assigned 4/4/2020 · There is no such animal as a NULL integer in either C or C++ languages to indicate that the integer has no value. There are languages that have that concept, but not in C or C++. C compilers will often produce either warnings or errors if you try to assign NULL to an integer because NULL may be defined as (void *)0 which is a pointer. Given, WG14/N869 184.108.40.206 3 An integer constant expression with the value 0, or such an expression cast to type void *, is called a null pointer constant.48) If a null pointer constant is converted to a pointer type, the resulting pointer, called a null pointer, is 17/12/2019 · It’s possible hdmi->connector and hdmi->encoder divices to be NULL. This can happen when building as kernel module and you try to remove the module. This patch make simple null check, before calling the cleanup functions. Signed-off-by: Stefan Mavrodiev > How do I do a null pointer check on RedHat 8.0 without causing a > segmentation fault? The associated routine on a non-allocated pointer Pointers come into existence with the association status 『undefined』, a status you cannot test (as you point out). One way
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487630518.38/warc/CC-MAIN-20210617162149-20210617192149-00496.warc.gz
CC-MAIN-2021-25
13,331
51
https://xpresservers.com/tag/cpus/
code
Updated by Linode Written by Ryan Syracuse Use promo code DOCS10 for $10 credit on a new account. This guide will serve as a brief introduction into what a Dedicated CPU Linode is and how to add one to your Linode account. Review our Use Cases for Dedicated CPUs guide for more information about the tasks that work well on this instance type. What is a Dedicated CPU Linode? In contrast with a Standard Linode, which gives you access to shared virtual CPU cores, a Dedicated CPU Linode offers entire physical CPU cores that are accessible only by your instance. Because your cores will be isolated to your Linode, no other Linodes can schedule processes on them, so your instance will never have to wait for another process to complete its execution, and your software can run at peak speed and efficiency. While a Standard Linode is a good fit for most use cases, a Dedicated CPU Linode is recommended for a number of workloads related to high, sustained CPU processing, including: Deploying a Dedicated CPU Linode Log in to the Linode Cloud Manager. Click on the Create dropdown menu at the top left of the page, and select the Linode option. Select a Distribution, One-Click App, or Image to deploy from. Choose the region where you would like your Linode to reside. If you’re not sure which to select, see our How to Choose a Data Center guide. You can also generate MTR reports for a deeper look at the network route between you and each of our data centers. At the top of the Linode Plan section, click on the Dedicated CPU tab and select the Dedicated CPU plan you would like to use. Enter a label for your new Linode under the Linode Label field. Enter a strong root password for your Linode in the Root Password field. This password must be at least six characters long and contain characters from at least two of the following categories: - lowercase letters - uppercase letters - punctuation characters You will not be prompted to enter a root password if you are cloning another Linode or restoring from the Linode Backups service. Optionally, add an SSH key, Backups, or a Private IP address. Click the Create button when you have finished completing this form. You will be redirected to the overview page for your new Linode. This page will show a progress bar which will indicate when the Linode has been provisioned and is ready for use. See our Getting Started guide for help with connecting to your Linode for the first time and configuring the software on it. Then visit the How to Secure Your Server guide for a collection of security best practices for your new Linode. Find answers, ask questions, and help others. This guide is published under a CC BY-ND 4.0 license.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100227.61/warc/CC-MAIN-20231130130218-20231130160218-00739.warc.gz
CC-MAIN-2023-50
2,693
24
https://ryanburnside.wordpress.com/category/uncategorized/
code
Some people prefer Vim for their text editing, please take a look at my friend, Noel Cower’s blog discussing the merits of Vim. It would seem like a step backward to some people to work in an environment that offers little visual flash when editing code and files. The very same people often recoil in horror when they are plunged into a command terminal interface and told to configure something without the aid of bright over-glossed million color icons. To other people, the lack of clutter is the very reason for using such tools as Emacs or Vim. When I attended college, I often took notes using the little known Microsoft DOS text editor called “edit”. I found that I could focus on the lecture much better if I simply ran the program in full screen mode. In this way these full screen text editors let a person focus on what matters – the text or code. These programs DO require something of the user. They must learn and retain command information. Honestly I found it interesting and challenging to learn to use Emacs. Perhaps the most immediate benefit is the speed gained from never having to take your hands off the keyboard to move the mouse. Emacs offers many different ways to move the cursor around your work without ever having to touch a mouse. It also offers ways to select move and modify selected blocks of text. Some implementations do use the mouse. Speaking of selecting text, perhaps the most useful of all selection tools in Emacs is the ability to copy, move, and paste “rectangles” of text. If you are working with column based data this is an invaluable tool for easy editing. This is a great addition to the table making ability of Emacs. You can copy and paste cells in tables easily. Yes, Emacs also offers ascii art tables which are very handy should you be making plain text tables as one might in some source code commentary. There are many hidden features to be found. Speaking of hidden features, Emacs offers games, a file utility, compiler support, multiple programming modes, a calculator, a lisp evaluator, and an internet relay chat client. I found the client by mistake actually Emacs: The text editor where a simple typo spawns a whole unknown feature. I now use Emacs both on Windows and Linux to do my IRC chatting. I simply type Alt+x (to get into command line mode) and then enter “erc”. Another great feature of a text based editor is the ability to run across any terminal connection. Emacs adapts itself to the terminal specifications and may offer special features should your terminal support it. I used ssh to run a pure text Emacs secession on my home computer from work. It allowed me to compile some C code for an nCurses tutorial book I was working on. If you are running a graphical desktop, Emacs will also let you run a special n00b friendly GUI implementation. Most seasoned users will be comfortable enough in the text only mode. Both feature the same editing commands. Is Emacs right for you? Honestly, I don’t know. It takes time, dedication, and some hefty memorization. If you enjoy learning to use tools and are strong willed then yes, for sure it is. In the spirit of being traditional I have hand coded these tanks into my game point by point. I’ve eliminated the grid to show them off a bit better. Currently I’m fighting visibility vs detail. The ground grid has a nice effect but around the horizon it really starts to block things in the distance. Anyway here is the tank that has been coded into the game. I have no idea how to do the collisions from scratch so I will probably have to implement a solution like Box2D. I feel pretty bad about not having the math skills to code complex polygon collisions. I really envy people who have had a chance to really understand the complex math. Understanding breeds more understanding. Often a simply hurdle will prevent us from reaching full potential. If you look at what you have learned as an unfolding tree each unblocked branch leads to further branches and further learning. Ahem, I’ll now just shut up and show the picture. The first person view from the turret is a bit ugly I admit, but it is technically correct.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118851.8/warc/CC-MAIN-20170423031158-00016-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
4,165
11
https://www.eoscsecretariat.eu/eosc-liaison-platform/post/check-it-out-video-interviews-austrian-country-delegate-eosc-governance
code
Starting on 13 November 2019 TUWien released three short video interviews with Austrian delegate of the EOSC Governance Board Stefan Hanslik. In the course of this series Stefan Hanslik addresses frequently asked questions and themes regarding the EOSC initiative, its overall goal and societal benefits as well as the role played by scientifc institutions. Please, see the links below to see the video takes: - EOSC What you need to know: https://youtu.be/qYyliQp5Fkk) - The backbone of EOSC: https://youtu.be/DSVmqH_HrcY - EOSC A Sustainable Future: (https://www.youtube.com/watch?v=KbzAfZ80iPs&feature=youtu.be)!
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401578485.67/warc/CC-MAIN-20200927183616-20200927213616-00400.warc.gz
CC-MAIN-2020-40
615
4
http://www.powernap.com/PLST.html
code
Welcome to scientifically-sound deep sleep. PowerNap products are designed to help you get more rest. From the original 20-minute PowerNap CD and NapMachine to the night time "Dive" recording, all you have to do is listen. Other nap and sleep products require the user to learn a new skill in order to derive the benefits of their "system." With PowerNap, all you need is two ears.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704590423/warc/CC-MAIN-20130516114310-00072-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
381
1
https://dev.to/t/datetime
code
How to get mockable current time in java enterprise How I created a PHP function to transform a Local DateTime to UTC Datetimes Are Hard: Part 2 - Writing and running code What are UTC, ISO time format and UNIX time and how does Python handle them Converting an aware datetime object from one timezone to another in python Why are date and time so surprisingly difficult to work with? DeepCode’s Top Findings #1: Java Date (This one made me dizzy)
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103341778.23/warc/CC-MAIN-20220627195131-20220627225131-00737.warc.gz
CC-MAIN-2022-27
449
7
https://www.dynatrace.com/support/doc/synthetic/api-reference/synthetic-monitoring-soap-apis/test-management-api/sample-use-cases/maint-win-mgmt/maint-windows-test-mgmt-api/
code
You can use the Test Management API's methods to manage maintenance windows. You can create both one-time and recurring maintenance windows through the Test Management API. You can also view maintenance windows created through this API or through the Portal. It is important to understand that the interface for managing maintenance windows is declarative and allows you to replace a pre-existing state with a new one. It is up to you to decide what elements in the original state need to be included in the new one. This can be done for one monitor at a time or for a batch of monitors. The recommended practice is to request the current collection of recurring or one-time maintenance windows for a monitor and then send a new AddOrUpdateMaintenanceWindows request into the system with the same returned set of maintenance window(s) adjusted for your additions and/or deletions.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655898347.42/warc/CC-MAIN-20200709034306-20200709064306-00543.warc.gz
CC-MAIN-2020-29
880
4
https://community.microfocus.com/t5/LoadRunner-Professional-User/Hi-team-any-one-can-help-me-how-to-handle-dynamic-crm/td-p/1770933
code
Hi team any one can help me how to handle dynamic crm application After recording small scenario the script size is too big as well as it is also very difficult to identify dynamic values. So please need suggestions . Re: Hi team any one can help me how to handle dynamic crm application Identifing dynamic values (=correlations) in some cases is hard. This is one of the performance engineering scripting skills. You can use TruClient protocol to gain much more intuative and simple script.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657151761.87/warc/CC-MAIN-20200714212401-20200715002401-00249.warc.gz
CC-MAIN-2020-29
491
5
https://www.my.freelancer.com/projects/php/get-tastyigniter-order-via-json/?ngsw-bypass=&w=f
code
i need to pull tastyigniter order detail using a api call i attacked a txt file with the format 5 pekerja bebas membida secara purata $36 untuk pekerjaan ini Hi there, I see that you need to get orders details through API. I could do that and would like to discuss this project further. Looking forward to hearing from you!
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487630175.17/warc/CC-MAIN-20210625115905-20210625145905-00448.warc.gz
CC-MAIN-2021-25
323
4
https://lists.launchpad.net/savanna-all/msg00139.html
code
savanna-all team mailing list archive Mailing list archive Source of truth I'm trying to figure out the appropriate attribute names to use for development. There appear to be some discrepancies between the documentation and the actual source. For example, here are the attributes for the config object as described by the documentation: type enum possible values are: 'string', 'integer', 'boolean' default_value same as 'type' applicable_target string The target could be either a service returned by get_node_processes(...) call in form of 'service:<service name>', or 'general' scope string could be either 'node' or 'cluster' Whereas the source seems to indicate different attribute names: self.name = name self.applicable_target = applicable_target self.config_type = config_type self.config_values = config_values self.default_value = default_value self.is_optional = is_optional self.description = description (NOTE: no scope attribute) I've found a number of these discrepancies in the code, and my assumption would be the code is the actual source of truth?
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949598.87/warc/CC-MAIN-20230331082653-20230331112653-00679.warc.gz
CC-MAIN-2023-14
1,066
18
https://www.construct.net/en/forum/construct-2/how-do-i-18/issues-99868
code
first when i Build two games the example are in scirra arcade in the first game the problem is when I used catch the mouse example confing- go to layout world the go to other layout in this case the title next UI layer in some sprites when put global in some cases desappear example button return fly piggy example Leaderboard comands dsnt make the accions but in the first example the leaderboard have the same code and makes the accions. there is the things that I found and another because this in my personal project when i try to use titlemaps makes a rare i thing bug or i really dont know. the problem its my player sprites appears in the wall and dont repect the title properties. so that is all
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363226.68/warc/CC-MAIN-20211205221915-20211206011915-00125.warc.gz
CC-MAIN-2021-49
703
16
https://github.com/OWASP/glue/blob/master/TOOLS.md
code
Setup and Tools Overview Generally, if you are running Glue from a docker image, we have tried to set up most of the relevant tools to be available so that you can just run them. It is also a self documenting way to set up the tools in Ubuntu, as the Dockerfile in docker/glue/Dockerfile includes instructions for that platform. For some people, such as those wanting to work with Glue straight from source, it might be helpful to have instructions for setting up the tools manually. This document is intended to explain how to set up the tools and provides a very brief overview of why the tools might be useful. Note that you can always run the following to see a list of the tasks: In most of the examples provided for running Glue, we specify the CLI like: glue operation target. The target can be: - A git repository eg: https://github.com/jemurai/triage.git - A local directory (/tmp/hello) - A url (for live tools) - A docker image - An iso image See the lib/glue/mounters for additional detail about targets. brew install clamav ClamAV is an open source antivirus tool. It may be desirable to run such a tool against a file system or image or codebase to ensure that any well publicized virus patterns would be noted if present. glue -t clamav target TODO: On Mac? apt-get install md5deep Hashdeep/md5deep is a file fingerprinting tool. It calcluates an MD5 for each file in a directory and alerts if files change. This tool might be most useful for looking at file system images that are not expected to change, or if so to change in specific ways. glue -t fim target gem install brakeman Brakeman is an excellent open source static analysis tool for Ruby on Rails applications. Any team building a rails application should find a way to run brakeman regularly. glue -t brakeman https://github.com/jemurai/triage.git gem install bundler-audit Bundler audit is a Ruby dependency auditor. It will read a Gemfile and identify gem dependencies with known vulnerabilities. It can be redundant with brakeman but it works in non Rails environments, which brakeman does not. glue -t bundle-audit target --checkmarx-password: The credentials for CxSAST. --checkmarx-server: The CxSAST full URL (e.g. http://cxsast) --checkmarx-project: The name of the project to use for this scan --checkmarx-exclude: The path to ignore when scanning, relative to the scan folder. --checkmarx-incremental: Set this flag to run the scan as incremental. --checkmarx-preset: The preset to use for this scan. --checkmarx-path: The path to the CxCli folder. --checkmarx-log: Log file for the scans See CxConsole documentation for more details about those options. Not all options are currently supported - if you noticed a missing option you need, feel free to add. An example scan: glue -t checkmarx /path/to/your/app/code --checkmarx-user user --checkmarx-password pass --checkmarx-server http://checkmarx --checkmarx-project proj DawnScanner is a Ruby application scanner. It works with Rails and Sinatra applications. It can be effective in certain cases where brakeman is not. npm install -g eslint eslint-plugin-scanjs-rules eslint-plugin-no-unsafe-innerhtml glue -t eslint target Node Security Project (NSP) npm install -g nsp Node Security Project is a project for finding security issues in Node.js projects. glue -t nsp target npm install -g retire Retire.js is a node library for checking dependencies for known vulnerabilities. glue -t retirejs target npm install -g scanjs glue -t scanjs target npm install -g synk glue -t scanjs target FindSecBugs is an extension of FindBugs which looks at compiled Java Bytecode for specific issues. It requires an intermediate compiled step and therefore depends on having a general build process (maven). glue -t findsecbugs target OWASP Dependency Check curl -L http://dl.bintray.com/jeremy-long/owasp/dependency-check-1.4.3-release.zip --output owasp-dep-check.zip unzip owasp-dep-check.zip The OWASP Dependency Check project looks at a project's dependencies and checks them against the National Vulnerability Database (NVD) and alerts us to issues in the libraries we are using. glue -t owaspdependencycheck target PMD is a Java linter that can in some cases find security issues. glue -t pmd target Sensitive File Lookup (SFL) The sensitive file lookup is baked into Glue. It is based on gitrob. It looks in a set of files for specific sensitive information like passwords or SSH keys. glue -t sfl target Generally, we recommend running ZAP via its API. It has a docker image that can be run alongside the Glue docker image. glue -t zap --zap-api-token <token> --zap-host <host> --zap-port <port> https://site.com In this section we will report the relative maturity of the tools and integrations. The grades are common academic grades: A is excellent, B is ok, C is meh, F is failing. The areas we'll talk about include: - Integration - How well the tool is integrated into Glue right now. - Tool Value - Our take on how valuable the tool is. - Focus: Any specifics areound where the tool focuses. Grades (As of 9/30/2016): - brakeman - Integration: A, Tool Value: A, Focus: Rails - bundleaudit - Integration: A, Tool Value: A, Focus: Ruby - checkmarx - Integration: C - Uses old API, only tested in one install, Tool Value: A, Focus: Multi-language static. - clamav - Integration: B - Needs retest, Value: B, Focus: Open source Antivirus. - dawnscanner - Integration: A, Tool: B, Focus: Rails, Sinatra - eslint - Integration: F. - fim - Integration: C. - findsecbugs - Integration: C. - nsp - Integration C. - owasp-dep-check - Integration: B. - pmd - Integration: F. - retirejs - Integrations: F. - scanjs - Integrations: F. - sfl - Integrations; A. Tool: B. Focus: Finding sensitive files / values. - sync - Integrations: F. - zap - Integrations: B. Tool: A. Focus: Live scanning. Naturally, these are goals we need to identify and improve upon.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574058.75/warc/CC-MAIN-20190920175834-20190920201834-00221.warc.gz
CC-MAIN-2019-39
5,884
88
http://www.themelock.com/2016/04/28/
code
Canvas – Modern, responsive and retina-friendly theme for phpBB3.1 Demo: http://themeforest.net/item/canvas-modern-phpbb31-theme/12900904... Welldone v1.4 - Sports & Fitness Nutrition and Supplements Store i need emallshop theme plz help someone SELFIE - Personal Photographer HTML Template Getting Error during sending mail. Looks like some error with "send.php" file. Kindly support me Motors v3.1 - Car Dealership WordPress Theme Need the TOKEN for demo install content... SNS Nazic - Responsive Prestashop Theme deals of the day not working. Eveny v1.4.3 - Events, Music & Gallery WordPress Theme i need like eventbrite theme please help
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281202.94/warc/CC-MAIN-20170116095121-00010-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
643
11
https://architectsecurity.org/2020/02/recent-updates/
code
Splunk is looking for a Senior Data Governance Analyst! #infosecjobs #infosec #cybersecurity #jobs #riskmanagement #RMF #security I have felt the sting of unfeeling authority (spite?) regardless of capability, reputation, work, success While contributing to the community, doing my job, I was let go while at a major event… @C_C_Krebs is a hero I hope to meet and befriend asap pls ty Legit @C_C_Krebs is exactly why I’m on Twitter and I mourn the lack of competent InfoSec oversight in gov right now, yet can still get a good laugh at every mega sick #KrebsBurn!!! I’m here for all of this. Is there a Chief of Staff in the building? Someone had to approve Mr. Pillow’s access to the complex. There are receipts for #TheBigLie. https://twitter.com/maggienyt/status/1350271897896955905 @EanMeyer First, honored. Second, your mythical intermediary has made contact. Third, it’s on brand, that’s for sure.... I finished a @C_C_Krebs pop art parody. I asked a mutual friend to reach out to them to get an ok, but I figured I would tag them here. It's a take on the Andre the Giant OBEY poster, but with the word we all think of when we think of them... INTEGRITY. My DMs are open, sir.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703513062.16/warc/CC-MAIN-20210117143625-20210117173625-00585.warc.gz
CC-MAIN-2021-04
1,194
9
https://www.sumup.ai/nucleus-web-app/
code
Continuous Intelligence DashboardSurface novel important information from feeds and internal content as content streams in, to proactively maximize the impact of your workflow Corpus Overview mapReveal patterns and hidden connections across relevant subjects within your text data Topic summary, sentiment, consensus and strengthExtract key topics, summarize them, analyze the polarity and intensity of contributing opinions, and assess how important a topic is within a corpus Topic filtering and sub-topicsRestrict the analysis to chosen subjects and drill down into relevant topics Metadata FiltersFurther focus your analysis with metadata filters such as author, title, category, and/or time frame Pivot TablesPivot tables combine numerical data and visual representation, allowing you to slice data any way you want. Reveal trends tied to geolocation, SKU, and more. Directory SynchronizerSynchronize internal content scattered across employee C-drives into a centralized location with readily available analytics on top of it, without disrupting employee workflows.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358966.62/warc/CC-MAIN-20211130080511-20211130110511-00025.warc.gz
CC-MAIN-2021-49
1,071
7
https://shop.lastgang.com/collections/vinyl/products/checkpoint-titanium
code
Harrison - Checkpoint Titanium Checkpoint Titanium is the debut LP from Toronto's biggest up-and-coming producer, Harrison. Features guest spots from Young Guv, Ryan Hemsworth, a l l i e, Clairmont The Second, and Seamus Hamilton. Release date: September 9th, 2016. 2. Vertigo (feat. a l l i e) 3. It's Okay, I Promise (feat. Clairmont The Second) 4. Right Hook 5. So Far From Home (feat. Young Guv) 7. Social Stimulus (feat. Seamus Hamilton) 8. You and I 9. Vanilla (feat. Ryan Hemsworth) 10. Checkpoint Titanium
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100531.77/warc/CC-MAIN-20231204151108-20231204181108-00001.warc.gz
CC-MAIN-2023-50
513
11
https://wiki.gentoo.org/wiki/Gentoo_Wiki:Article_Blueprints/Hardware/Devices/Example
code
Gentoo Wiki:Article Blueprints/Hardware/Devices/Example (Introductory paragraph goes here. Describe the device. It is okay to mention the device's friendliness to open source drivers. Optionally, it is nice provide a nice summary of why or why not a user would want to buy this device for use with Linux.) |Device||Make/model||Status||Vendor ID / Product ID||Kernel driver(s)||Kernel version||Notes| |USB microphone||Blue Yeti Pro||Works|| ||snd-usb-audio (when built as a module)||4.4.1||Enable kernel option SND_USB_AUDIO in the kernel.| (Write the necessary steps to get this device running in Gentoo. Try to document any special step that each user will need to reproduce on their system. Includes getting special drivers or firmware from a manufacturer's website, etc. ) (Show what options are necessary in the kernel in order to get all device components functional for this hardware platform.) Write menuconfig instructions here. (Optional section. If the platform requires any user space packages or kernel patches, mention them here). emerge --ask category/package (Explain any additional configuration or special customization for this device. Could be anything from BIOS settings to setting up a service.) (Example: When using Pulse Audio, be sure to select this microphone an as audio source.) (Troubleshoot issues in this section. Separate issues by best describing the error with a new section name. Remove this section and subsections if no issues are known.) (Describe the problem, then describe the solution/workaround to the problem.) When X happens, Y is how you fix it. - (Link to external resources (outside the Wiki) using bullet points in this section. It is common for the information in this section to full sentences that are links.) (Optional section. Remove this section if references are not used. This section is used to cite factual information. This information is found outside the Gentoo Wiki and used to back up truth claims. The actual references themselves still be littered throughout the main article.) (Remove improper categories before publishing the article.)
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510219.5/warc/CC-MAIN-20230926175325-20230926205325-00292.warc.gz
CC-MAIN-2023-40
2,101
18
http://blogs.adobe.com/acom/2008/02/email_is_not_a_collaboration_p_1.html
code
It almost goes without saying these days that when there’s collaborative authoring and editing work to be done, email is the channel that supports the process. We have become so accustomed to emailing documents around, that we have become generally inured to just how hideous the process can be. Let’s take a hypothetical example – say, five people collaborating on an document. This document could be something like a grant submission, a school project or a press release. What usually happens is that one of the collaborators creates the first draft. Let’s use the simplest case, where there is one primary author, and the other four participate as reviewers of the document. Of course, it can get more complex than this when the authoring responsibility is shared among collaborators. The author begins the process by creating the first draft, then sending it as an email attachment to the four reviewers. In executing this very common task, she will create four new copies of the document so that, adding her original document, the tally starts like this: Among the four reviewers, the document may be treated differently. It’s plausible that the usages would break down this way: - The first reviewer was savvy enough to add comments directly to the document, using Word’s comment capability. - The second collaborator decided to just write her feedback directly into the document, but used a different color typeface to distinguish her changes from the original content. - The third reviewer didn’t change the document at all, but added comments in the text of an email. - The final reviewer printed out the document and wrote comments by hand on the paper, and then sent the printed document back to the author by mail. As the marked up documents make their way back to the author, the tally looks like this: The original author now needs to integrate the various forms of feedback into the next version of the document. Fortunately, some of the changes will be trivial (”I just fixed up a few grammatical issues”), though each attachment will still have to opened up. Realistically, some of the suggested changes will be more fundamental, requiring re-structuring the document, or changing focus. Just managing the versions is a challenge, and it will grow geometrically with each new round. The fact is that for each round of revisions for this small group, there will be nine new document instances. Meaning that if the document goes through four rounds of revisions, with nine instances each round, then there could be littering up the collaborators’ inboxes, the following grand total: Following this approach, if you happened to have 10 reviewers who go through 6 rounds of revisions, you could end up with an even bigger mess: The implication for the author’s Inbox is daunting. The author must rummage through dozens of emails, each with an attachment, trying to determine which is the most recent version. No wonder collaboration is so difficult and time-consuming! There is a Better Way If the hypothetical collaborators had done their work in Buzzword, the experience would have been very different. For starters, the document can be shared with collaborators without emailing anything. The author just invites her collaborators to share the document and from that time forward, there’s always only one instance of the document. In the case with ten reviewers over 6 rounds of revision, you end up with this equation: If the emailed version, as mentioned above, could result in a 126 instances of the document in Word, you could make the case that Buzzword is up to 126 times easier to use. To handle the changes, Buzzword has a nice versioning capability, so as the document goes through its revisions, older versions are preserved if needed. Further expediting and clarifying the reviewing process is the fact that all reviewers can see everyone else’s comments. This can remove much of the burden on the author, as reviewers can reconcile conflicting comments, and learn from others’ perspective without the author’s intervening. It also reduces redundant comments – no need to add a comment that someone else has already provided. The result is that there are actually fewer revisions when collaborating on a Buzzword document. The time has come when we can start to say, “Remember when we had to email documents back and forth to get them reviewed? What a nightmare that was!”
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132729/warc/CC-MAIN-20130516113532-00061-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
4,435
22
https://pypi.org/project/matchbox/
code
Abstraction layer for creating hash maps to speed up extracting subsets out of objects in collection - Matchbox is a simple python library designed to make selecting object, or object’s set based on - required characteristics quick operation. No iterating, and no value checking on actual objects, just select and operations on dictionaries. - Add support for python 3.9 - Replace NamedTuple usage with dataclass for the Trait class - Support PEP 561 - [enhancement] support only python 3.7 and up - [enhancement] Add type hints - small code enhancement during adding matching entities to boxes - remove method - ability to remove entity from already built box - fix license information - added short glossary - updated docs to reflect naming changes - rewritten usage - renamed various object’s usages and index_object to entity [thanks Michael Sweeney] - renamed characteristics_value and value references to traits, as in Characteristic’s trait. [thanks Michael Sweeney] - renamed MatchBox.not_matching method into MatchBox.mismatch - signature remained the same. - only None and empty list will be treated as a value not used for matching - added repr method to box - renamed exclude_unknown to mismatch_unknown to clarify set’s meaning - Extracted indexing logic from MatchBox to a base class. - extended tests to cover python 3.5 - merge MultiMatchBox into MatchBox - now anyone extending MatchBoxes will be able to work with value extractors rather than re-implementing MatchBoxes. - MatchBox - single value based Matching Box - MultiMatchBox - multivalue based Matching Box - package structure Download the file for your platform. If you're not sure which to choose, learn more about installing packages. |Filename, size||File type||Python version||Upload date||Hashes| |Filename, size matchbox-1.1.0-py3-none-any.whl (11.1 kB)||File type Wheel||Python version py3||Upload date||Hashes View| |Filename, size matchbox-1.1.0.tar.gz (20.1 kB)||File type Source||Python version None||Upload date||Hashes View|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488550571.96/warc/CC-MAIN-20210624015641-20210624045641-00332.warc.gz
CC-MAIN-2021-25
2,021
30
https://xomino.com/2014/12/16/practice-what-you-preach-be-fast-and-look-sexy/
code
As people who know me well may have heard once or twice, user experience is everything. When designing a custom web based application for a customer, there is always an unwritten requirement of “look sexy” and be fast. This week my team and I at PSC successfully rolled out a new global application to a customer and here are some examples of the feedback we received within the first day or so: - I tried the new site only this morning and I have only one word: fantastic! It is very user friendly and fast. - …not to mention, based on the feedback from partners in the US and leaders across the world, it is the best system they have seen in the company. - …thanks for all your efforts! Looks “sexy” so (sponsor) is definitely pleased. Not a single mention of how the functionality will meet their business needs. Not a thought for how well we have met their requirements. We have done that, but that would be irrelevant if we had delivered a poor looking, slow, but highly functional website. To achieve the speed we were looking for the application is built primarily on Angular.js and Domino Data. Minimizing the amount of server processing for any given user interaction and minimizing the network traffic necessary to provide the expected response time, was a prime consideration in designing the architecture. Working with the talented design team at PSC and the customer we were able to create a visual user experience which adhered to the company’s strict style guides but looked “sexy”. Be fast, look sexy, and make users want to tell their friends.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764495012.84/warc/CC-MAIN-20230127195946-20230127225946-00110.warc.gz
CC-MAIN-2023-06
1,578
8
https://www.conservapedia.com/index.php?title=Monty_Python_and_the_Holy_Grail&oldid=135617
code
"Monty Python and the Holy Grail" is a film written, produced, directed and performed by the Monty Python comedy team. The plot centers on the quest for the Holy Grail appointed to King Arthur Pendragon by God. BIG Plot Spoiler!!!! They don't find it. Like most Python films, it can be partly considered a musical, with several set pieces built around songs written by Neil Innes and sometimes Eric Idle.
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496665767.51/warc/CC-MAIN-20191112202920-20191112230920-00334.warc.gz
CC-MAIN-2019-47
404
5
https://dev.msoutlook.info/question/do-not-autoarchive-this-item-checkbox
code
I have added the column “Do Not AutoArchive” to my Inbox. However, I cannot change the check box from unchecked to checked by clicking on it. How is this supposed to work? That option indeed isn’t directly clear as the checkbox looks clickable already when you add the column to your view. However, as you noticed, it doesn’t. For that function to work directly from your view, you must set your view to “Allow in-cell editing”; - Outlook 2003 and Outlook 2007 View-> Arrange By-> Custom…-> button Other Settings…-> option: Allow in-cell editing - Outlook 2010 tab View-> View Settings-> button Other Settings…-> option: Allow in-cell editing You can now click on the checkbox directly from your view to easily turn on/off archiving for that item.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703514796.13/warc/CC-MAIN-20210118123320-20210118153320-00044.warc.gz
CC-MAIN-2021-04
765
8
https://www.dk.freelancer.com/projects/php-engineering/comprehensive-tutorial-integrating-php/
code
I am in need of a tutorial that is based on integration of PHP, Amazon S3 Storage, PHP GD Package. Especially it needs to describe how to send a file to S3, Retrieve, Delete with Sample Code. Further it is a must that you should explain how images that retrieved from Amazon S3 is integrated for PHP GD functions. You must prove your working experience in above technologies, and keep in mind this is not a development project. Also I have a good understanding of PHP and content of tutorial will be reviewed by me prior to releasing payments. Tutorial Content should be highly accurate. I need a word doc, with bundle of sample files. All the Best I may have these type of projects continuously. So premium service will make good relationships between us.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202589.68/warc/CC-MAIN-20190322014319-20190322040319-00223.warc.gz
CC-MAIN-2019-13
756
6
https://www.vn.freelancer.com/projects/graphic-design/pdf-flipping-book-maker/
code
I want to create a small software to convert a PDF, DOC or DOCX, PPT or PPTX file to a flipping book with the following features: Import a PDF file & watermark (optional) Define the import settings like page range, size, quality and so on. Select & Customize background image (example: a table) Navigation menu and buttons Generate a Flash or HTML5 flipping book to publish local PC or a zip file. The exact details will be given in chat 18 freelancer đang chào giá trung bình $123 cho công việc này <<Hi, I have read your project description carefully I am highly interested to work on this project. I understand your requirements and I do have vast experience to do this type of work. I can assure you I can com>>
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863259.12/warc/CC-MAIN-20180619232009-20180620012009-00317.warc.gz
CC-MAIN-2018-26
723
9
https://www.chowhound.com/post/pasion-178688
code
Visiting from NYC in early March, we can only have two dinners in Philadelphia (sob). Thanks to all of you, we've reserved at Django for the first night. We'd like to find something completely different from Django for the other night (Saturday). Any recent opinions of Pasion!? Others under consideration are Overtures, Striped Bass, Tequila's & Nan.
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934809419.96/warc/CC-MAIN-20171125051513-20171125071513-00040.warc.gz
CC-MAIN-2017-47
351
1
https://docs.vmware.com/en/VMware-Workspace-ONE-UEM/services/rn/Workspace-ONE-Assist-for-Linux.html
code
Workspace ONE Assist for Linux Release Notes provides information on the features of the Workspace ONE Assist 21.11 for Linux release. Workspace ONE Assist is a Remote Access solution to empower your IT and Help desk staff to troubleshoot and fix device issues in real-time, directly from the Workspace ONE Console with tools like File Manager and Remote Shell. Console users can now experience the same consistent workflow available on other platforms like Android, Windows 10, and macOS, now on Linux. To provision a Linux device with Assist, install the Workspace One Assist agent on a Workspace ONE managed Linux device. Workspace ONE Assist 21.11 for Linux The following functionalities are available in the 21.11 release: - Ability to manage the file system on the remote device using the File Manager Tool. - Ability to run commands on the remote device using the Remote Shell Tool. - Role-based access controls to File manager and Remote shell functionality. - Linux support in Workspace ONE Unified Endpoint Management (UEM) available only for SaaS customers currently will be deployed to SaaS environments in phases. - Assist is currently only available on SystemD Linux devices and SystemV devices are not yet supported. - For more information on Linux device management, please refer to the product announcement, https://kb.vmware.com/s/article/2961324?lang=en_US - Please refer to the knowledge base article for more details, https://via.vmw.com/linux_rollout_kb - Workspace ONE Assist Console - 21.09 - Linux x64, ARM5, or ARM7 architecture - Linux installer files of deb, rpm, and tgz are available - Workspace ONE UEM 2109 - Latest versions of Chrome, Edge, Firefox, or Safari - Workspace ONE Intelligent Hub 1.0 for Linux The following client packages are available in various flavors of Linux. - linux-x64 (Most desktop distributions like CentOS, Debian, Fedora, Ubuntu, and derivatives) - linux-arm (Linux distributions running on ARM like Raspbian on Raspberry Pi Model 2+) - linux-arm64 (Linux distributions running on 64-bit ARM like Ubuntu Server 64-bit on Raspberry Pi Model 3+) Assist sessions on Linux devices will support Unattended access only in this release. The ability to view and control a device screen will be introduced in upcoming releases. Assist is currently only available on SystemD Linux devices, and SystemV devices are not yet supported. To remotely manage a Linux or Linux-based IoT device, you must install the Workspace ONE Assist application on a Linux device already enrolled in UEM. You can install the Assist application by following one of the methods described below. Once the Assist application is installed on the Linux device, you must register it to the Workspace ONE Assist server. You can verify the registration status by navigating to the Device detailed view > More > Troubleshooting > Event Logs. Installation Method 1: Install the Workspace ONE Assist agent on the remote Linux device using a WS1 Custom Configuration Profile that uses Puppet manifests. - On the Workspace ONE UEM console, navigate to Profiles and Baselines-> Profiles to add a new Custom Configuration profile. Depending on the UEM version, the Profiles tab would be present either in Resources or in Devices. - Create a new Linux Profile or update an existing one to add a new custom configuration for Workspace ONE Assist. - On the Custom Configuration page, enter a name and create a puppet manifest to install the Assist application on your Linux devices. We have provided a sample manifest in the readme file and with the product which you can modify and use if desired. - Once you add the Custom Configuration, save and publish the Linux profile to your Linux devices. Installation Method 2: If you have physical access to the Linux device, install the Assist Agent manually using this method. On the Linux device, open a browser and navigate to the VMware Workspace ONE Resource Portal and download the Workspace ONE Assist agent directly on the Linux device. Alternative methods of copying the agent to the Linux device would also work. Extract and install the package in the Linux device to install Assist.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303729.69/warc/CC-MAIN-20220122012907-20220122042907-00051.warc.gz
CC-MAIN-2022-05
4,147
35
https://forum.ossia.io/t/ossia-not-opening-on-windows-10/270
code
I downloaded and installed ossia 3.0.1 on a windows machine (lenovo x240) but everytime i try to open it, it shows (very briefly) a litte dialog box (where it seems to load a Generic Asio Driver) and then…nothing. I even tried to install a previous version (3.0) but with the same results. I’m really looking to try this beautiful software, so any help is appreciated! By any chance, would you have the JACK asio driver installed ? It has been known to lead to crashes. Otherwise what are the ASIO drivers you have ? You can list them by going into regedit and checking the content of the following: Thank you very much! Ah great. I’ll add an entry in the FAQ to indicate this.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662647086.91/warc/CC-MAIN-20220527112418-20220527142418-00766.warc.gz
CC-MAIN-2022-21
683
8
https://gitlab.synchro.net/main/sbbs/-/merge_requests/35
code
This GitLab instance has migrated as of Nov-5-2022 to a new server: hardware, OS, SSH key The v3.20a development branch has now been merged to the master branch. Sysops upgrading from earlier versions must run 'jsexec update' Enable the option to ask for continuation/enter door when displaying info/intro ans/msg file. This could be useful when displaying info about a door, showing rules, etc.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506686.80/warc/CC-MAIN-20230925051501-20230925081501-00518.warc.gz
CC-MAIN-2023-40
395
3
http://websphere-performance.blogspot.com/2010/11/
code
Looking for information about Cognos? I was. My colleague in the UK, Richard Collins, was able to point me to some informational links about Cognos. For full details on this product, see its home page here: http://www-01.ibm.com/software/analytics/cognos/business-intelligence/ However, your most useful starting point is probably going to be: http://www-01.ibm.com/support/docview.wss?uid=swg27014432 ...and in particular, this one: http://www-01.ibm.com/support/docview.wss?uid=swg27019126 Tuesday, November 9, 2010 In the developers resource references there is an attribute for global transaction sharing.The value should be Shareable if the application uses global transactions. But if one is using LTC then one does not need to share the connection. Change the res-sharing-scope to Unshareable as noted above. This eliminates a lot of contention for connection pool threads. For more details on LTC see the link above to understand how it works.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589022.38/warc/CC-MAIN-20180715222830-20180716002830-00570.warc.gz
CC-MAIN-2018-30
951
6
http://blog.cloudbusiness.com/author/mike-parker
code
I ran into a problem recently with a customer running AAD Connect. When we were trying to Export to the Azure Active Directory, the status of the Connector Operations showed "stopped-server-down". After the release of AAD Sync and AAD Connect (Azure Active Directory Sync and Azure Active Directory Connect) we have noticed several customers using Attribute Filtering are experiencing an error Do you ever find yourself needing to find users with a specific email domain in Exchange but find yourself battling the correct syntax with the filter command, or waiting ages for it to get through all your objects using the Where-Object command? There have been some issues identified using Office Mobile Apps on Android devices when using ADFS 3.0 which are caused by the fact that the Android apps don't support Server Name Indication (the ability to run multiple SSL certificates on a single IP address). We have run into an issue several times at customers when preparing for a Microsoft Exchange installation, and thought it would be good to share!
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496671260.30/warc/CC-MAIN-20191122115908-20191122143908-00156.warc.gz
CC-MAIN-2019-47
1,048
5
http://huselha.com/page/blackout-ro-assassin-cross-guide/
code
???How far can you get??? We are not liable for you throwing and or smashing your device. + HEY WATCH OUT!!! + Are you cut out to man an attack helicopter??? The world is counting on you and your piloting skills! Test your skills in Helicopter flying as you and fight the man and collect points in this intense adventure! Beat your friends for countless hours of free fun. - And there are all those silly obstacles on his way. Enjoy!!What's new in this version:Available In All CountrysBetter GameplayMusic Added to Game The objective is help a small mouse fly without hitting any obstacles, play it! it is very difficult!you can tap screen to make mouse fly!What's new in this version:fix a bug Avoid the obstacles. This insures for hours of fun without frustration. Maze games are easy when you can move to all directions, anyone can do that! But what if you can only turn in one direction?!Tap anywhere on the screen and the blue dot will turn right. #INTENSE COMBAT ACTION#Our young new pilot hero finds himself in an endless dogfight with new waves of enemy approaching. -Multiplayer-Live and ultra fast multiplayer gameplay! NO sign-up just download and play! -SinglePlayer-Practice makes perfect. ***** CAN YOU GUESS THE TEAM? ***** Can you guess the team? Each puzzle shows a well know football team, all you have to do is figure out which it is! * TONS OF TEAMS TO KEEP YOU GUESSING * * COMPETE WITH FRIENDS WITH GAME CENTER * * SHARE ON FACEBOOK OR POST TO TWITTER IF YOU ARE STUCK * No registration, no tutorials, just start playing! Do you think you have what it takes to master this fun and addicting game?Features: * Great for All Ages* Amazing graphics* Universal app supports iPhone / iPad / iPod Touch* Addictive Gaming Download right now! - Never Ending race Challenge! The feel of the soft leather in your hands, the sound of engines roaring and crowds cheering, open your eyes and experience racing in its purest form, get ready to take to the streets in Race Lands.The game is over if you drop the egg or run out of timeand youll make Mama Chicken cry! It's simple. and Tweet about it with hashtag #flipabirdWhat's new in this version:Bug fixes Accelerated by Razorfish. Challenge yourself in classic or modern mode.
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822488.34/warc/CC-MAIN-20171017200905-20171017220905-00553.warc.gz
CC-MAIN-2017-43
2,237
8
https://help.skillsworkflow.com/hc/en-us/articles/212807249-Hyperlinks-were-not-counting-as-files-in-transitions-demanding-evidence-attachments-13364-
code
Hyperlinks count as attachments when the user is required to upload a file as evidence in specific transitions in the Workflows (Jobs, Projects, Expenses, etc.). - In the Workflow, in the transition form, the Files upload may be set as mandatory. - Set a transition in the Job's Workflow as requiring a file upload. - Create a Job. - Move the Job's process workflow until it reaches the configured transition. - Add a link to the Files instead of dragging an actual file to the Job. - Verify that the system allows you to move to the next transition.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107889651.52/warc/CC-MAIN-20201025183844-20201025213844-00146.warc.gz
CC-MAIN-2020-45
550
7
https://verificationacademy.com/forums/t/updation-of-config-variable-is-not-updated/46095
code
Common_config is set in the test and get in all the lower components. One of the config variable im updating in sequence, for example common_config.rate = rate, the rate value changes for each testcase. Since, the common_config.rate is able to access in source side but not in the sink. Since, source can access the common_config but not in the sink. Why?? Is there any method to get access in sink also??
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473558.16/warc/CC-MAIN-20240221202132-20240221232132-00109.warc.gz
CC-MAIN-2024-10
405
4
https://www.scummvm.org/he/news/20140225/
code
For the seventh year in a row, we have been accepted as a Google Summer of Code project. Perhaps it is because both our project and the program have unusual letter casing? The world may never know, but we are thrilled to be accepted again and welcome fellow students to join our team and work on awesome 2D point-and-click adventures. If you are an eligible student for the GSoC and want to contribute to your favorite open-source project, take a look at our project ideas, but you always can offer your own. But, please, no Digger support: it's not an adventure!
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474641.34/warc/CC-MAIN-20240225171204-20240225201204-00743.warc.gz
CC-MAIN-2024-10
563
3
https://help.workspace.ibm.com/hc/zh-cn/community/posts/360011997574-Unable-to-delete-a-space-I-got-the-ownership-from-an-other
code
A former colleague transfered the ownership of a space to me. I try to delete the space. I get an information screen "Are you sure you want to delete .... - All of the content will be lost". Nothing happens if I click on the button "Delete space". Cancel works. Therefore there is no way to delete transfered spaces. My own created spaces could be deleted w/o problems. This corresponds to a problem of an other colleage: - I created the space - I transfered the ownership to him - He could not delete members of the space (e.g. me as former owner)
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578526228.27/warc/CC-MAIN-20190418181435-20190418203435-00393.warc.gz
CC-MAIN-2019-18
548
8
https://gun.io/guest-posts/2022/03/software-automation-testing/
code
The goal of any test is to make sure that the software meets the user’s needs. When it comes to building and implementing software, engineers and architects at any level must take care to ensure that the characteristics of the system have been taken into consideration based on the needs of the client. Before jumping into automation testing, we need to understand all types of testing. First, we need to understand the purpose of specification requirements. Specification requirements are included in a system to describe the software characteristics that the client needs. To deliver the right software or product to the client, verification and validation (V&V) are essentials during the software development cycle. Why do we test? Note that many organizations have failed with their information systems management for the sole reason that the software or product does not test enough of the specifications (black box) or the code (white box). Maybe the technical requirements are not well-defined enough to imply that the code failed on the User Acceptance Test (UAT), because the code does something different. Based on sequential or parallelism programming, some tests always fail, or their likelihood of occurring is extremely low. Today, software leaders must focus on this critical phase at a higher level. Any software engineer or architect should understand and master these two terms: - Verification: building software or a product that conforms to its specifications - Validation: the software meets user requirements Software development is a demanding task. There are many factors that the software team should consider during the development process. Of course, there are many positions in the software development process, starting with the product owner, passing from business analyst to tech lead, or a solutions architect via engineers and developers. Each of them has a specific role during the software process. The business defines its needs, and the business analyst tries to understand these needs and define the specification for approval by the product owner. This process is called requirements specification, and it is a crucial step. If the specification is not aligned with the client’s needs, it is a failed product. For this reason, developers need to have a clear specification requirements document translated by experienced architects that may be implemented in a specific language (i.e. Java, C#, C++, Angular, React, etc.). If specifications are made entirely by junior developers and young engineers, the risk of losing the entire project is high. Who is qualified to define this specification with the client or product owner? An experienced tech lead serves as a strong facilitator, advocator, and motivator that can land this and make it available to the engineers and developers to serve in the implementation stage. Why focus on testing? To detect software defects, we need to apply techniques that can check the whole system (the code, in this context): compiler, processor, network devices, and loader. This is the best way to accordingly assess a system behavior. Still, a test is always incomplete, in my opinion. Depending on system complexity, we need to see testing at different levels. For example: - Unit test: testing individual classes and functions - Integration Test: testing packages/subsystems - System test: testing the entire system with all components Now, how can we ensure that the coding is a copy of the specification as-is in another format? Until fairly recently, the Software Automation Test was the way to detect bugs in programming. Once developers completed the implementation of classes or packages, they usually made a primary test to see if they worked or not. However, there are a lot of things to take into consideration regarding the code they produced to make sure that it’s strong enough to operate in the real world. Why do we need software to test other software that is under construction? The answer to this question is critical: The software tester itself could generate unreliable results that could potentially diminish the software or product procured for the client. How might we avoid bias during this automated process? This answer is hard to confirm, because testing is a little bit tricky. When we use a plan for UAT, we’re dealing with humans to see if all functions work properly from the client’s perspective. When we use automation testing, the system validation–the software built for that purpose—should be trusted not only by vendors or programmers, but also through experience, such as when using JUnit or unittest. Let’s look at a scenario that describes an automation test. We select a class or package to test via a well-designed plan and specify the input to test the methods and objects of this class–let’s say we use Python’s introspection. We then import a module based on a string input that we obtain from Lambda function definition. Similarly, after we import the module, we confirm that the function is callable and has the appropriate arguments for a Lambda function. At this point, we have confirmed that we’ve correctly “wired in” a function handler. Separately, we would expect another set of unit-tests that verifies the correctness of the handler itself. A flaky test may result in something totally inadmissible and generate a crazy result that should not be acceptable as a string input. Administering an effective test automation is much easier said than done. Automation testing can only show the presence of errors in a program. It cannot demonstrate that there are no remaining faults, even with a well-designed approach. Test-first development is an approach to development in which tests are written before the code to be tested. Small code changes are made, and the code is refactored until all tests execute successfully. With the right investments, you can overcome these challenges and avoid the costly expense of testing. Learn more about Emmanuel by checking out his profile on Gun.io. Interested in working with him or one of our other incredible engineers?
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506029.42/warc/CC-MAIN-20230921174008-20230921204008-00194.warc.gz
CC-MAIN-2023-40
6,118
21
https://2021.help.altair.com/2021/monarch/help/desktop/ht_sum_swidth.htm
code
Modifying Column Widths in a Summary When Monarch Classic generates a summary, it sets the width of each key field column and item field column according to its column width in the Table window. The column width for each measure is initially set to 14 characters. Go to Summary Design. Do one of the following: If you wish to view and edit all fields, select All Fields from the Summary Design ribbon. If you wish to view just keys, items, or measures, select Keys, Items, or Measures respectively from the Summary Design ribbon. Select a field from the fields selector and enter a new column width in the Width box of the General tab that displays. If you modify the width of a column that contains strings or dates such that the column is not wide enough to accommodate a value, the value is truncated on screen. If you modify the width of a column that contains numbers such that the column is not wide enough to accommodate a value, the value displays as pound signs (####). Note: The column width setting affects only the appearance of data on screen; the underlying data is not affected. Choose Accept to accept the new column width. Column widths for across key columns All of the columns generated for a key field whose values are spread across are related, so they share a single column width setting. When you change the width of any one of the columns, all other columns snap to the new width. See Displaying Key Values Across. The mouse provides a faster method of changing column widths. Move the mouse pointer to the right edge of the column title. The mouse pointer will become a resizing handle. Click down and drag left or right to resize the column. Although faster, this method is less precise. Automatically adjusting column widths Monarch Classic also includes an Autosize Column widths feature that you can use to adjust the width of a column to match the width of its data and its column title. For details, see Automatically Adjusting Column Widths in the Summary Window.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100135.11/warc/CC-MAIN-20231129173017-20231129203017-00016.warc.gz
CC-MAIN-2023-50
1,995
18
https://github.com/ryancotterell/sigmorphon2016/tree/master/src/baseline
code
Baseline for SIGMORPHON 2016 This is a simple baseline that solves tasks 1, 2, and 3 using only the labeled data provided. To run the baseline on all the data sets and all tasks: Run make in this directory, which builds the C-dependencies that baseline.py depends on. Run ./runall.sh which solves all the tasks in the data directory and stores the output as well as the evaluation results under the baseline/ directory in the shared task data. To run the ./baseline.py program stand-alone, you can use the following flags: ./baseline.py --task=TASK# --language=LANGUAGE [--align=mcmc|med|dumb] [--path=DATAPATH] For example, running: ./baseline.py --task=1 --language=navajo --path=./../../data/ would solve task 1 for navajo, with the data files located in ./../../data/, and assume the training file is called navajo-task1-train and that the evaluation file is called navajo-task1-dev. The guesses are output to STDOUT in a format understood by evalm.py. Note that the script, when solving task 1, uses only the training data for task 1. However, when solving task 2, it also uses only the training data for task 1, but evaluates against task 2 dev data; when solving task 3, it uses the training data for all three tasks, but evaluates against task 3's dev data. The system is a simple discriminative string transduction which uses an averaged perceptron as the classifier. First, all word pairs in the training data are symbol-aligned 1-to-1 through an iterative Markov Chain Monte Carlo method. After this, the alignments are chunked so that consecutive deletions, insertions, and changes become one single such action. Then, a classifier is trained to make a decision when moving left-to-right through an input string. Here is an example string pair from the Finnish data after alignment and chunking: 1 2 3 4 5 6 k a t - o ssa (source) pos=N,case=IN+ESS,num=SG k a t t o - (target) lemma The correct decision, i.e. class, for positions 1,2,3,5 is repeat. For position 4 the decision is insert t, for position 6 the decision is delete ssa. The classifier is trained using the following binary features at each position: - The previous 1,2, and 3 input symbols; e.g. t,at,kat for pos 4 in the above. - The previous 1,2, and 3 output symbols; e.g. t,tt,att for pos 5 in the above. - The following 1,2, and 3 input symbols, e.g. o, os, oss, for pos 3 in the above. - The previous action (insert X, repeat, change X, delete N), where X is a string and N is a number. For example, insert t for position 5 in the above. - The morphosyntactic features of the source (for lemmatization) or target form (for lemma → form mapping), e.g. pos=N,case=IN+ESS,num=SG for the above. - Any combinations of two features from the above list where the first feature in the combination is a morphosyntactic feature and the second is not. We construct one classifier per part-of-speech. For task 1, a classifier for lemma to arbitrary word form is built. For task 2, two classifiers are trained for each POS: one for lemmatization, and another for lemma → word form mapping. These are then applied in series. For task 3, an additional classifier is built to map a word to its morphosyntactic description (using training data from all tasks). Task 3 is then solved by first classifying the input word form to yield a guess as to its morphosyntactic description, then lemmatizing it and mapping the lemma to the target form, as in task 2. The baseline system performs no real tuning of parameters or feature selection. The averaged perceptron is not trained with early stopping, and simply runs for 10 iterations or until the data are separated.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583509996.54/warc/CC-MAIN-20181016030831-20181016052331-00354.warc.gz
CC-MAIN-2018-43
3,631
23
https://www.brighttalk.com/webcast/9773/406054
code
Webinar: Pathways to Creativity 2020 Jun 10 2020, 2:00pm UTC AAR Group, Department of Change, ZAK, MRM About this talk Join us on Wednesday 10 June as we delve into the world of creativity. Hear from a selection of creative hotshots as we ask how can we champion creativity and pioneering thinking throughout our industry – and beyond? More from this channel Upcoming talks ( On-demand talks ( We are part the DMA – the Data and Marketing Association – the leading UK trade body for the data and marketing industry, led by customer-first principles and a code of ethics.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511075.63/warc/CC-MAIN-20231003092549-20231003122549-00063.warc.gz
CC-MAIN-2023-40
576
9
https://nie-lab.org/
code
Welcome to the Neural Interface Engineering Laboratory, directed by Prof. Shy Shoham. We are affiliated with New York University’s Tech4Health Institute, Neuroscience Institute and Department of Ophthalmology. We work at the interface of neuroscience and engineering, developing and applying modern bidirectional neural interfaces for observing and controlling neural population activity patterns. Our goal is to better understand sensory-motor information coding and to advance medical neurotechnology. Multimodal Noninvasive Functional Neurophotonic Imaging of Murine Brain-Wide Sensory Responses, Advanced Science, (2022). Neurophotonic tools for microscopic measurements and manipulation: status report, Neurophotonics, (2022). High-resolution fluorescence-guided transcranial ultrasound mapping in the live mouse brain, Science Advances, (2021). New book: Handbook of Neurophotonics, (2020). Precise holographic manipulation of olfactory circuits reveals coding features determining perceptual detection, Neuron, (2020). Manipulating synthetic optogenetic odors reveals the coding logic of olfactory perception. Science, (2020). Follow us on Twitter! Farewell, RA Sam!
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656675.90/warc/CC-MAIN-20230609100535-20230609130535-00351.warc.gz
CC-MAIN-2023-23
1,175
11
https://docs.google.com/forms/d/e/1FAIpQLSeeBS0yG_1ap3jJDPEH0pw1ipvbDLsvr-3dOv-tnihbFNI0oQ/viewform?usp=send_form
code
CS 4540 (F18) Entry Survey Welcome to CS 4540 at Georgia Tech! Please fill out this short (~5-10min) survey to help us get to know the class better! Your response is completely anonymous. What is your major? Computational Sci & Engr If your major is Computer Science, which "threads" are you working towards? Modeling & Simulation Systems & Architecture Have you used any of the following before? Check all that apply. Numpy / Matplotlib / SciPy No, I haven't. PREREQUISITES & OTHER COURSES Prerequisites: Calculus + Analysis Have you taken a calculus class before? Check all that apply. Calc I + II (single-variable differentiation and integration) Calculus III (multivariate differentiation and integration) Advanced Calculus (proof-based; lots of epsilons and deltas) I have never taken a calculus class. Prerequisites: Linear Algebra Have you taken a linear algebra class before? Check all that apply. Intro Linear Algebra Advanced Linear Algebra (e.g. minimal polynomials, invariant subspaces, Jordan canonical forms...) Numerical Linear Algebra (e.g. QR factorization, Gauss-Seidel iteration, conjugate gradient...) I have never taken a linear algebra class. Have you taken a probability class before? Check all that apply. Intro Probability (no calculus) Measure-theoretic Probability (Lebesgue integrals, sigma-algebras, MCT, etc.) I have never taken a probability class. Have you taken or are you currently taking any of the following courses? Machine Learning (e.g. CS 3600, CS 4641, CS 4646) Artificial Intelligence (e.g. CS 3600, CS 4731, CS 4635) Linear Programming (e.g. MATH 4580) Numerical Analysis (e.g. MATH 4640) Information Theory (e.g. MATH 4280) Which of the following topics have you studied before? Check all that apply. Topics marked with (*) will not be needed for this course and are only included here to gauge your prior knowledge. Concepts: Calculus & Analysis Gradient of a function f : R^n --> R Differential of a function f : R^n --> R^m Rigorous definition of a limit (for all epsilon > 0, exists delta > 0 such that...) Maximizing a multivariable function; Lagrange multipliers for equality constraints Convex function optimization; Lagrange duality; convex conjugates (*) Inverse Function Theorem / Implicit Function Theorem (**) Measure theory (Lebesgue integrals, monotone convergence, Radon-Nikodym...) I have never studied calculus. Concepts: Linear Algebra Matrices, vectors, and matrix multiplication Basis vectors, change of basis; orthogonal vectors, Gram-Schmidt Eigenvalues and eigenvectors Abstract vector spaces, linear transformations Positive-definite matrices and their eigenvalues Solving linear systems via least-squares; Moore-Penrose pseudoinverse Matrix Decompositions (SVD, QR, etc.) (*) Invariant subspaces (*) Minimal polynomials, Cayley-Hamilton I have never studied linear algebra. Concepts: Probability & Statistics Discrete distributions, random variables, expectation, variance Continuous distributions, random variables, expectation, variance Independence; expectation and variance of independent random variables Normal distribution, central limit theorem Markov and Chebychev inequalities Hoeffding and Chernoff bounds Bayesian statistics, prior and posterior distributions, conjugate priors, exponential families I have never studied probability. What do you hope to learn from this class? Is there anything else you'd like to tell us? (hopes, dreams, concerns...) Page 1 of 1 Never submit passwords through Google Forms. This content is neither created nor endorsed by Google. Terms of Service
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987823061.83/warc/CC-MAIN-20191022182744-20191022210244-00515.warc.gz
CC-MAIN-2019-43
3,562
70
http://otdbiaxaem-vmeste.ru/custom-validator-validating-multiple-controls-7310.html
code
Custom validator validating multiple controls We need to build a directive with a matching selector so it will be executed on all input controls where the directive is applied. Even though this works, there’s nothing our directive does at the moment. What we want to do is to make sure that our custom validator is executed when Angular compiles this directive. Angular has an internal mechanism to execute validators on a form control. Validation is important part of any web application. User's input must always be validated before sending across different layers of the application. It maintains a multi provider for a dependency token called . If you’ve read our article on multi providers in Angular, you know that Angular injects multiple values for a single token that is used for a multi provider. The main advantage is that it prevents a page from being postback to the server until the client validation is executed successfully. Server validation will only performed when Cause Validation is set to true. You can have a Required Field Validator control for each form element on which you wish to enforce Mandatory Field rule. At any cost server validation will work always whether client validation is executed or not. The attributes that are necessary to this control are: Maximum Value, Minimum Value, and Type. The Custom Validator Control can be used on client side and server side. Java Script is used to do client validation and you can use any . I will explain you Custom Validator using server side. To write Custom Validator on server side you override Server Validate event. If you don't find your desired regular expression, you can create your custom one. In the example I have checked the email id format: You can solve your purpose with ASP. But if you still don't find solution you can create your own custom validator control.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703519395.23/warc/CC-MAIN-20210119135001-20210119165001-00765.warc.gz
CC-MAIN-2021-04
1,858
13
https://research.com/u/gregory-d-abowd
code
2009 - ACM Eugene L. Lawler Award for Humanitarian Contributions within Computer Science and Informatics Professor Abowd and his colleagues have demonstrated how advanced information technologies can be used in homes and schools to support the many challenges facing those impacted by autism and related developmental disabilities, including the individuals, the families, educators, clinicians and researchers. 2008 - ACM Fellow For contributions to ubiquitous computing research, with emphasis on applications for education, home and health. 2008 - ACM Senior Member Profile was last updated at May 16, 2020, 10:48 am Research.com Ranking is based on Google Scholar H-Index. We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780055601.25/warc/CC-MAIN-20210917055515-20210917085515-00659.warc.gz
CC-MAIN-2021-39
830
6
https://www.linuxtoday.com/infrastructure/2006111302126nwsvrl
code
"Firebird 2.0 brings a large collection of long-awaited enhancements that significantly improve performance, security and support for international languages and realise some desirable new SQL language features. Under the surface, it also provides a much more robust code platform from which the re-architecting planned for Firebird 3.0 is proceeding. "Several limitations inherited from the legacy code have now gone, such as the 252-byte limit on index size and sub-optimal usage of index statistics that could throttle performance. Table size is no longer limited to 30 Gb..."
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038089289.45/warc/CC-MAIN-20210416191341-20210416221341-00591.warc.gz
CC-MAIN-2021-17
579
10
https://mail.python.org/pipermail/python-dev/2010-June/101186.html
code
[Python-Dev] Mailbox module - timings and functionality changes steve at holdenweb.com Tue Jun 29 15:56:11 CEST 2010 I hope this is an appropriate dev topic. It seems to me that the unicode discussions of recent days are well highlighted by difficulties I am having using the mailbox module (hardly surprising given the difficulties of handling email generally) even though it passes its tests. I can't find anything related in the issue tracker (symptoms: one program that works fine under Python 2 in under twenty seconds takes forever (over ten minutes) to fail while creating the (start, stop) index to the mailbox). My code reads Thunderbird mailboxen from file store on my Windows Vista system under 3.1. The failures I am experiencing could easily be encoding issues so I won't post any detail yet, but I am concerned about the timing - even when the code is "fixed", if it needs to be, the performance may still make the module of dubious value. Can someone who is set up to do easily just do a timing of test_mailbox under 2.6 and 3.2, to verify they see the same disparity as me? The test takes about twice as long under 3.1 here (and I am concerned that unexercised aspects of the code may extend real-world problem run times by an order of magnitude or more). Steve Holden +1 571 484 6266 +1 800 494 3119 See Python Video! http://python.mirocommunity.org/ Holden Web LLC http://www.holdenweb.com/ UPCOMING EVENTS: http://holdenweb.eventbrite.com/ "All I want for my birthday is another birthday" - Ian Dury, 1942-2000 More information about the Python-Dev
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027330962.67/warc/CC-MAIN-20190826022215-20190826044215-00398.warc.gz
CC-MAIN-2019-35
1,567
29
https://www.techulator.com/experts/4715-Why-does-some-time-only-one-speaker-work
code
Why does some time only one speaker work? Have you ever given a thought why at times only one speaker works? Ask our experts for the best explanation. I am using Lenovo speakers. I have observed that many times during playing some particular songs or some voice, only one speaker is working. What could be the reason? Why both are not working simultaneously ? This happens only for some particular videos or songs. But for the rest of the videos or movies, both speakers are working fine. Is it the audio signal which causes all this? Please solve my doubt.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949678.39/warc/CC-MAIN-20230331175950-20230331205950-00703.warc.gz
CC-MAIN-2023-14
557
3
https://forums.adobe.com/thread/1708097
code
We can read using DocumentColorSpace.RGB, but we cant change the mode. Right you need to create a new document in the correct color space and if necessary move all artwork to the new file. You can't change the color space of an existing document by scripting. if you have CS6 or above you can executeMenuCommand this will switch the active documents colour mode
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826968.71/warc/CC-MAIN-20181215174802-20181215200802-00308.warc.gz
CC-MAIN-2018-51
361
4
https://blog.gerv.net/2012/03/mpl-boilerplate-at-mozilla-faq/
code
The mozilla-central and comm-central MPL 2 switchovers (bug 716478) will happen soon, once I figure out how to fix the build and test errors from the tryserver. In the mean time, people who are making new patches have asked for some guidance on how to deploy the new MPL 2 boilerplate. This is it: - There is no need to switch the headers in the files you touch in the normal course of your work; doing so just makes merge conflicts more likely - When adding headers, e.g. to new files, Mozilla policy is to use this boilerplate - We request that you not change it, other than adapting it for another comment character Some people have asked whether they should add the names of contributors anywhere. The answer is “no, please, there is no need”. The MPL 2 (in Exhibit A) does permit people to add “additional accurate notices of copyright ownership” to the boilerplate. The purpose of this language is to allow copyright headers from other licenses to be included when necessary for compliance with those licenses, when portions of code are copied in. It can be used for other purposes, but Mozilla officially discourages those types of uses in our codebases. Adding a personal copyright notice has no additional legal effect, because copyright is granted by default, and it clutters up the head of the file, because such notices cannot later be removed unless someone is very sure they no longer apply (section 3.4). They also tend to “spread” as code is copied from one file to another, because the extra notices should (although don’t always) go along. Copyright notices are not a “credit mechanism” – we have about:credits for that, or, in some projects, an AUTHORS file. However, if a contributor feels strongly about it, we will not turn away patches which contain, in addition to their primary purpose, additional copyright notices referencing that contributor for files with significant changes. These should be of the form: Portions Copyright (C) <year> <name>. and should be part of their own comment block, not the main license comment block. But again, please be clear that this practice is legally unnecessary and leads to practical inconveniences.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475238.84/warc/CC-MAIN-20240301093751-20240301123751-00614.warc.gz
CC-MAIN-2024-10
2,183
10
http://www.dotnet-tv.com/tag/tdd/
code
Content tagged with: TDD This video explains what Test-Driven Development (TDD) is and how to implement TDD in C#. We will be using VSTS ( visual studio team system) unit testing framework. We know that effective automated developer testing is a cornerstone of successful app development. In Visual Studio 2012, we have enabled developers to use modern, agile techniques for developing and testing Windows Store apps written in C#/VB. In this talk, we will demonstrate how to apply existing best practices to effectively test your app in this new world. We also explore how to use highly iterative developer testing techniques like Test-Driven Development to create and test your app, using well-known patterns like MVVM and isolation. TDD is not understood by many developers who use languages such as C# or Java. In this talk, Greg Young will look at TDD again, identify the aspects of these environments that tend to lead to confusion, and then try removing them with hopes of reprogramming developers to a deeper understanding of TDD. This video provides a code-centric introduction to the concepts, tools, and practices of Test-driven Development (TDD) in .NET. It starts with the basics of setting up a unit testing framework and writing the first test, then it moves on to techniques for mocking dependencies and demonstrate patterns like Dependency Injection that will help you move past testing just the basics. This video presents the technical challenges that teams discover when adopting TDD difficult and a set of principles for successful TDD. it contains a demonstration of the Testify tool and how to use it to introduce TDD on your own project. Testify home page
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707184996/warc/CC-MAIN-20130516122624-00045-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,679
7
https://lirias.kuleuven.be/handle/123456789/157851
code
Lecture Notes in Computer Science vol:2940 pages:92-110 Software Engineering for Large-Scale Multi-Agent Systems 2003 location:Portland, Oregon, USA date:May 3-4, 2003 Roles are the basic building blocks for defining the behavior of agents in multi-agent systems. Agents typically perform several roles. In this paper, we describe analysis and design issues in defining agents as compositions of roles. In short, specifying the behavior of an agent entails in essence two issues: which roles are assigned to a particular agent, and how does an agent select a role in a particular situation. Both issues can be decided upon either by the designer (i.e. at design time) or by the agent (i.e. at run-time). This paper describes a basic taxonomy for role composition based on both issues, and illustrates the different composition approaches using a case study in the domain of manufacturing control.
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280221.47/warc/CC-MAIN-20170116095120-00223-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
896
3
https://wp.powerpatent.com/invention-for-methods-systems-and-methods-for-generating-an-electronic-content-message-us11265413b1/
code
Invented by Randall Sarafa, Eugene Fooksman, Brian Acton, Jan Boris Koum, Michael B. Donohue, Charles Donald Deets, JR., Anton Borzov, Ehren Andrew Kret, WhatsApp LLC The WhatsApp LLC invention works as followsExemplary embodiments refer to techniques for sending messages containing ephemeral information via a communication service. An interface might be used to provide a way for a user to access ephemeral functionality and to select content to be included in an ephemeral message. An interface might present a simplified set of uses, regardless of the way the content was originally captured. Ephemeral content can include images, videos and weather reports. The communications service may send the ephemeral contents as an encrypted message, end-to-end. A user may reply to an ephemeral message by replying. This could trigger a one-to-1 conversation between the original user and the user who replied. An ephemeral message can be sent to selected groups, with replies being sent back to the whole group. Background for Methods, systems and methods for generating an electronic content message Some services such as messaging services and communications services allow users to send messages to other users. Some messages, like update messages, can be broadcast to other users who have the ability to view the communication (e.g. the sender’s contacts or the general public). Exemplary embodiments refer to techniques for creating, processing, and displaying Ephemeral Content via ephemeral Content messages. For example, messages that contain ephemeral information may be called Ephemeral Content messages. Ephemeral content is content that is only accessible for a short period of time or under restricted conditions. The content can be removed or made inaccessible after ephemeral material expires. Ephemeral content is the focus of this article, but some of the techniques described herein (such as filtering and ranking) can be used in conjunction with non-ephemeral material. There are many problems with the current messaging technology in the context of ephemeral messages. The way content is chosen or generated to be included in a standard message can be complicated. Depending on the content and the method of generation, users may send content to other users of the communications service in different ways. One example is that a user might generate a text-based message differently than a picture-based one. Entry points can differ within the same category. Another example is when a user selects a photograph from a previous capture and another when he or she wishes to take a new photo for the message. Some communication systems allow users to reply in text form to messages. You can attach the reply to an existing conversation between multiple users or start a new conversation with a specific group of users to respond to the ephemeral material. Because the replying user might not have access to all recipients, these techniques could cause replies to be sent out to other users who did not receive the original message. This behavior could be unacceptable from the point of view of the person who sent the original content-based message. They may want to exclude certain people or limit the message to a defined group. It may also be difficult to keep privacy private due to the way content-based messages are sent to users. A broadcast of a content-based message typically involves the transmission of the message to an intermediary server. This is to ensure that the broadcasting is not interrupted. From the privacy standpoint, it is preferable that only the sender (or the recipient) of the content-based messages can view the contents. It can be difficult to give sufficient information to the broadcast server in order to transmit a broadcast message to clients. Communications systems can take different approaches to reducing spam and unwanted messages. In a social network, for example, ephemeral messages might be sent to users who have a relationship with the sender (such as friends). Not all social networking and messaging services offer the concept of friendship or relationships. A simple messaging service (SMS) or another contact-based messaging system may allow users to send messages to other recipients based on their phone number. These examples may not show a clear relationship between users. A system that has defined relationships may limit spam communication by allowing users to only communicate with one another (or in a preferred format) if they have a relationship. A person might only be able to see the content-based messages of friends. In a communication system that doesn’t rely on a defined notion of friendship, this may not be possible. Another problem with communication systems that offer ephemeral contents capabilities is that their interfaces can become messy and it may be hard to distinguish ephemeral messages from other types. Ephemeral content might be displayed in communications systems that allow users to post. Ephemeral content can also be displayed in messaging-based systems. Ephemeral information is used to communicate different types of information than messages or posts. Users who wish to view the ephemeral contents of their contacts might not want to go through a lot of messages or posts to find their ephemeral messages. It is possible to display ephemeral contents in mixed messages by simply arranging them among the messages according to the order they were received. While chronological order may be appropriate for messages, users often have a greater interest in particular ephemeral contents than others (e.g. from close friends or family, rather than general acquaintances). A chorologically ordered ephemeral material may not be a useful way to display it. Furthermore an ephemeral message can contain media (e.g. a picture or a video). It may be difficult for a recipient user to access the media while keeping encryption intact. Ephemeral messages can be sent to large numbers of people. Some ephemerality models may allow for the expiration of ephemeral contents at different times for different recipients. It can be challenging to make the ephemeral contents available to users who have not expired yet, but it may be impossible to make them unavailable to users who have expired. Another issue that can arise in communications systems that provide ephemeral content is the problem of maintaining privacy for previously-transmitted ephemeral content. Users can perform operations to receive information about other users in some systems. One user might become friends with another user on a social networking site or follow that user to view their status. This is known as a “follow model”. In a follow model the ephemeral information that a sender submits before being followed by another user might become visible to that user when the new recipient follows the sender. This means that ephemeral information sent before two users were connected could become visible to the new user after they are connected. This may not be desirable for some users who wish to keep their previous ephemeral contents private from new followers. The follow model could also cause problems when it comes to preserving the end-to-end encryption for ephemeral messages. Many of the parameters used to encrypt ephemeral messages (e.g. message keys) are determined at the time the message is sent. This means that it might not be possible for strong encryption to continue if the message is later made accessible to new followers. To maintain encryption, it may be necessary to generate new encryption sessions post-hoc. This adds to the overhead of the communications network. These and other issues can be addressed by exemplary embodiments that provide new techniques to send ephemeral messages to a communications or messaging system. Streamlined entry points can be used to generate a message that includes content (such as ephemeral material) and for responding to messages containing ephemeral information previously sent. No matter what type of content or how it was generated, initial entry points are focused on a few clear use cases. Two clear and simple use cases may provide initial entry to the ephemeral message functionality, regardless of how media was captured. The system might offer the option for the user to share media in an electronic content message or in a non-ephemeral message such as in a chat or conversation. The system solves the problem of identifying an appropriate entry point depending on the media type. As ephemeral media, many types of media are possible, including photos, GIFs, videos and weather reports. To preserve end-to?end encryption, the ephemeral contents can be sent as a message. The following sections provide methods for sharing media with the message and encapsulating it as a message. A user may reply to ephemeral material by replying. This could trigger a one-to-1 chat between the original user and the replying person. The privacy of the original sender is maintained. Ephemeral content can also be sent to a group, instead of being sent to all contacts. Replies may then be sent to the group. This embodiment preserves the privacy of the sender, as only the original group members to whom the message was sent are included in the conversation. The server can examine the membership of the group and verify that there is an encrypted session between members. This facilitates group communications. Further embodiments” can be used in conjunction the embodiments above. They relate to methods for transmitting an electronic content message over a communications network. Initially, the client sending the message may establish an encrypted session between possible recipients of the ephemeral contents (e.g., the user?s contacts list or a selected group). The first key may be provided during initial setup. The encrypted session is used by the client to send the message to the recipients. The encrypted content may include a thumbnail of the media item and a link to it. A second key is used to decrypt the media item.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474641.34/warc/CC-MAIN-20240225171204-20240225201204-00491.warc.gz
CC-MAIN-2024-10
10,073
24
https://www.upwork.com/o/profiles/users/_~01c49df07d37fd0c49/
code
Artificial Neural Networks Microsoft Visual Studio Over the last 3 years I have been developing with ASP.NET platform. I'm very experienced C# programmer, that can also use C,C++ and Visual Basic depending on the problem that needs to be solved. My strong background knowledge on working with database, SQL, stored procedures makes me the perfect candidate for database design and implementation. My knowledge in Artificial Inteligence and working with Neuron Networks may come handy when working on complex algorithms and problems. I also have experience in HTML5.0, CSS and Photoshop. So
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720475.79/warc/CC-MAIN-20161020183840-00532-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
589
4
https://golos.id/en/@kingscrown/eos-trading-started-claim-your-tokens-and-check-charts-choose-exchanges
code
As promised 5 days period of sale ended and trading started. If you used MyEtherWallet.com all you have to do is go to https://www.myetherwallet.com/#contracts Now chooose EOS contract on right, and make transaction with claimall Use 0 as amount when sending, this is just transaction to claim. Info for other wallets and more at http://eos.io or watch video below. BFX promised to get EOS since day one but Kraken was faster to add. I personally dont use Kraken and the other exchange has more volume and possibiities of pumps - Bitfinex is my chose to trade EOS. This are two huge exchanges so havign them on launch is pretty amazing. Guys on Bitmex started futures trading even before coin was traded officially. The plus of this is you dont need to own any EOS, you just deposit BTC and decide if price goes up or down. Chinese exchange Yunbi is known for adding quality tokens. Follow and VOTE UP @kingscrown creator of http://fuk.io blog for 0day cryptocurrency news and tips!
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585380.70/warc/CC-MAIN-20211021005314-20211021035314-00549.warc.gz
CC-MAIN-2021-43
982
10
https://www.mjtruiz.com/TPT/color/fig-04-primary-amounts/strengthPrimaryAddSub.html
code
Play with the sliders. You can also type in values for the colors ranging from 0 to 255. Type in values such that the complementary pairs blue/yellow, green/magenta, and red/cyan total 255. Then, the same color will be in the center but may be perceived to be different due to the surrounding colors. Menu of Apps
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038118762.49/warc/CC-MAIN-20210417071833-20210417101833-00573.warc.gz
CC-MAIN-2021-17
313
5
https://docs.appvia.io/wayfinder/admin/packages
code
Helm packages provide a delivery method for installing and/or bootstrapping multiple clusters with software. Wayfinder uses packages to maintain its own package installations. Wayfinder administrators and workspace administrators can also use packages as building blocks to install software in clusters in order to achieve standardization, ensure company security policies, and save DevOps time. Wayfinder automatically installs Flux on every workspace cluster, in the wf-manager namespace. During Wayfinder installation, Flux is preloaded with a number of HelmRepositories alongside the Wayfinder-maintained collection of charts. Flux helm-controller lets you declaratively manage helm chart releases, as described below. Using packages to deploy software on multiple clusters As a Wayfinder administrator, you can deploy applications across multiple clusters by creating global packages in the management cluster. The package configuration determines which clusters a software package applies to. When a cluster matches the selection criteria, the software package is automatically installed on that cluster, whether it's an existing cluster, or a cluster that is being created. Click this demo to see this in action. Package definition objects There are two forms of packages. The only difference between them is their scope: GlobalHelm and GlobalRepository—these are globally scoped and applied to all workspaces with matching clusters. GlobalHelm specifies the source helm chart for the software you want to deploy. GlobalRepository specifies a helm repository to make available in clusters, including any secrets required. Both of these objects include cluster label selectors which, when matched to clusters, will cause the software to be installed on those clusters. You can have one GlobalRepository for multiple GlobalHelm objects. If a GlobalHelm refers to a different repository (other than the ones preloaded with Flux), then you can add another GlobalRepository object. Wayfinder does not come with any default repositories. Helm and Repository—these are scoped to a specific workspace for matching clusters within that workspace. These objects are automatically generated when you create GlobalHelm and GlobalRepository packages. Read-only Helm and Repository are created for the relevant workspaces. Workspace admins can also create their own custom Helm or Repository objects in their workspace. This requires some knowledge of Flux. See Package Definition for some yaml examples. When defining a GlobalHelm package, you can choose to make it available as a Capability that can be enabled or disabled by default in cluster plans. Optionally, workspace users can enable or disable capabilities on clusters. To make a GlobalHelm a capability, you add a set of annotations and an extra label selector to the package—see Make global package a capability. A release is an installation instance. Package definitions include cluster label selectors ( MatchExpressions) to filter on the cluster labels within the associated workspace. When a cluster matches a label selector, a Release object is created that represents the installation of the package into a specific cluster. For more information, see: Software delivery flow using packages This diagram illustrates how a Wayfinder admin can use packages to deploy software across multiple clusters. How packages are deployed into Wayfinder Packages are deployed using the CLI as detailed in Apply global packages procedure. View available Helm packages and releases You can view packages available to a workspace, or to the admin workspace, in the UI or CLI. If you see available packages but no releases it means there are no clusters in the workspace that match the cluster label selectors in the Helm package. When there is both a package and a release, the package is installed automatically on the cluster(s) matching the label selectors. See Software delivery flow using packages for more information. To view available packages and associated releases (UI): In your workspace, navigate to Resources > Packages. The Packages page is displayed. You can click the Releases tab to see all releases of packages to your clusters. In Wayfinder settings, navigate to Cluster configuration > Packages. To view available packages and associated releases (CLI): Run the following CLI commands to view: wf get helm wf get globalhelmfor admin wf get repository wf get globalrepositoryfor admin wf get helmrelease wf get repositoryrelease # View the helm packages $ wf get helm NAME STATUS AGE gke-certificates Success 12d # View the release objects $ wf get helmrelease NAME STATUS AGE gke-certificates Success 12d
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500080.82/warc/CC-MAIN-20230204012622-20230204042622-00818.warc.gz
CC-MAIN-2023-06
4,675
46
https://gigaom.com/2007/05/29/rim_blackberry_/
code
Looks like Research In Motion has finally accepted WiFi as a viable network platform; RIM’s CEO announced last week that they company would intro a BlackBerry with both WiFi and cellular capabilities in the second half of the year. BlackBerry handsets are traditionally targeted to the enterprise markets, but last I checked, they were pretty accepting of WiFi as a network. Oh, if we only had an "it’s about time" category on the blog…. ;) The Blackberry Enterprise Server will treat WiFi networks as just another usable network, so the handset can seamlessly switch among networks for data. I thought that RIM had a WiFi / cellular handset in the past, but upon checking, I must have been thinking of the BlackBerry 7270: it has WiFi but no cellular. (via Phone Scoop)
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864795.68/warc/CC-MAIN-20180622201448-20180622221448-00422.warc.gz
CC-MAIN-2018-26
776
3
http://osx.iusethis.com/app/versions/23250
code
- Version 2.1 | Release Date: 2015-04-16 | Download Fixed a bug which would cause the app to open behind other windows. Added menu options to share the app on twitter, facebook or rate on MacUpdate or iUseThis - Version v2.0 | Release Date: 2015-03-24 | Download Manual locating of Adobe Audition Application (better compatibility) Added support for Melodyne Single Track (User Request) Added support for Sony SoundForge Pro (User Request) Added support for Iced Audio AudioFinder (User Request) Added a section for “Export Only” applications, that cannot direclty write over the original file. - Version v1.2 | Release Date: 2014-05-14 | Download Name Changed to “Audio File Toolbox for Logic Pro” New User Interface Improved Key command support. - Version 1.2 | Release Date: 2014-05-10 | Download Added Amadeus Pro to choice of Editors. Added option to backup audio file. Added option to show the audio file in the Finder. Buttons are now inactive when no audio file has been sent to the app. - Version 1.0 | Release Date: 2014-05-08 | Download Fixed bug that could cause the app to freeze when update server was down. Added “Refresh Region in Logic Pro” button to force logic to reread the selecected audio file into the region. - Version 0.9.3 | Release Date: 2014-04-08 | Download Added path bar to show audio file currently in use. Enabled drag and drop support to the App Icon. Fixed Frequent Issue with update server. - Version 0.9.2 | Release Date: 2014-04-03 | Download Added Editor Icons to the User Interface. Added keyboard shortcuts for quicker app opening. - Version 0.9.1 | Release Date: 2014-04-02 | Download Added buttons to direct users to the websites of the Editors. Added Sound Studio to choice of Editors. Buttons Now listed in Alphabetical order. Removed Audacity as it does not save files in they’re original format. Now supports 32bit Macs - Version 0.9 | Release Date: 2014-04-01 | Download - No changes specified Licence: Shareware (£2.50)
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720471.17/warc/CC-MAIN-20161020183840-00515-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
1,985
37
http://cooljobscanada.blogspot.com/2014/07/jobs-on-cool-jobs-canada-12-job.html
code
Jobs Search Tips and Motivation To Help You Find Your Cool Job. looking for jobs?? Visit this site.. It might help Jobs hexajobs company provide overseas work permit visa for various countries like Canada,USA,Australia, Singapore,Malaysia,china,Georgia and other countries.work permit for USA work permit for Canada work permit for Australia work permit for Singapore
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912207618.95/warc/CC-MAIN-20190327020750-20190327042750-00293.warc.gz
CC-MAIN-2019-13
367
3
https://www.logicmonitor.com/support/logicmodules/about-logicmodules/deprecated-logicmodules
code
LogicModule changes (including New, Updated, and Deprecated LogicModules) are announced for each LogicMonitor release. See Platform Release Notes. This table tracks the LogicModules that have been deprecated. If a replacement is available, we will provide it before we officially remove the deprecated LogicModules in a future release. |LogicModule Deprecation||LogicModule Replacement||Details||End of Support Date| |In the existing version of this module, the wildvalue would get set to the same value for every instance, making all instances duplicates in most cases. Due to this all data was duplicated from a single instance. Wildvalues have been modified to ensure that they are unique. Additionally license types that are subsets of other licenses will now be filtered out if the parent license is not owned. This will ensure that expiration dates that are being reported, are only for licenses types that can expire.| The datapoint DaysRemaining has been changed to report on expireTime instead of endTime, e.g. reporting on when the license expires instead of the end of the grace period. Grace period days are now no longer directly tracked but DaysRemaining will report negative values during the grace period, with a value of -90 being the standard time frame in which grace period licenses expire. Additionally minor changes to date processing have been implemented so additional date formats for license expirations can be parsed. Azure Site Recovery Account |N/A||The Azure Site Recovery Account and Azure Site Recovery EventSources cause alerts on the same events resulting in duplicate alerts. The Azure Site Recovery Account EventSource has been removed to avoid duplicate alerts.||2023-09-15| |Deprecated addCategory_MySQL and replaced it with the properly labeled addCategory_OracleMySQL. The new addCategory will put the version numbers on the resource if a successful connection can be made.||2023-09-15| |The deprecated modules have been superseded by new modules that are optimized for vCenter Server Appliance 6.7 through vCenter Server 8.0.x and ESXi 6.5 through 8.0.x. The new modules are named to reflect what they monitor.||2023-09-15| |AWS_MSK_Cluster is replaced by 2 datasources that support MSK Provisioned and Serverless Clusters separately.||2023-09-01| |The deprecated modules use JWT, an authentication method that Zoom is planning to turn off on on September 1, 2023. For more information, see Zoom Developer Documentation.| Zoom monitoring remains available via the LogicMonitor SaaS integration. |Oracle_Database_TableSpaceUsage||Oracle_Database_TableSpaceUsageMaxGrowth||These modules report the same data, however Oracle_Database_TableSpaceUsageMaxGrowth has two additional datapoints.||2023-09-01| |N/A||Microsoft is deprecating global and cluster-named init scripts for Databricks, which LogicMonitor currently uses for Databricks monitoring. These scripts will be disabled on September 1, 2023 by Microsoft, at which point LogicMonitor’s existing Databricks integration will cease to work.| Based on the current integration utilization, we will not be replacing the integration in September. Submit your feedback if an out of the box Databricks monitoring is something you need. |Microsoft_Azure_APIManagement||Microsoft_Azure_APIManagementV2||The Microsoft_Azure_APIManagement DS contains metrics that will stop working in August 2023. For more information, see Microsoft Azure Metrics Retirement (Aug 2023)||2023-08-31| |Config_Cisco||Config_Cisco_Generic||Combined functionality into single module.||2023-07-14| |Kubernetes_Scheduler||Kubernetes_Schedulers||Changed module from single instance to multi-instance allowing you to monitor multiple instances of the Kubernetes Schedulers (in case you use your implemented Schedulers).||2023-06-15| |LogicMonitor_Collector_ScriptCache||LogicMonitor_Collector_ScriptCache_JMX||Added new JMX Metrics for monitoring script cache more efficiently.||2023-06-15| |AWS_SageMaker||AWS_SageMaker_Endpoint||The replacement module supports more versions of the technology connected with SageMaker AWS service and removes datapoints that were not working.||N/A| |Dell_PowerConnect_Interfaces||SNMP_Network_Interfaces||Dell_PowerConnect_Interfaces was initially developed to address discovery-based indexing issues that were seen in PowerConnect environments that presented collection issues where duplicate interface descriptions existed. These issues have since been addressed in SNMP_Network_Interfaces which also includes stability fixes in larger environments.||2023-04-23| |HP_Product_Info||Device_BasicInfo||Consolidated functionality into fewer PropertySources to improve portal functionality and reduce collector load.||2023-03-31| |SNMP_Interfaces_Mode||Device_BasicInfo||Consolidated functionality into fewer PropertySources to improve portal functionality and reduce collector load.||2023-03-31| |AWS_EC2_ScheduledEvents||AWS Health Events||Replaced the AWS_EC2_ScheduledEvents datasource with the AWS Health Events eventsource to reduce data duplication and CloudWatch costs.||2023-03-21| |AWS_Elasticsearch_DataNodes||AWS_OpenSearch_DataNodes||Renamed the datasource and updated metric paths to follow AWS changes, and updated datapoints and graphs.||2023-02-21| |AWS_Elasticsearch_CPUCreditBalance||AWS_OpenSearch_CPUCreditBalance||Renamed the datasource and updated the datapoint description.||2023-02-16| |AWS_Elasticsearch_MasterNodes||AWS_OpenSearch_MasterNodes||Replaced mentions of Elasticsearch with OpenSearch and fixed linting issues.| Note: Historical data will be lost after migrating to this new module. |AWS_Elasticsearch_MasterNode||AWS_OpenSearch_MasterNode||Added MasterReachableFromNode datapoint.||2023-02-02| |Details||End of Support Date| |LogicMonitor deprecated the recently released PaloAlto SD-WAN package. | Recommendation: Use LogicMonitor’s native SNMP capabilities to monitor Palo Alto Network Prisma SD-WAN Instant-On (“ION”) devices (formerly Cloudgenix). |LogicMonitor has rewritten the Oracle modules to be consistent with the other database modules. The functionality of these modules were moved into existing modules.||2022-11-30| |Replaces legacy DataSource.||2022-09-15| |Powershell-based modules were replaced by the Office365 SaaS integration last year.||2022-31-08| |This module only applies to collector versions that are no longer supported (24.106 through 29.105). Current minimum collector version is 30.002.||2022-15-08| |Removed redundant ERI property sources with functionality that is already supported in other ERI sources.||N/A| |Created a new Cisco memory module that merges existing Cisco memory modules. Added support for monitoring cisco-enhanced-mempool MIB.||2022-07-08| |This module was creating instances to store system properties. The data provided by these instances is now available through addCategory_EMC_VNX.||2022-07-08| |This DataSource experiences monitoring data gaps and API timeouts that affect the functionality of other Cisco Meraki DataSources and should be deleted or disabled. Switch connection status and client count remain available via the Cisco_Meraki_Switches Datasource.||2022-08-05| |Replaced the old module that did not filter services properly and reported intermittent or no data for a number of datapoints.||2022-06-17| |Updated WMI class from Win32_PerfRawData_NTDS_NTDS to Win32_PerfRawData_DirectoryServices_DirectoryServices.||2022-05-16| |Updated to current conventions and now uses the Win32_PerfFormattedData_Counters_ProcessorInformation WMI class.||2022-04-22| |Branched out into four separate modules to better serve specific aspects of vCenter. Note: VMware_vCenter_Topology should be deleted or set to “false” to prevent interference with new modules.||2022-03-15| |This module created confusion and excessive alerts. The info provided is now stored as a property applied by Microsoft_Powershell_Info.||2022-03-09| |Added new module Microsoft_IIS_Server identical to WinIIS- but with a more narrow AppliesTo in order to prevent excessive Collector runs on devices that will never work.||2022-03-09| |Did not provide meaningful actionable data.||2021-04-12| |Merged authentication connection checks into Microsoft_SQLServer_Connections so all connection verification is in one module.||2021-02-11| |VMware_vCenter_Topology will remain in the core with the ApplesTo set to “false” until 2/11/22 to ensure conflicts do not occur when importing the replacements.||2021-02-11| |Previous versions no longer work due to a hard JAR dependency. The new modules expand on the metrics provided by the old modules.||2021-01-20| |Details||End of Support Date| Module is no longer supported. For monitoring Windows services Windows_TimeOffset used a collection method that guaranteed a delayed result due to time difference calculation occurring server-side rather than at collection. The replacement is now scripted with attempts to improve accuracy and better communicate the variation in timing due to time spent on our WMI query. |(3 DataSources) | These modules created excessive instance counts with all runs of a backup, including those that were expired, as separate instances. Data provided was not actionable and created unnecessary collector load. The replacement modules provide the same data for the latest backups. |(4 DataSources) | Combined existing uptime modules into a single new module to remove duplicate coverage and streamline support. |Deprecated due to duplicate monitoring and altering.||2021-12-10| |(3 DataSources) Gathering billing data via file is now deprecated.| You should use the BigQuery modules for GCP billing and remove the GCP storage buckets used for storing billing files. |(1 DataSources) Deprecated module was querying OID that returns invalid data. New module tracks queries, responses, and referrals per zone.||2021-11-10| Created excessive instances. Overlap between Cisco_Nexus and Cisco DataSources. Deprecated duplicate modules to prevent double monitoring or alerting. Metrics for Cisco_Nexus_CPU_Memory are present in the latest version of Cisco_CPU_Usage. Metrics for Cisco_Nexus_Fan and Cisco_Nexus_FRU_Status are present in Cisco_FRU_Power. |Deprecated: Cisco_Product_Info | |(1 PropertySource) Deprecated in favor of Device_BasicInfo.||2021-10-15| |(1 DataSource) Use composite of local and remote tunnel addresses instead of tunnel index to prevent duplicate instances. Deduplicate tunnel data returned under different tunnel indices. Customers wishing to preserve historical data should disable the deprecated module to prevent duplicate collection.||2021-08-04| |(2 DataSources) No longer in use for Topology generation.||2021-08-27| |(DataSource) Provides the same data as the CPU Cores- DataSource.||2021-08-27| |(2 DataSources) Unable to report consistent data across devices/instances.||2021-08-27| |(DataSource) Did not provide useful data. It is recommended that JobMonitors be used to monitor crontab entries.||2021-08-27| |(DataSource) Change active discovery and collection to batchscript. Try and handle renamed or missing instances.||2021-07-02| |(DataSource) New module uses scripted active discovery to ensure that instance names are unique and nonephemeral.||2021-05-21| |Modules generate an excessive amount of instances for ephemeral devices, in some cases multiple for a single device. These modules are known to cause performance issues and should be deleted or disabled.||2021-07-01| |Old module did not produce unique wildvalues, new module uses scripted discovery to produce unique wildvalues by combining test name and owner. It is recommended that the old module be disabled to preserve historical data.||2021-04-22| |Deprecate modules in favor of single a DataSource for all backup jobs. New DataSource uses pagination which provides significant performance improvements, particularly for large deployments.||2021-04-07| |Customers wishing to preserve historical data should disable these modules to prevent double collection and alerting. Please update SNMP_Filesystem_Status and SNMP_Filesystem_Usage to at least v1.1 before disabling these modules as alerts were not set in earlier versions.||2021-04-07| |(2 DataSources) All the functionality of these now-deprecated DataSources is present in the SNMP_Network_Interfaces DataSource, along with significant enhancements including additional datapoints, scripted data collection for improved performance, instance-level properties that provide for additional filtering capabilities, and more precise alerting to eliminate alert storms caused by the old DataSources.||2021-03-19| |(2 DataSources) Postfix no longer provides the data requested by the modules.||2021-05-24| |(DataSource) This DataSource was creating excessive instances, resulting in degraded Collector performance.||2021-05-05| |(2 DataSources) Released in v.145, Cisco_CPU_Usage performs the same functions as these deprecated DataSources in a more efficient manner.||2021-03-08| |(4 DataSources) The replacement DataSources use scripted Active Discovery to ensure unique instance naming, a known issue with the now-deprecated DataSources.||2021-03-08| |(DataSource) Development DataSource that was inadvertently published.||Immediate| |(DataSource) The now-legacy DataSource produced indecipherable instance names. The replacement DataSource remedies this as well as features new overview graphs and datapoint descriptions..||2021-03-08| Unomaly Anomalies Frequency Spikes Unomaly Known Events Unomaly New Anomalies New LM Logs feature, released in fourth quarter of 2020. |(3 EventSources) Functionality has been fully replaced by LogicMonitor’s new LM Logs feature.||2021-02-17| |(1 DataSource) It has been determined that all data gathered by this DataSource is being reported more robustly through the existing NetSNMPCPUwithCores and NetSNMP_Memory_Usage DataSources, making it redundant and unnecessary.||2021-02-09| |(1 deprecated DataSource) Enhancements featured by replacement include an updated AppliesTo statement that includes OpenBSD systems; updated filters to exclude /proc and /dev and allow discovery of files between 0-100 bytes on filesystems; new complex datapoints; and support for drives over 8 TB and block sizes other than 4 K.||2021-01-19| |(7 deprecated DataSources) The replacement DataSources apply to the cluster VNN rather than each node individually, significantly reducing the incidence of duplicate alerts. | Note: The six replacement DataSources listed here are part of a bigger monitoring package for Microsoft Windows Failover Clusters that was released in v.146. |(1 DataSource) Converted to a scripted DataSource and uses an additional OID to resolve duplicate wildvalues.||2021-01-04| Liebert Power lines Liebert Temperature probes- Liebert UPS Temperature probes- |(3 DataSources) Rewrote DataSources as scripted SNMP; merged monitoring of temperature and UPS temperature probes into a single DataSource; added new power and voltage metrics for power lines monitoring; fixed an incorrect filter for power lines.||2021-01-04| |(1 DataSource) LogicMonitor released five new DataSources that provide 15 additional datapoints and group related metrics into separate DataSources, making it easier to hone in on specific aspects of your portal. For more information, see LogicMonitor Portal Monitoring.||2021-01-04| Importing LogicModule replacements When importing a replacement LogicModule, you will not experience any immediate data loss due to the name variation that LogicMonitor expressly adds. However, there will be a diversion in data collection between the deprecated and new LogicModule, and you will potentially collect duplicate data and receive duplicate alerts for as long as both LogicModules are active. For this reason, we recommend that you disable monitoring of the DataSource instances at the resource or resource group level after you have imported its replacement. When DataSource monitoring is disabled in this way, it stops querying the host and generating alerts, but maintains all historical data. At some point in time, you may want to delete the legacy DataSource altogether, but consider this move carefully as all historical data will be lost upon deletion. For more information on disabling DataSource monitoring, see Disabling Monitoring for a DataSource or Instance.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100308.37/warc/CC-MAIN-20231201215122-20231202005122-00278.warc.gz
CC-MAIN-2023-50
16,334
105
http://taperssection.com/index.php?PHPSESSID=6f98eeb1a9ebdf5bbb3ee20207c69353&topic=9357.0
code
Original thread hyah: http://www.taperssection.com/index.php?board=1;action=display;threadid=9354Bill posted: I have to admit some fault. I thought that I was good to go using EAC to get bit perfect extractions and that all was good. Then I read this:http://www.sharingthegroove.org/msgboard/showthread.php?s=39f6347ca65235e96fd71eb1b1d7479d&threadid=18429 So fortunately...I don't trade much. I don't know how much of an effect my original settings had on the EAC's I did in the past. I'm still not 100% that I do have it set now. I read, and re-read the instructions found: here: http://pages.cthome.net/homepage/eac/setup.htm2004-07-03 | Edited by Brian Skalinder and here: http://www.ping.be/satcp/eacoffsets02.htm#- Out-dated link. New one: The Coaster Factory I set the read offset to 0, ripped a studio disk, burned that disk, ripped tracks off of the second disk, and compared the WAV files using the feature in EAC. At first I came up with 92 missing samples on the original rip. I adjusted my read offset to +92. Then I re-ripped the second disk and compared the WAV files again. This time I got no errors. SO...am I good now?npsinboro replied: That's exactly what yer supposed to do Bill. For further sanity checks you could do a file compare in DOS between the two .wav's you extracted from different disks to ensure the files are identical (not sure what EAC uses). If in windows > Start > Run > 'cmd' In DOS window: C:\> FC filename1 filename2 Similar format to the unix "diff" command.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120187.95/warc/CC-MAIN-20170423031200-00085-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,500
15
https://www.aftleuven.be/workshops/data-science/
code
PWC: Data Science Are you looking for a way to make data-driven decisions and improve your business outcomes? Data analytics is the thing for you! Data analytics is the process of examining large and complex data sets to uncover insights, trends, and patterns. By using data analytics, businesses can make informed decisions that are based on real-world data rather than guesswork. So why not take advantage of the power of data analytics? With the right tools and expertise, you can harness the power of data to improve your business outcomes and stay ahead of the competition. So why wait? Start exploring the exciting world of data analytics by attending our workshop! In this workshop, we’ll dive deeper into data analytics by solving an interesting case offered by PwC. 26th of April - Learn how to get started with Data Science - Get familiar with the different technologies - Get some hands-on guidance by experts in the field. - Note that no background in data analytics is needed! Even without proper knowledge about data analytics, it will be a great learning opportunity. - There are two tracks: a beginner track, where you will develop in PowerBI. But for those of you who know more about the topic, the expert track with Python in Kaggle, will be the challenge! What do you need? For the full experience, please bring a laptop.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644915.48/warc/CC-MAIN-20230530000715-20230530030715-00674.warc.gz
CC-MAIN-2023-23
1,342
13
http://ds-tula.ru/Bitch+cam+sexy+web/6ec76d0c51c5d6bfb5577669d0227bc5.html
code
how to respond to dating ad - Bitch cam sexy web The song also became his best selling song in the United States, earning a triple platinum certification by the Recording Industry Association of America (RIAA), with sales of 3,507,000 copies as of March 2014. "Sexy Bitch" was written by Giorgio Tuinfort, Aliaune Thiam, David Guetta, Jean-Claude Sindres and Sandy Vee. Webcam porn is originally created live and for an audience and provides a unique sexual experience to those involved. Scenes are recorded and uploaded to be enjoyed after the show has ended so non-subscribers can watch. The lyrics of "Sexy Bitch" deal with the protagonist's infatuation with a woman. "Sexy Bitch" garnered generally mixed to positive reviews from music critics, who commended the song's production. Most cam shows feature solo stripteases and masturbation as the ladies pleasure their bodies for the benefit of the audience. Couples are rare but from time to time they fuck on webcam. "Sexy Bitch" (also known as "Sexy Chick" in clean versions) is a song by French DJ David Guetta recorded for his fourth studio album One Love (2009). The song features vocals from Senegalese-American recording artist Akon. The song achieved commercial success worldwide, peaking inside the top five in several countries, including topping the charts in Australia, Austria, Canada, Germany, New Zealand, and the United Kingdom.Tags: Adult Dating, affair dating, sex dating
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948513330.14/warc/CC-MAIN-20171211090353-20171211110353-00756.warc.gz
CC-MAIN-2017-51
1,443
12
https://scripts-onscreen.com/movie/doctor-zhivago-script-links/
code
Written by:Boris Pasternak (Novel), David Lean (Screenplay), Robert Bolt (Screenplay) Script Synopsis:Two protagonists love each other, but because of their current situation, cannot find a way to be together. Doctor Zhivago Script Resources: Note: Multiple links are listed since (a) different versions exist and (b) many scripts posted become unavailable over time. Please notify me if you encounter a stale link. Other Links:
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303356.40/warc/CC-MAIN-20220121101528-20220121131528-00262.warc.gz
CC-MAIN-2022-05
428
4
http://spankeysblog.blogspot.com/2011/05/symbol-of-mainline-church.html
code
Last night the clergy and lay deputies and alternates to General Convention were invited to Bishop and Kathy Duncan's home for dinner. It was a lovely evening: good beer, good conversation, and an excellent meal. As the evening wrapped up our Diocesan Administrator, who we also think happens to also be the longest tenured deputy elected to the 2012 Convention gave us a brief overview of the next year's worth of prep work. He handed out to each of us a 1GB flash drive (some call it a thumb drive, he called it a pig drive containing three pdf documents: a list of contact information for deputies and alternates, the outdated draft schedule for the Convention, and a copy of an email sent to all of us regarding a June Synod meeting that most of us will not attend. I chuckled at the flash drives, and told Cassie how excited I was the Diocese had nearly reached the year 2000 with its technology. At least they are trying, though, and I have to give them credit for that. Well, I went to plug in the drive this morning, and after my PC went through the usual machinations to install the drivers, it told me I had to restart my computer for the software to work correctly. At the very same time, it opened a window showing the contents of the drive: the three pdfs I mentioned earlier. I tried to open them, but to no avail, they were either corrupted or not found, which I assume meant, "follow the restart instructions, hot shot!" I restarted my computer, and tried to open the drive folder again, but now my computer is recognizing it as either a floppy or CD drive and telling me to insert a disk into drive e:. I went to the website of the brand name on the thumb drive but all the FAQ pages are bad links. And so, here I sit with a 1GB piece of useless plastic. And I thought to myself, is this a symbol of the Mainline Church? We over buy. We aren't quite sure how to make it all work. And our FAQs have as many answers as we do members. Are we stuck with over-sized structures that are essentially useless? Or, is there a way to format what we've got in such a way that it is useful to a world that is desperately in need?
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593438.33/warc/CC-MAIN-20180722174538-20180722194538-00263.warc.gz
CC-MAIN-2018-30
2,134
9